dumpstate.cpp revision 876de450004b02b9c028ece0d3ca850504caaa4d
1/* 2 * Copyright (C) 2008 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17#include <dirent.h> 18#include <errno.h> 19#include <fcntl.h> 20#include <libgen.h> 21#include <limits.h> 22#include <memory> 23#include <regex> 24#include <set> 25#include <stdbool.h> 26#include <stdio.h> 27#include <stdlib.h> 28#include <string> 29#include <string.h> 30#include <sys/capability.h> 31#include <sys/prctl.h> 32#include <sys/resource.h> 33#include <sys/stat.h> 34#include <sys/time.h> 35#include <sys/wait.h> 36#include <unistd.h> 37 38#include <android-base/stringprintf.h> 39#include <cutils/properties.h> 40 41#include "private/android_filesystem_config.h" 42 43#define LOG_TAG "dumpstate" 44#include <cutils/log.h> 45 46#include "dumpstate.h" 47#include "ScopedFd.h" 48#include "ziparchive/zip_writer.h" 49 50#include "mincrypt/sha256.h" 51 52using android::base::StringPrintf; 53 54/* read before root is shed */ 55static char cmdline_buf[16384] = "(unknown)"; 56static const char *dump_traces_path = NULL; 57 58// TODO: should be part of dumpstate object 59static char build_type[PROPERTY_VALUE_MAX]; 60static time_t now; 61static std::unique_ptr<ZipWriter> zip_writer; 62static std::set<std::string> mount_points; 63void add_mountinfo(); 64static bool add_zip_entry(const std::string& entry_name, const std::string& entry_path); 65 66#define PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops" 67 68#define RAFT_DIR "/data/misc/raft/" 69#define RECOVERY_DIR "/cache/recovery" 70#define TOMBSTONE_DIR "/data/tombstones" 71#define TOMBSTONE_FILE_PREFIX TOMBSTONE_DIR "/tombstone_" 72/* Can accomodate a tombstone number up to 9999. */ 73#define TOMBSTONE_MAX_LEN (sizeof(TOMBSTONE_FILE_PREFIX) + 4) 74#define NUM_TOMBSTONES 10 75 76typedef struct { 77 char name[TOMBSTONE_MAX_LEN]; 78 int fd; 79} tombstone_data_t; 80 81static tombstone_data_t tombstone_data[NUM_TOMBSTONES]; 82 83// Root dir for all files copied as-is into the bugreport 84const std::string& ZIP_ROOT_DIR = "FS"; 85 86/* gets the tombstone data, according to the bugreport type: if zipped gets all tombstones, 87 * otherwise gets just those modified in the last half an hour. */ 88static void get_tombstone_fds(tombstone_data_t data[NUM_TOMBSTONES]) { 89 time_t thirty_minutes_ago = now - 60*30; 90 for (size_t i = 0; i < NUM_TOMBSTONES; i++) { 91 snprintf(data[i].name, sizeof(data[i].name), "%s%02zu", TOMBSTONE_FILE_PREFIX, i); 92 int fd = TEMP_FAILURE_RETRY(open(data[i].name, 93 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK)); 94 struct stat st; 95 if (fstat(fd, &st) == 0 && S_ISREG(st.st_mode) && 96 (zip_writer || (time_t) st.st_mtime >= thirty_minutes_ago)) { 97 data[i].fd = fd; 98 } else { 99 close(fd); 100 data[i].fd = -1; 101 } 102 } 103} 104 105// for_each_pid() callback to get mount info about a process. 106void do_mountinfo(int pid, const char *name) { 107 char path[PATH_MAX]; 108 109 // Gets the the content of the /proc/PID/ns/mnt link, so only unique mount points 110 // are added. 111 sprintf(path, "/proc/%d/ns/mnt", pid); 112 char linkname[PATH_MAX]; 113 ssize_t r = readlink(path, linkname, PATH_MAX); 114 if (r == -1) { 115 ALOGE("Unable to read link for %s: %s\n", path, strerror(errno)); 116 return; 117 } 118 linkname[r] = '\0'; 119 120 if (mount_points.find(linkname) == mount_points.end()) { 121 // First time this mount point was found: add it 122 sprintf(path, "/proc/%d/mountinfo", pid); 123 if (add_zip_entry(ZIP_ROOT_DIR + path, path)) { 124 mount_points.insert(linkname); 125 } else { 126 ALOGE("Unable to add mountinfo %s to zip file\n", path); 127 } 128 } 129} 130 131void add_mountinfo() { 132 if (!zip_writer) return; 133 const char *title = "MOUNT INFO"; 134 mount_points.clear(); 135 DurationReporter duration_reporter(title); 136 for_each_pid(do_mountinfo, NULL); 137 printf("%s: %d entries added to zip file\n", title, mount_points.size()); 138} 139 140static void dump_dev_files(const char *title, const char *driverpath, const char *filename) 141{ 142 DIR *d; 143 struct dirent *de; 144 char path[PATH_MAX]; 145 146 d = opendir(driverpath); 147 if (d == NULL) { 148 return; 149 } 150 151 while ((de = readdir(d))) { 152 if (de->d_type != DT_LNK) { 153 continue; 154 } 155 snprintf(path, sizeof(path), "%s/%s/%s", driverpath, de->d_name, filename); 156 dump_file(title, path); 157 } 158 159 closedir(d); 160} 161 162static bool skip_not_stat(const char *path) { 163 static const char stat[] = "/stat"; 164 size_t len = strlen(path); 165 if (path[len - 1] == '/') { /* Directory? */ 166 return false; 167 } 168 return strcmp(path + len - sizeof(stat) + 1, stat); /* .../stat? */ 169} 170 171static bool skip_none(const char *path) { 172 return false; 173} 174 175static const char mmcblk0[] = "/sys/block/mmcblk0/"; 176unsigned long worst_write_perf = 20000; /* in KB/s */ 177 178static int dump_stat_from_fd(const char *title __unused, const char *path, int fd) { 179 unsigned long fields[11], read_perf, write_perf; 180 bool z; 181 char *cp, *buffer = NULL; 182 size_t i = 0; 183 FILE *fp = fdopen(fd, "rb"); 184 getline(&buffer, &i, fp); 185 fclose(fp); 186 if (!buffer) { 187 return -errno; 188 } 189 i = strlen(buffer); 190 while ((i > 0) && (buffer[i - 1] == '\n')) { 191 buffer[--i] = '\0'; 192 } 193 if (!