bfb1f1cc83
Bug: http://b/20501816
Change-Id: Id13a62f02243c6c4831e2f47944dc34fa822f5b6
(cherry picked from commit 997abb668b
)
799 lines
24 KiB
C
799 lines
24 KiB
C
/*
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <dirent.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <limits.h>
|
|
#include <poll.h>
|
|
#include <signal.h>
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/inotify.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/time.h>
|
|
#include <sys/wait.h>
|
|
#include <sys/klog.h>
|
|
#include <time.h>
|
|
#include <unistd.h>
|
|
#include <sys/prctl.h>
|
|
|
|
#include <cutils/debugger.h>
|
|
#include <cutils/properties.h>
|
|
#include <cutils/sockets.h>
|
|
#include <private/android_filesystem_config.h>
|
|
|
|
#include <selinux/android.h>
|
|
|
|
#include "dumpstate.h"
|
|
|
|
static const int64_t NANOS_PER_SEC = 1000000000;
|
|
|
|
/* list of native processes to include in the native dumps */
|
|
static const char* native_processes_to_dump[] = {
|
|
"/system/bin/drmserver",
|
|
"/system/bin/mediaserver",
|
|
"/system/bin/sdcard",
|
|
"/system/bin/surfaceflinger",
|
|
NULL,
|
|
};
|
|
|
|
static uint64_t nanotime() {
|
|
struct timespec ts;
|
|
clock_gettime(CLOCK_MONOTONIC, &ts);
|
|
return (uint64_t)ts.tv_sec * NANOS_PER_SEC + ts.tv_nsec;
|
|
}
|
|
|
|
void for_each_userid(void (*func)(int), const char *header) {
|
|
DIR *d;
|
|
struct dirent *de;
|
|
|
|
if (header) printf("\n------ %s ------\n", header);
|
|
func(0);
|
|
|
|
if (!(d = opendir("/data/system/users"))) {
|
|
printf("Failed to open /data/system/users (%s)\n", strerror(errno));
|
|
return;
|
|
}
|
|
|
|
while ((de = readdir(d))) {
|
|
int userid;
|
|
if (de->d_type != DT_DIR || !(userid = atoi(de->d_name))) {
|
|
continue;
|
|
}
|
|
func(userid);
|
|
}
|
|
|
|
closedir(d);
|
|
}
|
|
|
|
static void __for_each_pid(void (*helper)(int, const char *, void *), const char *header, void *arg) {
|
|
DIR *d;
|
|
struct dirent *de;
|
|
|
|
if (!(d = opendir("/proc"))) {
|
|
printf("Failed to open /proc (%s)\n", strerror(errno));
|
|
return;
|
|
}
|
|
|
|
printf("\n------ %s ------\n", header);
|
|
while ((de = readdir(d))) {
|
|
int pid;
|
|
int fd;
|
|
char cmdpath[255];
|
|
char cmdline[255];
|
|
|
|
if (!(pid = atoi(de->d_name))) {
|
|
continue;
|
|
}
|
|
|
|
sprintf(cmdpath,"/proc/%d/cmdline", pid);
|
|
memset(cmdline, 0, sizeof(cmdline));
|
|
if ((fd = TEMP_FAILURE_RETRY(open(cmdpath, O_RDONLY | O_CLOEXEC))) < 0) {
|
|
strcpy(cmdline, "N/A");
|
|
} else {
|
|
read(fd, cmdline, sizeof(cmdline) - 1);
|
|
close(fd);
|
|
}
|
|
helper(pid, cmdline, arg);
|
|
}
|
|
|
|
closedir(d);
|
|
}
|
|
|
|
static void for_each_pid_helper(int pid, const char *cmdline, void *arg) {
|
|
for_each_pid_func *func = arg;
|
|
func(pid, cmdline);
|
|
}
|
|
|
|
void for_each_pid(for_each_pid_func func, const char *header) {
|
|
__for_each_pid(for_each_pid_helper, header, func);
|
