blob: a0f9b09992d2d8b48147e53f22fa7c8b859036ab [file] [log] [blame]
Colin Crossf45fa6b2012-03-26 12:38:26 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Mark Salyzyn6c3d90f2016-09-27 14:55:27 -070016#define LOG_TAG "dumpstate"
Colin Crossf45fa6b2012-03-26 12:38:26 -070017
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -070018#include <dirent.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070019#include <errno.h>
20#include <fcntl.h>
Felipe Lemead5f6c42015-11-30 14:26:46 -080021#include <libgen.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070022#include <limits.h>
Felipe Leme6e01fa62015-11-11 19:35:14 -080023#include <memory>
Felipe Lemead5f6c42015-11-30 14:26:46 -080024#include <regex>
Felipe Leme635ca312016-01-05 14:23:02 -080025#include <set>
Mark Salyzyn8f37aa52015-06-12 12:28:24 -070026#include <stdbool.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070027#include <stdio.h>
28#include <stdlib.h>
Felipe Leme6e01fa62015-11-11 19:35:14 -080029#include <string>
Colin Crossf45fa6b2012-03-26 12:38:26 -070030#include <string.h>
Christopher Ferris7dc7f322014-07-22 16:08:19 -070031#include <sys/prctl.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070032#include <sys/resource.h>
33#include <sys/stat.h>
34#include <sys/time.h>
35#include <sys/wait.h>
36#include <unistd.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070037
Zhengyin Qian068ecc72016-08-10 16:48:14 -070038#include <android-base/file.h>
Naveen Kallade591df2016-10-19 21:38:44 -070039#include <android-base/stringprintf.h>
40#include <android-base/strings.h>
Naveen Kalla27de3fc2016-10-28 15:22:47 -070041#include <android-base/unique_fd.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070042#include <cutils/properties.h>
43
Mark Salyzyn6c3d90f2016-09-27 14:55:27 -070044#include <private/android_filesystem_config.h>
45#include <private/android_logger.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070046
47#include "dumpstate.h"
Felipe Leme6e01fa62015-11-11 19:35:14 -080048#include "ziparchive/zip_writer.h"
49
Elliott Hughesc4dc1412016-04-12 16:28:31 -070050#include <openssl/sha.h>
Michal Karpinski4db754f2015-12-11 18:04:32 +000051
Felipe Leme6e01fa62015-11-11 19:35:14 -080052using android::base::StringPrintf;
Colin Crossf45fa6b2012-03-26 12:38:26 -070053
54/* read before root is shed */
55static char cmdline_buf[16384] = "(unknown)";
56static const char *dump_traces_path = NULL;
57
Felipe Lemeefd7e272016-05-18 09:27:16 -070058// TODO: variables below should be part of dumpstate object
Felipe Leme8fecfdd2016-02-09 10:40:07 -080059static unsigned long id;
Felipe Leme78f2c862015-12-21 09:55:22 -080060static char build_type[PROPERTY_VALUE_MAX];
Felipe Lemee82a27d2016-01-05 13:35:44 -080061static time_t now;
62static std::unique_ptr<ZipWriter> zip_writer;
Felipe Leme635ca312016-01-05 14:23:02 -080063static std::set<std::string> mount_points;
64void add_mountinfo();
Felipe Leme02b7e002016-07-22 12:03:20 -070065int control_socket_fd = -1;
Felipe Lemeefd7e272016-05-18 09:27:16 -070066/* suffix of the bugreport files - it's typically the date (when invoked with -d),
67 * although it could be changed by the user using a system property */
68static std::string suffix;
Felipe Leme78f2c862015-12-21 09:55:22 -080069
Todd Poynor2a83daa2013-11-22 15:44:22 -080070#define PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops"
Mark Salyzyn7d0a7622016-06-24 14:06:15 -070071#define ALT_PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops-0"
Todd Poynor2a83daa2013-11-22 15:44:22 -080072
Wei Liu341938b2016-04-27 16:18:17 -070073#define RAFT_DIR "/data/misc/raft"
Felipe Lemee82a27d2016-01-05 13:35:44 -080074#define RECOVERY_DIR "/cache/recovery"
Mark Salyzynd6ab0112016-03-25 12:56:39 -070075#define RECOVERY_DATA_DIR "/data/misc/recovery"
Mark Salyzyn4d42dea2016-04-01 10:03:14 -070076#define LOGPERSIST_DATA_DIR "/data/misc/logd"
David Brazdild2991962016-06-03 14:40:44 +010077#define PROFILE_DATA_DIR_CUR "/data/misc/profiles/cur"
78#define PROFILE_DATA_DIR_REF "/data/misc/profiles/ref"
Christopher Ferris7dc7f322014-07-22 16:08:19 -070079#define TOMBSTONE_DIR "/data/tombstones"
80#define TOMBSTONE_FILE_PREFIX TOMBSTONE_DIR "/tombstone_"
81/* Can accomodate a tombstone number up to 9999. */
82#define TOMBSTONE_MAX_LEN (sizeof(TOMBSTONE_FILE_PREFIX) + 4)
83#define NUM_TOMBSTONES 10
Erik Kline08165202016-05-30 11:55:44 +090084#define WLUTIL "/vendor/xbin/wlutil"
Christopher Ferris7dc7f322014-07-22 16:08:19 -070085
86typedef struct {
87 char name[TOMBSTONE_MAX_LEN];
88 int fd;
89} tombstone_data_t;
90
91static tombstone_data_t tombstone_data[NUM_TOMBSTONES];
92
Felipe Leme71ca15e2016-05-19 16:18:17 -070093const std::string ZIP_ROOT_DIR = "FS";
94std::string bugreport_dir;
Felipe Lemee82a27d2016-01-05 13:35:44 -080095
Felipe Leme809d74e2016-02-02 12:57:00 -080096/*
97 * List of supported zip format versions.
98 *
99 * See bugreport-format.txt for more info.
100 */
Felipe Lemeca9c12e2016-05-19 16:30:15 -0700101static std::string VERSION_DEFAULT = "1.0";
Felipe Leme809d74e2016-02-02 12:57:00 -0800102
Calvin On249beee2016-06-03 15:17:07 -0700103bool is_user_build() {
Felipe Lemec4eee562016-04-21 15:42:55 -0700104 return 0 == strncmp(build_type, "user", PROPERTY_VALUE_MAX - 1);
105}
106
Felipe Lemee82a27d2016-01-05 13:35:44 -0800107/* gets the tombstone data, according to the bugreport type: if zipped gets all tombstones,
108 * otherwise gets just those modified in the last half an hour. */
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700109static void get_tombstone_fds(tombstone_data_t data[NUM_TOMBSTONES]) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800110 time_t thirty_minutes_ago = now - 60*30;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700111 for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
112 snprintf(data[i].name, sizeof(data[i].name), "%s%02zu", TOMBSTONE_FILE_PREFIX, i);
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800113 int fd = TEMP_FAILURE_RETRY(open(data[i].name,
114 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700115 struct stat st;
116 if (fstat(fd, &st) == 0 && S_ISREG(st.st_mode) &&
Felipe Lemee82a27d2016-01-05 13:35:44 -0800117 (zip_writer || (time_t) st.st_mtime >= thirty_minutes_ago)) {
118 data[i].fd = fd;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700119 } else {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800120 close(fd);
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700121 data[i].fd = -1;
122 }
123 }
124}
125
Felipe Leme635ca312016-01-05 14:23:02 -0800126// for_each_pid() callback to get mount info about a process.
127void do_mountinfo(int pid, const char *name) {
128 char path[PATH_MAX];
129
130 // Gets the the content of the /proc/PID/ns/mnt link, so only unique mount points
131 // are added.
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700132 snprintf(path, sizeof(path), "/proc/%d/ns/mnt", pid);
Felipe Leme635ca312016-01-05 14:23:02 -0800133 char linkname[PATH_MAX];
134 ssize_t r = readlink(path, linkname, PATH_MAX);
135 if (r == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800136 MYLOGE("Unable to read link for %s: %s\n", path, strerror(errno));
Felipe Leme635ca312016-01-05 14:23:02 -0800137 return;
138 }
139 linkname[r] = '\0';
140
141 if (mount_points.find(linkname) == mount_points.end()) {
142 // First time this mount point was found: add it
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700143 snprintf(path, sizeof(path), "/proc/%d/mountinfo", pid);
Felipe Leme635ca312016-01-05 14:23:02 -0800144 if (add_zip_entry(ZIP_ROOT_DIR + path, path)) {
145 mount_points.insert(linkname);
146 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800147 MYLOGE("Unable to add mountinfo %s to zip file\n", path);
Felipe Leme635ca312016-01-05 14:23:02 -0800148 }
149 }
150}
151
152void add_mountinfo() {
Felipe Leme03974982016-10-21 11:38:26 -0700153 if (!is_zipping()) return;
Felipe Leme635ca312016-01-05 14:23:02 -0800154 const char *title = "MOUNT INFO";
155 mount_points.clear();
Felipe Leme608385d2016-02-01 10:35:38 -0800156 DurationReporter duration_reporter(title, NULL);
Felipe Leme635ca312016-01-05 14:23:02 -0800157 for_each_pid(do_mountinfo, NULL);
Felipe Leme1b0225a2016-02-09 16:35:14 -0800158 MYLOGD("%s: %d entries added to zip file\n", title, (int) mount_points.size());
Felipe Leme635ca312016-01-05 14:23:02 -0800159}
160
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -0700161static void dump_dev_files(const char *title, const char *driverpath, const char *filename)
162{
163 DIR *d;
164 struct dirent *de;
165 char path[PATH_MAX];
166
167 d = opendir(driverpath);
168 if (d == NULL) {
169 return;
170 }
171
172 while ((de = readdir(d))) {
173 if (de->d_type != DT_LNK) {
174 continue;
175 }
176 snprintf(path, sizeof(path), "%s/%s/%s", driverpath, de->d_name, filename);
177 dump_file(title, path);
178 }
179
180 closedir(d);
181}
182
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700183// return pid of a userspace process. If not found or error, return 0.
184static unsigned int pid_of_process(const char* ps_name) {
185 DIR *proc_dir;
186 struct dirent *ps;
187 unsigned int pid;
188 std::string cmdline;
189
190 if (!(proc_dir = opendir("/proc"))) {
191 MYLOGE("Can't open /proc\n");
192 return 0;
193 }
194
195 while ((ps = readdir(proc_dir))) {
196 if (!(pid = atoi(ps->d_name))) {
197 continue;
198 }
199 android::base::ReadFileToString("/proc/"
200 + std::string(ps->d_name) + "/cmdline", &cmdline);
201 if (cmdline.find(ps_name) == std::string::npos) {
202 continue;
203 } else {
204 closedir(proc_dir);
205 return pid;
206 }
207 }
208 closedir(proc_dir);
209 return 0;
210}
211
212// dump anrd's trace and add to the zip file.
213// 1. check if anrd is running on this device.
214// 2. send a SIGUSR1 to its pid which will dump anrd's trace.
215// 3. wait until the trace generation completes and add to the zip file.
216static bool dump_anrd_trace() {
217 unsigned int pid;
218 char buf[50], path[PATH_MAX];
219 struct dirent *trace;
220 struct stat st;
221 DIR *trace_dir;
Zhengyin Qianafc38fe2016-09-08 16:50:09 -0700222 int retry = 5;
223 long max_ctime = 0, old_mtime;
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700224 long long cur_size = 0;
225 const char *trace_path = "/data/misc/anrd/";
226
227 if (!zip_writer) {
228 MYLOGE("Not dumping anrd trace because zip_writer is not set\n");
229 return false;
230 }
231
232 // find anrd's pid if it is running.
