1 /* 2 * Copyright (C) 2012 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #define LOG_TAG "atrace" 18 19 #include <errno.h> 20 #include <fcntl.h> 21 #include <getopt.h> 22 #include <inttypes.h> 23 #include <signal.h> 24 #include <stdarg.h> 25 #include <stdbool.h> 26 #include <stdio.h> 27 #include <stdlib.h> 28 #include <string.h> 29 #include <time.h> 30 #include <unistd.h> 31 #include <zlib.h> 32 33 #include <fstream> 34 #include <memory> 35 36 #include <binder/IBinder.h> 37 #include <binder/IServiceManager.h> 38 #include <binder/Parcel.h> 39 40 #include <android/hardware/atrace/1.0/IAtraceDevice.h> 41 #include <android/hidl/manager/1.0/IServiceManager.h> 42 #include <hidl/ServiceManagement.h> 43 44 #include <pdx/default_transport/service_utility.h> 45 #include <utils/String8.h> 46 #include <utils/Timers.h> 47 #include <utils/Tokenizer.h> 48 #include <utils/Trace.h> 49 #include <android-base/file.h> 50 #include <android-base/macros.h> 51 #include <android-base/properties.h> 52 #include <android-base/stringprintf.h> 53 54 using namespace android; 55 using pdx::default_transport::ServiceUtility; 56 using hardware::hidl_vec; 57 using hardware::hidl_string; 58 using hardware::Return; 59 using hardware::atrace::V1_0::IAtraceDevice; 60 using hardware::atrace::V1_0::Status; 61 using hardware::atrace::V1_0::toString; 62 63 using std::string; 64 65 #define MAX_SYS_FILES 11 66 67 const char* k_traceTagsProperty = "debug.atrace.tags.enableflags"; 68 const char* k_userInitiatedTraceProperty = "debug.atrace.user_initiated"; 69 70 const char* k_traceAppsNumberProperty = "debug.atrace.app_number"; 71 const char* k_traceAppsPropertyTemplate = "debug.atrace.app_%d"; 72 const char* k_coreServiceCategory = "core_services"; 73 const char* k_pdxServiceCategory = "pdx"; 74 const char* k_coreServicesProp = "ro.atrace.core.services"; 75 76 typedef enum { OPT, REQ } requiredness ; 77 78 struct TracingCategory { 79 // The name identifying the category. 80 const char* name; 81 82 // A longer description of the category. 83 const char* longname; 84 85 // The userland tracing tags that the category enables. 86 uint64_t tags; 87 88 // The fname==NULL terminated list of /sys/ files that the category 89 // enables. 90 struct { 91 // Whether the file must be writable in order to enable the tracing 92 // category. 93 requiredness required; 94 95 // The path to the enable file. 96 const char* path; 97 } sysfiles[MAX_SYS_FILES]; 98 }; 99 100 /* Tracing categories */ 101 static const TracingCategory k_categories[] = { 102 { "gfx", "Graphics", ATRACE_TAG_GRAPHICS, { } }, 103 { "input", "Input", ATRACE_TAG_INPUT, { } }, 104 { "view", "View System", ATRACE_TAG_VIEW, { } }, 105 { "webview", "WebView", ATRACE_TAG_WEBVIEW, { } }, 106 { "wm", "Window Manager", ATRACE_TAG_WINDOW_MANAGER, { } }, 107 { "am", "Activity Manager", ATRACE_TAG_ACTIVITY_MANAGER, { } }, 108 { "sm", "Sync Manager", ATRACE_TAG_SYNC_MANAGER, { } }, 109 { "audio", "Audio", ATRACE_TAG_AUDIO, { } }, 110 { "video", "Video", ATRACE_TAG_VIDEO, { } }, 111 { "camera", "Camera", ATRACE_TAG_CAMERA, { } }, 112 { "hal", "Hardware Modules", ATRACE_TAG_HAL, { } }, 113 { "res", "Resource Loading", ATRACE_TAG_RESOURCES, { } }, 114 { "dalvik", "Dalvik VM", ATRACE_TAG_DALVIK, { } }, 115 { "rs", "RenderScript", ATRACE_TAG_RS, { } }, 116 { "bionic", "Bionic C Library", ATRACE_TAG_BIONIC, { } }, 117 { "power", "Power Management", ATRACE_TAG_POWER, { } }, 118 { "pm", "Package Manager", ATRACE_TAG_PACKAGE_MANAGER, { } }, 119 { "ss", "System Server", ATRACE_TAG_SYSTEM_SERVER, { } }, 120 { "database", "Database", ATRACE_TAG_DATABASE, { } }, 121 { "network", "Network", ATRACE_TAG_NETWORK, { } }, 122 { "adb", "ADB", ATRACE_TAG_ADB, { } }, 123 { "vibrator", "Vibrator", ATRACE_TAG_VIBRATOR, { } }, 124 { "aidl", "AIDL calls", ATRACE_TAG_AIDL, { } }, 125 { "nnapi", "NNAPI", ATRACE_TAG_NNAPI, { } }, 126 { "rro", "Runtime Resource Overlay", ATRACE_TAG_RRO, { } }, 127 { k_coreServiceCategory, "Core services", 0, { } }, 128 { k_pdxServiceCategory, "PDX services", 0, { } }, 129 { "sched", "CPU Scheduling", 0, { 130 { REQ, "events/sched/sched_switch/enable" }, 131 { REQ, "events/sched/sched_wakeup/enable" }, 132 { OPT, "events/sched/sched_waking/enable" }, 133 { OPT, "events/sched/sched_blocked_reason/enable" }, 134 { OPT, "events/sched/sched_cpu_hotplug/enable" }, 135 { OPT, "events/sched/sched_pi_setprio/enable" }, 136 { OPT, "events/sched/sched_process_exit/enable" }, 137 { OPT, "events/cgroup/enable" }, 138 { OPT, "events/oom/oom_score_adj_update/enable" }, 139 { OPT, "events/task/task_rename/enable" }, 140 { OPT, "events/task/task_newtask/enable" }, 141 } }, 142 { "irq", "IRQ Events", 0, { 143 { REQ, "events/irq/enable" }, 144 { OPT, "events/ipi/enable" }, 145 } }, 146 { "irqoff", "IRQ-disabled code section tracing", 0, { 147 { REQ, "events/preemptirq/irq_enable/enable" }, 