|
}
|
|
|
|
static void for_each_tid_helper(int pid, const char *cmdline, void *arg) {
|
|
DIR *d;
|
|
struct dirent *de;
|
|
char taskpath[255];
|
|
for_each_tid_func *func = arg;
|
|
|
|
sprintf(taskpath, "/proc/%d/task", pid);
|
|
|
|
if (!(d = opendir(taskpath))) {
|
|
printf("Failed to open %s (%s)\n", taskpath, strerror(errno));
|
|
return;
|
|
}
|
|
|
|
func(pid, pid, cmdline);
|
|
|
|
while ((de = readdir(d))) {
|
|
int tid;
|
|
int fd;
|
|
char commpath[255];
|
|
char comm[255];
|
|
|
|
if (!(tid = atoi(de->d_name))) {
|
|
continue;
|
|
}
|
|
|
|
if (tid == pid)
|
|
continue;
|
|
|
|
sprintf(commpath,"/proc/%d/comm", tid);
|
|
memset(comm, 0, sizeof(comm));
|
|
if ((fd = TEMP_FAILURE_RETRY(open(commpath, O_RDONLY | O_CLOEXEC))) < 0) {
|
|
strcpy(comm, "N/A");
|
|
} else {
|
|
char *c;
|
|
read(fd, comm, sizeof(comm) - 1);
|
|
close(fd);
|
|
|
|
c = strrchr(comm, '\n');
|
|
if (c) {
|
|
*c = '\0';
|
|
}
|
|
}
|
|
func(pid, tid, comm);
|
|
}
|
|
|
|
closedir(d);
|
|
}
|
|
|
|
void for_each_tid(for_each_tid_func func, const char *header) {
|
|
__for_each_pid(for_each_tid_helper, header, func);
|
|
}
|
|
|
|
void show_wchan(int pid, int tid, const char *name) {
|
|
char path[255];
|
|
char buffer[255];
|
|
int fd;
|
|
char name_buffer[255];
|
|
|
|
memset(buffer, 0, sizeof(buffer));
|
|
|
|
sprintf(path, "/proc/%d/wchan", tid);
|
|
if ((fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC))) < 0) {
|
|
printf("Failed to open '%s' (%s)\n", path, strerror(errno));
|
|
return;
|
|
}
|
|
|
|
if (read(fd, buffer, sizeof(buffer)) < 0) {
|
|
printf("Failed to read '%s' (%s)\n", path, strerror(errno));
|
|
goto out_close;
|
|
}
|
|
|
|
snprintf(name_buffer, sizeof(name_buffer), "%*s%s",
|
|
pid == tid ? 0 : 3, "", name);
|
|
|
|
printf("%-7d %-32s %s\n", tid, name_buffer, buffer);
|
|
|
|
out_close:
|
|
close(fd);
|
|
return;
|
|
}
|
|
|
|
void do_dmesg() {
|
|
printf("------ KERNEL LOG (dmesg) ------\n");
|
|
/* Get size of kernel buffer */
|
|
int size = klogctl(KLOG_SIZE_BUFFER, NULL, 0);
|
|
if (size <= 0) {
|
|
printf("Unexpected klogctl return value: %d\n\n", size);
|
|
return;
|
|
}
|
|
char *buf = (char *) malloc(size + 1);
|
|
if (buf == NULL) {
|
|
printf("memory allocation failed\n\n");
|
|
return;
|
|
}
|
|
int retval = klogctl(KLOG_READ_ALL, buf, size);
|
|
if (retval < 0) {
|
|
printf("klogctl failure\n\n");
|
|
free(buf);
|
|
return;
|
|
}
|
|
buf[retval] = '\0';
|
|
printf("%s\n\n", buf);
|
|
free(buf);
|
|
return;
|
|
}
|
|
|
|
void do_showmap(int pid, const char *name) {
|
|
char title[255];
|
|
char arg[255];
|
|
|
|
sprintf(title, "SHOW MAP %d (%s)", pid, name);
|
|
sprintf(arg, "%d", pid);
|
|
run_command(title, 10, SU_PATH, "root", "showmap", arg, NULL);
|
|
}
|
|
|
|
static int _dump_file_from_fd(const char *title, const char *path, int fd) {
|
|
if (title) printf("------ %s (%s", title, path);
|
|
|
|
if (title) {
|
