blob: 0ff693375c9d1cdc4189d9e82ee8f8e4b289f5fd [file] [log] [blame]
Colin Crossf45fa6b2012-03-26 12:38:26 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -070017#include <dirent.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070018#include <errno.h>
19#include <fcntl.h>
Felipe Lemead5f6c42015-11-30 14:26:46 -080020#include <libgen.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070021#include <limits.h>
Felipe Leme6e01fa62015-11-11 19:35:14 -080022#include <memory>
Felipe Lemead5f6c42015-11-30 14:26:46 -080023#include <regex>
Felipe Leme635ca312016-01-05 14:23:02 -080024#include <set>
Wei Liu2cc37ea2016-08-26 14:51:42 -070025#include <signal.h>
Mark Salyzyn8f37aa52015-06-12 12:28:24 -070026#include <stdbool.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070027#include <stdio.h>
28#include <stdlib.h>
Felipe Leme6e01fa62015-11-11 19:35:14 -080029#include <string>
Colin Crossf45fa6b2012-03-26 12:38:26 -070030#include <string.h>
Christopher Ferris7dc7f322014-07-22 16:08:19 -070031#include <sys/prctl.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070032#include <sys/resource.h>
33#include <sys/stat.h>
34#include <sys/time.h>
35#include <sys/wait.h>
36#include <unistd.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070037
Elliott Hughes9dc117c2015-12-07 14:21:50 -080038#include <android-base/stringprintf.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070039#include <cutils/properties.h>
Wei Liu2cc37ea2016-08-26 14:51:42 -070040#include <hardware_legacy/power.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070041
42#include "private/android_filesystem_config.h"
43
44#define LOG_TAG "dumpstate"
Alex Ray656a6b92013-07-23 13:44:34 -070045#include <cutils/log.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070046
47#include "dumpstate.h"
Felipe Leme6e01fa62015-11-11 19:35:14 -080048#include "ScopedFd.h"
49#include "ziparchive/zip_writer.h"
50
Michal Karpinski4db754f2015-12-11 18:04:32 +000051#include "mincrypt/sha256.h"
52
Felipe Leme6e01fa62015-11-11 19:35:14 -080053using android::base::StringPrintf;
Colin Crossf45fa6b2012-03-26 12:38:26 -070054
55/* read before root is shed */
56static char cmdline_buf[16384] = "(unknown)";
57static const char *dump_traces_path = NULL;
58
Felipe Lemeefd7e272016-05-18 09:27:16 -070059// TODO: variables below should be part of dumpstate object
Felipe Leme8fecfdd2016-02-09 10:40:07 -080060static unsigned long id;
Felipe Leme78f2c862015-12-21 09:55:22 -080061static char build_type[PROPERTY_VALUE_MAX];
Felipe Lemee82a27d2016-01-05 13:35:44 -080062static time_t now;
63static std::unique_ptr<ZipWriter> zip_writer;
Felipe Leme635ca312016-01-05 14:23:02 -080064static std::set<std::string> mount_points;
65void add_mountinfo();
Felipe Leme02b7e002016-07-22 12:03:20 -070066int control_socket_fd = -1;
Felipe Lemeefd7e272016-05-18 09:27:16 -070067/* suffix of the bugreport files - it's typically the date (when invoked with -d),
68 * although it could be changed by the user using a system property */
69static std::string suffix;
Felipe Leme78f2c862015-12-21 09:55:22 -080070
Todd Poynor2a83daa2013-11-22 15:44:22 -080071#define PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops"
Mark Salyzynced60782016-06-24 14:06:15 -070072#define ALT_PSTORE_LAST_KMSG "/sys/fs/pstore/console-ramoops-0"
Todd Poynor2a83daa2013-11-22 15:44:22 -080073
Wei Liu341938b2016-04-27 16:18:17 -070074#define RAFT_DIR "/data/misc/raft"
Felipe Lemee82a27d2016-01-05 13:35:44 -080075#define RECOVERY_DIR "/cache/recovery"
Mark Salyzynd6ab0112016-03-25 12:56:39 -070076#define RECOVERY_DATA_DIR "/data/misc/recovery"
Mark Salyzyn4d42dea2016-04-01 10:03:14 -070077#define LOGPERSIST_DATA_DIR "/data/misc/logd"
David Brazdild2991962016-06-03 14:40:44 +010078#define PROFILE_DATA_DIR_CUR "/data/misc/profiles/cur"
79#define PROFILE_DATA_DIR_REF "/data/misc/profiles/ref"
Christopher Ferris7dc7f322014-07-22 16:08:19 -070080#define TOMBSTONE_DIR "/data/tombstones"
81#define TOMBSTONE_FILE_PREFIX TOMBSTONE_DIR "/tombstone_"
82/* Can accomodate a tombstone number up to 9999. */
83#define TOMBSTONE_MAX_LEN (sizeof(TOMBSTONE_FILE_PREFIX) + 4)
84#define NUM_TOMBSTONES 10
Erik Kline08165202016-05-30 11:55:44 +090085#define WLUTIL "/vendor/xbin/wlutil"
Wei Liu2cc37ea2016-08-26 14:51:42 -070086#define WAKE_LOCK_NAME "dumpstate_wakelock"
Christopher Ferris7dc7f322014-07-22 16:08:19 -070087
88typedef struct {
89 char name[TOMBSTONE_MAX_LEN];
90 int fd;
91} tombstone_data_t;
92
93static tombstone_data_t tombstone_data[NUM_TOMBSTONES];
94
Felipe Leme71ca15e2016-05-19 16:18:17 -070095const std::string ZIP_ROOT_DIR = "FS";
96std::string bugreport_dir;
Felipe Lemee82a27d2016-01-05 13:35:44 -080097
Felipe Leme809d74e2016-02-02 12:57:00 -080098/*
99 * List of supported zip format versions.
100 *
101 * See bugreport-format.txt for more info.
102 */
Felipe Lemeca9c12e2016-05-19 16:30:15 -0700103static std::string VERSION_DEFAULT = "1.0";
Felipe Leme809d74e2016-02-02 12:57:00 -0800104
Calvin On249beee2016-06-03 15:17:07 -0700105bool is_user_build() {
Felipe Lemec4eee562016-04-21 15:42:55 -0700106 return 0 == strncmp(build_type, "user", PROPERTY_VALUE_MAX - 1);
107}
108
Felipe Lemee82a27d2016-01-05 13:35:44 -0800109/* gets the tombstone data, according to the bugreport type: if zipped gets all tombstones,
110 * otherwise gets just those modified in the last half an hour. */
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700111static void get_tombstone_fds(tombstone_data_t data[NUM_TOMBSTONES]) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800112 time_t thirty_minutes_ago = now - 60*30;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700113 for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
114 snprintf(data[i].name, sizeof(data[i].name), "%s%02zu", TOMBSTONE_FILE_PREFIX, i);
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800115 int fd = TEMP_FAILURE_RETRY(open(data[i].name,
116 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700117 struct stat st;
118 if (fstat(fd, &st) == 0 && S_ISREG(st.st_mode) &&
Felipe Lemee82a27d2016-01-05 13:35:44 -0800119 (zip_writer || (time_t) st.st_mtime >= thirty_minutes_ago)) {
120 data[i].fd = fd;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700121 } else {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800122 close(fd);
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700123 data[i].fd = -1;
124 }
125 }
126}
127
Felipe Leme635ca312016-01-05 14:23:02 -0800128// for_each_pid() callback to get mount info about a process.
129void do_mountinfo(int pid, const char *name) {
130 char path[PATH_MAX];
131
132 // Gets the the content of the /proc/PID/ns/mnt link, so only unique mount points
133 // are added.
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700134 snprintf(path, sizeof(path), "/proc/%d/ns/mnt", pid);
Felipe Leme635ca312016-01-05 14:23:02 -0800135 char linkname[PATH_MAX];
136 ssize_t r = readlink(path, linkname, PATH_MAX);
137 if (r == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800138 MYLOGE("Unable to read link for %s: %s\n", path, strerror(errno));
Felipe Leme635ca312016-01-05 14:23:02 -0800139 return;
140 }
141 linkname[r] = '\0';
142
143 if (mount_points.find(linkname) == mount_points.end()) {
144 // First time this mount point was found: add it
Nick Kralevichf0922cc2016-05-14 16:47:44 -0700145 snprintf(path, sizeof(path), "/proc/%d/mountinfo", pid);
Felipe Leme635ca312016-01-05 14:23:02 -0800146 if (add_zip_entry(ZIP_ROOT_DIR + path, path)) {
147 mount_points.insert(linkname);
148 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800149 MYLOGE("Unable to add mountinfo %s to zip file\n", path);
Felipe Leme635ca312016-01-05 14:23:02 -0800150 }
151 }
152}
153
154void add_mountinfo() {
155 if (!zip_writer) return;
156 const char *title = "MOUNT INFO";
157 mount_points.clear();
Felipe Leme608385d2016-02-01 10:35:38 -0800158 DurationReporter duration_reporter(title, NULL);
Felipe Leme635ca312016-01-05 14:23:02 -0800159 for_each_pid(do_mountinfo, NULL);
Felipe Leme1b0225a2016-02-09 16:35:14 -0800160 MYLOGD("%s: %d entries added to zip file\n", title, (int) mount_points.size());
Felipe Leme635ca312016-01-05 14:23:02 -0800161}
162
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -0700163static void dump_dev_files(const char *title, const char *driverpath, const char *filename)
164{
165 DIR *d;
166 struct dirent *de;
167 char path[PATH_MAX];
168
169 d = opendir(driverpath);
170 if (d == NULL) {
171 return;
172 }
173
174 while ((de = readdir(d))) {
175 if (de->d_type != DT_LNK) {
176 continue;
177 }
178 snprintf(path, sizeof(path), "%s/%s/%s", driverpath, de->d_name, filename);
179 dump_file(title, path);
180 }
181
182 closedir(d);
183}
184
Felipe Lemeefd7e272016-05-18 09:27:16 -0700185static void dump_systrace() {
Felipe Leme71a74ac2016-03-17 15:43:25 -0700186 if (!zip_writer) {
187 MYLOGD("Not dumping systrace because zip_writer is not set\n");
188 return;
189 }
Felipe Lemeefd7e272016-05-18 09:27:16 -0700190 std::string systrace_path = bugreport_dir + "/systrace-" + suffix + ".txt";
Felipe Leme14e034a2016-03-30 18:51:03 -0700191 if (systrace_path.empty()) {
192 MYLOGE("Not dumping systrace because path is empty\n");
193 return;
194 }
Felipe Leme71a74ac2016-03-17 15:43:25 -0700195 const char* path = "/sys/kernel/debug/tracing/tracing_on";
196 long int is_tracing;
197 if (read_file_as_long(path, &is_tracing)) {
198 return; // error already logged
199 }
200 if (is_tracing <= 0) {
201 MYLOGD("Skipping systrace because '%s' content is '%ld'\n", path, is_tracing);
202 return;
203 }
204
Felipe Leme14e034a2016-03-30 18:51:03 -0700205 MYLOGD("Running '/system/bin/atrace --async_dump -o %s', which can take several minutes",
206 systrace_path.c_str());
207 if (run_command("SYSTRACE", 120, "/system/bin/atrace", "--async_dump", "-o",
208 systrace_path.c_str(), NULL)) {
209 MYLOGE("systrace timed out, its zip entry will be incomplete\n");
210 // TODO: run_command tries to kill the process, but atrace doesn't die peacefully; ideally,
211 // we should call strace to stop itself, but there is no such option yet (just a
212 // --async_stop, which stops and dump
213 // if (run_command("SYSTRACE", 10, "/system/bin/atrace", "--kill", NULL)) {
214 // MYLOGE("could not stop systrace ");
215 // }
216 }
217 if (!add_zip_entry("systrace.txt", systrace_path)) {
218 MYLOGE("Unable to add systrace file %s to zip file\n", systrace_path.c_str());
Felipe Leme71a74ac2016-03-17 15:43:25 -0700219 } else {
Felipe Leme14e034a2016-03-30 18:51:03 -0700220 if (remove(systrace_path.c_str())) {
221 MYLOGE("Error removing systrace file %s: %s", systrace_path.c_str(), strerror(errno));
222 }
Felipe Leme71a74ac2016-03-17 15:43:25 -0700223 }
224}
225
Felipe Lemeefd7e272016-05-18 09:27:16 -0700226static void dump_raft() {
Wei Liu341938b2016-04-27 16:18:17 -0700227 if (is_user_build()) {
228 return;
229 }
230
Felipe Lemeefd7e272016-05-18 09:27:16 -0700231 std::string raft_log_path = bugreport_dir + "/raft_log.txt";
Wei Liu341938b2016-04-27 16:18:17 -0700232 if (raft_log_path.empty()) {
233 MYLOGD("raft_log_path is empty\n");
234 return;
235 }
Wei Liuf0e78d42016-05-25 14:21:02 -0700236
237 struct stat s;
238 if (stat(RAFT_DIR, &s) != 0 || !S_ISDIR(s.st_mode)) {
239 MYLOGD("%s does not exist or is not a directory\n", RAFT_DIR);
240 return;
241 }
242
Wei Liu341938b2016-04-27 16:18:17 -0700243 if (!zip_writer) {
Wei Liu310525a2016-05-25 11:28:57 -0700244 // Write compressed and encoded raft logs to stdout if not zip_writer.
