blob: fd6413d562d5a05d28b187362f90f72824d60c32 [file] [log] [blame]
Colin Crossf45fa6b2012-03-26 12:38:26 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <dirent.h>
18#include <errno.h>
19#include <fcntl.h>
20#include <limits.h>
21#include <poll.h>
22#include <signal.h>
23#include <stdarg.h>
24#include <stdio.h>
25#include <stdlib.h>
Felipe Leme36b3f6f2015-11-19 15:41:04 -080026#include <string>
Colin Crossf45fa6b2012-03-26 12:38:26 -070027#include <string.h>
Felipe Lemecf6a8b42016-03-11 10:38:19 -080028#include <sys/capability.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070029#include <sys/inotify.h>
30#include <sys/stat.h>
Mark Salyzyna297c322016-02-05 15:33:17 -080031#include <sys/sysconf.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070032#include <sys/time.h>
33#include <sys/wait.h>
34#include <sys/klog.h>
35#include <time.h>
36#include <unistd.h>
Felipe Leme36b3f6f2015-11-19 15:41:04 -080037#include <vector>
John Michelaue7b6cf12013-03-07 15:35:35 -060038#include <sys/prctl.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070039
Felipe Leme71bbfc52015-11-23 14:14:51 -080040#define LOG_TAG "dumpstate"
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -070041
42#include <android-base/file.h>
Jeff Brownbf7f4922012-06-07 16:40:01 -070043#include <cutils/debugger.h>
Felipe Leme71bbfc52015-11-23 14:14:51 -080044#include <cutils/log.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070045#include <cutils/properties.h>
46#include <cutils/sockets.h>
47#include <private/android_filesystem_config.h>
48
Robert Craig95798372013-04-04 06:33:10 -040049#include <selinux/android.h>
50
Colin Crossf45fa6b2012-03-26 12:38:26 -070051#include "dumpstate.h"
52
Jeff Brown1dc94e32014-09-11 14:15:27 -070053static const int64_t NANOS_PER_SEC = 1000000000;
54
Jeff Brownbf7f4922012-06-07 16:40:01 -070055/* list of native processes to include in the native dumps */
Andy Hung5c04e742016-04-13 19:35:34 -070056// This matches the /proc/pid/exe link instead of /proc/pid/cmdline.
Jeff Brownbf7f4922012-06-07 16:40:01 -070057static const char* native_processes_to_dump[] = {
Andy Hung9609bbd2015-12-15 12:42:50 -080058 "/system/bin/audioserver",
Chien-Yu Chenf5248da2016-01-28 14:23:03 -080059 "/system/bin/cameraserver",
James Dong1fc4f802012-09-10 16:08:48 -070060 "/system/bin/drmserver",
Andy Hung5c04e742016-04-13 19:35:34 -070061 "/system/bin/mediacodec", // media.codec
62 "/system/bin/mediadrmserver",
63 "/system/bin/mediaextractor", // media.extractor
Jeff Brownbf7f4922012-06-07 16:40:01 -070064 "/system/bin/mediaserver",
65 "/system/bin/sdcard",
66 "/system/bin/surfaceflinger",
keunyoungd907b322015-10-16 15:21:43 -070067 "/system/bin/vehicle_network_service",
Jeff Brownbf7f4922012-06-07 16:40:01 -070068 NULL,
69};
70
Felipe Leme608385d2016-02-01 10:35:38 -080071DurationReporter::DurationReporter(const char *title) : DurationReporter(title, stdout) {}
72
73DurationReporter::DurationReporter(const char *title, FILE *out) {
Felipe Leme78f2c862015-12-21 09:55:22 -080074 title_ = title;
75 if (title) {
76 started_ = DurationReporter::nanotime();
77 }
Felipe Leme608385d2016-02-01 10:35:38 -080078 out_ = out;
Felipe Leme78f2c862015-12-21 09:55:22 -080079}
80
81DurationReporter::~DurationReporter() {
82 if (title_) {
83 uint64_t elapsed = DurationReporter::nanotime() - started_;
84 // Use "Yoda grammar" to make it easier to grep|sort sections.
Felipe Leme608385d2016-02-01 10:35:38 -080085 if (out_) {
86 fprintf(out_, "------ %.3fs was the duration of '%s' ------\n",
87 (float) elapsed / NANOS_PER_SEC, title_);
88 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -080089 MYLOGD("Duration of '%s': %.3fs\n", title_, (float) elapsed / NANOS_PER_SEC);
Felipe Leme608385d2016-02-01 10:35:38 -080090 }
Felipe Leme78f2c862015-12-21 09:55:22 -080091 }
92}
93
94uint64_t DurationReporter::DurationReporter::nanotime() {
Christopher Ferris54bcc5f2015-02-10 12:15:01 -080095 struct timespec ts;
96 clock_gettime(CLOCK_MONOTONIC, &ts);
Felipe Leme78f2c862015-12-21 09:55:22 -080097 return (uint64_t) ts.tv_sec * NANOS_PER_SEC + ts.tv_nsec;
Christopher Ferris54bcc5f2015-02-10 12:15:01 -080098}
99
John Spurlock5ecd4be2014-01-29 14:14:40 -0500100void for_each_userid(void (*func)(int), const char *header) {
Felipe Leme93d705b2015-11-10 20:10:25 -0800101 ON_DRY_RUN_RETURN();
John Spurlock5ecd4be2014-01-29 14:14:40 -0500102 DIR *d;
103 struct dirent *de;
104
105 if (header) printf("\n------ %s ------\n", header);
106 func(0);
107
108 if (!(d = opendir("/data/system/users"))) {
109 printf("Failed to open /data/system/users (%s)\n", strerror(errno));
110 return;
111 }
112
113 while ((de = readdir(d))) {
114 int userid;
115 if (de->d_type != DT_DIR || !(userid = atoi(de->d_name))) {
116 continue;
117 }
118 func(userid);
119 }
120
121 closedir(d);
122}
123
Colin Cross0c22e8b2012-11-02 15:46:56 -0700124static void __for_each_pid(void (*helper)(int, const char *, void *), const char *header, void *arg) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700125 DIR *d;
126 struct dirent *de;
127
128 if (!(d = opendir("/proc"))) {
129 printf("Failed to open /proc (%s)\n", strerror(errno));
130 return;
131 }
132
Felipe Leme635ca312016-01-05 14:23:02 -0800133 if (header) printf("\n------ %s ------\n", header);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700134 while ((de = readdir(d))) {
135 int pid;
136 int fd;
137 char cmdpath[255];
138 char cmdline[255];
139
140 if (!(pid = atoi(de->d_name))) {
141 continue;
142 }
143
Colin Crossf45fa6b2012-03-26 12:38:26 -0700144 memset(cmdline, 0, sizeof(cmdline));
Mark Salyzyna297c322016-02-05 15:33:17 -0800145
146 snprintf(cmdpath, sizeof(cmdpath), "/proc/%d/cmdline", pid);
147 if ((fd = TEMP_FAILURE_RETRY(open(cmdpath, O_RDONLY | O_CLOEXEC))) >= 0) {
148 TEMP_FAILURE_RETRY(read(fd, cmdline, sizeof(cmdline) - 2));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700149 close(fd);
Mark Salyzyna297c322016-02-05 15:33:17 -0800150 if (cmdline[0]) {
151 helper(pid, cmdline, arg);
152 continue;
153 }
154 }
155
156 // if no cmdline, a kernel thread has comm
157 snprintf(cmdpath, sizeof(cmdpath), "/proc/%d/comm", pid);
158 if ((fd = TEMP_FAILURE_RETRY(open(cmdpath, O_RDONLY | O_CLOEXEC))) >= 0) {
159 TEMP_FAILURE_RETRY(read(fd, cmdline + 1, sizeof(cmdline) - 4));
160 close(fd);
161 if (cmdline[1]) {
162 cmdline[0] = '[';
163 size_t len = strcspn(cmdline, "\f\b\r\n");
164 cmdline[len] = ']';
165 cmdline[len+1] = '\0';
166 }
167 }
168 if (!cmdline[0]) {
169 strcpy(cmdline, "N/A");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700170 }
Colin Cross0c22e8b2012-11-02 15:46:56 -0700171 helper(pid, cmdline, arg);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700172 }
173
174 closedir(d);
175}
176
Colin Cross0c22e8b2012-11-02 15:46:56 -0700177static void for_each_pid_helper(int pid, const char *cmdline, void *arg) {
Felipe Leme8620bb42015-11-10 11:04:45 -0800178 for_each_pid_func *func = (for_each_pid_func*) arg;
Colin Cross0c22e8b2012-11-02 15:46:56 -0700179 func(pid, cmdline);
180}
181
182void for_each_pid(for_each_pid_func func, const char *header) {
Felipe Leme93d705b2015-11-10 20:10:25 -0800183 ON_DRY_RUN_RETURN();
Felipe Leme8620bb42015-11-10 11:04:45 -0800184 __for_each_pid(for_each_pid_helper, header, (void *)func);
Colin Cross0c22e8b2012-11-02 15:46:56 -0700185}
186
187static void for_each_tid_helper(int pid, const char *cmdline, void *arg) {
188 DIR *d;
189 struct dirent *de;
190 char taskpath[255];
Felipe Leme8620bb42015-11-10 11:04:45 -0800191 for_each_tid_func *func = (for_each_tid_func *) arg;
Colin Cross0c22e8b2012-11-02 15:46:56 -0700192
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700193 snprintf(taskpath, sizeof(taskpath), "/proc/%d/task", pid);
Colin Cross0c22e8b2012-11-02 15:46:56 -0700194
