blob: cf14c8b77076f2558995db98c9116eabbff9abca [file] [log] [blame]
Colin Crossf45fa6b2012-03-26 12:38:26 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <dirent.h>
18#include <errno.h>
19#include <fcntl.h>
20#include <limits.h>
21#include <poll.h>
22#include <signal.h>
23#include <stdarg.h>
24#include <stdio.h>
25#include <stdlib.h>
26#include <string.h>
27#include <sys/inotify.h>
28#include <sys/stat.h>
29#include <sys/time.h>
30#include <sys/wait.h>
31#include <sys/klog.h>
32#include <time.h>
33#include <unistd.h>
John Michelaue7b6cf12013-03-07 15:35:35 -060034#include <sys/prctl.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070035
Jeff Brownbf7f4922012-06-07 16:40:01 -070036#include <cutils/debugger.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070037#include <cutils/properties.h>
38#include <cutils/sockets.h>
39#include <private/android_filesystem_config.h>
40
Robert Craig95798372013-04-04 06:33:10 -040041#include <selinux/android.h>
42
Colin Crossf45fa6b2012-03-26 12:38:26 -070043#include "dumpstate.h"
44
Jeff Brown1dc94e32014-09-11 14:15:27 -070045static const int64_t NANOS_PER_SEC = 1000000000;
46
Jeff Brownbf7f4922012-06-07 16:40:01 -070047/* list of native processes to include in the native dumps */
48static const char* native_processes_to_dump[] = {
James Dong1fc4f802012-09-10 16:08:48 -070049 "/system/bin/drmserver",
Jeff Brownbf7f4922012-06-07 16:40:01 -070050 "/system/bin/mediaserver",
51 "/system/bin/sdcard",
52 "/system/bin/surfaceflinger",
53 NULL,
54};
55
Christopher Ferris54bcc5f2015-02-10 12:15:01 -080056static uint64_t nanotime() {
57 struct timespec ts;
58 clock_gettime(CLOCK_MONOTONIC, &ts);
59 return (uint64_t)ts.tv_sec * NANOS_PER_SEC + ts.tv_nsec;
60}
61
John Spurlock5ecd4be2014-01-29 14:14:40 -050062void for_each_userid(void (*func)(int), const char *header) {
63 DIR *d;
64 struct dirent *de;
65
66 if (header) printf("\n------ %s ------\n", header);
67 func(0);
68
69 if (!(d = opendir("/data/system/users"))) {
70 printf("Failed to open /data/system/users (%s)\n", strerror(errno));
71 return;
72 }
73
74 while ((de = readdir(d))) {
75 int userid;
76 if (de->d_type != DT_DIR || !(userid = atoi(de->d_name))) {
77 continue;
78 }
79 func(userid);
80 }
81
82 closedir(d);
83}
84
Colin Cross0c22e8b2012-11-02 15:46:56 -070085static void __for_each_pid(void (*helper)(int, const char *, void *), const char *header, void *arg) {
Colin Crossf45fa6b2012-03-26 12:38:26 -070086 DIR *d;
87 struct dirent *de;
88
89 if (!(d = opendir("/proc"))) {
90 printf("Failed to open /proc (%s)\n", strerror(errno));
91 return;
92 }
93
94 printf("\n------ %s ------\n", header);
95 while ((de = readdir(d))) {
96 int pid;
97 int fd;
98 char cmdpath[255];
99 char cmdline[255];
100
101 if (!(pid = atoi(de->d_name))) {
102 continue;
103 }
104
105 sprintf(cmdpath,"/proc/%d/cmdline", pid);
106 memset(cmdline, 0, sizeof(cmdline));
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700107 if ((fd = TEMP_FAILURE_RETRY(open(cmdpath, O_RDONLY | O_CLOEXEC))) < 0) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700108 strcpy(cmdline, "N/A");
109 } else {
Colin Cross0c22e8b2012-11-02 15:46:56 -0700110 read(fd, cmdline, sizeof(cmdline) - 1);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700111 close(fd);
112 }
Colin Cross0c22e8b2012-11-02 15:46:56 -0700113 helper(pid, cmdline, arg);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700114 }
115
116 closedir(d);
117}
118
Colin Cross0c22e8b2012-11-02 15:46:56 -0700119static void for_each_pid_helper(int pid, const char *cmdline, void *arg) {