245 run_command("RAFT LOGS", 600, "logcompressor", "-r", RAFT_DIR, NULL);
Wei Liu341938b2016-04-27 16:18:17 -0700246 return;
247 }
248
249 run_command("RAFT LOGS", 600, "logcompressor", "-n", "-r", RAFT_DIR,
250 "-o", raft_log_path.c_str(), NULL);
251 if (!add_zip_entry("raft_log.txt", raft_log_path)) {
252 MYLOGE("Unable to add raft log %s to zip file\n", raft_log_path.c_str());
253 } else {
254 if (remove(raft_log_path.c_str())) {
Felipe Lemeefd7e272016-05-18 09:27:16 -0700255 MYLOGE("Error removing raft file %s: %s\n", raft_log_path.c_str(), strerror(errno));
Wei Liu341938b2016-04-27 16:18:17 -0700256 }
257 }
258}
259
Mark Salyzyn326842f2015-04-30 09:49:41 -0700260static bool skip_not_stat(const char *path) {
261 static const char stat[] = "/stat";
262 size_t len = strlen(path);
263 if (path[len - 1] == '/') { /* Directory? */
264 return false;
265 }
266 return strcmp(path + len - sizeof(stat) + 1, stat); /* .../stat? */
267}
268
Felipe Lemee82a27d2016-01-05 13:35:44 -0800269static bool skip_none(const char *path) {
270 return false;
271}
272
Mark Salyzyn326842f2015-04-30 09:49:41 -0700273static const char mmcblk0[] = "/sys/block/mmcblk0/";
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700274unsigned long worst_write_perf = 20000; /* in KB/s */
Mark Salyzyn326842f2015-04-30 09:49:41 -0700275
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800276//
277// stat offsets
278// Name units description
279// ---- ----- -----------
280// read I/Os requests number of read I/Os processed
281#define __STAT_READ_IOS 0
282// read merges requests number of read I/Os merged with in-queue I/O
283#define __STAT_READ_MERGES 1
284// read sectors sectors number of sectors read
285#define __STAT_READ_SECTORS 2
286// read ticks milliseconds total wait time for read requests
287#define __STAT_READ_TICKS 3
288// write I/Os requests number of write I/Os processed
289#define __STAT_WRITE_IOS 4
290// write merges requests number of write I/Os merged with in-queue I/O
291#define __STAT_WRITE_MERGES 5
292// write sectors sectors number of sectors written
293#define __STAT_WRITE_SECTORS 6
294// write ticks milliseconds total wait time for write requests
295#define __STAT_WRITE_TICKS 7
296// in_flight requests number of I/Os currently in flight
297#define __STAT_IN_FLIGHT 8
298// io_ticks milliseconds total time this block device has been active
299#define __STAT_IO_TICKS 9
300// time_in_queue milliseconds total wait time for all requests
301#define __STAT_IN_QUEUE 10
302#define __STAT_NUMBER_FIELD 11
303//
304// read I/Os, write I/Os
305// =====================
306//
307// These values increment when an I/O request completes.
308//
309// read merges, write merges
310// =========================
311//
312// These values increment when an I/O request is merged with an
313// already-queued I/O request.
314//
315// read sectors, write sectors
316// ===========================
317//
318// These values count the number of sectors read from or written to this
319// block device. The "sectors" in question are the standard UNIX 512-byte
320// sectors, not any device- or filesystem-specific block size. The
321// counters are incremented when the I/O completes.
322#define SECTOR_SIZE 512
323//
324// read ticks, write ticks
325// =======================
326//
327// These values count the number of milliseconds that I/O requests have
328// waited on this block device. If there are multiple I/O requests waiting,
329// these values will increase at a rate greater than 1000/second; for
330// example, if 60 read requests wait for an average of 30 ms, the read_ticks
331// field will increase by 60*30 = 1800.
332//
333// in_flight
334// =========
335//
336// This value counts the number of I/O requests that have been issued to
337// the device driver but have not yet completed. It does not include I/O
338// requests that are in the queue but not yet issued to the device driver.
339//
340// io_ticks
341// ========
342//
343// This value counts the number of milliseconds during which the device has
344// had I/O requests queued.
345//
346// time_in_queue
347// =============
348//
349// This value counts the number of milliseconds that I/O requests have waited
350// on this block device. If there are multiple I/O requests waiting, this
351// value will increase as the product of the number of milliseconds times the
352// number of requests waiting (see "read ticks" above for an example).
353#define S_TO_MS 1000
354//
355
Mark Salyzyn326842f2015-04-30 09:49:41 -0700356static int dump_stat_from_fd(const char *title __unused, const char *path, int fd) {
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800357 unsigned long long fields[__STAT_NUMBER_FIELD];
Mark Salyzyn326842f2015-04-30 09:49:41 -0700358 bool z;
359 char *cp, *buffer = NULL;
360 size_t i = 0;
361 FILE *fp = fdopen(fd, "rb");
362 getline(&buffer, &i, fp);
363 fclose(fp);
364 if (!buffer) {
365 return -errno;
366 }
367 i = strlen(buffer);
368 while ((i > 0) && (buffer[i - 1] == '\n')) {
369 buffer[--i] = '\0';
370 }
371 if (!*buffer) {
372 free(buffer);
373 return 0;
374 }
375 z = true;
376 for (cp = buffer, i = 0; i < (sizeof(fields) / sizeof(fields[0])); ++i) {
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800377 fields[i] = strtoull(cp, &cp, 10);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700378 if (fields[i] != 0) {
379 z = false;
380 }
381 }
382 if (z) { /* never accessed */
383 free(buffer);
384 return 0;
385 }
386
387 if (!strncmp(path, mmcblk0, sizeof(mmcblk0) - 1)) {
388 path += sizeof(mmcblk0) - 1;
389 }
390
391 printf("%s: %s\n", path, buffer);
392 free(buffer);
393
Mark Salyzyn01d6c392016-02-04 09:20:44 -0800394 if (fields[__STAT_IO_TICKS]) {
395 unsigned long read_perf = 0;
396 unsigned long read_ios = 0;
397 if (fields[__STAT_READ_TICKS]) {
398 unsigned long long divisor = fields[__STAT_READ_TICKS]
399 * fields[__STAT_IO_TICKS];
400 read_perf = ((unsigned long long)SECTOR_SIZE
401 * fields[__STAT_READ_SECTORS]
402 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
403 / divisor;
404 read_ios = ((unsigned long long)S_TO_MS * fields[__STAT_READ_IOS]
405 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
406 / divisor;
407 }
408
409 unsigned long write_perf = 0;
410 unsigned long write_ios = 0;
411 if (fields[__STAT_WRITE_TICKS]) {
412 unsigned long long divisor = fields[__STAT_WRITE_TICKS]
413 * fields[__STAT_IO_TICKS];
414 write_perf = ((unsigned long long)SECTOR_SIZE
415 * fields[__STAT_WRITE_SECTORS]
416 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
417 / divisor;
418 write_ios = ((unsigned long long)S_TO_MS * fields[__STAT_WRITE_IOS]
419 * fields[__STAT_IN_QUEUE] + (divisor >> 1))
420 / divisor;
421 }
422
423 unsigned queue = (fields[__STAT_IN_QUEUE]
424 + (fields[__STAT_IO_TICKS] >> 1))
425 / fields[__STAT_IO_TICKS];
426
427 if (!write_perf && !write_ios) {
428 printf("%s: perf(ios) rd: %luKB/s(%lu/s) q: %u\n",
429 path, read_perf, read_ios, queue);
430 } else {
431 printf("%s: perf(ios) rd: %luKB/s(%lu/s) wr: %luKB/s(%lu/s) q: %u\n",
432 path, read_perf, read_ios, write_perf, write_ios, queue);
433 }
434
435 /* bugreport timeout factor adjustment */
436 if ((write_perf > 1) && (write_perf < worst_write_perf)) {
437 worst_write_perf = write_perf;
438 }
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700439 }
Mark Salyzyn326842f2015-04-30 09:49:41 -0700440 return 0;
441}
442
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700443/* Copied policy from system/core/logd/LogBuffer.cpp */
444
445#define LOG_BUFFER_SIZE (256 * 1024)
446#define LOG_BUFFER_MIN_SIZE (64 * 1024UL)
447#define LOG_BUFFER_MAX_SIZE (256 * 1024 * 1024UL)
448
449static bool valid_size(unsigned long value) {
450 if ((value < LOG_BUFFER_MIN_SIZE) || (LOG_BUFFER_MAX_SIZE < value)) {
451 return false;
452 }
453
454 long pages = sysconf(_SC_PHYS_PAGES);
455 if (pages < 1) {
456 return true;
457 }
458
459 long pagesize = sysconf(_SC_PAGESIZE);
460 if (pagesize <= 1) {
461 pagesize = PAGE_SIZE;
462 }
463
464 // maximum memory impact a somewhat arbitrary ~3%
465 pages = (pages + 31) / 32;
466 unsigned long maximum = pages * pagesize;
467
468 if ((maximum < LOG_BUFFER_MIN_SIZE) || (LOG_BUFFER_MAX_SIZE < maximum)) {
469 return true;
470 }
471
472 return value <= maximum;
473}
474
475static unsigned long property_get_size(const char *key) {
476 unsigned long value;
477 char *cp, property[PROPERTY_VALUE_MAX];
478
479 property_get(key, property, "");
