dumpstate.cpp revision 0c80cf0caaf5dce5ef4d0265b249bd1ec680cca1
1/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <dirent.h>
18#include <errno.h>
19#include <fcntl.h>
20#include <libgen.h>
21#include <limits.h>
22#include <memory>
23#include <regex>
24#include <stdbool.h>
25#include <stdio.h>
26#include <stdlib.h>
27#include <string>
28#include <string.h>
29#include <sys/capability.h>
30#include <sys/prctl.h>
31#include <sys/resource.h>
32#include <sys/stat.h>
33#include <sys/time.h>
34#include <sys/wait.h>
35#include <unistd.h>
36
37#include <android-base/stringprintf.h>
38#include <cutils/properties.h>
39
40#include "private/android_filesystem_config.h"
41
42#define LOG_TAG "dumpstate"
43#include <cutils/log.h>
44
45#include "dumpstate.h"
46#include "ScopedFd.h"
47#include "ziparchive/zip_writer.h"
48
49using android::base::StringPrintf;
50
51/* read before root is shed */
52static char cmdline_buf[16384] = "(unknown)";
53static const char *dump_traces_path = NULL;
54
55static char build_type[PROPERTY_VALUE_MAX];
56
57#define PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops"
58
59#define RAFT_DIR "/data/misc/raft/"
60#define TOMBSTONE_DIR "/data/tombstones"
61#define TOMBSTONE_FILE_PREFIX TOMBSTONE_DIR "/tombstone_"
62/* Can accomodate a tombstone number up to 9999. */
63#define TOMBSTONE_MAX_LEN (sizeof(TOMBSTONE_FILE_PREFIX) + 4)
64#define NUM_TOMBSTONES  10
65
66typedef struct {
67  char name[TOMBSTONE_MAX_LEN];
68  int fd;
69} tombstone_data_t;
70
71static tombstone_data_t tombstone_data[NUM_TOMBSTONES];
72
73/* Get the fds of any tombstone that was modified in the last half an hour. */
74static void get_tombstone_fds(tombstone_data_t data[NUM_TOMBSTONES]) {
75    time_t thirty_minutes_ago = time(NULL) - 60*30;
76    for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
77        snprintf(data[i].name, sizeof(data[i].name), "%s%02zu", TOMBSTONE_FILE_PREFIX, i);
78        int fd = TEMP_FAILURE_RETRY(open(data[i].name,
79                                         O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
80        struct stat st;
81        if (fstat(fd, &st) == 0 && S_ISREG(st.st_mode) &&
82                (time_t) st.st_mtime >= thirty_minutes_ago) {
83            data[i].fd = fd;
84        } else {
85            close(fd);
86            data[i].fd = -1;
87        }
88    }
89}
90
91static void dump_dev_files(const char *title, const char *driverpath, const char *filename)
92{
93    DIR *d;
94    struct dirent *de;
95    char path[PATH_MAX];
96
97    d = opendir(driverpath);
98    if (d == NULL) {
99        return;
100    }
101
102    while ((de = readdir(d))) {
103        if (de->d_type != DT_LNK) {
104            continue;
105        }
106        snprintf(path, sizeof(path), "%s/%s/%s", driverpath, de->d_name, filename);
107        dump_file(title, path);
108    }
109
110    closedir(d);
111}
112
113static bool skip_not_stat(const char *path) {
114    static const char stat[] = "/stat";
115    size_t len = strlen(path);
116    if (path[len - 1] == '/') { /* Directory? */
117        return false;
118    }
119    return strcmp(path + len - sizeof(stat) + 1, stat); /* .../stat? */
120}
121
122static const char mmcblk0[] = "/sys/block/mmcblk0/";
123unsigned long worst_write_perf = 20000; /* in KB/s */
124
125static int dump_stat_from_fd(const char *title __unused, const char *path, int fd) {
126    unsigned long fields[11], read_perf, write_perf;
127    bool z;
128    char *cp, *buffer = NULL;
129    size_t i = 0;
130    FILE *fp = fdopen(fd, "rb");
131    getline(&buffer, &i, fp);
132    fclose(fp);
133    if (!buffer) {
134        return -errno;
135    }
136    i = strlen(buffer);
137    while ((i > 0) && (buffer[i - 1] == '\n')) {
138        buffer[--i] = '\0';
139    }
140    if (!*buffer) {
141        free(buffer);
142        return 0;
143    }
144    z = true;
145    for (cp = buffer, i = 0; i < (sizeof(fields) / sizeof(fields[0])); ++i) {
146        fields[i] = strtol(cp, &cp, 0);
147        if (fields[i] != 0) {
148            z = false;
149        }
150    }
151    if (z) { /* never accessed */
152        free(buffer);
153        return 0;
154    }
155
156    if (!strncmp(path, mmcblk0, sizeof(mmcblk0) - 1)) {
157        path += sizeof(mmcblk0) - 1;
158    }
159
160    printf("%s: %s\n", path, buffer);
161    free(buffer);
162
163    read_perf = 0;
164    if (fields[3]) {
165        read_perf = 512 * fields[2] / fields[3];
166    }
167    write_perf = 0;
168    if (fields[7]) {
169        write_perf = 512 * fields[6] / fields[7];
170    }
171    printf("%s: read: %luKB/s write: %luKB/s\n", path, read_perf, write_perf);
