blob: 357e73a18c4404bfce5c49f1c23feedb3e586992 [file] [log] [blame]
Colin Crossf45fa6b2012-03-26 12:38:26 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Mark Salyzyn6c3d90f2016-09-27 14:55:27 -070016#define LOG_TAG "dumpstate"
Colin Crossf45fa6b2012-03-26 12:38:26 -070017
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -070018#include <dirent.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070019#include <errno.h>
20#include <fcntl.h>
Felipe Lemead5f6c42015-11-30 14:26:46 -080021#include <libgen.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070022#include <limits.h>
Felipe Leme6e01fa62015-11-11 19:35:14 -080023#include <memory>
Felipe Lemead5f6c42015-11-30 14:26:46 -080024#include <regex>
Felipe Leme635ca312016-01-05 14:23:02 -080025#include <set>
Mark Salyzyn8f37aa52015-06-12 12:28:24 -070026#include <stdbool.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070027#include <stdio.h>
28#include <stdlib.h>
Felipe Leme6e01fa62015-11-11 19:35:14 -080029#include <string>
Colin Crossf45fa6b2012-03-26 12:38:26 -070030#include <string.h>
Christopher Ferris7dc7f322014-07-22 16:08:19 -070031#include <sys/prctl.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070032#include <sys/resource.h>
33#include <sys/stat.h>
34#include <sys/time.h>
35#include <sys/wait.h>
36#include <unistd.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070037
Zhengyin Qian068ecc72016-08-10 16:48:14 -070038#include <android-base/file.h>
Naveen Kallade591df2016-10-19 21:38:44 -070039#include <android-base/stringprintf.h>
40#include <android-base/strings.h>
Naveen Kalla27de3fc2016-10-28 15:22:47 -070041#include <android-base/unique_fd.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070042#include <cutils/properties.h>
43
Mark Salyzyn6c3d90f2016-09-27 14:55:27 -070044#include <private/android_filesystem_config.h>
45#include <private/android_logger.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070046
47#include "dumpstate.h"
Felipe Leme6e01fa62015-11-11 19:35:14 -080048#include "ziparchive/zip_writer.h"
49
Elliott Hughesc4dc1412016-04-12 16:28:31 -070050#include <openssl/sha.h>
Michal Karpinski4db754f2015-12-11 18:04:32 +000051
Felipe Leme6e01fa62015-11-11 19:35:14 -080052using android::base::StringPrintf;
Colin Crossf45fa6b2012-03-26 12:38:26 -070053
54/* read before root is shed */
55static char cmdline_buf[16384] = "(unknown)";
56static const char *dump_traces_path = NULL;
57
Felipe Lemeefd7e272016-05-18 09:27:16 -070058// TODO: variables below should be part of dumpstate object
Felipe Leme8fecfdd2016-02-09 10:40:07 -080059static unsigned long id;
Felipe Leme78f2c862015-12-21 09:55:22 -080060static char build_type[PROPERTY_VALUE_MAX];
Felipe Lemee82a27d2016-01-05 13:35:44 -080061static time_t now;
62static std::unique_ptr<ZipWriter> zip_writer;
Felipe Leme635ca312016-01-05 14:23:02 -080063static std::set<std::string> mount_points;
64void add_mountinfo();
Felipe Leme02b7e002016-07-22 12:03:20 -070065int control_socket_fd = -1;
Felipe Lemeefd7e272016-05-18 09:27:16 -070066/* suffix of the bugreport files - it's typically the date (when invoked with -d),
67 * although it could be changed by the user using a system property */
68static std::string suffix;
Felipe Leme78f2c862015-12-21 09:55:22 -080069
Todd Poynor2a83daa2013-11-22 15:44:22 -080070#define PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops"
Mark Salyzyn7d0a7622016-06-24 14:06:15 -070071#define ALT_PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops-0"
Todd Poynor2a83daa2013-11-22 15:44:22 -080072
Wei Liu341938b2016-04-27 16:18:17 -070073#define RAFT_DIR "/data/misc/raft"
Felipe Lemee82a27d2016-01-05 13:35:44 -080074#define RECOVERY_DIR "/cache/recovery"
Mark Salyzynd6ab0112016-03-25 12:56:39 -070075#define RECOVERY_DATA_DIR "/data/misc/recovery"
Mark Salyzyn4d42dea2016-04-01 10:03:14 -070076#define LOGPERSIST_DATA_DIR "/data/misc/logd"
David Brazdild2991962016-06-03 14:40:44 +010077#define PROFILE_DATA_DIR_CUR "/data/misc/profiles/cur"
78#define PROFILE_DATA_DIR_REF "/data/misc/profiles/ref"
Christopher Ferris7dc7f322014-07-22 16:08:19 -070079#define TOMBSTONE_DIR "/data/tombstones"
80#define TOMBSTONE_FILE_PREFIX TOMBSTONE_DIR "/tombstone_"
81/* Can accomodate a tombstone number up to 9999. */
82#define TOMBSTONE_MAX_LEN (sizeof(TOMBSTONE_FILE_PREFIX) + 4)
83#define NUM_TOMBSTONES 10
Erik Kline08165202016-05-30 11:55:44 +090084#define WLUTIL "/vendor/xbin/wlutil"
Christopher Ferris7dc7f322014-07-22 16:08:19 -070085
86typedef struct {
87 char name[TOMBSTONE_MAX_LEN];
88 int fd;
89} tombstone_data_t;
90
91static tombstone_data_t tombstone_data[NUM_TOMBSTONES];
92
Felipe Leme71ca15e2016-05-19 16:18:17 -070093const std::string ZIP_ROOT_DIR = "FS";
94std::string bugreport_dir;
Felipe Lemee82a27d2016-01-05 13:35:44 -080095
Felipe Leme809d74e2016-02-02 12:57:00 -080096/*
97 * List of supported zip format versions.
98 *
99 * See bugreport-format.txt for more info.
100 */
Felipe Lemeca9c12e2016-05-19 16:30:15 -0700101static std::string VERSION_DEFAULT = "1.0";
Felipe Leme809d74e2016-02-02 12:57:00 -0800102
Calvin On249beee2016-06-03 15:17:07 -0700103bool is_user_build() {
Felipe Lemec4eee562016-04-21 15:42:55 -0700104 return 0 == strncmp(build_type, "user", PROPERTY_VALUE_MAX - 1);
105}
106
Felipe Lemee82a27d2016-01-05 13:35:44 -0800107/* gets the tombstone data, according to the bugreport type: if zipped gets all tombstones,
108 * otherwise gets just those modified in the last half an hour. */
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700109static void get_tombstone_fds(tombstone_data_t data[NUM_TOMBSTONES]) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800110 time_t thirty_minutes_ago = now - 60*30;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700111 for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
112 snprintf(data[i].name, sizeof(data[i].name), "%s%02zu", TOMBSTONE_FILE_PREFIX, i);
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800113 int fd = TEMP_FAILURE_RETRY(open(data[i].name,
114 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700115 struct stat st;
116 if (fstat(fd, &st) == 0 && S_ISREG(st.st_mode) &&
Felipe Lemee82a27d2016-01-05 13:35:44 -0800117 (zip_writer || (time_t) st.st_mtime >= thirty_minutes_ago)) {
118 data[i].fd = fd;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700119 } else {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800120 close(fd);
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700121 data[i].fd = -1;
122 }
123 }
124}
125
Felipe Leme635ca312016-01-05 14:23:02 -0800126// for_each_pid() callback to get mount info about a process.
127void do_mountinfo(int pid, const char *name) {
128 char path[PATH_MAX];
129
130 // Gets the the content of the /proc/PID/ns/mnt link, so only unique mount points
131 // are added.
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700132 snprintf(path, sizeof(path), "/proc/%d/ns/mnt", pid);
Felipe Leme635ca312016-01-05 14:23:02 -0800133 char linkname[PATH_MAX];
134 ssize_t r = readlink(path, linkname, PATH_MAX);
135 if (r == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800136 MYLOGE("Unable to read link for %s: %s\n", path, strerror(errno));
Felipe Leme635ca312016-01-05 14:23:02 -0800137 return;
138 }
139 linkname[r] = '\0';
140
141 if (mount_points.find(linkname) == mount_points.end()) {
142 // First time this mount point was found: add it
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700143 snprintf(path, sizeof(path), "/proc/%d/mountinfo", pid);
Felipe Leme635ca312016-01-05 14:23:02 -0800144 if (add_zip_entry(ZIP_ROOT_DIR + path, path)) {
145 mount_points.insert(linkname);
146 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800147 MYLOGE("Unable to add mountinfo %s to zip file\n", path);
Felipe Leme635ca312016-01-05 14:23:02 -0800148 }
149 }
150}
151
152void add_mountinfo() {
Felipe Leme03974982016-10-21 11:38:26 -0700153 if (!is_zipping()) return;
Felipe Leme635ca312016-01-05 14:23:02 -0800154 const char *title = "MOUNT INFO";
155 mount_points.clear();
Felipe Leme608385d2016-02-01 10:35:38 -0800156 DurationReporter duration_reporter(title, NULL);
Felipe Leme635ca312016-01-05 14:23:02 -0800157 for_each_pid(do_mountinfo, NULL);
Felipe Leme1b0225a2016-02-09 16:35:14 -0800158 MYLOGD("%s: %d entries added to zip file\n", title, (int) mount_points.size());
Felipe Leme635ca312016-01-05 14:23:02 -0800159}
160
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -0700161static void dump_dev_files(const char *title, const char *driverpath, const char *filename)
162{
163 DIR *d;
164 struct dirent *de;
165 char path[PATH_MAX];
166
167 d = opendir(driverpath);
168 if (d == NULL) {
169 return;
170 }
171
172 while ((de = readdir(d))) {
173 if (de->d_type != DT_LNK) {
174 continue;
175 }
176 snprintf(path, sizeof(path), "%s/%s/%s", driverpath, de->d_name, filename);
177 dump_file(title, path);
178 }
179
180 closedir(d);
181}
182
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700183// return pid of a userspace process. If not found or error, return 0.
184static unsigned int pid_of_process(const char* ps_name) {
185 DIR *proc_dir;
186 struct dirent *ps;
187 unsigned int pid;
188 std::string cmdline;
189
190 if (!(proc_dir = opendir("/proc"))) {
191 MYLOGE("Can't open /proc\n");
192 return 0;
193 }
194
195 while ((ps = readdir(proc_dir))) {
196 if (!(pid = atoi(ps->d_name))) {
197 continue;
198 }
199 android::base::ReadFileToString("/proc/"
200 + std::string(ps->d_name) + "/cmdline", &cmdline);
201 if (cmdline.find(ps_name) == std::string::npos) {
202 continue;
203 } else {
204 closedir(proc_dir);
205 return pid;
206 }
207 }
208 closedir(proc_dir);
209 return 0;
210}
211
212// dump anrd's trace and add to the zip file.
213// 1. check if anrd is running on this device.
214// 2. send a SIGUSR1 to its pid which will dump anrd's trace.
215// 3. wait until the trace generation completes and add to the zip file.
216static bool dump_anrd_trace() {
217 unsigned int pid;
218 char buf[50], path[PATH_MAX];
219 struct dirent *trace;
220 struct stat st;
221 DIR *trace_dir;
Zhengyin Qianafc38fe2016-09-08 16:50:09 -0700222 int retry = 5;
223 long max_ctime = 0, old_mtime;
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700224 long long cur_size = 0;
225 const char *trace_path = "/data/misc/anrd/";
226
227 if (!zip_writer) {
228 MYLOGE("Not dumping anrd trace because zip_writer is not set\n");
229 return false;
230 }
231
232 // find anrd's pid if it is running.