233 pid = pid_of_process("/system/xbin/anrd");
234
235 if (pid > 0) {
Zhengyin Qianafc38fe2016-09-08 16:50:09 -0700236 if (stat(trace_path, &st) == 0) {
237 old_mtime = st.st_mtime;
238 } else {
239 MYLOGE("Failed to find: %s\n", trace_path);
240 return false;
241 }
242
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700243 // send SIGUSR1 to the anrd to generate a trace.
244 sprintf(buf, "%u", pid);
245 if (run_command("ANRD_DUMP", 1, "kill", "-SIGUSR1", buf, NULL)) {
246 MYLOGE("anrd signal timed out. Please manually collect trace\n");
247 return false;
248 }
249
Zhengyin Qianafc38fe2016-09-08 16:50:09 -0700250 while (retry-- > 0 && old_mtime == st.st_mtime) {
251 sleep(1);
252 stat(trace_path, &st);
253 }
254
255 if (retry < 0 && old_mtime == st.st_mtime) {
256 MYLOGE("Failed to stat %s or trace creation timeout\n", trace_path);
257 return false;
258 }
259
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700260 // identify the trace file by its creation time.
261 if (!(trace_dir = opendir(trace_path))) {
262 MYLOGE("Can't open trace file under %s\n", trace_path);
263 }
264 while ((trace = readdir(trace_dir))) {
265 if (strcmp(trace->d_name, ".") == 0
266 || strcmp(trace->d_name, "..") == 0) {
267 continue;
268 }
269 sprintf(path, "%s%s", trace_path, trace->d_name);
270 if (stat(path, &st) == 0) {
271 if (st.st_ctime > max_ctime) {
272 max_ctime = st.st_ctime;
273 sprintf(buf, "%s", trace->d_name);
274 }
275 }
276 }
277 closedir(trace_dir);
278
279 // Wait until the dump completes by checking the size of the trace.
280 if (max_ctime > 0) {
281 sprintf(path, "%s%s", trace_path, buf);
282 while(true) {
283 sleep(1);
284 if (stat(path, &st) == 0) {
285 if (st.st_size == cur_size) {
286 break;
287 } else if (st.st_size > cur_size) {
288 cur_size = st.st_size;
289 } else {
290 return false;
291 }
292 } else {
293 MYLOGE("Cant stat() %s anymore\n", path);
294 return false;
295 }
296 }
297 // Add to the zip file.
298 if (!add_zip_entry("anrd_trace.txt", path)) {
299 MYLOGE("Unable to add anrd_trace file %s to zip file\n", path);
300 } else {
301 if (remove(path)) {
302 MYLOGE("Error removing anrd_trace file %s: %s", path, strerror(errno));
303 }
304 return true;
305 }
306 } else {
307 MYLOGE("Can't stats any trace file under %s\n", trace_path);
308 }
309 }
310 return false;
311}
312
Felipe Lemeefd7e272016-05-18 09:27:16 -0700313static void dump_systrace() {
Felipe Leme03974982016-10-21 11:38:26 -0700314 if (!is_zipping()) {
315 MYLOGD("Not dumping systrace because dumpstate is not zipping\n");
Felipe Leme71a74ac2016-03-17 15:43:25 -0700316 return;
317 }
Felipe Lemeefd7e272016-05-18 09:27:16 -0700318 std::string systrace_path = bugreport_dir + "/systrace-" + suffix + ".txt";
Felipe Leme14e034a2016-03-30 18:51:03 -0700319 if (systrace_path.empty()) {
320 MYLOGE("Not dumping systrace because path is empty\n");
321 return;
322 }
Felipe Leme71a74ac2016-03-17 15:43:25 -0700323 const char* path = "/sys/kernel/debug/tracing/tracing_on";
324 long int is_tracing;
325 if (read_file_as_long(path, &is_tracing)) {
326 return; // error already logged
327 }
328 if (is_tracing <= 0) {
329 MYLOGD("Skipping systrace because '%s' content is '%ld'\n", path, is_tracing);
330 return;
331 }
332
Felipe Leme14e034a2016-03-30 18:51:03 -0700333 MYLOGD("Running '/system/bin/atrace --async_dump -o %s', which can take several minutes",
334 systrace_path.c_str());
335 if (run_command("SYSTRACE", 120, "/system/bin/atrace", "--async_dump", "-o",
336 systrace_path.c_str(), NULL)) {
337 MYLOGE("systrace timed out, its zip entry will be incomplete\n");
338 // TODO: run_command tries to kill the process, but atrace doesn't die peacefully; ideally,
339 // we should call strace to stop itself, but there is no such option yet (just a
340 // --async_stop, which stops and dump
341 // if (run_command("SYSTRACE", 10, "/system/bin/atrace", "--kill", NULL)) {
342 // MYLOGE("could not stop systrace ");
343 // }
344 }
345 if (!add_zip_entry("systrace.txt", systrace_path)) {
346 MYLOGE("Unable to add systrace file %s to zip file\n", systrace_path.c_str());
Felipe Leme71a74ac2016-03-17 15:43:25 -0700347 } else {
Felipe Leme14e034a2016-03-30 18:51:03 -0700348 if (remove(systrace_path.c_str())) {
349 MYLOGE("Error removing systrace file %s: %s", systrace_path.c_str(), strerror(errno));
350 }
Felipe Leme71a74ac2016-03-17 15:43:25 -0700351 }
352}
353
Felipe Lemeefd7e272016-05-18 09:27:16 -0700354static void dump_raft() {
Wei Liu341938b2016-04-27 16:18:17 -0700355 if (is_user_build()) {
356 return;
357 }
358
Felipe Lemeefd7e272016-05-18 09:27:16 -0700359 std::string raft_log_path = bugreport_dir + "/raft_log.txt";
Wei Liu341938b2016-04-27 16:18:17 -0700360 if (raft_log_path.empty()) {
361 MYLOGD("raft_log_path is empty\n");
362 return;
363 }
Wei Liuf0e78d42016-05-25 14:21:02 -0700364
365 struct stat s;
366 if (stat(RAFT_DIR, &s) != 0 || !S_ISDIR(s.st_mode)) {
367 MYLOGD("%s does not exist or is not a directory\n", RAFT_DIR);
368 return;
369 }
370
Felipe Leme03974982016-10-21 11:38:26 -0700371 if (!is_zipping()) {
Wei Liu310525a2016-05-25 11:28:57 -0700372 // Write compressed and encoded raft logs to stdout if not zip_writer.
373 run_command("RAFT LOGS", 600, "logcompressor", "-r", RAFT_DIR, NULL);
Wei Liu341938b2016-04-27 16:18:17 -0700374 return;
375 }
376
377 run_command("RAFT LOGS", 600, "logcompressor", "-n", "-r", RAFT_DIR,
378 "-o", raft_log_path.c_str(), NULL);
379 if (!add_zip_entry("raft_log.txt", raft_log_path)) {
380 MYLOGE("Unable to add raft log %s to zip file\n", raft_log_path.c_str());
381 } else {
382 if (remove(raft_log_path.c_str())) {
Felipe Lemeefd7e272016-05-18 09:27:16 -0700383 MYLOGE("Error removing raft file %s: %s\n", raft_log_path.c_str(), strerror(errno));
Wei Liu341938b2016-04-27 16:18:17 -0700384 }
385 }
386}
387
Naveen Kallade591df2016-10-19 21:38:44 -0700388/**
389 * Finds the last modified file in the directory dir whose name starts with file_prefix
390 * Function returns empty string when it does not find a file
391 */
392static std::string get_last_modified_file_matching_prefix(const std::string& dir,
393 const std::string& file_prefix) {
394 std::unique_ptr<DIR, decltype(&closedir)> d(opendir(dir.c_str()), closedir);
395 if (d == nullptr) {
396 MYLOGD("Error %d opening %s\n", errno, dir.c_str());
397 return "";
398 }
399
400 // Find the newest file matching the file_prefix in dir
401 struct dirent *de;
402 time_t last_modified = 0;
403 std::string last_modified_file = "";
404 struct stat s;
405
406 while ((de = readdir(d.get()))) {
407 std::string file = std::string(de->d_name);
408 if (!file_prefix.empty()) {
409 if (!android::base::StartsWith(file, file_prefix.c_str())) continue;
410 }
411 file = dir + "/" + file;
412 int ret = stat(file.c_str(), &s);
413
414 if ((ret == 0) && (s.st_mtime > last_modified)) {
415 last_modified_file = file;
416 last_modified = s.st_mtime;
417 }
418 }
419
420 return last_modified_file;
421}
422
423void dump_modem_logs() {
424 DurationReporter duration_reporter("dump_modem_logs");
425 if (is_user_build()) {
426 return;
427 }
428
429 if (!is_zipping()) {
430 MYLOGD("Not dumping modem logs. dumpstate is not generating a zipping bugreport\n");
431 return;
432 }
433
434 char property[PROPERTY_VALUE_MAX];
435 property_get("ro.radio.log_prefix", property, "");
436 std::string file_prefix = std::string(property);
437 if(file_prefix.empty()) {
438 MYLOGD("No modem log : file_prefix is empty\n");
439 return;
440 }
441
442 MYLOGD("dump_modem_logs: directory is %s and file_prefix is %s\n",
443 bugreport_dir.c_str(), file_prefix.c_str());
444
445 std::string modem_log_file =
446 get_last_modified_file_matching_prefix(bugreport_dir, file_prefix);
447
448 struct stat s;
449 if (modem_log_file.empty() || stat(modem_log_file.c_str(), &s) != 0) {
450 MYLOGD("Modem log %s does not exist\n", modem_log_file.c_str());
451 return;
452 }
453
454 std::string filename = basename(modem_log_file.c_str());
455 if (!add_zip_entry(filename, modem_log_file)) {
456 MYLOGE("Unable to add modem log %s to zip file\n", modem_log_file.c_str());
457 } else {
458 MYLOGD("Modem Log %s is added to zip\n", modem_log_file.c_str());
Naveen Kallab77df782016-11-18 17:32:23 -0800459 if (remove(modem_log_file.c_str())) {
460 MYLOGE("Error removing modem log %s\n", modem_log_file.c_str());
461 }
Naveen Kallade591df2016-10-19 21:38:44 -0700462 }
463}
464
Mark Salyzyn326842f2015-04-30 09:49:41 -0700465static bool skip_not_stat(const char *path) {
466 static const char stat[] = "/stat";
467 size_t len = strlen(path);
468 if (path[len - 1] == '/') { /* Directory? */
469 return false;
470 }
471 return strcmp(path + len - sizeof(stat) + 1, stat); /* .../stat? */
472}
473
Felipe Lemee82a27d2016-01-05 13:35:44 -0800474static bool skip_none(const char *path) {
475 return false;
476}
477
Mark Salyzyn326842f2015-04-30 09:49:41 -0700478static const char mmcblk0[] = "/sys/block/mmcblk0/";
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700479unsigned long worst_write_perf = 20000; /* in KB/s */
Mark Salyzyn326842f2015-04-30 09:49:41 -0700480
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800481//
482// stat offsets
483// Name units description
484// ---- ----- -----------
485// read I/Os requests number of read I/Os processed
486#define __STAT_READ_IOS 0
487// read merges requests number of read I/Os merged with in-queue I/O
488#define __STAT_READ_MERGES 1
489// read sectors sectors number of sectors read
490#define __STAT_READ_SECTORS 2
491// read ticks milliseconds total wait time for read requests
492#define __STAT_READ_TICKS 3
493// write I/Os requests number of write I/Os processed
494#define __STAT_WRITE_IOS 4
495// write merges requests number of write I/Os merged with in-queue I/O
496#define __STAT_WRITE_MERGES 5
497// write sectors sectors number of sectors written
498#define __STAT_WRITE_SECTORS 6
499// write ticks milliseconds total wait time for write requests
500#define __STAT_WRITE_TICKS 7
501// in_flight requests number of I/Os currently in flight
502#define __STAT_IN_FLIGHT 8
503// io_ticks milliseconds total time this block device has been active
504#define __STAT_IO_TICKS 9
505// time_in_queue milliseconds total wait time for all requests
506#define __STAT_IN_QUEUE 10
507#define __STAT_NUMBER_FIELD 11
508//
509// read I/Os, write I/Os
510// =====================
511//
512// These values increment when an I/O request completes.