148 { REQ, "events/preemptirq/irq_disable/enable" }, 149 } }, 150 { "preemptoff", "Preempt-disabled code section tracing", 0, { 151 { REQ, "events/preemptirq/preempt_enable/enable" }, 152 { REQ, "events/preemptirq/preempt_disable/enable" }, 153 } }, 154 { "i2c", "I2C Events", 0, { 155 { REQ, "events/i2c/enable" }, 156 { REQ, "events/i2c/i2c_read/enable" }, 157 { REQ, "events/i2c/i2c_write/enable" }, 158 { REQ, "events/i2c/i2c_result/enable" }, 159 { REQ, "events/i2c/i2c_reply/enable" }, 160 { OPT, "events/i2c/smbus_read/enable" }, 161 { OPT, "events/i2c/smbus_write/enable" }, 162 { OPT, "events/i2c/smbus_result/enable" }, 163 { OPT, "events/i2c/smbus_reply/enable" }, 164 } }, 165 { "freq", "CPU Frequency", 0, { 166 { REQ, "events/power/cpu_frequency/enable" }, 167 { OPT, "events/power/clock_set_rate/enable" }, 168 { OPT, "events/power/clock_disable/enable" }, 169 { OPT, "events/power/clock_enable/enable" }, 170 { OPT, "events/clk/clk_set_rate/enable" }, 171 { OPT, "events/clk/clk_disable/enable" }, 172 { OPT, "events/clk/clk_enable/enable" }, 173 { OPT, "events/power/cpu_frequency_limits/enable" }, 174 } }, 175 { "membus", "Memory Bus Utilization", 0, { 176 { REQ, "events/memory_bus/enable" }, 177 } }, 178 { "idle", "CPU Idle", 0, { 179 { REQ, "events/power/cpu_idle/enable" }, 180 } }, 181 { "disk", "Disk I/O", 0, { 182 { OPT, "events/f2fs/f2fs_sync_file_enter/enable" }, 183 { OPT, "events/f2fs/f2fs_sync_file_exit/enable" }, 184 { OPT, "events/f2fs/f2fs_write_begin/enable" }, 185 { OPT, "events/f2fs/f2fs_write_end/enable" }, 186 { OPT, "events/ext4/ext4_da_write_begin/enable" }, 187 { OPT, "events/ext4/ext4_da_write_end/enable" }, 188 { OPT, "events/ext4/ext4_sync_file_enter/enable" }, 189 { OPT, "events/ext4/ext4_sync_file_exit/enable" }, 190 { REQ, "events/block/block_rq_issue/enable" }, 191 { REQ, "events/block/block_rq_complete/enable" }, 192 } }, 193 { "mmc", "eMMC commands", 0, { 194 { REQ, "events/mmc/enable" }, 195 } }, 196 { "load", "CPU Load", 0, { 197 { REQ, "events/cpufreq_interactive/enable" }, 198 } }, 199 { "sync", "Synchronization", 0, { 200 // linux kernel < 4.9 201 { OPT, "events/sync/enable" }, 202 // linux kernel == 4.9.x 203 { OPT, "events/fence/enable" }, 204 // linux kernel > 4.9 205 { OPT, "events/dma_fence/enable" }, 206 } }, 207 { "workq", "Kernel Workqueues", 0, { 208 { REQ, "events/workqueue/enable" }, 209 } }, 210 { "memreclaim", "Kernel Memory Reclaim", 0, { 211 { REQ, "events/vmscan/mm_vmscan_direct_reclaim_begin/enable" }, 212 { REQ, "events/vmscan/mm_vmscan_direct_reclaim_end/enable" }, 213 { REQ, "events/vmscan/mm_vmscan_kswapd_wake/enable" }, 214 { REQ, "events/vmscan/mm_vmscan_kswapd_sleep/enable" }, 215 { OPT, "events/lowmemorykiller/enable" }, 216 } }, 217 { "regulators", "Voltage and Current Regulators", 0, { 218 { REQ, "events/regulator/enable" }, 219 } }, 220 { "binder_driver", "Binder Kernel driver", 0, { 221 { REQ, "events/binder/binder_transaction/enable" }, 222 { REQ, "events/binder/binder_transaction_received/enable" }, 223 { REQ, "events/binder/binder_transaction_alloc_buf/enable" }, 224 { OPT, "events/binder/binder_set_priority/enable" }, 225 } }, 226 { "binder_lock", "Binder global lock trace", 0, { 227 { OPT, "events/binder/binder_lock/enable" }, 228 { OPT, "events/binder/binder_locked/enable" }, 229 { OPT, "events/binder/binder_unlock/enable" }, 230 } }, 231 { "pagecache", "Page cache", 0, { 232 { REQ, "events/filemap/enable" }, 233 } }, 234 { "memory", "Memory", 0, { 235 { OPT, "events/kmem/rss_stat/enable" }, 236 { OPT, "events/kmem/ion_heap_grow/enable" }, 237 { OPT, "events/kmem/ion_heap_shrink/enable" }, 238 } }, 239 }; 240 241 struct TracingVendorCategory { 242 // The name identifying the category. 243 std::string name; 244 245 // A longer description of the category. 246 std::string description; 247 248 // If the category is enabled through command. 249 bool enabled; 250 251 TracingVendorCategory(string &&name, string &&description, bool enabled) 252 : name(std::move(name)) 253 , description(std::move(description)) 254 , enabled(enabled) 255 {} 256 }; 257 258 /* Command line options */ 259 static int g_traceDurationSeconds = 5; 260 static bool g_traceOverwrite = false; 261 static int g_traceBufferSizeKB = 2048; 262 static bool g_compress = false; 263 static bool g_nohup = false; 264 static int g_initialSleepSecs = 0; 265 static const char* g_categoriesFile = nullptr; 266 static const char* g_kernelTraceFuncs = nullptr; 267 static const char* g_debugAppCmdLine = ""; 268 static const char* g_outputFile = nullptr; 269 270 /* Global state */ 271 static bool g_tracePdx = false; 272 static bool g_traceAborted = false; 273 static bool g_categoryEnables[arraysize(k_categories)] = {}; 274 static std::string g_traceFolder; 275 static sp<IAtraceDevice> g_atraceHal; 276 static