233 pid = pid_of_process("/system/xbin/anrd");
234
235 if (pid > 0) {
Zhengyin Qianafc38fe2016-09-08 16:50:09 -0700236 if (stat(trace_path, &st) == 0) {
237 old_mtime = st.st_mtime;
238 } else {
239 MYLOGE("Failed to find: %s\n", trace_path);
240 return false;
241 }
242
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700243 // send SIGUSR1 to the anrd to generate a trace.
244 sprintf(buf, "%u", pid);
245 if (run_command("ANRD_DUMP", 1, "kill", "-SIGUSR1", buf, NULL)) {
246 MYLOGE("anrd signal timed out. Please manually collect trace\n");
247 return false;
248 }
249
Zhengyin Qianafc38fe2016-09-08 16:50:09 -0700250 while (retry-- > 0 && old_mtime == st.st_mtime) {
251 sleep(1);
252 stat(trace_path, &st);
253 }
254
255 if (retry < 0 && old_mtime == st.st_mtime) {
256 MYLOGE("Failed to stat %s or trace creation timeout\n", trace_path);
257 return false;
258 }
259
Zhengyin Qian068ecc72016-08-10 16:48:14 -0700260 // identify the trace file by its creation time.
261 if (!(trace_dir = opendir(trace_path))) {
262 MYLOGE("Can't open trace file under %s\n", trace_path);
263 }
264 while ((trace = readdir(trace_dir))) {
265 if (strcmp(trace->d_name, ".") == 0
266 || strcmp(trace->d_name, "..") == 0) {
267 continue;
268 }
269 sprintf(path, "%s%s", trace_path, trace->d_name);
270 if (stat(path, &st) == 0) {
271 if (st.st_ctime > max_ctime) {
272 max_ctime = st.st_ctime;
273 sprintf(buf, "%s", trace->d_name);
274 }
275 }
276 }
277 closedir(trace_dir);
278
279 // Wait until the dump completes by checking the size of the trace.
280 if (max_ctime > 0) {
281 sprintf(path, "%s%s", trace_path, buf);
282 while(true) {
283 sleep(1);
284 if (stat(path, &st) == 0) {
285 if (st.st_size == cur_size) {
286 break;
287 } else if (st.st_size > cur_size) {
288 cur_size = st.st_size;
289 } else {
290 return false;
291 }
292 } else {
293 MYLOGE("Cant stat() %s anymore\n", path);
294 return false;
295 }
296 }
297 // Add to the zip file.
298 if (!add_zip_entry("anrd_trace.txt", path)) {
299 MYLOGE("Unable to add anrd_trace file %s to zip file\n", path);
300 } else {
301 if (remove(path)) {
302 MYLOGE("Error removing anrd_trace file %s: %s", path, strerror(errno));
303 }
304 return true;
305 }
306 } else {
307 MYLOGE("Can't stats any trace file under %s\n", trace_path);
308 }
309 }
310 return false;
311}
312
Felipe Lemeefd7e272016-05-18 09:27:16 -0700313static void dump_systrace() {
Felipe Leme03974982016-10-21 11:38:26 -0700314 if (!is_zipping()) {
315 MYLOGD("Not dumping systrace because dumpstate is not zipping\n");
Felipe Leme71a74ac2016-03-17 15:43:25 -0700316 return;
317 }
Felipe Lemeefd7e272016-05-18 09:27:16 -0700318 std::string systrace_path = bugreport_dir + "/systrace-" + suffix + ".txt";
Felipe Leme14e034a2016-03-30 18:51:03 -0700319 if (systrace_path.empty()) {
320 MYLOGE("Not dumping systrace because path is empty\n");
321 return;
322 }
Felipe Leme71a74ac2016-03-17 15:43:25 -0700323 const char* path = "/sys/kernel/debug/tracing/tracing_on";
324 long int is_tracing;
325 if (read_file_as_long(path, &is_tracing)) {
326 return; // error already logged
327 }
328 if (is_tracing <= 0) {
329 MYLOGD("Skipping systrace because '%s' content is '%ld'\n", path, is_tracing);
330 return;
331 }
332
Felipe Leme14e034a2016-03-30 18:51:03 -0700333 MYLOGD("Running '/system/bin/atrace --async_dump -o %s', which can take several minutes",
334 systrace_path.c_str());
335 if (run_command("SYSTRACE", 120, "/system/bin/atrace", "--async_dump", "-o",
336 systrace_path.c_str(), NULL)) {
337 MYLOGE("systrace timed out, its zip entry will be incomplete\n");
338 // TODO: run_command tries to kill the process, but atrace doesn't die peacefully; ideally,
339 // we should call strace to stop itself, but there is no such option yet (just a
340 // --async_stop, which stops and dump
341 // if (run_command("SYSTRACE", 10, "/system/bin/atrace", "--kill", NULL)) {
342 // MYLOGE("could not stop systrace ");
343 // }
344 }
345 if (!add_zip_entry("systrace.txt", systrace_path)) {
346 MYLOGE("Unable to add systrace file %s to zip file\n", systrace_path.c_str());
Felipe Leme71a74ac2016-03-17 15:43:25 -0700347 } else {
Felipe Leme14e034a2016-03-30 18:51:03 -0700348 if (remove(systrace_path.c_str())) {
349 MYLOGE("Error removing systrace file %s: %s", systrace_path.c_str(), strerror(errno));
350 }
Felipe Leme71a74ac2016-03-17 15:43:25 -0700351 }
352}
353
Felipe Lemeefd7e272016-05-18 09:27:16 -0700354static void dump_raft() {
Wei Liu341938b2016-04-27 16:18:17 -0700355 if (is_user_build()) {
356 return;
357 }
358
Felipe Lemeefd7e272016-05-18 09:27:16 -0700359 std::string raft_log_path = bugreport_dir + "/raft_log.txt";
Wei Liu341938b2016-04-27 16:18:17 -0700360 if (raft_log_path.empty()) {
361 MYLOGD("raft_log_path is empty\n");
362 return;
363 }
Wei Liuf0e78d42016-05-25 14:21:02 -0700364
365 struct stat s;
366 if (stat(RAFT_DIR, &s) != 0 || !S_ISDIR(s.st_mode)) {
367 MYLOGD("%s does not exist or is not a directory\n", RAFT_DIR);
368 return;
369 }
370
Felipe Leme03974982016-10-21 11:38:26 -0700371 if (!is_zipping()) {
Wei Liu310525a2016-05-25 11:28:57 -0700372 // Write compressed and encoded raft logs to stdout if not zip_writer.
373 run_command("RAFT LOGS", 600, "logcompressor", "-r", RAFT_DIR, NULL);
Wei Liu341938b2016-04-27 16:18:17 -0700374 return;
375 }
376
377 run_command("RAFT LOGS", 600, "logcompressor", "-n", "-r", RAFT_DIR,
378 "-o", raft_log_path.c_str(), NULL);
379 if (!add_zip_entry("raft_log.txt", raft_log_path)) {
380 MYLOGE("Unable to add raft log %s to zip file\n", raft_log_path.c_str());
381 } else {
382 if (remove(raft_log_path.c_str())) {
Felipe Lemeefd7e272016-05-18 09:27:16 -0700383 MYLOGE("Error removing raft file %s: %s\n", raft_log_path.c_str(), strerror(errno));
Wei Liu341938b2016-04-27 16:18:17 -0700384 }
385 }
386}
387
Naveen Kallade591df2016-10-19 21:38:44 -0700388/**
389 * Finds the last modified file in the directory dir whose name starts with file_prefix
390 * Function returns empty string when it does not find a file
391 */
392static std::string get_last_modified_file_matching_prefix(const std::string& dir,
393 const std::string& file_prefix) {
394 std::unique_ptr<DIR, decltype(&closedir)> d(opendir(dir.c_str()), closedir);
395 if (d == nullptr) {
396 MYLOGD("Error %d opening %s\n", errno, dir.c_str());
397 return "";
398 }
399
400 // Find the newest file matching the file_prefix in dir
401 struct dirent *de;
402 time_t last_modified = 0;
403 std::string last_modified_file = "";
404 struct stat s;
405
406 while ((de = readdir(d.get()))) {
407 std::string file = std::string(de->d_name);
408 if (!file_prefix.empty()) {
409 if (!android::base::StartsWith(file, file_prefix.c_str())) continue;
410 }
411 file = dir + "/" + file;
412 int ret = stat(file.c_str(), &s);
413
414 if ((ret == 0) && (s.st_mtime > last_modified)) {
415 last_modified_file = file;
416 last_modified = s.st_mtime;
417 }
418 }
419
420 return last_modified_file;
421}
422
423void dump_modem_logs() {
424 DurationReporter duration_reporter("dump_modem_logs");
425 if (is_user_build()) {
426 return;
427 }
428
429 if (!is_zipping()) {
430 MYLOGD("Not dumping modem logs. dumpstate is not generating a zipping bugreport\n");
431 return;
432 }
433
434 char property[PROPERTY_VALUE_MAX];
435 property_get("ro.radio.log_prefix", property, "");
436 std::string file_prefix = std::string(property);
437 if(file_prefix.empty()) {
438 MYLOGD("No modem log : file_prefix is empty\n");
439 return;
440 }
441
442 MYLOGD("dump_modem_logs: directory is %s and file_prefix is %s\n",
443 bugreport_dir.c_str(), file_prefix.c_str());
444
445 std::string modem_log_file =
446 get_last_modified_file_matching_prefix(bugreport_dir, file_prefix);
447
448 struct stat s;
449 if (modem_log_file.empty() || stat(modem_log_file.c_str(), &s) != 0) {
450 MYLOGD("Modem log %s does not exist\n", modem_log_file.c_str());
451 return;
452 }
453
454 std::string filename = basename(modem_log_file.c_str());
455 if (!add_zip_entry(filename, modem_log_file)) {
456 MYLOGE("Unable to add modem log %s to zip file\n", modem_log_file.c_str());
457 } else {
458 MYLOGD("Modem Log %s is added to zip\n", modem_log_file.c_str());
Naveen Kallab77df782016-11-18 17:32:23 -0800459 if (remove(modem_log_file.c_str())) {
460 MYLOGE("Error removing modem log %s\n", modem_log_file.c_str());
461 }
Naveen Kallade591df2016-10-19 21:38:44 -0700462 }
463}
464
Mark Salyzyn326842f2015-04-30 09:49:41 -0700465static bool skip_not_stat(const char *path) {
466 static const char stat[] = "/stat";
467 size_t len = strlen(path);
468 if (path[len - 1] == '/') { /* Directory? */
469 return false;
470 }
471 return strcmp(path + len - sizeof(stat) + 1, stat); /* .../stat? */
472}
473
Felipe Lemee82a27d2016-01-05 13:35:44 -0800474static bool skip_none(const char *path) {
475 return false;
476}
477
Mark Salyzyn326842f2015-04-30 09:49:41 -0700478static const char mmcblk0[] = "/sys/block/mmcblk0/";
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700479unsigned long worst_write_perf = 20000; /* in KB/s */
Mark Salyzyn326842f2015-04-30 09:49:41 -0700480
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800481//
482// stat offsets
483// Name units description
484// ---- ----- -----------
485// read I/Os requests number of read I/Os processed
486#define __STAT_READ_IOS 0
487// read merges requests number of read I/Os merged with in-queue I/O
488#define __STAT_READ_MERGES 1
489// read sectors sectors number of sectors read
490#define __STAT_READ_SECTORS 2
491// read ticks milliseconds total wait time for read requests
492#define __STAT_READ_TICKS 3
493// write I/Os requests number of write I/Os processed
494#define __STAT_WRITE_IOS 4
495// write merges requests number of write I/Os merged with in-queue I/O
496#define __STAT_WRITE_MERGES 5
497// write sectors sectors number of sectors written
498#define __STAT_WRITE_SECTORS 6
499// write ticks milliseconds total wait time for write requests
500#define __STAT_WRITE_TICKS 7
501// in_flight requests number of I/Os currently in flight
502#define __STAT_IN_FLIGHT 8
503// io_ticks milliseconds total time this block device has been active
504#define __STAT_IO_TICKS 9
505// time_in_queue milliseconds total wait time for all requests
506#define __STAT_IN_QUEUE 10
507#define __STAT_NUMBER_FIELD 11
508//
509// read I/Os, write I/Os
510// =====================
511//
512// These values increment when an I/O request completes.