195 if (!(d = opendir(taskpath))) {
196 printf("Failed to open %s (%s)\n", taskpath, strerror(errno));
197 return;
198 }
199
200 func(pid, pid, cmdline);
201
202 while ((de = readdir(d))) {
203 int tid;
204 int fd;
205 char commpath[255];
206 char comm[255];
207
208 if (!(tid = atoi(de->d_name))) {
209 continue;
210 }
211
212 if (tid == pid)
213 continue;
214
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700215 snprintf(commpath, sizeof(commpath), "/proc/%d/comm", tid);
Colin Cross1493a392012-11-07 11:25:31 -0800216 memset(comm, 0, sizeof(comm));
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700217 if ((fd = TEMP_FAILURE_RETRY(open(commpath, O_RDONLY | O_CLOEXEC))) < 0) {
Colin Cross0c22e8b2012-11-02 15:46:56 -0700218 strcpy(comm, "N/A");
219 } else {
220 char *c;
Mark Salyzyna297c322016-02-05 15:33:17 -0800221 TEMP_FAILURE_RETRY(read(fd, comm, sizeof(comm) - 2));
Colin Cross0c22e8b2012-11-02 15:46:56 -0700222 close(fd);
223
224 c = strrchr(comm, '\n');
225 if (c) {
226 *c = '\0';
227 }
228 }
229 func(pid, tid, comm);
230 }
231
232 closedir(d);
233}
234
235void for_each_tid(for_each_tid_func func, const char *header) {
Felipe Leme93d705b2015-11-10 20:10:25 -0800236 ON_DRY_RUN_RETURN();
Felipe Leme8620bb42015-11-10 11:04:45 -0800237 __for_each_pid(for_each_tid_helper, header, (void *) func);
Colin Cross0c22e8b2012-11-02 15:46:56 -0700238}
239
240void show_wchan(int pid, int tid, const char *name) {
Felipe Leme93d705b2015-11-10 20:10:25 -0800241 ON_DRY_RUN_RETURN();
Colin Crossf45fa6b2012-03-26 12:38:26 -0700242 char path[255];
243 char buffer[255];
Mark Salyzyna297c322016-02-05 15:33:17 -0800244 int fd, ret, save_errno;
Colin Cross0c22e8b2012-11-02 15:46:56 -0700245 char name_buffer[255];
Colin Crossf45fa6b2012-03-26 12:38:26 -0700246
247 memset(buffer, 0, sizeof(buffer));
248
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700249 snprintf(path, sizeof(path), "/proc/%d/wchan", tid);
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700250 if ((fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC))) < 0) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700251 printf("Failed to open '%s' (%s)\n", path, strerror(errno));
252 return;
253 }
254
Mark Salyzyna297c322016-02-05 15:33:17 -0800255 ret = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
256 save_errno = errno;
257 close(fd);
258
259 if (ret < 0) {
260 printf("Failed to read '%s' (%s)\n", path, strerror(save_errno));
261 return;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700262 }
263
Colin Cross0c22e8b2012-11-02 15:46:56 -0700264 snprintf(name_buffer, sizeof(name_buffer), "%*s%s",
265 pid == tid ? 0 : 3, "", name);
266
267 printf("%-7d %-32s %s\n", tid, name_buffer, buffer);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700268
Mark Salyzyna297c322016-02-05 15:33:17 -0800269 return;
270}
271
272// print time in centiseconds
273static void snprcent(char *buffer, size_t len, size_t spc,
274 unsigned long long time) {
275 static long hz; // cache discovered hz
276
277 if (hz <= 0) {
278 hz = sysconf(_SC_CLK_TCK);
279 if (hz <= 0) {
280 hz = 1000;
281 }
282 }
283
284 // convert to centiseconds
285 time = (time * 100 + (hz / 2)) / hz;
286
287 char str[16];
288
289 snprintf(str, sizeof(str), " %llu.%02u",
290 time / 100, (unsigned)(time % 100));
291 size_t offset = strlen(buffer);
292 snprintf(buffer + offset, (len > offset) ? len - offset : 0,
293 "%*s", (spc > offset) ? (int)(spc - offset) : 0, str);
294}
295
296// print permille as a percent
297static void snprdec(char *buffer, size_t len, size_t spc, unsigned permille) {
298 char str[16];
299
300 snprintf(str, sizeof(str), " %u.%u%%", permille / 10, permille % 10);
301 size_t offset = strlen(buffer);
302 snprintf(buffer + offset, (len > offset) ? len - offset : 0,
303 "%*s", (spc > offset) ? (int)(spc - offset) : 0, str);
304}
305
306void show_showtime(int pid, const char *name) {
307 ON_DRY_RUN_RETURN();
308 char path[255];
309 char buffer[1023];
310 int fd, ret, save_errno;
311
312 memset(buffer, 0, sizeof(buffer));
313
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700314 snprintf(path, sizeof(path), "/proc/%d/stat", pid);
Mark Salyzyna297c322016-02-05 15:33:17 -0800315 if ((fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC))) < 0) {
316 printf("Failed to open '%s' (%s)\n", path, strerror(errno));
317 return;
318 }
319
320 ret = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
321 save_errno = errno;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700322 close(fd);
Mark Salyzyna297c322016-02-05 15:33:17 -0800323
324 if (ret < 0) {
325 printf("Failed to read '%s' (%s)\n", path, strerror(save_errno));
326 return;
327 }
328
329 // field 14 is utime
330 // field 15 is stime
331 // field 42 is iotime
332 unsigned long long utime = 0, stime = 0, iotime = 0;
333 if (sscanf(buffer,
Xia Yang60292e52016-02-16 03:05:18 -0800334 "%*u %*s %*s %*d %*d %*d %*d %*d %*d %*d %*d "
335 "%*d %*d %llu %llu %*d %*d %*d %*d %*d %*d "
336 "%*d %*d %*d %*d %*d %*d %*d %*d %*d %*d "
337 "%*d %*d %*d %*d %*d %*d %*d %*d %*d %llu ",
Mark Salyzyna297c322016-02-05 15:33:17 -0800338 &utime, &stime, &iotime) != 3) {
339 return;
340 }
341
342 unsigned long long total = utime + stime;
343 if (!total) {
344 return;
345 }
346
347 unsigned permille = (iotime * 1000 + (total / 2)) / total;
348 if (permille > 1000) {
349 permille = 1000;
350 }
351
352 // try to beautify and stabilize columns at <80 characters
353 snprintf(buffer, sizeof(buffer), "%-6d%s", pid, name);
354 if ((name[0] != '[') || utime) {
355 snprcent(buffer, sizeof(buffer), 57, utime);
356 }
357 snprcent(buffer, sizeof(buffer), 65, stime);
358 if ((name[0] != '[') || iotime) {
359 snprcent(buffer, sizeof(buffer), 73, iotime);
360 }
361 if (iotime) {
362 snprdec(buffer, sizeof(buffer), 79, permille);
363 }
364 puts(buffer); // adds a trailing newline
365
Colin Crossf45fa6b2012-03-26 12:38:26 -0700366 return;
367}
368
369void do_dmesg() {
Felipe Leme78f2c862015-12-21 09:55:22 -0800370 const char *title = "KERNEL LOG (dmesg)";
371 DurationReporter duration_reporter(title);
372 printf("------ %s ------\n", title);
373
Felipe Leme93d705b2015-11-10 20:10:25 -0800374 ON_DRY_RUN_RETURN();
Elliott Hughes5f87b312012-09-17 11:43:40 -0700375 /* Get size of kernel buffer */
376 int size = klogctl(KLOG_SIZE_BUFFER, NULL, 0);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700377 if (size <= 0) {
378 printf("Unexpected klogctl return value: %d\n\n", size);
379 return;
380 }
381 char *buf = (char *) malloc(size + 1);
382 if (buf == NULL) {
383 printf("memory allocation failed\n\n");
384 return;
385 }
386 int retval = klogctl(KLOG_READ_ALL, buf, size);
387 if (retval < 0) {
388 printf("klogctl failure\n\n");
389 free(buf);
390 return;
391 }
392 buf[retval] = '\0';
393 printf("%s\n\n", buf);
394 free(buf);
395 return;
396}
397
398void do_showmap(int pid, const char *name) {
399 char title[255];
400 char arg[255];
401
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700402 snprintf(title, sizeof(title), "SHOW MAP %d (%s)", pid, name);
403 snprintf(arg, sizeof(arg), "%d", pid);
Felipe Leme3dba69a2016-03-17 14:59:13 -0700404 run_command(title, 10, SU_PATH, "root", "showmap", "-q", arg, NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700405}
406
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800407static int _dump_file_from_fd(const char *title, const char *path, int fd) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700408 if (title) {
Christopher Ferrised24d2a2015-11-12 14:01:56 -0800409 printf("------ %s (%s", title, path);
410
Colin Crossf45fa6b2012-03-26 12:38:26 -0700411 struct stat st;
Christopher Ferrised24d2a2015-11-12 14:01:56 -0800412 // Only show the modification time of non-device files.
