1 /* 2 * Copyright (C) 2008 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #define LOG_TAG "dumpstate" 18 19 #include <dirent.h> 20 #include <errno.h> 21 #include <fcntl.h> 22 #include <inttypes.h> 23 #include <libgen.h> 24 #include <limits.h> 25 #include <stdbool.h> 26 #include <stdio.h> 27 #include <stdlib.h> 28 #include <string.h> 29 #include <sys/poll.h> 30 #include <sys/prctl.h> 31 #include <sys/resource.h> 32 #include <sys/stat.h> 33 #include <sys/time.h> 34 #include <sys/wait.h> 35 #include <unistd.h> 36 37 #include <chrono> 38 #include <fstream> 39 #include <functional> 40 #include <future> 41 #include <memory> 42 #include <regex> 43 #include <set> 44 #include <string> 45 #include <utility> 46 #include <vector> 47 48 #include <android-base/file.h> 49 #include <android-base/properties.h> 50 #include <android-base/scopeguard.h> 51 #include <android-base/stringprintf.h> 52 #include <android-base/strings.h> 53 #include <android-base/unique_fd.h> 54 #include <android/content/pm/IPackageManagerNative.h> 55 #include <android/hardware/dumpstate/1.0/IDumpstateDevice.h> 56 #include <android/hidl/manager/1.0/IServiceManager.h> 57 #include <android/os/IIncidentCompanion.h> 58 #include <binder/IServiceManager.h> 59 #include <cutils/native_handle.h> 60 #include <cutils/properties.h> 61 #include <debuggerd/client.h> 62 #include <dumpsys.h> 63 #include <dumputils/dump_utils.h> 64 #include <hidl/ServiceManagement.h> 65 #include <openssl/sha.h> 66 #include <private/android_filesystem_config.h> 67 #include <private/android_logger.h> 68 #include <serviceutils/PriorityDumper.h> 69 #include <utils/StrongPointer.h> 70 #include "DumpstateInternal.h" 71 #include "DumpstateSectionReporter.h" 72 #include "DumpstateService.h" 73 #include "dumpstate.h" 74 75 using ::android::hardware::dumpstate::V1_0::IDumpstateDevice; 76 using ::std::literals::chrono_literals::operator""ms; 77 using ::std::literals::chrono_literals::operator""s; 78 79 // TODO: remove once moved to namespace 80 using android::defaultServiceManager; 81 using android::Dumpsys; 82 using android::INVALID_OPERATION; 83 using android::IServiceManager; 84 using android::OK; 85 using android::sp; 86 using android::status_t; 87 using android::String16; 88 using android::String8; 89 using android::TIMED_OUT; 90 using android::UNKNOWN_ERROR; 91 using android::Vector; 92 using android::base::StringPrintf; 93 using android::os::IDumpstateListener; 94 using android::os::dumpstate::CommandOptions; 95 using android::os::dumpstate::DumpFileToFd; 96 using android::os::dumpstate::DumpstateSectionReporter; 97 using android::os::dumpstate::GetPidByName; 98 using android::os::dumpstate::PropertiesHelper; 99 100 typedef Dumpstate::ConsentCallback::ConsentResult UserConsentResult; 101 102 /* read before root is shed */ 103 static char cmdline_buf[16384] = "(unknown)"; 104 static const char *dump_traces_path = nullptr; 105 static const uint64_t USER_CONSENT_TIMEOUT_MS = 30 * 1000; 106 107 // TODO: variables and functions below should be part of dumpstate object 108 109 static std::set<std::string> mount_points; 110 void add_mountinfo(); 111 112 #define PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops" 113 #define ALT_PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops-0" 114 #define BLK_DEV_SYS_DIR "/sys/block" 115 116 #define RECOVERY_DIR "/cache/recovery" 117 #define RECOVERY_DATA_DIR "/data/misc/recovery" 118 #define UPDATE_ENGINE_LOG_DIR "/data/misc/update_engine_log" 119 #define LOGPERSIST_DATA_DIR "/data/misc/logd" 120 #define PROFILE_DATA_DIR_CUR "/data/misc/profiles/cur" 121 #define PROFILE_DATA_DIR_REF "/data/misc/profiles/ref" 122 #define XFRM_STAT_PROC_FILE "/proc/net/xfrm_stat" 123 #define WLUTIL "/vendor/xbin/wlutil" 124 #define WMTRACE_DATA_DIR "/data/misc/wmtrace" 125 126 // TODO(narayan): Since this information has to be kept in sync 127 // with tombstoned, we should just put it in a common header. 128 // 129 // File: system/core/debuggerd/tombstoned/tombstoned.cpp 130 static const std::string TOMBSTONE_DIR = "/data/tombstones/"; 131 static const std::string TOMBSTONE_FILE_PREFIX = "tombstone_"; 132 static const std::string ANR_DIR = "/data/anr/"; 133 static const std::string ANR_FILE_PREFIX = "anr_"; 134 135 // TODO: temporary variables and functions used during C++ refactoring 136 static Dumpstate& ds = Dumpstate::GetInstance(); 137 138 #define RETURN_IF_USER_DENIED_CONSENT() \ 139 if (ds.IsUserConsentDenied()) { \ 140 MYLOGE("Returning early as user denied consent to share bugreport with calling app."); \ 141 return Dumpstate::RunStatus::USER_CONSENT_DENIED; \ 142 } 143 144 // Runs func_ptr, but checks user consent before and after running it. Returns USER_CONSENT_DENIED 145 // if consent is found to be denied. 146 #define RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(func_ptr, ...) \ 147 RETURN_IF_USER_DENIED_CONSENT(); \ 148 func_ptr(__VA_ARGS__); \ 149 RETURN_IF_USER_DENIED_CONSENT(); 150 151 namespace android { 152 namespace os { 153 namespace { 154 155 static int Open(std::string path, int flags, mode_t mode = 0) { 156 int fd = TEMP_FAILURE_RETRY(open(path.c_str(), flags, mode)); 157 if (fd == -1) { 158 MYLOGE("open(%s, %s)\n", path.c_str(), strerror(errno)); 159 } 160 return fd; 161 } 162 163 164 static int OpenForRead(std::string path) { 165 return Open(path, O_RDONLY | O_CLOEXEC | O_NOFOLLOW); 166 } 167 168 bool CopyFile(int in_fd, int out_fd) { 169 char buf[4096]; 170 ssize_t byte_count; 171 while ((byte_count = TEMP_FAILURE_RETRY(read(in_fd, buf, sizeof(buf)))) > 0) { 172 if (!android::base::WriteFully(out_fd, buf, byte_count)) { 173 return false; 174 } 175 } 176 return (byte_count != -1); 177 } 178 179 static bool CopyFileToFd(const std::string& input_file, int out_fd) { 180 MYLOGD("Going to copy file (%s) to %d\n", input_file.c_str(), out_fd); 181 182 // Obtain a handle to the source file. 183 android::base::unique_fd in_fd(OpenForRead(input_file)); 184 if (out_fd != -1 && in_fd.get() != -1) { 185 if (CopyFile(in_fd.get(), out_fd)) { 186 return true; 187 } 188 MYLOGE("Failed to copy file: %s\n", strerror(errno)); 189 } 190 return false; 191 } 192 193 static bool UnlinkAndLogOnError(const std::string& file) { 194 if (unlink(file.c_str())) { 195 MYLOGE("Failed to unlink file (%s): %s\n", file.c_str(), strerror(errno)); 196 return false; 197 } 198 return true; 199 } 200 201 static bool IsFileEmpty(const std::string& file_path) { 202 std::ifstream file(file_path, std::ios::binary | std::ios::ate); 203 if(file.bad()) { 204 MYLOGE("Cannot open file: %s\n", file_path.c_str()); 205 return true; 206 } 207 return file.tellg() <= 0; 208 } 209 210 int64_t GetModuleMetadataVersion() { 211 auto binder = defaultServiceManager()->getService(android::String16("package_native")); 212 if (binder == nullptr) { 213 MYLOGE("Failed to retrieve package_native service"); 214 return 0L; 215 } 216 auto package_service = android::interface_cast<content::pm::IPackageManagerNative>(binder); 217 std::string package_name; 218 auto status = package_service->getModuleMetadataPackageName(&package_name); 219 if (!status.isOk()) { 220 MYLOGE("Failed to retrieve module metadata package name: %s", status.toString8().c_str()); 221 return 0L; 222 } 223 MYLOGD("Module metadata package name: %s", package_name.c_str()); 224 int64_t version_code; 225 status = package_service->getVersionCodeForPackage(android::String16(package_name.c_str()), 226 &version_code); 227 if (!status.isOk()) { 228 MYLOGE("Failed to retrieve module metadata version: %s", status.toString8().c_str()); 229 return 0L; 230 } 231 return version_code; 232 } 233 234 } // namespace 235 } // namespace os 236 } // namespace android 237 238 static int RunCommand(const std::string& title, const std::vector<std::string>& fullCommand, 239 const CommandOptions& options = CommandOptions::DEFAULT) { 240 return ds.RunCommand(title, fullCommand, options); 241 } 242 static void RunDumpsys(const std::string& title, const std::vector<std::string>& dumpsysArgs, 243 const CommandOptions& options = Dumpstate::DEFAULT_DUMPSYS, 244 long dumpsysTimeoutMs = 0) { 245 return ds.RunDumpsys(title, dumpsysArgs, options, dumpsysTimeoutMs); 246 } 247 static int DumpFile(const std::string& title, const std::string& path) { 248 return ds.DumpFile(title, path); 249 } 250 251 // Relative directory (inside the zip) for all files copied as-is into the bugreport. 252 static const std::string ZIP_ROOT_DIR = "FS"; 253 254 static const std::string kProtoPath = "proto/"; 255 static const std::string kProtoExt = ".proto"; 256 static const std::string kDumpstateBoardFiles[] = { 257 "dumpstate_board.txt", 258 "dumpstate_board.bin" 259 }; 260 static const int NUM_OF_DUMPS = arraysize(kDumpstateBoardFiles); 261 262 static constexpr char PROPERTY_EXTRA_OPTIONS[] = "dumpstate.options"; 263 static constexpr char PROPERTY_LAST_ID[] = "dumpstate.last_id"; 264 static constexpr char PROPERTY_VERSION[] = "dumpstate.version"; 265 static constexpr char PROPERTY_EXTRA_TITLE[] = "dumpstate.options.title"; 266 static constexpr char PROPERTY_EXTRA_DESCRIPTION[] = "dumpstate.options.description"; 267 268 static const CommandOptions AS_ROOT_20 = CommandOptions::WithTimeout(20).AsRoot().Build(); 269 270 /* 271 * Returns a vector of dump fds under |dir_path| with a given |file_prefix|. 272 * The returned vector is sorted by the mtimes of the dumps. If |limit_by_mtime| 273 * is set, the vector only contains files that were written in the last 30 minutes. 274 * If |limit_by_count| is set, the vector only contains the ten latest files. 275 */ 276 static std::vector<DumpData> GetDumpFds(const std::string& dir_path, 277 const std::string& file_prefix, 278 bool limit_by_mtime, 279 bool limit_by_count = true) { 280 const time_t thirty_minutes_ago = ds.now_ - 60 * 30; 281 282 std::unique_ptr<DIR, decltype(&closedir)> dump_dir(opendir(dir_path.c_str()), closedir); 283 284 if (dump_dir == nullptr) { 285 MYLOGW("Unable to open directory %s: %s\n", dir_path.c_str(), strerror(errno)); 286 return std::vector<DumpData>(); 287 } 288 289 std::vector<DumpData> dump_data; 290 struct dirent* entry = nullptr; 291 while ((entry = readdir(dump_dir.get()))) { 292 if (entry->d_type != DT_REG) { 293 continue; 294 } 295 296 const std::string base_name(entry->d_name); 297 if (base_name.find(file_prefix) != 0) { 298 continue; 299 } 300 301 const std::string abs_path = dir_path + base_name; 302 android::base::unique_fd fd( 303 TEMP_FAILURE_RETRY(open(abs_path.c_str(), O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK))); 304 if (fd == -1) { 305 MYLOGW("Unable to open dump file %s: %s\n", abs_path.c_str(), strerror(errno)); 306 break; 307 } 308 309 struct stat st = {}; 310 if (fstat(fd, &st) == -1) { 311 MYLOGW("Unable to stat dump file %s: %s\n", abs_path.c_str(), strerror(errno)); 312 continue; 313 } 314 315 if (limit_by_mtime && st.st_mtime < thirty_minutes_ago) { 316 MYLOGI("Excluding stale dump file: %s\n", abs_path.c_str()); 317 continue; 318 } 319 320 dump_data.emplace_back(DumpData{abs_path, std::move(fd), st.st_mtime}); 321 } 322 323 // Sort in descending modification time so that we only keep the newest 324 // reports if |limit_by_count| is true. 325 std::sort(dump_data.begin(), dump_data.end(), 326 [](const DumpData& d1, const DumpData& d2) { return d1.mtime > d2.mtime; }); 327 328 if (limit_by_count && dump_data.size() > 10) { 329 dump_data.erase(dump_data.begin() + 10, dump_data.end()); 330 } 331 332 return dump_data; 333 } 334 335 static bool AddDumps(const std::vector<DumpData>::const_iterator start, 336 const std::vector<DumpData>::const_iterator end, 337 const char* type_name, const bool add_to_zip) { 338 bool dumped = false; 339 for (auto it = start; it != end; ++it) { 340 const std::string& name = it->name; 341 const int fd = it->fd; 342 dumped = true; 343 344 // Seek to the beginning of the file before dumping any data. A given 345 // DumpData entry might be dumped multiple times in the report. 346 // 347 // For example, the most recent ANR entry is dumped to the body of the 348 // main entry and it also shows up as a separate entry in the bugreport 349 // ZIP file. 350 if (lseek(fd, 0, SEEK_SET) != static_cast<off_t>(0)) { 351 MYLOGE("Unable to add %s to zip file, lseek failed: %s\n", name.c_str(), 352 strerror(errno)); 353 } 354 355 if (ds.IsZipping() && add_to_zip) { 356 if (ds.AddZipEntryFromFd(ZIP_ROOT_DIR + name, fd, /* timeout = */ 0ms) != OK) { 357 MYLOGE("Unable to add %s to zip file, addZipEntryFromFd failed\n", name.c_str()); 358 } 359 } else { 360 dump_file_from_fd(type_name, name.c_str(), fd); 361 } 362 } 363 364 return dumped; 365 } 366 367 // for_each_pid() callback to get mount info about a process. 368 void do_mountinfo(int pid, const char* name __attribute__((unused))) { 369 char path[PATH_MAX]; 370 371 // Gets the the content of the /proc/PID/ns/mnt link, so only unique mount points 372 // are added. 