513//
514// read merges, write merges
515// =========================
516//
517// These values increment when an I/O request is merged with an
518// already-queued I/O request.
519//
520// read sectors, write sectors
521// ===========================
522//
523// These values count the number of sectors read from or written to this
524// block device. The "sectors" in question are the standard UNIX 512-byte
525// sectors, not any device- or filesystem-specific block size. The
526// counters are incremented when the I/O completes.
527#define SECTOR_SIZE 512
528//
529// read ticks, write ticks
530// =======================
531//
532// These values count the number of milliseconds that I/O requests have
533// waited on this block device. If there are multiple I/O requests waiting,
534// these values will increase at a rate greater than 1000/second; for
535// example, if 60 read requests wait for an average of 30 ms, the read_ticks
536// field will increase by 60*30 = 1800.
537//
538// in_flight
539// =========
540//
541// This value counts the number of I/O requests that have been issued to
542// the device driver but have not yet completed. It does not include I/O
543// requests that are in the queue but not yet issued to the device driver.
544//
545// io_ticks
546// ========
547//
548// This value counts the number of milliseconds during which the device has
549// had I/O requests queued.
550//
551// time_in_queue
552// =============
553//
554// This value counts the number of milliseconds that I/O requests have waited
555// on this block device. If there are multiple I/O requests waiting, this
556// value will increase as the product of the number of milliseconds times the
557// number of requests waiting (see "read ticks" above for an example).
558#define S_TO_MS 1000
559//
560
Mark Salyzyn326842f2015-04-30 09:49:41 -0700561static int dump_stat_from_fd(const char *title __unused, const char *path, int fd) {
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800562 unsigned long long fields[__STAT_NUMBER_FIELD];
Mark Salyzyn326842f2015-04-30 09:49:41 -0700563 bool z;
564 char *cp, *buffer = NULL;
565 size_t i = 0;
566 FILE *fp = fdopen(fd, "rb");
567 getline(&buffer, &i, fp);
568 fclose(fp);
569 if (!buffer) {
570 return -errno;
571 }
572 i = strlen(buffer);
573 while ((i > 0) && (buffer[i - 1] == '\n')) {
574 buffer[--i] = '\0';
575 }
576 if (!*buffer) {
577 free(buffer);
578 return 0;
579 }
580 z = true;
581 for (cp = buffer, i = 0; i < (sizeof(fields) / sizeof(fields[0])); ++i) {
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800582 fields[i] = strtoull(cp, &cp, 10);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700583 if (fields[i] != 0) {
584 z = false;
585 }
586 }
587 if (z) { /* never accessed */
588 free(buffer);
589 return 0;
590 }
591
592 if (!strncmp(path, mmcblk0, sizeof(mmcblk0) - 1)) {
593 path += sizeof(mmcblk0) - 1;
594 }
595
596 printf("%s: %s\n", path, buffer);
597 free(buffer);
598
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800599 if (fields[__STAT_IO_TICKS]) {
600 unsigned long read_perf = 0;
601 unsigned long read_ios = 0;
602 if (fields[__STAT_READ_TICKS]) {
603 unsigned long long divisor = fields[__STAT_READ_TICKS]
604 * fields[__STAT_IO_TICKS];
605 read_perf = ((unsigned long long)SECTOR_SIZE
606 * fields[__STAT_READ_SECTORS]
607 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
608 / divisor;
609 read_ios = ((unsigned long long)S_TO_MS * fields[__STAT_READ_IOS]
610 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
611 / divisor;
612 }
613
614 unsigned long write_perf = 0;
615 unsigned long write_ios = 0;
616 if (fields[__STAT_WRITE_TICKS]) {
617 unsigned long long divisor = fields[__STAT_WRITE_TICKS]
618 * fields[__STAT_IO_TICKS];
619 write_perf = ((unsigned long long)SECTOR_SIZE
620 * fields[__STAT_WRITE_SECTORS]
621 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
622 / divisor;
623 write_ios = ((unsigned long long)S_TO_MS * fields[__STAT_WRITE_IOS]
624 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
625 / divisor;
626 }
627
628 unsigned queue = (fields[__STAT_IN_QUEUE]
629 + (fields[__STAT_IO_TICKS] >> 1))
630 / fields[__STAT_IO_TICKS];
631
632 if (!write_perf && !write_ios) {
633 printf("%s: perf(ios) rd: %luKB/s(%lu/s) q: %u\n",
634 path, read_perf, read_ios, queue);
635 } else {
636 printf("%s: perf(ios) rd: %luKB/s(%lu/s) wr: %luKB/s(%lu/s) q: %u\n",
637 path, read_perf, read_ios, write_perf, write_ios, queue);
638 }
639
640 /* bugreport timeout factor adjustment */
641 if ((write_perf > 1) && (write_perf < worst_write_perf)) {
642 worst_write_perf = write_perf;
643 }
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700644 }
Mark Salyzyn326842f2015-04-30 09:49:41 -0700645 return 0;
646}
647
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700648/* timeout in ms */
Felipe Leme8620bb42015-11-10 11:04:45 -0800649static unsigned long logcat_timeout(const char *name) {
Mark Salyzyn6c3d90f2016-09-27 14:55:27 -0700650 log_id_t id = android_name_to_log_id(name);
651 unsigned long property_size = __android_logger_get_buffer_size(id);
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700652 /* Engineering margin is ten-fold our guess */
653 return 10 * (property_size + worst_write_perf) / worst_write_perf;
654}
655
Colin Crossf45fa6b2012-03-26 12:38:26 -0700656/* dumps the current system state to stdout */
Felipe Leme809d74e2016-02-02 12:57:00 -0800657static void print_header(std::string version) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700658 char build[PROPERTY_VALUE_MAX], fingerprint[PROPERTY_VALUE_MAX];
659 char radio[PROPERTY_VALUE_MAX], bootloader[PROPERTY_VALUE_MAX];
660 char network[PROPERTY_VALUE_MAX], date[80];
Colin Crossf45fa6b2012-03-26 12:38:26 -0700661
662 property_get("ro.build.display.id", build, "(unknown)");
663 property_get("ro.build.fingerprint", fingerprint, "(unknown)");
664 property_get("ro.build.type", build_type, "(unknown)");
Junda Liu58ad9292016-06-12 11:51:54 -0700665 property_get("gsm.version.baseband", radio, "(unknown)");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700666 property_get("ro.bootloader", bootloader, "(unknown)");
667 property_get("gsm.operator.alpha", network, "(unknown)");
668 strftime(date, sizeof(date), "%Y-%m-%d %H:%M:%S", localtime(&now));
669
670 printf("========================================================\n");
671 printf("== dumpstate: %s\n", date);
672 printf("========================================================\n");
673
674 printf("\n");
675 printf("Build: %s\n", build);
676 printf("Build fingerprint: '%s'\n", fingerprint); /* format is important for other tools */
677 printf("Bootloader: %s\n", bootloader);
678 printf("Radio: %s\n", radio);
679 printf("Network: %s\n", network);
680
681 printf("Kernel: ");
682 dump_file(NULL, "/proc/version");
683 printf("Command line: %s\n", strtok(cmdline_buf, "\n"));
Felipe Leme809d74e2016-02-02 12:57:00 -0800684 printf("Bugreport format version: %s\n", version.c_str());
Felipe Leme8fecfdd2016-02-09 10:40:07 -0800685 printf("Dumpstate info: id=%lu pid=%d\n", id, getpid());
Colin Crossf45fa6b2012-03-26 12:38:26 -0700686 printf("\n");
Felipe Leme78f2c862015-12-21 09:55:22 -0800687}
688
Felipe Leme24b66ee2016-06-16 10:55:26 -0700689// List of file extensions that can cause a zip file attachment to be rejected by some email
690// service providers.
691static const std::set<std::string> PROBLEMATIC_FILE_EXTENSIONS = {
692 ".ade", ".adp", ".bat", ".chm", ".cmd", ".com", ".cpl", ".exe", ".hta", ".ins", ".isp",
693 ".jar", ".jse", ".lib", ".lnk", ".mde", ".msc", ".msp", ".mst", ".pif", ".scr", ".sct",
694 ".shb", ".sys", ".vb", ".vbe", ".vbs", ".vxd", ".wsc", ".wsf", ".wsh"
695};
696
Felipe Leme71ca15e2016-05-19 16:18:17 -0700697bool add_zip_entry_from_fd(const std::string& entry_name, int fd) {
Felipe Leme03974982016-10-21 11:38:26 -0700698 if (!is_zipping()) {
699 MYLOGD("Not adding entry %s from fd because dumpstate is not zipping\n",
Felipe Leme88c79332016-02-22 11:06:49 -0800700 entry_name.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -0800701 return false;
702 }
Felipe Leme24b66ee2016-06-16 10:55:26 -0700703 std::string valid_name = entry_name;
704
705 // Rename extension if necessary.
706 size_t idx = entry_name.rfind(".");
707 if (idx != std::string::npos) {
708 std::string extension = entry_name.substr(idx);
709 std::transform(extension.begin(), extension.end(), extension.begin(), ::tolower);
710 if (PROBLEMATIC_FILE_EXTENSIONS.count(extension) != 0) {
711 valid_name = entry_name + ".renamed";
712 MYLOGI("Renaming entry %s to %s\n", entry_name.c_str(), valid_name.c_str());
713 }
714 }
715
Felipe Leme6fe9db62016-02-12 09:04:16 -0800716 // Logging statement below is useful to time how long each entry takes, but it's too verbose.