120 for_each_pid_func *func = arg;
121 func(pid, cmdline);
122}
123
124void for_each_pid(for_each_pid_func func, const char *header) {
125 __for_each_pid(for_each_pid_helper, header, func);
126}
127
128static void for_each_tid_helper(int pid, const char *cmdline, void *arg) {
129 DIR *d;
130 struct dirent *de;
131 char taskpath[255];
132 for_each_tid_func *func = arg;
133
134 sprintf(taskpath, "/proc/%d/task", pid);
135
136 if (!(d = opendir(taskpath))) {
137 printf("Failed to open %s (%s)\n", taskpath, strerror(errno));
138 return;
139 }
140
141 func(pid, pid, cmdline);
142
143 while ((de = readdir(d))) {
144 int tid;
145 int fd;
146 char commpath[255];
147 char comm[255];
148
149 if (!(tid = atoi(de->d_name))) {
150 continue;
151 }
152
153 if (tid == pid)
154 continue;
155
156 sprintf(commpath,"/proc/%d/comm", tid);
Colin Cross1493a392012-11-07 11:25:31 -0800157 memset(comm, 0, sizeof(comm));
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700158 if ((fd = TEMP_FAILURE_RETRY(open(commpath, O_RDONLY | O_CLOEXEC))) < 0) {
Colin Cross0c22e8b2012-11-02 15:46:56 -0700159 strcpy(comm, "N/A");
160 } else {
161 char *c;
162 read(fd, comm, sizeof(comm) - 1);
163 close(fd);
164
165 c = strrchr(comm, '\n');
166 if (c) {
167 *c = '\0';
168 }
169 }
170 func(pid, tid, comm);
171 }
172
173 closedir(d);
174}
175
176void for_each_tid(for_each_tid_func func, const char *header) {
177 __for_each_pid(for_each_tid_helper, header, func);
178}
179
180void show_wchan(int pid, int tid, const char *name) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700181 char path[255];
182 char buffer[255];
183 int fd;
Colin Cross0c22e8b2012-11-02 15:46:56 -0700184 char name_buffer[255];
Colin Crossf45fa6b2012-03-26 12:38:26 -0700185
186 memset(buffer, 0, sizeof(buffer));
187
Colin Cross0c22e8b2012-11-02 15:46:56 -0700188 sprintf(path, "/proc/%d/wchan", tid);
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700189 if ((fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC))) < 0) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700190 printf("Failed to open '%s' (%s)\n", path, strerror(errno));
191 return;
192 }
193
194 if (read(fd, buffer, sizeof(buffer)) < 0) {
195 printf("Failed to read '%s' (%s)\n", path, strerror(errno));
196 goto out_close;
197 }
198
Colin Cross0c22e8b2012-11-02 15:46:56 -0700199 snprintf(name_buffer, sizeof(name_buffer), "%*s%s",
200 pid == tid ? 0 : 3, "", name);
201
202 printf("%-7d %-32s %s\n", tid, name_buffer, buffer);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700203
204out_close:
205 close(fd);
206 return;
207}
208
John Spurlock5ecd4be2014-01-29 14:14:40 -0500209void do_dump_settings(int userid) {
210 char title[255];
211 char dbpath[255];
212 char sql[255];
213 sprintf(title, "SYSTEM SETTINGS (user %d)", userid);
214 if (userid == 0) {
215 strcpy(dbpath, "/data/data/com.android.providers.settings/databases/settings.db");
216 strcpy(sql, "pragma user_version; select * from system; select * from secure; select * from global;");
217 } else {
218 sprintf(dbpath, "/data/system/users/%d/settings.db", userid);
219 strcpy(sql, "pragma user_version; select * from system; select * from secure;");
220 }
221 run_command(title, 20, SU_PATH, "root", "sqlite3", dbpath, sql, NULL);
222 return;
223}
224
Colin Crossf45fa6b2012-03-26 12:38:26 -0700225void do_dmesg() {
226 printf("------ KERNEL LOG (dmesg) ------\n");
Elliott Hughes5f87b312012-09-17 11:43:40 -0700227 /* Get size of kernel buffer */