*buffer) { 194 free(buffer); 195 return 0; 196 } 197 z = true; 198 for (cp = buffer, i = 0; i < (sizeof(fields) / sizeof(fields[0])); ++i) { 199 fields[i] = strtol(cp, &cp, 0); 200 if (fields[i] != 0) { 201 z = false; 202 } 203 } 204 if (z) { /* never accessed */ 205 free(buffer); 206 return 0; 207 } 208 209 if (!strncmp(path, mmcblk0, sizeof(mmcblk0) - 1)) { 210 path += sizeof(mmcblk0) - 1; 211 } 212 213 printf("%s: %s\n", path, buffer); 214 free(buffer); 215 216 read_perf = 0; 217 if (fields[3]) { 218 read_perf = 512 * fields[2] / fields[3]; 219 } 220 write_perf = 0; 221 if (fields[7]) { 222 write_perf = 512 * fields[6] / fields[7]; 223 } 224 printf("%s: read: %luKB/s write: %luKB/s\n", path, read_perf, write_perf); 225 if ((write_perf > 1) && (write_perf < worst_write_perf)) { 226 worst_write_perf = write_perf; 227 } 228 return 0; 229} 230 231/* Copied policy from system/core/logd/LogBuffer.cpp */ 232 233#define LOG_BUFFER_SIZE (256 * 1024) 234#define LOG_BUFFER_MIN_SIZE (64 * 1024UL) 235#define LOG_BUFFER_MAX_SIZE (256 * 1024 * 1024UL) 236 237static bool valid_size(unsigned long value) { 238 if ((value < LOG_BUFFER_MIN_SIZE) || (LOG_BUFFER_MAX_SIZE < value)) { 239 return false; 240 } 241 242 long pages = sysconf(_SC_PHYS_PAGES); 243 if (pages < 1) { 244 return true; 245 } 246 247 long pagesize = sysconf(_SC_PAGESIZE); 248 if (pagesize <= 1) { 249 pagesize = PAGE_SIZE; 250 } 251 252 // maximum memory impact a somewhat arbitrary ~3% 253 pages = (pages + 31) / 32; 254 unsigned long maximum = pages * pagesize; 255 256 if ((maximum < LOG_BUFFER_MIN_SIZE) || (LOG_BUFFER_MAX_SIZE < maximum)) { 257 return true; 258 } 259 260 return value <= maximum; 261} 262 263static unsigned long property_get_size(const char *key) { 264 unsigned long value; 265 char *cp, property[PROPERTY_VALUE_MAX]; 266 267 property_get(key, property, ""); 268 value = strtoul(property, &cp, 10); 269 270 switch(*cp) { 271 case 'm': 272 case 'M': 273 value *= 1024; 274 /* FALLTHRU */ 275 case 'k': 276 case 'K': 277 value *= 1024; 278 /* FALLTHRU */ 279 case '\0': 280 break; 281 282 default: 283 value = 0; 284 } 285 286 if (!valid_size(value)) { 287 value = 0; 288 } 289 290 return value; 291} 292 293/* timeout in ms */ 294static unsigned long logcat_timeout(const char *name) { 295 static const char global_tuneable[] = "persist.logd.size"; // Settings App 296 static const char global_default[] = "ro.logd.size"; // BoardConfig.mk 297 char key[PROP_NAME_MAX]; 298 unsigned long property_size, default_size; 299 300 default_size = property_get_size(global_tuneable); 301 if (!default_size) { 302 default_size = property_get_size(global_default); 303 } 304 305 snprintf(key, sizeof(key), "%s.%s", global_tuneable, name); 306 property_size = property_get_size(key); 307 308 if (!property_size) { 309 snprintf(key, sizeof(key), "%s.%s", global_default, name); 310 property_size = property_get_size(key); 311 } 312 313 if (!property_size) { 314 property_size = default_size; 315 } 316 317 if (!property_size) { 318 property_size = LOG_BUFFER_SIZE; 319 } 320 321 /* Engineering margin is ten-fold our guess */ 322 return 10 * (property_size + worst_write_perf) / worst_write_perf; 323} 324 325/* End copy from system/core/logd/LogBuffer.cpp */ 326 327/* dumps the current system state to stdout */ 328static void print_header() { 329 char build[PROPERTY_VALUE_MAX], fingerprint[PROPERTY_VALUE_MAX]; 330 char radio[PROPERTY_VALUE_MAX], bootloader[PROPERTY_VALUE_MAX]; 331 char network[PROPERTY_VALUE_MAX], date[80]; 332 333 property_get("ro.build.display.id", build, "(unknown)"); 334 property_get("ro.build.fingerprint", fingerprint, "(unknown)"); 335 property_get("ro.build.type", build_type, "(unknown)"); 336 property_get("ro.baseband", radio, "(unknown)"); 337 property_get("ro.bootloader", bootloader, "(unknown)"); 338 property_get("gsm.operator.alpha", network, "(unknown)"); 339 strftime(date, sizeof(date), "%Y-%m-%d %H:%M:%S", localtime(&now)); 340 341 printf("========================================================\n"); 342 printf("== dumpstate: %s\n", date); 343 printf("========================================================\n"); 344 345 printf("\n"); 346 printf("Build: %s\n", build); 347 printf("Build fingerprint: '%s'\n", fingerprint); /* format is