blob: eaef3d4747512b1e7180977dd3676998eb1d98f9 [file] [log] [blame]
Colin Crossf45fa6b2012-03-26 12:38:26 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <dirent.h>
18#include <errno.h>
19#include <fcntl.h>
20#include <limits.h>
21#include <poll.h>
22#include <signal.h>
23#include <stdarg.h>
24#include <stdio.h>
25#include <stdlib.h>
26#include <string.h>
27#include <sys/inotify.h>
28#include <sys/stat.h>
29#include <sys/time.h>
30#include <sys/wait.h>
31#include <sys/klog.h>
32#include <time.h>
33#include <unistd.h>
John Michelaue7b6cf12013-03-07 15:35:35 -060034#include <sys/prctl.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070035
Jeff Brownbf7f4922012-06-07 16:40:01 -070036#include <cutils/debugger.h>
Colin Crossf45fa6b2012-03-26 12:38:26 -070037#include <cutils/properties.h>
38#include <cutils/sockets.h>
39#include <private/android_filesystem_config.h>
40
41#include "dumpstate.h"
42
Jeff Brownbf7f4922012-06-07 16:40:01 -070043/* list of native processes to include in the native dumps */
44static const char* native_processes_to_dump[] = {
James Dong1fc4f802012-09-10 16:08:48 -070045 "/system/bin/drmserver",
Jeff Brownbf7f4922012-06-07 16:40:01 -070046 "/system/bin/mediaserver",
47 "/system/bin/sdcard",
48 "/system/bin/surfaceflinger",
49 NULL,
50};
51
Colin Crossf45fa6b2012-03-26 12:38:26 -070052void for_each_pid(void (*func)(int, const char *), const char *header) {
53 DIR *d;
54 struct dirent *de;
55
56 if (!(d = opendir("/proc"))) {
57 printf("Failed to open /proc (%s)\n", strerror(errno));
58 return;
59 }
60
61 printf("\n------ %s ------\n", header);
62 while ((de = readdir(d))) {
63 int pid;
64 int fd;
65 char cmdpath[255];
66 char cmdline[255];
67
68 if (!(pid = atoi(de->d_name))) {
69 continue;
70 }
71
72 sprintf(cmdpath,"/proc/%d/cmdline", pid);
73 memset(cmdline, 0, sizeof(cmdline));
74 if ((fd = open(cmdpath, O_RDONLY)) < 0) {
75 strcpy(cmdline, "N/A");
76 } else {
77 read(fd, cmdline, sizeof(cmdline));
78 close(fd);
79 }
80 func(pid, cmdline);
81 }
82
83 closedir(d);
84}
85
86void show_wchan(int pid, const char *name) {
87 char path[255];
88 char buffer[255];
89 int fd;
90
91 memset(buffer, 0, sizeof(buffer));
92
93 sprintf(path, "/proc/%d/wchan", pid);
94 if ((fd = open(path, O_RDONLY)) < 0) {
95 printf("Failed to open '%s' (%s)\n", path, strerror(errno));
96 return;
97 }
98
99 if (read(fd, buffer, sizeof(buffer)) < 0) {
100 printf("Failed to read '%s' (%s)\n", path, strerror(errno));
101 goto out_close;
102 }
103
104 printf("%-7d %-32s %s\n", pid, name, buffer);
105
106out_close:
107 close(fd);
108 return;
109}
110
111void do_dmesg() {
112 printf("------ KERNEL LOG (dmesg) ------\n");
Elliott Hughes5f87b312012-09-17 11:43:40 -0700113 /* Get size of kernel buffer */
114 int size = klogctl(KLOG_SIZE_BUFFER, NULL, 0);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700115 if (size <= 0) {
116 printf("Unexpected klogctl return value: %d\n\n", size);
117 return;
118 }
119 char *buf = (char *) malloc(size + 1);
120 if (buf == NULL) {
121 printf("memory allocation failed\n\n");
122 return;
123 }
124 int retval = klogctl(KLOG_READ_ALL, buf, size);
125 if (retval < 0) {