717 // MYLOGD("Adding zip entry %s\n", entry_name.c_str());
Felipe Leme24b66ee2016-06-16 10:55:26 -0700718 int32_t err = zip_writer->StartEntryWithTime(valid_name.c_str(),
Felipe Lemee82a27d2016-01-05 13:35:44 -0800719 ZipWriter::kCompress, get_mtime(fd, now));
720 if (err) {
Felipe Leme24b66ee2016-06-16 10:55:26 -0700721 MYLOGE("zip_writer->StartEntryWithTime(%s): %s\n", valid_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800722 ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800723 return false;
724 }
725
Felipe Leme770410d2016-01-26 17:07:14 -0800726 std::vector<uint8_t> buffer(65536);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800727 while (1) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800728 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer.data(), sizeof(buffer)));
729 if (bytes_read == 0) {
730 break;
731 } else if (bytes_read == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800732 MYLOGE("read(%s): %s\n", entry_name.c_str(), strerror(errno));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800733 return false;
734 }
735 err = zip_writer->WriteBytes(buffer.data(), bytes_read);
736 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800737 MYLOGE("zip_writer->WriteBytes(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800738 return false;
739 }
740 }
741
742 err = zip_writer->FinishEntry();
743 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800744 MYLOGE("zip_writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800745 return false;
746 }
747
748 return true;
749}
750
Felipe Leme71ca15e2016-05-19 16:18:17 -0700751bool add_zip_entry(const std::string& entry_name, const std::string& entry_path) {
Andreas Gampe27cd7b22016-07-18 18:24:05 -0700752 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(entry_path.c_str(), O_RDONLY | O_NONBLOCK
753 | O_CLOEXEC)));
Andreas Gampefcc8db92016-07-18 18:01:27 -0700754 if (fd == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800755 MYLOGE("open(%s): %s\n", entry_path.c_str(), strerror(errno));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800756 return false;
757 }
758
759 return add_zip_entry_from_fd(entry_name, fd.get());
760}
761
762/* adds a file to the existing zipped bugreport */
763static int _add_file_from_fd(const char *title, const char *path, int fd) {
764 return add_zip_entry_from_fd(ZIP_ROOT_DIR + path, fd) ? 0 : 1;
765}
766
Felipe Leme24b66ee2016-06-16 10:55:26 -0700767// TODO: move to util.cpp
Felipe Lemee82a27d2016-01-05 13:35:44 -0800768void add_dir(const char *dir, bool recursive) {
Felipe Leme03974982016-10-21 11:38:26 -0700769 if (!is_zipping()) {
770 MYLOGD("Not adding dir %s because dumpstate is not zipping\n", dir);
Felipe Leme111b9d02016-02-03 09:28:24 -0800771 return;
772 }
Felipe Leme88c79332016-02-22 11:06:49 -0800773 MYLOGD("Adding dir %s (recursive: %d)\n", dir, recursive);
Felipe Leme608385d2016-02-01 10:35:38 -0800774 DurationReporter duration_reporter(dir, NULL);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800775 dump_files(NULL, dir, recursive ? skip_none : is_dir, _add_file_from_fd);
776}
777
Felipe Leme03974982016-10-21 11:38:26 -0700778bool is_zipping() {
779 return zip_writer != nullptr;
780}
781
Felipe Leme809d74e2016-02-02 12:57:00 -0800782/* adds a text entry entry to the existing zip file. */
783static bool add_text_zip_entry(const std::string& entry_name, const std::string& content) {
Felipe Leme03974982016-10-21 11:38:26 -0700784 if (!is_zipping()) {
785 MYLOGD("Not adding text entry %s because dumpstate is not zipping\n", entry_name.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -0800786 return false;
787 }
Felipe Lemecbce55d2016-02-08 09:53:18 -0800788 MYLOGD("Adding zip text entry %s\n", entry_name.c_str());
Felipe Leme809d74e2016-02-02 12:57:00 -0800789 int32_t err = zip_writer->StartEntryWithTime(entry_name.c_str(), ZipWriter::kCompress, now);
790 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800791 MYLOGE("zip_writer->StartEntryWithTime(%s): %s\n", entry_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800792 ZipWriter::ErrorCodeString(err));
793 return false;
794 }
795
796 err = zip_writer->WriteBytes(content.c_str(), content.length());
797 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800798 MYLOGE("zip_writer->WriteBytes(%s): %s\n", entry_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800799 ZipWriter::ErrorCodeString(err));
800 return false;
801 }
802
803 err = zip_writer->FinishEntry();
804 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800805 MYLOGE("zip_writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Leme809d74e2016-02-02 12:57:00 -0800806 return false;
807 }
808
809 return true;
810}
811
Felipe Lemec0808152016-06-17 17:37:13 -0700812static void dump_iptables() {
813 run_command("IPTABLES", 10, "iptables", "-L", "-nvx", NULL);
814 run_command("IP6TABLES", 10, "ip6tables", "-L", "-nvx", NULL);
Erik Kline53ca94a2016-09-28 17:26:26 +0900815 run_command("IPTABLES NAT", 10, "iptables", "-t", "nat", "-L", "-nvx", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -0700816 /* no ip6 nat */
Erik Kline53ca94a2016-09-28 17:26:26 +0900817 run_command("IPTABLES MANGLE", 10, "iptables", "-t", "mangle", "-L", "-nvx", NULL);
818 run_command("IP6TABLES MANGLE", 10, "ip6tables", "-t", "mangle", "-L", "-nvx", NULL);
819 run_command("IPTABLES RAW", 10, "iptables", "-t", "raw", "-L", "-nvx", NULL);
820 run_command("IP6TABLES RAW", 10, "ip6tables", "-t", "raw", "-L", "-nvx", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -0700821}
822
Felipe Lemecd4d6632017-01-05 15:05:46 -0800823static void do_kmsg() {
824 struct stat st;
825 if (!stat(PSTORE_LAST_KMSG, &st)) {
826 /* Also TODO: Make console-ramoops CAP_SYSLOG protected. */
827 dump_file("LAST KMSG", PSTORE_LAST_KMSG);
828 } else if (!stat(ALT_PSTORE_LAST_KMSG, &st)) {
829 dump_file("LAST KMSG", ALT_PSTORE_LAST_KMSG);
830 } else {
831 /* TODO: Make last_kmsg CAP_SYSLOG protected. b/5555691 */
832 dump_file("LAST KMSG", "/proc/last_kmsg");
833 }
834}
835
836static void do_logcat() {
837 unsigned long timeout;
838 // dump_file("EVENT LOG TAGS", "/etc/event-log-tags");
839 // calculate timeout
840 timeout = logcat_timeout("main") + logcat_timeout("system") + logcat_timeout("crash");
841 if (timeout < 20000) {
842 timeout = 20000;
843 }
844 run_command("SYSTEM LOG", timeout / 1000, "logcat", "-v", "threadtime",
845 "-v", "printable",
846 "-d",
847 "*:v", NULL);
848 timeout = logcat_timeout("events");
849 if (timeout < 20000) {
850 timeout = 20000;
851 }
852 run_command("EVENT LOG", timeout / 1000, "logcat", "-b", "events",
853 "-v", "threadtime",
854 "-v", "printable",
855 "-d",
856 "*:v", NULL);
857 timeout = logcat_timeout("radio");
858 if (timeout < 20000) {
859 timeout = 20000;
860 }
861 run_command("RADIO LOG", timeout / 1000, "logcat", "-b", "radio",
862 "-v", "threadtime",
863 "-v", "printable",
864 "-d",
865 "*:v", NULL);
866
867 run_command("LOG STATISTICS", 10, "logcat", "-b", "all", "-S", NULL);
868
869 /* kernels must set CONFIG_PSTORE_PMSG, slice up pstore with device tree */
870 run_command("LAST LOGCAT", 10, "logcat", "-L",
871 "-b", "all",
872 "-v", "threadtime",
873 "-v", "printable",
874 "-d",
875 "*:v", NULL);
876}
877
Srinath Sridharanfdf52d32016-02-01 15:50:22 -0800878static void dumpstate(const std::string& screenshot_path, const std::string& version) {
Felipe Leme770410d2016-01-26 17:07:14 -0800879 DurationReporter duration_reporter("DUMPSTATE");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700880
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -0700881 dump_dev_files("TRUSTY VERSION", "/sys/bus/platform/drivers/trusty", "trusty_version");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700882 run_command("UPTIME", 10, "uptime", NULL);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700883 dump_files("UPTIME MMC PERF", mmcblk0, skip_not_stat, dump_stat_from_fd);
Mark Salyzyn8c8130e2015-12-09 11:21:28 -0800884 dump_emmc_ecsd("/d/mmc0/mmc0:0001/ext_csd");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700885 dump_file("MEMORY INFO", "/proc/meminfo");
Elliott Hughes52860032016-06-14 13:56:00 -0700886 run_command("CPU INFO", 10, "top", "-b", "-n", "1", "-H", "-s", "6",
Elliott Hughes646e92f2016-06-13 17:35:07 -0700887 "-o", "pid,tid,user,pr,ni,%cpu,s,virt,res,pcy,cmd,name", NULL);
Nick Kralevich2b1f88b2015-10-07 16:38:42 -0700888 run_command("PROCRANK", 20, SU_PATH, "root", "procrank", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700889 dump_file("VIRTUAL MEMORY STATS", "/proc/vmstat");
890 dump_file("VMALLOC INFO", "/proc/vmallocinfo");
891 dump_file("SLAB INFO", "/proc/slabinfo");
892 dump_file("ZONEINFO", "/proc/zoneinfo");
893 dump_file("PAGETYPEINFO", "/proc/pagetypeinfo");
894 dump_file("BUDDYINFO", "/proc/buddyinfo");
Colin Cross2281af92012-10-28 22:41:06 -0700895 dump_file("FRAGMENTATION INFO", "/d/extfrag/unusable_index");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700896
Todd Poynor29e27a82012-05-22 17:54:59 -0700897 dump_file("KERNEL WAKE SOURCES", "/d/wakeup_sources");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700898 dump_file("KERNEL CPUFREQ", "/sys/devices/system/cpu/cpu0/cpufreq/stats/time_in_state");
Mathias Agopian85aea742012-08-08 15:32:02 -0700899 dump_file("KERNEL SYNC", "/d/sync");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700900
Elliott Hughes52860032016-06-14 13:56:00 -0700901 run_command("PROCESSES AND THREADS", 10, "ps", "-A", "-T", "-Z",
Elliott Hughes32caf1d2016-05-04 14:03:54 -0700902 "-O", "pri,nice,rtprio,sched,pcy", NULL);
Nick Kralevichb82c9252015-11-27 17:56:13 -0800903 run_command("LIBRANK", 10, SU_PATH, "root", "librank", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700904
Michal Karpinski4db754f2015-12-11 18:04:32 +0000905 run_command("PRINTENV", 10, "printenv", NULL);
Elliott Hughes0adb3a32016-10-28 08:53:02 -0700906 run_command("NETSTAT", 10, "netstat", "-nW", NULL);
Michal Karpinski4db754f2015-12-11 18:04:32 +0000907 run_command("LSMOD", 10, "lsmod", NULL);
908
Colin Crossf45fa6b2012-03-26 12:38:26 -0700909 do_dmesg();
910
911 run_command("LIST OF OPEN FILES", 10, SU_PATH, "root", "lsof", NULL);
Jeff Brown1dc94e32014-09-11 14:15:27 -0700912 for_each_pid(do_showmap, "SMAPS OF ALL PROCESSES");
913 for_each_tid(show_wchan, "BLOCKED PROCESS WAIT-CHANNELS");
Mark Salyzyna297c322016-02-05 15:33:17 -0800914 for_each_pid(show_showtime, "PROCESS TIMES (pid cmd user system iowait+percentage)");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700915
Ajay Panicker2f531772016-09-14 12:26:46 -0700916 /* Dump Bluetooth HCI logs */
917 add_dir("/data/misc/bluetooth/logs", true);
918
Felipe Leme6e01fa62015-11-11 19:35:14 -0800919 if (!screenshot_path.empty()) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800920 MYLOGI("taking late screenshot\n");
Felipe Lemee338bf62015-12-07 14:03:50 -0800921 take_screenshot(screenshot_path);
Felipe Lemecbce55d2016-02-08 09:53:18 -0800922 MYLOGI("wrote screenshot: %s\n", screenshot_path.c_str());
Jeff Sharkey5a930032013-03-19 15:05:19 -0700923 }
924
Felipe Lemecd4d6632017-01-05 15:05:46 -0800925 do_logcat();
Mark Salyzynecc07632015-07-30 14:57:09 -0700926
Colin Crossf45fa6b2012-03-26 12:38:26 -0700927 /* show the traces we collected in main(), if that was done */
928 if (dump_traces_path != NULL) {
929 dump_file("VM TRACES JUST NOW", dump_traces_path);
930 }
931
932 /* only show ANR traces if they're less than 15 minutes old */
933 struct stat st;
934 char anr_traces_path[PATH_MAX];
935 property_get("dalvik.vm.stack-trace-file", anr_traces_path, "");
936 if (!anr_traces_path[0]) {
937 printf("*** NO VM TRACES FILE DEFINED (dalvik.vm.stack-trace-file)\n\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700938 } else {
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800939 int fd = TEMP_FAILURE_RETRY(open(anr_traces_path,
940 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700941 if (fd < 0) {
942 printf("*** NO ANR VM TRACES FILE (%s): %s\n\n", anr_traces_path, strerror(errno));
943 } else {
944 dump_file_from_fd("VM TRACES AT LAST ANR", anr_traces_path, fd);
945 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700946 }
947
948 /* slow traces for slow operations */
949 if (anr_traces_path[0] != 0) {
950 int tail = strlen(anr_traces_path)-1;
951 while (tail > 0 && anr_traces_path[tail] != '/') {
952 tail--;
953 }
954 int i = 0;
955 while (1) {
956 sprintf(anr_traces_path+tail+1, "slow%02d.txt", i);
957 if (stat(anr_traces_path, &st)) {
958 // No traces file at this index, done with the files.