important for other tools */ 348 printf("Bootloader: %s\n", bootloader); 349 printf("Radio: %s\n", radio); 350 printf("Network: %s\n", network); 351 352 printf("Kernel: "); 353 dump_file(NULL, "/proc/version"); 354 printf("Command line: %s\n", strtok(cmdline_buf, "\n")); 355 printf("\n"); 356} 357 358/* adds a new entry to the existing zip file. */ 359static bool add_zip_entry_from_fd(const std::string& entry_name, int fd) { 360 int32_t err = zip_writer->StartEntryWithTime(entry_name.c_str(), 361 ZipWriter::kCompress, get_mtime(fd, now)); 362 if (err) { 363 ALOGE("zip_writer->StartEntryWithTime(%s): %s\n", entry_name.c_str(), ZipWriter::ErrorCodeString(err)); 364 return false; 365 } 366 367 while (1) { 368 std::vector<uint8_t> buffer(65536); 369 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer.data(), sizeof(buffer))); 370 if (bytes_read == 0) { 371 break; 372 } else if (bytes_read == -1) { 373 ALOGE("read(%s): %s\n", entry_name.c_str(), strerror(errno)); 374 return false; 375 } 376 err = zip_writer->WriteBytes(buffer.data(), bytes_read); 377 if (err) { 378 ALOGE("zip_writer->WriteBytes(): %s\n", ZipWriter::ErrorCodeString(err)); 379 return false; 380 } 381 } 382 383 err = zip_writer->FinishEntry(); 384 if (err) { 385 ALOGE("zip_writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err)); 386 return false; 387 } 388 389 return true; 390} 391 392/* adds a new entry to the existing zip file. */ 393static bool add_zip_entry(const std::string& entry_name, const std::string& entry_path) { 394 ScopedFd fd(TEMP_FAILURE_RETRY(open(entry_path.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC))); 395 if (fd.get() == -1) { 396 ALOGE("open(%s): %s\n", entry_path.c_str(), strerror(errno)); 397 return false; 398 } 399 400 return add_zip_entry_from_fd(entry_name, fd.get()); 401} 402 403/* adds a file to the existing zipped bugreport */ 404static int _add_file_from_fd(const char *title, const char *path, int fd) { 405 return add_zip_entry_from_fd(ZIP_ROOT_DIR + path, fd) ? 0 : 1; 406} 407 408/* adds all files from a directory to the zipped bugreport file */ 409void add_dir(const char *dir, bool recursive) { 410 if (!zip_writer) return; 411 DurationReporter duration_reporter(dir); 412 dump_files(NULL, dir, recursive ? skip_none : is_dir, _add_file_from_fd); 413} 414 415static void dumpstate(const std::string& screenshot_path) { 416 std::unique_ptr<DurationReporter> duration_reporter(new DurationReporter("DUMPSTATE")); 417 unsigned long timeout; 418 419 dump_dev_files("TRUSTY VERSION", "/sys/bus/platform/drivers/trusty", "trusty_version"); 420 run_command("UPTIME", 10, "uptime", NULL); 421 dump_files("UPTIME MMC PERF", mmcblk0, skip_not_stat, dump_stat_from_fd); 422 dump_emmc_ecsd("/d/mmc0/mmc0:0001/ext_csd"); 423 dump_file("MEMORY INFO", "/proc/meminfo"); 424 run_command("CPU INFO", 10, "top", "-n", "1", "-d", "1", "-m", "30", "-H", NULL); 425 run_command("PROCRANK", 20, SU_PATH, "root", "procrank", NULL); 426 dump_file("VIRTUAL MEMORY STATS", "/proc/vmstat"); 427 dump_file("VMALLOC INFO", "/proc/vmallocinfo"); 428 dump_file("SLAB INFO", "/proc/slabinfo"); 429 dump_file("ZONEINFO", "/proc/zoneinfo"); 430 dump_file("PAGETYPEINFO", "/proc/pagetypeinfo"); 431 dump_file("BUDDYINFO", "/proc/buddyinfo"); 432 dump_file("FRAGMENTATION INFO", "/d/extfrag/unusable_index"); 433 434 dump_file("KERNEL WAKELOCKS", "/proc/wakelocks"); 435 dump_file("KERNEL WAKE SOURCES", "/d/wakeup_sources"); 436 dump_file("KERNEL CPUFREQ", "/sys/devices/system/cpu/cpu0/cpufreq/stats/time_in_state"); 437 dump_file("KERNEL SYNC", "/d/sync"); 438 439 run_command("PROCESSES AND THREADS", 10, "ps", "-Z", "-t", "-p", "-P", NULL); 440 run_command("LIBRANK", 10, SU_PATH, "root", "librank", NULL); 441 442 run_command("ROUTE", 10, "route", NULL); 443 run_command("PRINTENV", 10, "printenv", NULL); 444 run_command("NETSTAT", 10, "netstat", NULL); 445 run_command("LSMOD", 10, "lsmod", NULL); 446 447 do_dmesg(); 448 449 run_command("LIST OF OPEN FILES", 10, SU_PATH, "root", "lsof", NULL); 450 for_each_pid(do_showmap, "SMAPS OF ALL PROCESSES"); 451 for_each_tid(show_wchan, "BLOCKED PROCESS WAIT-CHANNELS"); 452 453 if (!screenshot_path.empty()) { 454 ALOGI("taking late screenshot\n"); 455 take_screenshot(screenshot_path); 456 ALOGI("wrote screenshot: %s\n", screenshot_path.c_str()); 457 } 458 459 // dump_file("EVENT LOG TAGS", "/etc/event-log-tags"); 460 // calculate timeout 461 timeout = logcat_timeout("main") + logcat_timeout("system") + logcat_timeout("crash"); 462 if (timeout < 20000) { 463 timeout = 20000; 464 } 465 run_command("SYSTEM LOG", timeout / 1000, "logcat", "-v", "threadtime", 466 "-v", "printable", 467 "-d", 468 "*:v", NULL); 469 timeout = logcat_timeout("events"); 470 if (timeout < 20000) { 471 timeout = 20000; 472 } 473 run_command("EVENT