|
struct stat st;
|
|
if (memcmp(path, "/proc/", 6) && memcmp(path, "/sys/", 5) && !fstat(fd, &st)) {
|
|
char stamp[80];
|
|
time_t mtime = st.st_mtime;
|
|
strftime(stamp, sizeof(stamp), "%Y-%m-%d %H:%M:%S", localtime(&mtime));
|
|
printf(": %s", stamp);
|
|
}
|
|
printf(") ------\n");
|
|
}
|
|
|
|
bool newline = false;
|
|
fd_set read_set;
|
|
struct timeval tm;
|
|
while (1) {
|
|
FD_ZERO(&read_set);
|
|
FD_SET(fd, &read_set);
|
|
/* Timeout if no data is read for 30 seconds. */
|
|
tm.tv_sec = 30;
|
|
tm.tv_usec = 0;
|
|
uint64_t elapsed = nanotime();
|
|
int ret = TEMP_FAILURE_RETRY(select(fd + 1, &read_set, NULL, NULL, &tm));
|
|
if (ret == -1) {
|
|
printf("*** %s: select failed: %s\n", path, strerror(errno));
|
|
newline = true;
|
|
break;
|
|
} else if (ret == 0) {
|
|
elapsed = nanotime() - elapsed;
|
|
printf("*** %s: Timed out after %.3fs\n", path,
|
|
(float) elapsed / NANOS_PER_SEC);
|
|
newline = true;
|
|
break;
|
|
} else {
|
|
char buffer[65536];
|
|
ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
|
|
if (bytes_read > 0) {
|
|
fwrite(buffer, bytes_read, 1, stdout);
|
|
newline = (buffer[bytes_read-1] == '\n');
|
|
} else {
|
|
if (bytes_read == -1) {
|
|
printf("*** %s: Failed to read from fd: %s", path, strerror(errno));
|
|
newline = true;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
close(fd);
|
|
|
|
if (!newline) printf("\n");
|
|
if (title) printf("\n");
|
|
return 0;
|
|
}
|
|
|
|
/* prints the contents of a file */
|
|
int dump_file(const char *title, const char *path) {
|
|
int fd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_NONBLOCK | O_CLOEXEC));
|
|
if (fd < 0) {
|
|
int err = errno;
|
|
if (title) printf("------ %s (%s) ------\n", title, path);
|
|
printf("*** %s: %s\n", path, strerror(err));
|
|
if (title) printf("\n");
|
|
return -1;
|
|
}
|
|
return _dump_file_from_fd(title, path, fd);
|
|
}
|
|
|
|
/* calls skip to gate calling dump_from_fd recursively
|
|
* in the specified directory. dump_from_fd defaults to
|
|
* dump_file_from_fd above when set to NULL. skip defaults
|
|
* to false when set to NULL. dump_from_fd will always be
|
|
* called with title NULL.
|
|
*/
|
|
int dump_files(const char *title, const char *dir,
|
|
bool (*skip)(const char *path),
|
|
int (*dump_from_fd)(const char *title, const char *path, int fd)) {
|
|
DIR *dirp;
|
|
struct dirent *d;
|
|
char *newpath = NULL;
|
|
char *slash = "/";
|
|
int fd, retval = 0;
|
|
|
|
if (title) {
|
|
printf("------ %s (%s) ------\n", title, dir);
|
|
}
|
|
|
|
if (dir[strlen(dir) - 1] == '/') {
|
|
++slash;
|
|
}
|
|
dirp = opendir(dir);
|
|
if (dirp == NULL) {
|
|
retval = -errno;
|
|
fprintf(stderr, "%s: %s\n", dir, strerror(errno));
|
|
return retval;
|
|
}
|
|
|
|
if (!dump_from_fd) {
|
|
dump_from_fd = dump_file_from_fd;
|
|
}
|
|
for (; ((d = readdir(dirp))); free(newpath), newpath = NULL) {
|
|
if ((d->d_name[0] == '.')