413 size_t path_len = strlen(path);
414 if ((path_len < 6 || memcmp(path, "/proc/", 6)) &&
415 (path_len < 5 || memcmp(path, "/sys/", 5)) &&
416 (path_len < 3 || memcmp(path, "/d/", 3)) &&
417 !fstat(fd, &st)) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700418 char stamp[80];
419 time_t mtime = st.st_mtime;
420 strftime(stamp, sizeof(stamp), "%Y-%m-%d %H:%M:%S", localtime(&mtime));
421 printf(": %s", stamp);
422 }
423 printf(") ------\n");
424 }
Felipe Leme71bbfc52015-11-23 14:14:51 -0800425 ON_DRY_RUN({ update_progress(WEIGHT_FILE); close(fd); return 0; });
Colin Crossf45fa6b2012-03-26 12:38:26 -0700426
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800427 bool newline = false;
428 fd_set read_set;
429 struct timeval tm;
430 while (1) {
431 FD_ZERO(&read_set);
432 FD_SET(fd, &read_set);
433 /* Timeout if no data is read for 30 seconds. */
434 tm.tv_sec = 30;
435 tm.tv_usec = 0;
Felipe Leme78f2c862015-12-21 09:55:22 -0800436 uint64_t elapsed = DurationReporter::nanotime();
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800437 int ret = TEMP_FAILURE_RETRY(select(fd + 1, &read_set, NULL, NULL, &tm));
438 if (ret == -1) {
439 printf("*** %s: select failed: %s\n", path, strerror(errno));
440 newline = true;
441 break;
442 } else if (ret == 0) {
Felipe Leme78f2c862015-12-21 09:55:22 -0800443 elapsed = DurationReporter::nanotime() - elapsed;
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800444 printf("*** %s: Timed out after %.3fs\n", path,
445 (float) elapsed / NANOS_PER_SEC);
446 newline = true;
447 break;
448 } else {
449 char buffer[65536];
450 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
451 if (bytes_read > 0) {
452 fwrite(buffer, bytes_read, 1, stdout);
453 newline = (buffer[bytes_read-1] == '\n');
454 } else {
455 if (bytes_read == -1) {
456 printf("*** %s: Failed to read from fd: %s", path, strerror(errno));
457 newline = true;
458 }
459 break;
460 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700461 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700462 }
Felipe Leme71bbfc52015-11-23 14:14:51 -0800463 update_progress(WEIGHT_FILE);
Elliott Hughes997abb62015-05-15 17:05:40 -0700464 close(fd);
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700465
Colin Crossf45fa6b2012-03-26 12:38:26 -0700466 if (!newline) printf("\n");
467 if (title) printf("\n");
468 return 0;
469}
470
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800471/* prints the contents of a file */
472int dump_file(const char *title, const char *path) {
Felipe Leme78f2c862015-12-21 09:55:22 -0800473 DurationReporter duration_reporter(title);
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800474 int fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_NONBLOCK | O_CLOEXEC));
475 if (fd < 0) {
476 int err = errno;
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800477 printf("*** %s: %s\n", path, strerror(err));
478 if (title) printf("\n");
479 return -1;
480 }
481 return _dump_file_from_fd(title, path, fd);
482}
483
Felipe Leme71a74ac2016-03-17 15:43:25 -0700484int read_file_as_long(const char *path, long int *output) {
485 int fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_NONBLOCK | O_CLOEXEC));
486 if (fd < 0) {
487 int err = errno;
488 MYLOGE("Error opening file descriptor for %s: %s\n", path, strerror(err));
489 return -1;
490 }
491 char buffer[50];
492 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
493 if (bytes_read == -1) {
494 MYLOGE("Error reading file %s: %s\n", path, strerror(errno));
495 return -2;
496 }
497 if (bytes_read == 0) {
498 MYLOGE("File %s is empty\n", path);
499 return -3;
500 }
501 *output = atoi(buffer);
502 return 0;
503}
504
Mark Salyzyn326842f2015-04-30 09:49:41 -0700505/* calls skip to gate calling dump_from_fd recursively
506 * in the specified directory. dump_from_fd defaults to
507 * dump_file_from_fd above when set to NULL. skip defaults
508 * to false when set to NULL. dump_from_fd will always be
509 * called with title NULL.
510 */
511int dump_files(const char *title, const char *dir,
512 bool (*skip)(const char *path),
513 int (*dump_from_fd)(const char *title, const char *path, int fd)) {
Felipe Leme78f2c862015-12-21 09:55:22 -0800514 DurationReporter duration_reporter(title);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700515 DIR *dirp;
516 struct dirent *d;
517 char *newpath = NULL;
Felipe Leme8620bb42015-11-10 11:04:45 -0800518 const char *slash = "/";
Mark Salyzyn326842f2015-04-30 09:49:41 -0700519 int fd, retval = 0;
520
521 if (title) {
522 printf("------ %s (%s) ------\n", title, dir);
523 }
Felipe Leme93d705b2015-11-10 20:10:25 -0800524 ON_DRY_RUN_RETURN(0);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700525
526 if (dir[strlen(dir) - 1] == '/') {
527 ++slash;
528 }
529 dirp = opendir(dir);
530 if (dirp == NULL) {
531 retval = -errno;
Felipe Leme107a05f2016-03-08 15:11:15 -0800532 MYLOGE("%s: %s\n", dir, strerror(errno));
Mark Salyzyn326842f2015-04-30 09:49:41 -0700533 return retval;
534 }
535
536 if (!dump_from_fd) {
537 dump_from_fd = dump_file_from_fd;
538 }
539 for (; ((d = readdir(dirp))); free(newpath), newpath = NULL) {
540 if ((d->d_name[0] == '.')
541 && (((d->d_name[1] == '.') && (d->d_name[2] == '\0'))
542 || (d->d_name[1] == '\0'))) {
543 continue;
544 }
545 asprintf(&newpath, "%s%s%s%s", dir, slash, d->d_name,
546 (d->d_type == DT_DIR) ? "/" : "");
547 if (!newpath) {
548 retval = -errno;
549 continue;
550 }
551 if (skip && (*skip)(newpath)) {
552 continue;
553 }
554 if (d->d_type == DT_DIR) {
555 int ret = dump_files(NULL, newpath, skip, dump_from_fd);
556 if (ret < 0) {
557 retval = ret;
558 }
559 continue;
560 }
561 fd = TEMP_FAILURE_RETRY(open(newpath, O_RDONLY | O_NONBLOCK | O_CLOEXEC));
562 if (fd < 0) {
563 retval = fd;
564 printf("*** %s: %s\n", newpath, strerror(errno));
565 continue;
566 }
567 (*dump_from_fd)(NULL, newpath, fd);
568 }
569 closedir(dirp);
570 if (title) {
571 printf("\n");
572 }
573 return retval;
574}
575
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800576/* fd must have been opened with the flag O_NONBLOCK. With this flag set,
577 * it's possible to avoid issues where opening the file itself can get
578 * stuck.
579 */
580int dump_file_from_fd(const char *title, const char *path, int fd) {
581 int flags = fcntl(fd, F_GETFL);
582 if (flags == -1) {
583 printf("*** %s: failed to get flags on fd %d: %s\n", path, fd, strerror(errno));
Christopher Ferrised24d2a2015-11-12 14:01:56 -0800584 close(fd);
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800585 return -1;
586 } else if (!(flags & O_NONBLOCK)) {
587 printf("*** %s: fd must have O_NONBLOCK set.\n", path);
Christopher Ferrised24d2a2015-11-12 14:01:56 -0800588 close(fd);
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800589 return -1;
590 }
591 return _dump_file_from_fd(title, path, fd);
Jeff Brown1dc94e32014-09-11 14:15:27 -0700592}
593
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800594bool waitpid_with_timeout(pid_t pid, int timeout_seconds, int* status) {
595 sigset_t child_mask, old_mask;
596 sigemptyset(&child_mask);
597 sigaddset(&child_mask, SIGCHLD);
598
599 if (sigprocmask(SIG_BLOCK, &child_mask, &old_mask) == -1) {
600 printf("*** sigprocmask failed: %s\n", strerror(errno));
601 return false;
602 }
603
604 struct timespec ts;
605 ts.tv_sec = timeout_seconds;
606 ts.tv_nsec = 0;
607 int ret = TEMP_FAILURE_RETRY(sigtimedwait(&child_mask, NULL, &ts));
608 int saved_errno = errno;
609 // Set the signals back the way they were.