LOG", timeout / 1000, "logcat", "-b", "events", 474 "-v", "threadtime", 475 "-v", "printable", 476 "-d", 477 "*:v", NULL); 478 timeout = logcat_timeout("radio"); 479 if (timeout < 20000) { 480 timeout = 20000; 481 } 482 run_command("RADIO LOG", timeout / 1000, "logcat", "-b", "radio", 483 "-v", "threadtime", 484 "-v", "printable", 485 "-d", 486 "*:v", NULL); 487 488 run_command("LOG STATISTICS", 10, "logcat", "-b", "all", "-S", NULL); 489 490 run_command("RAFT LOGS", 600, SU_PATH, "root", "logcompressor", "-r", RAFT_DIR, NULL); 491 492 /* show the traces we collected in main(), if that was done */ 493 if (dump_traces_path != NULL) { 494 dump_file("VM TRACES JUST NOW", dump_traces_path); 495 } 496 497 /* only show ANR traces if they're less than 15 minutes old */ 498 struct stat st; 499 char anr_traces_path[PATH_MAX]; 500 property_get("dalvik.vm.stack-trace-file", anr_traces_path, ""); 501 if (!anr_traces_path[0]) { 502 printf("*** NO VM TRACES FILE DEFINED (dalvik.vm.stack-trace-file)\n\n"); 503 } else { 504 int fd = TEMP_FAILURE_RETRY(open(anr_traces_path, 505 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK)); 506 if (fd < 0) { 507 printf("*** NO ANR VM TRACES FILE (%s): %s\n\n", anr_traces_path, strerror(errno)); 508 } else { 509 dump_file_from_fd("VM TRACES AT LAST ANR", anr_traces_path, fd); 510 } 511 } 512 513 /* slow traces for slow operations */ 514 if (anr_traces_path[0] != 0) { 515 int tail = strlen(anr_traces_path)-1; 516 while (tail > 0 && anr_traces_path[tail] != '/') { 517 tail--; 518 } 519 int i = 0; 520 while (1) { 521 sprintf(anr_traces_path+tail+1, "slow%02d.txt", i); 522 if (stat(anr_traces_path, &st)) { 523 // No traces file at this index, done with the files. 524 break; 525 } 526 dump_file("VM TRACES WHEN SLOW", anr_traces_path); 527 i++; 528 } 529 } 530 531 int dumped = 0; 532 for (size_t i = 0; i < NUM_TOMBSTONES; i++) { 533 if (tombstone_data[i].fd != -1) { 534 const char *name = tombstone_data[i].name; 535 int fd = tombstone_data[i].fd; 536 dumped = 1; 537 if (zip_writer) { 538 if (!add_zip_entry_from_fd(ZIP_ROOT_DIR + name, fd)) { 539 ALOGE("Unable to add tombstone %s to zip file\n", name); 540 } 541 } else { 542 dump_file_from_fd("TOMBSTONE", name, fd); 543 } 544 close(fd); 545 tombstone_data[i].fd = -1; 546 } 547 } 548 if (!dumped) { 549 printf("*** NO TOMBSTONES to dump in %s\n\n", TOMBSTONE_DIR); 550 } 551 552 dump_file("NETWORK DEV INFO", "/proc/net/dev"); 553 dump_file("QTAGUID NETWORK INTERFACES INFO", "/proc/net/xt_qtaguid/iface_stat_all"); 554 dump_file("QTAGUID NETWORK INTERFACES INFO (xt)", "/proc/net/xt_qtaguid/iface_stat_fmt"); 555 dump_file("QTAGUID CTRL INFO", "/proc/net/xt_qtaguid/ctrl"); 556 dump_file("QTAGUID STATS INFO", "/proc/net/xt_qtaguid/stats"); 557 558 if (!stat(PSTORE_LAST_KMSG, &st)) { 559 /* Also TODO: Make console-ramoops CAP_SYSLOG protected. */ 560 dump_file("LAST KMSG", PSTORE_LAST_KMSG); 561 } else { 562 /* TODO: Make last_kmsg CAP_SYSLOG protected. b/5555691 */ 563 dump_file("LAST KMSG", "/proc/last_kmsg"); 564 } 565 566 /* kernels must set CONFIG_PSTORE_PMSG, slice up pstore with device tree */ 567 run_command("LAST LOGCAT", 10, "logcat", "-L", 568 "-b", "all", 569 "-v", "threadtime", 570 "-v", "printable", 571 "-d", 572 "*:v", NULL); 573 574 /* The following have a tendency to get wedged when wifi drivers/fw goes belly-up. */ 575 576 run_command("NETWORK INTERFACES", 10, "ip", "link", NULL); 577 578 run_command("IPv4 ADDRESSES", 10, "ip", "-4", "addr", "show", NULL); 579 run_command("IPv6 ADDRESSES", 10, "ip", "-6", "addr", "show", NULL); 580 581 run_command("IP RULES", 10, "ip", "rule", "show", NULL); 582 run_command("IP RULES v6", 10, "ip", "-6", "rule", "show", NULL); 583 584 dump_route_tables(); 585 586 run_command("ARP CACHE", 10, "ip", "-4", "neigh", "show", NULL); 587 run_command("IPv6 ND CACHE", 10, "ip", "-6", "neigh", "show", NULL); 588 589 run_command("IPTABLES", 10, SU_PATH, "root", "iptables", "-L", "-nvx", NULL); 590 run_command("IP6TABLES", 10, SU_PATH, "root", "ip6tables", "-L", "-nvx", NULL); 591 run_command("IPTABLE NAT", 10, SU_PATH, "root", "iptables", "-t", "nat", "-L", "-nvx", NULL); 592 /* no ip6 nat */ 593 run_command("IPTABLE RAW", 10, SU_PATH, "root", "iptables", "-t", "raw", "-L", "-nvx", NULL); 594 run_command("IP6TABLE RAW", 10, SU_PATH, "root", "ip6tables", "-t", "raw", "-L", "-nvx", NULL); 595 596 run_command("WIFI NETWORKS", 20, 597 SU_PATH, "root", "wpa_cli", "IFNAME=wlan0", "list_networks", NULL); 598 599#ifdef FWDUMP_bcmdhd 600 run_command("ND OFFLOAD TABLE", 5, 601 SU_PATH, "root", "wlutil", "nd_hostip", NULL); 602 603 run_command("DUMP WIFI INTERNAL COUNTERS (1)", 20, 604 SU_PATH, "root", "wlutil", "counters", NULL); 605 606 run_command("ND OFFLOAD STATUS (1)", 5, 607 SU_PATH, "root", "wlutil", "nd_status", NULL); 