959 break;
960 }
961 dump_file("VM TRACES WHEN SLOW", anr_traces_path);
962 i++;
963 }
964 }
965
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700966 int dumped = 0;
967 for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
968 if (tombstone_data[i].fd != -1) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800969 const char *name = tombstone_data[i].name;
970 int fd = tombstone_data[i].fd;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700971 dumped = 1;
Felipe Lemee82a27d2016-01-05 13:35:44 -0800972 if (zip_writer) {
973 if (!add_zip_entry_from_fd(ZIP_ROOT_DIR + name, fd)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800974 MYLOGE("Unable to add tombstone %s to zip file\n", name);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800975 }
976 } else {
977 dump_file_from_fd("TOMBSTONE", name, fd);
978 }
979 close(fd);
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700980 tombstone_data[i].fd = -1;
981 }
982 }
983 if (!dumped) {
984 printf("*** NO TOMBSTONES to dump in %s\n\n", TOMBSTONE_DIR);
985 }
986
Colin Crossf45fa6b2012-03-26 12:38:26 -0700987 dump_file("NETWORK DEV INFO", "/proc/net/dev");
988 dump_file("QTAGUID NETWORK INTERFACES INFO", "/proc/net/xt_qtaguid/iface_stat_all");
JP Abgrall012c2ea2012-05-16 20:49:29 -0700989 dump_file("QTAGUID NETWORK INTERFACES INFO (xt)", "/proc/net/xt_qtaguid/iface_stat_fmt");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700990 dump_file("QTAGUID CTRL INFO", "/proc/net/xt_qtaguid/ctrl");
991 dump_file("QTAGUID STATS INFO", "/proc/net/xt_qtaguid/stats");
992
Felipe Lemecd4d6632017-01-05 15:05:46 -0800993 do_kmsg();
Mark Salyzyn2262c162014-12-16 09:09:26 -0800994
Colin Crossf45fa6b2012-03-26 12:38:26 -0700995 /* The following have a tendency to get wedged when wifi drivers/fw goes belly-up. */
Elliott Hughesa59828a2015-01-27 20:48:52 -0800996
997 run_command("NETWORK INTERFACES", 10, "ip", "link", NULL);
Lorenzo Colittid4c3d382014-07-30 14:38:20 +0900998
999 run_command("IPv4 ADDRESSES", 10, "ip", "-4", "addr", "show", NULL);
1000 run_command("IPv6 ADDRESSES", 10, "ip", "-6", "addr", "show", NULL);
1001
Colin Crossf45fa6b2012-03-26 12:38:26 -07001002 run_command("IP RULES", 10, "ip", "rule", "show", NULL);
1003 run_command("IP RULES v6", 10, "ip", "-6", "rule", "show", NULL);
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -07001004
1005 dump_route_tables();
1006
Lorenzo Colittid4c3d382014-07-30 14:38:20 +09001007 run_command("ARP CACHE", 10, "ip", "-4", "neigh", "show", NULL);
1008 run_command("IPv6 ND CACHE", 10, "ip", "-6", "neigh", "show", NULL);
Erik Klinef7f2b0f2016-05-27 11:29:19 +09001009 run_command("MULTICAST ADDRESSES", 10, "ip", "maddr", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -07001010 run_command("WIFI NETWORKS", 20, "wpa_cli", "IFNAME=wlan0", "list_networks", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001011
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -08001012#ifdef FWDUMP_bcmdhd
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001013 run_command("ND OFFLOAD TABLE", 5,
Erik Kline08165202016-05-30 11:55:44 +09001014 SU_PATH, "root", WLUTIL, "nd_hostip", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001015
1016 run_command("DUMP WIFI INTERNAL COUNTERS (1)", 20,
Erik Kline08165202016-05-30 11:55:44 +09001017 SU_PATH, "root", WLUTIL, "counters", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001018
1019 run_command("ND OFFLOAD STATUS (1)", 5,
Erik Kline08165202016-05-30 11:55:44 +09001020 SU_PATH, "root", WLUTIL, "nd_status", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001021
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -08001022#endif
Dmitry Shmidt0b2c9262012-11-07 11:09:46 -08001023 dump_file("INTERRUPTS (1)", "/proc/interrupts");
1024
Felipe Leme7cff4622016-06-08 09:51:29 -07001025 run_command("NETWORK DIAGNOSTICS", 10, "dumpsys", "-t", "10", "connectivity", "--diag", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001026
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -08001027#ifdef FWDUMP_bcmdhd
Colin Crossf45fa6b2012-03-26 12:38:26 -07001028 run_command("DUMP WIFI STATUS", 20,
1029 SU_PATH, "root", "dhdutil", "-i", "wlan0", "dump", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001030
1031 run_command("DUMP WIFI INTERNAL COUNTERS (2)", 20,
Erik Kline08165202016-05-30 11:55:44 +09001032 SU_PATH, "root", WLUTIL, "counters", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001033
1034 run_command("ND OFFLOAD STATUS (2)", 5,
Erik Kline08165202016-05-30 11:55:44 +09001035 SU_PATH, "root", WLUTIL, "nd_status", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001036#endif
Dmitry Shmidt0b2c9262012-11-07 11:09:46 -08001037 dump_file("INTERRUPTS (2)", "/proc/interrupts");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001038
Elliott Hughes52eddba2017-02-28 10:14:22 -08001039 run_command("SYSTEM PROPERTIES", 5, "getprop", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001040
1041 run_command("VOLD DUMP", 10, "vdc", "dump", NULL);
1042 run_command("SECURE CONTAINERS", 10, "vdc", "asec", "list", NULL);
1043
Ken Sumrall8f75fa72013-02-08 17:35:58 -08001044 run_command("FILESYSTEMS & FREE SPACE", 10, "df", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001045
Colin Crossf45fa6b2012-03-26 12:38:26 -07001046 run_command("LAST RADIO LOG", 10, "parse_radio_log", "/proc/last_radio_log", NULL);
1047
1048 printf("------ BACKLIGHTS ------\n");
1049 printf("LCD brightness=");
1050 dump_file(NULL, "/sys/class/leds/lcd-backlight/brightness");
1051 printf("Button brightness=");
1052 dump_file(NULL, "/sys/class/leds/button-backlight/brightness");
1053 printf("Keyboard brightness=");
1054 dump_file(NULL, "/sys/class/leds/keyboard-backlight/brightness");
1055 printf("ALS mode=");
1056 dump_file(NULL, "/sys/class/leds/lcd-backlight/als");
1057 printf("LCD driver registers:\n");
1058 dump_file(NULL, "/sys/class/leds/lcd-backlight/registers");
1059 printf("\n");
1060
1061 /* Binder state is expensive to look at as it uses a lot of memory. */
1062 dump_file("BINDER FAILED TRANSACTION LOG", "/sys/kernel/debug/binder/failed_transaction_log");
1063 dump_file("BINDER TRANSACTION LOG", "/sys/kernel/debug/binder/transaction_log");
1064 dump_file("BINDER TRANSACTIONS", "/sys/kernel/debug/binder/transactions");
1065 dump_file("BINDER STATS", "/sys/kernel/debug/binder/stats");
1066 dump_file("BINDER STATE", "/sys/kernel/debug/binder/state");
1067
Colin Crossf45fa6b2012-03-26 12:38:26 -07001068 printf("========================================================\n");
1069 printf("== Board\n");
1070 printf("========================================================\n");
1071
1072 dumpstate_board();
1073 printf("\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001074
1075 /* Migrate the ril_dumpstate to a dumpstate_board()? */
1076 char ril_dumpstate_timeout[PROPERTY_VALUE_MAX] = {0};
1077 property_get("ril.dumpstate.timeout", ril_dumpstate_timeout, "30");
1078 if (strnlen(ril_dumpstate_timeout, PROPERTY_VALUE_MAX - 1) > 0) {
Felipe Lemec4eee562016-04-21 15:42:55 -07001079 if (is_user_build()) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001080 // su does not exist on user builds, so try running without it.
1081 // This way any implementations of vril-dump that do not require
1082 // root can run on user builds.
1083 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
1084 "vril-dump", NULL);
1085 } else {
1086 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
1087 SU_PATH, "root", "vril-dump", NULL);
1088 }
1089 }
1090
1091 printf("========================================================\n");
1092 printf("== Android Framework Services\n");
1093 printf("========================================================\n");
1094
Wei Liu34222562016-05-19 13:59:01 -07001095 run_command("DUMPSYS", 60, "dumpsys", "-t", "60", "--skip", "meminfo", "cpuinfo", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001096
1097 printf("========================================================\n");
Dianne Hackborn02bea972013-06-26 18:59:09 -07001098 printf("== Checkins\n");
1099 printf("========================================================\n");
1100
Felipe Leme7cff4622016-06-08 09:51:29 -07001101 run_command("CHECKIN BATTERYSTATS", 30, "dumpsys", "-t", "30", "batterystats", "-c", NULL);
1102 run_command("CHECKIN MEMINFO", 30, "dumpsys", "-t", "30", "meminfo", "--checkin", NULL);
1103 run_command("CHECKIN NETSTATS", 30, "dumpsys", "-t", "30", "netstats", "--checkin", NULL);
1104 run_command("CHECKIN PROCSTATS", 30, "dumpsys", "-t", "30", "procstats", "-c", NULL);
1105 run_command("CHECKIN USAGESTATS", 30, "dumpsys", "-t", "30", "usagestats", "-c", NULL);
1106 run_command("CHECKIN PACKAGE", 30, "dumpsys", "-t", "30", "package", "--checkin", NULL);
Dianne Hackborn02bea972013-06-26 18:59:09 -07001107
1108 printf("========================================================\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001109 printf("== Running Application Activities\n");
1110 printf("========================================================\n");
1111
Felipe Leme3f83dbe2016-06-10 16:56:33 -07001112 run_command("APP ACTIVITIES", 30, "dumpsys", "-t", "30", "activity", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001113
1114 printf("========================================================\n");
1115 printf("== Running Application Services\n");
1116 printf("========================================================\n");
1117
Felipe Leme3f83dbe2016-06-10 16:56:33 -07001118 run_command("APP SERVICES", 30, "dumpsys", "-t", "30", "activity", "service", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001119
1120 printf("========================================================\n");
1121 printf("== Running Application Providers\n");
1122 printf("========================================================\n");
1123
Junda Liucfc33d42016-06-14 00:09:10 -07001124 run_command("APP PROVIDERS", 30, "dumpsys", "-t", "30", "activity", "provider", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001125
Naveen Kallade591df2016-10-19 21:38:44 -07001126 // dump_modem_logs adds the modem logs if available to the bugreport.