126 printf("klogctl failure\n\n");
127 free(buf);
128 return;
129 }
130 buf[retval] = '\0';
131 printf("%s\n\n", buf);
132 free(buf);
133 return;
134}
135
136void do_showmap(int pid, const char *name) {
137 char title[255];
138 char arg[255];
139
140 sprintf(title, "SHOW MAP %d (%s)", pid, name);
141 sprintf(arg, "%d", pid);
142 run_command(title, 10, SU_PATH, "root", "showmap", arg, NULL);
143}
144
145/* prints the contents of a file */
146int dump_file(const char *title, const char* path) {
147 char buffer[32768];
148 int fd = open(path, O_RDONLY);
149 if (fd < 0) {
150 int err = errno;
151 if (title) printf("------ %s (%s) ------\n", title, path);
152 printf("*** %s: %s\n", path, strerror(err));
153 if (title) printf("\n");
154 return -1;
155 }
156
157 if (title) printf("------ %s (%s", title, path);
158
159 if (title) {
160 struct stat st;
161 if (memcmp(path, "/proc/", 6) && memcmp(path, "/sys/", 5) && !fstat(fd, &st)) {
162 char stamp[80];
163 time_t mtime = st.st_mtime;
164 strftime(stamp, sizeof(stamp), "%Y-%m-%d %H:%M:%S", localtime(&mtime));
165 printf(": %s", stamp);
166 }
167 printf(") ------\n");
168 }
169
170 int newline = 0;
171 for (;;) {
172 int ret = read(fd, buffer, sizeof(buffer));
173 if (ret > 0) {
174 newline = (buffer[ret - 1] == '\n');
175 ret = fwrite(buffer, ret, 1, stdout);
176 }
177 if (ret <= 0) break;
178 }
179
180 close(fd);
181 if (!newline) printf("\n");
182 if (title) printf("\n");
183 return 0;
184}
185
186/* forks a command and waits for it to finish */
187int run_command(const char *title, int timeout_seconds, const char *command, ...) {
188 fflush(stdout);
189 clock_t start = clock();
190 pid_t pid = fork();
191
192 /* handle error case */
193 if (pid < 0) {
194 printf("*** fork: %s\n", strerror(errno));
195 return pid;
196 }
197
198 /* handle child case */
199 if (pid == 0) {
200 const char *args[1024] = {command};
201 size_t arg;
202
John Michelaue7b6cf12013-03-07 15:35:35 -0600203 /* make sure the child dies when dumpstate dies */
204 prctl(PR_SET_PDEATHSIG, SIGKILL);
205
Colin Crossf45fa6b2012-03-26 12:38:26 -0700206 va_list ap;
207 va_start(ap, command);
208 if (title) printf("------ %s (%s", title, command);
209 for (arg = 1; arg < sizeof(args) / sizeof(args[0]); ++arg) {
210 args[arg] = va_arg(ap, const char *);
211 if (args[arg] == NULL) break;
212 if (title) printf(" %s", args[arg]);
213 }
214 if (title) printf(") ------\n");
215 fflush(stdout);
216
217 execvp(command, (char**) args);
218 printf("*** exec(%s): %s\n", command, strerror(errno));
219 fflush(stdout);
220 _exit(-1);
221 }
222
223 /* handle parent case */
224 for (;;) {
225 int status;
226 pid_t p = waitpid(pid, &status, WNOHANG);
227 float elapsed = (float) (clock() - start) / CLOCKS_PER_SEC;
228 if (p == pid) {
229 if (WIFSIGNALED(status)) {
230 printf("*** %s: Killed by signal %d\n", command, WTERMSIG(status));
231 } else if (WIFEXITED(status) && WEXITSTATUS(status) > 0) {
232 printf("*** %s: Exit code %d\n", command, WEXITSTATUS(status));
233 }
234 if (title) printf("[%s: %.1fs elapsed]\n\n", command, elapsed);
235 return status;
236 }
237
238 if (timeout_seconds && elapsed > timeout_seconds) {