373 snprintf(path, sizeof(path), "/proc/%d/ns/mnt", pid); 374 char linkname[PATH_MAX]; 375 ssize_t r = readlink(path, linkname, PATH_MAX); 376 if (r == -1) { 377 MYLOGE("Unable to read link for %s: %s\n", path, strerror(errno)); 378 return; 379 } 380 linkname[r] = '\0'; 381 382 if (mount_points.find(linkname) == mount_points.end()) { 383 // First time this mount point was found: add it 384 snprintf(path, sizeof(path), "/proc/%d/mountinfo", pid); 385 if (ds.AddZipEntry(ZIP_ROOT_DIR + path, path)) { 386 mount_points.insert(linkname); 387 } else { 388 MYLOGE("Unable to add mountinfo %s to zip file\n", path); 389 } 390 } 391 } 392 393 void add_mountinfo() { 394 if (!ds.IsZipping()) return; 395 std::string title = "MOUNT INFO"; 396 mount_points.clear(); 397 DurationReporter duration_reporter(title, true); 398 for_each_pid(do_mountinfo, nullptr); 399 MYLOGD("%s: %d entries added to zip file\n", title.c_str(), (int)mount_points.size()); 400 } 401 402 static void dump_dev_files(const char *title, const char *driverpath, const char *filename) 403 { 404 DIR *d; 405 struct dirent *de; 406 char path[PATH_MAX]; 407 408 d = opendir(driverpath); 409 if (d == nullptr) { 410 return; 411 } 412 413 while ((de = readdir(d))) { 414 if (de->d_type != DT_LNK) { 415 continue; 416 } 417 snprintf(path, sizeof(path), "%s/%s/%s", driverpath, de->d_name, filename); 418 DumpFile(title, path); 419 } 420 421 closedir(d); 422 } 423 424 425 426 // dump anrd's trace and add to the zip file. 427 // 1. check if anrd is running on this device. 428 // 2. send a SIGUSR1 to its pid which will dump anrd's trace. 429 // 3. wait until the trace generation completes and add to the zip file. 430 static bool dump_anrd_trace() { 431 unsigned int pid; 432 char buf[50], path[PATH_MAX]; 433 struct dirent *trace; 434 struct stat st; 435 DIR *trace_dir; 436 int retry = 5; 437 long max_ctime = 0, old_mtime; 438 long long cur_size = 0; 439 const char *trace_path = "/data/misc/anrd/"; 440 441 if (!ds.IsZipping()) { 442 MYLOGE("Not dumping anrd trace because it's not a zipped bugreport\n"); 443 return false; 444 } 445 446 // find anrd's pid if it is running. 447 pid = GetPidByName("/system/bin/anrd"); 448 449 if (pid > 0) { 450 if (stat(trace_path, &st) == 0) { 451 old_mtime = st.st_mtime; 452 } else { 453 MYLOGE("Failed to find: %s\n", trace_path); 454 return false; 455 } 456 457 // send SIGUSR1 to the anrd to generate a trace. 458 sprintf(buf, "%u", pid); 459 if (RunCommand("ANRD_DUMP", {"kill", "-SIGUSR1", buf}, 460 CommandOptions::WithTimeout(1).Build())) { 461 MYLOGE("anrd signal timed out. Please manually collect trace\n"); 462 return false; 463 } 464 465 while (retry-- > 0 && old_mtime == st.st_mtime) { 466 sleep(1); 467 stat(trace_path, &st); 468 } 469 470 if (retry < 0 && old_mtime == st.st_mtime) { 471 MYLOGE("Failed to stat %s or trace creation timeout\n", trace_path); 472 return false; 473 } 474 475 // identify the trace file by its creation time. 476 if (!(trace_dir = opendir(trace_path))) { 477 MYLOGE("Can't open trace file under %s\n", trace_path); 478 } 479 while ((trace = readdir(trace_dir))) { 480 if (strcmp(trace->d_name, ".") == 0 481 || strcmp(trace->d_name, "..") == 0) { 482 continue; 483 } 484 sprintf(path, "%s%s", trace_path, trace->d_name); 485 if (stat(path, &st) == 0) { 486 if (st.st_ctime > max_ctime) { 487 max_ctime = st.st_ctime; 488 sprintf(buf, "%s", trace->d_name); 489 } 490 } 491 } 492 closedir(trace_dir); 493 494 // Wait until the dump completes by checking the size of the trace. 495 if (max_ctime > 0) { 496 sprintf(path, "%s%s", trace_path, buf); 497 while(true) { 498 sleep(1); 499 if (stat(path, &st) == 0) { 500 if (st.st_size == cur_size) { 501 break; 502 } else if (st.st_size > cur_size) { 503 cur_size = st.st_size; 504 } else { 505 return false; 506 } 507 } else { 508 MYLOGE("Cant stat() %s anymore\n", path); 509 return false; 510 } 511 } 512 // Add to the zip file. 513 if (!ds.AddZipEntry("anrd_trace.txt", path)) { 514 MYLOGE("Unable to add anrd_trace file %s to zip file\n", path); 515 } else { 516 android::os::UnlinkAndLogOnError(path); 517 return true; 518 } 519 } else { 520 MYLOGE("Can't stats any trace file under %s\n", trace_path); 521 } 522 } 523 return false; 524 } 525 526 static bool skip_not_stat(const char *path) { 527 static const char stat[] = "/stat"; 528 size_t len = strlen(path); 529 if (path[len - 1] == '/') { /* Directory? */ 530 return false; 531 } 532 return strcmp(path + len - sizeof(stat) + 1, stat); /* .../stat? */ 533 } 534 535 static bool skip_none(const char* path __attribute__((unused))) { 536 return false; 537 } 538 539 unsigned long worst_write_perf = 20000; /* in KB/s */ 540 541 // 542 // stat offsets 543 // Name units description 544 // ---- ----- ----------- 545 // read I/Os requests number of read I/Os processed 546 #define __STAT_READ_IOS 0 547 // read merges requests number of read I/Os merged with in-queue I/O 548 #define __STAT_READ_MERGES 1 549 // read sectors sectors number of sectors read 550 #define __STAT_READ_SECTORS 2 551 // read ticks milliseconds total wait time for read requests 552 #define __STAT_READ_TICKS 3 553 // write I/Os requests number of write I/Os processed 554 #define __STAT_WRITE_IOS 4 555 // write merges requests number of write I/Os merged with in-queue I/O 556 #define __STAT_WRITE_MERGES 5 557 // write sectors sectors number of sectors written 558 #define __STAT_WRITE_SECTORS 6 559 // write ticks milliseconds total wait time for write requests 560 #define __STAT_WRITE_TICKS 7 561 // in_flight requests number of I/Os currently in flight 562 #define __STAT_IN_FLIGHT 8 563 // io_ticks milliseconds total time this block device has been active 564 #define __STAT_IO_TICKS 9 565 // time_in_queue milliseconds total wait time for all requests 566 #define __STAT_IN_QUEUE 10 567 #define __STAT_NUMBER_FIELD 11 568 // 569 // read I/Os, write I/Os 570 // ===================== 571 // 572 // These values increment when an I/O request completes. 573 // 574 // read merges, write merges 575 // ========================= 576 // 577 // These values increment when an I/O request is merged with an 578 // already-queued I/O request. 579 // 580 // read sectors, write sectors 581 // =========================== 582 // 583 // These values count the number of sectors read from or written to this 584 // block device. The "sectors" in question are the standard UNIX 512-byte 585 // sectors, not any device- or filesystem-specific block size. The 586 // counters are incremented when the I/O completes. 587 #define SECTOR_SIZE 512 588 // 589 // read ticks, write ticks 590 // ======================= 591 // 592 // These values count the number of milliseconds that I/O requests have 593 // waited on this block device. If there are multiple I/O requests waiting, 594 // these values will increase at a rate greater than 1000/second; for 595 // example, if 60 read requests wait for an average of 30 ms, the read_ticks 596 // field will increase by 60*30 = 1800. 597 // 598 // in_flight 599 // ========= 600 // 601 // This value counts the number of I/O requests that have been issued to 602 // the device driver but have not yet completed. It does not include I/O 603 // requests that are in the queue but not yet issued to the device driver. 604 // 605 // io_ticks 606 // ======== 607 // 608 // This value counts the number of milliseconds during which the device has 609 // had I/O requests queued. 610 // 611 // time_in_queue 612 // ============= 613 // 614 // This value counts the number of milliseconds that I/O requests have waited 615 // on this block device. If there are multiple I/O requests waiting, this 616 // value will increase as the product of the number of milliseconds times the 617 // number of requests waiting (see "read ticks" above for an example). 618 #define S_TO_MS 1000 619 // 620 621 static int dump_stat_from_fd(const char *title __unused, const char *path, int fd) { 622 unsigned long long fields[__STAT_NUMBER_FIELD]; 623 bool z; 624 char *cp, *buffer = nullptr; 625 size_t i = 0; 626 FILE *fp = fdopen(dup(fd), "rb"); 627 getline(&buffer, &i, fp); 628 fclose(fp); 629 if (!buffer) { 630 return -errno; 631 } 632 i = strlen(buffer); 633 while ((i > 0) && (buffer[i - 1] == '\n')) { 634 buffer[--i] = '\0'; 635 } 636 if (!*buffer) { 637 free(buffer); 638 return 0; 639 } 640 z = true; 641 for (cp = buffer, i = 0; i < (sizeof(fields) / sizeof(fields[0])); ++i) { 642 fields[i] = strtoull(cp, &cp, 10); 643 if (fields[i] != 0) { 644 z = false; 645 } 646 } 647 if (z) { /* never accessed */ 648 free(buffer); 649 return 0; 650 } 651 652 if (!strncmp(path, BLK_DEV_SYS_DIR, sizeof(BLK_DEV_SYS_DIR) - 1)) { 653 path += sizeof(BLK_DEV_SYS_DIR) - 1; 654 } 655 656 printf("%-30s:%9s%9s%9s%9s%9s%9s%9s%9s%9s%9s%9s\n%-30s:\t%s\n", "Block-Dev", 657 "R-IOs", "R-merg", "R-sect", "R-wait", "W-IOs", "W-merg", "W-sect", 658 "W-wait", "in-fli", "activ", "T-wait", path, buffer); 659 free(buffer); 660 661 if (fields[__STAT_IO_TICKS]) { 662 unsigned long read_perf = 0; 663 unsigned long read_ios = 0; 664 if (fields[__STAT_READ_TICKS]) { 665 unsigned long long divisor = fields[__STAT_READ_TICKS] 666 * fields[__STAT_IO_TICKS]; 667 read_perf = ((unsigned long long)SECTOR_SIZE 668 * fields[__STAT_READ_SECTORS] 669 * fields[__STAT_IN_QUEUE] + (divisor >> 1)) 670 / divisor; 671 read_ios = ((unsigned long long)S_TO_MS * fields[__STAT_READ_IOS] 672 * fields[__STAT_IN_QUEUE] + (divisor >> 1)) 673 / divisor; 674 } 675 676 unsigned long write_perf = 0; 677 unsigned long write_ios = 0; 678 if (fields[__STAT_WRITE_TICKS]) { 679 unsigned long long divisor = fields[__STAT_WRITE_TICKS] 680 * fields[__STAT_IO_TICKS]; 681 write_perf = ((unsigned long long)SECTOR_SIZE 682 * fields[__STAT_WRITE_SECTORS] 683 * fields[__STAT_IN_QUEUE] + (divisor >> 1)) 684 / divisor; 685 write_ios = ((unsigned long long)S_TO_MS * fields[__STAT_WRITE_IOS] 686 * fields[__STAT_IN_QUEUE] + (divisor >> 1)) 687 / divisor; 688 } 689 690 unsigned queue = (fields[__STAT_IN_QUEUE] 691 + (fields[__STAT_IO_TICKS] >> 1)) 692 / fields[__STAT_IO_TICKS]; 693 694 if (!write_perf && !write_ios) { 695 printf("%-30s: perf(ios) rd: %luKB/s(%lu/s) q: %u\n", path, read_perf, read_ios, queue); 696 } else { 697 printf("%-30s: perf(ios) rd: %luKB/s(%lu/s) wr: %luKB/s(%lu/s) q: %u\n", path, read_perf, 698 read_ios, write_perf, write_ios, queue); 699 } 700 701 /* bugreport timeout factor adjustment */ 702 if ((write_perf > 1) && (write_perf < worst_write_perf)) { 703 worst_write_perf = write_perf; 704 } 705 } 706 return 0; 707 } 708 709 static const long MINIMUM_LOGCAT_TIMEOUT_MS = 50000; 710 711 /* timeout in ms to read a list of buffers */ 712 static unsigned long logcat_timeout(const std::vector<std::string>& buffers) { 713 unsigned long timeout_ms = 0; 714 for (const auto& buffer : buffers) { 715 log_id_t id = android_name_to_log_id(buffer.c_str()); 716 unsigned long property_size = __android_logger_get_buffer_size(id); 717 /* Engineering margin is ten-fold our guess */ 718 timeout_ms += 10 * (property_size + worst_write_perf) / worst_write_perf; 719 } 720 return timeout_ms > MINIMUM_LOGCAT_TIMEOUT_MS ? timeout_ms : MINIMUM_LOGCAT_TIMEOUT_MS; 721 } 722 723 Dumpstate::ConsentCallback::ConsentCallback() : result_(UNAVAILABLE), start_time_(Nanotime()) { 724 } 725 726 android::binder::Status Dumpstate::ConsentCallback::onReportApproved() { 727 std::lock_guard<std::mutex> lock(lock_); 728 result_ = APPROVED; 729 MYLOGD("User approved consent to share bugreport\n"); 730 return android::binder::Status::ok(); 731 } 732 733 android::binder::Status Dumpstate::ConsentCallback::onReportDenied() { 734 std::lock_guard<std::mutex> lock(lock_); 735 result_ = DENIED; 736 MYLOGW("User denied consent to share bugreport\n"); 737 return android::binder::Status::ok(); 738 } 739 740 UserConsentResult Dumpstate::ConsentCallback::getResult() { 741 std::lock_guard<std::mutex> lock(lock_); 742 return result_; 743 } 744 745 uint64_t Dumpstate::ConsentCallback::getElapsedTimeMs() const { 746 return Nanotime() - start_time_; 747 } 748 749 void Dumpstate::PrintHeader() const { 750 std::string build, fingerprint, radio, bootloader, network; 751 char date[80]; 752 753 build = android::base::GetProperty("ro.build.display.id", "(unknown)"); 754 fingerprint = android::base::GetProperty("ro.build.fingerprint", "(unknown)"); 755 radio = android::base::GetProperty("gsm.version.baseband", "(unknown)"); 756 bootloader = android::base::GetProperty("ro.bootloader", "(unknown)"); 757 network = android::base::GetProperty("gsm.operator.alpha", "(unknown)"); 758 strftime(date, sizeof(date), "%Y-%m-%d %H:%M:%S", localtime(&now_)); 759 760 printf("========================================================\n"); 761 printf("== dumpstate: %s\n", date); 762 printf("========================================================\n"); 763 764 printf("\n"); 765 printf("Build: %s\n", build.c_str()); 766 // NOTE: fingerprint entry format is important for other tools. 767 printf("Build fingerprint: '%s'\n", fingerprint.c_str()); 768 printf("Bootloader: %s\n", bootloader.c_str()); 769 printf("Radio: %s\n", radio.c_str()); 770 printf("Network: %s\n", network.c_str()); 771 int64_t module_metadata_version = android::os::GetModuleMetadataVersion(); 772 if (module_metadata_version != 0) { 773 printf("Module Metadata version: %" PRId64 "\n", module_metadata_version); 774 } 775 776 printf("Kernel: "); 777 DumpFileToFd(STDOUT_FILENO, "", "/proc/version"); 778 printf("Command line: %s\n", strtok(cmdline_buf, "\n")); 779 printf("Uptime: "); 780 RunCommandToFd(STDOUT_FILENO, "", {"uptime", "-p"}, 781 CommandOptions::WithTimeout(1).Always().Build()); 782 printf("Bugreport format version: %s\n", version_.c_str()); 783 printf("Dumpstate info: id=%d pid=%d dry_run=%d args=%s extra_options=%s\n", id_, pid_, 784 PropertiesHelper::IsDryRun(), options_->args.c_str(), options_->extra_options.c_str()); 785 printf("\n"); 786 } 787 788 // List of file extensions that can cause a zip file attachment to be rejected by some email 789 // service providers. 