610 if (sigprocmask(SIG_SETMASK, &old_mask, NULL) == -1) {
611 printf("*** sigprocmask failed: %s\n", strerror(errno));
612 if (ret == 0) {
613 return false;
614 }
615 }
616 if (ret == -1) {
617 errno = saved_errno;
618 if (errno == EAGAIN) {
619 errno = ETIMEDOUT;
620 } else {
621 printf("*** sigtimedwait failed: %s\n", strerror(errno));
622 }
623 return false;
624 }
625
626 pid_t child_pid = waitpid(pid, status, WNOHANG);
627 if (child_pid != pid) {
628 if (child_pid != -1) {
629 printf("*** Waiting for pid %d, got pid %d instead\n", pid, child_pid);
630 } else {
631 printf("*** waitpid failed: %s\n", strerror(errno));
632 }
633 return false;
634 }
635 return true;
636}
637
Felipe Lemea34efb72016-03-11 09:33:32 -0800638// TODO: refactor all those commands that convert args
639void format_args(const char* command, const char *args[], std::string *string);
640
Colin Crossf45fa6b2012-03-26 12:38:26 -0700641int run_command(const char *title, int timeout_seconds, const char *command, ...) {
Felipe Leme78f2c862015-12-21 09:55:22 -0800642 DurationReporter duration_reporter(title);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700643 fflush(stdout);
Felipe Leme93d705b2015-11-10 20:10:25 -0800644
645 const char *args[1024] = {command};
646 size_t arg;
647 va_list ap;
648 va_start(ap, command);
649 if (title) printf("------ %s (%s", title, command);
Felipe Lemea34efb72016-03-11 09:33:32 -0800650 bool null_terminated = false;
Felipe Leme93d705b2015-11-10 20:10:25 -0800651 for (arg = 1; arg < sizeof(args) / sizeof(args[0]); ++arg) {
652 args[arg] = va_arg(ap, const char *);
Felipe Lemea34efb72016-03-11 09:33:32 -0800653 if (args[arg] == nullptr) {
654 null_terminated = true;
655 break;
656 }
Felipe Lemeea160d12016-03-24 11:29:44 -0700657 // TODO: null_terminated check is not really working; line below would crash dumpstate if
658 // nullptr is missing
Felipe Leme93d705b2015-11-10 20:10:25 -0800659 if (title) printf(" %s", args[arg]);
660 }
661 if (title) printf(") ------\n");
662 fflush(stdout);
Felipe Lemea34efb72016-03-11 09:33:32 -0800663 if (!null_terminated) {
664 // Fail now, otherwise execvp() call on run_command_always() might hang.
665 std::string cmd;
666 format_args(command, args, &cmd);
667 MYLOGE("skipping command %s because its args were not NULL-terminated", cmd.c_str());
668 return -1;
669 }
Felipe Leme93d705b2015-11-10 20:10:25 -0800670
Felipe Leme71bbfc52015-11-23 14:14:51 -0800671 ON_DRY_RUN({ update_progress(timeout_seconds); va_end(ap); return 0; });
Felipe Leme93d705b2015-11-10 20:10:25 -0800672
Felipe Leme29c39712016-04-01 10:02:00 -0700673 int status = run_command_always(title, DONT_DROP_ROOT, NORMAL_STDOUT, timeout_seconds, args);
Felipe Lemecf6a8b42016-03-11 10:38:19 -0800674 va_end(ap);
675 return status;
676}
677
678int run_command_as_shell(const char *title, int timeout_seconds, const char *command, ...) {
679 DurationReporter duration_reporter(title);
680 fflush(stdout);
681
682 const char *args[1024] = {command};
683 size_t arg;
684 va_list ap;
685 va_start(ap, command);
686 if (title) printf("------ %s (%s", title, command);
687 bool null_terminated = false;
688 for (arg = 1; arg < sizeof(args) / sizeof(args[0]); ++arg) {
689 args[arg] = va_arg(ap, const char *);
690 if (args[arg] == nullptr) {
691 null_terminated = true;
692 break;
693 }
Felipe Lemeea160d12016-03-24 11:29:44 -0700694 // TODO: null_terminated check is not really working; line below would crash dumpstate if
695 // nullptr is missing
Felipe Lemecf6a8b42016-03-11 10:38:19 -0800696 if (title) printf(" %s", args[arg]);
697 }
698 if (title) printf(") ------\n");
699 fflush(stdout);
700 if (!null_terminated) {
701 // Fail now, otherwise execvp() call on run_command_always() might hang.
702 std::string cmd;
703 format_args(command, args, &cmd);
704 MYLOGE("skipping command %s because its args were not NULL-terminated", cmd.c_str());
705 return -1;
706 }
707
708 ON_DRY_RUN({ update_progress(timeout_seconds); va_end(ap); return 0; });
709
Felipe Leme29c39712016-04-01 10:02:00 -0700710 int status = run_command_always(title, DROP_ROOT, NORMAL_STDOUT, timeout_seconds, args);
Felipe Leme71bbfc52015-11-23 14:14:51 -0800711 va_end(ap);
712 return status;
Felipe Leme93d705b2015-11-10 20:10:25 -0800713}
714
715/* forks a command and waits for it to finish */
Felipe Leme29c39712016-04-01 10:02:00 -0700716int run_command_always(const char *title, RootMode root_mode, StdoutMode stdout_mode,
717 int timeout_seconds, const char *args[]) {
718 bool silent = (stdout_mode == REDIRECT_TO_STDERR);
Felipe Lemeea160d12016-03-24 11:29:44 -0700719 // TODO: need to check if args is null-terminated, otherwise execvp will crash dumpstate
720
Felipe Leme71bbfc52015-11-23 14:14:51 -0800721 /* TODO: for now we're simplifying the progress calculation by using the timeout as the weight.
722 * It's a good approximation for most cases, except when calling dumpsys, where its weight
723 * should be much higher proportionally to its timeout. */
724 int weight = timeout_seconds;
Felipe Leme93d705b2015-11-10 20:10:25 -0800725
Felipe Leme36b3f6f2015-11-19 15:41:04 -0800726 const char *command = args[0];
Felipe Leme78f2c862015-12-21 09:55:22 -0800727 uint64_t start = DurationReporter::nanotime();
Colin Crossf45fa6b2012-03-26 12:38:26 -0700728 pid_t pid = fork();
729
730 /* handle error case */
731 if (pid < 0) {
Felipe Leme29c39712016-04-01 10:02:00 -0700732 if (!silent) printf("*** fork: %s\n", strerror(errno));
733 MYLOGE("*** fork: %s\n", strerror(errno));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700734 return pid;
735 }
736
737 /* handle child case */
738 if (pid == 0) {
Felipe Leme29c39712016-04-01 10:02:00 -0700739 if (root_mode == DROP_ROOT && !drop_root_user()) {
740 if (!silent) printf("*** fail todrop root before running %s: %s\n", command,
741 strerror(errno));
742 MYLOGE("*** could not drop root before running %s: %s\n", command, strerror(errno));
Felipe Leme73f731c2016-03-23 16:47:00 -0700743 return -1;
Felipe Lemecf6a8b42016-03-11 10:38:19 -0800744 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700745
Felipe Leme29c39712016-04-01 10:02:00 -0700746 if (silent) {
747 // Redirect stderr to stdout
748 dup2(STDERR_FILENO, STDOUT_FILENO);
749 }
750
John Michelaue7b6cf12013-03-07 15:35:35 -0600751 /* make sure the child dies when dumpstate dies */
752 prctl(PR_SET_PDEATHSIG, SIGKILL);
753
Andres Morales2e671bb2014-08-21 12:38:22 -0700754 /* just ignore SIGPIPE, will go down with parent's */
755 struct sigaction sigact;
756 memset(&sigact, 0, sizeof(sigact));
757 sigact.sa_handler = SIG_IGN;
758 sigaction(SIGPIPE, &sigact, NULL);
759
Colin Crossf45fa6b2012-03-26 12:38:26 -0700760 execvp(command, (char**) args);
Felipe Lemeea160d12016-03-24 11:29:44 -0700761 // execvp's result will be handled after waitpid_with_timeout() below, but if it failed,
762 // it's safer to exit dumpstate.
763 MYLOGD("execvp on command '%s' failed (error: %s)", command, strerror(errno));
Felipe Lemeec725782016-03-23 11:47:00 -0700764 fflush(stdout);
Felipe Lemebaa85bd2016-03-29 13:29:11 -0700765 // Must call _exit (instead of exit), otherwise it will corrupt the zip file.