239 printf("*** %s: Timed out after %.1fs (killing pid %d)\n", command, elapsed, pid);
240 kill(pid, SIGTERM);
241 return -1;
242 }
243
244 usleep(100000); // poll every 0.1 sec
245 }
246}
247
248size_t num_props = 0;
249static char* props[2000];
250
251static void print_prop(const char *key, const char *name, void *user) {
252 (void) user;
253 if (num_props < sizeof(props) / sizeof(props[0])) {
254 char buf[PROPERTY_KEY_MAX + PROPERTY_VALUE_MAX + 10];
255 snprintf(buf, sizeof(buf), "[%s]: [%s]\n", key, name);
256 props[num_props++] = strdup(buf);
257 }
258}
259
260static int compare_prop(const void *a, const void *b) {
261 return strcmp(*(char * const *) a, *(char * const *) b);
262}
263
264/* prints all the system properties */
265void print_properties() {
266 size_t i;
267 num_props = 0;
268 property_list(print_prop, NULL);
269 qsort(&props, num_props, sizeof(props[0]), compare_prop);
270
271 printf("------ SYSTEM PROPERTIES ------\n");
272 for (i = 0; i < num_props; ++i) {
273 fputs(props[i], stdout);
274 free(props[i]);
275 }
276 printf("\n");
277}
278
279/* redirect output to a service control socket */
280void redirect_to_socket(FILE *redirect, const char *service) {
281 int s = android_get_control_socket(service);
282 if (s < 0) {
283 fprintf(stderr, "android_get_control_socket(%s): %s\n", service, strerror(errno));
284 exit(1);
285 }
286 if (listen(s, 4) < 0) {
287 fprintf(stderr, "listen(control socket): %s\n", strerror(errno));
288 exit(1);
289 }
290
291 struct sockaddr addr;
292 socklen_t alen = sizeof(addr);
293 int fd = accept(s, &addr, &alen);
294 if (fd < 0) {
295 fprintf(stderr, "accept(control socket): %s\n", strerror(errno));
296 exit(1);
297 }
298
299 fflush(redirect);
300 dup2(fd, fileno(redirect));
301 close(fd);
302}
303
304/* redirect output to a file, optionally gzipping; returns gzip pid (or -1) */
305pid_t redirect_to_file(FILE *redirect, char *path, int gzip_level) {
306 char *chp = path;
307
308 /* skip initial slash */
309 if (chp[0] == '/')
310 chp++;
311
312 /* create leading directories, if necessary */
313 while (chp && chp[0]) {
314 chp = strchr(chp, '/');
315 if (chp) {
316 *chp = 0;
317 mkdir(path, 0775); /* drwxrwxr-x */
318 *chp++ = '/';
319 }
320 }
321
322 int fd = open(path, O_WRONLY | O_CREAT | O_TRUNC, S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH);
323 if (fd < 0) {
324 fprintf(stderr, "%s: %s\n", path, strerror(errno));
325 exit(1);
326 }
327
328 pid_t gzip_pid = -1;
329 if (gzip_level > 0) {
330 int fds[2];
331 if (pipe(fds)) {
332 fprintf(stderr, "pipe: %s\n", strerror(errno));
333 exit(1);
334 }
335
336 fflush(redirect);
337 fflush(stdout);
338
339 gzip_pid = fork();
340 if (gzip_pid < 0) {
341 fprintf(stderr, "fork: %s\n", strerror(errno));
342 exit(1);
343 }
344
345 if (gzip_pid == 0) {
346 dup2(fds[0], STDIN_FILENO);
347 dup2(fd, STDOUT_FILENO);
348
349 close(fd);
350 close(fds[0]);
351 close(fds[1]);
352
353 char level[10];
354 snprintf(level, sizeof(level), "-%d", gzip_level);
355 execlp("gzip", "gzip", level, NULL);
356 fprintf(stderr, "exec(gzip): %s\n", strerror(errno));
357 _exit(-1);
358 }
359
360 close(fd);
361 close(fds[0]);
362 fd = fds[1];
363 }
364