228 int size = klogctl(KLOG_SIZE_BUFFER, NULL, 0);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700229 if (size <= 0) {
230 printf("Unexpected klogctl return value: %d\n\n", size);
231 return;
232 }
233 char *buf = (char *) malloc(size + 1);
234 if (buf == NULL) {
235 printf("memory allocation failed\n\n");
236 return;
237 }
238 int retval = klogctl(KLOG_READ_ALL, buf, size);
239 if (retval < 0) {
240 printf("klogctl failure\n\n");
241 free(buf);
242 return;
243 }
244 buf[retval] = '\0';
245 printf("%s\n\n", buf);
246 free(buf);
247 return;
248}
249
250void do_showmap(int pid, const char *name) {
251 char title[255];
252 char arg[255];
253
254 sprintf(title, "SHOW MAP %d (%s)", pid, name);
255 sprintf(arg, "%d", pid);
256 run_command(title, 10, SU_PATH, "root", "showmap", arg, NULL);
257}
258
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800259static int _dump_file_from_fd(const char *title, const char *path, int fd) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700260 if (title) printf("------ %s (%s", title, path);
261
262 if (title) {
263 struct stat st;
264 if (memcmp(path, "/proc/", 6) && memcmp(path, "/sys/", 5) && !fstat(fd, &st)) {
265 char stamp[80];
266 time_t mtime = st.st_mtime;
267 strftime(stamp, sizeof(stamp), "%Y-%m-%d %H:%M:%S", localtime(&mtime));
268 printf(": %s", stamp);
269 }
270 printf(") ------\n");
271 }
272
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800273 bool newline = false;
274 fd_set read_set;
275 struct timeval tm;
276 while (1) {
277 FD_ZERO(&read_set);
278 FD_SET(fd, &read_set);
279 /* Timeout if no data is read for 30 seconds. */
280 tm.tv_sec = 30;
281 tm.tv_usec = 0;
282 uint64_t elapsed = nanotime();
283 int ret = TEMP_FAILURE_RETRY(select(fd + 1, &read_set, NULL, NULL, &tm));
284 if (ret == -1) {
285 printf("*** %s: select failed: %s\n", path, strerror(errno));
286 newline = true;
287 break;
288 } else if (ret == 0) {
289 elapsed = nanotime() - elapsed;
290 printf("*** %s: Timed out after %.3fs\n", path,
291 (float) elapsed / NANOS_PER_SEC);
292 newline = true;
293 break;
294 } else {
295 char buffer[65536];
296 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
297 if (bytes_read > 0) {
298 fwrite(buffer, bytes_read, 1, stdout);
299 newline = (buffer[bytes_read-1] == '\n');
300 } else {
301 if (bytes_read == -1) {
302 printf("*** %s: Failed to read from fd: %s", path, strerror(errno));
303 newline = true;
304 }
305 break;
306 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700307 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700308 }
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800309 TEMP_FAILURE_RETRY(close(fd));
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700310
Colin Crossf45fa6b2012-03-26 12:38:26 -0700311 if (!newline) printf("\n");
312 if (title) printf("\n");
313 return 0;
314}
315
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800316/* prints the contents of a file */
317int dump_file(const char *title, const char *path) {
318 int fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_NONBLOCK | O_CLOEXEC));
319 if (fd < 0) {
320 int err = errno;
321 if (title) printf("------ %s (%s) ------\n", title, path);
322 printf("*** %s: %s\n", path, strerror(err));
323 if (title) printf("\n");
324 return -1;
325 }
326 return _dump_file_from_fd(title, path, fd);
327}
328
329/* fd must have been opened with the flag O_NONBLOCK. With this flag set,
330 * it's possible to avoid issues where opening the file itself can get
331 * stuck.