790 static const std::set<std::string> PROBLEMATIC_FILE_EXTENSIONS = { 791 ".ade", ".adp", ".bat", ".chm", ".cmd", ".com", ".cpl", ".exe", ".hta", ".ins", ".isp", 792 ".jar", ".jse", ".lib", ".lnk", ".mde", ".msc", ".msp", ".mst", ".pif", ".scr", ".sct", 793 ".shb", ".sys", ".vb", ".vbe", ".vbs", ".vxd", ".wsc", ".wsf", ".wsh" 794 }; 795 796 status_t Dumpstate::AddZipEntryFromFd(const std::string& entry_name, int fd, 797 std::chrono::milliseconds timeout = 0ms) { 798 if (!IsZipping()) { 799 MYLOGD("Not adding zip entry %s from fd because it's not a zipped bugreport\n", 800 entry_name.c_str()); 801 return INVALID_OPERATION; 802 } 803 std::string valid_name = entry_name; 804 805 // Rename extension if necessary. 806 size_t idx = entry_name.rfind('.'); 807 if (idx != std::string::npos) { 808 std::string extension = entry_name.substr(idx); 809 std::transform(extension.begin(), extension.end(), extension.begin(), ::tolower); 810 if (PROBLEMATIC_FILE_EXTENSIONS.count(extension) != 0) { 811 valid_name = entry_name + ".renamed"; 812 MYLOGI("Renaming entry %s to %s\n", entry_name.c_str(), valid_name.c_str()); 813 } 814 } 815 816 // Logging statement below is useful to time how long each entry takes, but it's too verbose. 817 // MYLOGD("Adding zip entry %s\n", entry_name.c_str()); 818 int32_t err = zip_writer_->StartEntryWithTime(valid_name.c_str(), ZipWriter::kCompress, 819 get_mtime(fd, ds.now_)); 820 if (err != 0) { 821 MYLOGE("zip_writer_->StartEntryWithTime(%s): %s\n", valid_name.c_str(), 822 ZipWriter::ErrorCodeString(err)); 823 return UNKNOWN_ERROR; 824 } 825 bool finished_entry = false; 826 auto finish_entry = [this, &finished_entry] { 827 if (!finished_entry) { 828 // This should only be called when we're going to return an earlier error, 829 // which would've been logged. This may imply the file is already corrupt 830 // and any further logging from FinishEntry is more likely to mislead than 831 // not. 832 this->zip_writer_->FinishEntry(); 833 } 834 }; 835 auto scope_guard = android::base::make_scope_guard(finish_entry); 836 auto start = std::chrono::steady_clock::now(); 837 auto end = start + timeout; 838 struct pollfd pfd = {fd, POLLIN}; 839 840 std::vector<uint8_t> buffer(65536); 841 while (1) { 842 if (timeout.count() > 0) { 843 // lambda to recalculate the timeout. 844 auto time_left_ms = [end]() { 845 auto now = std::chrono::steady_clock::now(); 846 auto diff = std::chrono::duration_cast<std::chrono::milliseconds>(end - now); 847 return std::max(diff.count(), 0LL); 848 }; 849 850 int rc = TEMP_FAILURE_RETRY(poll(&pfd, 1, time_left_ms())); 851 if (rc < 0) { 852 MYLOGE("Error in poll while adding from fd to zip entry %s:%s\n", 853 entry_name.c_str(), strerror(errno)); 854 return -errno; 855 } else if (rc == 0) { 856 MYLOGE("Timed out adding from fd to zip entry %s:%s Timeout:%lldms\n", 857 entry_name.c_str(), strerror(errno), timeout.count()); 858 return TIMED_OUT; 859 } 860 } 861 862 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer.data(), buffer.size())); 863 if (bytes_read == 0) { 864 break; 865 } else if (bytes_read == -1) { 866 MYLOGE("read(%s): %s\n", entry_name.c_str(), strerror(errno)); 867 return -errno; 868 } 869 err = zip_writer_->WriteBytes(buffer.data(), bytes_read); 870 if (err) { 871 MYLOGE("zip_writer_->WriteBytes(): %s\n", ZipWriter::ErrorCodeString(err)); 872 return UNKNOWN_ERROR; 873 } 874 } 875 876 err = zip_writer_->FinishEntry(); 877 finished_entry = true; 878 if (err != 0) { 879 MYLOGE("zip_writer_->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err)); 880 return UNKNOWN_ERROR; 881 } 882 883 return OK; 884 } 885 886 bool Dumpstate::AddZipEntry(const std::string& entry_name, const std::string& entry_path) { 887 android::base::unique_fd fd( 888 TEMP_FAILURE_RETRY(open(entry_path.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC))); 889 if (fd == -1) { 890 MYLOGE("open(%s): %s\n", entry_path.c_str(), strerror(errno)); 891 return false; 892 } 893 894 return (AddZipEntryFromFd(entry_name, fd.get()) == OK); 895 } 896 897 /* adds a file to the existing zipped bugreport */ 898 static int _add_file_from_fd(const char* title __attribute__((unused)), const char* path, int fd) { 899 return (ds.AddZipEntryFromFd(ZIP_ROOT_DIR + path, fd) == OK) ? 0 : 1; 900 } 901 902 void Dumpstate::AddDir(const std::string& dir, bool recursive) { 903 if (!IsZipping()) { 904 MYLOGD("Not adding dir %s because it's not a zipped bugreport\n", dir.c_str()); 905 return; 906 } 907 MYLOGD("Adding dir %s (recursive: %d)\n", dir.c_str(), recursive); 908 DurationReporter duration_reporter(dir, true); 909 dump_files("", dir.c_str(), recursive ? skip_none : is_dir, _add_file_from_fd); 910 } 911 912 bool Dumpstate::AddTextZipEntry(const std::string& entry_name, const std::string& content) { 913 if (!IsZipping()) { 914 MYLOGD("Not adding text zip entry %s because it's not a zipped bugreport\n", 915 entry_name.c_str()); 916 return false; 917 } 918 MYLOGD("Adding zip text entry %s\n", entry_name.c_str()); 919 int32_t err = zip_writer_->StartEntryWithTime(entry_name.c_str(), ZipWriter::kCompress, ds.now_); 920 if (err != 0) { 921 MYLOGE("zip_writer_->StartEntryWithTime(%s): %s\n", entry_name.c_str(), 922 ZipWriter::ErrorCodeString(err)); 923 return false; 924 } 925 926 err = zip_writer_->WriteBytes(content.c_str(), content.length()); 927 if (err != 0) { 928 MYLOGE("zip_writer_->WriteBytes(%s): %s\n", entry_name.c_str(), 929 ZipWriter::ErrorCodeString(err)); 930 return false; 931 } 932 933 err = zip_writer_->FinishEntry(); 934 if (err != 0) { 935 MYLOGE("zip_writer_->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err)); 936 return false; 937 } 938 939 return true; 940 } 941 942 static void DoKmsg() { 943 struct stat st; 944 if (!stat(PSTORE_LAST_KMSG, &st)) { 945 /* Also TODO: Make console-ramoops CAP_SYSLOG protected. */ 946 DumpFile("LAST KMSG", PSTORE_LAST_KMSG); 947 } else if (!stat(ALT_PSTORE_LAST_KMSG, &st)) { 948 DumpFile("LAST KMSG", ALT_PSTORE_LAST_KMSG); 949 } else { 950 /* TODO: Make last_kmsg CAP_SYSLOG protected. b/5555691 */ 951 DumpFile("LAST KMSG", "/proc/last_kmsg"); 952 } 953 } 954 955 static void DoKernelLogcat() { 956 unsigned long timeout_ms = logcat_timeout({"kernel"}); 957 RunCommand( 958 "KERNEL LOG", 959 {"logcat", "-b", "kernel", "-v", "threadtime", "-v", "printable", "-v", "uid", "-d", "*:v"}, 960 CommandOptions::WithTimeoutInMs(timeout_ms).Build()); 961 } 962 963 static void DoLogcat() { 964 unsigned long timeout_ms; 965 // DumpFile("EVENT LOG TAGS", "/etc/event-log-tags"); 966 // calculate timeout 967 timeout_ms = logcat_timeout({"main", "system", "crash"}); 968 RunCommand("SYSTEM LOG", 969 {"logcat", "-v", "threadtime", "-v", "printable", "-v", "uid", "-d", "*:v"}, 970 CommandOptions::WithTimeoutInMs(timeout_ms).Build()); 971 timeout_ms = logcat_timeout({"events"}); 972 RunCommand( 973 "EVENT LOG", 974 {"logcat", "-b", "events", "-v", "threadtime", "-v", "printable", "-v", "uid", "-d", "*:v"}, 975 CommandOptions::WithTimeoutInMs(timeout_ms).Build()); 976 timeout_ms = logcat_timeout({"stats"}); 977 RunCommand( 978 "STATS LOG", 979 {"logcat", "-b", "stats", "-v", "threadtime", "-v", "printable", "-v", "uid", "-d", "*:v"}, 980 CommandOptions::WithTimeoutInMs(timeout_ms).Build()); 981 timeout_ms = logcat_timeout({"radio"}); 982 RunCommand( 983 "RADIO LOG", 984 {"logcat", "-b", "radio", "-v", "threadtime", "-v", "printable", "-v", "uid", "-d", "*:v"}, 985 CommandOptions::WithTimeoutInMs(timeout_ms).Build()); 986 987 RunCommand("LOG STATISTICS", {"logcat", "-b", "all", "-S"}); 988 989 /* kernels must set CONFIG_PSTORE_PMSG, slice up pstore with device tree */ 990 RunCommand("LAST LOGCAT", {"logcat", "-L", "-b", "all", "-v", "threadtime", "-v", "printable", 991 "-v", "uid", "-d", "*:v"}); 992 } 993 994 static void DumpIpTablesAsRoot() { 995 RunCommand("IPTABLES", {"iptables", "-L", "-nvx"}); 996 RunCommand("IP6TABLES", {"ip6tables", "-L", "-nvx"}); 997 RunCommand("IPTABLES NAT", {"iptables", "-t", "nat", "-L", "-nvx"}); 998 /* no ip6 nat */ 999 RunCommand("IPTABLES MANGLE", {"iptables", "-t", "mangle", "-L", "-nvx"}); 1000 RunCommand("IP6TABLES MANGLE", {"ip6tables", "-t", "mangle", "-L", "-nvx"}); 1001 RunCommand("IPTABLES RAW", {"iptables", "-t", "raw", "-L", "-nvx"}); 1002 RunCommand("IP6TABLES RAW", {"ip6tables", "-t", "raw", "-L", "-nvx"}); 1003 } 1004 1005 static void AddAnrTraceDir(const bool add_to_zip, const std::string& anr_traces_dir) { 1006 MYLOGD("AddAnrTraceDir(): dump_traces_file=%s, anr_traces_dir=%s\n", dump_traces_path, 1007 anr_traces_dir.c_str()); 1008 1009 // If we're here, dump_traces_path will always be a temporary file 1010 // (created with mkostemp or similar) that contains dumps taken earlier 1011 // on in the process. 1012 if (dump_traces_path != nullptr) { 1013 if (add_to_zip) { 1014 ds.AddZipEntry(ZIP_ROOT_DIR + anr_traces_dir + "/traces-just-now.txt", dump_traces_path); 1015 } else { 1016 MYLOGD("Dumping current ANR traces (%s) to the main bugreport entry\n", 1017 dump_traces_path); 1018 ds.DumpFile("VM TRACES JUST NOW", dump_traces_path); 1019 } 1020 1021 const int ret = unlink(dump_traces_path); 1022 if (ret == -1) { 1023 MYLOGW("Error unlinking temporary trace path %s: %s\n", dump_traces_path, 1024 strerror(errno)); 1025 } 1026 } 1027 1028 // Add a specific message for the first ANR Dump. 1029 if (ds.anr_data_.size() > 0) { 1030 AddDumps(ds.anr_data_.begin(), ds.anr_data_.begin() + 1, 1031 "VM TRACES AT LAST ANR", add_to_zip); 1032 1033 // The "last" ANR will always be included as separate entry in the zip file. In addition, 1034 // it will be present in the body of the main entry if |add_to_zip| == false. 1035 // 1036 // Historical ANRs are always included as separate entries in the bugreport zip file. 1037 AddDumps(ds.anr_data_.begin() + ((add_to_zip) ? 1 : 0), ds.anr_data_.end(), 1038 "HISTORICAL ANR", true /* add_to_zip */); 1039 } else { 1040 printf("*** NO ANRs to dump in %s\n\n", ANR_DIR.c_str()); 1041 } 1042 } 1043 1044 static void AddAnrTraceFiles() { 1045 const bool add_to_zip = ds.IsZipping() && ds.version_ == VERSION_SPLIT_ANR; 1046 1047 std::string anr_traces_dir = "/data/anr"; 1048 1049 AddAnrTraceDir(add_to_zip, anr_traces_dir); 1050 1051 RunCommand("ANR FILES", {"ls", "-lt", ANR_DIR}); 1052 1053 // Slow traces for slow operations. 1054 struct stat st; 1055 int i = 0; 1056 while (true) { 1057 const std::string slow_trace_path = 1058 anr_traces_dir + android::base::StringPrintf("slow%02d.txt", i); 1059 if (stat(slow_trace_path.c_str(), &st)) { 1060 // No traces file at this index, done with the files. 1061 break; 1062 } 1063 ds.DumpFile("VM TRACES WHEN SLOW", slow_trace_path.c_str()); 1064 i++; 1065 } 1066 } 1067 1068 static void DumpBlockStatFiles() { 1069 DurationReporter duration_reporter("DUMP BLOCK STAT"); 1070 1071 std::unique_ptr<DIR, std::function<int(DIR*)>> dirptr(opendir(BLK_DEV_SYS_DIR), closedir); 1072 1073 if (dirptr == nullptr) { 1074 MYLOGE("Failed to open %s: %s\n", BLK_DEV_SYS_DIR, strerror(errno)); 1075 return; 1076 } 1077 1078 printf("------ DUMP BLOCK STAT ------\n\n"); 1079 while (struct dirent *d = readdir(dirptr.get())) { 1080 if ((d->d_name[0] == '.') 1081 && (((d->d_name[1] == '.') && (d->d_name[2] == '\0')) 1082 || (d->d_name[1] == '\0'))) { 1083 continue; 1084 } 1085 const std::string new_path = 1086 android::base::StringPrintf("%s/%s", BLK_DEV_SYS_DIR, d->d_name); 1087 printf("------ BLOCK STAT (%s) ------\n", new_path.c_str()); 1088 dump_files("", new_path.c_str(), skip_not_stat, dump_stat_from_fd); 1089 printf("\n"); 1090 } 1091 return; 1092 } 1093 1094 static void DumpPacketStats() { 1095 DumpFile("NETWORK DEV INFO", "/proc/net/dev"); 1096 DumpFile("QTAGUID NETWORK INTERFACES INFO", "/proc/net/xt_qtaguid/iface_stat_all"); 1097 DumpFile("QTAGUID NETWORK INTERFACES INFO (xt)", "/proc/net/xt_qtaguid/iface_stat_fmt"); 1098 DumpFile("QTAGUID CTRL INFO", "/proc/net/xt_qtaguid/ctrl"); 1099 DumpFile("QTAGUID STATS INFO", "/proc/net/xt_qtaguid/stats"); 1100 } 1101 1102 static void DumpIpAddrAndRules() { 1103 /* The following have a tendency to get wedged when wifi drivers/fw goes belly-up. */ 1104 RunCommand("NETWORK INTERFACES", {"ip", "link"}); 1105 RunCommand("IPv4 ADDRESSES", {"ip", "-4", "addr", "show"}); 1106 RunCommand("IPv6 ADDRESSES", {"ip", "-6", "addr", "show"}); 1107 RunCommand("IP RULES", {"ip", "rule", "show"}); 1108 RunCommand("IP RULES v6", {"ip", "-6", "rule", "show"}); 1109 } 1110 1111 static Dumpstate::RunStatus RunDumpsysTextByPriority(const std::string& title, int priority, 1112 std::chrono::milliseconds timeout, 1113 std::chrono::milliseconds service_timeout) { 1114 auto start = std::chrono::steady_clock::now(); 1115 sp<android::IServiceManager> sm = defaultServiceManager(); 1116 Dumpsys dumpsys(sm.get()); 1117 Vector<String16> args; 1118 Dumpsys::setServiceArgs(args, /* asProto = */ false, priority); 1119 Vector<String16> services = dumpsys.listServices(priority, /* supports_proto = */ false); 1120 for (const String16& service : services) { 1121 RETURN_IF_USER_DENIED_CONSENT(); 1122 std::string path(title); 1123 path.append(" - ").append(String8(service).c_str()); 1124 DumpstateSectionReporter section_reporter(path, ds.listener_, ds.report_section_); 1125 size_t bytes_written = 0; 1126 status_t status = dumpsys.startDumpThread(service, args); 1127 if (status == OK) { 1128 dumpsys.writeDumpHeader(STDOUT_FILENO, service, priority); 1129 std::chrono::duration<double> elapsed_seconds; 1130 status = dumpsys.writeDump(STDOUT_FILENO, service, service_timeout, 1131 /* as_proto = */ false, elapsed_seconds, bytes_written); 1132 section_reporter.setSize(bytes_written); 1133 dumpsys.writeDumpFooter(STDOUT_FILENO, service, elapsed_seconds); 1134 bool dump_complete = (status == OK); 1135 dumpsys.stopDumpThread(dump_complete); 1136 } 1137 section_reporter.setStatus(status); 1138 1139 auto elapsed_duration = std::chrono::duration_cast<std::chrono::milliseconds>( 1140 std::chrono::steady_clock::now() - start); 1141 if (elapsed_duration > timeout) { 1142 MYLOGE("*** command '%s' timed out after %llums\n", title.c_str(), 1143 elapsed_duration.count()); 1144 break; 1145 } 1146 } 1147 return Dumpstate::RunStatus::OK; 1148 } 1149 1150 static void RunDumpsysText(const std::string& title, int priority, 1151 std::chrono::milliseconds timeout, 1152 std::chrono::milliseconds service_timeout) { 1153 DurationReporter duration_reporter(title); 1154 dprintf(STDOUT_FILENO, "------ %s (/system/bin/dumpsys) ------\n", title.c_str()); 1155 fsync(STDOUT_FILENO); 1156 RunDumpsysTextByPriority(title, priority, timeout, service_timeout); 1157 } 1158 1159 /* Dump all services registered with Normal or Default priority. */ 1160 static Dumpstate::RunStatus RunDumpsysTextNormalPriority(const std::string& title, 1161 std::chrono::milliseconds timeout, 1162 std::chrono::milliseconds service_timeout) { 1163 DurationReporter duration_reporter(title); 1164 dprintf(STDOUT_FILENO, "------ %s (/system/bin/dumpsys) ------\n", title.c_str()); 1165 fsync(STDOUT_FILENO); 1166 RunDumpsysTextByPriority(title, IServiceManager::DUMP_FLAG_PRIORITY_NORMAL, timeout, 1167 service_timeout); 1168 1169 RETURN_IF_USER_DENIED_CONSENT(); 1170 1171 return RunDumpsysTextByPriority(title, IServiceManager::DUMP_FLAG_PRIORITY_DEFAULT, timeout, 1172 service_timeout); 1173 } 1174 1175 static Dumpstate::RunStatus RunDumpsysProto(const std::string& title, int priority, 1176 std::chrono::milliseconds timeout, 1177 std::chrono::milliseconds service_timeout) { 1178 if (!ds.IsZipping()) { 1179 MYLOGD("Not dumping %s because it's not a zipped bugreport\n", title.c_str()); 1180 return Dumpstate::RunStatus::OK; 1181 } 1182 sp<android::IServiceManager> sm = defaultServiceManager(); 1183 Dumpsys dumpsys(sm.get()); 1184 Vector<String16> args; 1185 Dumpsys::setServiceArgs(args, /* asProto = */ true, priority); 1186 DurationReporter duration_reporter(title); 1187 1188 auto start = std::chrono::steady_clock::now(); 1189 Vector<String16> services = dumpsys.listServices(priority, /* supports_proto = */ true); 1190 for (const String16& service : services) { 1191 RETURN_IF_USER_DENIED_CONSENT(); 1192 std::string path(kProtoPath); 1193 path.append(String8(service).c_str()); 1194 if (priority == IServiceManager::DUMP_FLAG_PRIORITY_CRITICAL) { 1195 path.append("_CRITICAL"); 1196 } else if (priority == IServiceManager::DUMP_FLAG_PRIORITY_HIGH) { 1197 path.append("_HIGH"); 1198 } 1199 path.append(kProtoExt); 1200 DumpstateSectionReporter section_reporter(path, ds.listener_, ds.report_section_); 1201 status_t status = dumpsys.startDumpThread(service, args); 1202 if (status == OK) { 1203 status = ds.AddZipEntryFromFd(path, dumpsys.getDumpFd(), service_timeout); 1204 bool dumpTerminated = (status == OK); 1205 dumpsys.stopDumpThread(dumpTerminated); 1206 } 1207 ZipWriter::FileEntry file_entry; 1208 ds.zip_writer_->GetLastEntry(&file_entry); 1209 section_reporter.setSize(file_entry.compressed_size); 1210 section_reporter.setStatus(status); 1211 1212 auto elapsed_duration = std::chrono::duration_cast<std::chrono::milliseconds>( 1213 std::chrono::steady_clock::now() - start); 1214 if (elapsed_duration > timeout) { 1215 MYLOGE("*** command '%s' timed out after %llums\n", title.c_str(), 1216 elapsed_duration.count()); 1217 break; 1218 } 1219 } 1220 return Dumpstate::RunStatus::OK; 1221 } 1222 1223 // Runs dumpsys on services that must dump first and will take less than 100ms to dump. 1224 static Dumpstate::RunStatus RunDumpsysCritical() { 1225 RunDumpsysText("DUMPSYS CRITICAL", IServiceManager::DUMP_FLAG_PRIORITY_CRITICAL, 1226 /* timeout= */ 5s, /* service_timeout= */ 500ms); 1227 1228 RETURN_IF_USER_DENIED_CONSENT(); 1229 1230 return RunDumpsysProto("DUMPSYS CRITICAL PROTO", IServiceManager::DUMP_FLAG_PRIORITY_CRITICAL, 1231 /* timeout= */ 5s, /* service_timeout= */ 500ms); 1232 } 1233 1234 // Runs dumpsys on services that must dump first but can take up to 250ms to dump. 1235 static Dumpstate::RunStatus RunDumpsysHigh() { 1236 // TODO meminfo takes ~10s, connectivity takes ~5sec to dump. They are both 1237 // high priority. Reduce timeout once they are able to dump in a shorter time or 1238 // moved to a parallel task. 1239 RunDumpsysText("DUMPSYS HIGH", IServiceManager::DUMP_FLAG_PRIORITY_HIGH, 1240 /* timeout= */ 90s, /* service_timeout= */ 30s); 1241 1242 RETURN_IF_USER_DENIED_CONSENT(); 1243 1244 return RunDumpsysProto("DUMPSYS HIGH PROTO", IServiceManager::DUMP_FLAG_PRIORITY_HIGH, 1245 /* timeout= */ 5s, /* service_timeout= */ 1s); 1246 } 1247 1248 // Runs dumpsys on services that must dump but can take up to 10s to dump. 1249 static Dumpstate::RunStatus RunDumpsysNormal() { 1250 RunDumpsysTextNormalPriority("DUMPSYS", /* timeout= */ 90s, /* service_timeout= */ 10s); 1251 1252 RETURN_IF_USER_DENIED_CONSENT(); 1253 1254 return RunDumpsysProto("DUMPSYS PROTO", IServiceManager::DUMP_FLAG_PRIORITY_NORMAL, 1255 /* timeout= */ 90s, /* service_timeout= */ 10s); 1256 } 1257 1258 static void DumpHals() { 1259 if (!ds.IsZipping()) { 1260 RunCommand("HARDWARE HALS", {"lshal", "-lVSietrpc", "--types=b,c,l,z", "--debug"}, 1261 CommandOptions::WithTimeout(10).AsRootIfAvailable().Build()); 1262 return; 1263 } 1264 DurationReporter duration_reporter("DUMP HALS"); 1265 RunCommand("HARDWARE HALS", {"lshal", "-lVSietrpc", "--types=b,c,l,z"}, 1266 CommandOptions::WithTimeout(10).AsRootIfAvailable().Build()); 1267 1268 using android::hidl::manager::V1_0::IServiceManager; 1269 using android::hardware::defaultServiceManager; 1270 1271 sp<IServiceManager> sm = defaultServiceManager(); 1272 if (sm == nullptr) { 1273 MYLOGE("Could not retrieve hwservicemanager to dump hals.\n"); 1274 return; 1275 } 1276 1277 auto ret = sm->list([&](const auto& interfaces) { 1278 for (const std::string& interface : interfaces) { 1279 std::string cleanName = interface; 1280 std::replace_if(cleanName.begin(), 1281 cleanName.end(), 1282 [](char c) { 1283 return !isalnum(c) && 1284 std::string("@-_:.").find(c) == std::string::npos; 1285 }, '_'); 1286 const std::string path = ds.bugreport_internal_dir_ + "/lshal_debug_" + cleanName; 1287 1288 { 1289 auto fd = android::base::unique_fd( 1290 TEMP_FAILURE_RETRY(open(path.c_str(), 1291 O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC | O_NOFOLLOW, 1292 S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH))); 1293 if (fd < 0) { 1294 MYLOGE("Could not open %s to dump additional hal information.\n", path.c_str()); 1295 continue; 1296 } 1297 RunCommandToFd(fd, 1298 "", 1299 {"lshal", "debug", "-E", interface}, 1300 CommandOptions::WithTimeout(2).AsRootIfAvailable().Build()); 1301 1302 bool empty = 0 == lseek(fd, 0, SEEK_END); 1303 if (!empty) { 1304 ds.AddZipEntry("lshal-debug/" + cleanName + ".txt", path); 1305 } 1306 } 1307 1308 unlink(path.c_str()); 1309 } 1310 }); 1311 1312 if (!ret.isOk()) { 1313 MYLOGE("Could not list hals from hwservicemanager.\n"); 1314 } 1315 } 1316 1317 // Dumps various things. Returns early with status USER_CONSENT_DENIED if user denies consent 1318 // via the consent they are shown. Ignores other errors that occur while running various 1319 // commands. The consent checking is currently done around long running tasks, which happen to 1320 // be distributed fairly evenly throughout the function. 1321 static Dumpstate::RunStatus dumpstate() { 1322 DurationReporter duration_reporter("DUMPSTATE"); 1323 1324 // Dump various things. Note that anything that takes "long" (i.e. several seconds) should 1325 // check intermittently (if it's intrerruptable like a foreach on pids) and/or should be wrapped 1326 // in a consent check (via RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK). 1327 dump_dev_files("TRUSTY VERSION", "/sys/bus/platform/drivers/trusty", "trusty_version"); 1328 RunCommand("UPTIME", {"uptime"}); 1329 DumpBlockStatFiles(); 1330 dump_emmc_ecsd("/d/mmc0/mmc0:0001/ext_csd"); 1331 DumpFile("MEMORY INFO", "/proc/meminfo"); 1332 RunCommand("CPU INFO", {"top", "-b", "-n", "1", "-H", "-s", "6", "-o", 1333 "pid,tid,user,pr,ni,%cpu,s,virt,res,pcy,cmd,name"}); 1334 1335 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(RunCommand, "PROCRANK", {"procrank"}, AS_ROOT_20); 1336 1337 DumpFile("VIRTUAL MEMORY STATS", "/proc/vmstat"); 1338 DumpFile("VMALLOC INFO", "/proc/vmallocinfo"); 1339 DumpFile("SLAB INFO", "/proc/slabinfo"); 1340 DumpFile("ZONEINFO", "/proc/zoneinfo"); 1341 DumpFile("PAGETYPEINFO", "/proc/pagetypeinfo"); 1342 DumpFile("BUDDYINFO", "/proc/buddyinfo"); 1343 DumpFile("FRAGMENTATION INFO", "/d/extfrag/unusable_index"); 1344 1345 DumpFile("KERNEL WAKE SOURCES", "/d/wakeup_sources"); 1346 DumpFile("KERNEL CPUFREQ", "/sys/devices/system/cpu/cpu0/cpufreq/stats/time_in_state"); 1347 DumpFile("KERNEL SYNC", "/d/sync"); 1348 1349 RunCommand("PROCESSES AND THREADS", 1350 {"ps", "-A", "-T", "-Z", "-O", "pri,nice,rtprio,sched,pcy,time"}); 1351 1352 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(RunCommand, "LIBRANK", {"librank"}, 1353 CommandOptions::AS_ROOT); 1354 1355 DumpHals(); 1356 1357 RunCommand("PRINTENV", {"printenv"}); 1358 RunCommand("NETSTAT", {"netstat", "-nW"}); 1359 struct stat s; 1360 if (stat("/proc/modules", &s) != 0) { 1361 MYLOGD("Skipping 'lsmod' because /proc/modules does not exist\n"); 1362 } else { 1363 RunCommand("LSMOD", {"lsmod"}); 1364 } 1365 1366 if (__android_logger_property_get_bool( 1367 "ro.logd.kernel", BOOL_DEFAULT_TRUE | BOOL_DEFAULT_FLAG_ENG | BOOL_DEFAULT_FLAG_SVELTE)) { 1368 DoKernelLogcat(); 1369 } else { 1370 do_dmesg(); 1371 } 1372 1373 RunCommand("LIST OF OPEN FILES", {"lsof"}, CommandOptions::AS_ROOT); 1374 1375 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(for_each_pid, do_showmap, "SMAPS OF ALL PROCESSES"); 1376 1377 for_each_tid(show_wchan, "BLOCKED PROCESS WAIT-CHANNELS"); 1378 for_each_pid(show_showtime, "PROCESS TIMES (pid cmd user system iowait+percentage)"); 1379 1380 /* Dump Bluetooth HCI logs */ 1381 ds.AddDir("/data/misc/bluetooth/logs", true); 1382 1383 if (!ds.do_early_screenshot_) { 1384 MYLOGI("taking late screenshot\n"); 1385 ds.TakeScreenshot(); 1386 } 1387 1388 DoLogcat(); 1389 1390 AddAnrTraceFiles(); 1391 1392 // NOTE: tombstones are always added as separate entries in the zip archive 1393 // and are not interspersed with the main report. 1394 const bool tombstones_dumped = AddDumps(ds.tombstone_data_.begin(), ds.tombstone_data_.end(), 1395 "TOMBSTONE", true /* add_to_zip */); 1396 if (!tombstones_dumped) { 1397 printf("*** NO TOMBSTONES to dump in %s\n\n", TOMBSTONE_DIR.c_str()); 1398 } 1399 1400 DumpPacketStats(); 1401 1402 RunDumpsys("EBPF MAP STATS", {"netd", "trafficcontroller"}); 1403 1404 DoKmsg(); 1405 1406 DumpIpAddrAndRules(); 1407 1408 dump_route_tables(); 1409 1410 RunCommand("ARP CACHE", {"ip", "-4", "neigh", "show"}); 1411 RunCommand("IPv6 ND CACHE", {"ip", "-6", "neigh", "show"}); 1412 RunCommand("MULTICAST ADDRESSES", {"ip", "maddr"}); 1413 1414 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(RunDumpsysHigh); 1415 1416 RunCommand("SYSTEM PROPERTIES", {"getprop"}); 1417 1418 RunCommand("STORAGED IO INFO", {"storaged", "-u", "-p"}); 1419 1420 RunCommand("FILESYSTEMS & FREE SPACE", {"df"}); 1421 1422 RunCommand("LAST RADIO LOG", {"parse_radio_log", "/proc/last_radio_log"}); 1423 1424 /* Binder state is expensive to look at as it uses a lot of memory. */ 1425 DumpFile("BINDER FAILED TRANSACTION LOG", "/sys/kernel/debug/binder/failed_transaction_log"); 1426 DumpFile("BINDER TRANSACTION LOG", "/sys/kernel/debug/binder/transaction_log"); 1427 DumpFile("BINDER TRANSACTIONS", "/sys/kernel/debug/binder/transactions"); 1428 DumpFile("BINDER STATS", "/sys/kernel/debug/binder/stats"); 1429 DumpFile("BINDER STATE", "/sys/kernel/debug/binder/state"); 1430 1431 RunDumpsys("WINSCOPE TRACE", {"window", "trace"}); 1432 /* Add window and surface trace files. */ 1433 if (!PropertiesHelper::IsUserBuild()) { 1434 ds.AddDir(WMTRACE_DATA_DIR, false); 1435 } 1436 1437 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(ds.DumpstateBoard); 1438 1439 /* Migrate the ril_dumpstate to a device specific dumpstate? */ 1440 int rilDumpstateTimeout = android::base::GetIntProperty("ril.dumpstate.timeout", 0); 1441 if (rilDumpstateTimeout > 0) { 1442 // su does not exist on user builds, so try running without it. 1443 // This way any implementations of vril-dump that do not require 1444 // root can run on user builds. 1445 CommandOptions::CommandOptionsBuilder options = 1446 CommandOptions::WithTimeout(rilDumpstateTimeout); 1447 if (!PropertiesHelper::IsUserBuild()) { 1448 options.AsRoot(); 1449 } 1450 RunCommand("DUMP VENDOR RIL LOGS", {"vril-dump"}, options.Build()); 1451 } 1452 1453 printf("========================================================\n"); 1454 printf("== Android Framework Services\n"); 1455 printf("========================================================\n"); 1456 1457 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(RunDumpsysNormal); 1458 1459 printf("========================================================\n"); 1460 printf("== Checkins\n"); 1461 printf("========================================================\n"); 1462 1463 RunDumpsys("CHECKIN BATTERYSTATS", {"batterystats", "-c"}); 1464 1465 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(RunDumpsys, "CHECKIN MEMINFO", {"meminfo", "--checkin"}); 1466 1467 RunDumpsys("CHECKIN NETSTATS", {"netstats", "--checkin"}); 1468 RunDumpsys("CHECKIN PROCSTATS", {"procstats", "-c"}); 1469 RunDumpsys("CHECKIN USAGESTATS", {"usagestats", "-c"}); 1470 RunDumpsys("CHECKIN PACKAGE", {"package", "--checkin"}); 1471 1472 printf("========================================================\n"); 1473 printf("== Running Application Activities\n"); 1474 printf("========================================================\n"); 1475 1476 // The following dumpsys internally collects output from running apps, so it can take a long 1477 // time. So let's extend the timeout. 