std::vector<TracingVendorCategory> g_vendorCategories; 277 278 /* Sys file paths */ 279 static const char* k_traceClockPath = 280 "trace_clock"; 281 282 static const char* k_traceBufferSizePath = 283 "buffer_size_kb"; 284 285 #if 0 286 // TODO: Re-enable after stabilization 287 static const char* k_traceCmdlineSizePath = 288 "saved_cmdlines_size"; 289 #endif 290 291 static const char* k_tracingOverwriteEnablePath = 292 "options/overwrite"; 293 294 static const char* k_currentTracerPath = 295 "current_tracer"; 296 297 static const char* k_printTgidPath = 298 "options/print-tgid"; 299 300 static const char* k_recordTgidPath = 301 "options/record-tgid"; 302 303 static const char* k_funcgraphAbsTimePath = 304 "options/funcgraph-abstime"; 305 306 static const char* k_funcgraphCpuPath = 307 "options/funcgraph-cpu"; 308 309 static const char* k_funcgraphProcPath = 310 "options/funcgraph-proc"; 311 312 static const char* k_funcgraphFlatPath = 313 "options/funcgraph-flat"; 314 315 static const char* k_ftraceFilterPath = 316 "set_ftrace_filter"; 317 318 static const char* k_tracingOnPath = 319 "tracing_on"; 320 321 static const char* k_tracePath = 322 "trace"; 323 324 static const char* k_traceStreamPath = 325 "trace_pipe"; 326 327 static const char* k_traceMarkerPath = 328 "trace_marker"; 329 330 // Check whether a file exists. 331 static bool fileExists(const char* filename) { 332 return access((g_traceFolder + filename).c_str(), F_OK) != -1; 333 } 334 335 // Check whether a file is writable. 336 static bool fileIsWritable(const char* filename) { 337 return access((g_traceFolder + filename).c_str(), W_OK) != -1; 338 } 339 340 // Truncate a file. 341 static bool truncateFile(const char* path) 342 { 343 // This uses creat rather than truncate because some of the debug kernel 344 // device nodes (e.g. k_ftraceFilterPath) currently aren't changed by 345 // calls to truncate, but they are cleared by calls to creat. 346 int traceFD = creat((g_traceFolder + path).c_str(), 0); 347 if (traceFD == -1) { 348 fprintf(stderr, "error truncating %s: %s (%d)\n", (g_traceFolder + path).c_str(), 349 strerror(errno), errno); 350 return false; 351 } 352 353 close(traceFD); 354 355 return true; 356 } 357 358 static bool _writeStr(const char* filename, const char* str, int flags) 359 { 360 std::string fullFilename = g_traceFolder + filename; 361 int fd = open(fullFilename.c_str(), flags); 362 if (fd == -1) { 363 fprintf(stderr, "error opening %s: %s (%d)\n", fullFilename.c_str(), 364 strerror(errno), errno); 365 return false; 366 } 367 368 bool ok = true; 369 ssize_t len = strlen(str); 370 if (write(fd, str, len) != len) { 371 fprintf(stderr, "error writing to %s: %s (%d)\n", fullFilename.c_str(), 372 strerror(errno), errno); 373 ok = false; 374 } 375 376 close(fd); 377 378 return ok; 379 } 380 381 // Write a string to a file, returning true if the write was successful. 382 static bool writeStr(const char* filename, const char* str) 383 { 384 return _writeStr(filename, str, O_WRONLY); 385 } 386 387 // Append a string to a file, returning true if the write was successful. 388 static bool appendStr(const char* filename, const char* str) 389 { 390 return _writeStr(filename, str, O_APPEND|O_WRONLY); 391 } 392 393 static void writeClockSyncMarker() 394 { 395 char buffer[128]; 396 int len = 0; 397 int fd = open((g_traceFolder + k_traceMarkerPath).c_str(), O_WRONLY); 398 if (fd == -1) { 399 fprintf(stderr, "error opening %s: %s (%d)\n", k_traceMarkerPath, 400 strerror(errno), errno); 401 return; 402 } 403 float now_in_seconds = systemTime(CLOCK_MONOTONIC) / 1000000000.0f; 404 405 len = snprintf(buffer, 128, "trace_event_clock_sync: parent_ts=%f\n", now_in_seconds); 406 if (write(fd, buffer, len) != len) { 407 fprintf(stderr, "error writing clock sync marker %s (%d)\n", strerror(errno), errno); 408 } 409 410 int64_t realtime_in_ms = systemTime(CLOCK_REALTIME) / 1000000; 411 len = snprintf(buffer, 128, "trace_event_clock_sync: realtime_ts=%" PRId64 "\n", realtime_in_ms); 412 if (write(fd, buffer, len) != len) { 413 fprintf(stderr, "error writing clock sync marker %s (%d)\n", strerror(errno), errno); 414 } 415 416 close(fd); 417 } 418 419 // Enable or disable a kernel option by writing a "1" or a "0" into a /sys 420 // file. 421 static bool setKernelOptionEnable(const char* filename, bool enable) 422 { 423 return writeStr(filename, enable ? "1" : "0"); 424 } 425 426 // Check whether the category is supported on the device with the current 427 // rootness. A category is supported only if all its required /sys/ files are 428 // writable and if enabling the category will enable one or more tracing tags 429 // or /sys/ files. 