513//
514// read merges, write merges
515// =========================
516//
517// These values increment when an I/O request is merged with an
518// already-queued I/O request.
519//
520// read sectors, write sectors
521// ===========================
522//
523// These values count the number of sectors read from or written to this
524// block device. The "sectors" in question are the standard UNIX 512-byte
525// sectors, not any device- or filesystem-specific block size. The
526// counters are incremented when the I/O completes.
527#define SECTOR_SIZE 512
528//
529// read ticks, write ticks
530// =======================
531//
532// These values count the number of milliseconds that I/O requests have
533// waited on this block device. If there are multiple I/O requests waiting,
534// these values will increase at a rate greater than 1000/second; for
535// example, if 60 read requests wait for an average of 30 ms, the read_ticks
536// field will increase by 60*30 = 1800.
537//
538// in_flight
539// =========
540//
541// This value counts the number of I/O requests that have been issued to
542// the device driver but have not yet completed. It does not include I/O
543// requests that are in the queue but not yet issued to the device driver.
544//
545// io_ticks
546// ========
547//
548// This value counts the number of milliseconds during which the device has
549// had I/O requests queued.
550//
551// time_in_queue
552// =============
553//
554// This value counts the number of milliseconds that I/O requests have waited
555// on this block device. If there are multiple I/O requests waiting, this
556// value will increase as the product of the number of milliseconds times the
557// number of requests waiting (see "read ticks" above for an example).
558#define S_TO_MS 1000
559//
560
Mark Salyzyn326842f2015-04-30 09:49:41 -0700561static int dump_stat_from_fd(const char *title __unused, const char *path, int fd) {
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800562 unsigned long long fields[__STAT_NUMBER_FIELD];
Mark Salyzyn326842f2015-04-30 09:49:41 -0700563 bool z;
564 char *cp, *buffer = NULL;
565 size_t i = 0;
566 FILE *fp = fdopen(fd, "rb");
567 getline(&buffer, &i, fp);
568 fclose(fp);
569 if (!buffer) {
570 return -errno;
571 }
572 i = strlen(buffer);
573 while ((i > 0) && (buffer[i - 1] == '\n')) {
574 buffer[--i] = '\0';
575 }
576 if (!*buffer) {
577 free(buffer);
578 return 0;
579 }
580 z = true;
581 for (cp = buffer, i = 0; i < (sizeof(fields) / sizeof(fields[0])); ++i) {
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800582 fields[i] = strtoull(cp, &cp, 10);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700583 if (fields[i] != 0) {
584 z = false;
585 }
586 }
587 if (z) { /* never accessed */
588 free(buffer);
589 return 0;
590 }
591
592 if (!strncmp(path, mmcblk0, sizeof(mmcblk0) - 1)) {
593 path += sizeof(mmcblk0) - 1;
594 }
595
596 printf("%s: %s\n", path, buffer);
597 free(buffer);
598
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800599 if (fields[__STAT_IO_TICKS]) {
600 unsigned long read_perf = 0;
601 unsigned long read_ios = 0;
602 if (fields[__STAT_READ_TICKS]) {
603 unsigned long long divisor = fields[__STAT_READ_TICKS]
604 * fields[__STAT_IO_TICKS];
605 read_perf = ((unsigned long long)SECTOR_SIZE
606 * fields[__STAT_READ_SECTORS]
607 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
608 / divisor;
609 read_ios = ((unsigned long long)S_TO_MS * fields[__STAT_READ_IOS]
610 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
611 / divisor;
612 }
613
614 unsigned long write_perf = 0;
615 unsigned long write_ios = 0;
616 if (fields[__STAT_WRITE_TICKS]) {
617 unsigned long long divisor = fields[__STAT_WRITE_TICKS]
618 * fields[__STAT_IO_TICKS];
619 write_perf = ((unsigned long long)SECTOR_SIZE
620 * fields[__STAT_WRITE_SECTORS]
621 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
622 / divisor;
623 write_ios = ((unsigned long long)S_TO_MS * fields[__STAT_WRITE_IOS]
624 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
625 / divisor;
626 }
627
628 unsigned queue = (fields[__STAT_IN_QUEUE]
629 + (fields[__STAT_IO_TICKS] >> 1))
630 / fields[__STAT_IO_TICKS];
631
632 if (!write_perf && !write_ios) {
633 printf("%s: perf(ios) rd: %luKB/s(%lu/s) q: %u\n",
634 path, read_perf, read_ios, queue);
635 } else {
636 printf("%s: perf(ios) rd: %luKB/s(%lu/s) wr: %luKB/s(%lu/s) q: %u\n",
637 path, read_perf, read_ios, write_perf, write_ios, queue);
638 }
639
640 /* bugreport timeout factor adjustment */
641 if ((write_perf > 1) && (write_perf < worst_write_perf)) {
642 worst_write_perf = write_perf;
643 }
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700644 }
Mark Salyzyn326842f2015-04-30 09:49:41 -0700645 return 0;
646}
647
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700648/* timeout in ms */
Felipe Leme8620bb42015-11-10 11:04:45 -0800649static unsigned long logcat_timeout(const char *name) {
Mark Salyzyn6c3d90f2016-09-27 14:55:27 -0700650 log_id_t id = android_name_to_log_id(name);
651 unsigned long property_size = __android_logger_get_buffer_size(id);
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700652 /* Engineering margin is ten-fold our guess */
653 return 10 * (property_size + worst_write_perf) / worst_write_perf;
654}
655
Colin Crossf45fa6b2012-03-26 12:38:26 -0700656/* dumps the current system state to stdout */
Felipe Leme809d74e2016-02-02 12:57:00 -0800657static void print_header(std::string version) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700658 char build[PROPERTY_VALUE_MAX], fingerprint[PROPERTY_VALUE_MAX];
659 char radio[PROPERTY_VALUE_MAX], bootloader[PROPERTY_VALUE_MAX];
660 char network[PROPERTY_VALUE_MAX], date[80];
Colin Crossf45fa6b2012-03-26 12:38:26 -0700661
662 property_get("ro.build.display.id", build, "(unknown)");
663 property_get("ro.build.fingerprint", fingerprint, "(unknown)");
664 property_get("ro.build.type", build_type, "(unknown)");
Junda Liu58ad9292016-06-12 11:51:54 -0700665 property_get("gsm.version.baseband", radio, "(unknown)");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700666 property_get("ro.bootloader", bootloader, "(unknown)");
667 property_get("gsm.operator.alpha", network, "(unknown)");
668 strftime(date, sizeof(date), "%Y-%m-%d %H:%M:%S", localtime(&now));
669
670 printf("========================================================\n");
671 printf("== dumpstate: %s\n", date);
672 printf("========================================================\n");
673
674 printf("\n");
675 printf("Build: %s\n", build);
676 printf("Build fingerprint: '%s'\n", fingerprint); /* format is important for other tools */
677 printf("Bootloader: %s\n", bootloader);
678 printf("Radio: %s\n", radio);
679 printf("Network: %s\n", network);
680
681 printf("Kernel: ");
682 dump_file(NULL, "/proc/version");
683 printf("Command line: %s\n", strtok(cmdline_buf, "\n"));
Felipe Leme809d74e2016-02-02 12:57:00 -0800684 printf("Bugreport format version: %s\n", version.c_str());
Felipe Leme8fecfdd2016-02-09 10:40:07 -0800685 printf("Dumpstate info: id=%lu pid=%d\n", id, getpid());
Colin Crossf45fa6b2012-03-26 12:38:26 -0700686 printf("\n");
Felipe Leme78f2c862015-12-21 09:55:22 -0800687}
688
Felipe Leme24b66ee2016-06-16 10:55:26 -0700689// List of file extensions that can cause a zip file attachment to be rejected by some email
690// service providers.
691static const std::set<std::string> PROBLEMATIC_FILE_EXTENSIONS = {
692 ".ade", ".adp", ".bat", ".chm", ".cmd", ".com", ".cpl", ".exe", ".hta", ".ins", ".isp",
693 ".jar", ".jse", ".lib", ".lnk", ".mde", ".msc", ".msp", ".mst", ".pif", ".scr", ".sct",
694 ".shb", ".sys", ".vb", ".vbe", ".vbs", ".vxd", ".wsc", ".wsf", ".wsh"
695};
696
Felipe Leme71ca15e2016-05-19 16:18:17 -0700697bool add_zip_entry_from_fd(const std::string& entry_name, int fd) {
Felipe Leme03974982016-10-21 11:38:26 -0700698 if (!is_zipping()) {
699 MYLOGD("Not adding entry %s from fd because dumpstate is not zipping\n",
Felipe Leme88c79332016-02-22 11:06:49 -0800700 entry_name.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -0800701 return false;
702 }
Felipe Leme24b66ee2016-06-16 10:55:26 -0700703 std::string valid_name = entry_name;
704
705 // Rename extension if necessary.
706 size_t idx = entry_name.rfind(".");
707 if (idx != std::string::npos) {
708 std::string extension = entry_name.substr(idx);
709 std::transform(extension.begin(), extension.end(), extension.begin(), ::tolower);
710 if (PROBLEMATIC_FILE_EXTENSIONS.count(extension) != 0) {
711 valid_name = entry_name + ".renamed";
712 MYLOGI("Renaming entry %s to %s\n", entry_name.c_str(), valid_name.c_str());
713 }
714 }
715
Felipe Leme6fe9db62016-02-12 09:04:16 -0800716 // Logging statement below is useful to time how long each entry takes, but it's too verbose.