766 _exit(EXIT_FAILURE);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700767 }
768
769 /* handle parent case */
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800770 int status;
771 bool ret = waitpid_with_timeout(pid, timeout_seconds, &status);
Felipe Leme78f2c862015-12-21 09:55:22 -0800772 uint64_t elapsed = DurationReporter::nanotime() - start;
Felipe Lemea34efb72016-03-11 09:33:32 -0800773 std::string cmd; // used to log command and its args
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800774 if (!ret) {
775 if (errno == ETIMEDOUT) {
Felipe Lemea34efb72016-03-11 09:33:32 -0800776 format_args(command, args, &cmd);
Felipe Leme29c39712016-04-01 10:02:00 -0700777 if (!silent) printf("*** command '%s' timed out after %.3fs (killing pid %d)\n",
778 cmd.c_str(), (float) elapsed / NANOS_PER_SEC, pid);
Felipe Lemea34efb72016-03-11 09:33:32 -0800779 MYLOGE("command '%s' timed out after %.3fs (killing pid %d)\n", cmd.c_str(),
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800780 (float) elapsed / NANOS_PER_SEC, pid);
781 } else {
Felipe Lemea34efb72016-03-11 09:33:32 -0800782 format_args(command, args, &cmd);
Felipe Leme29c39712016-04-01 10:02:00 -0700783 if (!silent) printf("*** command '%s': Error after %.4fs (killing pid %d)\n",
784 cmd.c_str(), (float) elapsed / NANOS_PER_SEC, pid);
Felipe Lemea34efb72016-03-11 09:33:32 -0800785 MYLOGE("command '%s': Error after %.4fs (killing pid %d)\n", cmd.c_str(),
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800786 (float) elapsed / NANOS_PER_SEC, pid);
787 }
788 kill(pid, SIGTERM);
789 if (!waitpid_with_timeout(pid, 5, NULL)) {
790 kill(pid, SIGKILL);
791 if (!waitpid_with_timeout(pid, 5, NULL)) {
Felipe Leme29c39712016-04-01 10:02:00 -0700792 if (!silent) printf("could not kill command '%s' (pid %d) even with SIGKILL.\n",
793 command, pid);
Felipe Leme14e034a2016-03-30 18:51:03 -0700794 MYLOGE("could not kill command '%s' (pid %d) even with SIGKILL.\n", command, pid);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700795 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700796 }
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800797 return -1;
Felipe Lemea34efb72016-03-11 09:33:32 -0800798 } else if (status) {
799 format_args(command, args, &cmd);
Felipe Leme29c39712016-04-01 10:02:00 -0700800 if (!silent) printf("*** command '%s' failed: %s\n", cmd.c_str(), strerror(errno));
Felipe Lemea34efb72016-03-11 09:33:32 -0800801 MYLOGE("command '%s' failed: %s\n", cmd.c_str(), strerror(errno));
802 return -2;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700803 }
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800804
805 if (WIFSIGNALED(status)) {
Felipe Leme29c39712016-04-01 10:02:00 -0700806 if (!silent) printf("*** %s: Killed by signal %d\n", command, WTERMSIG(status));
807 MYLOGE("*** %s: Killed by signal %d\n", command, WTERMSIG(status));
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800808 } else if (WIFEXITED(status) && WEXITSTATUS(status) > 0) {
Felipe Leme29c39712016-04-01 10:02:00 -0700809 if (!silent) printf("*** %s: Exit code %d\n", command, WEXITSTATUS(status));
810 MYLOGE("*** %s: Exit code %d\n", command, WEXITSTATUS(status));
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800811 }
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800812
Felipe Leme71bbfc52015-11-23 14:14:51 -0800813 if (weight > 0) {
814 update_progress(weight);
815 }
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800816 return status;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700817}
818
Felipe Lemecf6a8b42016-03-11 10:38:19 -0800819bool drop_root_user() {
820 if (getgid() == AID_SHELL && getuid() == AID_SHELL) {
821 MYLOGD("drop_root_user(): already running as Shell");
822 return true;
823 }
824 /* ensure we will keep capabilities when we drop root */
825 if (prctl(PR_SET_KEEPCAPS, 1) < 0) {
826 MYLOGE("prctl(PR_SET_KEEPCAPS) failed: %s\n", strerror(errno));
827 return false;
828 }
829
830 gid_t groups[] = { AID_LOG, AID_SDCARD_R, AID_SDCARD_RW,
Felipe Lemebb6b6042016-10-25 18:18:24 +0000831 AID_MOUNT, AID_INET, AID_NET_BW_STATS, AID_READPROC };
Felipe Lemecf6a8b42016-03-11 10:38:19 -0800832 if (setgroups(sizeof(groups)/sizeof(groups[0]), groups) != 0) {
833 MYLOGE("Unable to setgroups, aborting: %s\n", strerror(errno));
834 return false;
835 }
836 if (setgid(AID_SHELL) != 0) {
837 MYLOGE("Unable to setgid, aborting: %s\n", strerror(errno));
838 return false;
839 }
840 if (setuid(AID_SHELL) != 0) {
841 MYLOGE("Unable to setuid, aborting: %s\n", strerror(errno));
842 return false;
843 }
844
845 struct __user_cap_header_struct capheader;
846 struct __user_cap_data_struct capdata[2];
847 memset(&capheader, 0, sizeof(capheader));
848 memset(&capdata, 0, sizeof(capdata));
849 capheader.version = _LINUX_CAPABILITY_VERSION_3;
850 capheader.pid = 0;
851
Felipe Lemebb6b6042016-10-25 18:18:24 +0000852 capdata[CAP_TO_INDEX(CAP_SYSLOG)].permitted = CAP_TO_MASK(CAP_SYSLOG);
853 capdata[CAP_TO_INDEX(CAP_SYSLOG)].effective = CAP_TO_MASK(CAP_SYSLOG);
Felipe Lemecf6a8b42016-03-11 10:38:19 -0800854 capdata[0].inheritable = 0;
855 capdata[1].inheritable = 0;
856
857 if (capset(&capheader, &capdata[0]) < 0) {
858 MYLOGE("capset failed: %s\n", strerror(errno));
859 return false;
860 }
861
862 return true;
863}
864
Felipe Leme36b3f6f2015-11-19 15:41:04 -0800865void send_broadcast(const std::string& action, const std::vector<std::string>& args) {
866 if (args.size() > 1000) {
Felipe Leme107a05f2016-03-08 15:11:15 -0800867 MYLOGE("send_broadcast: too many arguments (%d)\n", (int) args.size());
Felipe Leme36b3f6f2015-11-19 15:41:04 -0800868 return;
869 }
Felipe Lemecf6a8b42016-03-11 10:38:19 -0800870 const char *am_args[1024] = { "/system/bin/am", "broadcast", "--user", "0", "-a",
871 action.c_str() };
872 size_t am_index = 5; // Starts at the index of last initial value above.
Felipe Leme36b3f6f2015-11-19 15:41:04 -0800873 for (const std::string& arg : args) {
874 am_args[++am_index] = arg.c_str();
875 }
876 // Always terminate with NULL.
877 am_args[am_index + 1] = NULL;
Felipe Lemea34efb72016-03-11 09:33:32 -0800878 std::string args_string;
879 format_args(am_index + 1, am_args, &args_string);
880 MYLOGD("send_broadcast command: %s\n", args_string.c_str());
Felipe Leme29c39712016-04-01 10:02:00 -0700881 run_command_always(NULL, DROP_ROOT, REDIRECT_TO_STDERR, 20, am_args);
Felipe Leme36b3f6f2015-11-19 15:41:04 -0800882}
883
Colin Crossf45fa6b2012-03-26 12:38:26 -0700884size_t num_props = 0;
885static char* props[2000];
886
887static void print_prop(const char *key, const char *name, void *user) {
888 (void) user;
889 if (num_props < sizeof(props) / sizeof(props[0])) {
890 char buf[PROPERTY_KEY_MAX + PROPERTY_VALUE_MAX + 10];
891 snprintf(buf, sizeof(buf), "[%s]: [%s]\n", key, name);
892 props[num_props++] = strdup(buf);
893 }
894}
895
896static int compare_prop(const void *a, const void *b) {
897 return strcmp(*(char * const *) a, *(char * const *) b);
898}
899
900/* prints all the system properties */
901void print_properties() {
Felipe Leme78f2c862015-12-21 09:55:22 -0800902 const char* title = "SYSTEM PROPERTIES";
903 DurationReporter duration_reporter(title);
904 printf("------ %s ------\n", title);
Felipe Leme93d705b2015-11-10 20:10:25 -0800905 ON_DRY_RUN_RETURN();
Colin Crossf45fa6b2012-03-26 12:38:26 -0700906 size_t i;
907 num_props = 0;
908 property_list(print_prop, NULL);
909 qsort(&props, num_props, sizeof(props[0]), compare_prop);
910
Colin Crossf45fa6b2012-03-26 12:38:26 -0700911 for (i = 0; i < num_props; ++i) {
912 fputs(props[i], stdout);
913 free(props[i]);
914 }
915 printf("\n");
916}
917
Felipe Leme2628e9e2016-04-12 16:36:51 -0700918int open_socket(const char *service) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700919 int s = android_get_control_socket(service);
920 if (s < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -0800921 MYLOGE("android_get_control_socket(%s): %s\n", service, strerror(errno));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700922 exit(1);
923 }
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700924 fcntl(s, F_SETFD, FD_CLOEXEC);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700925 if (listen(s, 4) < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -0800926 MYLOGE("listen(control socket): %s\n", strerror(errno));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700927 exit(1);
928 }
929
930 struct sockaddr addr;
931 socklen_t alen = sizeof(addr);
932 int fd = accept(s, &addr, &alen);
933 if (fd < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -0800934 MYLOGE("accept(control socket): %s\n", strerror(errno));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700935 exit(1);
936 }
937
Felipe Leme2628e9e2016-04-12 16:36:51 -0700938 return fd;
939}
940
941/* redirect output to a service control socket */
942void redirect_to_socket(FILE *redirect, const char *service) {
943 int fd = open_socket(service);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700944 fflush(redirect);
945 dup2(fd, fileno(redirect));
946 close(fd);
947}
948
Felipe Leme2628e9e2016-04-12 16:36:51 -0700949// TODO: should call is_valid_output_file and/or be merged into it.