430 static bool isCategorySupported(const TracingCategory& category) 431 { 432 if (strcmp(category.name, k_coreServiceCategory) == 0) { 433 return !android::base::GetProperty(k_coreServicesProp, "").empty(); 434 } 435 436 if (strcmp(category.name, k_pdxServiceCategory) == 0) { 437 return true; 438 } 439 440 bool ok = category.tags != 0; 441 for (int i = 0; i < MAX_SYS_FILES; i++) { 442 const char* path = category.sysfiles[i].path; 443 bool req = category.sysfiles[i].required == REQ; 444 if (path != nullptr) { 445 if (fileIsWritable(path)) { 446 ok = true; 447 } else if (req) { 448 return false; 449 } 450 } 451 } 452 return ok; 453 } 454 455 // Check whether the category would be supported on the device if the user 456 // were root. This function assumes that root is able to write to any file 457 // that exists. It performs the same logic as isCategorySupported, but it 458 // uses file existence rather than writability in the /sys/ file checks. 459 static bool isCategorySupportedForRoot(const TracingCategory& category) 460 { 461 bool ok = category.tags != 0; 462 for (int i = 0; i < MAX_SYS_FILES; i++) { 463 const char* path = category.sysfiles[i].path; 464 bool req = category.sysfiles[i].required == REQ; 465 if (path != nullptr) { 466 if (req) { 467 if (!fileExists(path)) { 468 return false; 469 } else { 470 ok = true; 471 } 472 } else { 473 ok |= fileExists(path); 474 } 475 } 476 } 477 return ok; 478 } 479 480 // Enable or disable overwriting of the kernel trace buffers. Disabling this 481 // will cause tracing to stop once the trace buffers have filled up. 482 static bool setTraceOverwriteEnable(bool enable) 483 { 484 return setKernelOptionEnable(k_tracingOverwriteEnablePath, enable); 485 } 486 487 // Set the user initiated trace property 488 static bool setUserInitiatedTraceProperty(bool enable) 489 { 490 if (!android::base::SetProperty(k_userInitiatedTraceProperty, enable ? "1" : "")) { 491 fprintf(stderr, "error setting user initiated strace system property\n"); 492 return false; 493 } 494 return true; 495 } 496 497 // Enable or disable kernel tracing. 498 static bool setTracingEnabled(bool enable) 499 { 500 return setKernelOptionEnable(k_tracingOnPath, enable); 501 } 502 503 // Clear the contents of the kernel trace. 504 static bool clearTrace() 505 { 506 return truncateFile(k_tracePath); 507 } 508 509 // Set the size of the kernel's trace buffer in kilobytes. 510 static bool setTraceBufferSizeKB(int size) 511 { 512 char str[32] = "1"; 513 if (size < 1) { 514 size = 1; 515 } 516 snprintf(str, 32, "%d", size); 517 return writeStr(k_traceBufferSizePath, str); 518 } 519 520 #if 0 521 // TODO: Re-enable after stabilization 522 // Set the default size of cmdline hashtable 523 static bool setCmdlineSize() 524 { 525 if (fileExists(k_traceCmdlineSizePath)) { 526 return writeStr(k_traceCmdlineSizePath, "8192"); 527 } 528 return true; 529 } 530 #endif 531 532 // Set the clock to the best available option while tracing. Use 'boot' if it's 533 // available; otherwise, use 'mono'. If neither are available use 'global'. 534 // Any write to the trace_clock sysfs file will reset the buffer, so only 535 // update it if the requested value is not the current value. 536 static bool setClock() 537 { 538 std::ifstream clockFile((g_traceFolder + k_traceClockPath).c_str(), O_RDONLY); 539 std::string clockStr((std::istreambuf_iterator<char>(clockFile)), 540 std::istreambuf_iterator<char>()); 541 542 std::string newClock; 543 if (clockStr.find("boot") != std::string::npos) { 544 newClock = "boot"; 545 } else if (clockStr.find("mono") != std::string::npos) { 546 newClock = "mono"; 547 } else { 548 newClock = "global"; 549 } 550 551 size_t begin = clockStr.find('[') + 1; 552 size_t end = clockStr.find(']'); 553 if (newClock.compare(0, std::string::npos, clockStr, begin, end-begin) == 0) { 554 return true; 555 } 556 return writeStr(k_traceClockPath, newClock.c_str()); 557 } 558 559 static bool setPrintTgidEnableIfPresent(bool enable) 560 { 561 // Pre-4.13 this was options/print-tgid as an android-specific option. 562 // In 4.13+ this is an upstream option called options/record-tgid 563 // Both options produce the same ftrace format change 564 if (fileExists(k_printTgidPath)) { 565 return setKernelOptionEnable(k_printTgidPath, enable); 566 } 567 if (fileExists(k_recordTgidPath)) { 568 return setKernelOptionEnable(k_recordTgidPath, enable); 569 } 570 return true; 571 } 572 573 // Poke all the binder-enabled processes in the system to get them to re-read 574 // their system properties. 575 static bool pokeBinderServices() 576 { 577 sp<IServiceManager> sm = defaultServiceManager(); 578 Vector<String16> services = sm->listServices(); 579 for (size_t i = 0; i < services.size(); i++) { 580 sp<IBinder> obj = sm->checkService(services[i]); 581 if (obj != nullptr) { 582 Parcel data; 583 if (obj->transact(IBinder::SYSPROPS_TRANSACTION, data, 584 nullptr, 0) != OK) { 585 if (false) { 586 // XXX: For some reason this fails on tablets trying to 587 // poke the "phone" service. It's not clear whether some 588 // are expected to fail. 589 String8 svc(services[i]); 590 fprintf(stderr, "error poking binder service %s\n", 591 svc.string()); 592 return false; 593 } 594 } 595 } 596 } 597 return true; 598 } 599 600 // Poke all the HAL processes in the system to get them to re-read 601 // their system properties. 