717 // MYLOGD("Adding zip entry %s\n", entry_name.c_str());
Felipe Leme24b66ee2016-06-16 10:55:26 -0700718 int32_t err = zip_writer->StartEntryWithTime(valid_name.c_str(),
Felipe Lemee82a27d2016-01-05 13:35:44 -0800719 ZipWriter::kCompress, get_mtime(fd, now));
720 if (err) {
Felipe Leme24b66ee2016-06-16 10:55:26 -0700721 MYLOGE("zip_writer->StartEntryWithTime(%s): %s\n", valid_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800722 ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800723 return false;
724 }
725
Felipe Leme770410d2016-01-26 17:07:14 -0800726 std::vector<uint8_t> buffer(65536);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800727 while (1) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800728 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer.data(), sizeof(buffer)));
729 if (bytes_read == 0) {
730 break;
731 } else if (bytes_read == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800732 MYLOGE("read(%s): %s\n", entry_name.c_str(), strerror(errno));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800733 return false;
734 }
735 err = zip_writer->WriteBytes(buffer.data(), bytes_read);
736 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800737 MYLOGE("zip_writer->WriteBytes(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800738 return false;
739 }
740 }
741
742 err = zip_writer->FinishEntry();
743 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800744 MYLOGE("zip_writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800745 return false;
746 }
747
748 return true;
749}
750
Felipe Leme71ca15e2016-05-19 16:18:17 -0700751bool add_zip_entry(const std::string& entry_name, const std::string& entry_path) {
Andreas Gampe27cd7b22016-07-18 18:24:05 -0700752 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(entry_path.c_str(), O_RDONLY | O_NONBLOCK
753 | O_CLOEXEC)));
Andreas Gampefcc8db92016-07-18 18:01:27 -0700754 if (fd == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800755 MYLOGE("open(%s): %s\n", entry_path.c_str(), strerror(errno));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800756 return false;
757 }
758
759 return add_zip_entry_from_fd(entry_name, fd.get());
760}
761
762/* adds a file to the existing zipped bugreport */
763static int _add_file_from_fd(const char *title, const char *path, int fd) {
764 return add_zip_entry_from_fd(ZIP_ROOT_DIR + path, fd) ? 0 : 1;
765}
766
Felipe Leme24b66ee2016-06-16 10:55:26 -0700767// TODO: move to util.cpp
Felipe Lemee82a27d2016-01-05 13:35:44 -0800768void add_dir(const char *dir, bool recursive) {
Felipe Leme03974982016-10-21 11:38:26 -0700769 if (!is_zipping()) {
770 MYLOGD("Not adding dir %s because dumpstate is not zipping\n", dir);
Felipe Leme111b9d02016-02-03 09:28:24 -0800771 return;
772 }
Felipe Leme88c79332016-02-22 11:06:49 -0800773 MYLOGD("Adding dir %s (recursive: %d)\n", dir, recursive);
Felipe Leme608385d2016-02-01 10:35:38 -0800774 DurationReporter duration_reporter(dir, NULL);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800775 dump_files(NULL, dir, recursive ? skip_none : is_dir, _add_file_from_fd);
776}
777
Felipe Leme03974982016-10-21 11:38:26 -0700778bool is_zipping() {
779 return zip_writer != nullptr;
780}
781
Felipe Leme809d74e2016-02-02 12:57:00 -0800782/* adds a text entry entry to the existing zip file. */
783static bool add_text_zip_entry(const std::string& entry_name, const std::string& content) {
Felipe Leme03974982016-10-21 11:38:26 -0700784 if (!is_zipping()) {
785 MYLOGD("Not adding text entry %s because dumpstate is not zipping\n", entry_name.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -0800786 return false;
787 }
Felipe Lemecbce55d2016-02-08 09:53:18 -0800788 MYLOGD("Adding zip text entry %s\n", entry_name.c_str());
Felipe Leme809d74e2016-02-02 12:57:00 -0800789 int32_t err = zip_writer->StartEntryWithTime(entry_name.c_str(), ZipWriter::kCompress, now);
790 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800791 MYLOGE("zip_writer->StartEntryWithTime(%s): %s\n", entry_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800792 ZipWriter::ErrorCodeString(err));
793 return false;
794 }
795
796 err = zip_writer->WriteBytes(content.c_str(), content.length());
797 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800798 MYLOGE("zip_writer->WriteBytes(%s): %s\n", entry_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800799 ZipWriter::ErrorCodeString(err));
800 return false;
801 }
802
803 err = zip_writer->FinishEntry();
804 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800805 MYLOGE("zip_writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Leme809d74e2016-02-02 12:57:00 -0800806 return false;
807 }
808
809 return true;
810}
811
Felipe Lemec0808152016-06-17 17:37:13 -0700812static void dump_iptables() {
813 run_command("IPTABLES", 10, "iptables", "-L", "-nvx", NULL);
814 run_command("IP6TABLES", 10, "ip6tables", "-L", "-nvx", NULL);
Erik Kline53ca94a2016-09-28 17:26:26 +0900815 run_command("IPTABLES NAT", 10, "iptables", "-t", "nat", "-L", "-nvx", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -0700816 /* no ip6 nat */
Erik Kline53ca94a2016-09-28 17:26:26 +0900817 run_command("IPTABLES MANGLE", 10, "iptables", "-t", "mangle", "-L", "-nvx", NULL);
818 run_command("IP6TABLES MANGLE", 10, "ip6tables", "-t", "mangle", "-L", "-nvx", NULL);
819 run_command("IPTABLES RAW", 10, "iptables", "-t", "raw", "-L", "-nvx", NULL);
820 run_command("IP6TABLES RAW", 10, "ip6tables", "-t", "raw", "-L", "-nvx", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -0700821}
822
Srinath Sridharanfdf52d32016-02-01 15:50:22 -0800823static void dumpstate(const std::string& screenshot_path, const std::string& version) {
Felipe Leme770410d2016-01-26 17:07:14 -0800824 DurationReporter duration_reporter("DUMPSTATE");
Felipe Leme78f2c862015-12-21 09:55:22 -0800825 unsigned long timeout;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700826
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -0700827 dump_dev_files("TRUSTY VERSION", "/sys/bus/platform/drivers/trusty", "trusty_version");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700828 run_command("UPTIME", 10, "uptime", NULL);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700829 dump_files("UPTIME MMC PERF", mmcblk0, skip_not_stat, dump_stat_from_fd);
Mark Salyzyn8c8130e2015-12-09 11:21:28 -0800830 dump_emmc_ecsd("/d/mmc0/mmc0:0001/ext_csd");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700831 dump_file("MEMORY INFO", "/proc/meminfo");
Elliott Hughes52860032016-06-14 13:56:00 -0700832 run_command("CPU INFO", 10, "top", "-b", "-n", "1", "-H", "-s", "6",
Elliott Hughes646e92f2016-06-13 17:35:07 -0700833 "-o", "pid,tid,user,pr,ni,%cpu,s,virt,res,pcy,cmd,name", NULL);
Nick Kralevich2b1f88b2015-10-07 16:38:42 -0700834 run_command("PROCRANK", 20, SU_PATH, "root", "procrank", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700835 dump_file("VIRTUAL MEMORY STATS", "/proc/vmstat");
836 dump_file("VMALLOC INFO", "/proc/vmallocinfo");
837 dump_file("SLAB INFO", "/proc/slabinfo");
838 dump_file("ZONEINFO", "/proc/zoneinfo");
839 dump_file("PAGETYPEINFO", "/proc/pagetypeinfo");
840 dump_file("BUDDYINFO", "/proc/buddyinfo");
Colin Cross2281af92012-10-28 22:41:06 -0700841 dump_file("FRAGMENTATION INFO", "/d/extfrag/unusable_index");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700842
Todd Poynor29e27a82012-05-22 17:54:59 -0700843 dump_file("KERNEL WAKE SOURCES", "/d/wakeup_sources");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700844 dump_file("KERNEL CPUFREQ", "/sys/devices/system/cpu/cpu0/cpufreq/stats/time_in_state");
Mathias Agopian85aea742012-08-08 15:32:02 -0700845 dump_file("KERNEL SYNC", "/d/sync");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700846
Elliott Hughes52860032016-06-14 13:56:00 -0700847 run_command("PROCESSES AND THREADS", 10, "ps", "-A", "-T", "-Z",
Elliott Hughes32caf1d2016-05-04 14:03:54 -0700848 "-O", "pri,nice,rtprio,sched,pcy", NULL);
Nick Kralevichb82c9252015-11-27 17:56:13 -0800849 run_command("LIBRANK", 10, SU_PATH, "root", "librank", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700850
Michal Karpinski4db754f2015-12-11 18:04:32 +0000851 run_command("PRINTENV", 10, "printenv", NULL);
Elliott Hughes0adb3a32016-10-28 08:53:02 -0700852 run_command("NETSTAT", 10, "netstat", "-nW", NULL);
Michal Karpinski4db754f2015-12-11 18:04:32 +0000853 run_command("LSMOD", 10, "lsmod", NULL);
854
Colin Crossf45fa6b2012-03-26 12:38:26 -0700855 do_dmesg();
856
857 run_command("LIST OF OPEN FILES", 10, SU_PATH, "root", "lsof", NULL);
Jeff Brown1dc94e32014-09-11 14:15:27 -0700858 for_each_pid(do_showmap, "SMAPS OF ALL PROCESSES");
859 for_each_tid(show_wchan, "BLOCKED PROCESS WAIT-CHANNELS");
Mark Salyzyna297c322016-02-05 15:33:17 -0800860 for_each_pid(show_showtime, "PROCESS TIMES (pid cmd user system iowait+percentage)");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700861
Ajay Panicker2f531772016-09-14 12:26:46 -0700862 /* Dump Bluetooth HCI logs */
863 add_dir("/data/misc/bluetooth/logs", true);
864
Felipe Leme6e01fa62015-11-11 19:35:14 -0800865 if (!screenshot_path.empty()) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800866 MYLOGI("taking late screenshot\n");
Felipe Lemee338bf62015-12-07 14:03:50 -0800867 take_screenshot(screenshot_path);
Felipe Lemecbce55d2016-02-08 09:53:18 -0800868 MYLOGI("wrote screenshot: %s\n", screenshot_path.c_str());
Jeff Sharkey5a930032013-03-19 15:05:19 -0700869 }
870
Colin Crossf45fa6b2012-03-26 12:38:26 -0700871 // dump_file("EVENT LOG TAGS", "/etc/event-log-tags");
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700872 // calculate timeout
873 timeout = logcat_timeout("main") + logcat_timeout("system") + logcat_timeout("crash");
874 if (timeout < 20000) {
875 timeout = 20000;
876 }
Mark Salyzyn78316382015-10-09 14:02:07 -0700877 run_command("SYSTEM LOG", timeout / 1000, "logcat", "-v", "threadtime",
878 "-v", "printable",
879 "-d",
880 "*:v", NULL);
Mark Salyzyn43afe5d2016-01-26 07:24:08 -0800881 timeout = logcat_timeout("events");
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700882 if (timeout < 20000) {
883 timeout = 20000;
884 }
Mark Salyzyn78316382015-10-09 14:02:07 -0700885 run_command("EVENT LOG", timeout / 1000, "logcat", "-b", "events",
886 "-v", "threadtime",
887 "-v", "printable",
888 "-d",
889 "*:v", NULL);
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700890 timeout = logcat_timeout("radio");
891 if (timeout < 20000) {
892 timeout = 20000;
893 }
Mark Salyzyn78316382015-10-09 14:02:07 -0700894 run_command("RADIO LOG", timeout / 1000, "logcat", "-b", "radio",
895 "-v", "threadtime",
896 "-v", "printable",
897 "-d",
898 "*:v", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700899
Mark Salyzynecc07632015-07-30 14:57:09 -0700900 run_command("LOG STATISTICS", 10, "logcat", "-b", "all", "-S", NULL);
901
Colin Crossf45fa6b2012-03-26 12:38:26 -0700902 /* show the traces we collected in main(), if that was done */
903 if (dump_traces_path != NULL) {
904 dump_file("VM TRACES JUST NOW", dump_traces_path);
905 }
906
907 /* only show ANR traces if they're less than 15 minutes old */
908 struct stat st;
909 char anr_traces_path[PATH_MAX];
910 property_get("dalvik.vm.stack-trace-file", anr_traces_path, "");
911 if (!anr_traces_path[0]) {
912 printf("*** NO VM TRACES FILE DEFINED (dalvik.vm.stack-trace-file)\n\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700913 } else {
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800914 int fd = TEMP_FAILURE_RETRY(open(anr_traces_path,
915 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700916 if (fd < 0) {
917 printf("*** NO ANR VM TRACES FILE (%s): %s\n\n", anr_traces_path, strerror(errno));
918 } else {
919 dump_file_from_fd("VM TRACES AT LAST ANR", anr_traces_path, fd);
920 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700921 }
922
923 /* slow traces for slow operations */
924 if (anr_traces_path[0] != 0) {
925 int tail = strlen(anr_traces_path)-1;
926 while (tail > 0 && anr_traces_path[tail] != '/') {
927 tail--;
928 }
929 int i = 0;
930 while (1) {
931 sprintf(anr_traces_path+tail+1, "slow%02d.txt", i);
932 if (stat(anr_traces_path, &st)) {
933 // No traces file at this index, done with the files.