|
|
&& (((d->d_name[1] == '.') && (d->d_name[2] == '\0'))
|
|
|| (d->d_name[1] == '\0'))) {
|
|
continue;
|
|
}
|
|
asprintf(&newpath, "%s%s%s%s", dir, slash, d->d_name,
|
|
(d->d_type == DT_DIR) ? "/" : "");
|
|
if (!newpath) {
|
|
retval = -errno;
|
|
continue;
|
|
}
|
|
if (skip && (*skip)(newpath)) {
|
|
continue;
|
|
}
|
|
if (d->d_type == DT_DIR) {
|
|
int ret = dump_files(NULL, newpath, skip, dump_from_fd);
|
|
if (ret < 0) {
|
|
retval = ret;
|
|
}
|
|
continue;
|
|
}
|
|
fd = TEMP_FAILURE_RETRY(open(newpath, O_RDONLY | O_NONBLOCK | O_CLOEXEC));
|
|
if (fd < 0) {
|
|
retval = fd;
|
|
printf("*** %s: %s\n", newpath, strerror(errno));
|
|
continue;
|
|
}
|
|
(*dump_from_fd)(NULL, newpath, fd);
|
|
}
|
|
closedir(dirp);
|
|
if (title) {
|
|
printf("\n");
|
|
}
|
|
return retval;
|
|
}
|
|
|
|
/* fd must have been opened with the flag O_NONBLOCK. With this flag set,
|
|
* it's possible to avoid issues where opening the file itself can get
|
|
* stuck.
|
|
*/
|
|
int dump_file_from_fd(const char *title, const char *path, int fd) {
|
|
int flags = fcntl(fd, F_GETFL);
|
|
if (flags == -1) {
|
|
printf("*** %s: failed to get flags on fd %d: %s\n", path, fd, strerror(errno));
|
|
return -1;
|
|
} else if (!(flags & O_NONBLOCK)) {
|
|
printf("*** %s: fd must have O_NONBLOCK set.\n", path);
|
|
return -1;
|
|
}
|
|
return _dump_file_from_fd(title, path, fd);
|
|
}
|
|
|
|
bool waitpid_with_timeout(pid_t pid, int timeout_seconds, int* status) {
|
|
sigset_t child_mask, old_mask;
|
|
sigemptyset(&child_mask);
|
|
sigaddset(&child_mask, SIGCHLD);
|
|
|
|
if (sigprocmask(SIG_BLOCK, &child_mask, &old_mask) == -1) {
|
|
printf("*** sigprocmask failed: %s\n", strerror(errno));
|
|
return false;
|
|
}
|
|
|
|
struct timespec ts;
|
|
ts.tv_sec = timeout_seconds;
|
|
ts.tv_nsec = 0;
|
|
int ret = TEMP_FAILURE_RETRY(sigtimedwait(&child_mask, NULL, &ts));
|
|
int saved_errno = errno;
|
|
// Set the signals back the way they were.