1127 // Do this at the end to allow for sufficient time for the modem logs to be
1128 // collected.
1129 dump_modem_logs();
Colin Crossf45fa6b2012-03-26 12:38:26 -07001130
1131 printf("========================================================\n");
Felipe Leme608385d2016-02-01 10:35:38 -08001132 printf("== Final progress (pid %d): %d/%d (originally %d)\n",
1133 getpid(), progress, weight_total, WEIGHT_TOTAL);
1134 printf("========================================================\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001135 printf("== dumpstate: done\n");
1136 printf("========================================================\n");
1137}
1138
1139static void usage() {
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001140 fprintf(stderr,
Felipe Lemecd4d6632017-01-05 15:05:46 -08001141 "usage: dumpstate [-h] [-b soundfile] [-e soundfile] [-o file [-d] [-p] [-t]"
1142 "[-z] [-s] [-S] [-q] [-B] [-P] [-R] [-V version]\n"
Felipe Leme2628e9e2016-04-12 16:36:51 -07001143 " -h: display this help message\n"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001144 " -b: play sound file instead of vibrate, at beginning of job\n"
1145 " -e: play sound file instead of vibrate, at end of job\n"
1146 " -o: write to file (instead of stdout)\n"
1147 " -d: append date to filename (requires -o)\n"
1148 " -p: capture screenshot to filename.png (requires -o)\n"
Felipe Lemecd4d6632017-01-05 15:05:46 -08001149 " -t: only captures telephony sections\n"
Felipe Leme2628e9e2016-04-12 16:36:51 -07001150 " -z: generate zipped file (requires -o)\n"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001151 " -s: write output to control socket (for init)\n"
Felipe Leme2628e9e2016-04-12 16:36:51 -07001152 " -S: write file location to control socket (for init; requires -o and -z)"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001153 " -q: disable vibrate\n"
1154 " -B: send broadcast when finished (requires -o)\n"
1155 " -P: send broadcast when started and update system properties on "
1156 "progress (requires -o and -B)\n"
1157 " -R: take bugreport in remote mode (requires -o, -z, -d and -B, "
1158 "shouldn't be used with -P)\n"
1159 " -V: sets the bugreport format version (valid values: %s)\n",
1160 VERSION_DEFAULT.c_str());
Colin Crossf45fa6b2012-03-26 12:38:26 -07001161}
1162
Felipe Lemebb6b6042016-10-25 18:18:24 +00001163static void sigpipe_handler(int n) {
1164 // don't complain to stderr or stdout
Andres Morales2e671bb2014-08-21 12:38:22 -07001165 _exit(EXIT_FAILURE);
John Michelau885f8882013-05-06 16:42:02 -05001166}
1167
Felipe Leme1e9edc62015-12-21 16:02:13 -08001168/* adds the temporary report to the existing .zip file, closes the .zip file, and removes the
1169 temporary file.
1170 */
Felipe Lemee82a27d2016-01-05 13:35:44 -08001171static bool finish_zip_file(const std::string& bugreport_name, const std::string& bugreport_path,
Felipe Leme1e9edc62015-12-21 16:02:13 -08001172 time_t now) {
Felipe Lemee82a27d2016-01-05 13:35:44 -08001173 if (!add_zip_entry(bugreport_name, bugreport_path)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001174 MYLOGE("Failed to add text entry to .zip file\n");
Felipe Leme1e9edc62015-12-21 16:02:13 -08001175 return false;
1176 }
Felipe Leme809d74e2016-02-02 12:57:00 -08001177 if (!add_text_zip_entry("main_entry.txt", bugreport_name)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001178 MYLOGE("Failed to add main_entry.txt to .zip file\n");
Felipe Leme111b9d02016-02-03 09:28:24 -08001179 return false;
Felipe Leme809d74e2016-02-02 12:57:00 -08001180 }
Felipe Leme1e9edc62015-12-21 16:02:13 -08001181
Felipe Lemee82a27d2016-01-05 13:35:44 -08001182 int32_t err = zip_writer->Finish();
Felipe Leme1e9edc62015-12-21 16:02:13 -08001183 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001184 MYLOGE("zip_writer->Finish(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001185 return false;
1186 }
1187
Felipe Lemec4eee562016-04-21 15:42:55 -07001188 if (is_user_build()) {
1189 MYLOGD("Removing temporary file %s\n", bugreport_path.c_str())
1190 if (remove(bugreport_path.c_str())) {
1191 ALOGW("remove(%s): %s\n", bugreport_path.c_str(), strerror(errno));
1192 }
1193 } else {
1194 MYLOGD("Keeping temporary file %s on non-user build\n", bugreport_path.c_str())
1195 }
1196
Felipe Leme1e9edc62015-12-21 16:02:13 -08001197 return true;
1198}
Felipe Leme6e01fa62015-11-11 19:35:14 -08001199
Michal Karpinski4db754f2015-12-11 18:04:32 +00001200static std::string SHA256_file_hash(std::string filepath) {
Andreas Gampe27cd7b22016-07-18 18:24:05 -07001201 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(filepath.c_str(), O_RDONLY | O_NONBLOCK
1202 | O_CLOEXEC | O_NOFOLLOW)));
Andreas Gampefcc8db92016-07-18 18:01:27 -07001203 if (fd == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001204 MYLOGE("open(%s): %s\n", filepath.c_str(), strerror(errno));
Michal Karpinski4db754f2015-12-11 18:04:32 +00001205 return NULL;
1206 }
1207
1208 SHA256_CTX ctx;
Elliott Hughesc4dc1412016-04-12 16:28:31 -07001209 SHA256_Init(&ctx);
Michal Karpinski4db754f2015-12-11 18:04:32 +00001210
1211 std::vector<uint8_t> buffer(65536);
1212 while (1) {
1213 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd.get(), buffer.data(), buffer.size()));
1214 if (bytes_read == 0) {
1215 break;
1216 } else if (bytes_read == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001217 MYLOGE("read(%s): %s\n", filepath.c_str(), strerror(errno));
Michal Karpinski4db754f2015-12-11 18:04:32 +00001218 return NULL;
1219 }
1220
Elliott Hughesc4dc1412016-04-12 16:28:31 -07001221 SHA256_Update(&ctx, buffer.data(), bytes_read);
Michal Karpinski4db754f2015-12-11 18:04:32 +00001222 }
1223
Elliott Hughesc4dc1412016-04-12 16:28:31 -07001224 uint8_t hash[SHA256_DIGEST_LENGTH];
1225 SHA256_Final(hash, &ctx);
1226
1227 char hash_buffer[SHA256_DIGEST_LENGTH * 2 + 1];
1228 for(size_t i = 0; i < SHA256_DIGEST_LENGTH; i++) {
Michal Karpinskicbbdf732016-01-07 20:45:02 +00001229 sprintf(hash_buffer + (i * 2), "%02x", hash[i]);
Michal Karpinski4db754f2015-12-11 18:04:32 +00001230 }
1231 hash_buffer[sizeof(hash_buffer) - 1] = 0;
1232 return std::string(hash_buffer);
1233}
1234
Colin Crossf45fa6b2012-03-26 12:38:26 -07001235int main(int argc, char *argv[]) {
Felipe Lemebb6b6042016-10-25 18:18:24 +00001236 struct sigaction sigact;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001237 int do_add_date = 0;
Felipe Leme6e01fa62015-11-11 19:35:14 -08001238 int do_zip_file = 0;
John Michelau1f794c42012-09-17 11:20:19 -05001239 int do_vibrate = 1;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001240 char* use_outfile = 0;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001241 int use_socket = 0;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001242 int use_control_socket = 0;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001243 int do_fb = 0;
Jeff Sharkey27f9e6d2013-03-13 15:45:50 -07001244 int do_broadcast = 0;
Felipe Lemee338bf62015-12-07 14:03:50 -08001245 int do_early_screenshot = 0;
Michal Karpinski4db754f2015-12-11 18:04:32 +00001246 int is_remote_mode = 0;
Felipe Lemecd4d6632017-01-05 15:05:46 -08001247 bool telephony_only = false;
1248
Felipe Leme809d74e2016-02-02 12:57:00 -08001249 std::string version = VERSION_DEFAULT;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001250
Felipe Lemee82a27d2016-01-05 13:35:44 -08001251 now = time(NULL);
1252
Felipe Lemecbce55d2016-02-08 09:53:18 -08001253 MYLOGI("begin\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001254
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001255 /* gets the sequential id */
1256 char last_id[PROPERTY_VALUE_MAX];
1257 property_get("dumpstate.last_id", last_id, "0");
1258 id = strtoul(last_id, NULL, 10) + 1;
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001259 snprintf(last_id, sizeof(last_id), "%lu", id);
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001260 property_set("dumpstate.last_id", last_id);
1261 MYLOGI("dumpstate id: %lu\n", id);
1262
Felipe Lemebb6b6042016-10-25 18:18:24 +00001263 /* clear SIGPIPE handler */
1264 memset(&sigact, 0, sizeof(sigact));
1265 sigact.sa_handler = sigpipe_handler;
1266 sigaction(SIGPIPE, &sigact, NULL);
1267
Colin Crossf45fa6b2012-03-26 12:38:26 -07001268 /* set as high priority, and protect from OOM killer */
1269 setpriority(PRIO_PROCESS, 0, -20);
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001270
1271 FILE *oom_adj = fopen("/proc/self/oom_score_adj", "we");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001272 if (oom_adj) {
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001273 fputs("-1000", oom_adj);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001274 fclose(oom_adj);
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001275 } else {
1276 /* fallback to kernels <= 2.6.35 */
1277 oom_adj = fopen("/proc/self/oom_adj", "we");
1278 if (oom_adj) {
1279 fputs("-17", oom_adj);
1280 fclose(oom_adj);
1281 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001282 }
1283
Jeff Brown1dc94e32014-09-11 14:15:27 -07001284 /* parse arguments */
Felipe Lemea34efb72016-03-11 09:33:32 -08001285 std::string args;
1286 format_args(argc, const_cast<const char **>(argv), &args);
1287 MYLOGD("Dumpstate command line: %s\n", args.c_str());
Colin Crossf45fa6b2012-03-26 12:38:26 -07001288 int c;
Felipe Lemecd4d6632017-01-05 15:05:46 -08001289 while ((c = getopt(argc, argv, "dho:svqzptPBRSV:")) != -1) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001290 switch (c) {
Felipe Leme71bbfc52015-11-23 14:14:51 -08001291 case 'd': do_add_date = 1; break;
Felipe Lemecd4d6632017-01-05 15:05:46 -08001292 case 't': telephony_only = true; break;
Felipe Leme71bbfc52015-11-23 14:14:51 -08001293 case 'z': do_zip_file = 1; break;
1294 case 'o': use_outfile = optarg; break;
1295 case 's': use_socket = 1; break;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001296 case 'S': use_control_socket = 1; break;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001297 case 'v': break; // compatibility no-op
Felipe Leme71bbfc52015-11-23 14:14:51 -08001298 case 'q': do_vibrate = 0; break;
1299 case 'p': do_fb = 1; break;
1300 case 'P': do_update_progress = 1; break;
Michal Karpinski4db754f2015-12-11 18:04:32 +00001301 case 'R': is_remote_mode = 1; break;
Felipe Leme71bbfc52015-11-23 14:14:51 -08001302 case 'B': do_broadcast = 1; break;
Felipe Leme809d74e2016-02-02 12:57:00 -08001303 case 'V': version = optarg; break;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001304 case '?': printf("\n");
1305 case 'h':
1306 usage();
1307 exit(1);
1308 }
1309 }
1310
Felipe Leme71bbfc52015-11-23 14:14:51 -08001311 if ((do_zip_file || do_add_date || do_update_progress || do_broadcast) && !use_outfile) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001312 usage();
1313 exit(1);
1314 }
1315
Felipe Leme2628e9e2016-04-12 16:36:51 -07001316 if (use_control_socket && !do_zip_file) {
1317 usage();
1318 exit(1);
1319 }
1320
Felipe Leme71bbfc52015-11-23 14:14:51 -08001321 if (do_update_progress && !do_broadcast) {
1322 usage();
1323 exit(1);
1324 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001325
Michal Karpinski4db754f2015-12-11 18:04:32 +00001326 if (is_remote_mode && (do_update_progress || !do_broadcast || !do_zip_file || !do_add_date)) {
1327 usage();
1328 exit(1);
1329 }
1330
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001331 if (version != VERSION_DEFAULT) {
1332 usage();
1333 exit(1);
Felipe Leme809d74e2016-02-02 12:57:00 -08001334 }
1335
Felipe Lemecbce55d2016-02-08 09:53:18 -08001336 MYLOGI("bugreport format version: %s\n", version.c_str());
Felipe Leme809d74e2016-02-02 12:57:00 -08001337
Felipe Lemee338bf62015-12-07 14:03:50 -08001338 do_early_screenshot = do_update_progress;
1339
Christopher Ferrised9354f2014-10-01 17:35:01 -07001340 // If we are going to use a socket, do it as early as possible
1341 // to avoid timeouts from bugreport.