332 */
333int dump_file_from_fd(const char *title, const char *path, int fd) {
334 int flags = fcntl(fd, F_GETFL);
335 if (flags == -1) {
336 printf("*** %s: failed to get flags on fd %d: %s\n", path, fd, strerror(errno));
337 return -1;
338 } else if (!(flags & O_NONBLOCK)) {
339 printf("*** %s: fd must have O_NONBLOCK set.\n", path);
340 return -1;
341 }
342 return _dump_file_from_fd(title, path, fd);
Jeff Brown1dc94e32014-09-11 14:15:27 -0700343}
344
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800345bool waitpid_with_timeout(pid_t pid, int timeout_seconds, int* status) {
346 sigset_t child_mask, old_mask;
347 sigemptyset(&child_mask);
348 sigaddset(&child_mask, SIGCHLD);
349
350 if (sigprocmask(SIG_BLOCK, &child_mask, &old_mask) == -1) {
351 printf("*** sigprocmask failed: %s\n", strerror(errno));
352 return false;
353 }
354
355 struct timespec ts;
356 ts.tv_sec = timeout_seconds;
357 ts.tv_nsec = 0;
358 int ret = TEMP_FAILURE_RETRY(sigtimedwait(&child_mask, NULL, &ts));
359 int saved_errno = errno;
360 // Set the signals back the way they were.
361 if (sigprocmask(SIG_SETMASK, &old_mask, NULL) == -1) {
362 printf("*** sigprocmask failed: %s\n", strerror(errno));
363 if (ret == 0) {
364 return false;
365 }
366 }
367 if (ret == -1) {
368 errno = saved_errno;
369 if (errno == EAGAIN) {
370 errno = ETIMEDOUT;
371 } else {
372 printf("*** sigtimedwait failed: %s\n", strerror(errno));
373 }
374 return false;
375 }
376
377 pid_t child_pid = waitpid(pid, status, WNOHANG);
378 if (child_pid != pid) {
379 if (child_pid != -1) {
380 printf("*** Waiting for pid %d, got pid %d instead\n", pid, child_pid);
381 } else {
382 printf("*** waitpid failed: %s\n", strerror(errno));
383 }
384 return false;
385 }
386 return true;
387}
388
Colin Crossf45fa6b2012-03-26 12:38:26 -0700389/* forks a command and waits for it to finish */
390int run_command(const char *title, int timeout_seconds, const char *command, ...) {
391 fflush(stdout);
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800392 uint64_t start = nanotime();
Colin Crossf45fa6b2012-03-26 12:38:26 -0700393 pid_t pid = fork();
394
395 /* handle error case */
396 if (pid < 0) {
397 printf("*** fork: %s\n", strerror(errno));
398 return pid;
399 }
400
401 /* handle child case */
402 if (pid == 0) {
403 const char *args[1024] = {command};
404 size_t arg;
405
John Michelaue7b6cf12013-03-07 15:35:35 -0600406 /* make sure the child dies when dumpstate dies */
407 prctl(PR_SET_PDEATHSIG, SIGKILL);
408
Andres Morales2e671bb2014-08-21 12:38:22 -0700409 /* just ignore SIGPIPE, will go down with parent's */
410 struct sigaction sigact;
411 memset(&sigact, 0, sizeof(sigact));
412 sigact.sa_handler = SIG_IGN;
413 sigaction(SIGPIPE, &sigact, NULL);
414
Colin Crossf45fa6b2012-03-26 12:38:26 -0700415 va_list ap;
416 va_start(ap, command);
417 if (title) printf("------ %s (%s", title, command);
418 for (arg = 1; arg < sizeof(args) / sizeof(args[0]); ++arg) {
419 args[arg] = va_arg(ap, const char *);
420 if (args[arg] == NULL) break;
421 if (title) printf(" %s", args[arg]);
422 }
423 if (title) printf(") ------\n");
424 fflush(stdout);
425
426 execvp(command, (char**) args);
427 printf("*** exec(%s): %s\n", command, strerror(errno));
428 fflush(stdout);
429 _exit(-1);
430 }
431
432 /* handle parent case */
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800433 int status;