480 value = strtoul(property, &cp, 10);
481
482 switch(*cp) {
483 case 'm':
484 case 'M':
485 value *= 1024;
486 /* FALLTHRU */
487 case 'k':
488 case 'K':
489 value *= 1024;
490 /* FALLTHRU */
491 case '\0':
492 break;
493
494 default:
495 value = 0;
496 }
497
498 if (!valid_size(value)) {
499 value = 0;
500 }
501
502 return value;
503}
504
505/* timeout in ms */
Felipe Leme8620bb42015-11-10 11:04:45 -0800506static unsigned long logcat_timeout(const char *name) {
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700507 static const char global_tuneable[] = "persist.logd.size"; // Settings App
508 static const char global_default[] = "ro.logd.size"; // BoardConfig.mk
509 char key[PROP_NAME_MAX];
510 unsigned long property_size, default_size;
511
512 default_size = property_get_size(global_tuneable);
513 if (!default_size) {
514 default_size = property_get_size(global_default);
515 }
516
517 snprintf(key, sizeof(key), "%s.%s", global_tuneable, name);
518 property_size = property_get_size(key);
519
520 if (!property_size) {
521 snprintf(key, sizeof(key), "%s.%s", global_default, name);
522 property_size = property_get_size(key);
523 }
524
525 if (!property_size) {
526 property_size = default_size;
527 }
528
529 if (!property_size) {
530 property_size = LOG_BUFFER_SIZE;
531 }
532
533 /* Engineering margin is ten-fold our guess */
534 return 10 * (property_size + worst_write_perf) / worst_write_perf;
535}
536
537/* End copy from system/core/logd/LogBuffer.cpp */
538
Colin Crossf45fa6b2012-03-26 12:38:26 -0700539/* dumps the current system state to stdout */
Felipe Leme809d74e2016-02-02 12:57:00 -0800540static void print_header(std::string version) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700541 char build[PROPERTY_VALUE_MAX], fingerprint[PROPERTY_VALUE_MAX];
542 char radio[PROPERTY_VALUE_MAX], bootloader[PROPERTY_VALUE_MAX];
543 char network[PROPERTY_VALUE_MAX], date[80];
Colin Crossf45fa6b2012-03-26 12:38:26 -0700544
545 property_get("ro.build.display.id", build, "(unknown)");
546 property_get("ro.build.fingerprint", fingerprint, "(unknown)");
547 property_get("ro.build.type", build_type, "(unknown)");
Junda Liu58ad9292016-06-12 11:51:54 -0700548 property_get("gsm.version.baseband", radio, "(unknown)");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700549 property_get("ro.bootloader", bootloader, "(unknown)");
550 property_get("gsm.operator.alpha", network, "(unknown)");
551 strftime(date, sizeof(date), "%Y-%m-%d %H:%M:%S", localtime(&now));
552
553 printf("========================================================\n");
554 printf("== dumpstate: %s\n", date);
555 printf("========================================================\n");
556
557 printf("\n");
558 printf("Build: %s\n", build);
559 printf("Build fingerprint: '%s'\n", fingerprint); /* format is important for other tools */
560 printf("Bootloader: %s\n", bootloader);
561 printf("Radio: %s\n", radio);
562 printf("Network: %s\n", network);
563
564 printf("Kernel: ");
565 dump_file(NULL, "/proc/version");
566 printf("Command line: %s\n", strtok(cmdline_buf, "\n"));
Felipe Leme809d74e2016-02-02 12:57:00 -0800567 printf("Bugreport format version: %s\n", version.c_str());
Felipe Leme8fecfdd2016-02-09 10:40:07 -0800568 printf("Dumpstate info: id=%lu pid=%d\n", id, getpid());
Colin Crossf45fa6b2012-03-26 12:38:26 -0700569 printf("\n");
Felipe Leme78f2c862015-12-21 09:55:22 -0800570}
571
Felipe Leme24b66ee2016-06-16 10:55:26 -0700572// List of file extensions that can cause a zip file attachment to be rejected by some email
573// service providers.
574static const std::set<std::string> PROBLEMATIC_FILE_EXTENSIONS = {
575 ".ade", ".adp", ".bat", ".chm", ".cmd", ".com", ".cpl", ".exe", ".hta", ".ins", ".isp",
576 ".jar", ".jse", ".lib", ".lnk", ".mde", ".msc", ".msp", ".mst", ".pif", ".scr", ".sct",
577 ".shb", ".sys", ".vb", ".vbe", ".vbs", ".vxd", ".wsc", ".wsf", ".wsh"
578};
579
Felipe Leme71ca15e2016-05-19 16:18:17 -0700580bool add_zip_entry_from_fd(const std::string& entry_name, int fd) {
Felipe Leme111b9d02016-02-03 09:28:24 -0800581 if (!zip_writer) {
Felipe Leme88c79332016-02-22 11:06:49 -0800582 MYLOGD("Not adding zip entry %s from fd because zip_writer is not set\n",
583 entry_name.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -0800584 return false;
585 }
Felipe Leme24b66ee2016-06-16 10:55:26 -0700586 std::string valid_name = entry_name;
587
588 // Rename extension if necessary.
589 size_t idx = entry_name.rfind(".");
590 if (idx != std::string::npos) {
591 std::string extension = entry_name.substr(idx);
592 std::transform(extension.begin(), extension.end(), extension.begin(), ::tolower);
593 if (PROBLEMATIC_FILE_EXTENSIONS.count(extension) != 0) {
594 valid_name = entry_name + ".renamed";
595 MYLOGI("Renaming entry %s to %s\n", entry_name.c_str(), valid_name.c_str());
596 }
597 }
598
Felipe Leme6fe9db62016-02-12 09:04:16 -0800599 // Logging statement below is useful to time how long each entry takes, but it's too verbose.
600 // MYLOGD("Adding zip entry %s\n", entry_name.c_str());
Felipe Leme24b66ee2016-06-16 10:55:26 -0700601 int32_t err = zip_writer->StartEntryWithTime(valid_name.c_str(),
Felipe Lemee82a27d2016-01-05 13:35:44 -0800602 ZipWriter::kCompress, get_mtime(fd, now));
603 if (err) {
Felipe Leme24b66ee2016-06-16 10:55:26 -0700604 MYLOGE("zip_writer->StartEntryWithTime(%s): %s\n", valid_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800605 ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800606 return false;
607 }
608
Felipe Leme770410d2016-01-26 17:07:14 -0800609 std::vector<uint8_t> buffer(65536);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800610 while (1) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800611 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer.data(), sizeof(buffer)));
612 if (bytes_read == 0) {
613 break;
614 } else if (bytes_read == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800615 MYLOGE("read(%s): %s\n", entry_name.c_str(), strerror(errno));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800616 return false;
617 }
618 err = zip_writer->WriteBytes(buffer.data(), bytes_read);
619 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800620 MYLOGE("zip_writer->WriteBytes(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800621 return false;
622 }
623 }
624
625 err = zip_writer->FinishEntry();
626 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800627 MYLOGE("zip_writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800628 return false;
629 }
630
631 return true;
632}
633
Felipe Leme71ca15e2016-05-19 16:18:17 -0700634bool add_zip_entry(const std::string& entry_name, const std::string& entry_path) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800635 ScopedFd fd(TEMP_FAILURE_RETRY(open(entry_path.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC)));
636 if (fd.get() == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800637 MYLOGE("open(%s): %s\n", entry_path.c_str(), strerror(errno));
Felipe Lemee82a27d2016-01-05 13:35:44 -0800638 return false;
639 }
640
641 return add_zip_entry_from_fd(entry_name, fd.get());
642}
643
644/* adds a file to the existing zipped bugreport */
645static int _add_file_from_fd(const char *title, const char *path, int fd) {
646 return add_zip_entry_from_fd(ZIP_ROOT_DIR + path, fd) ? 0 : 1;
647}
648
Felipe Leme24b66ee2016-06-16 10:55:26 -0700649// TODO: move to util.cpp
Felipe Lemee82a27d2016-01-05 13:35:44 -0800650void add_dir(const char *dir, bool recursive) {
Felipe Leme111b9d02016-02-03 09:28:24 -0800651 if (!zip_writer) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800652 MYLOGD("Not adding dir %s because zip_writer is not set\n", dir);
Felipe Leme111b9d02016-02-03 09:28:24 -0800653 return;
654 }
Felipe Leme88c79332016-02-22 11:06:49 -0800655 MYLOGD("Adding dir %s (recursive: %d)\n", dir, recursive);
Felipe Leme608385d2016-02-01 10:35:38 -0800656 DurationReporter duration_reporter(dir, NULL);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800657 dump_files(NULL, dir, recursive ? skip_none : is_dir, _add_file_from_fd);
658}
659
Felipe Leme809d74e2016-02-02 12:57:00 -0800660/* adds a text entry entry to the existing zip file. */
661static bool add_text_zip_entry(const std::string& entry_name, const std::string& content) {
Felipe Leme111b9d02016-02-03 09:28:24 -0800662 if (!zip_writer) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800663 MYLOGD("Not adding text zip entry %s because zip_writer is not set\n", entry_name.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -0800664 return false;