1342 if (use_socket) {
1343 redirect_to_socket(stdout, "dumpstate");
1344 }
1345
Felipe Leme2628e9e2016-04-12 16:36:51 -07001346 if (use_control_socket) {
1347 MYLOGD("Opening control socket\n");
1348 control_socket_fd = open_socket("dumpstate");
Felipe Leme02b7e002016-07-22 12:03:20 -07001349 do_update_progress = 1;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001350 }
1351
Felipe Lemecbce55d2016-02-08 09:53:18 -08001352 /* full path of the temporary file containing the bugreport */
Felipe Lemead5f6c42015-11-30 14:26:46 -08001353 std::string tmp_path;
1354
Felipe Lemecbce55d2016-02-08 09:53:18 -08001355 /* full path of the file containing the dumpstate logs*/
1356 std::string log_path;
1357
Felipe Leme14e034a2016-03-30 18:51:03 -07001358 /* full path of the systrace file, when enabled */
1359 std::string systrace_path;
1360
Felipe Lemee338bf62015-12-07 14:03:50 -08001361 /* full path of the temporary file containing the screenshot (when requested) */
1362 std::string screenshot_path;
1363
Felipe Lemecbce55d2016-02-08 09:53:18 -08001364 /* base name (without suffix or extensions) of the bugreport files */
Felipe Lemead5f6c42015-11-30 14:26:46 -08001365 std::string base_name;
1366
Felipe Leme71bbfc52015-11-23 14:14:51 -08001367 /* pointer to the actual path, be it zip or text */
1368 std::string path;
1369
Felipe Leme635ca312016-01-05 14:23:02 -08001370 /* pointer to the zipped file */
Felipe Leme1e9edc62015-12-21 16:02:13 -08001371 std::unique_ptr<FILE, int(*)(FILE*)> zip_file(NULL, fclose);
Felipe Leme71bbfc52015-11-23 14:14:51 -08001372
Felipe Lemead5f6c42015-11-30 14:26:46 -08001373 /* redirect output if needed */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001374 bool is_redirecting = !use_socket && use_outfile;
1375
1376 if (is_redirecting) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001377 bugreport_dir = dirname(use_outfile);
1378 base_name = basename(use_outfile);
Felipe Leme71bbfc52015-11-23 14:14:51 -08001379 if (do_add_date) {
1380 char date[80];
Felipe Lemead5f6c42015-11-30 14:26:46 -08001381 strftime(date, sizeof(date), "%Y-%m-%d-%H-%M-%S", localtime(&now));
1382 suffix = date;
1383 } else {
1384 suffix = "undated";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001385 }
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001386 char build_id[PROPERTY_VALUE_MAX];
1387 property_get("ro.build.id", build_id, "UNKNOWN_BUILD");
1388 base_name = base_name + "-" + build_id;
Felipe Lemecd4d6632017-01-05 15:05:46 -08001389 if (telephony_only) {
1390 base_name = base_name + "-telephony";
1391 }
Felipe Leme71bbfc52015-11-23 14:14:51 -08001392 if (do_fb) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001393 // TODO: if dumpstate was an object, the paths could be internal variables and then
1394 // we could have a function to calculate the derived values, such as:
1395 // screenshot_path = GetPath(".png");
1396 screenshot_path = bugreport_dir + "/" + base_name + "-" + suffix + ".png";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001397 }
Felipe Lemead5f6c42015-11-30 14:26:46 -08001398 tmp_path = bugreport_dir + "/" + base_name + "-" + suffix + ".tmp";
Felipe Lemecbce55d2016-02-08 09:53:18 -08001399 log_path = bugreport_dir + "/dumpstate_log-" + suffix + "-"
1400 + std::to_string(getpid()) + ".txt";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001401
Felipe Lemecbce55d2016-02-08 09:53:18 -08001402 MYLOGD("Bugreport dir: %s\n"
1403 "Base name: %s\n"
1404 "Suffix: %s\n"
1405 "Log path: %s\n"
1406 "Temporary path: %s\n"
1407 "Screenshot path: %s\n",
1408 bugreport_dir.c_str(), base_name.c_str(), suffix.c_str(),
1409 log_path.c_str(), tmp_path.c_str(), screenshot_path.c_str());
Felipe Leme71bbfc52015-11-23 14:14:51 -08001410
Felipe Leme1e9edc62015-12-21 16:02:13 -08001411 if (do_zip_file) {
Felipe Leme1e9edc62015-12-21 16:02:13 -08001412 path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip";
Felipe Leme26bd34c2016-03-15 13:40:33 -07001413 MYLOGD("Creating initial .zip file (%s)\n", path.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -08001414 create_parent_dirs(path.c_str());
Felipe Leme1e9edc62015-12-21 16:02:13 -08001415 zip_file.reset(fopen(path.c_str(), "wb"));
1416 if (!zip_file) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001417 MYLOGE("fopen(%s, 'wb'): %s\n", path.c_str(), strerror(errno));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001418 do_zip_file = 0;
1419 } else {
1420 zip_writer.reset(new ZipWriter(zip_file.get()));
1421 }
Felipe Leme809d74e2016-02-02 12:57:00 -08001422 add_text_zip_entry("version.txt", version);
Felipe Leme1e9edc62015-12-21 16:02:13 -08001423 }
1424
Felipe Lemedcd1f0d2016-08-04 12:48:50 -07001425 if (do_update_progress) {
1426 if (do_broadcast) {
1427 // clang-format off
1428 std::vector<std::string> am_args = {
1429 "--receiver-permission", "android.permission.DUMP", "--receiver-foreground",
1430 "--es", "android.intent.extra.NAME", suffix,
1431 "--ei", "android.intent.extra.ID", std::to_string(id),
1432 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
1433 "--ei", "android.intent.extra.MAX", std::to_string(WEIGHT_TOTAL),
1434 };
1435 // clang-format on
1436 send_broadcast("android.intent.action.BUGREPORT_STARTED", am_args);
1437 }
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001438 if (use_control_socket) {
1439 dprintf(control_socket_fd, "BEGIN:%s\n", path.c_str());
1440 }
Felipe Leme71bbfc52015-11-23 14:14:51 -08001441 }
1442 }
1443
Nick Kralevichf3599b32016-01-25 15:05:16 -08001444 /* read /proc/cmdline before dropping root */
1445 FILE *cmdline = fopen("/proc/cmdline", "re");
1446 if (cmdline) {
1447 fgets(cmdline_buf, sizeof(cmdline_buf), cmdline);
1448 fclose(cmdline);
1449 }
1450
Jeff Brown1dc94e32014-09-11 14:15:27 -07001451 /* open the vibrator before dropping root */
Felipe Leme6e01fa62015-11-11 19:35:14 -08001452 std::unique_ptr<FILE, int(*)(FILE*)> vibrator(NULL, fclose);
John Michelau1f794c42012-09-17 11:20:19 -05001453 if (do_vibrate) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001454 vibrator.reset(fopen("/sys/class/timed_output/vibrator/enable", "we"));
Jeff Brown1dc94e32014-09-11 14:15:27 -07001455 if (vibrator) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001456 vibrate(vibrator.get(), 150);
Jeff Brown1dc94e32014-09-11 14:15:27 -07001457 }
John Michelau1f794c42012-09-17 11:20:19 -05001458 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001459
Felipe Leme3634a1e2015-12-09 10:11:47 -08001460 if (do_fb && do_early_screenshot) {
1461 if (screenshot_path.empty()) {
1462 // should not have happened
Felipe Lemecbce55d2016-02-08 09:53:18 -08001463 MYLOGE("INTERNAL ERROR: skipping early screenshot because path was not set\n");
Felipe Leme3634a1e2015-12-09 10:11:47 -08001464 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001465 MYLOGI("taking early screenshot\n");
Felipe Leme3634a1e2015-12-09 10:11:47 -08001466 take_screenshot(screenshot_path);
Felipe Lemecbce55d2016-02-08 09:53:18 -08001467 MYLOGI("wrote screenshot: %s\n", screenshot_path.c_str());
Felipe Leme3634a1e2015-12-09 10:11:47 -08001468 if (chown(screenshot_path.c_str(), AID_SHELL, AID_SHELL)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001469 MYLOGE("Unable to change ownership of screenshot file %s: %s\n",
Felipe Leme3634a1e2015-12-09 10:11:47 -08001470 screenshot_path.c_str(), strerror(errno));
1471 }
Felipe Lemee338bf62015-12-07 14:03:50 -08001472 }
1473 }
1474
Felipe Leme1e9edc62015-12-21 16:02:13 -08001475 if (do_zip_file) {
1476 if (chown(path.c_str(), AID_SHELL, AID_SHELL)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001477 MYLOGE("Unable to change ownership of zip file %s: %s\n", path.c_str(), strerror(errno));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001478 }
1479 }
1480
Felipe Leme71bbfc52015-11-23 14:14:51 -08001481 if (is_redirecting) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001482 redirect_to_file(stderr, const_cast<char*>(log_path.c_str()));
Felipe Leme6fe9db62016-02-12 09:04:16 -08001483 if (chown(log_path.c_str(), AID_SHELL, AID_SHELL)) {
1484 MYLOGE("Unable to change ownership of dumpstate log file %s: %s\n",
1485 log_path.c_str(), strerror(errno));
1486 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001487 /* TODO: rather than generating a text file now and zipping it later,
1488 it would be more efficient to redirect stdout to the zip entry
1489 directly, but the libziparchive doesn't support that option yet. */
1490 redirect_to_file(stdout, const_cast<char*>(tmp_path.c_str()));
Felipe Leme6fe9db62016-02-12 09:04:16 -08001491 if (chown(tmp_path.c_str(), AID_SHELL, AID_SHELL)) {
1492 MYLOGE("Unable to change ownership of temporary bugreport file %s: %s\n",
1493 tmp_path.c_str(), strerror(errno));
1494 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001495 }
Felipe Leme608385d2016-02-01 10:35:38 -08001496 // NOTE: there should be no stdout output until now, otherwise it would break the header.