|
|
if (sigprocmask(SIG_SETMASK, &old_mask, NULL) == -1) {
|
|
printf("*** sigprocmask failed: %s\n", strerror(errno));
|
|
if (ret == 0) {
|
|
return false;
|
|
}
|
|
}
|
|
if (ret == -1) {
|
|
errno = saved_errno;
|
|
if (errno == EAGAIN) {
|
|
errno = ETIMEDOUT;
|
|
} else {
|
|
printf("*** sigtimedwait failed: %s\n", strerror(errno));
|
|
}
|
|
return false;
|
|
}
|
|
|
|
pid_t child_pid = waitpid(pid, status, WNOHANG);
|
|
if (child_pid != pid) {
|
|
if (child_pid != -1) {
|
|
printf("*** Waiting for pid %d, got pid %d instead\n", pid, child_pid);
|
|
} else {
|
|
printf("*** waitpid failed: %s\n", strerror(errno));
|
|
}
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/* forks a command and waits for it to finish */
|
|
int run_command(const char *title, int timeout_seconds, const char *command, ...) {
|
|
fflush(stdout);
|
|
uint64_t start = nanotime();
|
|
pid_t pid = fork();
|
|
|
|
/* handle error case */
|
|
if (pid < 0) {
|
|
printf("*** fork: %s\n", strerror(errno));
|
|
return pid;
|
|
}
|
|
|
|
/* handle child case */
|
|
if (pid == 0) {
|
|
const char *args[1024] = {command};
|
|
size_t arg;
|
|
|
|
/* make sure the child dies when dumpstate dies */
|
|
prctl(PR_SET_PDEATHSIG, SIGKILL);
|
|
|
|
/* just ignore SIGPIPE, will go down with parent's */
|
|
struct sigaction sigact;
|
|
memset(&sigact, 0, sizeof(sigact));
|
|
sigact.sa_handler = SIG_IGN;
|
|
sigaction(SIGPIPE, &sigact, NULL);
|
|
|
|
va_list ap;
|
|
va_start(ap, command);
|
|
if (title) printf("------ %s (%s", title, command);
|
|
for (arg = 1; arg < sizeof(args) / sizeof(args[0]); ++arg) {
|
|
args[arg] = va_arg(ap, const char *);
|
|
if (args[arg] == NULL) break;
|
|
if (title) printf(" %s", args[arg]);
|
|
}
|
|
if (title) printf(") ------\n");
|
|
fflush(stdout);
|
|
|
|
execvp(command, (char**) args);
|
|
printf("*** exec(%s): %s\n", command, strerror(errno));
|
|
fflush(stdout);
|
|
_exit(-1);
|
|
}
|
|
|
|
/* handle parent case */
|
|
int status;
|
|
bool ret = waitpid_with_timeout(pid, timeout_seconds, &status);
|
|
uint64_t elapsed = nanotime() - start;
|
|
if (!ret) {
|
|
if (errno == ETIMEDOUT) {
|
|
printf("*** %s: Timed out after %.3fs (killing pid %d)\n", command,
|
|
(float) elapsed / NANOS_PER_SEC, pid);
|
|
} else {
|
|
printf("*** %s: Error after %.4fs (killing pid %d)\n", command,
|
|
(float) elapsed / NANOS_PER_SEC, pid);
|
|
}
|
|
kill(pid, SIGTERM);
|
|
if (!waitpid_with_timeout(pid, 5, NULL)) {
|
|
kill(pid, SIGKILL);
|
|
if (!waitpid_with_timeout(pid, 5, NULL)) {
|
|
printf("*** %s: Cannot kill %d even with SIGKILL.\n", command, pid);
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
if (WIFSIGNALED(status)) {
|
|
printf("*** %s: Killed by signal %d\n", command, WTERMSIG(status));
|
|
} else if (WIFEXITED(status) && WEXITSTATUS(status) > 0) {
|
|
printf("*** %s: Exit code %d\n", command, WEXITSTATUS(status));
|
|
}
|
|
if (title) printf("[%s: %.3fs elapsed]\n\n", command, (float)elapsed / NANOS_PER_SEC);
|
|
|
|
return status;
|
|
}
|
|
|
|
size_t num_props = 0;
|
|
static char* props[2000];