172    if ((write_perf > 1) && (write_perf < worst_write_perf)) {
173        worst_write_perf = write_perf;
174    }
175    return 0;
176}
177
178/* Copied policy from system/core/logd/LogBuffer.cpp */
179
180#define LOG_BUFFER_SIZE (256 * 1024)
181#define LOG_BUFFER_MIN_SIZE (64 * 1024UL)
182#define LOG_BUFFER_MAX_SIZE (256 * 1024 * 1024UL)
183
184static bool valid_size(unsigned long value) {
185    if ((value < LOG_BUFFER_MIN_SIZE) || (LOG_BUFFER_MAX_SIZE < value)) {
186        return false;
187    }
188
189    long pages = sysconf(_SC_PHYS_PAGES);
190    if (pages < 1) {
191        return true;
192    }
193
194    long pagesize = sysconf(_SC_PAGESIZE);
195    if (pagesize <= 1) {
196        pagesize = PAGE_SIZE;
197    }
198
199    // maximum memory impact a somewhat arbitrary ~3%
200    pages = (pages + 31) / 32;
201    unsigned long maximum = pages * pagesize;
202
203    if ((maximum < LOG_BUFFER_MIN_SIZE) || (LOG_BUFFER_MAX_SIZE < maximum)) {
204        return true;
205    }
206
207    return value <= maximum;
208}
209
210static unsigned long property_get_size(const char *key) {
211    unsigned long value;
212    char *cp, property[PROPERTY_VALUE_MAX];
213
214    property_get(key, property, "");
215    value = strtoul(property, &cp, 10);
216
217    switch(*cp) {
218    case 'm':
219    case 'M':
220        value *= 1024;
221    /* FALLTHRU */
222    case 'k':
223    case 'K':
224        value *= 1024;
225    /* FALLTHRU */
226    case '\0':
227        break;
228
229    default:
230        value = 0;
231    }
232
233    if (!valid_size(value)) {
234        value = 0;
235    }
236
237    return value;
238}
239
240/* timeout in ms */
241static unsigned long logcat_timeout(const char *name) {
242    static const char global_tuneable[] = "persist.logd.size"; // Settings App
243    static const char global_default[] = "ro.logd.size";       // BoardConfig.mk
244    char key[PROP_NAME_MAX];
245    unsigned long property_size, default_size;
246
247    default_size = property_get_size(global_tuneable);
248    if (!default_size) {
249        default_size = property_get_size(global_default);
250    }
251
252    snprintf(key, sizeof(key), "%s.%s", global_tuneable, name);
253    property_size = property_get_size(key);
254
255    if (!property_size) {
256        snprintf(key, sizeof(key), "%s.%s", global_default, name);
257        property_size = property_get_size(key);
258    }
259
260    if (!property_size) {
261        property_size = default_size;
262    }
263
264    if (!property_size) {
265        property_size = LOG_BUFFER_SIZE;
266    }
267
268    /* Engineering margin is ten-fold our guess */
269    return 10 * (property_size + worst_write_perf) / worst_write_perf;
270}
271
272/* End copy from system/core/logd/LogBuffer.cpp */
273
274/* dumps the current system state to stdout */
275static void print_header() {
276    time_t now = time(NULL);
277    char build[PROPERTY_VALUE_MAX], fingerprint[PROPERTY_VALUE_MAX];
278    char radio[PROPERTY_VALUE_MAX], bootloader[PROPERTY_VALUE_MAX];
279    char network[PROPERTY_VALUE_MAX], date[80];
280
281    property_get("ro.build.display.id", build, "(unknown)");
282    property_get("ro.build.fingerprint", fingerprint, "(unknown)");
283    property_get("ro.build.type", build_type, "(unknown)");
284    property_get("ro.baseband", radio, "(unknown)");
285    property_get("ro.bootloader", bootloader, "(unknown)");
286    property_get("gsm.operator.alpha", network, "(unknown)");
287    strftime(date, sizeof(date), "%Y-%m-%d %H:%M:%S", localtime(&now));
288
289    printf("========================================================\n");
290    printf("== dumpstate: %s\n", date);
291    printf("========================================================\n");
292
293    printf("\n");
294    printf("Build: %s\n", build);
295    printf("Build fingerprint: '%s'\n", fingerprint); /* format is important for other tools */
296    printf("Bootloader: %s\n", bootloader);
297    printf("Radio: %s\n", radio);
298    printf("Network: %s\n", network);
299
300    printf("Kernel: ");
301    dump_file(NULL, "/proc/version");
302    printf("Command line: %s\n", strtok(cmdline_buf, "\n"));
303    printf("\n");
304}
305
306static void dumpstate(const std::string& screenshot_path) {
307    DurationReporter> duration_reporter("DUMPSTATE");
308    unsigned long timeout;
309
310    dump_dev_files("TRUSTY VERSION", "/sys/bus/platform/drivers/trusty", "trusty_version");
311    run_command("UPTIME", 10, "uptime", NULL);
312    dump_files("UPTIME MMC PERF", mmcblk0, skip_not_stat, dump_stat_from_fd);
313    dump_emmc_ecsd("/d/mmc0/mmc0:0001/ext_csd");