434 bool ret = waitpid_with_timeout(pid, timeout_seconds, &status);
435 uint64_t elapsed = nanotime() - start;
436 if (!ret) {
437 if (errno == ETIMEDOUT) {
438 printf("*** %s: Timed out after %.3fs (killing pid %d)\n", command,
439 (float) elapsed / NANOS_PER_SEC, pid);
440 } else {
441 printf("*** %s: Error after %.4fs (killing pid %d)\n", command,
442 (float) elapsed / NANOS_PER_SEC, pid);
443 }
444 kill(pid, SIGTERM);
445 if (!waitpid_with_timeout(pid, 5, NULL)) {
446 kill(pid, SIGKILL);
447 if (!waitpid_with_timeout(pid, 5, NULL)) {
448 printf("*** %s: Cannot kill %d even with SIGKILL.\n", command, pid);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700449 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700450 }
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800451 return -1;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700452 }
Christopher Ferris1a9a3382015-01-30 11:00:52 -0800453
454 if (WIFSIGNALED(status)) {
455 printf("*** %s: Killed by signal %d\n", command, WTERMSIG(status));
456 } else if (WIFEXITED(status) && WEXITSTATUS(status) > 0) {
457 printf("*** %s: Exit code %d\n", command, WEXITSTATUS(status));
458 }
459 if (title) printf("[%s: %.3fs elapsed]\n\n", command, (float)elapsed / NANOS_PER_SEC);
460
461 return status;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700462}
463
464size_t num_props = 0;
465static char* props[2000];
466
467static void print_prop(const char *key, const char *name, void *user) {
468 (void) user;
469 if (num_props < sizeof(props) / sizeof(props[0])) {
470 char buf[PROPERTY_KEY_MAX + PROPERTY_VALUE_MAX + 10];
471 snprintf(buf, sizeof(buf), "[%s]: [%s]\n", key, name);
472 props[num_props++] = strdup(buf);
473 }
474}
475
476static int compare_prop(const void *a, const void *b) {
477 return strcmp(*(char * const *) a, *(char * const *) b);
478}
479
480/* prints all the system properties */
481void print_properties() {
482 size_t i;
483 num_props = 0;
484 property_list(print_prop, NULL);
485 qsort(&props, num_props, sizeof(props[0]), compare_prop);
486
487 printf("------ SYSTEM PROPERTIES ------\n");
488 for (i = 0; i < num_props; ++i) {
489 fputs(props[i], stdout);
490 free(props[i]);
491 }
492 printf("\n");
493}
494
495/* redirect output to a service control socket */
496void redirect_to_socket(FILE *redirect, const char *service) {
497 int s = android_get_control_socket(service);
498 if (s < 0) {
499 fprintf(stderr, "android_get_control_socket(%s): %s\n", service, strerror(errno));
500 exit(1);
501 }
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700502 fcntl(s, F_SETFD, FD_CLOEXEC);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700503 if (listen(s, 4) < 0) {
504 fprintf(stderr, "listen(control socket): %s\n", strerror(errno));
505 exit(1);
506 }
507
508 struct sockaddr addr;
509 socklen_t alen = sizeof(addr);
510 int fd = accept(s, &addr, &alen);
511 if (fd < 0) {
512 fprintf(stderr, "accept(control socket): %s\n", strerror(errno));
513 exit(1);
514 }
515
516 fflush(redirect);
517 dup2(fd, fileno(redirect));
518 close(fd);
519}
520
Christopher Ferrisff4a4dc2015-02-09 16:24:47 -0800521/* redirect output to a file */
522void redirect_to_file(FILE *redirect, char *path) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700523 char *chp = path;
524
525 /* skip initial slash */
526 if (chp[0] == '/')
527 chp++;
528
529 /* create leading directories, if necessary */