|
|
|
|
static void print_prop(const char *key, const char *name, void *user) {
|
|
(void) user;
|
|
if (num_props < sizeof(props) / sizeof(props[0])) {
|
|
char buf[PROPERTY_KEY_MAX + PROPERTY_VALUE_MAX + 10];
|
|
snprintf(buf, sizeof(buf), "[%s]: [%s]\n", key, name);
|
|
props[num_props++] = strdup(buf);
|
|
}
|
|
}
|
|
|
|
static int compare_prop(const void *a, const void *b) {
|
|
return strcmp(*(char * const *) a, *(char * const *) b);
|
|
}
|
|
|
|
/* prints all the system properties */
|
|
void print_properties() {
|
|
size_t i;
|
|
num_props = 0;
|
|
property_list(print_prop, NULL);
|
|
qsort(&props, num_props, sizeof(props[0]), compare_prop);
|
|
|
|
printf("------ SYSTEM PROPERTIES ------\n");
|
|
for (i = 0; i < num_props; ++i) {
|
|
fputs(props[i], stdout);
|
|
free(props[i]);
|
|
}
|
|
printf("\n");
|
|
}
|
|
|
|
/* redirect output to a service control socket */
|
|
void redirect_to_socket(FILE *redirect, const char *service) {
|
|
int s = android_get_control_socket(service);
|
|
if (s < 0) {
|
|
fprintf(stderr, "android_get_control_socket(%s): %s\n", service, strerror(errno));
|
|
exit(1);
|
|
}
|
|
fcntl(s, F_SETFD, FD_CLOEXEC);
|
|
if (listen(s, 4) < 0) {
|
|
fprintf(stderr, "listen(control socket): %s\n", strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
struct sockaddr addr;
|
|
socklen_t alen = sizeof(addr);
|
|
int fd = accept(s, &addr, &alen);
|
|
if (fd < 0) {
|
|
fprintf(stderr, "accept(control socket): %s\n", strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
fflush(redirect);
|
|
dup2(fd, fileno(redirect));
|
|
close(fd);
|
|
}
|
|
|
|
/* redirect output to a file */
|
|
void redirect_to_file(FILE *redirect, char *path) {
|
|
char *chp = path;
|
|
|
|
/* skip initial slash */
|
|
if (chp[0] == '/')
|
|
chp++;
|
|
|
|
/* create leading directories, if necessary */
|
|
while (chp && chp[0]) {
|
|
chp = strchr(chp, '/');
|
|
if (chp) {
|
|
*chp = 0;
|
|
mkdir(path, 0770); /* drwxrwx--- */
|
|
*chp++ = '/';
|
|
}
|
|
}
|
|
|
|
int fd = TEMP_FAILURE_RETRY(open(path, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC,
|
|
S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH));
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: %s\n", path, strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
TEMP_FAILURE_RETRY(dup2(fd, fileno(redirect)));
|
|
close(fd);
|
|
}
|
|
|
|
static bool should_dump_native_traces(const char* path) {
|
|
for (const char** p = native_processes_to_dump; *p; p++) {
|
|
if (!strcmp(*p, path)) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
/* dump Dalvik and native stack traces, return the trace file location (NULL if none) */
|
|
const char *dump_traces() {
|
|
const char* result = NULL;
|
|
|
|
char traces_path[PROPERTY_VALUE_MAX] = "";
|
|
property_get("dalvik.vm.stack-trace-file", traces_path, "");
|
|
if (!traces_path[0]) return NULL;
|
|
|
|
/* move the old traces.txt (if any) out of the way temporarily */
|
|
char anr_traces_path[PATH_MAX];
|
|
strlcpy(anr_traces_path, traces_path, sizeof(anr_traces_path));
|
|