314    dump_file("MEMORY INFO", "/proc/meminfo");
315    run_command("CPU INFO", 10, "top", "-n", "1", "-d", "1", "-m", "30", "-H", NULL);
316    run_command("PROCRANK", 20, SU_PATH, "root", "procrank", NULL);
317    dump_file("VIRTUAL MEMORY STATS", "/proc/vmstat");
318    dump_file("VMALLOC INFO", "/proc/vmallocinfo");
319    dump_file("SLAB INFO", "/proc/slabinfo");
320    dump_file("ZONEINFO", "/proc/zoneinfo");
321    dump_file("PAGETYPEINFO", "/proc/pagetypeinfo");
322    dump_file("BUDDYINFO", "/proc/buddyinfo");
323    dump_file("FRAGMENTATION INFO", "/d/extfrag/unusable_index");
324
325    dump_file("KERNEL WAKELOCKS", "/proc/wakelocks");
326    dump_file("KERNEL WAKE SOURCES", "/d/wakeup_sources");
327    dump_file("KERNEL CPUFREQ", "/sys/devices/system/cpu/cpu0/cpufreq/stats/time_in_state");
328    dump_file("KERNEL SYNC", "/d/sync");
329
330    run_command("PROCESSES AND THREADS", 10, "ps", "-Z", "-t", "-p", "-P", NULL);
331    run_command("LIBRANK", 10, SU_PATH, "root", "librank", NULL);
332
333    do_dmesg();
334
335    run_command("LIST OF OPEN FILES", 10, SU_PATH, "root", "lsof", NULL);
336    for_each_pid(do_showmap, "SMAPS OF ALL PROCESSES");
337    for_each_tid(show_wchan, "BLOCKED PROCESS WAIT-CHANNELS");
338
339    if (!screenshot_path.empty()) {
340        ALOGI("taking late screenshot\n");
341        take_screenshot(screenshot_path);
342        ALOGI("wrote screenshot: %s\n", screenshot_path.c_str());
343    }
344
345    // dump_file("EVENT LOG TAGS", "/etc/event-log-tags");
346    // calculate timeout
347    timeout = logcat_timeout("main") + logcat_timeout("system") + logcat_timeout("crash");
348    if (timeout < 20000) {
349        timeout = 20000;
350    }
351    run_command("SYSTEM LOG", timeout / 1000, "logcat", "-v", "threadtime",
352                                                        "-v", "printable",
353                                                        "-d",
354                                                        "*:v", NULL);
355    timeout = logcat_timeout("events") + logcat_timeout("security");
356    if (timeout < 20000) {
357        timeout = 20000;
358    }
359    run_command("EVENT LOG", timeout / 1000, "logcat", "-b", "events",
360                                                       "-b", "security",
361                                                       "-v", "threadtime",
362                                                       "-v", "printable",
363                                                       "-d",
364                                                       "*:v", NULL);
365    timeout = logcat_timeout("radio");
366    if (timeout < 20000) {
367        timeout = 20000;
368    }
369    run_command("RADIO LOG", timeout / 1000, "logcat", "-b", "radio",
370                                                       "-v", "threadtime",
371                                                       "-v", "printable",
372                                                       "-d",
373                                                       "*:v", NULL);
374
375    run_command("LOG STATISTICS", 10, "logcat", "-b", "all", "-S", NULL);
376
377    run_command("RAFT LOGS", 600, SU_PATH, "root", "logcompressor", "-r", RAFT_DIR, NULL);
378
379    /* show the traces we collected in main(), if that was done */
380    if (dump_traces_path != NULL) {
381        dump_file("VM TRACES JUST NOW", dump_traces_path);
382    }
383
384    /* only show ANR traces if they're less than 15 minutes old */
385    struct stat st;
386    char anr_traces_path[PATH_MAX];
387    property_get("dalvik.vm.stack-trace-file", anr_traces_path, "");
388    if (!anr_traces_path[0]) {
389        printf("*** NO VM TRACES FILE DEFINED (dalvik.vm.stack-trace-file)\n\n");
390    } else {
391      int fd = TEMP_FAILURE_RETRY(open(anr_traces_path,
392                                       O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
393      if (fd < 0) {
394          printf("*** NO ANR VM TRACES FILE (%s): %s\n\n", anr_traces_path, strerror(errno));
395      } else {
396          dump_file_from_fd("VM TRACES AT LAST ANR", anr_traces_path, fd);
397      }
398    }
399
400    /* slow traces for slow operations */
401    if (anr_traces_path[0] != 0) {
402        int tail = strlen(anr_traces_path)-1;
403        while (tail > 0 && anr_traces_path[tail] != '/') {
404            tail--;
405        }
406        int i = 0;
407        while (1) {
408            sprintf(anr_traces_path+tail+1, "slow%02d.txt", i);
409            if (stat(anr_traces_path, &st)) {
410                // No traces file at this index, done with the files.