934 break;
935 }
936 dump_file("VM TRACES WHEN SLOW", anr_traces_path);
937 i++;
938 }
939 }
940
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700941 int dumped = 0;
942 for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
943 if (tombstone_data[i].fd != -1) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800944 const char *name = tombstone_data[i].name;
945 int fd = tombstone_data[i].fd;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700946 dumped = 1;
Felipe Lemee82a27d2016-01-05 13:35:44 -0800947 if (zip_writer) {
948 if (!add_zip_entry_from_fd(ZIP_ROOT_DIR + name, fd)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800949 MYLOGE("Unable to add tombstone %s to zip file\n", name);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800950 }
951 } else {
952 dump_file_from_fd("TOMBSTONE", name, fd);
953 }
954 close(fd);
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700955 tombstone_data[i].fd = -1;
956 }
957 }
958 if (!dumped) {
959 printf("*** NO TOMBSTONES to dump in %s\n\n", TOMBSTONE_DIR);
960 }
961
Colin Crossf45fa6b2012-03-26 12:38:26 -0700962 dump_file("NETWORK DEV INFO", "/proc/net/dev");
963 dump_file("QTAGUID NETWORK INTERFACES INFO", "/proc/net/xt_qtaguid/iface_stat_all");
JP Abgrall012c2ea2012-05-16 20:49:29 -0700964 dump_file("QTAGUID NETWORK INTERFACES INFO (xt)", "/proc/net/xt_qtaguid/iface_stat_fmt");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700965 dump_file("QTAGUID CTRL INFO", "/proc/net/xt_qtaguid/ctrl");
966 dump_file("QTAGUID STATS INFO", "/proc/net/xt_qtaguid/stats");
967
Todd Poynor2a83daa2013-11-22 15:44:22 -0800968 if (!stat(PSTORE_LAST_KMSG, &st)) {
969 /* Also TODO: Make console-ramoops CAP_SYSLOG protected. */
970 dump_file("LAST KMSG", PSTORE_LAST_KMSG);
Mark Salyzyn7d0a7622016-06-24 14:06:15 -0700971 } else if (!stat(ALT_PSTORE_LAST_KMSG, &st)) {
972 dump_file("LAST KMSG", ALT_PSTORE_LAST_KMSG);
Todd Poynor2a83daa2013-11-22 15:44:22 -0800973 } else {
974 /* TODO: Make last_kmsg CAP_SYSLOG protected. b/5555691 */
975 dump_file("LAST KMSG", "/proc/last_kmsg");
976 }
977
Mark Salyzyn2262c162014-12-16 09:09:26 -0800978 /* kernels must set CONFIG_PSTORE_PMSG, slice up pstore with device tree */
Mark Salyzyn78316382015-10-09 14:02:07 -0700979 run_command("LAST LOGCAT", 10, "logcat", "-L",
980 "-b", "all",
981 "-v", "threadtime",
982 "-v", "printable",
983 "-d",
984 "*:v", NULL);
Mark Salyzyn2262c162014-12-16 09:09:26 -0800985
Colin Crossf45fa6b2012-03-26 12:38:26 -0700986 /* The following have a tendency to get wedged when wifi drivers/fw goes belly-up. */
Elliott Hughesa59828a2015-01-27 20:48:52 -0800987
988 run_command("NETWORK INTERFACES", 10, "ip", "link", NULL);
Lorenzo Colittid4c3d382014-07-30 14:38:20 +0900989
990 run_command("IPv4 ADDRESSES", 10, "ip", "-4", "addr", "show", NULL);
991 run_command("IPv6 ADDRESSES", 10, "ip", "-6", "addr", "show", NULL);
992
Colin Crossf45fa6b2012-03-26 12:38:26 -0700993 run_command("IP RULES", 10, "ip", "rule", "show", NULL);
994 run_command("IP RULES v6", 10, "ip", "-6", "rule", "show", NULL);
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -0700995
996 dump_route_tables();
997
Lorenzo Colittid4c3d382014-07-30 14:38:20 +0900998 run_command("ARP CACHE", 10, "ip", "-4", "neigh", "show", NULL);
999 run_command("IPv6 ND CACHE", 10, "ip", "-6", "neigh", "show", NULL);
Erik Klinef7f2b0f2016-05-27 11:29:19 +09001000 run_command("MULTICAST ADDRESSES", 10, "ip", "maddr", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -07001001 run_command("WIFI NETWORKS", 20, "wpa_cli", "IFNAME=wlan0", "list_networks", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001002
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -08001003#ifdef FWDUMP_bcmdhd
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001004 run_command("ND OFFLOAD TABLE", 5,
Erik Kline08165202016-05-30 11:55:44 +09001005 SU_PATH, "root", WLUTIL, "nd_hostip", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001006
1007 run_command("DUMP WIFI INTERNAL COUNTERS (1)", 20,
Erik Kline08165202016-05-30 11:55:44 +09001008 SU_PATH, "root", WLUTIL, "counters", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001009
1010 run_command("ND OFFLOAD STATUS (1)", 5,
Erik Kline08165202016-05-30 11:55:44 +09001011 SU_PATH, "root", WLUTIL, "nd_status", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001012
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -08001013#endif
Dmitry Shmidt0b2c9262012-11-07 11:09:46 -08001014 dump_file("INTERRUPTS (1)", "/proc/interrupts");
1015
Felipe Leme7cff4622016-06-08 09:51:29 -07001016 run_command("NETWORK DIAGNOSTICS", 10, "dumpsys", "-t", "10", "connectivity", "--diag", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001017
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -08001018#ifdef FWDUMP_bcmdhd
Colin Crossf45fa6b2012-03-26 12:38:26 -07001019 run_command("DUMP WIFI STATUS", 20,
1020 SU_PATH, "root", "dhdutil", "-i", "wlan0", "dump", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001021
1022 run_command("DUMP WIFI INTERNAL COUNTERS (2)", 20,
Erik Kline08165202016-05-30 11:55:44 +09001023 SU_PATH, "root", WLUTIL, "counters", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +09001024
1025 run_command("ND OFFLOAD STATUS (2)", 5,
Erik Kline08165202016-05-30 11:55:44 +09001026 SU_PATH, "root", WLUTIL, "nd_status", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001027#endif
Dmitry Shmidt0b2c9262012-11-07 11:09:46 -08001028 dump_file("INTERRUPTS (2)", "/proc/interrupts");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001029
1030 print_properties();
1031
1032 run_command("VOLD DUMP", 10, "vdc", "dump", NULL);
1033 run_command("SECURE CONTAINERS", 10, "vdc", "asec", "list", NULL);
1034
Ken Sumrall8f75fa72013-02-08 17:35:58 -08001035 run_command("FILESYSTEMS & FREE SPACE", 10, "df", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001036
Colin Crossf45fa6b2012-03-26 12:38:26 -07001037 run_command("LAST RADIO LOG", 10, "parse_radio_log", "/proc/last_radio_log", NULL);
1038
1039 printf("------ BACKLIGHTS ------\n");
1040 printf("LCD brightness=");
1041 dump_file(NULL, "/sys/class/leds/lcd-backlight/brightness");
1042 printf("Button brightness=");
1043 dump_file(NULL, "/sys/class/leds/button-backlight/brightness");
1044 printf("Keyboard brightness=");
1045 dump_file(NULL, "/sys/class/leds/keyboard-backlight/brightness");
1046 printf("ALS mode=");
1047 dump_file(NULL, "/sys/class/leds/lcd-backlight/als");
1048 printf("LCD driver registers:\n");
1049 dump_file(NULL, "/sys/class/leds/lcd-backlight/registers");
1050 printf("\n");
1051
1052 /* Binder state is expensive to look at as it uses a lot of memory. */
1053 dump_file("BINDER FAILED TRANSACTION LOG", "/sys/kernel/debug/binder/failed_transaction_log");
1054 dump_file("BINDER TRANSACTION LOG", "/sys/kernel/debug/binder/transaction_log");
1055 dump_file("BINDER TRANSACTIONS", "/sys/kernel/debug/binder/transactions");
1056 dump_file("BINDER STATS", "/sys/kernel/debug/binder/stats");
1057 dump_file("BINDER STATE", "/sys/kernel/debug/binder/state");
1058
Colin Crossf45fa6b2012-03-26 12:38:26 -07001059 printf("========================================================\n");
1060 printf("== Board\n");
1061 printf("========================================================\n");
1062
1063 dumpstate_board();
1064 printf("\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001065
1066 /* Migrate the ril_dumpstate to a dumpstate_board()? */
1067 char ril_dumpstate_timeout[PROPERTY_VALUE_MAX] = {0};
1068 property_get("ril.dumpstate.timeout", ril_dumpstate_timeout, "30");
1069 if (strnlen(ril_dumpstate_timeout, PROPERTY_VALUE_MAX - 1) > 0) {
Felipe Lemec4eee562016-04-21 15:42:55 -07001070 if (is_user_build()) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001071 // su does not exist on user builds, so try running without it.
1072 // This way any implementations of vril-dump that do not require
1073 // root can run on user builds.