strlcat(anr_traces_path, ".anr", sizeof(anr_traces_path));
|
|
if (rename(traces_path, anr_traces_path) && errno != ENOENT) {
|
|
fprintf(stderr, "rename(%s, %s): %s\n", traces_path, anr_traces_path, strerror(errno));
|
|
return NULL; // Can't rename old traces.txt -- no permission? -- leave it alone instead
|
|
}
|
|
|
|
/* make the directory if necessary */
|
|
char anr_traces_dir[PATH_MAX];
|
|
strlcpy(anr_traces_dir, traces_path, sizeof(anr_traces_dir));
|
|
char *slash = strrchr(anr_traces_dir, '/');
|
|
if (slash != NULL) {
|
|
*slash = '\0';
|
|
if (!mkdir(anr_traces_dir, 0775)) {
|
|
chown(anr_traces_dir, AID_SYSTEM, AID_SYSTEM);
|
|
chmod(anr_traces_dir, 0775);
|
|
if (selinux_android_restorecon(anr_traces_dir, 0) == -1) {
|
|
fprintf(stderr, "restorecon failed for %s: %s\n", anr_traces_dir, strerror(errno));
|
|
}
|
|
} else if (errno != EEXIST) {
|
|
fprintf(stderr, "mkdir(%s): %s\n", anr_traces_dir, strerror(errno));
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
/* create a new, empty traces.txt file to receive stack dumps */
|
|
int fd = TEMP_FAILURE_RETRY(open(traces_path, O_CREAT | O_WRONLY | O_TRUNC | O_NOFOLLOW | O_CLOEXEC,
|
|
0666)); /* -rw-rw-rw- */
|
|
if (fd < 0) {
|
|
fprintf(stderr, "%s: %s\n", traces_path, strerror(errno));
|
|
return NULL;
|
|
}
|
|
int chmod_ret = fchmod(fd, 0666);
|
|
if (chmod_ret < 0) {
|
|
fprintf(stderr, "fchmod on %s failed: %s\n", traces_path, strerror(errno));
|
|
close(fd);
|
|
return NULL;
|
|
}
|
|
|
|
/* walk /proc and kill -QUIT all Dalvik processes */
|
|
DIR *proc = opendir("/proc");
|
|
if (proc == NULL) {
|
|
fprintf(stderr, "/proc: %s\n", strerror(errno));
|
|
goto error_close_fd;
|
|
}
|
|
|
|
/* use inotify to find when processes are done dumping */
|
|
int ifd = inotify_init();
|
|
if (ifd < 0) {
|
|
fprintf(stderr, "inotify_init: %s\n", strerror(errno));
|
|
goto error_close_fd;
|
|
}
|
|
|
|
int wfd = inotify_add_watch(ifd, traces_path, IN_CLOSE_WRITE);
|
|
if (wfd < 0) {
|
|
fprintf(stderr, "inotify_add_watch(%s): %s\n", traces_path, strerror(errno));
|
|
goto error_close_ifd;
|
|
}
|
|
|
|
struct dirent *d;
|
|
int dalvik_found = 0;
|
|
while ((d = readdir(proc))) {
|
|
int pid = atoi(d->d_name);
|
|
if (pid <= 0) continue;
|
|
|
|
char path[PATH_MAX];
|
|
char data[PATH_MAX];
|
|
snprintf(path, sizeof(path), "/proc/%d/exe", pid);
|
|
ssize_t len = readlink(path, data, sizeof(data) - 1);
|
|
if (len <= 0) {
|
|
continue;
|
|
}
|
|
data[len] = '\0';
|
|
|
|
if (!strncmp(data, "/system/bin/app_process", strlen("/system/bin/app_process"))) {
|
|
/* skip zygote -- it won't dump its stack anyway */
|
|
snprintf(path, sizeof(path), "/proc/%d/cmdline", pid);
|
|
int cfd = TEMP_FAILURE_RETRY(open(path, O_RDONLY | O_CLOEXEC));
|
|
len = read(cfd, data, sizeof(data) - 1);
|
|
close(cfd);
|
|
if (len <= 0) {
|
|
continue;
|
|
}
|
|
data[len] = '\0';
|
|
if (!strncmp(data, "zygote", strlen("zygote"))) {
|
|
continue;
|
|
}
|
|
|
|
++dalvik_found;
|
|
uint64_t start = nanotime();
|
|
if (kill(pid, SIGQUIT)) {
|
|