411                break;
412            }
413            dump_file("VM TRACES WHEN SLOW", anr_traces_path);
414            i++;
415        }
416    }
417
418    int dumped = 0;
419    for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
420        if (tombstone_data[i].fd != -1) {
421            dumped = 1;
422            dump_file_from_fd("TOMBSTONE", tombstone_data[i].name, tombstone_data[i].fd);
423            tombstone_data[i].fd = -1;
424        }
425    }
426    if (!dumped) {
427        printf("*** NO TOMBSTONES to dump in %s\n\n", TOMBSTONE_DIR);
428    }
429
430    dump_file("NETWORK DEV INFO", "/proc/net/dev");
431    dump_file("QTAGUID NETWORK INTERFACES INFO", "/proc/net/xt_qtaguid/iface_stat_all");
432    dump_file("QTAGUID NETWORK INTERFACES INFO (xt)", "/proc/net/xt_qtaguid/iface_stat_fmt");
433    dump_file("QTAGUID CTRL INFO", "/proc/net/xt_qtaguid/ctrl");
434    dump_file("QTAGUID STATS INFO", "/proc/net/xt_qtaguid/stats");
435
436    if (!stat(PSTORE_LAST_KMSG, &st)) {
437        /* Also TODO: Make console-ramoops CAP_SYSLOG protected. */
438        dump_file("LAST KMSG", PSTORE_LAST_KMSG);
439    } else {
440        /* TODO: Make last_kmsg CAP_SYSLOG protected. b/5555691 */
441        dump_file("LAST KMSG", "/proc/last_kmsg");
442    }
443
444    /* kernels must set CONFIG_PSTORE_PMSG, slice up pstore with device tree */
445    run_command("LAST LOGCAT", 10, "logcat", "-L",
446                                             "-b", "all",
447                                             "-v", "threadtime",
448                                             "-v", "printable",
449                                             "-d",
450                                             "*:v", NULL);
451
452    /* The following have a tendency to get wedged when wifi drivers/fw goes belly-up. */
453
454    run_command("NETWORK INTERFACES", 10, "ip", "link", NULL);
455
456    run_command("IPv4 ADDRESSES", 10, "ip", "-4", "addr", "show", NULL);
457    run_command("IPv6 ADDRESSES", 10, "ip", "-6", "addr", "show", NULL);
458
459    run_command("IP RULES", 10, "ip", "rule", "show", NULL);
460    run_command("IP RULES v6", 10, "ip", "-6", "rule", "show", NULL);
461
462    dump_route_tables();
463
464    run_command("ARP CACHE", 10, "ip", "-4", "neigh", "show", NULL);
465    run_command("IPv6 ND CACHE", 10, "ip", "-6", "neigh", "show", NULL);
466
467    run_command("IPTABLES", 10, SU_PATH, "root", "iptables", "-L", "-nvx", NULL);
468    run_command("IP6TABLES", 10, SU_PATH, "root", "ip6tables", "-L", "-nvx", NULL);
469    run_command("IPTABLE NAT", 10, SU_PATH, "root", "iptables", "-t", "nat", "-L", "-nvx", NULL);
470    /* no ip6 nat */
471    run_command("IPTABLE RAW", 10, SU_PATH, "root", "iptables", "-t", "raw", "-L", "-nvx", NULL);
472    run_command("IP6TABLE RAW", 10, SU_PATH, "root", "ip6tables", "-t", "raw", "-L", "-nvx", NULL);
473
474    run_command("WIFI NETWORKS", 20,
475            SU_PATH, "root", "wpa_cli", "IFNAME=wlan0", "list_networks", NULL);
476
477#ifdef FWDUMP_bcmdhd
478    run_command("ND OFFLOAD TABLE", 5,
479            SU_PATH, "root", "wlutil", "nd_hostip", NULL);
480
481    run_command("DUMP WIFI INTERNAL COUNTERS (1)", 20,
482            SU_PATH, "root", "wlutil", "counters", NULL);
483
484    run_command("ND OFFLOAD STATUS (1)", 5,
485            SU_PATH, "root", "wlutil", "nd_status", NULL);
486
487#endif
488    dump_file("INTERRUPTS (1)", "/proc/interrupts");
489
490    run_command("NETWORK DIAGNOSTICS", 10, "dumpsys", "connectivity", "--diag", NULL);
491
492#ifdef FWDUMP_bcmdhd
493    run_command("DUMP WIFI STATUS", 20,
494            SU_PATH, "root", "dhdutil", "-i", "wlan0", "dump", NULL);
495
496    run_command("DUMP WIFI INTERNAL COUNTERS (2)", 20,
497            SU_PATH, "root", "wlutil", "counters", NULL);
498
499    run_command("ND OFFLOAD STATUS (2)", 5,
500            SU_PATH, "root", "wlutil", "nd_status", NULL);
501#endif
502    dump_file("INTERRUPTS (2)", "/proc/interrupts");
503
504    print_properties();
505
506    run_command("VOLD DUMP", 10, "vdc", "dump", NULL);
507    run_command("SECURE CONTAINERS", 10, "vdc", "asec", "list", NULL);
508
509    run_command("FILESYSTEMS & FREE SPACE", 10, "df", NULL);
510
511    run_command("LAST RADIO LOG", 10, "parse_radio_log", "/proc/last_radio_log", NULL);
512
513    printf("------ BACKLIGHTS ------\n");
514    printf("LCD brightness=");
515    dump_file(NULL, "/sys/class/leds/lcd-backlight/brightness");
516    printf("Button brightness=");
517    dump_file(NULL, "/sys/class/leds/button-backlight/brightness");
518    printf("Keyboard brightness=");
519    dump_file(NULL, "/sys/class/leds/keyboard-backlight/brightness");
520    printf("ALS mode=");
521    dump_file(NULL, "/sys/class/leds/lcd-backlight/als");
522    printf("LCD driver registers:\n");