1478 1479 const CommandOptions DUMPSYS_COMPONENTS_OPTIONS = CommandOptions::WithTimeout(60).Build(); 1480 1481 RunDumpsys("APP ACTIVITIES", {"activity", "-v", "all"}, DUMPSYS_COMPONENTS_OPTIONS); 1482 1483 printf("========================================================\n"); 1484 printf("== Running Application Services (platform)\n"); 1485 printf("========================================================\n"); 1486 1487 RunDumpsys("APP SERVICES PLATFORM", {"activity", "service", "all-platform-non-critical"}, 1488 DUMPSYS_COMPONENTS_OPTIONS); 1489 1490 printf("========================================================\n"); 1491 printf("== Running Application Services (non-platform)\n"); 1492 printf("========================================================\n"); 1493 1494 RunDumpsys("APP SERVICES NON-PLATFORM", {"activity", "service", "all-non-platform"}, 1495 DUMPSYS_COMPONENTS_OPTIONS); 1496 1497 printf("========================================================\n"); 1498 printf("== Running Application Providers (platform)\n"); 1499 printf("========================================================\n"); 1500 1501 RunDumpsys("APP PROVIDERS PLATFORM", {"activity", "provider", "all-platform"}, 1502 DUMPSYS_COMPONENTS_OPTIONS); 1503 1504 printf("========================================================\n"); 1505 printf("== Running Application Providers (non-platform)\n"); 1506 printf("========================================================\n"); 1507 1508 RunDumpsys("APP PROVIDERS NON-PLATFORM", {"activity", "provider", "all-non-platform"}, 1509 DUMPSYS_COMPONENTS_OPTIONS); 1510 1511 printf("========================================================\n"); 1512 printf("== Dropbox crashes\n"); 1513 printf("========================================================\n"); 1514 1515 RunDumpsys("DROPBOX SYSTEM SERVER CRASHES", {"dropbox", "-p", "system_server_crash"}); 1516 RunDumpsys("DROPBOX SYSTEM APP CRASHES", {"dropbox", "-p", "system_app_crash"}); 1517 1518 printf("========================================================\n"); 1519 printf("== Final progress (pid %d): %d/%d (estimated %d)\n", ds.pid_, ds.progress_->Get(), 1520 ds.progress_->GetMax(), ds.progress_->GetInitialMax()); 1521 printf("========================================================\n"); 1522 printf("== dumpstate: done (id %d)\n", ds.id_); 1523 printf("========================================================\n"); 1524 1525 printf("========================================================\n"); 1526 printf("== Obtaining statsd metadata\n"); 1527 printf("========================================================\n"); 1528 // This differs from the usual dumpsys stats, which is the stats report data. 1529 RunDumpsys("STATSDSTATS", {"stats", "--metadata"}); 1530 return Dumpstate::RunStatus::OK; 1531 } 1532 1533 /* 1534 * Dumps state for the default case; drops root after it's no longer necessary. 1535 * 1536 * Returns RunStatus::OK if everything went fine. 1537 * Returns RunStatus::ERROR if there was an error. 1538 * Returns RunStatus::USER_DENIED_CONSENT if user explicitly denied consent to sharing the bugreport 1539 * with the caller. 1540 */ 1541 static Dumpstate::RunStatus DumpstateDefault() { 1542 // Try to dump anrd trace if the daemon is running. 1543 dump_anrd_trace(); 1544 1545 // Invoking the following dumpsys calls before DumpTraces() to try and 1546 // keep the system stats as close to its initial state as possible. 1547 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(RunDumpsysCritical); 1548 1549 /* collect stack traces from Dalvik and native processes (needs root) */ 1550 RUN_SLOW_FUNCTION_WITH_CONSENT_CHECK(ds.DumpTraces, &dump_traces_path); 1551 1552 /* Run some operations that require root. */ 1553 ds.tombstone_data_ = GetDumpFds(TOMBSTONE_DIR, TOMBSTONE_FILE_PREFIX, !ds.IsZipping()); 1554 ds.anr_data_ = GetDumpFds(ANR_DIR, ANR_FILE_PREFIX, !ds.IsZipping()); 1555 1556 ds.AddDir(RECOVERY_DIR, true); 1557 ds.AddDir(RECOVERY_DATA_DIR, true); 1558 ds.AddDir(UPDATE_ENGINE_LOG_DIR, true); 1559 ds.AddDir(LOGPERSIST_DATA_DIR, false); 1560 if (!PropertiesHelper::IsUserBuild()) { 1561 ds.AddDir(PROFILE_DATA_DIR_CUR, true); 1562 ds.AddDir(PROFILE_DATA_DIR_REF, true); 1563 } 1564 add_mountinfo(); 1565 DumpIpTablesAsRoot(); 1566 1567 // Capture any IPSec policies in play. No keys are exposed here. 1568 RunCommand("IP XFRM POLICY", {"ip", "xfrm", "policy"}, CommandOptions::WithTimeout(10).Build()); 1569 1570 // Dump IPsec stats. No keys are exposed here. 1571 DumpFile("XFRM STATS", XFRM_STAT_PROC_FILE); 1572 1573 // Run ss as root so we can see socket marks. 1574 RunCommand("DETAILED SOCKET STATE", {"ss", "-eionptu"}, CommandOptions::WithTimeout(10).Build()); 1575 1576 // Run iotop as root to show top 100 IO threads 1577 RunCommand("IOTOP", {"iotop", "-n", "1", "-m", "100"}); 1578 1579 // Gather shared memory buffer info if the product implements it 1580 struct stat st; 1581 if (!stat("/product/bin/dmabuf_dump", &st)) { 1582 RunCommand("Dmabuf dump", {"/product/bin/dmabuf_dump"}); 1583 } 1584 1585 if (!DropRootUser()) { 1586 return Dumpstate::RunStatus::ERROR; 1587 } 1588 1589 RETURN_IF_USER_DENIED_CONSENT(); 1590 return dumpstate(); 1591 } 1592 1593 // This method collects common dumpsys for telephony and wifi 1594 static void DumpstateRadioCommon() { 1595 DumpIpTablesAsRoot(); 1596 1597 if (!DropRootUser()) { 1598 return; 1599 } 1600 1601 do_dmesg(); 1602 DoLogcat(); 1603 DumpPacketStats(); 1604 DoKmsg(); 1605 DumpIpAddrAndRules(); 1606 dump_route_tables(); 1607 1608 RunDumpsys("NETWORK DIAGNOSTICS", {"connectivity", "--diag"}, 1609 CommandOptions::WithTimeout(10).Build()); 1610 } 1611 1612 // This method collects dumpsys for telephony debugging only 1613 static void DumpstateTelephonyOnly() { 1614 DurationReporter duration_reporter("DUMPSTATE"); 1615 const CommandOptions DUMPSYS_COMPONENTS_OPTIONS = CommandOptions::WithTimeout(60).Build(); 1616 1617 DumpstateRadioCommon(); 1618 1619 RunCommand("SYSTEM PROPERTIES", {"getprop"}); 1620 1621 printf("========================================================\n"); 1622 printf("== Android Framework Services\n"); 1623 printf("========================================================\n"); 1624 1625 RunDumpsys("DUMPSYS", {"connectivity"}, CommandOptions::WithTimeout(90).Build(), 1626 SEC_TO_MSEC(10)); 1627 RunDumpsys("DUMPSYS", {"connmetrics"}, CommandOptions::WithTimeout(90).Build(), 1628 SEC_TO_MSEC(10)); 1629 RunDumpsys("DUMPSYS", {"netd"}, CommandOptions::WithTimeout(90).Build(), SEC_TO_MSEC(10)); 1630 RunDumpsys("DUMPSYS", {"carrier_config"}, CommandOptions::WithTimeout(90).Build(), 1631 SEC_TO_MSEC(10)); 1632 RunDumpsys("DUMPSYS", {"wifi"}, CommandOptions::WithTimeout(90).Build(), 1633 SEC_TO_MSEC(10)); 1634 RunDumpsys("BATTERYSTATS", {"batterystats"}, CommandOptions::WithTimeout(90).Build(), 1635 SEC_TO_MSEC(10)); 1636 1637 printf("========================================================\n"); 1638 printf("== Running Application Services\n"); 1639 printf("========================================================\n"); 1640 1641 RunDumpsys("TELEPHONY SERVICES", {"activity", "service", "TelephonyDebugService"}); 1642 1643 printf("========================================================\n"); 1644 printf("== Running Application Services (non-platform)\n"); 1645 printf("========================================================\n"); 1646 1647 RunDumpsys("APP SERVICES NON-PLATFORM", {"activity", "service", "all-non-platform"}, 1648 DUMPSYS_COMPONENTS_OPTIONS); 1649 1650 printf("========================================================\n"); 1651 printf("== Checkins\n"); 1652 printf("========================================================\n"); 1653 1654 RunDumpsys("CHECKIN BATTERYSTATS", {"batterystats", "-c"}); 1655 1656 printf("========================================================\n"); 1657 printf("== dumpstate: done (id %d)\n", ds.id_); 1658 printf("========================================================\n"); 1659 } 1660 1661 // This method collects dumpsys for wifi debugging only 1662 static void DumpstateWifiOnly() { 1663 DurationReporter duration_reporter("DUMPSTATE"); 1664 1665 DumpstateRadioCommon(); 1666 1667 printf("========================================================\n"); 1668 printf("== Android Framework Services\n"); 1669 printf("========================================================\n"); 1670 1671 RunDumpsys("DUMPSYS", {"connectivity"}, CommandOptions::WithTimeout(90).Build(), 1672 SEC_TO_MSEC(10)); 1673 RunDumpsys("DUMPSYS", {"wifi"}, CommandOptions::WithTimeout(90).Build(), 1674 SEC_TO_MSEC(10)); 1675 1676 DumpHals(); 1677 1678 printf("========================================================\n"); 1679 printf("== dumpstate: done (id %d)\n", ds.id_); 1680 printf("========================================================\n"); 1681 } 1682 1683 Dumpstate::RunStatus Dumpstate::DumpTraces(const char** path) { 1684 DurationReporter duration_reporter("DUMP TRACES"); 1685 1686 const std::string temp_file_pattern = "/data/anr/dumptrace_XXXXXX"; 1687 const size_t buf_size = temp_file_pattern.length() + 1; 1688 std::unique_ptr<char[]> file_name_buf(new char[buf_size]); 1689 memcpy(file_name_buf.get(), temp_file_pattern.c_str(), buf_size); 1690 1691 // Create a new, empty file to receive all trace dumps. 1692 // 1693 // TODO: This can be simplified once we remove support for the old style 1694 // dumps. We can have a file descriptor passed in to dump_traces instead 1695 // of creating a file, closing it and then reopening it again. 1696 android::base::unique_fd fd(mkostemp(file_name_buf.get(), O_APPEND | O_CLOEXEC)); 1697 if (fd < 0) { 1698 MYLOGE("mkostemp on pattern %s: %s\n", file_name_buf.get(), strerror(errno)); 1699 return RunStatus::OK; 1700 } 1701 1702 // Nobody should have access to this temporary file except dumpstate, but we 1703 // temporarily grant 'read' to 'others' here because this file is created 1704 // when tombstoned is still running as root, but dumped after dropping. This 1705 // can go away once support for old style dumping has. 1706 const int chmod_ret = fchmod(fd, 0666); 1707 if (chmod_ret < 0) { 1708 MYLOGE("fchmod on %s failed: %s\n", file_name_buf.get(), strerror(errno)); 1709 return RunStatus::OK; 1710 } 1711 1712 std::unique_ptr<DIR, decltype(&closedir)> proc(opendir("/proc"), closedir); 1713 if (proc.get() == nullptr) { 1714 MYLOGE("opendir /proc failed: %s\n", strerror(errno)); 1715 return RunStatus::OK; 1716 } 1717 1718 // Number of times process dumping has timed out. If we encounter too many 1719 // failures, we'll give up. 1720 int timeout_failures = 0; 1721 bool dalvik_found = false; 1722 1723 const std::set<int> hal_pids = get_interesting_hal_pids(); 1724 1725 struct dirent* d; 1726 while ((d = readdir(proc.get()))) { 1727 RETURN_IF_USER_DENIED_CONSENT(); 1728 int pid = atoi(d->d_name); 1729 if (pid <= 0) { 1730 continue; 1731 } 1732 1733 const std::string link_name = android::base::StringPrintf("/proc/%d/exe", pid); 1734 std::string exe; 1735 if (!android::base::Readlink(link_name, &exe)) { 1736 continue; 1737 } 1738 1739 bool is_java_process; 1740 if (exe == "/system/bin/app_process32" || exe == "/system/bin/app_process64") { 1741 // Don't bother dumping backtraces for the zygote. 1742 if (IsZygote(pid)) { 1743 continue; 1744 } 1745 1746 dalvik_found = true; 1747 is_java_process = true; 1748 } else if (should_dump_native_traces(exe.c_str()) || hal_pids.find(pid) != hal_pids.end()) { 1749 is_java_process = false; 1750 } else { 1751 // Probably a native process we don't care about, continue. 1752 continue; 1753 } 1754 1755 // If 3 backtrace dumps fail in a row, consider debuggerd dead. 1756 if (timeout_failures == 3) { 1757 dprintf(fd, "ERROR: Too many stack dump failures, exiting.\n"); 1758 break; 1759 } 1760 1761 const uint64_t start = Nanotime(); 1762 const int ret = dump_backtrace_to_file_timeout( 1763 pid, is_java_process ? kDebuggerdJavaBacktrace : kDebuggerdNativeBacktrace, 1764 is_java_process ? 5 : 20, fd); 1765 1766 if (ret == -1) { 1767 // For consistency, the header and footer to this message match those 1768 // dumped by debuggerd in the success case. 1769 dprintf(fd, "\n---- pid %d at [unknown] ----\n", pid); 1770 dprintf(fd, "Dump failed, likely due to a timeout.\n"); 1771 dprintf(fd, "---- end %d ----", pid); 1772 timeout_failures++; 1773 continue; 1774 } 1775 1776 // We've successfully dumped stack traces, reset the failure count 1777 // and write a summary of the elapsed time to the file and continue with the 1778 // next process. 