665 }
Felipe Lemecbce55d2016-02-08 09:53:18 -0800666 MYLOGD("Adding zip text entry %s\n", entry_name.c_str());
Felipe Leme809d74e2016-02-02 12:57:00 -0800667 int32_t err = zip_writer->StartEntryWithTime(entry_name.c_str(), ZipWriter::kCompress, now);
668 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800669 MYLOGE("zip_writer->StartEntryWithTime(%s): %s\n", entry_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800670 ZipWriter::ErrorCodeString(err));
671 return false;
672 }
673
674 err = zip_writer->WriteBytes(content.c_str(), content.length());
675 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800676 MYLOGE("zip_writer->WriteBytes(%s): %s\n", entry_name.c_str(),
Felipe Leme809d74e2016-02-02 12:57:00 -0800677 ZipWriter::ErrorCodeString(err));
678 return false;
679 }
680
681 err = zip_writer->FinishEntry();
682 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800683 MYLOGE("zip_writer->FinishEntry(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Leme809d74e2016-02-02 12:57:00 -0800684 return false;
685 }
686
687 return true;
688}
689
Felipe Lemec0808152016-06-17 17:37:13 -0700690static void dump_iptables() {
691 run_command("IPTABLES", 10, "iptables", "-L", "-nvx", NULL);
692 run_command("IP6TABLES", 10, "ip6tables", "-L", "-nvx", NULL);
Erik Kline53ca94a2016-09-28 17:26:26 +0900693 run_command("IPTABLES NAT", 10, "iptables", "-t", "nat", "-L", "-nvx", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -0700694 /* no ip6 nat */
Erik Kline53ca94a2016-09-28 17:26:26 +0900695 run_command("IPTABLES MANGLE", 10, "iptables", "-t", "mangle", "-L", "-nvx", NULL);
696 run_command("IP6TABLES MANGLE", 10, "ip6tables", "-t", "mangle", "-L", "-nvx", NULL);
697 run_command("IPTABLES RAW", 10, "iptables", "-t", "raw", "-L", "-nvx", NULL);
698 run_command("IP6TABLES RAW", 10, "ip6tables", "-t", "raw", "-L", "-nvx", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -0700699}
700
Srinath Sridharanfdf52d32016-02-01 15:50:22 -0800701static void dumpstate(const std::string& screenshot_path, const std::string& version) {
Felipe Leme770410d2016-01-26 17:07:14 -0800702 DurationReporter duration_reporter("DUMPSTATE");
Felipe Leme78f2c862015-12-21 09:55:22 -0800703 unsigned long timeout;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700704
Arve Hjønnevåg2db0f5f2014-10-15 18:08:37 -0700705 dump_dev_files("TRUSTY VERSION", "/sys/bus/platform/drivers/trusty", "trusty_version");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700706 run_command("UPTIME", 10, "uptime", NULL);
Mark Salyzyn326842f2015-04-30 09:49:41 -0700707 dump_files("UPTIME MMC PERF", mmcblk0, skip_not_stat, dump_stat_from_fd);
Mark Salyzyn8c8130e2015-12-09 11:21:28 -0800708 dump_emmc_ecsd("/d/mmc0/mmc0:0001/ext_csd");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700709 dump_file("MEMORY INFO", "/proc/meminfo");
Elliott Hughesb32c7e12015-11-13 11:32:48 -0800710 run_command("CPU INFO", 10, "top", "-n", "1", "-d", "1", "-m", "30", "-H", NULL);
Nick Kralevich2b1f88b2015-10-07 16:38:42 -0700711 run_command("PROCRANK", 20, SU_PATH, "root", "procrank", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700712 dump_file("VIRTUAL MEMORY STATS", "/proc/vmstat");
713 dump_file("VMALLOC INFO", "/proc/vmallocinfo");
714 dump_file("SLAB INFO", "/proc/slabinfo");
715 dump_file("ZONEINFO", "/proc/zoneinfo");
716 dump_file("PAGETYPEINFO", "/proc/pagetypeinfo");
717 dump_file("BUDDYINFO", "/proc/buddyinfo");
Colin Cross2281af92012-10-28 22:41:06 -0700718 dump_file("FRAGMENTATION INFO", "/d/extfrag/unusable_index");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700719
Todd Poynor29e27a82012-05-22 17:54:59 -0700720 dump_file("KERNEL WAKE SOURCES", "/d/wakeup_sources");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700721 dump_file("KERNEL CPUFREQ", "/sys/devices/system/cpu/cpu0/cpufreq/stats/time_in_state");
Mathias Agopian85aea742012-08-08 15:32:02 -0700722 dump_file("KERNEL SYNC", "/d/sync");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700723
Elliott Hughesa3533a32015-10-30 16:17:49 -0700724 run_command("PROCESSES AND THREADS", 10, "ps", "-Z", "-t", "-p", "-P", NULL);
Nick Kralevichb82c9252015-11-27 17:56:13 -0800725 run_command("LIBRANK", 10, SU_PATH, "root", "librank", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700726
Michal Karpinski4db754f2015-12-11 18:04:32 +0000727 run_command("PRINTENV", 10, "printenv", NULL);
Lorenzo Colittif7f26512016-03-11 10:58:55 +0900728 run_command("NETSTAT", 10, "netstat", "-n", NULL);
Michal Karpinski4db754f2015-12-11 18:04:32 +0000729 run_command("LSMOD", 10, "lsmod", NULL);
730
Colin Crossf45fa6b2012-03-26 12:38:26 -0700731 do_dmesg();
732
733 run_command("LIST OF OPEN FILES", 10, SU_PATH, "root", "lsof", NULL);
Jeff Brown1dc94e32014-09-11 14:15:27 -0700734 for_each_pid(do_showmap, "SMAPS OF ALL PROCESSES");
735 for_each_tid(show_wchan, "BLOCKED PROCESS WAIT-CHANNELS");
Mark Salyzyna297c322016-02-05 15:33:17 -0800736 for_each_pid(show_showtime, "PROCESS TIMES (pid cmd user system iowait+percentage)");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700737
Felipe Leme6e01fa62015-11-11 19:35:14 -0800738 if (!screenshot_path.empty()) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800739 MYLOGI("taking late screenshot\n");
Felipe Lemee338bf62015-12-07 14:03:50 -0800740 take_screenshot(screenshot_path);
Felipe Lemecbce55d2016-02-08 09:53:18 -0800741 MYLOGI("wrote screenshot: %s\n", screenshot_path.c_str());
Jeff Sharkey5a930032013-03-19 15:05:19 -0700742 }
743
Colin Crossf45fa6b2012-03-26 12:38:26 -0700744 // dump_file("EVENT LOG TAGS", "/etc/event-log-tags");
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700745 // calculate timeout
746 timeout = logcat_timeout("main") + logcat_timeout("system") + logcat_timeout("crash");
747 if (timeout < 20000) {
748 timeout = 20000;
749 }
Mark Salyzyn78316382015-10-09 14:02:07 -0700750 run_command("SYSTEM LOG", timeout / 1000, "logcat", "-v", "threadtime",
751 "-v", "printable",
752 "-d",
753 "*:v", NULL);
Mark Salyzyn43afe5d2016-01-26 07:24:08 -0800754 timeout = logcat_timeout("events");
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700755 if (timeout < 20000) {
756 timeout = 20000;
757 }
Mark Salyzyn78316382015-10-09 14:02:07 -0700758 run_command("EVENT LOG", timeout / 1000, "logcat", "-b", "events",
759 "-v", "threadtime",
760 "-v", "printable",
761 "-d",
762 "*:v", NULL);
Mark Salyzyn8f37aa52015-06-12 12:28:24 -0700763 timeout = logcat_timeout("radio");
764 if (timeout < 20000) {
765 timeout = 20000;
766 }
Mark Salyzyn78316382015-10-09 14:02:07 -0700767 run_command("RADIO LOG", timeout / 1000, "logcat", "-b", "radio",
768 "-v", "threadtime",
769 "-v", "printable",
770 "-d",
771 "*:v", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700772
Mark Salyzynecc07632015-07-30 14:57:09 -0700773 run_command("LOG STATISTICS", 10, "logcat", "-b", "all", "-S", NULL);
774
Colin Crossf45fa6b2012-03-26 12:38:26 -0700775 /* show the traces we collected in main(), if that was done */
776 if (dump_traces_path != NULL) {
777 dump_file("VM TRACES JUST NOW", dump_traces_path);
778 }
779
780 /* only show ANR traces if they're less than 15 minutes old */
781 struct stat st;
782 char anr_traces_path[PATH_MAX];
783 property_get("dalvik.vm.stack-trace-file", anr_traces_path, "");
784 if (!anr_traces_path[0]) {
785 printf("*** NO VM TRACES FILE DEFINED (dalvik.vm.stack-trace-file)\n\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700786 } else {
Christopher Ferris54bcc5f2015-02-10 12:15:01 -0800787 int fd = TEMP_FAILURE_RETRY(open(anr_traces_path,
788 O_RDONLY | O_CLOEXEC | O_NOFOLLOW | O_NONBLOCK));
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700789 if (fd < 0) {
790 printf("*** NO ANR VM TRACES FILE (%s): %s\n\n", anr_traces_path, strerror(errno));
791 } else {
792 dump_file_from_fd("VM TRACES AT LAST ANR", anr_traces_path, fd);
793 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700794 }
795
796 /* slow traces for slow operations */
797 if (anr_traces_path[0] != 0) {
798 int tail = strlen(anr_traces_path)-1;
799 while (tail > 0 && anr_traces_path[tail] != '/') {
800 tail--;
801 }
802 int i = 0;
803 while (1) {
804 sprintf(anr_traces_path+tail+1, "slow%02d.txt", i);
805 if (stat(anr_traces_path, &st)) {
806 // No traces file at this index, done with the files.