523    dump_file(NULL, "/sys/class/leds/lcd-backlight/registers");
524    printf("\n");
525
526    /* Binder state is expensive to look at as it uses a lot of memory. */
527    dump_file("BINDER FAILED TRANSACTION LOG", "/sys/kernel/debug/binder/failed_transaction_log");
528    dump_file("BINDER TRANSACTION LOG", "/sys/kernel/debug/binder/transaction_log");
529    dump_file("BINDER TRANSACTIONS", "/sys/kernel/debug/binder/transactions");
530    dump_file("BINDER STATS", "/sys/kernel/debug/binder/stats");
531    dump_file("BINDER STATE", "/sys/kernel/debug/binder/state");
532
533    printf("========================================================\n");
534    printf("== Board\n");
535    printf("========================================================\n");
536
537    dumpstate_board();
538    printf("\n");
539
540    /* Migrate the ril_dumpstate to a dumpstate_board()? */
541    char ril_dumpstate_timeout[PROPERTY_VALUE_MAX] = {0};
542    property_get("ril.dumpstate.timeout", ril_dumpstate_timeout, "30");
543    if (strnlen(ril_dumpstate_timeout, PROPERTY_VALUE_MAX - 1) > 0) {
544        if (0 == strncmp(build_type, "user", PROPERTY_VALUE_MAX - 1)) {
545            // su does not exist on user builds, so try running without it.
546            // This way any implementations of vril-dump that do not require
547            // root can run on user builds.
548            run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
549                    "vril-dump", NULL);
550        } else {
551            run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
552                    SU_PATH, "root", "vril-dump", NULL);
553        }
554    }
555
556    printf("========================================================\n");
557    printf("== Android Framework Services\n");
558    printf("========================================================\n");
559
560    /* the full dumpsys is starting to take a long time, so we need
561       to increase its timeout.  we really need to do the timeouts in
562       dumpsys itself... */
563    run_command("DUMPSYS", 60, "dumpsys", NULL);
564
565    printf("========================================================\n");
566    printf("== Checkins\n");
567    printf("========================================================\n");
568
569    run_command("CHECKIN BATTERYSTATS", 30, "dumpsys", "batterystats", "-c", NULL);
570    run_command("CHECKIN MEMINFO", 30, "dumpsys", "meminfo", "--checkin", NULL);
571    run_command("CHECKIN NETSTATS", 30, "dumpsys", "netstats", "--checkin", NULL);
572    run_command("CHECKIN PROCSTATS", 30, "dumpsys", "procstats", "-c", NULL);
573    run_command("CHECKIN USAGESTATS", 30, "dumpsys", "usagestats", "-c", NULL);
574    run_command("CHECKIN PACKAGE", 30, "dumpsys", "package", "--checkin", NULL);
575
576    printf("========================================================\n");
577    printf("== Running Application Activities\n");
578    printf("========================================================\n");
579
580    run_command("APP ACTIVITIES", 30, "dumpsys", "activity", "all", NULL);
581
582    printf("========================================================\n");
583    printf("== Running Application Services\n");
584    printf("========================================================\n");
585
586    run_command("APP SERVICES", 30, "dumpsys", "activity", "service", "all", NULL);
587
588    printf("========================================================\n");
589    printf("== Running Application Providers\n");
590    printf("========================================================\n");
591
592    run_command("APP SERVICES", 30, "dumpsys", "activity", "provider", "all", NULL);
593
594
595    printf("========================================================\n");
596    printf("== dumpstate: done\n");
597    printf("========================================================\n");
598}
599
600static void usage() {
601    fprintf(stderr, "usage: dumpstate [-b soundfile] [-e soundfile] [-o file [-d] [-p] [-z]] [-s] [-q]\n"
602            "  -o: write to file (instead of stdout)\n"
603            "  -d: append date to filename (requires -o)\n"
604            "  -z: generates zipped file (requires -o)\n"
605            "  -p: capture screenshot to filename.png (requires -o)\n"
606            "  -s: write output to control socket (for init)\n"
607            "  -b: play sound file instead of vibrate, at beginning of job\n"
608            "  -e: play sound file instead of vibrate, at end of job\n"
609            "  -q: disable vibrate\n"
610            "  -B: send broadcast when finished (requires -o)\n"
611            "  -P: send broadacast when started and update system properties on progress (requires -o and -B)\n"
612                );
613}
614
615static void sigpipe_handler(int n) {
616    // don't complain to stderr or stdout
617    _exit(EXIT_FAILURE);