602 static void pokeHalServices() 603 { 604 using ::android::hidl::base::V1_0::IBase; 605 using ::android::hidl::manager::V1_0::IServiceManager; 606 using ::android::hardware::hidl_string; 607 using ::android::hardware::Return; 608 609 sp<IServiceManager> sm = ::android::hardware::defaultServiceManager(); 610 611 if (sm == nullptr) { 612 fprintf(stderr, "failed to get IServiceManager to poke hal services\n"); 613 return; 614 } 615 616 auto listRet = sm->list([&](const auto &interfaces) { 617 for (size_t i = 0; i < interfaces.size(); i++) { 618 string fqInstanceName = interfaces[i]; 619 string::size_type n = fqInstanceName.find('/'); 620 if (n == std::string::npos || interfaces[i].size() == n+1) 621 continue; 622 hidl_string fqInterfaceName = fqInstanceName.substr(0, n); 623 hidl_string instanceName = fqInstanceName.substr(n+1, std::string::npos); 624 Return<sp<IBase>> interfaceRet = sm->get(fqInterfaceName, instanceName); 625 if (!interfaceRet.isOk()) { 626 // ignore 627 continue; 628 } 629 630 sp<IBase> interface = interfaceRet; 631 if (interface == nullptr) { 632 // ignore 633 continue; 634 } 635 636 auto notifyRet = interface->notifySyspropsChanged(); 637 if (!notifyRet.isOk()) { 638 // ignore 639 } 640 } 641 }); 642 if (!listRet.isOk()) { 643 // TODO(b/34242478) fix this when we determine the correct ACL 644 //fprintf(stderr, "failed to list services: %s\n", listRet.description().c_str()); 645 } 646 } 647 648 // Set the trace tags that userland tracing uses, and poke the running 649 // processes to pick up the new value. 650 static bool setTagsProperty(uint64_t tags) 651 { 652 std::string value = android::base::StringPrintf("%#" PRIx64, tags); 653 if (!android::base::SetProperty(k_traceTagsProperty, value)) { 654 fprintf(stderr, "error setting trace tags system property\n"); 655 return false; 656 } 657 return true; 658 } 659 660 static void clearAppProperties() 661 { 662 if (!android::base::SetProperty(k_traceAppsNumberProperty, "")) { 663 fprintf(stderr, "failed to clear system property: %s", 664 k_traceAppsNumberProperty); 665 } 666 } 667 668 // Set the system property that indicates which apps should perform 669 // application-level tracing. 670 static bool setAppCmdlineProperty(char* cmdline) 671 { 672 int i = 0; 673 char* start = cmdline; 674 while (start != nullptr) { 675 char* end = strchr(start, ','); 676 if (end != nullptr) { 677 *end = '\0'; 678 end++; 679 } 680 std::string key = android::base::StringPrintf(k_traceAppsPropertyTemplate, i); 681 if (!android::base::SetProperty(key, start)) { 682 fprintf(stderr, "error setting trace app %d property to %s\n", i, key.c_str()); 683 clearAppProperties(); 684 return false; 685 } 686 start = end; 687 i++; 688 } 689 690 std::string value = android::base::StringPrintf("%d", i); 691 if (!android::base::SetProperty(k_traceAppsNumberProperty, value)) { 692 fprintf(stderr, "error setting trace app number property to %s\n", value.c_str()); 693 clearAppProperties(); 694 return false; 695 } 696 return true; 697 } 698 699 // Disable all /sys/ enable files. 700 static bool disableKernelTraceEvents() { 701 bool ok = true; 702 for (size_t i = 0; i < arraysize(k_categories); i++) { 703 const TracingCategory &c = k_categories[i]; 704 for (int j = 0; j < MAX_SYS_FILES; j++) { 705 const char* path = c.sysfiles[j].path; 706 if (path != nullptr && fileIsWritable(path)) { 707 ok &= setKernelOptionEnable(path, false); 708 } 709 } 710 } 711 return ok; 712 } 713 714 // Verify that the comma separated list of functions are being traced by the 715 // kernel. 716 static bool verifyKernelTraceFuncs(const char* funcs) 717 { 718 std::string buf; 719 if (!android::base::ReadFileToString(g_traceFolder + k_ftraceFilterPath, &buf)) { 720 fprintf(stderr, "error opening %s: %s (%d)\n", k_ftraceFilterPath, 721 strerror(errno), errno); 722 return false; 723 } 724 725 String8 funcList = String8::format("\n%s",buf.c_str()); 726 727 // Make sure that every function listed in funcs is in the list we just 728 // read from the kernel, except for wildcard inputs. 729 bool ok = true; 730 char* myFuncs = strdup(funcs); 731 char* func = strtok(myFuncs, ","); 732 while (func) { 733 if (!strchr(func, '*')) { 734 String8 fancyFunc = String8::format("\n%s\n", func); 735 bool found = funcList.find(fancyFunc.string(), 0) >= 0; 736 if (!found || func[0] == '\0') { 737 fprintf(stderr, "error: \"%s\" is not a valid kernel function " 738 "to trace.