1074 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
1075 "vril-dump", NULL);
1076 } else {
1077 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
1078 SU_PATH, "root", "vril-dump", NULL);
1079 }
1080 }
1081
1082 printf("========================================================\n");
1083 printf("== Android Framework Services\n");
1084 printf("========================================================\n");
1085
Wei Liu34222562016-05-19 13:59:01 -07001086 run_command("DUMPSYS", 60, "dumpsys", "-t", "60", "--skip", "meminfo", "cpuinfo", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001087
1088 printf("========================================================\n");
Dianne Hackborn02bea972013-06-26 18:59:09 -07001089 printf("== Checkins\n");
1090 printf("========================================================\n");
1091
Felipe Leme7cff4622016-06-08 09:51:29 -07001092 run_command("CHECKIN BATTERYSTATS", 30, "dumpsys", "-t", "30", "batterystats", "-c", NULL);
1093 run_command("CHECKIN MEMINFO", 30, "dumpsys", "-t", "30", "meminfo", "--checkin", NULL);
1094 run_command("CHECKIN NETSTATS", 30, "dumpsys", "-t", "30", "netstats", "--checkin", NULL);
1095 run_command("CHECKIN PROCSTATS", 30, "dumpsys", "-t", "30", "procstats", "-c", NULL);
1096 run_command("CHECKIN USAGESTATS", 30, "dumpsys", "-t", "30", "usagestats", "-c", NULL);
1097 run_command("CHECKIN PACKAGE", 30, "dumpsys", "-t", "30", "package", "--checkin", NULL);
Dianne Hackborn02bea972013-06-26 18:59:09 -07001098
1099 printf("========================================================\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001100 printf("== Running Application Activities\n");
1101 printf("========================================================\n");
1102
Felipe Leme3f83dbe2016-06-10 16:56:33 -07001103 run_command("APP ACTIVITIES", 30, "dumpsys", "-t", "30", "activity", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001104
1105 printf("========================================================\n");
1106 printf("== Running Application Services\n");
1107 printf("========================================================\n");
1108
Felipe Leme3f83dbe2016-06-10 16:56:33 -07001109 run_command("APP SERVICES", 30, "dumpsys", "-t", "30", "activity", "service", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001110
1111 printf("========================================================\n");
1112 printf("== Running Application Providers\n");
1113 printf("========================================================\n");
1114
Junda Liucfc33d42016-06-14 00:09:10 -07001115 run_command("APP PROVIDERS", 30, "dumpsys", "-t", "30", "activity", "provider", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001116
Naveen Kallade591df2016-10-19 21:38:44 -07001117 // dump_modem_logs adds the modem logs if available to the bugreport.
1118 // Do this at the end to allow for sufficient time for the modem logs to be
1119 // collected.
1120 dump_modem_logs();
Colin Crossf45fa6b2012-03-26 12:38:26 -07001121
1122 printf("========================================================\n");
Felipe Leme608385d2016-02-01 10:35:38 -08001123 printf("== Final progress (pid %d): %d/%d (originally %d)\n",
1124 getpid(), progress, weight_total, WEIGHT_TOTAL);
1125 printf("========================================================\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001126 printf("== dumpstate: done\n");
1127 printf("========================================================\n");
1128}
1129
1130static void usage() {
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001131 fprintf(stderr,
Felipe Leme2628e9e2016-04-12 16:36:51 -07001132 "usage: dumpstate [-h] [-b soundfile] [-e soundfile] [-o file [-d] [-p] "
1133 "[-z]] [-s] [-S] [-q] [-B] [-P] [-R] [-V version]\n"
1134 " -h: display this help message\n"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001135 " -b: play sound file instead of vibrate, at beginning of job\n"
1136 " -e: play sound file instead of vibrate, at end of job\n"
1137 " -o: write to file (instead of stdout)\n"
1138 " -d: append date to filename (requires -o)\n"
1139 " -p: capture screenshot to filename.png (requires -o)\n"
Felipe Leme2628e9e2016-04-12 16:36:51 -07001140 " -z: generate zipped file (requires -o)\n"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001141 " -s: write output to control socket (for init)\n"
Felipe Leme2628e9e2016-04-12 16:36:51 -07001142 " -S: write file location to control socket (for init; requires -o and -z)"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001143 " -q: disable vibrate\n"
1144 " -B: send broadcast when finished (requires -o)\n"
1145 " -P: send broadcast when started and update system properties on "
1146 "progress (requires -o and -B)\n"
1147 " -R: take bugreport in remote mode (requires -o, -z, -d and -B, "
1148 "shouldn't be used with -P)\n"
1149 " -V: sets the bugreport format version (valid values: %s)\n",
1150 VERSION_DEFAULT.c_str());
Colin Crossf45fa6b2012-03-26 12:38:26 -07001151}
1152
Felipe Lemebb6b6042016-10-25 18:18:24 +00001153static void sigpipe_handler(int n) {
1154 // don't complain to stderr or stdout
Andres Morales2e671bb2014-08-21 12:38:22 -07001155 _exit(EXIT_FAILURE);
John Michelau885f8882013-05-06 16:42:02 -05001156}
1157
Felipe Leme1e9edc62015-12-21 16:02:13 -08001158/* adds the temporary report to the existing .zip file, closes the .zip file, and removes the
1159 temporary file.
1160 */
Felipe Lemee82a27d2016-01-05 13:35:44 -08001161static bool finish_zip_file(const std::string& bugreport_name, const std::string& bugreport_path,
Felipe Leme1e9edc62015-12-21 16:02:13 -08001162 time_t now) {
Felipe Lemee82a27d2016-01-05 13:35:44 -08001163 if (!add_zip_entry(bugreport_name, bugreport_path)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001164 MYLOGE("Failed to add text entry to .zip file\n");
Felipe Leme1e9edc62015-12-21 16:02:13 -08001165 return false;
1166 }
Felipe Leme809d74e2016-02-02 12:57:00 -08001167 if (!add_text_zip_entry("main_entry.txt", bugreport_name)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001168 MYLOGE("Failed to add main_entry.txt to .zip file\n");
Felipe Leme111b9d02016-02-03 09:28:24 -08001169 return false;
Felipe Leme809d74e2016-02-02 12:57:00 -08001170 }
Felipe Leme1e9edc62015-12-21 16:02:13 -08001171
Felipe Lemee82a27d2016-01-05 13:35:44 -08001172 int32_t err = zip_writer->Finish();
Felipe Leme1e9edc62015-12-21 16:02:13 -08001173 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001174 MYLOGE("zip_writer->Finish(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001175 return false;
1176 }
1177
Felipe Lemec4eee562016-04-21 15:42:55 -07001178 if (is_user_build()) {
1179 MYLOGD("Removing temporary file %s\n", bugreport_path.c_str())
1180 if (remove(bugreport_path.c_str())) {
1181 ALOGW("remove(%s): %s\n", bugreport_path.c_str(), strerror(errno));
1182 }
1183 } else {
1184 MYLOGD("Keeping temporary file %s on non-user build\n", bugreport_path.c_str())
1185 }
1186
Felipe Leme1e9edc62015-12-21 16:02:13 -08001187 return true;
1188}
Felipe Leme6e01fa62015-11-11 19:35:14 -08001189
Michal Karpinski4db754f2015-12-11 18:04:32 +00001190static std::string SHA256_file_hash(std::string filepath) {
Andreas Gampe27cd7b22016-07-18 18:24:05 -07001191 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(filepath.c_str(), O_RDONLY | O_NONBLOCK
1192 | O_CLOEXEC | O_NOFOLLOW)));
Andreas Gampefcc8db92016-07-18 18:01:27 -07001193 if (fd == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001194 MYLOGE("open(%s): %s\n", filepath.c_str(), strerror(errno));
Michal Karpinski4db754f2015-12-11 18:04:32 +00001195 return NULL;
1196 }
1197
1198 SHA256_CTX ctx;
Elliott Hughesc4dc1412016-04-12 16:28:31 -07001199 SHA256_Init(&ctx);
Michal Karpinski4db754f2015-12-11 18:04:32 +00001200
1201 std::vector<uint8_t> buffer(65536);
1202 while (1) {
1203 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd.get(), buffer.data(), buffer.size()));
1204 if (bytes_read == 0) {
1205 break;
1206 } else if (bytes_read == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001207 MYLOGE("read(%s): %s\n", filepath.c_str(), strerror(errno));
Michal Karpinski4db754f2015-12-11 18:04:32 +00001208 return NULL;
1209 }
1210
Elliott Hughesc4dc1412016-04-12 16:28:31 -07001211 SHA256_Update(&ctx, buffer.data(), bytes_read);
Michal Karpinski4db754f2015-12-11 18:04:32 +00001212 }
1213
Elliott Hughesc4dc1412016-04-12 16:28:31 -07001214 uint8_t hash[SHA256_DIGEST_LENGTH];
1215 SHA256_Final(hash, &ctx);
1216
1217 char hash_buffer[SHA256_DIGEST_LENGTH * 2 + 1];
1218 for(size_t i = 0; i < SHA256_DIGEST_LENGTH; i++) {
Michal Karpinskicbbdf732016-01-07 20:45:02 +00001219 sprintf(hash_buffer + (i * 2), "%02x", hash[i]);
Michal Karpinski4db754f2015-12-11 18:04:32 +00001220 }
1221 hash_buffer[sizeof(hash_buffer) - 1] = 0;
1222 return std::string(hash_buffer);
1223}
1224
Colin Crossf45fa6b2012-03-26 12:38:26 -07001225int main(int argc, char *argv[]) {
Felipe Lemebb6b6042016-10-25 18:18:24 +00001226 struct sigaction sigact;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001227 int do_add_date = 0;
Felipe Leme6e01fa62015-11-11 19:35:14 -08001228 int do_zip_file = 0;
John Michelau1f794c42012-09-17 11:20:19 -05001229 int do_vibrate = 1;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001230 char* use_outfile = 0;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001231 int use_socket = 0;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001232 int use_control_socket = 0;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001233 int do_fb = 0;
Jeff Sharkey27f9e6d2013-03-13 15:45:50 -07001234 int do_broadcast = 0;
Felipe Lemee338bf62015-12-07 14:03:50 -08001235 int do_early_screenshot = 0;
Michal Karpinski4db754f2015-12-11 18:04:32 +00001236 int is_remote_mode = 0;
Felipe Leme809d74e2016-02-02 12:57:00 -08001237 std::string version = VERSION_DEFAULT;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001238
Felipe Lemee82a27d2016-01-05 13:35:44 -08001239 now = time(NULL);
1240
Felipe Lemecbce55d2016-02-08 09:53:18 -08001241 MYLOGI("begin\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001242
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001243 /* gets the sequential id */
1244 char last_id[PROPERTY_VALUE_MAX];
1245 property_get("dumpstate.last_id", last_id, "0");
1246 id = strtoul(last_id, NULL, 10) + 1;
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001247 snprintf(last_id, sizeof(last_id), "%lu", id);
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001248 property_set("dumpstate.last_id", last_id);
1249 MYLOGI("dumpstate id: %lu\n", id);
1250
Felipe Lemebb6b6042016-10-25 18:18:24 +00001251 /* clear SIGPIPE handler */
1252 memset(&sigact, 0, sizeof(sigact));
1253 sigact.sa_handler = sigpipe_handler;
1254 sigaction(SIGPIPE, &sigact, NULL);
1255
Colin Crossf45fa6b2012-03-26 12:38:26 -07001256 /* set as high priority, and protect from OOM killer */
1257 setpriority(PRIO_PROCESS, 0, -20);
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001258
1259 FILE *oom_adj = fopen("/proc/self/oom_score_adj", "we");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001260 if (oom_adj) {
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001261 fputs("-1000", oom_adj);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001262 fclose(oom_adj);
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001263 } else {
1264 /* fallback to kernels <= 2.6.35 */
1265 oom_adj = fopen("/proc/self/oom_adj", "we");
1266 if (oom_adj) {
1267 fputs("-17", oom_adj);
1268 fclose(oom_adj);
1269 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001270 }
1271
Jeff Brown1dc94e32014-09-11 14:15:27 -07001272 /* parse arguments */
Felipe Lemea34efb72016-03-11 09:33:32 -08001273 std::string args;
1274 format_args(argc, const_cast<const char **>(argv), &args);
1275 MYLOGD("Dumpstate command line: %s\n", args.c_str());
Colin Crossf45fa6b2012-03-26 12:38:26 -07001276 int c;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001277 while ((c = getopt(argc, argv, "dho:svqzpPBRSV:")) != -1) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001278 switch (c) {
Felipe Leme71bbfc52015-11-23 14:14:51 -08001279 case 'd': do_add_date = 1; break;
1280 case 'z': do_zip_file = 1; break;
1281 case 'o': use_outfile = optarg; break;
1282 case 's': use_socket = 1; break;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001283 case 'S': use_control_socket = 1; break;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001284 case 'v': break; // compatibility no-op
Felipe Leme71bbfc52015-11-23 14:14:51 -08001285 case 'q': do_vibrate = 0; break;
1286 case 'p': do_fb = 1; break;
1287 case 'P': do_update_progress = 1; break;
Michal Karpinski4db754f2015-12-11 18:04:32 +00001288 case 'R': is_remote_mode = 1; break;
Felipe Leme71bbfc52015-11-23 14:14:51 -08001289 case 'B': do_broadcast = 1; break;
Felipe Leme809d74e2016-02-02 12:57:00 -08001290 case 'V': version = optarg; break;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001291 case '?': printf("\n");
1292 case 'h':
1293 usage();
1294 exit(1);
1295 }
1296 }
1297
Felipe Leme71bbfc52015-11-23 14:14:51 -08001298 if ((do_zip_file || do_add_date || do_update_progress || do_broadcast) && !use_outfile) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001299 usage();
1300 exit(1);
1301 }
1302
Felipe Leme2628e9e2016-04-12 16:36:51 -07001303 if (use_control_socket && !do_zip_file) {
1304 usage();
1305 exit(1);
1306 }
1307
Felipe Leme71bbfc52015-11-23 14:14:51 -08001308 if (do_update_progress && !do_broadcast) {
1309 usage();
1310 exit(1);
1311 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001312
Michal Karpinski4db754f2015-12-11 18:04:32 +00001313 if (is_remote_mode && (do_update_progress || !do_broadcast || !do_zip_file || !do_add_date)) {
1314 usage();
1315 exit(1);
1316 }
1317
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001318 if (version != VERSION_DEFAULT) {
1319 usage();
1320 exit(1);
Felipe Leme809d74e2016-02-02 12:57:00 -08001321 }
1322
Felipe Lemecbce55d2016-02-08 09:53:18 -08001323 MYLOGI("bugreport format version: %s\n", version.c_str());
Felipe Leme809d74e2016-02-02 12:57:00 -08001324
Felipe Lemee338bf62015-12-07 14:03:50 -08001325 do_early_screenshot = do_update_progress;
1326
Christopher Ferrised9354f2014-10-01 17:35:01 -07001327 // If we are going to use a socket, do it as early as possible
1328 // to avoid timeouts from bugreport.