Felipe Leme111b9d02016-02-03 09:28:24 -0800950void create_parent_dirs(const char *path) {
Srinath Sridharanfdf52d32016-02-01 15:50:22 -0800951 char *chp = const_cast<char *> (path);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700952
953 /* skip initial slash */
954 if (chp[0] == '/')
955 chp++;
956
957 /* create leading directories, if necessary */
Felipe Leme111b9d02016-02-03 09:28:24 -0800958 struct stat dir_stat;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700959 while (chp && chp[0]) {
960 chp = strchr(chp, '/');
961 if (chp) {
962 *chp = 0;
Felipe Leme111b9d02016-02-03 09:28:24 -0800963 if (stat(path, &dir_stat) == -1 || !S_ISDIR(dir_stat.st_mode)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800964 MYLOGI("Creating directory %s\n", path);
Felipe Leme111b9d02016-02-03 09:28:24 -0800965 if (mkdir(path, 0770)) { /* drwxrwx--- */
Felipe Lemecbce55d2016-02-08 09:53:18 -0800966 MYLOGE("Unable to create directory %s: %s\n", path, strerror(errno));
Felipe Leme111b9d02016-02-03 09:28:24 -0800967 } else if (chown(path, AID_SHELL, AID_SHELL)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800968 MYLOGE("Unable to change ownership of dir %s: %s\n", path, strerror(errno));
Felipe Leme111b9d02016-02-03 09:28:24 -0800969 }
970 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700971 *chp++ = '/';
972 }
973 }
Felipe Leme111b9d02016-02-03 09:28:24 -0800974}
975
976/* redirect output to a file */
977void redirect_to_file(FILE *redirect, char *path) {
978 create_parent_dirs(path);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700979
Felipe Leme608385d2016-02-01 10:35:38 -0800980 int fd = TEMP_FAILURE_RETRY(open(path, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC | O_NOFOLLOW,
Christopher Ferrisff4a4dc2015-02-09 16:24:47 -0800981 S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700982 if (fd < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -0800983 MYLOGE("%s: %s\n", path, strerror(errno));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700984 exit(1);
985 }
986
Christopher Ferrisff4a4dc2015-02-09 16:24:47 -0800987 TEMP_FAILURE_RETRY(dup2(fd, fileno(redirect)));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700988 close(fd);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700989}
990
Jeff Brownbf7f4922012-06-07 16:40:01 -0700991static bool should_dump_native_traces(const char* path) {
992 for (const char** p = native_processes_to_dump; *p; p++) {
993 if (!strcmp(*p, path)) {
994 return true;
995 }
996 }
997 return false;
998}
999
1000/* dump Dalvik and native stack traces, return the trace file location (NULL if none) */
1001const char *dump_traces() {
Felipe Leme608385d2016-02-01 10:35:38 -08001002 DurationReporter duration_reporter("DUMP TRACES", NULL);
Felipe Leme93d705b2015-11-10 20:10:25 -08001003 ON_DRY_RUN_RETURN(NULL);
Jeff Brownbf7f4922012-06-07 16:40:01 -07001004 const char* result = NULL;
1005
Colin Crossf45fa6b2012-03-26 12:38:26 -07001006 char traces_path[PROPERTY_VALUE_MAX] = "";
1007 property_get("dalvik.vm.stack-trace-file", traces_path, "");
1008 if (!traces_path[0]) return NULL;
1009
1010 /* move the old traces.txt (if any) out of the way temporarily */
1011 char anr_traces_path[PATH_MAX];
1012 strlcpy(anr_traces_path, traces_path, sizeof(anr_traces_path));
1013 strlcat(anr_traces_path, ".anr", sizeof(anr_traces_path));
1014 if (rename(traces_path, anr_traces_path) && errno != ENOENT) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001015 MYLOGE("rename(%s, %s): %s\n", traces_path, anr_traces_path, strerror(errno));
Colin Crossf45fa6b2012-03-26 12:38:26 -07001016 return NULL; // Can't rename old traces.txt -- no permission? -- leave it alone instead
1017 }
1018
Colin Crossf45fa6b2012-03-26 12:38:26 -07001019 /* create a new, empty traces.txt file to receive stack dumps */
Nick Kralevichcd67e9f2015-03-19 11:30:59 -07001020 int fd = TEMP_FAILURE_RETRY(open(traces_path, O_CREAT | O_WRONLY | O_TRUNC | O_NOFOLLOW | O_CLOEXEC,
Christopher Ferris54bcc5f2015-02-10 12:15:01 -08001021 0666)); /* -rw-rw-rw- */
Colin Crossf45fa6b2012-03-26 12:38:26 -07001022 if (fd < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001023 MYLOGE("%s: %s\n", traces_path, strerror(errno));
Colin Crossf45fa6b2012-03-26 12:38:26 -07001024 return NULL;
1025 }
Nick Kralevichc7f1fe22012-04-06 09:31:28 -07001026 int chmod_ret = fchmod(fd, 0666);
1027 if (chmod_ret < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001028 MYLOGE("fchmod on %s failed: %s\n", traces_path, strerror(errno));
Nick Kralevichc7f1fe22012-04-06 09:31:28 -07001029 close(fd);
1030 return NULL;
1031 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001032
Felipe Leme8620bb42015-11-10 11:04:45 -08001033 /* Variables below must be initialized before 'goto' statements */
1034 int dalvik_found = 0;
1035 int ifd, wfd = -1;
1036
Colin Crossf45fa6b2012-03-26 12:38:26 -07001037 /* walk /proc and kill -QUIT all Dalvik processes */
1038 DIR *proc = opendir("/proc");
1039 if (proc == NULL) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001040 MYLOGE("/proc: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -07001041 goto error_close_fd;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001042 }
1043
1044 /* use inotify to find when processes are done dumping */
Felipe Leme8620bb42015-11-10 11:04:45 -08001045 ifd = inotify_init();
Colin Crossf45fa6b2012-03-26 12:38:26 -07001046 if (ifd < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001047 MYLOGE("inotify_init: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -07001048 goto error_close_fd;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001049 }
1050
Felipe Leme8620bb42015-11-10 11:04:45 -08001051 wfd = inotify_add_watch(ifd, traces_path, IN_CLOSE_WRITE);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001052 if (wfd < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001053 MYLOGE("inotify_add_watch(%s): %s\n", traces_path, strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -07001054 goto error_close_ifd;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001055 }
1056
1057 struct dirent *d;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001058 while ((d = readdir(proc))) {
1059 int pid = atoi(d->d_name);
1060 if (pid <= 0) continue;
1061
Jeff Brownbf7f4922012-06-07 16:40:01 -07001062 char path[PATH_MAX];
1063 char data[PATH_MAX];
Colin Crossf45fa6b2012-03-26 12:38:26 -07001064 snprintf(path, sizeof(path), "/proc/%d/exe", pid);
Jeff Brownbf7f4922012-06-07 16:40:01 -07001065 ssize_t len = readlink(path, data, sizeof(data) - 1);
1066 if (len <= 0) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001067 continue;
1068 }
Jeff Brownbf7f4922012-06-07 16:40:01 -07001069 data[len] = '\0';
Colin Crossf45fa6b2012-03-26 12:38:26 -07001070
Colin Cross0d6180f2014-07-16 19:00:46 -07001071 if (!strncmp(data, "/system/bin/app_process", strlen("/system/bin/app_process"))) {
Jeff Brownbf7f4922012-06-07 16:40:01 -07001072 /* skip zygote -- it won't dump its stack anyway */
1073 snprintf(path, sizeof(path), "/proc/%d/cmdline", pid);
Nick Kralevichcd67e9f2015-03-19 11:30:59 -07001074 int cfd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC));
Jeff Brown1dc94e32014-09-11 14:15:27 -07001075 len = read(cfd, data, sizeof(data) - 1);
1076 close(cfd);
Jeff Brownbf7f4922012-06-07 16:40:01 -07001077 if (len <= 0) {
1078 continue;
1079 }
1080 data[len] = '\0';