\n", func); 739 ok = false; 740 } 741 } 742 func = strtok(nullptr, ","); 743 } 744 free(myFuncs); 745 return ok; 746 } 747 748 // Set the comma separated list of functions that the kernel is to trace. 749 static bool setKernelTraceFuncs(const char* funcs) 750 { 751 bool ok = true; 752 753 if (funcs == nullptr || funcs[0] == '\0') { 754 // Disable kernel function tracing. 755 if (fileIsWritable(k_currentTracerPath)) { 756 ok &= writeStr(k_currentTracerPath, "nop"); 757 } 758 if (fileIsWritable(k_ftraceFilterPath)) { 759 ok &= truncateFile(k_ftraceFilterPath); 760 } 761 } else { 762 // Enable kernel function tracing. 763 ok &= writeStr(k_currentTracerPath, "function_graph"); 764 ok &= setKernelOptionEnable(k_funcgraphAbsTimePath, true); 765 ok &= setKernelOptionEnable(k_funcgraphCpuPath, true); 766 ok &= setKernelOptionEnable(k_funcgraphProcPath, true); 767 ok &= setKernelOptionEnable(k_funcgraphFlatPath, true); 768 769 // Set the requested filter functions. 770 ok &= truncateFile(k_ftraceFilterPath); 771 char* myFuncs = strdup(funcs); 772 char* func = strtok(myFuncs, ","); 773 while (func) { 774 ok &= appendStr(k_ftraceFilterPath, func); 775 func = strtok(nullptr, ","); 776 } 777 free(myFuncs); 778 779 // Verify that the set functions are being traced. 780 if (ok) { 781 ok &= verifyKernelTraceFuncs(funcs); 782 } 783 } 784 785 return ok; 786 } 787 788 static bool setCategoryEnable(const char* name) 789 { 790 bool vendor_found = false; 791 for (auto &c : g_vendorCategories) { 792 if (strcmp(name, c.name.c_str()) == 0) { 793 c.enabled = true; 794 vendor_found = true; 795 } 796 } 797 for (size_t i = 0; i < arraysize(k_categories); i++) { 798 const TracingCategory& c = k_categories[i]; 799 if (strcmp(name, c.name) == 0) { 800 if (isCategorySupported(c)) { 801 g_categoryEnables[i] = true; 802 return true; 803 } else { 804 if (isCategorySupportedForRoot(c)) { 805 fprintf(stderr, "error: category \"%s\" requires root " 806 "privileges.\n", name); 807 } else { 808 fprintf(stderr, "error: category \"%s\" is not supported " 809 "on this device.\n", name); 810 } 811 return false; 812 } 813 } 814 } 815 if (vendor_found) { 816 return true; 817 } 818 fprintf(stderr, "error: unknown tracing category \"%s\"\n", name); 819 return false; 820 } 821 822 static bool setCategoriesEnableFromFile(const char* categories_file) 823 { 824 if (!categories_file) { 825 return true; 826 } 827 Tokenizer* tokenizer = nullptr; 828 if (Tokenizer::open(String8(categories_file), &tokenizer) != NO_ERROR) { 829 return false; 830 } 831 bool ok = true; 832 while (!tokenizer->isEol()) { 833 String8 token = tokenizer->nextToken(" "); 834 if (token.isEmpty()) { 835 tokenizer->skipDelimiters(" "); 836 continue; 837 } 838 ok &= setCategoryEnable(token.string()); 839 } 840 delete tokenizer; 841 return ok; 842 } 843 844 static bool setUpUserspaceTracing() 845 { 846 bool ok = true; 847 848 // Set up the tags property. 849 uint64_t tags = 0; 850 for (size_t i = 0; i < arraysize(k_categories); i++) { 851 if (g_categoryEnables[i]) { 852 const TracingCategory &c = k_categories[i]; 853 tags |= c.tags; 854 } 855 } 856 ok &= setTagsProperty(tags); 857 858 bool coreServicesTagEnabled = false; 859 for (size_t i = 0; i < arraysize(k_categories); i++) { 860 if (strcmp(k_categories[i].name, k_coreServiceCategory) == 0) { 861 coreServicesTagEnabled = g_categoryEnables[i]; 862 } 863 864 // Set whether to poke PDX services in this session. 865 if (strcmp(k_categories[i].name, k_pdxServiceCategory) == 0) { 866 g_tracePdx = g_categoryEnables[i]; 867 } 868 } 869 870 std::string packageList(g_debugAppCmdLine); 871 if (coreServicesTagEnabled) { 872 if (!packageList.empty()) { 873 packageList += ","; 874 } 875 packageList += android::base::GetProperty(k_coreServicesProp, ""); 876 } 877 ok &= setAppCmdlineProperty(&packageList[0]); 878 ok &= pokeBinderServices(); 879 pokeHalServices(); 880 881 if (g_tracePdx) { 882 ok &= ServiceUtility::PokeServices(); 883 } 884 885 return ok; 886 } 887 888 static void cleanUpUserspaceTracing() 889 { 890 setTagsProperty(0); 891 clearAppProperties(); 892 pokeBinderServices(); 893 pokeHalServices(); 894 895 if (g_tracePdx) { 896 ServiceUtility::PokeServices(); 897 } 898 } 899 900 901 // Set all the kernel tracing settings to the desired state for this trace 902 // capture. 903 static bool setUpKernelTracing() 904 { 905 bool ok = true; 906 907 ok &= setUserInitiatedTraceProperty(true); 908 909 // Set up the tracing options. 910 ok &= setCategoriesEnableFromFile(g_categoriesFile); 911 ok &= setTraceOverwriteEnable(g_traceOverwrite); 912 ok &= setTraceBufferSizeKB(g_traceBufferSizeKB); 913 // TODO: Re-enable after stabilization 914 //ok &= setCmdlineSize(); 915 ok &= setClock(); 916 ok &= setPrintTgidEnableIfPresent(true); 917 ok &= setKernelTraceFuncs(g_kernelTraceFuncs); 918 919 // Disable all the sysfs enables. This is done as a separate loop from 920 // the enables to allow the same enable to exist in multiple categories. 