1329 if (use_socket) {
1330 redirect_to_socket(stdout, "dumpstate");
1331 }
1332
Felipe Leme2628e9e2016-04-12 16:36:51 -07001333 if (use_control_socket) {
1334 MYLOGD("Opening control socket\n");
1335 control_socket_fd = open_socket("dumpstate");
Felipe Leme02b7e002016-07-22 12:03:20 -07001336 do_update_progress = 1;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001337 }
1338
Felipe Lemecbce55d2016-02-08 09:53:18 -08001339 /* full path of the temporary file containing the bugreport */
Felipe Lemead5f6c42015-11-30 14:26:46 -08001340 std::string tmp_path;
1341
Felipe Lemecbce55d2016-02-08 09:53:18 -08001342 /* full path of the file containing the dumpstate logs*/
1343 std::string log_path;
1344
Felipe Leme14e034a2016-03-30 18:51:03 -07001345 /* full path of the systrace file, when enabled */
1346 std::string systrace_path;
1347
Felipe Lemee338bf62015-12-07 14:03:50 -08001348 /* full path of the temporary file containing the screenshot (when requested) */
1349 std::string screenshot_path;
1350
Felipe Lemecbce55d2016-02-08 09:53:18 -08001351 /* base name (without suffix or extensions) of the bugreport files */
Felipe Lemead5f6c42015-11-30 14:26:46 -08001352 std::string base_name;
1353
Felipe Leme71bbfc52015-11-23 14:14:51 -08001354 /* pointer to the actual path, be it zip or text */
1355 std::string path;
1356
Felipe Leme635ca312016-01-05 14:23:02 -08001357 /* pointer to the zipped file */
Felipe Leme1e9edc62015-12-21 16:02:13 -08001358 std::unique_ptr<FILE, int(*)(FILE*)> zip_file(NULL, fclose);
Felipe Leme71bbfc52015-11-23 14:14:51 -08001359
Felipe Lemead5f6c42015-11-30 14:26:46 -08001360 /* redirect output if needed */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001361 bool is_redirecting = !use_socket && use_outfile;
1362
1363 if (is_redirecting) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001364 bugreport_dir = dirname(use_outfile);
1365 base_name = basename(use_outfile);
Felipe Leme71bbfc52015-11-23 14:14:51 -08001366 if (do_add_date) {
1367 char date[80];
Felipe Lemead5f6c42015-11-30 14:26:46 -08001368 strftime(date, sizeof(date), "%Y-%m-%d-%H-%M-%S", localtime(&now));
1369 suffix = date;
1370 } else {
1371 suffix = "undated";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001372 }
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001373 char build_id[PROPERTY_VALUE_MAX];
1374 property_get("ro.build.id", build_id, "UNKNOWN_BUILD");
1375 base_name = base_name + "-" + build_id;
Felipe Leme71bbfc52015-11-23 14:14:51 -08001376 if (do_fb) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001377 // TODO: if dumpstate was an object, the paths could be internal variables and then
1378 // we could have a function to calculate the derived values, such as:
1379 // screenshot_path = GetPath(".png");
1380 screenshot_path = bugreport_dir + "/" + base_name + "-" + suffix + ".png";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001381 }
Felipe Lemead5f6c42015-11-30 14:26:46 -08001382 tmp_path = bugreport_dir + "/" + base_name + "-" + suffix + ".tmp";
Felipe Lemecbce55d2016-02-08 09:53:18 -08001383 log_path = bugreport_dir + "/dumpstate_log-" + suffix + "-"
1384 + std::to_string(getpid()) + ".txt";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001385
Felipe Lemecbce55d2016-02-08 09:53:18 -08001386 MYLOGD("Bugreport dir: %s\n"
1387 "Base name: %s\n"
1388 "Suffix: %s\n"
1389 "Log path: %s\n"
1390 "Temporary path: %s\n"
1391 "Screenshot path: %s\n",
1392 bugreport_dir.c_str(), base_name.c_str(), suffix.c_str(),
1393 log_path.c_str(), tmp_path.c_str(), screenshot_path.c_str());
Felipe Leme71bbfc52015-11-23 14:14:51 -08001394
Felipe Leme1e9edc62015-12-21 16:02:13 -08001395 if (do_zip_file) {
Felipe Leme1e9edc62015-12-21 16:02:13 -08001396 path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip";
Felipe Leme26bd34c2016-03-15 13:40:33 -07001397 MYLOGD("Creating initial .zip file (%s)\n", path.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -08001398 create_parent_dirs(path.c_str());
Felipe Leme1e9edc62015-12-21 16:02:13 -08001399 zip_file.reset(fopen(path.c_str(), "wb"));
1400 if (!zip_file) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001401 MYLOGE("fopen(%s, 'wb'): %s\n", path.c_str(), strerror(errno));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001402 do_zip_file = 0;
1403 } else {
1404 zip_writer.reset(new ZipWriter(zip_file.get()));
1405 }
Felipe Leme809d74e2016-02-02 12:57:00 -08001406 add_text_zip_entry("version.txt", version);
Felipe Leme1e9edc62015-12-21 16:02:13 -08001407 }
1408
Felipe Lemedcd1f0d2016-08-04 12:48:50 -07001409 if (do_update_progress) {
1410 if (do_broadcast) {
1411 // clang-format off
1412 std::vector<std::string> am_args = {
1413 "--receiver-permission", "android.permission.DUMP", "--receiver-foreground",
1414 "--es", "android.intent.extra.NAME", suffix,
1415 "--ei", "android.intent.extra.ID", std::to_string(id),
1416 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
1417 "--ei", "android.intent.extra.MAX", std::to_string(WEIGHT_TOTAL),
1418 };
1419 // clang-format on
1420 send_broadcast("android.intent.action.BUGREPORT_STARTED", am_args);
1421 }
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001422 if (use_control_socket) {
1423 dprintf(control_socket_fd, "BEGIN:%s\n", path.c_str());
1424 }
Felipe Leme71bbfc52015-11-23 14:14:51 -08001425 }
1426 }
1427
Nick Kralevichf3599b32016-01-25 15:05:16 -08001428 /* read /proc/cmdline before dropping root */
1429 FILE *cmdline = fopen("/proc/cmdline", "re");
1430 if (cmdline) {
1431 fgets(cmdline_buf, sizeof(cmdline_buf), cmdline);
1432 fclose(cmdline);
1433 }
1434
Jeff Brown1dc94e32014-09-11 14:15:27 -07001435 /* open the vibrator before dropping root */
Felipe Leme6e01fa62015-11-11 19:35:14 -08001436 std::unique_ptr<FILE, int(*)(FILE*)> vibrator(NULL, fclose);
John Michelau1f794c42012-09-17 11:20:19 -05001437 if (do_vibrate) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001438 vibrator.reset(fopen("/sys/class/timed_output/vibrator/enable", "we"));
Jeff Brown1dc94e32014-09-11 14:15:27 -07001439 if (vibrator) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001440 vibrate(vibrator.get(), 150);
Jeff Brown1dc94e32014-09-11 14:15:27 -07001441 }
John Michelau1f794c42012-09-17 11:20:19 -05001442 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001443
Felipe Leme3634a1e2015-12-09 10:11:47 -08001444 if (do_fb && do_early_screenshot) {
1445 if (screenshot_path.empty()) {
1446 // should not have happened
Felipe Lemecbce55d2016-02-08 09:53:18 -08001447 MYLOGE("INTERNAL ERROR: skipping early screenshot because path was not set\n");
Felipe Leme3634a1e2015-12-09 10:11:47 -08001448 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001449 MYLOGI("taking early screenshot\n");
Felipe Leme3634a1e2015-12-09 10:11:47 -08001450 take_screenshot(screenshot_path);
Felipe Lemecbce55d2016-02-08 09:53:18 -08001451 MYLOGI("wrote screenshot: %s\n", screenshot_path.c_str());
Felipe Leme3634a1e2015-12-09 10:11:47 -08001452 if (chown(screenshot_path.c_str(), AID_SHELL, AID_SHELL)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001453 MYLOGE("Unable to change ownership of screenshot file %s: %s\n",
Felipe Leme3634a1e2015-12-09 10:11:47 -08001454 screenshot_path.c_str(), strerror(errno));
1455 }
Felipe Lemee338bf62015-12-07 14:03:50 -08001456 }
1457 }
1458
Felipe Leme1e9edc62015-12-21 16:02:13 -08001459 if (do_zip_file) {
1460 if (chown(path.c_str(), AID_SHELL, AID_SHELL)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001461 MYLOGE("Unable to change ownership of zip file %s: %s\n", path.c_str(), strerror(errno));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001462 }
1463 }
1464
Felipe Leme71bbfc52015-11-23 14:14:51 -08001465 if (is_redirecting) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001466 redirect_to_file(stderr, const_cast<char*>(log_path.c_str()));
Felipe Leme6fe9db62016-02-12 09:04:16 -08001467 if (chown(log_path.c_str(), AID_SHELL, AID_SHELL)) {
1468 MYLOGE("Unable to change ownership of dumpstate log file %s: %s\n",
1469 log_path.c_str(), strerror(errno));
1470 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001471 /* TODO: rather than generating a text file now and zipping it later,
1472 it would be more efficient to redirect stdout to the zip entry
1473 directly, but the libziparchive doesn't support that option yet. */
1474 redirect_to_file(stdout, const_cast<char*>(tmp_path.c_str()));
Felipe Leme6fe9db62016-02-12 09:04:16 -08001475 if (chown(tmp_path.c_str(), AID_SHELL, AID_SHELL)) {
1476 MYLOGE("Unable to change ownership of temporary bugreport file %s: %s\n",
1477 tmp_path.c_str(), strerror(errno));
1478 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001479 }
Felipe Leme608385d2016-02-01 10:35:38 -08001480 // NOTE: there should be no stdout output until now, otherwise it would break the header.