608 609#endif 610 dump_file("INTERRUPTS (1)", "/proc/interrupts"); 611 612 run_command("NETWORK DIAGNOSTICS", 10, "dumpsys", "connectivity", "--diag", NULL); 613 614#ifdef FWDUMP_bcmdhd 615 run_command("DUMP WIFI STATUS", 20, 616 SU_PATH, "root", "dhdutil", "-i", "wlan0", "dump", NULL); 617 618 run_command("DUMP WIFI INTERNAL COUNTERS (2)", 20, 619 SU_PATH, "root", "wlutil", "counters", NULL); 620 621 run_command("ND OFFLOAD STATUS (2)", 5, 622 SU_PATH, "root", "wlutil", "nd_status", NULL); 623#endif 624 dump_file("INTERRUPTS (2)", "/proc/interrupts"); 625 626 print_properties(); 627 628 run_command("VOLD DUMP", 10, "vdc", "dump", NULL); 629 run_command("SECURE CONTAINERS", 10, "vdc", "asec", "list", NULL); 630 631 run_command("FILESYSTEMS & FREE SPACE", 10, "df", NULL); 632 633 run_command("LAST RADIO LOG", 10, "parse_radio_log", "/proc/last_radio_log", NULL); 634 635 printf("------ BACKLIGHTS ------\n"); 636 printf("LCD brightness="); 637 dump_file(NULL, "/sys/class/leds/lcd-backlight/brightness"); 638 printf("Button brightness="); 639 dump_file(NULL, "/sys/class/leds/button-backlight/brightness"); 640 printf("Keyboard brightness="); 641 dump_file(NULL, "/sys/class/leds/keyboard-backlight/brightness"); 642 printf("ALS mode="); 643 dump_file(NULL, "/sys/class/leds/lcd-backlight/als"); 644 printf("LCD driver registers:\n"); 645 dump_file(NULL, "/sys/class/leds/lcd-backlight/registers"); 646 printf("\n"); 647 648 /* Binder state is expensive to look at as it uses a lot of memory. */ 649 dump_file("BINDER FAILED TRANSACTION LOG", "/sys/kernel/debug/binder/failed_transaction_log"); 650 dump_file("BINDER TRANSACTION LOG", "/sys/kernel/debug/binder/transaction_log"); 651 dump_file("BINDER TRANSACTIONS", "/sys/kernel/debug/binder/transactions"); 652 dump_file("BINDER STATS", "/sys/kernel/debug/binder/stats"); 653 dump_file("BINDER STATE", "/sys/kernel/debug/binder/state"); 654 655 printf("========================================================\n"); 656 printf("== Board\n"); 657 printf("========================================================\n"); 658 659 dumpstate_board(); 660 printf("\n"); 661 662 /* Migrate the ril_dumpstate to a dumpstate_board()? */ 663 char ril_dumpstate_timeout[PROPERTY_VALUE_MAX] = {0}; 664 property_get("ril.dumpstate.timeout", ril_dumpstate_timeout, "30"); 665 if (strnlen(ril_dumpstate_timeout, PROPERTY_VALUE_MAX - 1) > 0) { 666 if (0 == strncmp(build_type, "user", PROPERTY_VALUE_MAX - 1)) { 667 // su does not exist on user builds, so try running without it. 668 // This way any implementations of vril-dump that do not require 669 // root can run on user builds. 670 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout), 671 "vril-dump", NULL); 672 } else { 673 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout), 674 SU_PATH, "root", "vril-dump", NULL); 675 } 676 } 677 678 printf("========================================================\n"); 679 printf("== Android Framework Services\n"); 680 printf("========================================================\n"); 681 682 /* the full dumpsys is starting to take a long time, so we need 683 to increase its timeout. we really need to do the timeouts in 684 dumpsys itself... */ 685 run_command("DUMPSYS", 60, "dumpsys", NULL); 686 687 printf("========================================================\n"); 688 printf("== Checkins\n"); 689 printf("========================================================\n"); 690 691 run_command("CHECKIN BATTERYSTATS", 30, "dumpsys", "batterystats", "-c", NULL); 692 run_command("CHECKIN MEMINFO", 30, "dumpsys", "meminfo", "--checkin", NULL); 693 run_command("CHECKIN NETSTATS", 30, "dumpsys", "netstats", "--checkin", NULL); 694 run_command("CHECKIN PROCSTATS", 30, "dumpsys", "procstats", "-c", NULL); 695 run_command("CHECKIN USAGESTATS", 30, "dumpsys", "usagestats", "-c", NULL); 696 run_command("CHECKIN PACKAGE", 30, "dumpsys", "package", "--checkin", NULL); 697 698 printf("========================================================\n"); 699 printf("== Running Application Activities\n"); 700 printf("========================================================\n"); 701 702 run_command("APP ACTIVITIES", 30, "dumpsys", "activity", "all", NULL); 703 704 printf("========================================================\n"); 705 printf("== Running Application Services\n"); 706 printf("========================================================\n"); 707 708 run_command("APP SERVICES", 30, "dumpsys", "activity", "service", "all", NULL); 709 710 printf("========================================================\n"); 711 printf("== Running Application Providers\n"); 712 printf("========================================================\n"); 713 714 run_command("APP SERVICES", 30, "dumpsys", "activity", "provider", "all", NULL); 