1779 timeout_failures = 0; 1780 1781 dprintf(fd, "[dump %s stack %d: %.3fs elapsed]\n", is_java_process ? "dalvik" : "native", 1782 pid, (float)(Nanotime() - start) / NANOS_PER_SEC); 1783 } 1784 1785 if (!dalvik_found) { 1786 MYLOGE("Warning: no Dalvik processes found to dump stacks\n"); 1787 } 1788 1789 *path = file_name_buf.release(); 1790 return RunStatus::OK; 1791 } 1792 1793 void Dumpstate::DumpstateBoard() { 1794 DurationReporter duration_reporter("dumpstate_board()"); 1795 printf("========================================================\n"); 1796 printf("== Board\n"); 1797 printf("========================================================\n"); 1798 1799 if (!IsZipping()) { 1800 MYLOGD("Not dumping board info because it's not a zipped bugreport\n"); 1801 return; 1802 } 1803 1804 std::vector<std::string> paths; 1805 std::vector<android::base::ScopeGuard<std::function<void()>>> remover; 1806 for (int i = 0; i < NUM_OF_DUMPS; i++) { 1807 paths.emplace_back(StringPrintf("%s/%s", ds.bugreport_internal_dir_.c_str(), 1808 kDumpstateBoardFiles[i].c_str())); 1809 remover.emplace_back(android::base::make_scope_guard( 1810 std::bind([](std::string path) { android::os::UnlinkAndLogOnError(path); }, paths[i]))); 1811 } 1812 1813 sp<IDumpstateDevice> dumpstate_device(IDumpstateDevice::getService()); 1814 if (dumpstate_device == nullptr) { 1815 MYLOGE("No IDumpstateDevice implementation\n"); 1816 return; 1817 } 1818 1819 using ScopedNativeHandle = 1820 std::unique_ptr<native_handle_t, std::function<void(native_handle_t*)>>; 1821 ScopedNativeHandle handle(native_handle_create(static_cast<int>(paths.size()), 0), 1822 [](native_handle_t* handle) { 1823 native_handle_close(handle); 1824 native_handle_delete(handle); 1825 }); 1826 if (handle == nullptr) { 1827 MYLOGE("Could not create native_handle\n"); 1828 return; 1829 } 1830 1831 // TODO(128270426): Check for consent in between? 1832 for (size_t i = 0; i < paths.size(); i++) { 1833 MYLOGI("Calling IDumpstateDevice implementation using path %s\n", paths[i].c_str()); 1834 1835 android::base::unique_fd fd(TEMP_FAILURE_RETRY( 1836 open(paths[i].c_str(), O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC | O_NOFOLLOW, 1837 S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH))); 1838 if (fd < 0) { 1839 MYLOGE("Could not open file %s: %s\n", paths[i].c_str(), strerror(errno)); 1840 return; 1841 } 1842 handle.get()->data[i] = fd.release(); 1843 } 1844 1845 // Given that bugreport is required to diagnose failures, it's better to 1846 // set an arbitrary amount of timeout for IDumpstateDevice than to block the 1847 // rest of bugreport. In the timeout case, we will kill dumpstate board HAL 1848 // and grab whatever dumped 1849 std::packaged_task<bool()> 1850 dumpstate_task([paths, dumpstate_device, &handle]() -> bool { 1851 android::hardware::Return<void> status = dumpstate_device->dumpstateBoard(handle.get()); 1852 if (!status.isOk()) { 1853 MYLOGE("dumpstateBoard failed: %s\n", status.description().c_str()); 1854 return false; 1855 } 1856 return true; 1857 }); 1858 1859 auto result = dumpstate_task.get_future(); 1860 std::thread(std::move(dumpstate_task)).detach(); 1861 1862 constexpr size_t timeout_sec = 30; 1863 if (result.wait_for(std::chrono::seconds(timeout_sec)) != std::future_status::ready) { 1864 MYLOGE("dumpstateBoard timed out after %zus, killing dumpstate vendor HAL\n", timeout_sec); 1865 if (!android::base::SetProperty("ctl.interface_restart", 1866 android::base::StringPrintf("%s/default", 1867 IDumpstateDevice::descriptor))) { 1868 MYLOGE("Couldn't restart dumpstate HAL\n"); 1869 } 1870 } 1871 // Wait some time for init to kill dumpstate vendor HAL 1872 constexpr size_t killing_timeout_sec = 10; 1873 if (result.wait_for(std::chrono::seconds(killing_timeout_sec)) != std::future_status::ready) { 1874 MYLOGE("killing dumpstateBoard timed out after %zus, continue and " 1875 "there might be racing in content\n", killing_timeout_sec); 1876 } 1877 1878 auto file_sizes = std::make_unique<ssize_t[]>(paths.size()); 1879 for (size_t i = 0; i < paths.size(); i++) { 1880 struct stat s; 1881 if (fstat(handle.get()->data[i], &s) == -1) { 1882 MYLOGE("Failed to fstat %s: %s\n", kDumpstateBoardFiles[i].c_str(), 1883 strerror(errno)); 1884 file_sizes[i] = -1; 1885 continue; 1886 } 1887 file_sizes[i] = s.st_size; 1888 } 1889 1890 for (size_t i = 0; i < paths.size(); i++) { 1891 if (file_sizes[i] == -1) { 1892 continue; 1893 } 1894 if (file_sizes[i] == 0) { 1895 MYLOGE("Ignoring empty %s\n", kDumpstateBoardFiles[i].c_str()); 1896 continue; 1897 } 1898 AddZipEntry(kDumpstateBoardFiles[i], paths[i]); 1899 } 1900 1901 printf("*** See dumpstate-board.txt entry ***\n"); 1902 } 1903 1904 static void ShowUsage() { 1905 fprintf(stderr, 1906 "usage: dumpstate [-h] [-b soundfile] [-e soundfile] [-o file] [-d] [-p] " 1907 "[-z]] [-s] [-S] [-q] [-B] [-P] [-R] [-V version]\n" 1908 " -h: display this help message\n" 1909 " -b: play sound file instead of vibrate, at beginning of job\n" 1910 " -e: play sound file instead of vibrate, at end of job\n" 1911 " -o: write to file (instead of stdout)\n" 1912 " -d: append date to filename (requires -o)\n" 1913 " -p: capture screenshot to filename.png (requires -o)\n" 1914 " -z: generate zipped file (requires -o)\n" 1915 " -s: write output to control socket (for init)\n" 1916 " -S: write file location to control socket (for init; requires -o and -z)\n" 1917 " -q: disable vibrate\n" 1918 " -B: send broadcast when finished (requires -o)\n" 1919 " -P: send broadcast when started and update system properties on " 1920 "progress (requires -o and -B)\n" 1921 " -R: take bugreport in remote mode (requires -o, -z, -d and -B, " 1922 "shouldn't be used with -P)\n" 1923 " -w: start binder service and make it wait for a call to startBugreport\n" 1924 " -v: prints the dumpstate header and exit\n"); 1925 } 1926 1927 static void register_sig_handler() { 1928 signal(SIGPIPE, SIG_IGN); 1929 } 1930 1931 bool Dumpstate::FinishZipFile() { 1932 std::string entry_name = base_name_ + "-" + name_ + ".txt"; 1933 MYLOGD("Adding main entry (%s) from %s to .zip bugreport\n", entry_name.c_str(), 1934 tmp_path_.c_str()); 1935 // Final timestamp 1936 char date[80]; 1937 time_t the_real_now_please_stand_up = time(nullptr); 1938 strftime(date, sizeof(date), "%Y/%m/%d %H:%M:%S", localtime(&the_real_now_please_stand_up)); 1939 MYLOGD("dumpstate id %d finished around %s (%ld s)\n", ds.id_, date, 1940 the_real_now_please_stand_up - ds.now_); 1941 1942 if (!ds.AddZipEntry(entry_name, tmp_path_)) { 1943 MYLOGE("Failed to add text entry to .zip file\n"); 1944 return false; 1945 } 1946 if (!AddTextZipEntry("main_entry.txt", entry_name)) { 1947 MYLOGE("Failed to add main_entry.txt to .zip file\n"); 1948 return false; 1949 } 1950 1951 // Add log file (which contains stderr output) to zip... 1952 fprintf(stderr, "dumpstate_log.txt entry on zip file logged up to here\n"); 1953 if (!ds.AddZipEntry("dumpstate_log.txt", ds.log_path_.c_str())) { 1954 MYLOGE("Failed to add dumpstate log to .zip file\n"); 1955 return false; 1956 } 1957 // TODO: Should truncate the existing file. 1958 // ... and re-open it for further logging. 1959 if (!redirect_to_existing_file(stderr, const_cast<char*>(ds.log_path_.c_str()))) { 1960 return false; 1961 } 1962 fprintf(stderr, "\n"); 1963 1964 int32_t err = zip_writer_->Finish(); 1965 if (err != 0) { 1966 MYLOGE("zip_writer_->Finish(): %s\n", ZipWriter::ErrorCodeString(err)); 1967 return false; 1968 } 1969 1970 // TODO: remove once FinishZipFile() is automatically handled by Dumpstate's destructor. 1971 ds.zip_file.reset(nullptr); 1972 1973 MYLOGD("Removing temporary file %s\n", tmp_path_.c_str()) 1974 android::os::UnlinkAndLogOnError(tmp_path_); 1975 1976 return true; 1977 } 1978 1979 static std::string SHA256_file_hash(const std::string& filepath) { 1980 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(filepath.c_str(), O_RDONLY | O_NONBLOCK 1981 | O_CLOEXEC | O_NOFOLLOW))); 1982 if (fd == -1) { 1983 MYLOGE("open(%s): %s\n", filepath.c_str(), strerror(errno)); 1984 return nullptr; 1985 } 1986 1987 SHA256_CTX ctx; 1988 SHA256_Init(&ctx); 1989 1990 std::vector<uint8_t> buffer(65536); 1991 while (1) { 1992 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd.get(), buffer.data(), buffer.size())); 1993 if (bytes_read == 0) { 1994 break; 1995 } else if (bytes_read == -1) { 1996 MYLOGE("read(%s): %s\n", filepath.c_str(), strerror(errno)); 1997 return nullptr; 1998 } 1999 2000 SHA256_Update(&ctx, buffer.data(), bytes_read); 2001 } 2002 2003 uint8_t hash[SHA256_DIGEST_LENGTH]; 2004 SHA256_Final(hash, &ctx); 2005 2006 char hash_buffer[SHA256_DIGEST_LENGTH * 2 + 1]; 2007 for(size_t i = 0; i < SHA256_DIGEST_LENGTH; i++) { 2008 sprintf(hash_buffer + (i * 2), "%02x", hash[i]); 2009 } 2010 hash_buffer[sizeof(hash_buffer) - 1] = 0; 2011 return std::string(hash_buffer); 2012 } 2013 2014 static void SendBroadcast(const std::string& action, const std::vector<std::string>& args) { 2015 // clang-format off 2016 std::vector<std::string> am = {"/system/bin/cmd", "activity", "broadcast", "--user", "0", 2017 "--receiver-foreground", "--receiver-include-background", "-a", action}; 2018 // clang-format on 2019 2020 am.insert(am.end(), args.begin(), args.end()); 2021 2022 RunCommand("", am, 2023 CommandOptions::WithTimeout(20) 2024 .Log("Sending broadcast: '%s'\n") 2025 .Always() 2026 .DropRoot() 2027 .RedirectStderr() 2028 .Build()); 2029 } 2030 2031 static void Vibrate(int duration_ms) { 2032 // clang-format off 2033 RunCommand("", {"cmd", "vibrator", "vibrate", std::to_string(duration_ms), "dumpstate"}, 2034 CommandOptions::WithTimeout(10) 2035 .Log("Vibrate: '%s'\n") 2036 .Always() 2037 .Build()); 2038 // clang-format on 2039 } 2040 2041 static void MaybeResolveSymlink(std::string* path) { 2042 std::string resolved_path; 2043 if (android::base::Readlink(*path, &resolved_path)) { 2044 *path = resolved_path; 2045 } 2046 } 2047 2048 /* 2049 * Prepares state like filename, screenshot path, etc in Dumpstate. Also initializes ZipWriter 2050 * if we are writing zip files and adds the version file. 2051 */ 2052 static void PrepareToWriteToFile() { 2053 MaybeResolveSymlink(&ds.bugreport_internal_dir_); 2054 2055 std::string build_id = android::base::GetProperty("ro.build.id", "UNKNOWN_BUILD"); 2056 std::string device_name = android::base::GetProperty("ro.product.name", "UNKNOWN_DEVICE"); 2057 ds.base_name_ = StringPrintf("bugreport-%s-%s", device_name.c_str(), build_id.c_str()); 2058 if (ds.options_->do_add_date) { 2059 char date[80]; 2060 strftime(date, sizeof(date), "%Y-%m-%d-%H-%M-%S", localtime(&ds.now_)); 2061 ds.name_ = date; 2062 } else { 2063 ds.name_ = "undated"; 2064 } 2065 2066 if (ds.options_->telephony_only) { 2067 ds.base_name_ += "-telephony"; 2068 } else if (ds.options_->wifi_only) { 2069 ds.base_name_ += "-wifi"; 2070 } 2071 2072 if (ds.options_->do_fb) { 2073 ds.screenshot_path_ = ds.GetPath(".png"); 2074 } 2075 ds.tmp_path_ = ds.GetPath(".tmp"); 2076 ds.log_path_ = ds.GetPath("-dumpstate_log-" + std::to_string(ds.pid_) + ".txt"); 2077 2078 std::string destination = ds.options_->bugreport_fd.get() != -1 2079 ? StringPrintf("[fd:%d]", ds.options_->bugreport_fd.get()) 2080 : ds.bugreport_internal_dir_.c_str(); 2081 MYLOGD( 2082 "Bugreport dir: %s\n" 2083 "Base name: %s\n" 2084 "Suffix: %s\n" 2085 "Log path: %s\n" 2086 "Temporary path: %s\n" 2087 "Screenshot path: %s\n", 2088 destination.c_str(), ds.base_name_.c_str(), ds.name_.c_str(), ds.log_path_.c_str(), 2089 ds.tmp_path_.c_str(), ds.screenshot_path_.c_str()); 2090 2091 if (ds.options_->do_zip_file) { 2092 ds.path_ = ds.GetPath(".zip"); 2093 MYLOGD("Creating initial .zip file (%s)\n", ds.path_.c_str()); 2094 create_parent_dirs(ds.path_.c_str()); 2095 ds.zip_file.reset(fopen(ds.path_.c_str(), "wb")); 2096 if (ds.zip_file == nullptr) { 2097 MYLOGE("fopen(%s, 'wb'): %s\n", ds.path_.c_str(), strerror(errno)); 2098 } else { 2099 ds.zip_writer_.reset(new ZipWriter(ds.zip_file.get())); 2100 } 2101 ds.AddTextZipEntry("version.txt", ds.version_); 2102 } 2103 } 2104 2105 /* 2106 * Finalizes writing to the file by renaming or zipping the tmp file to the final location, 2107 * printing zipped file status, etc. 2108 */ 2109 static void FinalizeFile() { 2110 /* check if user changed the suffix using system properties */ 2111 std::string name = 2112 android::base::GetProperty(android::base::StringPrintf("dumpstate.%d.name", ds.pid_), ""); 2113 bool change_suffix = false; 2114 if (!name.empty()) { 2115 /* must whitelist which characters are allowed, otherwise it could cross directories */ 2116 std::regex valid_regex("^[-_a-zA-Z0-9]+$"); 2117 if (std::regex_match(name.c_str(), valid_regex)) { 2118 change_suffix = true; 2119 } else { 2120 MYLOGE("invalid suffix provided by user: %s\n", name.c_str()); 2121 } 2122 } 2123 if (change_suffix) { 2124 MYLOGI("changing suffix from %s to %s\n", ds.name_.c_str(), name.c_str()); 2125 ds.name_ = name; 2126 if (!ds.screenshot_path_.empty()) { 2127 std::string new_screenshot_path = ds.GetPath(".png"); 2128 if (rename(ds.screenshot_path_.c_str(), new_screenshot_path.c_str())) { 2129 MYLOGE("rename(%s, %s): %s\n", ds.screenshot_path_.c_str(), 2130 new_screenshot_path.c_str(), strerror(errno)); 2131 } else { 2132 ds.screenshot_path_ = new_screenshot_path; 2133 } 2134 } 2135 } 2136 2137 bool do_text_file = true; 2138 if (ds.options_->do_zip_file) { 2139 if (!ds.FinishZipFile()) { 2140 MYLOGE("Failed to finish zip file; sending text bugreport instead\n"); 2141 do_text_file = true; 2142 } else { 2143 do_text_file = false; 2144 // If the user has changed the suffix, we need to change the zip file name. 2145 std::string new_path = ds.GetPath(".zip"); 2146 if (ds.path_ != new_path) { 2147 MYLOGD("Renaming zip file from %s to %s\n", ds.path_.c_str(), new_path.c_str()); 2148 if (rename(ds.path_.c_str(), new_path.c_str())) { 2149 MYLOGE("rename(%s, %s): %s\n", ds.path_.c_str(), new_path.c_str(), 2150 strerror(errno)); 2151 } else { 2152 ds.path_ = new_path; 2153 } 2154 } 2155 } 2156 } 2157 if (do_text_file) { 2158 ds.path_ = ds.GetPath(".txt"); 2159 MYLOGD("Generating .txt bugreport at %s from %s\n", ds.path_.c_str(), ds.tmp_path_.c_str()); 2160 if (rename(ds.tmp_path_.c_str(), ds.path_.c_str())) { 2161 MYLOGE("rename(%s, %s): %s\n", ds.tmp_path_.c_str(), ds.path_.c_str(), strerror(errno)); 2162 ds.path_.clear(); 2163 } 2164 } 2165 if (ds.options_->use_control_socket) { 2166 if (do_text_file) { 2167 dprintf(ds.control_socket_fd_, 2168 "FAIL:could not create zip file, check %s " 2169 "for more details\n", 2170 ds.log_path_.c_str()); 2171 } else { 2172 dprintf(ds.control_socket_fd_, "OK:%s\n", ds.path_.c_str()); 2173 } 2174 } 2175 } 2176 2177 /* Broadcasts that we are done with the bugreport */ 2178 static void SendBugreportFinishedBroadcast() { 2179 // TODO(b/111441001): use callback instead of broadcast. 