530 while (chp && chp[0]) {
531 chp = strchr(chp, '/');
532 if (chp) {
533 *chp = 0;
Jeff Sharkey27f9e6d2013-03-13 15:45:50 -0700534 mkdir(path, 0770); /* drwxrwx--- */
Colin Crossf45fa6b2012-03-26 12:38:26 -0700535 *chp++ = '/';
536 }
537 }
538
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700539 int fd = TEMP_FAILURE_RETRY(open(path, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC,
Christopher Ferrisff4a4dc2015-02-09 16:24:47 -0800540 S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700541 if (fd < 0) {
542 fprintf(stderr, "%s: %s\n", path, strerror(errno));
543 exit(1);
544 }
545
Christopher Ferrisff4a4dc2015-02-09 16:24:47 -0800546 TEMP_FAILURE_RETRY(dup2(fd, fileno(redirect)));
Colin Crossf45fa6b2012-03-26 12:38:26 -0700547 close(fd);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700548}
549
Jeff Brownbf7f4922012-06-07 16:40:01 -0700550static bool should_dump_native_traces(const char* path) {
551 for (const char** p = native_processes_to_dump; *p; p++) {
552 if (!strcmp(*p, path)) {
553 return true;
554 }
555 }
556 return false;
557}
558
559/* dump Dalvik and native stack traces, return the trace file location (NULL if none) */
560const char *dump_traces() {
561 const char* result = NULL;
562
Colin Crossf45fa6b2012-03-26 12:38:26 -0700563 char traces_path[PROPERTY_VALUE_MAX] = "";
564 property_get("dalvik.vm.stack-trace-file", traces_path, "");
565 if (!traces_path[0]) return NULL;
566
567 /* move the old traces.txt (if any) out of the way temporarily */
568 char anr_traces_path[PATH_MAX];
569 strlcpy(anr_traces_path, traces_path, sizeof(anr_traces_path));
570 strlcat(anr_traces_path, ".anr", sizeof(anr_traces_path));
571 if (rename(traces_path, anr_traces_path) && errno != ENOENT) {
572 fprintf(stderr, "rename(%s, %s): %s\n", traces_path, anr_traces_path, strerror(errno));
573 return NULL; // Can't rename old traces.txt -- no permission? -- leave it alone instead
574 }
575
576 /* make the directory if necessary */
577 char anr_traces_dir[PATH_MAX];
578 strlcpy(anr_traces_dir, traces_path, sizeof(anr_traces_dir));
579 char *slash = strrchr(anr_traces_dir, '/');
580 if (slash != NULL) {
581 *slash = '\0';
582 if (!mkdir(anr_traces_dir, 0775)) {
583 chown(anr_traces_dir, AID_SYSTEM, AID_SYSTEM);
Nick Kralevichc7f1fe22012-04-06 09:31:28 -0700584 chmod(anr_traces_dir, 0775);
Stephen Smalley26288202014-02-07 09:16:46 -0500585 if (selinux_android_restorecon(anr_traces_dir, 0) == -1) {
Robert Craig95798372013-04-04 06:33:10 -0400586 fprintf(stderr, "restorecon failed for %s: %s\n", anr_traces_dir, strerror(errno));
587 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700588 } else if (errno != EEXIST) {
589 fprintf(stderr, "mkdir(%s): %s\n", anr_traces_dir, strerror(errno));
590 return NULL;
591 }
592 }
593
594 /* create a new, empty traces.txt file to receive stack dumps */
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700595 int fd = TEMP_FAILURE_RETRY(open(traces_path, O_CREAT | O_WRONLY | O_TRUNC | O_NOFOLLOW | O_CLOEXEC,
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800596 0666)); /* -rw-rw-rw- */
Colin Crossf45fa6b2012-03-26 12:38:26 -0700597 if (fd < 0) {
598 fprintf(stderr, "%s: %s\n", traces_path, strerror(errno));
599 return NULL;
600 }
Nick Kralevichc7f1fe22012-04-06 09:31:28 -0700601 int chmod_ret = fchmod(fd, 0666);
602 if (chmod_ret < 0) {