715 716 717 printf("========================================================\n"); 718 printf("== dumpstate: done\n"); 719 printf("========================================================\n"); 720} 721 722static void usage() { 723 fprintf(stderr, "usage: dumpstate [-b soundfile] [-e soundfile] [-o file [-d] [-p] [-z]] [-s] [-q]\n" 724 " -o: write to file (instead of stdout)\n" 725 " -d: append date to filename (requires -o)\n" 726 " -z: generates zipped file (requires -o)\n" 727 " -p: capture screenshot to filename.png (requires -o)\n" 728 " -s: write output to control socket (for init)\n" 729 " -b: play sound file instead of vibrate, at beginning of job\n" 730 " -e: play sound file instead of vibrate, at end of job\n" 731 " -q: disable vibrate\n" 732 " -B: send broadcast when finished (requires -o)\n" 733 " -P: send broadacast when started and update system properties on progress (requires -o and -B)\n" 734 " -R: take bugreport in remote mode (requires -o, -z, -d and -B, shouldn't be used with -P)\n" 735 ); 736} 737 738static void sigpipe_handler(int n) { 739 // don't complain to stderr or stdout 740 _exit(EXIT_FAILURE); 741} 742 743/* adds the temporary report to the existing .zip file, closes the .zip file, and removes the 744 temporary file. 745 */ 746static bool finish_zip_file(const std::string& bugreport_name, const std::string& bugreport_path, 747 time_t now) { 748 if (!add_zip_entry(bugreport_name, bugreport_path)) { 749 ALOGE("Failed to add text entry to .zip file\n"); 750 return false; 751 } 752 753 int32_t err = zip_writer->Finish(); 754 if (err) { 755 ALOGE("zip_writer->Finish(): %s\n", ZipWriter::ErrorCodeString(err)); 756 return false; 757 } 758 759 if (remove(bugreport_path.c_str())) { 760 ALOGW("remove(%s): %s\n", bugreport_path.c_str(), strerror(errno)); 761 } 762 763 return true; 764} 765 766static std::string SHA256_file_hash(std::string filepath) { 767 ScopedFd fd(TEMP_FAILURE_RETRY(open(filepath.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC 768 | O_NOFOLLOW))); 769 if (fd.get() == -1) { 770 ALOGE("open(%s): %s\n", filepath.c_str(), strerror(errno)); 771 return NULL; 772 } 773 774 SHA256_CTX ctx; 775 SHA256_init(&ctx); 776 777 std::vector<uint8_t> buffer(65536); 778 while (1) { 779 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd.get(), buffer.data(), buffer.size())); 780 if (bytes_read == 0) { 781 break; 782 } else if (bytes_read == -1) { 783 ALOGE("read(%s): %s\n", filepath.c_str(), strerror(errno)); 784 return NULL; 785 } 786 787 SHA256_update(&ctx, buffer.data(), bytes_read); 788 } 789 790 uint8_t hash[SHA256_DIGEST_SIZE]; 791 memcpy(hash, SHA256_final(&ctx), SHA256_DIGEST_SIZE); 792 char hash_buffer[SHA256_DIGEST_SIZE * 2 + 1]; 793 for(size_t i = 0; i < SHA256_DIGEST_SIZE; i++) { 794 sprintf(hash_buffer + (i * 2), "%02x", hash[i]); 795 } 796 hash_buffer[sizeof(hash_buffer) - 1] = 0; 797 return std::string(hash_buffer); 798} 799 800 801int main(int argc, char *argv[]) { 802 struct sigaction sigact; 803 int do_add_date = 0; 804 int do_zip_file = 0; 805 int do_vibrate = 1; 806 char* use_outfile = 0; 807 int use_socket = 0; 808 int do_fb = 0; 809 int do_broadcast = 0; 810 int do_early_screenshot = 0; 811 int is_remote_mode = 0; 812 813 now = time(NULL); 814 815 if (getuid() != 0) { 816 // Old versions of the adb client would call the 817 // dumpstate command directly. Newer clients 818 // call /system/bin/bugreport instead. If we detect 819 // we're being called incorrectly, then exec the 820 // correct program. 821 return execl("/system/bin/bugreport", "/system/bin/bugreport", NULL); 822 } 823 824 ALOGI("begin\n"); 825 826 /* clear SIGPIPE handler */ 827 memset(&sigact, 0, sizeof(sigact)); 828 sigact.sa_handler = sigpipe_handler; 829 sigaction(SIGPIPE, &sigact, NULL); 830 831 /* set as high priority, and protect from OOM killer */ 832 setpriority(PRIO_PROCESS, 0, -20); 833 FILE *oom_adj = fopen("/proc/self/oom_adj", "we"); 834 if (oom_adj) { 835 fputs("-17", oom_adj); 836 fclose(oom_adj); 837 } 838 839 /* parse arguments */ 840 int c; 841 while ((c = getopt(argc, argv, "dho:svqzpPBR")) != -1) { 842 switch (c) { 843 case 'd': do_add_date = 1; break; 844 case 'z': do_zip_file = 1; break; 845 case 'o': use_outfile = optarg; break; 846 case 's': use_socket = 1; break; 847 case 'v': break; // compatibility no-op 848 case 'q': do_vibrate = 0; break; 849 case 'p': do_fb = 1; break; 850 case 'P': do_update_progress = 1; break; 851 case 'R': is_remote_mode = 1; break; 852 case 'B': do_broadcast = 1; break; 853 case '?': printf("\n"); 854 case 'h': 855 usage(); 856 exit(1); 857 } 858 } 859 860 if ((do_zip_file || do_add_date || do_update_progress || do_broadcast) && !use_outfile) { 861 usage(); 862 exit(1); 863 } 864 865 if (do_update_progress && !do_broadcast) { 866 usage(); 867 exit(1); 868 } 869 870 if (is_remote_mode && (do_update_progress || !do_broadcast || !do_zip_file || !do_add_date)) { 871 usage(); 872 exit(1); 873 } 874 875 do_early_screenshot = do_update_progress; 876 877 // If we are going to use a socket, do it as early as possible 878 // to avoid timeouts from bugreport. 