365 dup2(fd, fileno(redirect));
366 close(fd);
367 return gzip_pid;
368}
369
Jeff Brownbf7f4922012-06-07 16:40:01 -0700370static bool should_dump_native_traces(const char* path) {
371 for (const char** p = native_processes_to_dump; *p; p++) {
372 if (!strcmp(*p, path)) {
373 return true;
374 }
375 }
376 return false;
377}
378
379/* dump Dalvik and native stack traces, return the trace file location (NULL if none) */
380const char *dump_traces() {
381 const char* result = NULL;
382
Colin Crossf45fa6b2012-03-26 12:38:26 -0700383 char traces_path[PROPERTY_VALUE_MAX] = "";
384 property_get("dalvik.vm.stack-trace-file", traces_path, "");
385 if (!traces_path[0]) return NULL;
386
387 /* move the old traces.txt (if any) out of the way temporarily */
388 char anr_traces_path[PATH_MAX];
389 strlcpy(anr_traces_path, traces_path, sizeof(anr_traces_path));
390 strlcat(anr_traces_path, ".anr", sizeof(anr_traces_path));
391 if (rename(traces_path, anr_traces_path) && errno != ENOENT) {
392 fprintf(stderr, "rename(%s, %s): %s\n", traces_path, anr_traces_path, strerror(errno));
393 return NULL; // Can't rename old traces.txt -- no permission? -- leave it alone instead
394 }
395
396 /* make the directory if necessary */
397 char anr_traces_dir[PATH_MAX];
398 strlcpy(anr_traces_dir, traces_path, sizeof(anr_traces_dir));
399 char *slash = strrchr(anr_traces_dir, '/');
400 if (slash != NULL) {
401 *slash = '\0';
402 if (!mkdir(anr_traces_dir, 0775)) {
403 chown(anr_traces_dir, AID_SYSTEM, AID_SYSTEM);
Nick Kralevichc7f1fe22012-04-06 09:31:28 -0700404 chmod(anr_traces_dir, 0775);
Colin Crossf45fa6b2012-03-26 12:38:26 -0700405 } else if (errno != EEXIST) {
406 fprintf(stderr, "mkdir(%s): %s\n", anr_traces_dir, strerror(errno));
407 return NULL;
408 }
409 }
410
411 /* create a new, empty traces.txt file to receive stack dumps */
Nick Kralevichd51820e2012-04-06 09:53:45 -0700412 int fd = open(traces_path, O_CREAT | O_WRONLY | O_TRUNC | O_NOFOLLOW, 0666); /* -rw-rw-rw- */
Colin Crossf45fa6b2012-03-26 12:38:26 -0700413 if (fd < 0) {
414 fprintf(stderr, "%s: %s\n", traces_path, strerror(errno));
415 return NULL;
416 }
Nick Kralevichc7f1fe22012-04-06 09:31:28 -0700417 int chmod_ret = fchmod(fd, 0666);
418 if (chmod_ret < 0) {
419 fprintf(stderr, "fchmod on %s failed: %s\n", traces_path, strerror(errno));
420 close(fd);
421 return NULL;
422 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700423
424 /* walk /proc and kill -QUIT all Dalvik processes */
425 DIR *proc = opendir("/proc");
426 if (proc == NULL) {
427 fprintf(stderr, "/proc: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700428 goto error_close_fd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700429 }
430
431 /* use inotify to find when processes are done dumping */
432 int ifd = inotify_init();
433 if (ifd < 0) {
434 fprintf(stderr, "inotify_init: %s\n", strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700435 goto error_close_fd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700436 }
437
438 int wfd = inotify_add_watch(ifd, traces_path, IN_CLOSE_WRITE);
439 if (wfd < 0) {