921 ok &= disableKernelTraceEvents(); 922 923 // Enable all the sysfs enables that are in an enabled category. 924 for (size_t i = 0; i < arraysize(k_categories); i++) { 925 if (g_categoryEnables[i]) { 926 const TracingCategory &c = k_categories[i]; 927 for (int j = 0; j < MAX_SYS_FILES; j++) { 928 const char* path = c.sysfiles[j].path; 929 bool required = c.sysfiles[j].required == REQ; 930 if (path != nullptr) { 931 if (fileIsWritable(path)) { 932 ok &= setKernelOptionEnable(path, true); 933 } else if (required) { 934 fprintf(stderr, "error writing file %s\n", path); 935 ok = false; 936 } 937 } 938 } 939 } 940 } 941 942 return ok; 943 } 944 945 // Reset all the kernel tracing settings to their default state. 946 static void cleanUpKernelTracing() 947 { 948 // Disable all tracing that we're able to. 949 disableKernelTraceEvents(); 950 951 // Set the options back to their defaults. 952 setTraceOverwriteEnable(true); 953 setTraceBufferSizeKB(1); 954 setPrintTgidEnableIfPresent(false); 955 setKernelTraceFuncs(nullptr); 956 setUserInitiatedTraceProperty(false); 957 } 958 959 // Enable tracing in the kernel. 960 static bool startTrace() 961 { 962 return setTracingEnabled(true); 963 } 964 965 // Disable tracing in the kernel. 966 static void stopTrace() 967 { 968 setTracingEnabled(false); 969 } 970 971 // Read data from the tracing pipe and forward to stdout 972 static void streamTrace() 973 { 974 char trace_data[4096]; 975 int traceFD = open((g_traceFolder + k_traceStreamPath).c_str(), O_RDWR); 976 if (traceFD == -1) { 977 fprintf(stderr, "error opening %s: %s (%d)\n", k_traceStreamPath, 978 strerror(errno), errno); 979 return; 980 } 981 while (!g_traceAborted) { 982 ssize_t bytes_read = read(traceFD, trace_data, 4096); 983 if (bytes_read > 0) { 984 write(STDOUT_FILENO, trace_data, bytes_read); 985 fflush(stdout); 986 } else { 987 if (!g_traceAborted) { 988 fprintf(stderr, "read returned %zd bytes err %d (%s)\n", 989 bytes_read, errno, strerror(errno)); 990 } 991 break; 992 } 993 } 994 } 995 996 // Read the current kernel trace and write it to stdout. 997 static void dumpTrace(int outFd) 998 { 999 ALOGI("Dumping trace"); 1000 int traceFD = open((g_traceFolder + k_tracePath).c_str(), O_RDWR); 1001 if (traceFD == -1) { 1002 fprintf(stderr, "error opening %s: %s (%d)\n", k_tracePath, 1003 strerror(errno), errno); 1004 return; 1005 } 1006 1007 if (g_compress) { 1008 z_stream zs; 1009 memset(&zs, 0, sizeof(zs)); 1010 1011 int result = deflateInit(&zs, Z_DEFAULT_COMPRESSION); 1012 if (result != Z_OK) { 1013 fprintf(stderr, "error initializing zlib: %d\n", result); 1014 close(traceFD); 1015 return; 1016 } 1017 1018 constexpr size_t bufSize = 64*1024; 1019 std::unique_ptr<uint8_t> in(new uint8_t[bufSize]); 1020 std::unique_ptr<uint8_t> out(new uint8_t[bufSize]); 1021 if (!in || !out) { 1022 fprintf(stderr, "couldn't allocate buffers\n"); 1023 close(traceFD); 1024 return; 1025 } 1026 1027 int flush = Z_NO_FLUSH; 1028 1029 zs.next_out = reinterpret_cast<Bytef*>(out.get()); 1030 zs.avail_out = bufSize; 1031 1032 do { 1033 1034 if (zs.avail_in == 0) { 1035 // More input is needed. 1036 result = read(traceFD, in.get(), bufSize); 1037 if (result < 0) { 1038 fprintf(stderr, "error reading trace: %s (%d)\n", 1039 strerror(errno), errno); 1040 result = Z_STREAM_END; 1041 break; 1042 } else if (result == 0) { 1043 flush = Z_FINISH; 1044 } else { 1045 zs.next_in = reinterpret_cast<Bytef*>(in.get()); 1046 zs.avail_in = result; 1047 } 1048 } 1049 1050 if (zs.avail_out == 0) { 1051 // Need to write the output. 1052 result = write(outFd, out.get(), bufSize); 1053 if ((size_t)result < bufSize) { 1054 fprintf(stderr, "error writing deflated trace: %s (%d)\n", 1055 strerror(errno), errno); 1056 result = Z_STREAM_END; // skip deflate error message 1057 zs.avail_out = bufSize; // skip the final write 1058 break; 1059 } 1060 zs.next_out = reinterpret_cast<Bytef*>(out.get()); 1061 zs.avail_out = bufSize; 1062 } 1063 1064 } while ((result = deflate(&zs, flush)) == Z_OK); 1065 1066 if (result != Z_STREAM_END) { 1067 fprintf(stderr, "error deflating trace: %s\n", zs.msg); 1068 } 1069 1070 if (zs.avail_out < bufSize) { 1071 size_t bytes = bufSize - zs.avail_out; 1072 result = write(outFd, out.get(), bytes); 1073 if ((size_t)result < bytes) { 1074 fprintf(stderr, "error writing deflated trace: %s (%d)\n", 1075 strerror(errno), errno); 1076 } 1077 } 1078 1079 result = deflateEnd(&zs); 1080 if (result != Z_OK) { 1081 fprintf(stderr, "error cleaning up zlib: %d\n", result); 1082 } 1083 } else { 1084 char buf[4096]; 1085 ssize_t rc; 1086 while ((rc = TEMP_FAILURE_RETRY(read(traceFD, buf, sizeof(buf)))) > 0) { 1087 if (!android::base::WriteFully(outFd, buf, rc)) { 1088 fprintf(stderr, "error writing trace: %s\n", strerror(errno)); 1089 break; 1090 } 1091 } 