879 if (use_socket) { 880 redirect_to_socket(stdout, "dumpstate"); 881 } 882 883 /* full path of the directory where the bug report files will be written */ 884 std::string bugreport_dir; 885 886 /* full path of the temporary file containing the bug report */ 887 std::string tmp_path; 888 889 /* full path of the temporary file containing the screenshot (when requested) */ 890 std::string screenshot_path; 891 892 /* base name (without suffix or extensions) of the bug report files */ 893 std::string base_name; 894 895 /* suffix of the bug report files - it's typically the date (when invoked with -d), 896 * although it could be changed by the user using a system property */ 897 std::string suffix; 898 899 /* pointer to the actual path, be it zip or text */ 900 std::string path; 901 902 /* pointer to the zipped file */ 903 std::unique_ptr<FILE, int(*)(FILE*)> zip_file(NULL, fclose); 904 905 /* redirect output if needed */ 906 bool is_redirecting = !use_socket && use_outfile; 907 908 if (is_redirecting) { 909 bugreport_dir = dirname(use_outfile); 910 base_name = basename(use_outfile); 911 if (do_add_date) { 912 char date[80]; 913 strftime(date, sizeof(date), "%Y-%m-%d-%H-%M-%S", localtime(&now)); 914 suffix = date; 915 } else { 916 suffix = "undated"; 917 } 918 if (do_fb) { 919 // TODO: if dumpstate was an object, the paths could be internal variables and then 920 // we could have a function to calculate the derived values, such as: 921 // screenshot_path = GetPath(".png"); 922 screenshot_path = bugreport_dir + "/" + base_name + "-" + suffix + ".png"; 923 } 924 tmp_path = bugreport_dir + "/" + base_name + "-" + suffix + ".tmp"; 925 926 ALOGD("Bugreport dir: %s\nBase name: %s\nSuffix: %s\nTemporary path: %s\n" 927 "Screenshot path: %s\n", bugreport_dir.c_str(), base_name.c_str(), suffix.c_str(), 928 tmp_path.c_str(), screenshot_path.c_str()); 929 930 if (do_zip_file) { 931 ALOGD("Creating initial .zip file"); 932 path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip"; 933 zip_file.reset(fopen(path.c_str(), "wb")); 934 if (!zip_file) { 935 ALOGE("fopen(%s, 'wb'): %s\n", path.c_str(), strerror(errno)); 936 do_zip_file = 0; 937 } else { 938 zip_writer.reset(new ZipWriter(zip_file.get())); 939 } 940 } 941 942 if (do_update_progress) { 943 std::vector<std::string> am_args = { 944 "--receiver-permission", "android.permission.DUMP", 945 "--es", "android.intent.extra.NAME", suffix, 946 "--ei", "android.intent.extra.PID", std::to_string(getpid()), 947 "--ei", "android.intent.extra.MAX", std::to_string(WEIGHT_TOTAL), 948 }; 949 send_broadcast("android.intent.action.BUGREPORT_STARTED", am_args); 950 } 951 } 952 953 /* read /proc/cmdline before dropping root */ 954 FILE *cmdline = fopen("/proc/cmdline", "re"); 955 if (cmdline) { 956 fgets(cmdline_buf, sizeof(cmdline_buf), cmdline); 957 fclose(cmdline); 958 } 959 960 print_header(); 961 962 /* open the vibrator before dropping root */ 963 std::unique_ptr<FILE, int(*)(FILE*)> vibrator(NULL, fclose); 964 if (do_vibrate) { 965 vibrator.reset(fopen("/sys/class/timed_output/vibrator/enable", "we")); 966 if (vibrator) { 967 vibrate(vibrator.get(), 150); 968 } 969 } 970 971 if (do_fb && do_early_screenshot) { 972 if (screenshot_path.empty()) { 973 // should not have happened 974 ALOGE("INTERNAL ERROR: skipping early screenshot because path was not set"); 975 } else { 976 ALOGI("taking early screenshot\n"); 977 take_screenshot(screenshot_path); 978 ALOGI("wrote screenshot: %s\n", screenshot_path.c_str()); 979 if (chown(screenshot_path.c_str(), AID_SHELL, AID_SHELL)) { 980 ALOGE("Unable to change ownership of screenshot file %s: %s\n", 981 screenshot_path.c_str(), strerror(errno)); 982 } 983 } 984 } 985 986 if (do_zip_file) { 987 if (chown(path.c_str(), AID_SHELL, AID_SHELL)) { 988 ALOGE("Unable to change ownership of zip file %s: %s\n", path.c_str(), strerror(errno)); 989 } 990 } 991 992 /* collect stack traces from Dalvik and native processes (needs root) */ 993 dump_traces_path = dump_traces(); 994 995 /* Get the tombstone fds, recovery files, and mount info here while we are running as root. */ 996 get_tombstone_fds(tombstone_data); 997 add_dir(RECOVERY_DIR, true); 998 add_mountinfo(); 999 1000 /* ensure we will keep capabilities when we drop root */ 1001 if (prctl(PR_SET_KEEPCAPS, 1) < 0) { 1002 ALOGE("prctl(PR_SET_KEEPCAPS) failed: %s\n", strerror(errno)); 1003 return -1; 1004 } 1005 1006 /* switch to non-root user and group */ 1007 gid_t