618}
619
620static void vibrate(FILE* vibrator, int ms) {
621    fprintf(vibrator, "%d\n", ms);
622    fflush(vibrator);
623}
624
625/* adds a new entry to the existing zip file. */
626static bool add_zip_entry(ZipWriter* writer, const std::string& entry_name,
627        const std::string& entry_path, time_t entry_time) {
628    int32_t err = writer->StartEntryWithTime(entry_name.c_str(),
629            ZipWriter::kCompress, entry_time);
630    if (err) {
631        ALOGE("writer->StartEntryWithTime(%s): %s\n", entry_name.c_str(), ZipWriter::ErrorCodeString(err));
632        return false;
633    }
634
635    ScopedFd fd(TEMP_FAILURE_RETRY(open(entry_path.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC)));
636    if (fd.get() == -1) {
637        ALOGE("open(%s): %s\n", entry_path.c_str(), strerror(errno));
638        return false;
639    }
640
641    while (1) {
642        std::vector<uint8_t> buffer(65536);
643        ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd.get(), buffer.data(), sizeof(buffer)));
644        if (bytes_read == 0) {
645            break;
646        } else if (bytes_read == -1) {
647            ALOGE("read(%s): %s\n", entry_path.c_str(), strerror(errno));
648            return false;
649        }
650        err = writer->WriteBytes(buffer.data(), bytes_read);
651        if (err) {
652            ALOGE("writer->WriteBytes(): %s\n", ZipWriter::ErrorCodeString(err));
653            return false;
654        }
655    }
656
657    err = writer->FinishEntry();
658    if (err) {
659        ALOGE("writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err));
660        return false;
661    }
662
663    return true;
664}
665
666/* adds the temporary report to the existing .zip file, closes the .zip file, and removes the
667   temporary file.
668 */
669static bool finish_zip_file(ZipWriter* writer,
670        const std::string& bugreport_name, const std::string& bugreport_path,
671        time_t now) {
672    if (!add_zip_entry(writer, bugreport_name, bugreport_path, now)) {
673        ALOGE("Failed to add text entry to .zip file\n");
674        return false;
675    }
676
677    int32_t err = writer->Finish();
678    if (err) {
679        ALOGE("writer->Finish(): %s\n", ZipWriter::ErrorCodeString(err));
680        return false;
681    }
682
683    if (remove(bugreport_path.c_str())) {
684        ALOGW("remove(%s): %s\n", bugreport_path.c_str(), strerror(errno));
685    }
686
687    return true;
688}
689
690int main(int argc, char *argv[]) {
691    struct sigaction sigact;
692    int do_add_date = 0;
693    int do_zip_file = 0;
694    int do_vibrate = 1;
695    char* use_outfile = 0;
696    int use_socket = 0;
697    int do_fb = 0;
698    int do_broadcast = 0;
699    int do_early_screenshot = 0;
700
701    if (getuid() != 0) {
702        // Old versions of the adb client would call the
703        // dumpstate command directly. Newer clients
704        // call /system/bin/bugreport instead. If we detect
705        // we're being called incorrectly, then exec the
706        // correct program.
707        return execl("/system/bin/bugreport", "/system/bin/bugreport", NULL);
708    }
709
710    ALOGI("begin\n");
711
712    /* clear SIGPIPE handler */
713    memset(&sigact, 0, sizeof(sigact));
714    sigact.sa_handler = sigpipe_handler;
715    sigaction(SIGPIPE, &sigact, NULL);
716
717    /* set as high priority, and protect from OOM killer */
718    setpriority(PRIO_PROCESS, 0, -20);
719    FILE *oom_adj = fopen("/proc/self/oom_adj", "we");
720    if (oom_adj) {
721        fputs("-17", oom_adj);
722        fclose(oom_adj);
723    }
724
725    /* parse arguments */
726    int c;
727    while ((c = getopt(argc, argv, "dho:svqzpPB")) != -1) {
728        switch (c) {
729            case 'd': do_add_date = 1;          break;
730            case 'z': do_zip_file = 1;          break;
731            case 'o': use_outfile = optarg;     break;
732            case 's': use_socket = 1;           break;
733            case 'v': break;  // compatibility no-op
734            case 'q': do_vibrate = 0;           break;
735            case 'p': do_fb = 1;                break;
736            case 'P': do_update_progress = 1;   break;
737            case 'B': do_broadcast = 1;         break;
738            case '?': printf("\n");
739            case 'h':
740                usage();
741                exit(1);
742        }
743    }
744
745    if ((do_zip_file || do_add_date || do_update_progress || do_broadcast) && !use_outfile) {
746        usage();
747        exit(1);
748    }
749
750    if (do_update_progress && !do_broadcast) {
751        usage();
752        exit(1);
753    }
754
755    do_early_screenshot = do_update_progress;
756
757    // If we are going to use a socket, do it as early as possible
758    // to avoid timeouts from bugreport.