603 fprintf(stderr, "fchmod on %s failed: %s\n", traces_path, strerror(errno));
604 close(fd);
605 return NULL;
606 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700607
608 /* walk /proc and kill -QUIT all Dalvik processes */
609 DIR *proc = opendir("/proc");
610 if (proc == NULL) {
611 fprintf(stderr, "/proc: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700612 goto error_close_fd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700613 }
614
615 /* use inotify to find when processes are done dumping */
616 int ifd = inotify_init();
617 if (ifd < 0) {
618 fprintf(stderr, "inotify_init: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700619 goto error_close_fd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700620 }
621
622 int wfd = inotify_add_watch(ifd, traces_path, IN_CLOSE_WRITE);
623 if (wfd < 0) {
624 fprintf(stderr, "inotify_add_watch(%s): %s\n", traces_path, strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700625 goto error_close_ifd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700626 }
627
628 struct dirent *d;
629 int dalvik_found = 0;
630 while ((d = readdir(proc))) {
631 int pid = atoi(d->d_name);
632 if (pid <= 0) continue;
633
Jeff Brownbf7f4922012-06-07 16:40:01 -0700634 char path[PATH_MAX];
635 char data[PATH_MAX];
Colin Crossf45fa6b2012-03-26 12:38:26 -0700636 snprintf(path, sizeof(path), "/proc/%d/exe", pid);
Jeff Brownbf7f4922012-06-07 16:40:01 -0700637 ssize_t len = readlink(path, data, sizeof(data) - 1);
638 if (len <= 0) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700639 continue;
640 }
Jeff Brownbf7f4922012-06-07 16:40:01 -0700641 data[len] = '\0';
Colin Crossf45fa6b2012-03-26 12:38:26 -0700642
Colin Cross0d6180f2014-07-16 19:00:46 -0700643 if (!strncmp(data, "/system/bin/app_process", strlen("/system/bin/app_process"))) {
Jeff Brownbf7f4922012-06-07 16:40:01 -0700644 /* skip zygote -- it won't dump its stack anyway */
645 snprintf(path, sizeof(path), "/proc/%d/cmdline", pid);
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700646 int cfd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC));
Jeff Brown1dc94e32014-09-11 14:15:27 -0700647 len = read(cfd, data, sizeof(data) - 1);
648 close(cfd);
Jeff Brownbf7f4922012-06-07 16:40:01 -0700649 if (len <= 0) {
650 continue;
651 }
652 data[len] = '\0';
Colin Cross0d6180f2014-07-16 19:00:46 -0700653 if (!strncmp(data, "zygote", strlen("zygote"))) {
Jeff Brownbf7f4922012-06-07 16:40:01 -0700654 continue;
655 }
656
657 ++dalvik_found;
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800658 uint64_t start = nanotime();
Jeff Brownbf7f4922012-06-07 16:40:01 -0700659 if (kill(pid, SIGQUIT)) {
660 fprintf(stderr, "kill(%d, SIGQUIT): %s\n", pid, strerror(errno));
661 continue;
662 }
663
664 /* wait for the writable-close notification from inotify */
665 struct pollfd pfd = { ifd, POLLIN, 0 };
Nick Vaccaro85453ec2014-04-30 11:19:23 -0700666 int ret = poll(&pfd, 1, 5000); /* 5 sec timeout */
Jeff Brownbf7f4922012-06-07 16:40:01 -0700667 if (ret < 0) {
668 fprintf(stderr, "poll: %s\n", strerror(errno));
669 } else if (ret == 0) {
670 fprintf(stderr, "warning: timed out dumping pid %d\n", pid);
671 } else {
672 struct inotify_event ie;
673 read(ifd, &ie, sizeof(ie));
674 }
Jeff Brown1dc94e32014-09-11 14:15:27 -0700675
676 if (lseek(fd, 0, SEEK_END) < 0) {
677 fprintf(stderr, "lseek: %s\n", strerror(errno));
678 } else {