807 break;
808 }
809 dump_file("VM TRACES WHEN SLOW", anr_traces_path);
810 i++;
811 }
812 }
813
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700814 int dumped = 0;
815 for (size_t i = 0; i < NUM_TOMBSTONES; i++) {
816 if (tombstone_data[i].fd != -1) {
Felipe Lemee82a27d2016-01-05 13:35:44 -0800817 const char *name = tombstone_data[i].name;
818 int fd = tombstone_data[i].fd;
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700819 dumped = 1;
Felipe Lemee82a27d2016-01-05 13:35:44 -0800820 if (zip_writer) {
821 if (!add_zip_entry_from_fd(ZIP_ROOT_DIR + name, fd)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -0800822 MYLOGE("Unable to add tombstone %s to zip file\n", name);
Felipe Lemee82a27d2016-01-05 13:35:44 -0800823 }
824 } else {
825 dump_file_from_fd("TOMBSTONE", name, fd);
826 }
827 close(fd);
Christopher Ferris7dc7f322014-07-22 16:08:19 -0700828 tombstone_data[i].fd = -1;
829 }
830 }
831 if (!dumped) {
832 printf("*** NO TOMBSTONES to dump in %s\n\n", TOMBSTONE_DIR);
833 }
834
Colin Crossf45fa6b2012-03-26 12:38:26 -0700835 dump_file("NETWORK DEV INFO", "/proc/net/dev");
836 dump_file("QTAGUID NETWORK INTERFACES INFO", "/proc/net/xt_qtaguid/iface_stat_all");
JP Abgrall012c2ea2012-05-16 20:49:29 -0700837 dump_file("QTAGUID NETWORK INTERFACES INFO (xt)", "/proc/net/xt_qtaguid/iface_stat_fmt");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700838 dump_file("QTAGUID CTRL INFO", "/proc/net/xt_qtaguid/ctrl");
839 dump_file("QTAGUID STATS INFO", "/proc/net/xt_qtaguid/stats");
840
Todd Poynor2a83daa2013-11-22 15:44:22 -0800841 if (!stat(PSTORE_LAST_KMSG, &st)) {
842 /* Also TODO: Make console-ramoops CAP_SYSLOG protected. */
843 dump_file("LAST KMSG", PSTORE_LAST_KMSG);
Mark Salyzynced60782016-06-24 14:06:15 -0700844 } else if (!stat(ALT_PSTORE_LAST_KMSG, &st)) {
845 dump_file("LAST KMSG", ALT_PSTORE_LAST_KMSG);
Todd Poynor2a83daa2013-11-22 15:44:22 -0800846 } else {
847 /* TODO: Make last_kmsg CAP_SYSLOG protected. b/5555691 */
848 dump_file("LAST KMSG", "/proc/last_kmsg");
849 }
850
Mark Salyzyn2262c162014-12-16 09:09:26 -0800851 /* kernels must set CONFIG_PSTORE_PMSG, slice up pstore with device tree */
Mark Salyzyn78316382015-10-09 14:02:07 -0700852 run_command("LAST LOGCAT", 10, "logcat", "-L",
853 "-b", "all",
854 "-v", "threadtime",
855 "-v", "printable",
856 "-d",
857 "*:v", NULL);
Mark Salyzyn2262c162014-12-16 09:09:26 -0800858
Colin Crossf45fa6b2012-03-26 12:38:26 -0700859 /* The following have a tendency to get wedged when wifi drivers/fw goes belly-up. */
Elliott Hughesa59828a2015-01-27 20:48:52 -0800860
861 run_command("NETWORK INTERFACES", 10, "ip", "link", NULL);
Lorenzo Colittid4c3d382014-07-30 14:38:20 +0900862
863 run_command("IPv4 ADDRESSES", 10, "ip", "-4", "addr", "show", NULL);
864 run_command("IPv6 ADDRESSES", 10, "ip", "-6", "addr", "show", NULL);
865
Colin Crossf45fa6b2012-03-26 12:38:26 -0700866 run_command("IP RULES", 10, "ip", "rule", "show", NULL);
867 run_command("IP RULES v6", 10, "ip", "-6", "rule", "show", NULL);
Sreeram Ramachandran2b3bba32014-07-08 15:40:55 -0700868
869 dump_route_tables();
870
Lorenzo Colittid4c3d382014-07-30 14:38:20 +0900871 run_command("ARP CACHE", 10, "ip", "-4", "neigh", "show", NULL);
872 run_command("IPv6 ND CACHE", 10, "ip", "-6", "neigh", "show", NULL);
Erik Klinef7f2b0f2016-05-27 11:29:19 +0900873 run_command("MULTICAST ADDRESSES", 10, "ip", "maddr", NULL);
Felipe Lemec0808152016-06-17 17:37:13 -0700874 run_command("WIFI NETWORKS", 20, "wpa_cli", "IFNAME=wlan0", "list_networks", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700875
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -0800876#ifdef FWDUMP_bcmdhd
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +0900877 run_command("ND OFFLOAD TABLE", 5,
Erik Kline08165202016-05-30 11:55:44 +0900878 SU_PATH, "root", WLUTIL, "nd_hostip", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +0900879
880 run_command("DUMP WIFI INTERNAL COUNTERS (1)", 20,
Erik Kline08165202016-05-30 11:55:44 +0900881 SU_PATH, "root", WLUTIL, "counters", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +0900882
883 run_command("ND OFFLOAD STATUS (1)", 5,
Erik Kline08165202016-05-30 11:55:44 +0900884 SU_PATH, "root", WLUTIL, "nd_status", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +0900885
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -0800886#endif
Dmitry Shmidt0b2c9262012-11-07 11:09:46 -0800887 dump_file("INTERRUPTS (1)", "/proc/interrupts");
888
Felipe Leme7cff4622016-06-08 09:51:29 -0700889 run_command("NETWORK DIAGNOSTICS", 10, "dumpsys", "-t", "10", "connectivity", "--diag", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +0900890
Dmitry Shmidtc11f56e2012-11-07 10:42:05 -0800891#ifdef FWDUMP_bcmdhd
Colin Crossf45fa6b2012-03-26 12:38:26 -0700892 run_command("DUMP WIFI STATUS", 20,
893 SU_PATH, "root", "dhdutil", "-i", "wlan0", "dump", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +0900894
895 run_command("DUMP WIFI INTERNAL COUNTERS (2)", 20,
Erik Kline08165202016-05-30 11:55:44 +0900896 SU_PATH, "root", WLUTIL, "counters", NULL);
Lorenzo Colitti6afc38c2015-09-09 22:59:25 +0900897
898 run_command("ND OFFLOAD STATUS (2)", 5,
Erik Kline08165202016-05-30 11:55:44 +0900899 SU_PATH, "root", WLUTIL, "nd_status", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700900#endif
Dmitry Shmidt0b2c9262012-11-07 11:09:46 -0800901 dump_file("INTERRUPTS (2)", "/proc/interrupts");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700902
903 print_properties();
904
905 run_command("VOLD DUMP", 10, "vdc", "dump", NULL);
906 run_command("SECURE CONTAINERS", 10, "vdc", "asec", "list", NULL);
907
Ken Sumrall8f75fa72013-02-08 17:35:58 -0800908 run_command("FILESYSTEMS & FREE SPACE", 10, "df", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700909
Colin Crossf45fa6b2012-03-26 12:38:26 -0700910 run_command("LAST RADIO LOG", 10, "parse_radio_log", "/proc/last_radio_log", NULL);
911
912 printf("------ BACKLIGHTS ------\n");
913 printf("LCD brightness=");
914 dump_file(NULL, "/sys/class/leds/lcd-backlight/brightness");
915 printf("Button brightness=");
916 dump_file(NULL, "/sys/class/leds/button-backlight/brightness");
917 printf("Keyboard brightness=");
918 dump_file(NULL, "/sys/class/leds/keyboard-backlight/brightness");
919 printf("ALS mode=");
920 dump_file(NULL, "/sys/class/leds/lcd-backlight/als");
921 printf("LCD driver registers:\n");
922 dump_file(NULL, "/sys/class/leds/lcd-backlight/registers");
923 printf("\n");
924
925 /* Binder state is expensive to look at as it uses a lot of memory. */
926 dump_file("BINDER FAILED TRANSACTION LOG", "/sys/kernel/debug/binder/failed_transaction_log");
927 dump_file("BINDER TRANSACTION LOG", "/sys/kernel/debug/binder/transaction_log");
928 dump_file("BINDER TRANSACTIONS", "/sys/kernel/debug/binder/transactions");
929 dump_file("BINDER STATS", "/sys/kernel/debug/binder/stats");
930 dump_file("BINDER STATE", "/sys/kernel/debug/binder/state");
931
Colin Crossf45fa6b2012-03-26 12:38:26 -0700932 printf("========================================================\n");
933 printf("== Board\n");
934 printf("========================================================\n");
935
936 dumpstate_board();
937 printf("\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700938
939 /* Migrate the ril_dumpstate to a dumpstate_board()? */
940 char ril_dumpstate_timeout[PROPERTY_VALUE_MAX] = {0};
941 property_get("ril.dumpstate.timeout", ril_dumpstate_timeout, "30");
942 if (strnlen(ril_dumpstate_timeout, PROPERTY_VALUE_MAX - 1) > 0) {
Felipe Lemec4eee562016-04-21 15:42:55 -0700943 if (is_user_build()) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700944 // su does not exist on user builds, so try running without it.
945 // This way any implementations of vril-dump that do not require
946 // root can run on user builds.
947 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
948 "vril-dump", NULL);
949 } else {
950 run_command("DUMP VENDOR RIL LOGS", atoi(ril_dumpstate_timeout),
951 SU_PATH, "root", "vril-dump", NULL);
952 }
953 }
954
955 printf("========================================================\n");
956 printf("== Android Framework Services\n");
957 printf("========================================================\n");
958
Wei Liu34222562016-05-19 13:59:01 -0700959 run_command("DUMPSYS", 60, "dumpsys", "-t", "60", "--skip", "meminfo", "cpuinfo", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700960
961 printf("========================================================\n");
Dianne Hackborn02bea972013-06-26 18:59:09 -0700962 printf("== Checkins\n");
963 printf("========================================================\n");
964
Felipe Leme7cff4622016-06-08 09:51:29 -0700965 run_command("CHECKIN BATTERYSTATS", 30, "dumpsys", "-t", "30", "batterystats", "-c", NULL);
966 run_command("CHECKIN MEMINFO", 30, "dumpsys", "-t", "30", "meminfo", "--checkin", NULL);
967 run_command("CHECKIN NETSTATS", 30, "dumpsys", "-t", "30", "netstats", "--checkin", NULL);
968 run_command("CHECKIN PROCSTATS", 30, "dumpsys", "-t", "30", "procstats", "-c", NULL);
969 run_command("CHECKIN USAGESTATS", 30, "dumpsys", "-t", "30", "usagestats", "-c", NULL);
970 run_command("CHECKIN PACKAGE", 30, "dumpsys", "-t", "30", "package", "--checkin", NULL);
Dianne Hackborn02bea972013-06-26 18:59:09 -0700971
972 printf("========================================================\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700973 printf("== Running Application Activities\n");
974 printf("========================================================\n");
975
Felipe Leme3f83dbe2016-06-10 16:56:33 -0700976 run_command("APP ACTIVITIES", 30, "dumpsys", "-t", "30", "activity", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700977
978 printf("========================================================\n");
979 printf("== Running Application Services\n");
980 printf("========================================================\n");
981
Felipe Leme3f83dbe2016-06-10 16:56:33 -0700982 run_command("APP SERVICES", 30, "dumpsys", "-t", "30", "activity", "service", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700983
984 printf("========================================================\n");
985 printf("== Running Application Providers\n");
986 printf("========================================================\n");
987
Junda Liucfc33d42016-06-14 00:09:10 -0700988 run_command("APP PROVIDERS", 30, "dumpsys", "-t", "30", "activity", "provider", "all", NULL);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700989
990
991 printf("========================================================\n");
Felipe Leme608385d2016-02-01 10:35:38 -0800992 printf("== Final progress (pid %d): %d/%d (originally %d)\n",
993 getpid(), progress, weight_total, WEIGHT_TOTAL);
994 printf("========================================================\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -0700995 printf("== dumpstate: done\n");
996 printf("========================================================\n");
997}
998
999static void usage() {
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001000 fprintf(stderr,
Felipe Leme2628e9e2016-04-12 16:36:51 -07001001 "usage: dumpstate [-h] [-b soundfile] [-e soundfile] [-o file [-d] [-p] "
1002 "[-z]] [-s] [-S] [-q] [-B] [-P] [-R] [-V version]\n"
1003 " -h: display this help message\n"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001004 " -b: play sound file instead of vibrate, at beginning of job\n"
1005 " -e: play sound file instead of vibrate, at end of job\n"
1006 " -o: write to file (instead of stdout)\n"
1007 " -d: append date to filename (requires -o)\n"
1008 " -p: capture screenshot to filename.png (requires -o)\n"
Felipe Leme2628e9e2016-04-12 16:36:51 -07001009 " -z: generate zipped file (requires -o)\n"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001010 " -s: write output to control socket (for init)\n"
Felipe Leme2628e9e2016-04-12 16:36:51 -07001011 " -S: write file location to control socket (for init; requires -o and -z)"
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001012 " -q: disable vibrate\n"
1013 " -B: send broadcast when finished (requires -o)\n"
1014 " -P: send broadcast when started and update system properties on "
1015 "progress (requires -o and -B)\n"
1016 " -R: take bugreport in remote mode (requires -o, -z, -d and -B, "
1017 "shouldn't be used with -P)\n"
1018 " -V: sets the bugreport format version (valid values: %s)\n",
1019 VERSION_DEFAULT.c_str());
Colin Crossf45fa6b2012-03-26 12:38:26 -07001020}
1021
Wei Liu2cc37ea2016-08-26 14:51:42 -07001022static void wake_lock_releaser() {
1023 if (release_wake_lock(WAKE_LOCK_NAME) < 0) {
1024 MYLOGE("Failed to release wake lock: %s \n", strerror(errno));
1025 } else {
1026 MYLOGD("Wake lock released.\n");
1027 }
1028}
1029
1030static void sig_handler(int signo) {
1031 wake_lock_releaser();
Andres Morales2e671bb2014-08-21 12:38:22 -07001032 _exit(EXIT_FAILURE);
John Michelau885f8882013-05-06 16:42:02 -05001033}
1034
Wei Liu2cc37ea2016-08-26 14:51:42 -07001035static void register_sig_handler() {
1036 struct sigaction sa;
1037 sigemptyset(&sa.sa_mask);
1038 sa.sa_flags = 0;
1039 sa.sa_handler = sig_handler;
1040 sigaction(SIGPIPE, &sa, NULL); // broken pipe
1041 sigaction(SIGSEGV, &sa, NULL); // segment fault
1042 sigaction(SIGINT, &sa, NULL); // ctrl-c
1043 sigaction(SIGTERM, &sa, NULL); // killed
1044 sigaction(SIGQUIT, &sa, NULL); // quit
1045}
1046
Felipe Leme1e9edc62015-12-21 16:02:13 -08001047/* adds the temporary report to the existing .zip file, closes the .zip file, and removes the
1048 temporary file.