759    if (use_socket) {
760        redirect_to_socket(stdout, "dumpstate");
761    }
762
763    /* full path of the directory where the bug report files will be written */
764    std::string bugreport_dir;
765
766    /* full path of the temporary file containing the bug report */
767    std::string tmp_path;
768
769    /* full path of the temporary file containing the screenshot (when requested) */
770    std::string screenshot_path;
771
772    /* base name (without suffix or extensions) of the bug report files */
773    std::string base_name;
774
775    /* suffix of the bug report files - it's typically the date (when invoked with -d),
776     * although it could be changed by the user using a system property */
777    std::string suffix;
778
779    /* pointer to the actual path, be it zip or text */
780    std::string path;
781
782    /* pointers to the zipped file file */
783    std::unique_ptr<FILE, int(*)(FILE*)> zip_file(NULL, fclose);
784    std::unique_ptr<ZipWriter> zip_writer;
785
786    time_t now = time(NULL);
787
788    /* redirect output if needed */
789    bool is_redirecting = !use_socket && use_outfile;
790
791    if (is_redirecting) {
792        bugreport_dir = dirname(use_outfile);
793        base_name = basename(use_outfile);
794        if (do_add_date) {
795            char date[80];
796            strftime(date, sizeof(date), "%Y-%m-%d-%H-%M-%S", localtime(&now));
797            suffix = date;
798        } else {
799            suffix = "undated";
800        }
801        if (do_fb) {
802            // TODO: if dumpstate was an object, the paths could be internal variables and then
803            // we could have a function to calculate the derived values, such as:
804            //     screenshot_path = GetPath(".png");
805            screenshot_path = bugreport_dir + "/" + base_name + "-" + suffix + ".png";
806        }
807        tmp_path = bugreport_dir + "/" + base_name + "-" + suffix + ".tmp";
808
809        ALOGD("Bugreport dir: %s\nBase name: %s\nSuffix: %s\nTemporary path: %s\n"
810                "Screenshot path: %s\n", bugreport_dir.c_str(), base_name.c_str(), suffix.c_str(),
811                tmp_path.c_str(), screenshot_path.c_str());
812
813        if (do_zip_file) {
814            ALOGD("Creating initial .zip file");
815            path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip";
816            zip_file.reset(fopen(path.c_str(), "wb"));
817            if (!zip_file) {
818                ALOGE("fopen(%s, 'wb'): %s\n", path.c_str(), strerror(errno));
819                do_zip_file = 0;
820            } else {
821                zip_writer.reset(new ZipWriter(zip_file.get()));
822            }
823        }
824
825        if (do_update_progress) {
826            std::vector<std::string> am_args = {
827                 "--receiver-permission", "android.permission.DUMP",
828                 "--es", "android.intent.extra.NAME", suffix,
829                 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
830                 "--ei", "android.intent.extra.MAX", std::to_string(WEIGHT_TOTAL),
831            };
832            send_broadcast("android.intent.action.BUGREPORT_STARTED", am_args);
833        }
834    }
835
836    print_header();
837
838    /* open the vibrator before dropping root */
839    std::unique_ptr<FILE, int(*)(FILE*)> vibrator(NULL, fclose);
840    if (do_vibrate) {
841        vibrator.reset(fopen("/sys/class/timed_output/vibrator/enable", "we"));
842        if (vibrator) {
843            vibrate(vibrator.get(), 150);
844        }
845    }
846
847    if (do_fb && do_early_screenshot) {
848        if (screenshot_path.empty()) {
849            // should not have happened
850            ALOGE("INTERNAL ERROR: skipping early screenshot because path was not set");
851        } else {
852            ALOGI("taking early screenshot\n");
853            take_screenshot(screenshot_path);
854            ALOGI("wrote screenshot: %s\n", screenshot_path.c_str());
855            if (chown(screenshot_path.c_str(), AID_SHELL, AID_SHELL)) {
856                ALOGE("Unable to change ownership of screenshot file %s: %s\n",
857                        screenshot_path.c_str(), strerror(errno));
858            }
859        }
860    }
861
862    if (do_zip_file) {
863        if (chown(path.c_str(), AID_SHELL, AID_SHELL)) {
864            ALOGE("Unable to change ownership of zip file %s: %s\n", path.c_str(), strerror(errno));
865        }
866    }
867
868    /* read /proc/cmdline before dropping root */
869    FILE *cmdline = fopen("/proc/cmdline", "re");
870    if (cmdline) {
871        fgets(cmdline_buf, sizeof(cmdline_buf), cmdline);
872        fclose(cmdline);
873    }
874
875    /* collect stack traces from Dalvik and native processes (needs root) */
876    dump_traces_path = dump_traces();
877
878    /* Get the tombstone fds here while we are running as root. */
879    get_tombstone_fds(tombstone_data);
880
881    /* ensure we will keep capabilities when we drop root */
882    if (prctl(PR_SET_KEEPCAPS, 1) < 0) {
883        ALOGE("prctl(PR_SET_KEEPCAPS) failed: %s\n", strerror(errno));
884        return -1;
885    }
886
887    /* switch to non-root user and group */
888    gid_t groups[] = { AID_LOG, AID_SDCARD_R, AID_SDCARD_RW,
889            AID_MOUNT, AID_INET, AID_NET_BW_STATS, AID_READPROC };