Colin Cross0d6180f2014-07-16 19:00:46 -07001081 if (!strncmp(data, "zygote", strlen("zygote"))) {
Jeff Brownbf7f4922012-06-07 16:40:01 -07001082 continue;
1083 }
1084
1085 ++dalvik_found;
Felipe Leme78f2c862015-12-21 09:55:22 -08001086 uint64_t start = DurationReporter::nanotime();
Jeff Brownbf7f4922012-06-07 16:40:01 -07001087 if (kill(pid, SIGQUIT)) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001088 MYLOGE("kill(%d, SIGQUIT): %s\n", pid, strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -07001089 continue;
1090 }
1091
1092 /* wait for the writable-close notification from inotify */
1093 struct pollfd pfd = { ifd, POLLIN, 0 };
Nick Vaccaro85453ec2014-04-30 11:19:23 -07001094 int ret = poll(&pfd, 1, 5000); /* 5 sec timeout */
Jeff Brownbf7f4922012-06-07 16:40:01 -07001095 if (ret < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001096 MYLOGE("poll: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -07001097 } else if (ret == 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001098 MYLOGE("warning: timed out dumping pid %d\n", pid);
Jeff Brownbf7f4922012-06-07 16:40:01 -07001099 } else {
1100 struct inotify_event ie;
1101 read(ifd, &ie, sizeof(ie));
1102 }
Jeff Brown1dc94e32014-09-11 14:15:27 -07001103
1104 if (lseek(fd, 0, SEEK_END) < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001105 MYLOGE("lseek: %s\n", strerror(errno));
Jeff Brown1dc94e32014-09-11 14:15:27 -07001106 } else {
Christopher Ferris31ef8552015-01-14 13:23:30 -08001107 dprintf(fd, "[dump dalvik stack %d: %.3fs elapsed]\n",
Felipe Leme78f2c862015-12-21 09:55:22 -08001108 pid, (float)(DurationReporter::nanotime() - start) / NANOS_PER_SEC);
Jeff Brown1dc94e32014-09-11 14:15:27 -07001109 }
Jeff Brownbf7f4922012-06-07 16:40:01 -07001110 } else if (should_dump_native_traces(data)) {
1111 /* dump native process if appropriate */
1112 if (lseek(fd, 0, SEEK_END) < 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001113 MYLOGE("lseek: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -07001114 } else {
Christopher Ferris31ef8552015-01-14 13:23:30 -08001115 static uint16_t timeout_failures = 0;
Felipe Leme78f2c862015-12-21 09:55:22 -08001116 uint64_t start = DurationReporter::nanotime();
Christopher Ferris31ef8552015-01-14 13:23:30 -08001117
1118 /* If 3 backtrace dumps fail in a row, consider debuggerd dead. */
1119 if (timeout_failures == 3) {
1120 dprintf(fd, "too many stack dump failures, skipping...\n");
1121 } else if (dump_backtrace_to_file_timeout(pid, fd, 20) == -1) {
1122 dprintf(fd, "dumping failed, likely due to a timeout\n");
1123 timeout_failures++;
1124 } else {
1125 timeout_failures = 0;
1126 }
1127 dprintf(fd, "[dump native stack %d: %.3fs elapsed]\n",
Felipe Leme78f2c862015-12-21 09:55:22 -08001128 pid, (float)(DurationReporter::nanotime() - start) / NANOS_PER_SEC);
Jeff Brownbf7f4922012-06-07 16:40:01 -07001129 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001130 }
1131 }
1132
Colin Crossf45fa6b2012-03-26 12:38:26 -07001133 if (dalvik_found == 0) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001134 MYLOGE("Warning: no Dalvik processes found to dump stacks\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001135 }
1136
1137 static char dump_traces_path[PATH_MAX];
1138 strlcpy(dump_traces_path, traces_path, sizeof(dump_traces_path));
1139 strlcat(dump_traces_path, ".bugreport", sizeof(dump_traces_path));
1140 if (rename(traces_path, dump_traces_path)) {
Felipe Leme107a05f2016-03-08 15:11:15 -08001141 MYLOGE("rename(%s, %s): %s\n", traces_path, dump_traces_path, strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -07001142 goto error_close_ifd;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001143 }
Jeff Brownbf7f4922012-06-07 16:40:01 -07001144 result = dump_traces_path;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001145
1146 /* replace the saved [ANR] traces.txt file */
1147 rename(anr_traces_path, traces_path);
Jeff Brownbf7f4922012-06-07 16:40:01 -07001148
1149error_close_ifd:
1150 close(ifd);
1151error_close_fd:
1152 close(fd);
1153 return result;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001154}
1155
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -07001156void dump_route_tables() {
Felipe Leme78f2c862015-12-21 09:55:22 -08001157 DurationReporter duration_reporter("DUMP ROUTE TABLES");
Felipe Leme93d705b2015-11-10 20:10:25 -08001158 ON_DRY_RUN_RETURN();
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -07001159 const char* const RT_TABLES_PATH = "/data/misc/net/rt_tables";
1160 dump_file("RT_TABLES", RT_TABLES_PATH);
Nick Kralevichcd67e9f2015-03-19 11:30:59 -07001161 FILE* fp = fopen(RT_TABLES_PATH, "re");
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -07001162 if (!fp) {
1163 printf("*** %s: %s\n", RT_TABLES_PATH, strerror(errno));
1164 return;
1165 }
1166 char table[16];
1167 // Each line has an integer (the table number), a space, and a string (the table name). We only
1168 // need the table number. It's a 32-bit unsigned number, so max 10 chars. Skip the table name.
1169 // Add a fixed max limit so this doesn't go awry.
1170 for (int i = 0; i < 64 && fscanf(fp, " %10s %*s", table) == 1; ++i) {
1171 run_command("ROUTE TABLE IPv4", 10, "ip", "-4", "route", "show", "table", table, NULL);
1172 run_command("ROUTE TABLE IPv6", 10, "ip", "-6", "route", "show", "table", table, NULL);
1173 }
1174 fclose(fp);
1175}
Felipe Leme71bbfc52015-11-23 14:14:51 -08001176
1177/* overall progress */
1178int progress = 0;
Felipe Leme08b55782015-12-01 08:40:52 -08001179int do_update_progress = 0; // Set by dumpstate.cpp
Felipe Lemead5f6c42015-11-30 14:26:46 -08001180int weight_total = WEIGHT_TOTAL;
Felipe Leme71bbfc52015-11-23 14:14:51 -08001181
1182// TODO: make this function thread safe if sections are generated in parallel.
1183void update_progress(int delta) {
1184 if (!do_update_progress) return;
1185
1186 progress += delta;
1187
1188 char key[PROPERTY_KEY_MAX];
1189 char value[PROPERTY_VALUE_MAX];
Felipe Lemead5f6c42015-11-30 14:26:46 -08001190
1191 // adjusts max on the fly
1192 if (progress > weight_total) {
1193 int new_total = weight_total * 1.2;
Felipe Leme107a05f2016-03-08 15:11:15 -08001194 MYLOGD("Adjusting total weight from %d to %d\n", weight_total, new_total);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001195 weight_total = new_total;
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001196 snprintf(key, sizeof(key), "dumpstate.%d.max", getpid());
1197 snprintf(value, sizeof(value), "%d", weight_total);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001198 int status = property_set(key, value);
1199 if (status) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001200 MYLOGE("Could not update max weight by setting system property %s to %s: %d\n",
Felipe Lemead5f6c42015-11-30 14:26:46 -08001201 key, value, status);
1202 }
1203 }
1204
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001205 snprintf(key, sizeof(key), "dumpstate.%d.progress", getpid());
1206 snprintf(value, sizeof(value), "%d", progress);
Felipe Leme71bbfc52015-11-23 14:14:51 -08001207
Felipe Leme107a05f2016-03-08 15:11:15 -08001208 if (progress % 100 == 0) {
1209 // We don't want to spam logcat, so only log multiples of 100.
1210 MYLOGD("Setting progress (%s): %s/%d\n", key, value, weight_total);
1211 } else {
1212 // stderr is ignored on normal invocations, but useful when calling /system/bin/dumpstate
1213 // directly for debuggging.