groups[] = { AID_LOG, AID_SDCARD_R, AID_SDCARD_RW, 1008 AID_MOUNT, AID_INET, AID_NET_BW_STATS, AID_READPROC }; 1009 if (setgroups(sizeof(groups)/sizeof(groups[0]), groups) != 0) { 1010 ALOGE("Unable to setgroups, aborting: %s\n", strerror(errno)); 1011 return -1; 1012 } 1013 if (setgid(AID_SHELL) != 0) { 1014 ALOGE("Unable to setgid, aborting: %s\n", strerror(errno)); 1015 return -1; 1016 } 1017 if (setuid(AID_SHELL) != 0) { 1018 ALOGE("Unable to setuid, aborting: %s\n", strerror(errno)); 1019 return -1; 1020 } 1021 1022 struct __user_cap_header_struct capheader; 1023 struct __user_cap_data_struct capdata[2]; 1024 memset(&capheader, 0, sizeof(capheader)); 1025 memset(&capdata, 0, sizeof(capdata)); 1026 capheader.version = _LINUX_CAPABILITY_VERSION_3; 1027 capheader.pid = 0; 1028 1029 capdata[CAP_TO_INDEX(CAP_SYSLOG)].permitted = CAP_TO_MASK(CAP_SYSLOG); 1030 capdata[CAP_TO_INDEX(CAP_SYSLOG)].effective = CAP_TO_MASK(CAP_SYSLOG); 1031 capdata[0].inheritable = 0; 1032 capdata[1].inheritable = 0; 1033 1034 if (capset(&capheader, &capdata[0]) < 0) { 1035 ALOGE("capset failed: %s\n", strerror(errno)); 1036 return -1; 1037 } 1038 1039 if (is_redirecting) { 1040 /* TODO: rather than generating a text file now and zipping it later, 1041 it would be more efficient to redirect stdout to the zip entry 1042 directly, but the libziparchive doesn't support that option yet. */ 1043 redirect_to_file(stdout, const_cast<char*>(tmp_path.c_str())); 1044 } 1045 1046 dumpstate(do_early_screenshot ? "": screenshot_path); 1047 1048 /* done */ 1049 if (vibrator) { 1050 for (int i = 0; i < 3; i++) { 1051 vibrate(vibrator.get(), 75); 1052 usleep((75 + 50) * 1000); 1053 } 1054 } 1055 1056 /* close output if needed */ 1057 if (is_redirecting) { 1058 fclose(stdout); 1059 } 1060 1061 /* rename or zip the (now complete) .tmp file to its final location */ 1062 if (use_outfile) { 1063 1064 /* check if user changed the suffix using system properties */ 1065 char key[PROPERTY_KEY_MAX]; 1066 char value[PROPERTY_VALUE_MAX]; 1067 sprintf(key, "dumpstate.%d.name", getpid()); 1068 property_get(key, value, ""); 1069 bool change_suffix= false; 1070 if (value[0]) { 1071 /* must whitelist which characters are allowed, otherwise it could cross directories */ 1072 std::regex valid_regex("^[-_a-zA-Z0-9]+$"); 1073 if (std::regex_match(value, valid_regex)) { 1074 change_suffix = true; 1075 } else { 1076 ALOGE("invalid suffix provided by user: %s", value); 1077 } 1078 } 1079 if (change_suffix) { 1080 ALOGI("changing suffix from %s to %s", suffix.c_str(), value); 1081 suffix = value; 1082 if (!screenshot_path.empty()) { 1083 std::string new_screenshot_path = 1084 bugreport_dir + "/" + base_name + "-" + suffix + ".png"; 1085 if (rename(screenshot_path.c_str(), new_screenshot_path.c_str())) { 1086 ALOGE("rename(%s, %s): %s\n", screenshot_path.c_str(), 1087 new_screenshot_path.c_str(), strerror(errno)); 1088 } else { 1089 screenshot_path = new_screenshot_path; 1090 } 1091 } 1092 } 1093 1094 bool do_text_file = true; 1095 if (do_zip_file) { 1096 ALOGD("Adding text entry to .zip bugreport"); 1097 if (!finish_zip_file(base_name + "-" + suffix + ".txt", tmp_path, now)) { 1098 ALOGE("Failed to finish zip file; sending text bugreport instead\n"); 1099 do_text_file = true; 1100 } else { 1101 do_text_file = false; 1102 } 1103 } 1104 if (do_text_file) { 1105 ALOGD("Generating .txt bugreport"); 1106 path = bugreport_dir + "/" + base_name + "-" + suffix + ".txt"; 1107 if (rename(tmp_path.c_str(), path.c_str())) { 1108 ALOGE("rename(%s, %s): %s\n", tmp_path.c_str(), path.c_str(), strerror(errno)); 1109 path.clear(); 1110 } 1111 } 1112 } 1113 1114 /* tell activity manager we're done */ 1115 if (do_broadcast) { 1116 if (!path.empty()) { 1117 ALOGI("Final bugreport path: %s\n", path.c_str()); 1118 std::vector<std::string> am_args = { 1119 "--receiver-permission", "android.permission.DUMP", 1120 "--ei", "android.intent.extra.PID", std::to_string(getpid()), 1121 "--es", "android.intent.extra.BUGREPORT", path 1122 }; 1123 if (do_fb) { 1124 am_args.push_back("--es"); 1125 am_args.push_back("android.intent.extra.SCREENSHOT"); 1126 am_args.push_back(screenshot_path); 1127 } 1128 if (is_remote_mode) { 1129 am_args.push_back("--es"); 1130 am_args.push_back("android.intent.extra.REMOTE_BUGREPORT_HASH"); 1131 am_args.push_back(SHA256_file_hash(path)); 1132 send_broadcast("android.intent.action.REMOTE_BUGREPORT_FINISHED", am_args); 1133 } else { 1134 send_broadcast("android.intent.action.BUGREPORT_FINISHED", am_args); 1135 } 1136 } else { 1137 ALOGE("Skipping finished broadcast because bugreport could not be generated\n"); 1138 } 1139 } 1140 1141 ALOGD("Final progress: %d/%d (originally %d)\n", progress, weight_total, WEIGHT_TOTAL); 1142 ALOGI("done\n"); 1143 1144 return 0; 1145} 1146