2180 if (!ds.path_.empty()) { 2181 MYLOGI("Final bugreport path: %s\n", ds.path_.c_str()); 2182 // clang-format off 2183 2184 std::vector<std::string> am_args = { 2185 "--receiver-permission", "android.permission.DUMP", 2186 "--ei", "android.intent.extra.ID", std::to_string(ds.id_), 2187 "--ei", "android.intent.extra.PID", std::to_string(ds.pid_), 2188 "--ei", "android.intent.extra.MAX", std::to_string(ds.progress_->GetMax()), 2189 "--es", "android.intent.extra.BUGREPORT", ds.path_, 2190 "--es", "android.intent.extra.DUMPSTATE_LOG", ds.log_path_ 2191 }; 2192 // clang-format on 2193 if (ds.options_->do_fb && !android::os::IsFileEmpty(ds.screenshot_path_)) { 2194 am_args.push_back("--es"); 2195 am_args.push_back("android.intent.extra.SCREENSHOT"); 2196 am_args.push_back(ds.screenshot_path_); 2197 } 2198 if (!ds.options_->notification_title.empty()) { 2199 am_args.push_back("--es"); 2200 am_args.push_back("android.intent.extra.TITLE"); 2201 am_args.push_back(ds.options_->notification_title); 2202 if (!ds.options_->notification_description.empty()) { 2203 am_args.push_back("--es"); 2204 am_args.push_back("android.intent.extra.DESCRIPTION"); 2205 am_args.push_back(ds.options_->notification_description); 2206 } 2207 } 2208 if (ds.options_->is_remote_mode) { 2209 am_args.push_back("--es"); 2210 am_args.push_back("android.intent.extra.REMOTE_BUGREPORT_HASH"); 2211 am_args.push_back(SHA256_file_hash(ds.path_)); 2212 SendBroadcast("com.android.internal.intent.action.REMOTE_BUGREPORT_FINISHED", am_args); 2213 } else { 2214 SendBroadcast("com.android.internal.intent.action.BUGREPORT_FINISHED", am_args); 2215 } 2216 } else { 2217 MYLOGE("Skipping finished broadcast because bugreport could not be generated\n"); 2218 } 2219 } 2220 2221 static inline const char* ModeToString(Dumpstate::BugreportMode mode) { 2222 switch (mode) { 2223 case Dumpstate::BugreportMode::BUGREPORT_FULL: 2224 return "BUGREPORT_FULL"; 2225 case Dumpstate::BugreportMode::BUGREPORT_INTERACTIVE: 2226 return "BUGREPORT_INTERACTIVE"; 2227 case Dumpstate::BugreportMode::BUGREPORT_REMOTE: 2228 return "BUGREPORT_REMOTE"; 2229 case Dumpstate::BugreportMode::BUGREPORT_WEAR: 2230 return "BUGREPORT_WEAR"; 2231 case Dumpstate::BugreportMode::BUGREPORT_TELEPHONY: 2232 return "BUGREPORT_TELEPHONY"; 2233 case Dumpstate::BugreportMode::BUGREPORT_WIFI: 2234 return "BUGREPORT_WIFI"; 2235 case Dumpstate::BugreportMode::BUGREPORT_DEFAULT: 2236 return "BUGREPORT_DEFAULT"; 2237 } 2238 } 2239 2240 static void SetOptionsFromMode(Dumpstate::BugreportMode mode, Dumpstate::DumpOptions* options) { 2241 options->extra_options = ModeToString(mode); 2242 switch (mode) { 2243 case Dumpstate::BugreportMode::BUGREPORT_FULL: 2244 options->do_broadcast = true; 2245 options->do_fb = true; 2246 break; 2247 case Dumpstate::BugreportMode::BUGREPORT_INTERACTIVE: 2248 // Currently, the dumpstate binder is only used by Shell to update progress. 2249 options->do_start_service = true; 2250 options->do_progress_updates = true; 2251 options->do_fb = false; 2252 options->do_broadcast = true; 2253 break; 2254 case Dumpstate::BugreportMode::BUGREPORT_REMOTE: 2255 options->do_vibrate = false; 2256 options->is_remote_mode = true; 2257 options->do_fb = false; 2258 options->do_broadcast = true; 2259 break; 2260 case Dumpstate::BugreportMode::BUGREPORT_WEAR: 2261 options->do_start_service = true; 2262 options->do_progress_updates = true; 2263 options->do_zip_file = true; 2264 options->do_fb = true; 2265 options->do_broadcast = true; 2266 break; 2267 case Dumpstate::BugreportMode::BUGREPORT_TELEPHONY: 2268 options->telephony_only = true; 2269 options->do_fb = false; 2270 options->do_broadcast = true; 2271 break; 2272 case Dumpstate::BugreportMode::BUGREPORT_WIFI: 2273 options->wifi_only = true; 2274 options->do_zip_file = true; 2275 options->do_fb = false; 2276 options->do_broadcast = true; 2277 break; 2278 case Dumpstate::BugreportMode::BUGREPORT_DEFAULT: 2279 break; 2280 } 2281 } 2282 2283 static Dumpstate::BugreportMode getBugreportModeFromProperty() { 2284 // If the system property is not set, it's assumed to be a default bugreport. 2285 Dumpstate::BugreportMode mode = Dumpstate::BugreportMode::BUGREPORT_DEFAULT; 2286 2287 std::string extra_options = android::base::GetProperty(PROPERTY_EXTRA_OPTIONS, ""); 2288 if (!extra_options.empty()) { 2289 // Framework uses a system property to override some command-line args. 2290 // Currently, it contains the type of the requested bugreport. 2291 if (extra_options == "bugreportplus") { 2292 mode = Dumpstate::BugreportMode::BUGREPORT_INTERACTIVE; 2293 } else if (extra_options == "bugreportfull") { 2294 mode = Dumpstate::BugreportMode::BUGREPORT_FULL; 2295 } else if (extra_options == "bugreportremote") { 2296 mode = Dumpstate::BugreportMode::BUGREPORT_REMOTE; 2297 } else if (extra_options == "bugreportwear") { 2298 mode = Dumpstate::BugreportMode::BUGREPORT_WEAR; 2299 } else if (extra_options == "bugreporttelephony") { 2300 mode = Dumpstate::BugreportMode::BUGREPORT_TELEPHONY; 2301 } else if (extra_options == "bugreportwifi") { 2302 mode = Dumpstate::BugreportMode::BUGREPORT_WIFI; 2303 } else { 2304 MYLOGE("Unknown extra option: %s\n", extra_options.c_str()); 2305 } 2306 // Reset the property 2307 android::base::SetProperty(PROPERTY_EXTRA_OPTIONS, ""); 2308 } 2309 return mode; 2310 } 2311 2312 // TODO: Move away from system properties when we have options passed via binder calls. 2313 /* Sets runtime options from the system properties and then clears those properties. */ 2314 static void SetOptionsFromProperties(Dumpstate::DumpOptions* options) { 2315 Dumpstate::BugreportMode mode = getBugreportModeFromProperty(); 2316 SetOptionsFromMode(mode, options); 2317 2318 options->notification_title = android::base::GetProperty(PROPERTY_EXTRA_TITLE, ""); 2319 if (!options->notification_title.empty()) { 2320 // Reset the property 2321 android::base::SetProperty(PROPERTY_EXTRA_TITLE, ""); 2322 2323 options->notification_description = 2324 android::base::GetProperty(PROPERTY_EXTRA_DESCRIPTION, ""); 2325 if (!options->notification_description.empty()) { 2326 // Reset the property 2327 android::base::SetProperty(PROPERTY_EXTRA_DESCRIPTION, ""); 2328 } 2329 MYLOGD("notification (title: %s, description: %s)\n", options->notification_title.c_str(), 2330 options->notification_description.c_str()); 2331 } 2332 } 2333 2334 static void LogDumpOptions(const Dumpstate::DumpOptions& options) { 2335 MYLOGI("do_zip_file: %d\n", options.do_zip_file); 2336 MYLOGI("do_add_date: %d\n", options.do_add_date); 2337 MYLOGI("do_vibrate: %d\n", options.do_vibrate); 2338 MYLOGI("use_socket: %d\n", options.use_socket); 2339 MYLOGI("use_control_socket: %d\n", options.use_control_socket); 2340 MYLOGI("do_fb: %d\n", options.do_fb); 2341 MYLOGI("do_broadcast: %d\n", options.do_broadcast); 2342 MYLOGI("is_remote_mode: %d\n", options.is_remote_mode); 2343 MYLOGI("show_header_only: %d\n", options.show_header_only); 2344 MYLOGI("do_start_service: %d\n", options.do_start_service); 2345 MYLOGI("telephony_only: %d\n", options.telephony_only); 2346 MYLOGI("wifi_only: %d\n", options.wifi_only); 2347 MYLOGI("do_progress_updates: %d\n", options.do_progress_updates); 2348 MYLOGI("fd: %d\n", options.bugreport_fd.get()); 2349 MYLOGI("extra_options: %s\n", options.extra_options.c_str()); 2350 MYLOGI("args: %s\n", options.args.c_str()); 2351 MYLOGI("notification_title: %s\n", options.notification_title.c_str()); 2352 MYLOGI("notification_description: %s\n", options.notification_description.c_str()); 2353 } 2354 2355 void Dumpstate::DumpOptions::Initialize(BugreportMode bugreport_mode, 2356 const android::base::unique_fd& bugreport_fd_in, 2357 const android::base::unique_fd& screenshot_fd_in) { 2358 // In the new API world, date is always added; output is always a zip file. 2359 // TODO(111441001): remove these options once they are obsolete. 2360 do_add_date = true; 2361 do_zip_file = true; 2362 2363 // Duplicate the fds because the passed in fds don't outlive the binder transaction. 2364 bugreport_fd.reset(dup(bugreport_fd_in.get())); 2365 screenshot_fd.reset(dup(screenshot_fd_in.get())); 2366 2367 extra_options = ModeToString(bugreport_mode); 2368 SetOptionsFromMode(bugreport_mode, this); 2369 } 2370 2371 Dumpstate::RunStatus Dumpstate::DumpOptions::Initialize(int argc, char* argv[]) { 2372 RunStatus status = RunStatus::OK; 2373 int c; 2374 while ((c = getopt(argc, argv, "dho:svqzpPBRSV:w")) != -1) { 2375 switch (c) { 2376 // clang-format off 2377 case 'd': do_add_date = true; break; 2378 case 'z': do_zip_file = true; break; 2379 // o=use_outfile not supported anymore. 2380 // TODO(b/111441001): Remove when all callers have migrated. 2381 case 'o': break; 2382 case 's': use_socket = true; break; 2383 case 'S': use_control_socket = true; break; 2384 case 'v': show_header_only = true; break; 2385 case 'q': do_vibrate = false; break; 2386 case 'p': do_fb = true; break; 2387 case 'P': do_progress_updates = true; break; 2388 case 'R': is_remote_mode = true; break; 2389 case 'B': do_broadcast = true; break; 2390 case 'V': break; // compatibility no-op 2391 case 'w': 2392 // This was already processed 2393 break; 2394 case 'h': 2395 status = RunStatus::HELP; 2396 break; 2397 default: 2398 fprintf(stderr, "Invalid option: %c\n", c); 2399 status = RunStatus::INVALID_INPUT; 2400 break; 2401 // clang-format on 2402 } 2403 } 2404 2405 // TODO: use helper function to convert argv into a string 2406 for (int i = 0; i < argc; i++) { 2407 args += argv[i]; 2408 if (i < argc - 1) { 2409 args += " "; 2410 } 2411 } 2412 2413 // Reset next index used by getopt so this can be called multiple times, for eg, in tests. 2414 optind = 1; 2415 2416 SetOptionsFromProperties(this); 2417 return status; 2418 } 2419 2420 bool Dumpstate::DumpOptions::ValidateOptions() const { 2421 if (bugreport_fd.get() != -1 && !do_zip_file) { 2422 return false; 2423 } 2424 2425 if ((do_zip_file || do_add_date || do_progress_updates || do_broadcast) && !OutputToFile()) { 2426 return false; 2427 } 2428 2429 if (use_control_socket && !do_zip_file) { 2430 return false; 2431 } 2432 2433 if (do_progress_updates && !do_broadcast) { 2434 return false; 2435 } 2436 2437 if (is_remote_mode && (do_progress_updates || !do_broadcast || !do_zip_file || !do_add_date)) { 2438 return false; 2439 } 2440 return true; 2441 } 2442 2443 void Dumpstate::SetOptions(std::unique_ptr<DumpOptions> options) { 2444 options_ = std::move(options); 2445 } 2446 2447 Dumpstate::RunStatus Dumpstate::Run(int32_t calling_uid, const std::string& calling_package) { 2448 Dumpstate::RunStatus status = RunInternal(calling_uid, calling_package); 2449 if (listener_ != nullptr) { 2450 switch (status) { 2451 case Dumpstate::RunStatus::OK: 2452 listener_->onFinished(); 2453 break; 2454 case Dumpstate::RunStatus::HELP: 2455 break; 2456 case Dumpstate::RunStatus::INVALID_INPUT: 2457 listener_->onError(IDumpstateListener::BUGREPORT_ERROR_INVALID_INPUT); 2458 break; 2459 case Dumpstate::RunStatus::ERROR: 2460 listener_->onError(IDumpstateListener::BUGREPORT_ERROR_RUNTIME_ERROR); 2461 break; 2462 case Dumpstate::RunStatus::USER_CONSENT_DENIED: 2463 listener_->onError(IDumpstateListener::BUGREPORT_ERROR_USER_DENIED_CONSENT); 2464 break; 2465 case Dumpstate::RunStatus::USER_CONSENT_TIMED_OUT: 2466 listener_->onError(IDumpstateListener::BUGREPORT_ERROR_USER_CONSENT_TIMED_OUT); 2467 break; 2468 } 2469 } 2470 return status; 2471 } 2472 2473 /* 2474 * Dumps relevant information to a bugreport based on the given options. 2475 * 2476 * The bugreport can be dumped to a file or streamed to a socket. 2477 * 2478 * How dumping to file works: 2479 * stdout is redirected to a temporary file. This will later become the main bugreport entry. 2480 * stderr is redirected a log file. 2481 * 2482 * The temporary bugreport is then populated via printfs, dumping contents of files and 2483 * output of commands to stdout. 2484 * 2485 * If zipping, the temporary bugreport file is added to the zip archive. Else it's renamed to final 2486 * text file. 2487 * 2488 * If zipping, a bunch of other files and dumps also get added to the zip archive. The log file also 2489 * gets added to the archive. 2490 * 2491 * Bugreports are first generated in a local directory and later copied to the caller's fd if 2492 * supplied. 2493 */ 2494 Dumpstate::RunStatus Dumpstate::RunInternal(int32_t calling_uid, 2495 const std::string& calling_package) { 2496 LogDumpOptions(*options_); 2497 if (!options_->ValidateOptions()) { 2498 MYLOGE("Invalid options specified\n"); 2499 return RunStatus::INVALID_INPUT; 2500 } 2501 /* set as high priority, and protect from OOM killer */ 2502 setpriority(PRIO_PROCESS, 0, -20); 2503 2504 FILE* oom_adj = fopen("/proc/self/oom_score_adj", "we"); 2505 if (oom_adj) { 2506 fputs("-1000", oom_adj); 2507 fclose(oom_adj); 2508 } else { 2509 /* fallback to kernels <= 2.6.35 */ 2510 oom_adj = fopen("/proc/self/oom_adj", "we"); 2511 if (oom_adj) { 2512 fputs("-17", oom_adj); 2513 fclose(oom_adj); 2514 } 2515 } 2516 2517 if (version_ == VERSION_DEFAULT) { 2518 version_ = VERSION_CURRENT; 2519 } 2520 2521 if (version_ != VERSION_CURRENT && version_ != VERSION_SPLIT_ANR) { 2522 MYLOGE("invalid version requested ('%s'); suppported values are: ('%s', '%s', '%s')\n", 2523 version_.c_str(), VERSION_DEFAULT.c_str(), VERSION_CURRENT.c_str(), 2524 VERSION_SPLIT_ANR.c_str()); 2525 return RunStatus::INVALID_INPUT; 2526 } 2527 2528 if (options_->show_header_only) { 2529 PrintHeader(); 2530 return RunStatus::OK; 2531 } 2532 2533 if (options_->bugreport_fd.get() != -1) { 2534 // If the output needs to be copied over to the caller's fd, get user consent. 