1214 fprintf(stderr, "Setting progress (%s): %s/%d\n", key, value, weight_total);
1215 }
Felipe Leme71bbfc52015-11-23 14:14:51 -08001216
Felipe Leme02b7e002016-07-22 12:03:20 -07001217 if (control_socket_fd >= 0) {
1218 dprintf(control_socket_fd, "PROGRESS:%d/%d\n", progress, weight_total);
1219 fsync(control_socket_fd);
1220 }
1221
Felipe Leme71bbfc52015-11-23 14:14:51 -08001222 int status = property_set(key, value);
1223 if (status) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001224 MYLOGE("Could not update progress by setting system property %s to %s: %d\n",
Felipe Leme71bbfc52015-11-23 14:14:51 -08001225 key, value, status);
1226 }
1227}
Felipe Lemee338bf62015-12-07 14:03:50 -08001228
Felipe Leme3634a1e2015-12-09 10:11:47 -08001229void take_screenshot(const std::string& path) {
Felipe Lemee338bf62015-12-07 14:03:50 -08001230 const char *args[] = { "/system/bin/screencap", "-p", path.c_str(), NULL };
Felipe Leme29c39712016-04-01 10:02:00 -07001231 run_command_always(NULL, DONT_DROP_ROOT, REDIRECT_TO_STDERR, 10, args);
Felipe Lemee338bf62015-12-07 14:03:50 -08001232}
Mark Salyzynf55d4022015-12-11 07:32:31 -08001233
Felipe Leme0c80cf02016-01-05 13:25:34 -08001234void vibrate(FILE* vibrator, int ms) {
1235 fprintf(vibrator, "%d\n", ms);
1236 fflush(vibrator);
1237}
1238
1239bool is_dir(const char* pathname) {
1240 struct stat info;
1241 if (stat(pathname, &info) == -1) {
1242 return false;
1243 }
1244 return S_ISDIR(info.st_mode);
1245}
1246
1247time_t get_mtime(int fd, time_t default_mtime) {
1248 struct stat info;
1249 if (fstat(fd, &info) == -1) {
1250 return default_mtime;
1251 }
1252 return info.st_mtime;
1253}
1254
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001255void dump_emmc_ecsd(const char *ext_csd_path) {
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001256 // List of interesting offsets
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001257 struct hex {
1258 char str[2];
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001259 };
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001260 static const size_t EXT_CSD_REV = 192 * sizeof(hex);
1261 static const size_t EXT_PRE_EOL_INFO = 267 * sizeof(hex);
1262 static const size_t EXT_DEVICE_LIFE_TIME_EST_TYP_A = 268 * sizeof(hex);
1263 static const size_t EXT_DEVICE_LIFE_TIME_EST_TYP_B = 269 * sizeof(hex);
1264
1265 std::string buffer;
1266 if (!android::base::ReadFileToString(ext_csd_path, &buffer)) {
1267 return;
1268 }
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001269
1270 printf("------ %s Extended CSD ------\n", ext_csd_path);
1271
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001272 if (buffer.length() < (EXT_CSD_REV + sizeof(hex))) {
1273 printf("*** %s: truncated content %zu\n\n", ext_csd_path, buffer.length());
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001274 return;
1275 }
1276
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001277 int ext_csd_rev = 0;
1278 std::string sub = buffer.substr(EXT_CSD_REV, sizeof(hex));
1279 if (sscanf(sub.c_str(), "%2x", &ext_csd_rev) != 1) {
1280 printf("*** %s: EXT_CSD_REV parse error \"%s\"\n\n",
1281 ext_csd_path, sub.c_str());
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001282 return;
1283 }
1284
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001285 static const char *ver_str[] = {
1286 "4.0", "4.1", "4.2", "4.3", "Obsolete", "4.41", "4.5", "5.0"
1287 };
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001288 printf("rev 1.%d (MMC %s)\n",
1289 ext_csd_rev,
1290 (ext_csd_rev < (int)(sizeof(ver_str) / sizeof(ver_str[0]))) ?
1291 ver_str[ext_csd_rev] :
1292 "Unknown");
1293 if (ext_csd_rev < 7) {
1294 printf("\n");
1295 return;
1296 }
1297
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001298 if (buffer.length() < (EXT_PRE_EOL_INFO + sizeof(hex))) {
1299 printf("*** %s: truncated content %zu\n\n", ext_csd_path, buffer.length());
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001300 return;
1301 }
1302
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001303 int ext_pre_eol_info = 0;
1304 sub = buffer.substr(EXT_PRE_EOL_INFO, sizeof(hex));
1305 if (sscanf(sub.c_str(), "%2x", &ext_pre_eol_info) != 1) {
1306 printf("*** %s: PRE_EOL_INFO parse error \"%s\"\n\n",
1307 ext_csd_path, sub.c_str());
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001308 return;
1309 }
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001310
1311 static const char *eol_str[] = {
1312 "Undefined",
1313 "Normal",
1314 "Warning (consumed 80% of reserve)",
1315 "Urgent (consumed 90% of reserve)"
1316 };
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001317 printf("PRE_EOL_INFO %d (MMC %s)\n",
1318 ext_pre_eol_info,
1319 eol_str[(ext_pre_eol_info < (int)
1320 (sizeof(eol_str) / sizeof(eol_str[0]))) ?
1321 ext_pre_eol_info : 0]);
1322
1323 for (size_t lifetime = EXT_DEVICE_LIFE_TIME_EST_TYP_A;
1324 lifetime <= EXT_DEVICE_LIFE_TIME_EST_TYP_B;
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001325 lifetime += sizeof(hex)) {
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001326 int ext_device_life_time_est;
1327 static const char *est_str[] = {
1328 "Undefined",
1329 "0-10% of device lifetime used",
1330 "10-20% of device lifetime used",
1331 "20-30% of device lifetime used",
1332 "30-40% of device lifetime used",
1333 "40-50% of device lifetime used",
1334 "50-60% of device lifetime used",
1335 "60-70% of device lifetime used",
1336 "70-80% of device lifetime used",
1337 "80-90% of device lifetime used",
1338 "90-100% of device lifetime used",
1339 "Exceeded the maximum estimated device lifetime",
1340 };
1341
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001342 if (buffer.length() < (lifetime + sizeof(hex))) {
1343 printf("*** %s: truncated content %zu\n", ext_csd_path, buffer.length());
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001344 break;
1345 }
1346
1347 ext_device_life_time_est = 0;
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001348 sub = buffer.substr(lifetime, sizeof(hex));
1349 if (sscanf(sub.c_str(), "%2x", &ext_device_life_time_est) != 1) {
1350 printf("*** %s: DEVICE_LIFE_TIME_EST_TYP_%c parse error \"%s\"\n",
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001351 ext_csd_path,
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001352 (unsigned)((lifetime - EXT_DEVICE_LIFE_TIME_EST_TYP_A) /
1353 sizeof(hex)) + 'A',
1354 sub.c_str());
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001355 continue;
1356 }
1357 printf("DEVICE_LIFE_TIME_EST_TYP_%c %d (MMC %s)\n",
Mark Salyzyn09fc6bc2016-05-16 08:33:59 -07001358 (unsigned)((lifetime - EXT_DEVICE_LIFE_TIME_EST_TYP_A) /
1359 sizeof(hex)) + 'A',
Mark Salyzyn8c8130e2015-12-09 11:21:28 -08001360 ext_device_life_time_est,
1361 est_str[(ext_device_life_time_est < (int)
1362 (sizeof(est_str) / sizeof(est_str[0]))) ?
1363 ext_device_life_time_est : 0]);
1364 }
1365
1366 printf("\n");
1367}
Felipe Leme88c79332016-02-22 11:06:49 -08001368
Felipe Lemea34efb72016-03-11 09:33:32 -08001369// TODO: refactor all those commands that convert args
1370void format_args(int argc, const char *argv[], std::string *args) {
1371 LOG_ALWAYS_FATAL_IF(args == nullptr);
Felipe Leme88c79332016-02-22 11:06:49 -08001372 for (int i = 0; i < argc; i++) {
Felipe Lemea34efb72016-03-11 09:33:32 -08001373 args->append(argv[i]);
1374 if (i < argc -1) {
1375 args->append(" ");
1376 }
Felipe Leme88c79332016-02-22 11:06:49 -08001377 }
Felipe Lemea34efb72016-03-11 09:33:32 -08001378}
1379void format_args(const char* command, const char *args[], std::string *string) {
1380 LOG_ALWAYS_FATAL_IF(args == nullptr || command == nullptr);
1381 string->append(command);
1382 if (args[0] == nullptr) return;
1383 string->append(" ");
1384
1385 for (int arg = 1; arg <= 1000; ++arg) {
1386 if (args[arg] == nullptr) return;
1387 string->append(args[arg]);
1388 if (args[arg+1] != nullptr) {
1389 string->append(" ");
1390 }
1391 }
Felipe Lemeea160d12016-03-24 11:29:44 -07001392 // TODO: not really working: if NULL is missing, it will crash dumpstate.
Felipe Lemea34efb72016-03-11 09:33:32 -08001393 MYLOGE("internal error: missing NULL entry on %s", string->c_str());
Felipe Leme88c79332016-02-22 11:06:49 -08001394}