1049 */
Felipe Lemee82a27d2016-01-05 13:35:44 -08001050static bool finish_zip_file(const std::string& bugreport_name, const std::string& bugreport_path,
Felipe Leme1e9edc62015-12-21 16:02:13 -08001051 time_t now) {
Felipe Lemee82a27d2016-01-05 13:35:44 -08001052 if (!add_zip_entry(bugreport_name, bugreport_path)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001053 MYLOGE("Failed to add text entry to .zip file\n");
Felipe Leme1e9edc62015-12-21 16:02:13 -08001054 return false;
1055 }
Felipe Leme809d74e2016-02-02 12:57:00 -08001056 if (!add_text_zip_entry("main_entry.txt", bugreport_name)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001057 MYLOGE("Failed to add main_entry.txt to .zip file\n");
Felipe Leme111b9d02016-02-03 09:28:24 -08001058 return false;
Felipe Leme809d74e2016-02-02 12:57:00 -08001059 }
Felipe Leme1e9edc62015-12-21 16:02:13 -08001060
Felipe Lemee82a27d2016-01-05 13:35:44 -08001061 int32_t err = zip_writer->Finish();
Felipe Leme1e9edc62015-12-21 16:02:13 -08001062 if (err) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001063 MYLOGE("zip_writer->Finish(): %s\n", ZipWriter::ErrorCodeString(err));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001064 return false;
1065 }
1066
Felipe Lemec4eee562016-04-21 15:42:55 -07001067 if (is_user_build()) {
1068 MYLOGD("Removing temporary file %s\n", bugreport_path.c_str())
1069 if (remove(bugreport_path.c_str())) {
1070 ALOGW("remove(%s): %s\n", bugreport_path.c_str(), strerror(errno));
1071 }
1072 } else {
1073 MYLOGD("Keeping temporary file %s on non-user build\n", bugreport_path.c_str())
1074 }
1075
Felipe Leme1e9edc62015-12-21 16:02:13 -08001076 return true;
1077}
Felipe Leme6e01fa62015-11-11 19:35:14 -08001078
Michal Karpinski4db754f2015-12-11 18:04:32 +00001079static std::string SHA256_file_hash(std::string filepath) {
Michal Karpinskicbbdf732016-01-07 20:45:02 +00001080 ScopedFd fd(TEMP_FAILURE_RETRY(open(filepath.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC
1081 | O_NOFOLLOW)));
Michal Karpinski4db754f2015-12-11 18:04:32 +00001082 if (fd.get() == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001083 MYLOGE("open(%s): %s\n", filepath.c_str(), strerror(errno));
Michal Karpinski4db754f2015-12-11 18:04:32 +00001084 return NULL;
1085 }
1086
1087 SHA256_CTX ctx;
1088 SHA256_init(&ctx);
1089
1090 std::vector<uint8_t> buffer(65536);
1091 while (1) {
1092 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd.get(), buffer.data(), buffer.size()));
1093 if (bytes_read == 0) {
1094 break;
1095 } else if (bytes_read == -1) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001096 MYLOGE("read(%s): %s\n", filepath.c_str(), strerror(errno));
Michal Karpinski4db754f2015-12-11 18:04:32 +00001097 return NULL;
1098 }
1099
1100 SHA256_update(&ctx, buffer.data(), bytes_read);
1101 }
1102
1103 uint8_t hash[SHA256_DIGEST_SIZE];
1104 memcpy(hash, SHA256_final(&ctx), SHA256_DIGEST_SIZE);
1105 char hash_buffer[SHA256_DIGEST_SIZE * 2 + 1];
Michal Karpinskicbbdf732016-01-07 20:45:02 +00001106 for(size_t i = 0; i < SHA256_DIGEST_SIZE; i++) {
1107 sprintf(hash_buffer + (i * 2), "%02x", hash[i]);
Michal Karpinski4db754f2015-12-11 18:04:32 +00001108 }
1109 hash_buffer[sizeof(hash_buffer) - 1] = 0;
1110 return std::string(hash_buffer);
1111}
1112
Colin Crossf45fa6b2012-03-26 12:38:26 -07001113int main(int argc, char *argv[]) {
1114 int do_add_date = 0;
Felipe Leme6e01fa62015-11-11 19:35:14 -08001115 int do_zip_file = 0;
John Michelau1f794c42012-09-17 11:20:19 -05001116 int do_vibrate = 1;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001117 char* use_outfile = 0;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001118 int use_socket = 0;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001119 int use_control_socket = 0;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001120 int do_fb = 0;
Jeff Sharkey27f9e6d2013-03-13 15:45:50 -07001121 int do_broadcast = 0;
Felipe Lemee338bf62015-12-07 14:03:50 -08001122 int do_early_screenshot = 0;
Michal Karpinski4db754f2015-12-11 18:04:32 +00001123 int is_remote_mode = 0;
Felipe Leme809d74e2016-02-02 12:57:00 -08001124 std::string version = VERSION_DEFAULT;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001125
Felipe Lemee82a27d2016-01-05 13:35:44 -08001126 now = time(NULL);
1127
Felipe Lemecbce55d2016-02-08 09:53:18 -08001128 MYLOGI("begin\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001129
Wei Liu2cc37ea2016-08-26 14:51:42 -07001130 if (acquire_wake_lock(PARTIAL_WAKE_LOCK, WAKE_LOCK_NAME) < 0) {
1131 MYLOGE("Failed to acquire wake lock: %s \n", strerror(errno));
1132 } else {
1133 MYLOGD("Wake lock acquired.\n");
1134 atexit(wake_lock_releaser);
1135 register_sig_handler();
1136 }
1137
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001138 /* gets the sequential id */
1139 char last_id[PROPERTY_VALUE_MAX];
1140 property_get("dumpstate.last_id", last_id, "0");
1141 id = strtoul(last_id, NULL, 10) + 1;
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001142 snprintf(last_id, sizeof(last_id), "%lu", id);
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001143 property_set("dumpstate.last_id", last_id);
1144 MYLOGI("dumpstate id: %lu\n", id);
1145
Colin Crossf45fa6b2012-03-26 12:38:26 -07001146 /* set as high priority, and protect from OOM killer */
1147 setpriority(PRIO_PROCESS, 0, -20);
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001148
1149 FILE *oom_adj = fopen("/proc/self/oom_score_adj", "we");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001150 if (oom_adj) {
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001151 fputs("-1000", oom_adj);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001152 fclose(oom_adj);
Wei Wang9c1f9bb2016-06-28 14:32:35 -07001153 } else {
1154 /* fallback to kernels <= 2.6.35 */
1155 oom_adj = fopen("/proc/self/oom_adj", "we");
1156 if (oom_adj) {
1157 fputs("-17", oom_adj);
1158 fclose(oom_adj);
1159 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001160 }
1161
Jeff Brown1dc94e32014-09-11 14:15:27 -07001162 /* parse arguments */
Felipe Lemea34efb72016-03-11 09:33:32 -08001163 std::string args;
1164 format_args(argc, const_cast<const char **>(argv), &args);
1165 MYLOGD("Dumpstate command line: %s\n", args.c_str());
Colin Crossf45fa6b2012-03-26 12:38:26 -07001166 int c;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001167 while ((c = getopt(argc, argv, "dho:svqzpPBRSV:")) != -1) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001168 switch (c) {
Felipe Leme71bbfc52015-11-23 14:14:51 -08001169 case 'd': do_add_date = 1; break;
1170 case 'z': do_zip_file = 1; break;
1171 case 'o': use_outfile = optarg; break;
1172 case 's': use_socket = 1; break;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001173 case 'S': use_control_socket = 1; break;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001174 case 'v': break; // compatibility no-op
Felipe Leme71bbfc52015-11-23 14:14:51 -08001175 case 'q': do_vibrate = 0; break;
1176 case 'p': do_fb = 1; break;
1177 case 'P': do_update_progress = 1; break;
Michal Karpinski4db754f2015-12-11 18:04:32 +00001178 case 'R': is_remote_mode = 1; break;
Felipe Leme71bbfc52015-11-23 14:14:51 -08001179 case 'B': do_broadcast = 1; break;
Felipe Leme809d74e2016-02-02 12:57:00 -08001180 case 'V': version = optarg; break;
Colin Crossf45fa6b2012-03-26 12:38:26 -07001181 case '?': printf("\n");
1182 case 'h':
1183 usage();
1184 exit(1);
1185 }
1186 }
1187
Felipe Leme71bbfc52015-11-23 14:14:51 -08001188 if ((do_zip_file || do_add_date || do_update_progress || do_broadcast) && !use_outfile) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001189 usage();
1190 exit(1);
1191 }
1192
Felipe Leme2628e9e2016-04-12 16:36:51 -07001193 if (use_control_socket && !do_zip_file) {
1194 usage();
1195 exit(1);
1196 }
1197
Felipe Leme71bbfc52015-11-23 14:14:51 -08001198 if (do_update_progress && !do_broadcast) {
1199 usage();
1200 exit(1);
1201 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001202
Michal Karpinski4db754f2015-12-11 18:04:32 +00001203 if (is_remote_mode && (do_update_progress || !do_broadcast || !do_zip_file || !do_add_date)) {
1204 usage();
1205 exit(1);
1206 }
1207
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001208 if (version != VERSION_DEFAULT) {
1209 usage();
1210 exit(1);
Felipe Leme809d74e2016-02-02 12:57:00 -08001211 }
1212
Felipe Lemecbce55d2016-02-08 09:53:18 -08001213 MYLOGI("bugreport format version: %s\n", version.c_str());
Felipe Leme809d74e2016-02-02 12:57:00 -08001214
Felipe Lemee338bf62015-12-07 14:03:50 -08001215 do_early_screenshot = do_update_progress;
1216
Christopher Ferrised9354f2014-10-01 17:35:01 -07001217 // If we are going to use a socket, do it as early as possible
1218 // to avoid timeouts from bugreport.
