|  | /* | 
|  | * Copyright (C) 2017 The Android Open Source Project | 
|  | * | 
|  | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | * you may not use this file except in compliance with the License. | 
|  | * You may obtain a copy of the License at | 
|  | * | 
|  | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | * | 
|  | * Unless required by applicable law or agreed to in writing, software | 
|  | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | * See the License for the specific language governing permissions and | 
|  | * limitations under the License. | 
|  | */ | 
|  |  | 
|  | #include <cutils/trace.h> | 
|  |  | 
|  | #include "trace-dev.inc" | 
|  |  | 
|  | #include <cutils/sockets.h> | 
|  | #include <sys/stat.h> | 
|  | #include <time.h> | 
|  |  | 
|  | /** | 
|  | * For tracing in container, tags are written into a socket | 
|  | * instead of ftrace. Additional data is appended so we need extra space. | 
|  | */ | 
|  | #define CONTAINER_ATRACE_MESSAGE_LENGTH (ATRACE_MESSAGE_LENGTH + 512) | 
|  |  | 
|  | static pthread_once_t atrace_once_control = PTHREAD_ONCE_INIT; | 
|  |  | 
|  | // Variables used for tracing in container with socket. | 
|  | // Note that we need to manually close and reopen socket when Zygote is forking. This requires | 
|  | // writing and closing sockets on multiple threads. A rwlock is used for avoiding concurrent | 
|  | // operation on the file descriptor. | 
|  | static bool             atrace_use_container_sock    = false; | 
|  | static int              atrace_container_sock_fd     = -1; | 
|  | static pthread_mutex_t  atrace_enabling_mutex        = PTHREAD_MUTEX_INITIALIZER; | 
|  | static pthread_rwlock_t atrace_container_sock_rwlock = PTHREAD_RWLOCK_INITIALIZER; | 
|  |  | 
|  | static bool atrace_init_container_sock() | 
|  | { | 
|  | pthread_rwlock_wrlock(&atrace_container_sock_rwlock); | 
|  | atrace_container_sock_fd = | 
|  | socket_local_client("trace", ANDROID_SOCKET_NAMESPACE_RESERVED, SOCK_SEQPACKET); | 
|  | if (atrace_container_sock_fd < 0) { | 
|  | ALOGE("Error opening container trace socket: %s (%d)", strerror(errno), errno); | 
|  | } | 
|  | pthread_rwlock_unlock(&atrace_container_sock_rwlock); | 
|  | return atrace_container_sock_fd != -1; | 
|  | } | 
|  |  | 
|  | static void atrace_close_container_sock() | 
|  | { | 
|  | pthread_rwlock_wrlock(&atrace_container_sock_rwlock); | 
|  | if (atrace_container_sock_fd != -1) close(atrace_container_sock_fd); | 
|  | atrace_container_sock_fd = -1; | 
|  | pthread_rwlock_unlock(&atrace_container_sock_rwlock); | 
|  | } | 
|  |  | 
|  | // Set whether tracing is enabled in this process.  This is used to prevent | 
|  | // the Zygote process from tracing.  We need to close the socket in the container when tracing is | 
|  | // disabled, and reopen it again after Zygote forking. | 
|  | void atrace_set_tracing_enabled(bool enabled) | 
|  | { | 
|  | pthread_mutex_lock(&atrace_enabling_mutex); | 
|  | if (atrace_use_container_sock) { | 
|  | bool already_enabled = atomic_load_explicit(&atrace_is_enabled, memory_order_acquire); | 
|  | if (enabled && !already_enabled) { | 
|  | // Trace was disabled previously. Re-initialize container socket. | 
|  | atrace_init_container_sock(); | 
|  | } else if (!enabled && already_enabled) { | 
|  | // Trace was enabled previously. Close container socket. | 
|  | atrace_close_container_sock(); | 
|  | } | 
|  | } | 
|  | atomic_store_explicit(&atrace_is_enabled, enabled, memory_order_release); | 
|  | pthread_mutex_unlock(&atrace_enabling_mutex); | 
|  | atrace_update_tags(); | 
|  | } | 
|  |  | 
|  | static void atrace_init_once() | 
|  | { | 
|  | atrace_marker_fd = open("/sys/kernel/debug/tracing/trace_marker", O_WRONLY | O_CLOEXEC); | 
|  | if (atrace_marker_fd < 0) { | 
|  | // We're in container, ftrace may be disabled. In such case, we use the | 
|  | // socket to write trace event. | 
|  |  | 
|  | // Protect the initialization of container socket from | 
|  | // atrace_set_tracing_enabled. | 
|  | pthread_mutex_lock(&atrace_enabling_mutex); | 
|  | atrace_use_container_sock = true; | 
|  | bool success = false; | 
|  | if (atomic_load_explicit(&atrace_is_enabled, memory_order_acquire)) { | 
|  | success = atrace_init_container_sock(); | 
|  | } | 
|  | pthread_mutex_unlock(&atrace_enabling_mutex); | 
|  |  | 
|  | if (!success) { | 
|  | atrace_enabled_tags = 0; | 