fprintf(stderr, "kill(%d, SIGQUIT): %s\n", pid, strerror(errno));
|
|
continue;
|
|
}
|
|
|
|
/* wait for the writable-close notification from inotify */
|
|
struct pollfd pfd = { ifd, POLLIN, 0 };
|
|
int ret = poll(&pfd, 1, 5000); /* 5 sec timeout */
|
|
if (ret < 0) {
|
|
fprintf(stderr, "poll: %s\n", strerror(errno));
|
|
} else if (ret == 0) {
|
|
fprintf(stderr, "warning: timed out dumping pid %d\n", pid);
|
|
} else {
|
|
struct inotify_event ie;
|
|
read(ifd, &ie, sizeof(ie));
|
|
}
|
|
|
|
if (lseek(fd, 0, SEEK_END) < 0) {
|
|
fprintf(stderr, "lseek: %s\n", strerror(errno));
|
|
} else {
|
|
dprintf(fd, "[dump dalvik stack %d: %.3fs elapsed]\n",
|
|
pid, (float)(nanotime() - start) / NANOS_PER_SEC);
|
|
}
|
|
} else if (should_dump_native_traces(data)) {
|
|
/* dump native process if appropriate */
|
|
if (lseek(fd, 0, SEEK_END) < 0) {
|
|
fprintf(stderr, "lseek: %s\n", strerror(errno));
|
|
} else {
|
|
static uint16_t timeout_failures = 0;
|
|
uint64_t start = nanotime();
|
|
|
|
/* If 3 backtrace dumps fail in a row, consider debuggerd dead. */
|
|
if (timeout_failures == 3) {
|
|
dprintf(fd, "too many stack dump failures, skipping...\n");
|
|
} else if (dump_backtrace_to_file_timeout(pid, fd, 20) == -1) {
|
|
dprintf(fd, "dumping failed, likely due to a timeout\n");
|
|
timeout_failures++;
|
|
} else {
|
|
timeout_failures = 0;
|
|
}
|
|
dprintf(fd, "[dump native stack %d: %.3fs elapsed]\n",
|
|
pid, (float)(nanotime() - start) / NANOS_PER_SEC);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (dalvik_found == 0) {
|
|
fprintf(stderr, "Warning: no Dalvik processes found to dump stacks\n");
|
|
}
|
|
|
|
static char dump_traces_path[PATH_MAX];
|
|
strlcpy(dump_traces_path, traces_path, sizeof(dump_traces_path));
|
|
strlcat(dump_traces_path, ".bugreport", sizeof(dump_traces_path));
|
|
if (rename(traces_path, dump_traces_path)) {
|
|
fprintf(stderr, "rename(%s, %s): %s\n", traces_path, dump_traces_path, strerror(errno));
|
|
goto error_close_ifd;
|
|
}
|
|
result = dump_traces_path;
|
|
|
|
/* replace the saved [ANR] traces.txt file */
|
|
rename(anr_traces_path, traces_path);
|
|
|
|
error_close_ifd:
|
|
close(ifd);
|
|
error_close_fd:
|
|
close(fd);
|
|
return result;
|
|
}
|
|
|
|
void dump_route_tables() {
|
|
const char* const RT_TABLES_PATH = "/data/misc/net/rt_tables";
|
|
dump_file("RT_TABLES", RT_TABLES_PATH);
|
|
FILE* fp = fopen(RT_TABLES_PATH, "re");
|
|
if (!fp) {
|
|
printf("*** %s: %s\n", RT_TABLES_PATH, strerror(errno));
|
|
return;
|
|
}
|
|
char table[16];
|
|
// Each line has an integer (the table number), a space, and a string (the table name). We only
|
|
// need the table number. It's a 32-bit unsigned number, so max 10 chars. Skip the table name.
|
|
// Add a fixed max limit so this doesn't go awry.
|
|
for (int i = 0; i < 64 && fscanf(fp, " %10s %*s", table) == 1; ++i) {
|
|
run_command("ROUTE TABLE IPv4", 10, "ip", "-4", "route", "show", "table", table, NULL);
|
|
run_command("ROUTE TABLE IPv6", 10, "ip", "-6", "route", "show", "table", table, NULL);
|
|
}
|
|
fclose(fp);
|
|
}
|