1219 if (use_socket) {
1220 redirect_to_socket(stdout, "dumpstate");
1221 }
1222
Felipe Leme2628e9e2016-04-12 16:36:51 -07001223 if (use_control_socket) {
1224 MYLOGD("Opening control socket\n");
1225 control_socket_fd = open_socket("dumpstate");
Felipe Leme02b7e002016-07-22 12:03:20 -07001226 do_update_progress = 1;
Felipe Leme2628e9e2016-04-12 16:36:51 -07001227 }
1228
Felipe Lemecbce55d2016-02-08 09:53:18 -08001229 /* full path of the temporary file containing the bugreport */
Felipe Lemead5f6c42015-11-30 14:26:46 -08001230 std::string tmp_path;
1231
Felipe Lemecbce55d2016-02-08 09:53:18 -08001232 /* full path of the file containing the dumpstate logs*/
1233 std::string log_path;
1234
Felipe Leme14e034a2016-03-30 18:51:03 -07001235 /* full path of the systrace file, when enabled */
1236 std::string systrace_path;
1237
Felipe Lemee338bf62015-12-07 14:03:50 -08001238 /* full path of the temporary file containing the screenshot (when requested) */
1239 std::string screenshot_path;
1240
Felipe Lemecbce55d2016-02-08 09:53:18 -08001241 /* base name (without suffix or extensions) of the bugreport files */
Felipe Lemead5f6c42015-11-30 14:26:46 -08001242 std::string base_name;
1243
Felipe Leme71bbfc52015-11-23 14:14:51 -08001244 /* pointer to the actual path, be it zip or text */
1245 std::string path;
1246
Felipe Leme635ca312016-01-05 14:23:02 -08001247 /* pointer to the zipped file */
Felipe Leme1e9edc62015-12-21 16:02:13 -08001248 std::unique_ptr<FILE, int(*)(FILE*)> zip_file(NULL, fclose);
Felipe Leme71bbfc52015-11-23 14:14:51 -08001249
Felipe Lemead5f6c42015-11-30 14:26:46 -08001250 /* redirect output if needed */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001251 bool is_redirecting = !use_socket && use_outfile;
1252
1253 if (is_redirecting) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001254 bugreport_dir = dirname(use_outfile);
1255 base_name = basename(use_outfile);
Felipe Leme71bbfc52015-11-23 14:14:51 -08001256 if (do_add_date) {
1257 char date[80];
Felipe Lemead5f6c42015-11-30 14:26:46 -08001258 strftime(date, sizeof(date), "%Y-%m-%d-%H-%M-%S", localtime(&now));
1259 suffix = date;
1260 } else {
1261 suffix = "undated";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001262 }
Felipe Lemecc37b8e2016-04-11 13:45:18 -07001263 char build_id[PROPERTY_VALUE_MAX];
1264 property_get("ro.build.id", build_id, "UNKNOWN_BUILD");
1265 base_name = base_name + "-" + build_id;
Felipe Leme71bbfc52015-11-23 14:14:51 -08001266 if (do_fb) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001267 // TODO: if dumpstate was an object, the paths could be internal variables and then
1268 // we could have a function to calculate the derived values, such as:
1269 // screenshot_path = GetPath(".png");
1270 screenshot_path = bugreport_dir + "/" + base_name + "-" + suffix + ".png";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001271 }
Felipe Lemead5f6c42015-11-30 14:26:46 -08001272 tmp_path = bugreport_dir + "/" + base_name + "-" + suffix + ".tmp";
Felipe Lemecbce55d2016-02-08 09:53:18 -08001273 log_path = bugreport_dir + "/dumpstate_log-" + suffix + "-"
1274 + std::to_string(getpid()) + ".txt";
Felipe Leme71bbfc52015-11-23 14:14:51 -08001275
Felipe Lemecbce55d2016-02-08 09:53:18 -08001276 MYLOGD("Bugreport dir: %s\n"
1277 "Base name: %s\n"
1278 "Suffix: %s\n"
1279 "Log path: %s\n"
1280 "Temporary path: %s\n"
1281 "Screenshot path: %s\n",
1282 bugreport_dir.c_str(), base_name.c_str(), suffix.c_str(),
1283 log_path.c_str(), tmp_path.c_str(), screenshot_path.c_str());
Felipe Leme71bbfc52015-11-23 14:14:51 -08001284
Felipe Leme1e9edc62015-12-21 16:02:13 -08001285 if (do_zip_file) {
Felipe Leme1e9edc62015-12-21 16:02:13 -08001286 path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip";
Felipe Leme26bd34c2016-03-15 13:40:33 -07001287 MYLOGD("Creating initial .zip file (%s)\n", path.c_str());
Felipe Leme111b9d02016-02-03 09:28:24 -08001288 create_parent_dirs(path.c_str());
Felipe Leme1e9edc62015-12-21 16:02:13 -08001289 zip_file.reset(fopen(path.c_str(), "wb"));
1290 if (!zip_file) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001291 MYLOGE("fopen(%s, 'wb'): %s\n", path.c_str(), strerror(errno));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001292 do_zip_file = 0;
1293 } else {
1294 zip_writer.reset(new ZipWriter(zip_file.get()));
1295 }
Felipe Leme809d74e2016-02-02 12:57:00 -08001296 add_text_zip_entry("version.txt", version);
Felipe Leme1e9edc62015-12-21 16:02:13 -08001297 }
1298
Felipe Lemedcd1f0d2016-08-04 12:48:50 -07001299 if (do_update_progress) {
1300 if (do_broadcast) {
1301 // clang-format off
1302 std::vector<std::string> am_args = {
1303 "--receiver-permission", "android.permission.DUMP", "--receiver-foreground",
1304 "--es", "android.intent.extra.NAME", suffix,
1305 "--ei", "android.intent.extra.ID", std::to_string(id),
1306 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
1307 "--ei", "android.intent.extra.MAX", std::to_string(WEIGHT_TOTAL),
1308 };
1309 // clang-format on
1310 send_broadcast("android.intent.action.BUGREPORT_STARTED", am_args);
1311 }
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001312 if (use_control_socket) {
1313 dprintf(control_socket_fd, "BEGIN:%s\n", path.c_str());
1314 }
Felipe Leme71bbfc52015-11-23 14:14:51 -08001315 }
1316 }
1317
Nick Kralevichf3599b32016-01-25 15:05:16 -08001318 /* read /proc/cmdline before dropping root */
1319 FILE *cmdline = fopen("/proc/cmdline", "re");
1320 if (cmdline) {
1321 fgets(cmdline_buf, sizeof(cmdline_buf), cmdline);
1322 fclose(cmdline);
1323 }
1324
Jeff Brown1dc94e32014-09-11 14:15:27 -07001325 /* open the vibrator before dropping root */
Felipe Leme6e01fa62015-11-11 19:35:14 -08001326 std::unique_ptr<FILE, int(*)(FILE*)> vibrator(NULL, fclose);
John Michelau1f794c42012-09-17 11:20:19 -05001327 if (do_vibrate) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001328 vibrator.reset(fopen("/sys/class/timed_output/vibrator/enable", "we"));
Jeff Brown1dc94e32014-09-11 14:15:27 -07001329 if (vibrator) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001330 vibrate(vibrator.get(), 150);
Jeff Brown1dc94e32014-09-11 14:15:27 -07001331 }
John Michelau1f794c42012-09-17 11:20:19 -05001332 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001333
Felipe Leme3634a1e2015-12-09 10:11:47 -08001334 if (do_fb && do_early_screenshot) {
1335 if (screenshot_path.empty()) {
1336 // should not have happened
Felipe Lemecbce55d2016-02-08 09:53:18 -08001337 MYLOGE("INTERNAL ERROR: skipping early screenshot because path was not set\n");
Felipe Leme3634a1e2015-12-09 10:11:47 -08001338 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001339 MYLOGI("taking early screenshot\n");
Felipe Leme3634a1e2015-12-09 10:11:47 -08001340 take_screenshot(screenshot_path);
Felipe Lemecbce55d2016-02-08 09:53:18 -08001341 MYLOGI("wrote screenshot: %s\n", screenshot_path.c_str());
Felipe Leme3634a1e2015-12-09 10:11:47 -08001342 if (chown(screenshot_path.c_str(), AID_SHELL, AID_SHELL)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001343 MYLOGE("Unable to change ownership of screenshot file %s: %s\n",
Felipe Leme3634a1e2015-12-09 10:11:47 -08001344 screenshot_path.c_str(), strerror(errno));
1345 }
Felipe Lemee338bf62015-12-07 14:03:50 -08001346 }
1347 }
1348
Felipe Leme1e9edc62015-12-21 16:02:13 -08001349 if (do_zip_file) {
1350 if (chown(path.c_str(), AID_SHELL, AID_SHELL)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001351 MYLOGE("Unable to change ownership of zip file %s: %s\n", path.c_str(), strerror(errno));
Felipe Leme1e9edc62015-12-21 16:02:13 -08001352 }
1353 }
1354
Felipe Leme71bbfc52015-11-23 14:14:51 -08001355 if (is_redirecting) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001356 redirect_to_file(stderr, const_cast<char*>(log_path.c_str()));
Felipe Leme6fe9db62016-02-12 09:04:16 -08001357 if (chown(log_path.c_str(), AID_SHELL, AID_SHELL)) {
1358 MYLOGE("Unable to change ownership of dumpstate log file %s: %s\n",
1359 log_path.c_str(), strerror(errno));
1360 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001361 /* TODO: rather than generating a text file now and zipping it later,
1362 it would be more efficient to redirect stdout to the zip entry
1363 directly, but the libziparchive doesn't support that option yet. */
1364 redirect_to_file(stdout, const_cast<char*>(tmp_path.c_str()));
Felipe Leme6fe9db62016-02-12 09:04:16 -08001365 if (chown(tmp_path.c_str(), AID_SHELL, AID_SHELL)) {
1366 MYLOGE("Unable to change ownership of temporary bugreport file %s: %s\n",
1367 tmp_path.c_str(), strerror(errno));
1368 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001369 }
Felipe Leme608385d2016-02-01 10:35:38 -08001370 // NOTE: there should be no stdout output until now, otherwise it would break the header.
1371 // In particular, DurationReport objects should be created passing 'title, NULL', so their
Felipe Lemecbce55d2016-02-08 09:53:18 -08001372 // duration is logged into MYLOG instead.
Felipe Leme809d74e2016-02-02 12:57:00 -08001373 print_header(version);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001374
Felipe Leme71a74ac2016-03-17 15:43:25 -07001375 // Dumps systrace right away, otherwise it will be filled with unnecessary events.