1497 // In particular, DurationReport objects should be created passing 'title, NULL', so their
Felipe Lemecbce55d2016-02-08 09:53:18 -08001498 // duration is logged into MYLOG instead.
Felipe Leme809d74e2016-02-02 12:57:00 -08001499 print_header(version);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001500
Felipe Lemecd4d6632017-01-05 15:05:46 -08001501 if (telephony_only) {
1502 dump_iptables();
1503 if (!drop_root_user()) {
1504 return -1;
1505 }
1506 do_dmesg();
1507 do_logcat();
1508 do_kmsg();
1509 dumpstate_board();
1510 dump_modem_logs();
1511 } else {
1512 // Dumps systrace right away, otherwise it will be filled with unnecessary events.
1513 // First try to dump anrd trace if the daemon is running. Otherwise, dump
1514 // the raw trace.
1515 if (!dump_anrd_trace()) {
1516 dump_systrace();
1517 }
1518
1519 // TODO: Drop root user and move into dumpstate() once b/28633932 is fixed.
1520 dump_raft();
1521
1522 // Invoking the following dumpsys calls before dump_traces() to try and
1523 // keep the system stats as close to its initial state as possible.
1524 run_command_as_shell("DUMPSYS MEMINFO", 30, "dumpsys", "-t", "30", "meminfo", "-a", NULL);
1525 run_command_as_shell("DUMPSYS CPUINFO", 10, "dumpsys", "-t", "10", "cpuinfo", "-a", NULL);
1526
1527 /* collect stack traces from Dalvik and native processes (needs root) */
1528 dump_traces_path = dump_traces();
1529
1530 /* Run some operations that require root. */
1531 get_tombstone_fds(tombstone_data);
1532 add_dir(RECOVERY_DIR, true);
1533 add_dir(RECOVERY_DATA_DIR, true);
1534 add_dir(LOGPERSIST_DATA_DIR, false);
1535 if (!is_user_build()) {
1536 add_dir(PROFILE_DATA_DIR_CUR, true);
1537 add_dir(PROFILE_DATA_DIR_REF, true);
1538 }
1539 add_mountinfo();
1540 dump_iptables();
1541
1542 // Capture any IPSec policies in play. No keys are exposed here.
1543 run_command("IP XFRM POLICY", 10, "ip", "xfrm", "policy", nullptr);
1544
1545 // Run ss as root so we can see socket marks.
1546 run_command("DETAILED SOCKET STATE", 10, "ss", "-eionptu", NULL);
1547
1548 if (!drop_root_user()) {
1549 return -1;
1550 }
1551
1552 dumpstate(do_early_screenshot ? "": screenshot_path, version);
Zhengyin Qian068ecc72016-08-10 16:48:14 -07001553 }
Felipe Leme71a74ac2016-03-17 15:43:25 -07001554
Felipe Leme55b42a62015-11-10 17:39:08 -08001555 /* close output if needed */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001556 if (is_redirecting) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001557 fclose(stdout);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001558 }
1559
Felipe Leme6e01fa62015-11-11 19:35:14 -08001560 /* rename or zip the (now complete) .tmp file to its final location */
1561 if (use_outfile) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001562
1563 /* check if user changed the suffix using system properties */
1564 char key[PROPERTY_KEY_MAX];
1565 char value[PROPERTY_VALUE_MAX];
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001566 snprintf(key, sizeof(key), "dumpstate.%d.name", getpid());
Felipe Lemead5f6c42015-11-30 14:26:46 -08001567 property_get(key, value, "");
1568 bool change_suffix= false;
1569 if (value[0]) {
1570 /* must whitelist which characters are allowed, otherwise it could cross directories */
1571 std::regex valid_regex("^[-_a-zA-Z0-9]+$");
1572 if (std::regex_match(value, valid_regex)) {
1573 change_suffix = true;
1574 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001575 MYLOGE("invalid suffix provided by user: %s\n", value);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001576 }
1577 }
1578 if (change_suffix) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001579 MYLOGI("changing suffix from %s to %s\n", suffix.c_str(), value);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001580 suffix = value;
1581 if (!screenshot_path.empty()) {
1582 std::string new_screenshot_path =
1583 bugreport_dir + "/" + base_name + "-" + suffix + ".png";
1584 if (rename(screenshot_path.c_str(), new_screenshot_path.c_str())) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001585 MYLOGE("rename(%s, %s): %s\n", screenshot_path.c_str(),
Felipe Lemead5f6c42015-11-30 14:26:46 -08001586 new_screenshot_path.c_str(), strerror(errno));
1587 } else {
1588 screenshot_path = new_screenshot_path;
1589 }
1590 }
1591 }
1592
Felipe Leme6e01fa62015-11-11 19:35:14 -08001593 bool do_text_file = true;
1594 if (do_zip_file) {
Felipe Leme88c79332016-02-22 11:06:49 -08001595 std::string entry_name = base_name + "-" + suffix + ".txt";
1596 MYLOGD("Adding main entry (%s) to .zip bugreport\n", entry_name.c_str());
1597 if (!finish_zip_file(entry_name, tmp_path, now)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001598 MYLOGE("Failed to finish zip file; sending text bugreport instead\n");
Felipe Leme6e01fa62015-11-11 19:35:14 -08001599 do_text_file = true;
1600 } else {
1601 do_text_file = false;
Felipe Leme91274352016-02-26 15:03:52 -08001602 // Since zip file is already created, it needs to be renamed.
1603 std::string new_path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip";
1604 if (path != new_path) {
1605 MYLOGD("Renaming zip file from %s to %s\n", path.c_str(), new_path.c_str());
1606 if (rename(path.c_str(), new_path.c_str())) {
1607 MYLOGE("rename(%s, %s): %s\n", path.c_str(),
1608 new_path.c_str(), strerror(errno));
1609 } else {
1610 path = new_path;
1611 }
1612 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001613 }
1614 }
1615 if (do_text_file) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001616 path = bugreport_dir + "/" + base_name + "-" + suffix + ".txt";
Felipe Leme88c79332016-02-22 11:06:49 -08001617 MYLOGD("Generating .txt bugreport at %s from %s\n", path.c_str(), tmp_path.c_str());
Felipe Lemead5f6c42015-11-30 14:26:46 -08001618 if (rename(tmp_path.c_str(), path.c_str())) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001619 MYLOGE("rename(%s, %s): %s\n", tmp_path.c_str(), path.c_str(), strerror(errno));
Felipe Leme6e01fa62015-11-11 19:35:14 -08001620 path.clear();
1621 }
1622 }
Felipe Leme2628e9e2016-04-12 16:36:51 -07001623 if (use_control_socket) {
1624 if (do_text_file) {
1625 dprintf(control_socket_fd, "FAIL:could not create zip file, check %s "
1626 "for more details\n", log_path.c_str());
1627 } else {
1628 dprintf(control_socket_fd, "OK:%s\n", path.c_str());
1629 }
1630 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001631 }
1632
Felipe Lemecc2a2fa2016-02-25 14:02:44 -08001633 /* vibrate a few but shortly times to let user know it's finished */
1634 if (vibrator) {
1635 for (int i = 0; i < 3; i++) {
1636 vibrate(vibrator.get(), 75);
1637 usleep((75 + 50) * 1000);
1638 }
1639 }
1640
Jeff Brown1dc94e32014-09-11 14:15:27 -07001641 /* tell activity manager we're done */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001642 if (do_broadcast) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001643 if (!path.empty()) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001644 MYLOGI("Final bugreport path: %s\n", path.c_str());
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001645 // clang-format off
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001646 std::vector<std::string> am_args = {
Felipe Leme43fd1bb2016-01-29 09:07:57 -08001647 "--receiver-permission", "android.permission.DUMP", "--receiver-foreground",
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001648 "--ei", "android.intent.extra.ID", std::to_string(id),
Felipe Leme71bbfc52015-11-23 14:14:51 -08001649 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
Felipe Lemeee2e4a02016-02-22 18:12:11 -08001650 "--ei", "android.intent.extra.MAX", std::to_string(weight_total),
Felipe Lemecbce55d2016-02-08 09:53:18 -08001651 "--es", "android.intent.extra.BUGREPORT", path,
1652 "--es", "android.intent.extra.DUMPSTATE_LOG", log_path
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001653 };
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001654 // clang-format on
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001655 if (do_fb) {
1656 am_args.push_back("--es");
1657 am_args.push_back("android.intent.extra.SCREENSHOT");
1658 am_args.push_back(screenshot_path);
1659 }
Michal Karpinski4db754f2015-12-11 18:04:32 +00001660 if (is_remote_mode) {
1661 am_args.push_back("--es");
1662 am_args.push_back("android.intent.extra.REMOTE_BUGREPORT_HASH");
1663 am_args.push_back(SHA256_file_hash(path));
1664 send_broadcast("android.intent.action.REMOTE_BUGREPORT_FINISHED", am_args);
1665 } else {
1666 send_broadcast("android.intent.action.BUGREPORT_FINISHED", am_args);
1667 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001668 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001669 MYLOGE("Skipping finished broadcast because bugreport could not be generated\n");
Felipe Leme6e01fa62015-11-11 19:35:14 -08001670 }
Jeff Sharkey27f9e6d2013-03-13 15:45:50 -07001671 }
1672
Felipe Lemecbce55d2016-02-08 09:53:18 -08001673 MYLOGD("Final progress: %d/%d (originally %d)\n", progress, weight_total, WEIGHT_TOTAL);
1674 MYLOGI("done\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001675
Felipe Leme107a05f2016-03-08 15:11:15 -08001676 if (is_redirecting) {
1677 fclose(stderr);
1678 }
1679
Felipe Leme02b7e002016-07-22 12:03:20 -07001680 if (use_control_socket && control_socket_fd != -1) {
1681 MYLOGD("Closing control socket\n");
1682 close(control_socket_fd);
Felipe Leme2628e9e2016-04-12 16:36:51 -07001683 }
1684
Colin Crossf45fa6b2012-03-26 12:38:26 -07001685 return 0;
1686}