2535 android::String16 package(calling_package.c_str()); 2536 CheckUserConsent(calling_uid, package); 2537 } 2538 2539 // Redirect output if needed 2540 bool is_redirecting = options_->OutputToFile(); 2541 2542 // TODO: temporarily set progress until it's part of the Dumpstate constructor 2543 std::string stats_path = 2544 is_redirecting 2545 ? android::base::StringPrintf("%s/dumpstate-stats.txt", bugreport_internal_dir_.c_str()) 2546 : ""; 2547 progress_.reset(new Progress(stats_path)); 2548 2549 /* gets the sequential id */ 2550 uint32_t last_id = android::base::GetIntProperty(PROPERTY_LAST_ID, 0); 2551 id_ = ++last_id; 2552 android::base::SetProperty(PROPERTY_LAST_ID, std::to_string(last_id)); 2553 2554 MYLOGI("begin\n"); 2555 2556 register_sig_handler(); 2557 2558 // TODO(b/111441001): maybe skip if already started? 2559 if (options_->do_start_service) { 2560 MYLOGI("Starting 'dumpstate' service\n"); 2561 android::status_t ret; 2562 if ((ret = android::os::DumpstateService::Start()) != android::OK) { 2563 MYLOGE("Unable to start DumpstateService: %d\n", ret); 2564 } 2565 } 2566 2567 if (PropertiesHelper::IsDryRun()) { 2568 MYLOGI("Running on dry-run mode (to disable it, call 'setprop dumpstate.dry_run false')\n"); 2569 } 2570 2571 MYLOGI("dumpstate info: id=%d, args='%s', extra_options= %s)\n", id_, options_->args.c_str(), 2572 options_->extra_options.c_str()); 2573 2574 MYLOGI("bugreport format version: %s\n", version_.c_str()); 2575 2576 do_early_screenshot_ = options_->do_progress_updates; 2577 2578 // If we are going to use a socket, do it as early as possible 2579 // to avoid timeouts from bugreport. 2580 if (options_->use_socket) { 2581 if (!redirect_to_socket(stdout, "dumpstate")) { 2582 return ERROR; 2583 } 2584 } 2585 2586 if (options_->use_control_socket) { 2587 MYLOGD("Opening control socket\n"); 2588 control_socket_fd_ = open_socket("dumpstate"); 2589 if (control_socket_fd_ == -1) { 2590 return ERROR; 2591 } 2592 options_->do_progress_updates = 1; 2593 } 2594 2595 if (is_redirecting) { 2596 PrepareToWriteToFile(); 2597 2598 if (options_->do_progress_updates) { 2599 if (options_->do_broadcast) { 2600 // clang-format off 2601 std::vector<std::string> am_args = { 2602 "--receiver-permission", "android.permission.DUMP", 2603 "--es", "android.intent.extra.NAME", name_, 2604 "--ei", "android.intent.extra.ID", std::to_string(id_), 2605 "--ei", "android.intent.extra.PID", std::to_string(pid_), 2606 "--ei", "android.intent.extra.MAX", std::to_string(progress_->GetMax()), 2607 }; 2608 // clang-format on 2609 SendBroadcast("com.android.internal.intent.action.BUGREPORT_STARTED", am_args); 2610 } 2611 if (options_->use_control_socket) { 2612 dprintf(control_socket_fd_, "BEGIN:%s\n", path_.c_str()); 2613 } 2614 } 2615 } 2616 2617 /* read /proc/cmdline before dropping root */ 2618 FILE *cmdline = fopen("/proc/cmdline", "re"); 2619 if (cmdline) { 2620 fgets(cmdline_buf, sizeof(cmdline_buf), cmdline); 2621 fclose(cmdline); 2622 } 2623 2624 if (options_->do_vibrate) { 2625 Vibrate(150); 2626 } 2627 2628 if (options_->do_fb && do_early_screenshot_) { 2629 if (screenshot_path_.empty()) { 2630 // should not have happened 2631 MYLOGE("INTERNAL ERROR: skipping early screenshot because path was not set\n"); 2632 } else { 2633 MYLOGI("taking early screenshot\n"); 2634 TakeScreenshot(); 2635 } 2636 } 2637 2638 if (options_->do_zip_file && zip_file != nullptr) { 2639 if (chown(path_.c_str(), AID_SHELL, AID_SHELL)) { 2640 MYLOGE("Unable to change ownership of zip file %s: %s\n", path_.c_str(), 2641 strerror(errno)); 2642 } 2643 } 2644 2645 int dup_stdout_fd; 2646 int dup_stderr_fd; 2647 if (is_redirecting) { 2648 // Redirect stderr to log_path_ for debugging. 2649 TEMP_FAILURE_RETRY(dup_stderr_fd = dup(fileno(stderr))); 2650 if (!redirect_to_file(stderr, const_cast<char*>(log_path_.c_str()))) { 2651 return ERROR; 2652 } 2653 if (chown(log_path_.c_str(), AID_SHELL, AID_SHELL)) { 2654 MYLOGE("Unable to change ownership of dumpstate log file %s: %s\n", log_path_.c_str(), 2655 strerror(errno)); 2656 } 2657 2658 // Redirect stdout to tmp_path_. This is the main bugreport entry and will be 2659 // moved into zip file later, if zipping. 2660 TEMP_FAILURE_RETRY(dup_stdout_fd = dup(fileno(stdout))); 2661 // TODO: why not write to a file instead of stdout to overcome this problem? 2662 /* TODO: rather than generating a text file now and zipping it later, 2663 it would be more efficient to redirect stdout to the zip entry 2664 directly, but the libziparchive doesn't support that option yet. */ 2665 if (!redirect_to_file(stdout, const_cast<char*>(tmp_path_.c_str()))) { 2666 return ERROR; 2667 } 2668 if (chown(tmp_path_.c_str(), AID_SHELL, AID_SHELL)) { 2669 MYLOGE("Unable to change ownership of temporary bugreport file %s: %s\n", 2670 tmp_path_.c_str(), strerror(errno)); 2671 } 2672 } 2673 2674 // Don't buffer stdout 2675 setvbuf(stdout, nullptr, _IONBF, 0); 2676 2677 // NOTE: there should be no stdout output until now, otherwise it would break the header. 2678 // In particular, DurationReport objects should be created passing 'title, NULL', so their 2679 // duration is logged into MYLOG instead. 2680 PrintHeader(); 2681 2682 if (options_->telephony_only) { 2683 DumpstateTelephonyOnly(); 2684 DumpstateBoard(); 2685 } else if (options_->wifi_only) { 2686 DumpstateWifiOnly(); 2687 } else { 2688 // Dump state for the default case. This also drops root. 2689 RunStatus s = DumpstateDefault(); 2690 if (s != RunStatus::OK) { 2691 if (s == RunStatus::USER_CONSENT_TIMED_OUT) { 2692 HandleUserConsentDenied(); 2693 } 2694 return s; 2695 } 2696 } 2697 2698 /* close output if needed */ 2699 if (is_redirecting) { 2700 TEMP_FAILURE_RETRY(dup2(dup_stdout_fd, fileno(stdout))); 2701 } 2702 2703 // Rename, and/or zip the (now complete) .tmp file within the internal directory. 2704 if (options_->OutputToFile()) { 2705 FinalizeFile(); 2706 } 2707 2708 // Share the final file with the caller if the user has consented. 2709 Dumpstate::RunStatus status = Dumpstate::RunStatus::OK; 2710 if (options_->bugreport_fd.get() != -1) { 2711 status = CopyBugreportIfUserConsented(); 2712 if (status != Dumpstate::RunStatus::OK && 2713 status != Dumpstate::RunStatus::USER_CONSENT_TIMED_OUT) { 2714 // Do an early return if there were errors. We make an exception for consent 2715 // timing out because it's possible the user got distracted. In this case the 2716 // bugreport is not shared but made available for manual retrieval. 2717 MYLOGI("User denied consent. Returning\n"); 2718 return status; 2719 } 2720 if (options_->do_fb && options_->screenshot_fd.get() != -1) { 2721 bool copy_succeeded = android::os::CopyFileToFd(screenshot_path_, 2722 options_->screenshot_fd.get()); 2723 if (copy_succeeded) { 2724 android::os::UnlinkAndLogOnError(screenshot_path_); 2725 } 2726 } 2727 if (status == Dumpstate::RunStatus::USER_CONSENT_TIMED_OUT) { 2728 MYLOGI( 2729 "Did not receive user consent yet." 2730 " Will not copy the bugreport artifacts to caller.\n"); 2731 const String16 incidentcompanion("incidentcompanion"); 2732 sp<android::IBinder> ics(defaultServiceManager()->getService(incidentcompanion)); 2733 if (ics != nullptr) { 2734 MYLOGD("Canceling user consent request via incidentcompanion service\n"); 2735 android::interface_cast<android::os::IIncidentCompanion>(ics)->cancelAuthorization( 2736 consent_callback_.get()); 2737 } else { 2738 MYLOGD("Unable to cancel user consent; incidentcompanion service unavailable\n"); 2739 } 2740 } 2741 } 2742 2743 /* vibrate a few but shortly times to let user know it's finished */ 2744 if (options_->do_vibrate) { 2745 for (int i = 0; i < 3; i++) { 2746 Vibrate(75); 2747 usleep((75 + 50) * 1000); 2748 } 2749 } 2750 2751 /* tell activity manager we're done */ 2752 if (options_->do_broadcast) { 2753 SendBugreportFinishedBroadcast(); 2754 // Note that listener_ is notified in Run(); 2755 } 2756 2757 MYLOGD("Final progress: %d/%d (estimated %d)\n", progress_->Get(), progress_->GetMax(), 2758 progress_->GetInitialMax()); 2759 progress_->Save(); 2760 MYLOGI("done (id %d)\n", id_); 2761 2762 if (is_redirecting) { 2763 TEMP_FAILURE_RETRY(dup2(dup_stderr_fd, fileno(stderr))); 2764 } 2765 2766 if (options_->use_control_socket && control_socket_fd_ != -1) { 2767 MYLOGD("Closing control socket\n"); 2768 close(control_socket_fd_); 2769 } 2770 2771 tombstone_data_.clear(); 2772 anr_data_.clear(); 2773 2774 return (consent_callback_ != nullptr && 2775 consent_callback_->getResult() == UserConsentResult::UNAVAILABLE) 2776 ? USER_CONSENT_TIMED_OUT 2777 : RunStatus::OK; 2778 } 2779 2780 void Dumpstate::CheckUserConsent(int32_t calling_uid, const android::String16& calling_package) { 2781 consent_callback_ = new ConsentCallback(); 2782 const String16 incidentcompanion("incidentcompanion"); 2783 sp<android::IBinder> ics(defaultServiceManager()->getService(incidentcompanion)); 2784 if (ics != nullptr) { 2785 MYLOGD("Checking user consent via incidentcompanion service\n"); 2786 android::interface_cast<android::os::IIncidentCompanion>(ics)->authorizeReport( 2787 calling_uid, calling_package, String16(), String16(), 2788 0x1 /* FLAG_CONFIRMATION_DIALOG */, consent_callback_.get()); 2789 } else { 2790 MYLOGD("Unable to check user consent; incidentcompanion service unavailable\n"); 2791 } 2792 } 2793 2794 bool Dumpstate::IsUserConsentDenied() const { 2795 return ds.consent_callback_ != nullptr && 2796 ds.consent_callback_->getResult() == UserConsentResult::DENIED; 2797 } 2798 2799 void Dumpstate::CleanupFiles() { 2800 android::os::UnlinkAndLogOnError(tmp_path_); 2801 android::os::UnlinkAndLogOnError(screenshot_path_); 2802 android::os::UnlinkAndLogOnError(path_); 2803 } 2804 2805 Dumpstate::RunStatus Dumpstate::HandleUserConsentDenied() { 2806 MYLOGD("User denied consent; deleting files and returning\n"); 2807 CleanupFiles(); 2808 return USER_CONSENT_DENIED; 2809 } 2810 2811 Dumpstate::RunStatus Dumpstate::CopyBugreportIfUserConsented() { 2812 // If the caller has asked to copy the bugreport over to their directory, we need explicit 2813 // user consent. 2814 UserConsentResult consent_result = consent_callback_->getResult(); 2815 if (consent_result == UserConsentResult::UNAVAILABLE) { 2816 // User has not responded yet. 2817 uint64_t elapsed_ms = consent_callback_->getElapsedTimeMs(); 2818 if (elapsed_ms < USER_CONSENT_TIMEOUT_MS) { 2819 uint delay_seconds = (USER_CONSENT_TIMEOUT_MS - elapsed_ms) / 1000; 2820 MYLOGD("Did not receive user consent yet; going to wait for %d seconds", delay_seconds); 2821 sleep(delay_seconds); 2822 } 2823 consent_result = consent_callback_->getResult(); 2824 } 2825 if (consent_result == UserConsentResult::DENIED) { 2826 // User has explicitly denied sharing with the app. To be safe delete the 2827 // internal bugreport & tmp files. 2828 return HandleUserConsentDenied(); 2829 } 2830 if (consent_result == UserConsentResult::APPROVED) { 2831 bool copy_succeeded = android::os::CopyFileToFd(path_, options_->bugreport_fd.get()); 2832 if (copy_succeeded) { 2833 android::os::UnlinkAndLogOnError(path_); 2834 } 2835 return copy_succeeded ? Dumpstate::RunStatus::OK : Dumpstate::RunStatus::ERROR; 2836 } else if (consent_result == UserConsentResult::UNAVAILABLE) { 2837 // consent_result is still UNAVAILABLE. The user has likely not responded yet. 2838 // Since we do not have user consent to share the bugreport it does not get 2839 // copied over to the calling app but remains in the internal directory from 2840 // where the user can manually pull it. 2841 return Dumpstate::RunStatus::USER_CONSENT_TIMED_OUT; 2842 } 2843 // Unknown result; must be a programming error. 2844 MYLOGE("Unknown user consent result:%d\n", consent_result); 2845 return Dumpstate::RunStatus::ERROR; 2846 } 2847 2848 Dumpstate::RunStatus Dumpstate::ParseCommandlineAndRun(int argc, char* argv[]) { 2849 std::unique_ptr<Dumpstate::DumpOptions> options = std::make_unique<Dumpstate::DumpOptions>(); 2850 Dumpstate::RunStatus status = options->Initialize(argc, argv); 2851 if (status == Dumpstate::RunStatus::OK) { 2852 SetOptions(std::move(options)); 2853 // When directly running dumpstate binary, the output is not expected to be written 2854 // to any external file descriptor. 2855 assert(options_->bugreport_fd.get() == -1); 2856 2857 // calling_uid and calling_package are for user consent to share the bugreport with 2858 // an app; they are irrelvant here because bugreport is only written to a local 2859 // directory, and not shared. 2860 status = Run(-1 /* calling_uid */, "" /* calling_package */); 2861 } 2862 return status; 2863 } 2864 2865 /* Main entry point for dumpstate binary. */ 2866 int run_main(int argc, char* argv[]) { 2867 Dumpstate::RunStatus status = ds.ParseCommandlineAndRun(argc, argv); 2868 2869 switch (status) { 2870 case Dumpstate::RunStatus::OK: 2871 exit(0); 2872 case Dumpstate::RunStatus::HELP: 2873 ShowUsage(); 2874 exit(0); 2875 case Dumpstate::RunStatus::INVALID_INPUT: 2876 fprintf(stderr, "Invalid combination of args\n"); 2877 ShowUsage(); 2878 exit(1); 2879 case Dumpstate::RunStatus::ERROR: 2880 FALLTHROUGH_INTENDED; 2881 case Dumpstate::RunStatus::USER_CONSENT_DENIED: 2882 FALLTHROUGH_INTENDED; 2883 case Dumpstate::RunStatus::USER_CONSENT_TIMED_OUT: 2884 exit(2); 2885 } 2886 } 2887