Felipe Lemeefd7e272016-05-18 09:27:16 -07001376 dump_systrace();
Felipe Leme71a74ac2016-03-17 15:43:25 -07001377
Wei Liu341938b2016-04-27 16:18:17 -07001378 // TODO: Drop root user and move into dumpstate() once b/28633932 is fixed.
Felipe Lemeefd7e272016-05-18 09:27:16 -07001379 dump_raft();
Wei Liu341938b2016-04-27 16:18:17 -07001380
Felipe Leme9c74aad2016-02-29 18:15:42 -08001381 // Invoking the following dumpsys calls before dump_traces() to try and
1382 // keep the system stats as close to its initial state as possible.
Thierry Strudel8b78b752016-03-22 10:25:44 -07001383 run_command_as_shell("DUMPSYS MEMINFO", 30, "dumpsys", "-t", "30", "meminfo", "-a", NULL);
Felipe Leme7cff4622016-06-08 09:51:29 -07001384 run_command_as_shell("DUMPSYS CPUINFO", 10, "dumpsys", "-t", "10", "cpuinfo", "-a", NULL);
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001385
1386 /* collect stack traces from Dalvik and native processes (needs root) */
1387 dump_traces_path = dump_traces();
1388
Felipe Lemec0808152016-06-17 17:37:13 -07001389 /* Run some operations that require root. */
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001390 get_tombstone_fds(tombstone_data);
1391 add_dir(RECOVERY_DIR, true);
Mark Salyzynd6ab0112016-03-25 12:56:39 -07001392 add_dir(RECOVERY_DATA_DIR, true);
Mark Salyzyn4d42dea2016-04-01 10:03:14 -07001393 add_dir(LOGPERSIST_DATA_DIR, false);
David Brazdild2991962016-06-03 14:40:44 +01001394 if (!is_user_build()) {
1395 add_dir(PROFILE_DATA_DIR_CUR, true);
1396 add_dir(PROFILE_DATA_DIR_REF, true);
1397 }
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001398 add_mountinfo();
Felipe Lemec0808152016-06-17 17:37:13 -07001399 dump_iptables();
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001400
Erik Kline53ca94a2016-09-28 17:26:26 +09001401 // Capture any IPSec policies in play. No keys are exposed here.
1402 run_command("IP XFRM POLICY", 10, "ip", "xfrm", "policy", nullptr);
1403
Lorenzo Colittid3b809b2016-09-26 13:37:45 +09001404 // Run ss as root so we can see socket marks.
1405 run_command("DETAILED SOCKET STATE", 10, "ss", "-eionptu", NULL);
1406
Felipe Lemecf6a8b42016-03-11 10:38:19 -08001407 if (!drop_root_user()) {
Srinath Sridharanfdf52d32016-02-01 15:50:22 -08001408 return -1;
1409 }
1410
1411 dumpstate(do_early_screenshot ? "": screenshot_path, version);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001412
Felipe Leme55b42a62015-11-10 17:39:08 -08001413 /* close output if needed */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001414 if (is_redirecting) {
Colin Crossf45fa6b2012-03-26 12:38:26 -07001415 fclose(stdout);
Colin Crossf45fa6b2012-03-26 12:38:26 -07001416 }
1417
Felipe Leme6e01fa62015-11-11 19:35:14 -08001418 /* rename or zip the (now complete) .tmp file to its final location */
1419 if (use_outfile) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001420
1421 /* check if user changed the suffix using system properties */
1422 char key[PROPERTY_KEY_MAX];
1423 char value[PROPERTY_VALUE_MAX];
Nick Kralevichf0922cc2016-05-14 16:47:44 -07001424 snprintf(key, sizeof(key), "dumpstate.%d.name", getpid());
Felipe Lemead5f6c42015-11-30 14:26:46 -08001425 property_get(key, value, "");
1426 bool change_suffix= false;
1427 if (value[0]) {
1428 /* must whitelist which characters are allowed, otherwise it could cross directories */
1429 std::regex valid_regex("^[-_a-zA-Z0-9]+$");
1430 if (std::regex_match(value, valid_regex)) {
1431 change_suffix = true;
1432 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001433 MYLOGE("invalid suffix provided by user: %s\n", value);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001434 }
1435 }
1436 if (change_suffix) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001437 MYLOGI("changing suffix from %s to %s\n", suffix.c_str(), value);
Felipe Lemead5f6c42015-11-30 14:26:46 -08001438 suffix = value;
1439 if (!screenshot_path.empty()) {
1440 std::string new_screenshot_path =
1441 bugreport_dir + "/" + base_name + "-" + suffix + ".png";
1442 if (rename(screenshot_path.c_str(), new_screenshot_path.c_str())) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001443 MYLOGE("rename(%s, %s): %s\n", screenshot_path.c_str(),
Felipe Lemead5f6c42015-11-30 14:26:46 -08001444 new_screenshot_path.c_str(), strerror(errno));
1445 } else {
1446 screenshot_path = new_screenshot_path;
1447 }
1448 }
1449 }
1450
Felipe Leme6e01fa62015-11-11 19:35:14 -08001451 bool do_text_file = true;
1452 if (do_zip_file) {
Felipe Leme88c79332016-02-22 11:06:49 -08001453 std::string entry_name = base_name + "-" + suffix + ".txt";
1454 MYLOGD("Adding main entry (%s) to .zip bugreport\n", entry_name.c_str());
1455 if (!finish_zip_file(entry_name, tmp_path, now)) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001456 MYLOGE("Failed to finish zip file; sending text bugreport instead\n");
Felipe Leme6e01fa62015-11-11 19:35:14 -08001457 do_text_file = true;
1458 } else {
1459 do_text_file = false;
Felipe Leme91274352016-02-26 15:03:52 -08001460 // Since zip file is already created, it needs to be renamed.
1461 std::string new_path = bugreport_dir + "/" + base_name + "-" + suffix + ".zip";
1462 if (path != new_path) {
1463 MYLOGD("Renaming zip file from %s to %s\n", path.c_str(), new_path.c_str());
1464 if (rename(path.c_str(), new_path.c_str())) {
1465 MYLOGE("rename(%s, %s): %s\n", path.c_str(),
1466 new_path.c_str(), strerror(errno));
1467 } else {
1468 path = new_path;
1469 }
1470 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001471 }
1472 }
1473 if (do_text_file) {
Felipe Lemead5f6c42015-11-30 14:26:46 -08001474 path = bugreport_dir + "/" + base_name + "-" + suffix + ".txt";
Felipe Leme88c79332016-02-22 11:06:49 -08001475 MYLOGD("Generating .txt bugreport at %s from %s\n", path.c_str(), tmp_path.c_str());
Felipe Lemead5f6c42015-11-30 14:26:46 -08001476 if (rename(tmp_path.c_str(), path.c_str())) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001477 MYLOGE("rename(%s, %s): %s\n", tmp_path.c_str(), path.c_str(), strerror(errno));
Felipe Leme6e01fa62015-11-11 19:35:14 -08001478 path.clear();
1479 }
1480 }
Felipe Leme2628e9e2016-04-12 16:36:51 -07001481 if (use_control_socket) {
1482 if (do_text_file) {
1483 dprintf(control_socket_fd, "FAIL:could not create zip file, check %s "
1484 "for more details\n", log_path.c_str());
1485 } else {
1486 dprintf(control_socket_fd, "OK:%s\n", path.c_str());
1487 }
1488 }
Colin Crossf45fa6b2012-03-26 12:38:26 -07001489 }
1490
Felipe Lemecc2a2fa2016-02-25 14:02:44 -08001491 /* vibrate a few but shortly times to let user know it's finished */
1492 if (vibrator) {
1493 for (int i = 0; i < 3; i++) {
1494 vibrate(vibrator.get(), 75);
1495 usleep((75 + 50) * 1000);
1496 }
1497 }
1498
Jeff Brown1dc94e32014-09-11 14:15:27 -07001499 /* tell activity manager we're done */
Felipe Leme71bbfc52015-11-23 14:14:51 -08001500 if (do_broadcast) {
Felipe Leme6e01fa62015-11-11 19:35:14 -08001501 if (!path.empty()) {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001502 MYLOGI("Final bugreport path: %s\n", path.c_str());
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001503 // clang-format off
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001504 std::vector<std::string> am_args = {
Felipe Leme43fd1bb2016-01-29 09:07:57 -08001505 "--receiver-permission", "android.permission.DUMP", "--receiver-foreground",
Felipe Leme8fecfdd2016-02-09 10:40:07 -08001506 "--ei", "android.intent.extra.ID", std::to_string(id),
Felipe Leme71bbfc52015-11-23 14:14:51 -08001507 "--ei", "android.intent.extra.PID", std::to_string(getpid()),
Felipe Lemeee2e4a02016-02-22 18:12:11 -08001508 "--ei", "android.intent.extra.MAX", std::to_string(weight_total),
Felipe Lemecbce55d2016-02-08 09:53:18 -08001509 "--es", "android.intent.extra.BUGREPORT", path,
1510 "--es", "android.intent.extra.DUMPSTATE_LOG", log_path
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001511 };
Felipe Lemeaabfcae2016-07-29 09:49:04 -07001512 // clang-format on
Felipe Leme36b3f6f2015-11-19 15:41:04 -08001513 if (do_fb) {
1514 am_args.push_back("--es");
1515 am_args.push_back("android.intent.extra.SCREENSHOT");
1516 am_args.push_back(screenshot_path);
1517 }
Michal Karpinski4db754f2015-12-11 18:04:32 +00001518 if (is_remote_mode) {
1519 am_args.push_back("--es");
1520 am_args.push_back("android.intent.extra.REMOTE_BUGREPORT_HASH");
1521 am_args.push_back(SHA256_file_hash(path));
1522 send_broadcast("android.intent.action.REMOTE_BUGREPORT_FINISHED", am_args);
1523 } else {
1524 send_broadcast("android.intent.action.BUGREPORT_FINISHED", am_args);
1525 }
Felipe Leme6e01fa62015-11-11 19:35:14 -08001526 } else {
Felipe Lemecbce55d2016-02-08 09:53:18 -08001527 MYLOGE("Skipping finished broadcast because bugreport could not be generated\n");
Felipe Leme6e01fa62015-11-11 19:35:14 -08001528 }
Jeff Sharkey27f9e6d2013-03-13 15:45:50 -07001529 }
1530
Felipe Lemecbce55d2016-02-08 09:53:18 -08001531 MYLOGD("Final progress: %d/%d (originally %d)\n", progress, weight_total, WEIGHT_TOTAL);
1532 MYLOGI("done\n");
Colin Crossf45fa6b2012-03-26 12:38:26 -07001533
Felipe Leme107a05f2016-03-08 15:11:15 -08001534 if (is_redirecting) {
1535 fclose(stderr);
1536 }
1537
Felipe Leme02b7e002016-07-22 12:03:20 -07001538 if (use_control_socket && control_socket_fd != -1) {
1539 MYLOGD("Closing control socket\n");
1540 close(control_socket_fd);
Felipe Leme2628e9e2016-04-12 16:36:51 -07001541 }
1542
Colin Crossf45fa6b2012-03-26 12:38:26 -07001543 return 0;
1544}