890    if (setgroups(sizeof(groups)/sizeof(groups[0]), groups) != 0) {
891        ALOGE("Unable to setgroups, aborting: %s\n", strerror(errno));
892        return -1;
893    }
894    if (setgid(AID_SHELL) != 0) {
895        ALOGE("Unable to setgid, aborting: %s\n", strerror(errno));
896        return -1;
897    }
898    if (setuid(AID_SHELL) != 0) {
899        ALOGE("Unable to setuid, aborting: %s\n", strerror(errno));
900        return -1;
901    }
902
903    struct __user_cap_header_struct capheader;
904    struct __user_cap_data_struct capdata[2];
905    memset(&capheader, 0, sizeof(capheader));
906    memset(&capdata, 0, sizeof(capdata));
907    capheader.version = _LINUX_CAPABILITY_VERSION_3;
908    capheader.pid = 0;
909
910    capdata[CAP_TO_INDEX(CAP_SYSLOG)].permitted = CAP_TO_MASK(CAP_SYSLOG);
911    capdata[CAP_TO_INDEX(CAP_SYSLOG)].effective = CAP_TO_MASK(CAP_SYSLOG);
912    capdata[0].inheritable = 0;
913    capdata[1].inheritable = 0;
914
915    if (capset(&capheader, &capdata[0]) < 0) {
916        ALOGE("capset failed: %s\n", strerror(errno));
917        return -1;
918    }
919
920    if (is_redirecting) {
921        /* TODO: rather than generating a text file now and zipping it later,
922           it would be more efficient to redirect stdout to the zip entry
923           directly, but the libziparchive doesn't support that option yet. */
924        redirect_to_file(stdout, const_cast<char*>(tmp_path.c_str()));
925    }
926
927    dumpstate(do_early_screenshot ? "": screenshot_path);
928
929    /* done */
930    if (vibrator) {
931        for (int i = 0; i < 3; i++) {
932            vibrate(vibrator.get(), 75);
933            usleep((75 + 50) * 1000);
934        }
935    }
936
937    /* close output if needed */
938    if (is_redirecting) {
939        fclose(stdout);
940    }
941
942    /* rename or zip the (now complete) .tmp file to its final location */
943    if (use_outfile) {
944
945        /* check if user changed the suffix using system properties */
946        char key[PROPERTY_KEY_MAX];
947        char value[PROPERTY_VALUE_MAX];
948        sprintf(key, "dumpstate.%d.name", getpid());
949        property_get(key, value, "");
950        bool change_suffix= false;
951        if (value[0]) {
952            /* must whitelist which characters are allowed, otherwise it could cross directories */
953            std::regex valid_regex("^[-_a-zA-Z0-9]+$");
954            if (std::regex_match(value, valid_regex)) {
955                change_suffix = true;
956            } else {
957                ALOGE("invalid suffix provided by user: %s", value);
958            }
959        }
960        if (change_suffix) {
961            ALOGI("changing suffix from %s to %s", suffix.c_str(), value);
962            suffix = value;
963            if (!screenshot_path.empty()) {
964                std::string new_screenshot_path =
965                        bugreport_dir + "/" + base_name + "-" + suffix + ".png";
966                if (rename(screenshot_path.c_str(), new_screenshot_path.c_str())) {
967                    ALOGE("rename(%s, %s): %s\n", screenshot_path.c_str(),
968                            new_screenshot_path.c_str(), strerror(errno));
969                } else {
970                    screenshot_path = new_screenshot_path;
971                }
972            }
973        }
974
975        bool do_text_file = true;
976        if (do_zip_file) {
977            ALOGD("Adding text entry to .zip bugreport");
978            if (!finish_zip_file(zip_writer.get(), base_name + "-" + suffix + ".txt", tmp_path, now)) {
979                ALOGE("Failed to finish zip file; sending text bugreport instead\n");
980                do_text_file = true;
981            } else {
982                do_text_file = false;
983            }
984        }
985        if (do_text_file) {
986            ALOGD("Generating .txt bugreport");
987            path = bugreport_dir + "/" + base_name + "-" + suffix + ".txt";
988            if (rename(tmp_path.c_str(), path.c_str())) {
989                ALOGE("rename(%s, %s): %s\n", tmp_path.c_str(), path.c_str(), strerror(errno));
990                path.clear();
991            }
992        }
993    }
994
995    /* tell activity manager we're done */
996    if (do_broadcast) {
997        if (!path.empty()) {
998            ALOGI("Final bugreport path: %s\n", path.c_str());
999            std::vector<std::string> am_args = {
1000                 "--receiver-permission", "android.permission.DUMP",
1001                 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
1002                 "--es", "android.intent.extra.BUGREPORT", path
1003            };
1004            if (do_fb) {
1005                am_args.push_back("--es");
1006                am_args.push_back("android.intent.extra.SCREENSHOT");
1007                am_args.push_back(screenshot_path);
1008            }
1009            send_broadcast("android.intent.action.BUGREPORT_FINISHED", am_args);
1010        } else {
1011            ALOGE("Skipping finished broadcast because bugreport could not be generated\n");
1012        }
1013    }
1014
1015    ALOGD("Final progress: %d/%d (originally %d)\n", progress, weight_total, WEIGHT_TOTAL);
1016    ALOGI("done\n");
1017
1018    return 0;
1019}
1020