440 fprintf(stderr, "inotify_add_watch(%s): %s\n", traces_path, strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700441 goto error_close_ifd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700442 }
443
444 struct dirent *d;
445 int dalvik_found = 0;
446 while ((d = readdir(proc))) {
447 int pid = atoi(d->d_name);
448 if (pid <= 0) continue;
449
Jeff Brownbf7f4922012-06-07 16:40:01 -0700450 char path[PATH_MAX];
451 char data[PATH_MAX];
Colin Crossf45fa6b2012-03-26 12:38:26 -0700452 snprintf(path, sizeof(path), "/proc/%d/exe", pid);
Jeff Brownbf7f4922012-06-07 16:40:01 -0700453 ssize_t len = readlink(path, data, sizeof(data) - 1);
454 if (len <= 0) {
Colin Crossf45fa6b2012-03-26 12:38:26 -0700455 continue;
456 }
Jeff Brownbf7f4922012-06-07 16:40:01 -0700457 data[len] = '\0';
Colin Crossf45fa6b2012-03-26 12:38:26 -0700458
Jeff Brownbf7f4922012-06-07 16:40:01 -0700459 if (!strcmp(data, "/system/bin/app_process")) {
460 /* skip zygote -- it won't dump its stack anyway */
461 snprintf(path, sizeof(path), "/proc/%d/cmdline", pid);
462 int fd = open(path, O_RDONLY);
463 len = read(fd, data, sizeof(data) - 1);
464 close(fd);
465 if (len <= 0) {
466 continue;
467 }
468 data[len] = '\0';
469 if (!strcmp(data, "zygote")) {
470 continue;
471 }
472
473 ++dalvik_found;
474 if (kill(pid, SIGQUIT)) {
475 fprintf(stderr, "kill(%d, SIGQUIT): %s\n", pid, strerror(errno));
476 continue;
477 }
478
479 /* wait for the writable-close notification from inotify */
480 struct pollfd pfd = { ifd, POLLIN, 0 };
481 int ret = poll(&pfd, 1, 200); /* 200 msec timeout */
482 if (ret < 0) {
483 fprintf(stderr, "poll: %s\n", strerror(errno));
484 } else if (ret == 0) {
485 fprintf(stderr, "warning: timed out dumping pid %d\n", pid);
486 } else {
487 struct inotify_event ie;
488 read(ifd, &ie, sizeof(ie));
489 }
490 } else if (should_dump_native_traces(data)) {
491 /* dump native process if appropriate */
492 if (lseek(fd, 0, SEEK_END) < 0) {
493 fprintf(stderr, "lseek: %s\n", strerror(errno));
494 } else {
495 dump_backtrace_to_file(pid, fd);
496 }
Colin Crossf45fa6b2012-03-26 12:38:26 -0700497 }
498 }
499
Colin Crossf45fa6b2012-03-26 12:38:26 -0700500 if (dalvik_found == 0) {
501 fprintf(stderr, "Warning: no Dalvik processes found to dump stacks\n");
502 }
503
504 static char dump_traces_path[PATH_MAX];
505 strlcpy(dump_traces_path, traces_path, sizeof(dump_traces_path));
506 strlcat(dump_traces_path, ".bugreport", sizeof(dump_traces_path));
507 if (rename(traces_path, dump_traces_path)) {
508 fprintf(stderr, "rename(%s, %s): %s\n", traces_path, dump_traces_path, strerror(errno));
Jeff Brownbf7f4922012-06-07 16:40:01 -0700509 goto error_close_ifd;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700510 }
Jeff Brownbf7f4922012-06-07 16:40:01 -0700511 result = dump_traces_path;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700512
513 /* replace the saved [ANR] traces.txt file */
514 rename(anr_traces_path, traces_path);
Jeff Brownbf7f4922012-06-07 16:40:01 -0700515
516error_close_ifd:
517 close(ifd);
518error_close_fd:
519 close(fd);
520 return result;
Colin Crossf45fa6b2012-03-26 12:38:26 -0700521}
522
523void play_sound(const char* path) {
524 run_command(NULL, 5, "/system/bin/stagefright", "-o", "-a", path, NULL);
525}