|  | goto done; | 
|  | } | 
|  | } | 
|  | atrace_enabled_tags = atrace_get_property(); | 
|  |  | 
|  | done: | 
|  | atomic_store_explicit(&atrace_is_ready, true, memory_order_release); | 
|  | } | 
|  |  | 
|  | void atrace_setup() | 
|  | { | 
|  | pthread_once(&atrace_once_control, atrace_init_once); | 
|  | } | 
|  |  | 
|  | static inline uint64_t gettime(clockid_t clk_id) | 
|  | { | 
|  | struct timespec ts; | 
|  | clock_gettime(clk_id, &ts); | 
|  | return ts.tv_sec * 1000000 + ts.tv_nsec / 1000; | 
|  | } | 
|  |  | 
|  | // Write trace events to container trace file. Note that we need to amend tid and time information | 
|  | // here comparing to normal ftrace, where those informations are added by kernel. | 
|  | #define WRITE_MSG_IN_CONTAINER_LOCKED(ph, sep_before_name, value_format, name, value) { \ | 
|  | char buf[CONTAINER_ATRACE_MESSAGE_LENGTH]; \ | 
|  | int pid = getpid(); \ | 
|  | int tid = gettid(); \ | 
|  | uint64_t ts = gettime(CLOCK_MONOTONIC); \ | 
|  | uint64_t tts = gettime(CLOCK_THREAD_CPUTIME_ID); \ | 
|  | int len = snprintf( \ | 
|  | buf, sizeof(buf), \ | 
|  | ph "|%d|%d|%" PRIu64 "|%" PRIu64 sep_before_name "%s" value_format, \ | 
|  | pid, tid, ts, tts, name, value); \ | 
|  | if (len >= (int) sizeof(buf)) { \ | 
|  | int name_len = strlen(name) - (len - sizeof(buf)) - 1; \ | 
|  | /* Truncate the name to make the message fit. */ \ | 
|  | if (name_len > 0) { \ | 
|  | ALOGW("Truncated name in %s: %s\n", __FUNCTION__, name); \ | 
|  | len = snprintf( \ | 
|  | buf, sizeof(buf), \ | 
|  | ph "|%d|%d|%" PRIu64 "|%" PRIu64 sep_before_name "%.*s" value_format, \ | 
|  | pid, tid, ts, tts, name_len, name, value); \ | 
|  | } else { \ | 
|  | /* Data is still too long. Drop it. */ \ | 
|  | ALOGW("Data is too long in %s: %s\n", __FUNCTION__, name); \ | 
|  | len = 0; \ | 
|  | } \ | 
|  | } \ | 
|  | if (len > 0) { \ | 
|  | write(atrace_container_sock_fd, buf, len); \ | 
|  | } \ | 
|  | } | 
|  |  | 
|  | #define WRITE_MSG_IN_CONTAINER(ph, sep_before_name, value_format, name, value) { \ | 
|  | pthread_rwlock_rdlock(&atrace_container_sock_rwlock); \ | 
|  | if (atrace_container_sock_fd != -1) { \ | 
|  | WRITE_MSG_IN_CONTAINER_LOCKED(ph, sep_before_name, value_format, name, value); \ | 
|  | } \ | 
|  | pthread_rwlock_unlock(&atrace_container_sock_rwlock); \ | 
|  | } | 
|  |  | 
|  | void atrace_begin_body(const char* name) | 
|  | { | 
|  | if (CC_LIKELY(atrace_use_container_sock)) { | 
|  | WRITE_MSG_IN_CONTAINER("B", "|", "%s", name, ""); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (atrace_marker_fd < 0) return; | 
|  |  | 
|  | WRITE_MSG("B|%d|", "%s", name, ""); | 
|  | } | 
|  |  | 
|  | void atrace_end_body() | 
|  | { | 
|  | if (CC_LIKELY(atrace_use_container_sock)) { | 
|  | WRITE_MSG_IN_CONTAINER("E", "", "%s", "", ""); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (atrace_marker_fd < 0) return; | 
|  |  | 
|  | WRITE_MSG("E|%d", "%s", "", ""); | 
|  | } | 
|  |  | 
|  | void atrace_async_begin_body(const char* name, int32_t cookie) | 
|  | { | 
|  | if (CC_LIKELY(atrace_use_container_sock)) { | 
|  | WRITE_MSG_IN_CONTAINER("S", "|", "|%d", name, cookie); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (atrace_marker_fd < 0) return; | 
|  |  | 
|  | WRITE_MSG("S|%d|", "|%" PRId32, name, cookie); | 
|  | } | 
|  |  | 
|  | void atrace_async_end_body(const char* name, int32_t cookie) | 
|  | { | 
|  | if (CC_LIKELY(atrace_use_container_sock)) { | 
|  | WRITE_MSG_IN_CONTAINER("F", "|", "|%d", name, cookie); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (atrace_marker_fd < 0) return; | 
|  |  | 
|  | WRITE_MSG("F|%d|", "|%" PRId32, name, cookie); | 
|  | } | 
|  |  | 
|  | void atrace_int_body(const char* name, int32_t value) | 
|  | { | 
|  | if (CC_LIKELY(atrace_use_container_sock)) { | 
|  | WRITE_MSG_IN_CONTAINER("C", "|", "|%" PRId32, name, value); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (atrace_marker_fd < 0) return; | 
|  |  | 
|  | WRITE_MSG("C|%d|", "|%" PRId32, name, value); | 
|  | } | 
|  |  | 
|  | void atrace_int64_body(const char* name, int64_t value) | 
|  | { | 
|  | if (CC_LIKELY(atrace_use_container_sock)) { | 
|  | WRITE_MSG_IN_CONTAINER("C", "|", "|%" PRId64, name, value); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (atrace_marker_fd < 0) return; | 
|  |  | 
|  | WRITE_MSG("C|%d|", "|%" PRId64, name, value); | 
|  | } |