1481 // In particular, DurationReport objects should be created passing 'title, NULL', so their
Felipe Lemecbce55d2016-02-08 09:53:18 -08001482 // duration is logged into MYLOG instead.
Felipe Leme809d74e2016-02-02 12:57:00 -08001483 print_header(version);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001484
Felipe Leme71a74ac2016-03-17 15:43:25 -07001485 // Dumps systrace right away, otherwise it will be filled with unnecessary events.
Zhengyin Qian068ecc72016-08-10 16:48:14 -07001486 // First try to dump anrd trace if the daemon is running. Otherwise, dump
1487 // the raw trace.
1488 if (!dump_anrd_trace()) {
1489 dump_systrace();
1490 }
Felipe Leme71a74ac2016-03-17 15:43:25 -07001491
Wei Liu341938b2016-04-27 16:18:17 -07001492 // TODO: Drop root user and move into dumpstate() once b/28633932 is fixed.
Felipe Lemeefd7e272016-05-18 09:27:16 -07001493 dump_raft();
Wei Liu341938b2016-04-27 16:18:17 -07001494
Felipe Leme9c74aad2016-02-29 18:15:42 -08001495 // Invoking the following dumpsys calls before dump_traces() to try and
1496 // keep the system stats as close to its initial state as possible.
Thierry Strudel8b78b752016-03-22 10:25:44 -07001497 run_command_as_shell("DUMPSYS MEMINFO", 30, "dumpsys", "-t", "30", "meminfo", "-a", NULL);
Felipe Leme7cff4622016-06-08 09:51:29 -07001498 run_command_as_shell("DUMPSYS CPUINFO", 10, "dumpsys", "-t", "10", "cpuinfo", "-a", NULL);
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001499
1500 /* collect stack traces from Dalvik and native processes (needs root) */
1501 dump_traces_path = dump_traces();
1502
Felipe Lemec0808152016-06-17 17:37:13 -07001503 /* Run some operations that require root. */
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001504 get_tombstone_fds(tombstone_data);
1505 add_dir(RECOVERY_DIR, true);
Mark Salyzynd6ab0112016-03-25 12:56:39 -07001506 add_dir(RECOVERY_DATA_DIR, true);
Mark Salyzyn4d42dea2016-04-01 10:03:14 -07001507 add_dir(LOGPERSIST_DATA_DIR, false);
David Brazdild2991962016-06-03 14:40:44 +01001508 if (!is_user_build()) {
1509 add_dir(PROFILE_DATA_DIR_CUR, true);
1510 add_dir(PROFILE_DATA_DIR_REF, true);
1511 }
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001512 add_mountinfo();
Felipe Lemec0808152016-06-17 17:37:13 -07001513 dump_iptables();
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001514
Erik Kline53ca94a2016-09-28 17:26:26 +09001515 // Capture any IPSec policies in play. No keys are exposed here.
1516 run_command("IP XFRM POLICY", 10, "ip", "xfrm", "policy", nullptr);
1517
Lorenzo Colittid3b809b2016-09-26 13:37:45 +09001518 // Run ss as root so we can see socket marks.
1519 run_command("DETAILED SOCKET STATE", 10, "ss", "-eionptu", NULL);
1520
Felipe Lemecf6a8b42016-03-11 10:38:19 -08001521 if (!drop_root_user()) {
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001522 return -1;
1523 }
1524
1525 dumpstate(do_early_screenshot ? "": screenshot_path, version);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001526
Felipe Leme55b42a62015-11-10 17:39:08 -08001527 /* close output if needed */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001528 if (is_redirecting) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001529 fclose(stdout);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001530 }
1531
Felipe Leme6e01fa62015-11-11 19:35:14 -08001532 /* rename or zip the (now complete) .tmp file to its final location */
1533 if (use_outfile) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001534
1535 /* check if user changed the suffix using system properties */
1536 char key[PROPERTY_KEY_MAX];
1537 char value[PROPERTY_VALUE_MAX];
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001538 snprintf(key, sizeof(key), "dumpstate.%d.name", getpid());
Felipe Lemead5f6c42015-11-30 14:26:46 -08001539 property_get(key, value, "");
1540 bool change_suffix= false;
1541 if (value[0]) {
1542 /* must whitelist which characters are allowed, otherwise it could cross directories */
1543 std::regex valid_regex("^[-_a-zA-Z0-9]+$");
1544 if (std::regex_match(value, valid_regex)) {
1545 change_suffix = true;
1546 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001547 MYLOGE("invalid suffix provided by user: %s\n", value);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001548 }
1549 }
1550 if (change_suffix) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001551 MYLOGI("changing suffix from %s to %s\n", suffix.c_str(), value);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001552 suffix = value;
1553 if (!screenshot_path.empty()) {
1554 std::string new_screenshot_path =
1555 bugreport_dir + "/" + base_name + "-" + suffix + ".png";
1556 if (rename(screenshot_path.c_str(), new_screenshot_path.c_str())) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001557 MYLOGE("rename(%s, %s): %s\n", screenshot_path.c_str(),
Felipe Lemead5f6c42015-11-30 14:26:46 -08001558 new_screenshot_path.c_str(), strerror(errno));
1559 } else {
1560 screenshot_path = new_screenshot_path;
1561 }
1562 }
1563 }
1564
Felipe Leme6e01fa62015-11-11 19:35:14 -08001565 bool do_text_file = true;
1566 if (do_zip_file) {
Felipe Leme88c79332016-02-22 11:06:49 -08001567 std::string entry_name = base_name + "-" + suffix + ".txt";
1568 MYLOGD("Adding main entry (%s) to .zip bugreport\n", entry_name.c_str());
1569 if (!finish_zip_file(entry_name, tmp_path, now)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001570 MYLOGE("Failed to finish zip file; sending text bugreport instead\n");
Felipe Leme6e01fa62015-11-11 19:35:14 -08001571 do_text_file = true;
1572 } else {
1573 do_text_file = false;
Felipe Leme91274352016-02-26 15:03:52 -08001574 // Since zip file is already created, it needs to be renamed.
1575 std::string new_path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip";
1576 if (path != new_path) {
1577 MYLOGD("Renaming zip file from %s to %s\n", path.c_str(), new_path.c_str());
1578 if (rename(path.c_str(), new_path.c_str())) {
1579 MYLOGE("rename(%s, %s): %s\n", path.c_str(),
1580 new_path.c_str(), strerror(errno));
1581 } else {
1582 path = new_path;
1583 }
1584 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001585 }
1586 }
1587 if (do_text_file) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001588 path = bugreport_dir + "/" + base_name + "-" + suffix + ".txt";
Felipe Leme88c79332016-02-22 11:06:49 -08001589 MYLOGD("Generating .txt bugreport at %s from %s\n", path.c_str(), tmp_path.c_str());
Felipe Lemead5f6c42015-11-30 14:26:46 -08001590 if (rename(tmp_path.c_str(), path.c_str())) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001591 MYLOGE("rename(%s, %s): %s\n", tmp_path.c_str(), path.c_str(), strerror(errno));
Felipe Leme6e01fa62015-11-11 19:35:14 -08001592 path.clear();
1593 }
1594 }
Felipe Leme2628e9e2016-04-12 16:36:51 -07001595 if (use_control_socket) {
1596 if (do_text_file) {
1597 dprintf(control_socket_fd, "FAIL:could not create zip file, check %s "
1598 "for more details\n", log_path.c_str());
1599 } else {
1600 dprintf(control_socket_fd, "OK:%s\n", path.c_str());
1601 }
1602 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001603 }
1604
Felipe Lemecc2a2fa2016-02-25 14:02:44 -08001605 /* vibrate a few but shortly times to let user know it's finished */
1606 if (vibrator) {
1607 for (int i = 0; i < 3; i++) {
1608 vibrate(vibrator.get(), 75);
1609 usleep((75 + 50) * 1000);
1610 }
1611 }
1612
Jeff Brown1dc94e32014-09-11 14:15:27 -07001613 /* tell activity manager we're done */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001614 if (do_broadcast) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001615 if (!path.empty()) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001616 MYLOGI("Final bugreport path: %s\n", path.c_str());
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001617 // clang-format off
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001618 std::vector<std::string> am_args = {
Felipe Leme43fd1bb2016-01-29 09:07:57 -08001619 "--receiver-permission", "android.permission.DUMP", "--receiver-foreground",
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001620 "--ei", "android.intent.extra.ID", std::to_string(id),
Felipe Leme71bbfc52015-11-23 14:14:51 -08001621 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
Felipe Lemeee2e4a02016-02-22 18:12:11 -08001622 "--ei", "android.intent.extra.MAX", std::to_string(weight_total),
Felipe Lemecbce55d2016-02-08 09:53:18 -08001623 "--es", "android.intent.extra.BUGREPORT", path,
1624 "--es", "android.intent.extra.DUMPSTATE_LOG", log_path
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001625 };
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001626 // clang-format on
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001627 if (do_fb) {
1628 am_args.push_back("--es");
1629 am_args.push_back("android.intent.extra.SCREENSHOT");
1630 am_args.push_back(screenshot_path);
1631 }
Michal Karpinski4db754f2015-12-11 18:04:32 +00001632 if (is_remote_mode) {
1633 am_args.push_back("--es");
1634 am_args.push_back("android.intent.extra.REMOTE_BUGREPORT_HASH");
1635 am_args.push_back(SHA256_file_hash(path));
1636 send_broadcast("android.intent.action.REMOTE_BUGREPORT_FINISHED", am_args);
1637 } else {
1638 send_broadcast("android.intent.action.BUGREPORT_FINISHED", am_args);
1639 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001640 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001641 MYLOGE("Skipping finished broadcast because bugreport could not be generated\n");
Felipe Leme6e01fa62015-11-11 19:35:14 -08001642 }
Jeff Sharkey27f9e6d2013-03-13 15:45:50 -07001643 }
1644
Felipe Lemecbce55d2016-02-08 09:53:18 -08001645 MYLOGD("Final progress: %d/%d (originally %d)\n", progress, weight_total, WEIGHT_TOTAL);
1646 MYLOGI("done\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001647
Felipe Leme107a05f2016-03-08 15:11:15 -08001648 if (is_redirecting) {
1649 fclose(stderr);
1650 }
1651
Felipe Leme02b7e002016-07-22 12:03:20 -07001652 if (use_control_socket && control_socket_fd != -1) {
1653 MYLOGD("Closing control socket\n");
1654 close(control_socket_fd);
Felipe Leme2628e9e2016-04-12 16:36:51 -07001655 }
1656
Colin Crossf45fa6b2012-03-26 12:38:26 -07001657 return 0;
1658}