Christopher Ferris31ef8552015-01-14 13:23:30 -0800679 dprintf(fd, "[dump dalvik stack %d: %.3fs elapsed]\n",
Jeff Brown1dc94e32014-09-11 14:15:27 -0700680 pid, (float)(nanotime() - start) / NANOS_PER_SEC);
Jeff Brown1dc94e32014-09-11 14:15:27 -0700681 }
Jeff Brownbf7f4922012-06-07 16:40:01 -0700682 } else if (should_dump_native_traces(data)) {
683 /* dump native process if appropriate */
684 if (lseek(fd, 0, SEEK_END) < 0) {
685 fprintf(stderr, "lseek: %s\n", strerror(errno));
686 } else {
Christopher Ferris31ef8552015-01-14 13:23:30 -0800687 static uint16_t timeout_failures = 0;
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800688 uint64_t start = nanotime();
Christopher Ferris31ef8552015-01-14 13:23:30 -0800689
690 /* If 3 backtrace dumps fail in a row, consider debuggerd dead. */
691 if (timeout_failures == 3) {
692 dprintf(fd, "too many stack dump failures, skipping...\n");
693 } else if (dump_backtrace_to_file_timeout(pid, fd, 20) == -1) {
694 dprintf(fd, "dumping failed, likely due to a timeout\n");
695 timeout_failures++;
696 } else {
697 timeout_failures = 0;
698 }
699 dprintf(fd, "[dump native stack %d: %.3fs elapsed]\n",
Jeff Brown1dc94e32014-09-11 14:15:27 -0700700 pid, (float)(nanotime() - start) / NANOS_PER_SEC);
Jeff Brownbf7f4922012-06-07 16:40:01 -0700701 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700702 }
703 }
704
Colin Crossf45fa6b2012-03-26 12:38:26 -0700705 if (dalvik_found == 0) {
706 fprintf(stderr, "Warning: no Dalvik processes found to dump stacks\n");
707 }
708
709 static char dump_traces_path[PATH_MAX];
710 strlcpy(dump_traces_path, traces_path, sizeof(dump_traces_path));
711 strlcat(dump_traces_path, ".bugreport", sizeof(dump_traces_path));
712 if (rename(traces_path, dump_traces_path)) {
713 fprintf(stderr, "rename(%s, %s): %s\n", traces_path, dump_traces_path, strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700714 goto error_close_ifd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700715 }
Jeff Brownbf7f4922012-06-07 16:40:01 -0700716 result = dump_traces_path;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700717
718 /* replace the saved [ANR] traces.txt file */
719 rename(anr_traces_path, traces_path);
Jeff Brownbf7f4922012-06-07 16:40:01 -0700720
721error_close_ifd:
722 close(ifd);
723error_close_fd:
724 close(fd);
725 return result;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700726}
727
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -0700728void dump_route_tables() {
729 const char* const RT_TABLES_PATH = "/data/misc/net/rt_tables";
730 dump_file("RT_TABLES", RT_TABLES_PATH);
Nick Kralevichcd67e9f2015-03-19 11:30:59 -0700731 FILE* fp = fopen(RT_TABLES_PATH, "re");
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -0700732 if (!fp) {
733 printf("*** %s: %s\n", RT_TABLES_PATH, strerror(errno));
734 return;
735 }
736 char table[16];
737 // Each line has an integer (the table number), a space, and a string (the table name). We only
738 // need the table number. It's a 32-bit unsigned number, so max 10 chars. Skip the table name.
739 // Add a fixed max limit so this doesn't go awry.
740 for (int i = 0; i < 64 && fscanf(fp, " %10s %*s", table) == 1; ++i) {
741 run_command("ROUTE TABLE IPv4", 10, "ip", "-4", "route", "show", "table", table, NULL);
742 run_command("ROUTE TABLE IPv6", 10, "ip", "-6", "route", "show", "table", table, NULL);
743 }
744 fclose(fp);
745}