1092 if (rc == -1) { 1093 fprintf(stderr, "error dumping trace: %s\n", strerror(errno)); 1094 } 1095 } 1096 1097 close(traceFD); 1098 } 1099 1100 static void handleSignal(int /*signo*/) 1101 { 1102 if (!g_nohup) { 1103 g_traceAborted = true; 1104 } 1105 } 1106 1107 static void registerSigHandler() 1108 { 1109 struct sigaction sa; 1110 sigemptyset(&sa.sa_mask); 1111 sa.sa_flags = 0; 1112 sa.sa_handler = handleSignal; 1113 sigaction(SIGHUP, &sa, nullptr); 1114 sigaction(SIGINT, &sa, nullptr); 1115 sigaction(SIGQUIT, &sa, nullptr); 1116 sigaction(SIGTERM, &sa, nullptr); 1117 } 1118 1119 static void listSupportedCategories() 1120 { 1121 for (size_t i = 0; i < arraysize(k_categories); i++) { 1122 const TracingCategory& c = k_categories[i]; 1123 if (isCategorySupported(c)) { 1124 printf(" %10s - %s\n", c.name, c.longname); 1125 } 1126 } 1127 for (const auto &c : g_vendorCategories) { 1128 printf(" %10s - %s (HAL)\n", c.name.c_str(), c.description.c_str()); 1129 } 1130 } 1131 1132 // Print the command usage help to stderr. 1133 static void showHelp(const char *cmd) 1134 { 1135 fprintf(stderr, "usage: %s [options] [categories...]\n", cmd); 1136 fprintf(stderr, "options include:\n" 1137 " -a appname enable app-level tracing for a comma " 1138 "separated list of cmdlines; * is a wildcard matching any process\n" 1139 " -b N use a trace buffer size of N KB\n" 1140 " -c trace into a circular buffer\n" 1141 " -f filename use the categories written in a file as space-separated\n" 1142 " values in a line\n" 1143 " -k fname,... trace the listed kernel functions\n" 1144 " -n ignore signals\n" 1145 " -s N sleep for N seconds before tracing [default 0]\n" 1146 " -t N trace for N seconds [default 5]\n" 1147 " -z compress the trace dump\n" 1148 " --async_start start circular trace and return immediately\n" 1149 " --async_dump dump the current contents of circular trace buffer\n" 1150 " --async_stop stop tracing and dump the current contents of circular\n" 1151 " trace buffer\n" 1152 " --stream stream trace to stdout as it enters the trace buffer\n" 1153 " Note: this can take significant CPU time, and is best\n" 1154 " used for measuring things that are not affected by\n" 1155 " CPU performance, like pagecache usage.\n" 1156 " --list_categories\n" 1157 " list the available tracing categories\n" 1158 " -o filename write the trace to the specified file instead\n" 1159 " of stdout.\n" 1160 ); 1161 } 1162 1163 bool findTraceFiles() 1164 { 1165 static const std::string debugfs_path = "/sys/kernel/debug/tracing/"; 1166 static const std::string tracefs_path = "/sys/kernel/tracing/"; 1167 static const std::string trace_file = "trace_marker"; 1168 1169 bool tracefs = access((tracefs_path + trace_file).c_str(), F_OK) != -1; 1170 bool debugfs = access((debugfs_path + trace_file).c_str(), F_OK) != -1; 1171 1172 if (!tracefs && !debugfs) { 1173 fprintf(stderr, "Error: Did not find trace folder\n"); 1174 return false; 1175 } 1176 1177 if (tracefs) { 1178 g_traceFolder = tracefs_path; 1179 } else { 1180 g_traceFolder = debugfs_path; 1181 } 1182 1183 return true; 1184 } 1185 1186 void initVendorCategories() 1187 { 1188 g_atraceHal = IAtraceDevice::getService(); 1189 1190 if (g_atraceHal == nullptr) { 1191 // No atrace HAL 1192 return; 1193 } 1194 1195 Return<void> ret = g_atraceHal->listCategories( 1196 [](const auto& list) { 1197 g_vendorCategories.reserve(list.size()); 1198 for (const auto& category : list) { 1199 g_vendorCategories.emplace_back(category.name, category.description, false); 1200 } 1201 }); 1202 if (!ret.isOk()) { 1203 fprintf(stderr, "calling atrace HAL failed: %s\n", ret.description().c_str()); 1204 } 1205 } 1206 1207 static bool setUpVendorTracing() 1208 { 1209 if (g_atraceHal == nullptr) { 1210 // No atrace HAL 1211 return true; 1212 } 1213 1214 std::vector<hidl_string> categories; 1215 for (const auto &c : g_vendorCategories) { 1216 if (c.enabled) { 1217 categories.emplace_back(c.name); 1218 } 1219 } 1220 1221 if (!categories.size()) { 1222 return true; 1223 } 1224 1225 auto ret = g_atraceHal->enableCategories(categories); 1226 if (!ret.isOk()) { 1227 fprintf(stderr, "calling atrace HAL failed: %s\n", ret.description().c_str()); 1228 return false; 1229 } else if (ret != Status::SUCCESS) { 1230 fprintf(stderr, "calling atrace HAL failed: %s\n", toString(ret).c_str()); 1231 return false; 1232 } 1233 return true; 1234 } 1235 1236 static bool cleanUpVendorTracing() 1237 { 1238 if (g_atraceHal == nullptr) { 1239 // No atrace HAL 1240 return true; 1241 } 1242 1243 if (!g_vendorCategories.size()) { 1244 // No vendor categories 1245 return true; 1246 } 1247 1248 auto ret = g_atraceHal->disableAllCategories(); 1249 if (!ret.isOk()) { 1250 fprintf(stderr, "calling atrace HAL failed: %s\n", ret.description().c_str()); 1251 return false; 1252 } else if (ret != Status::SUCCESS) { 1253 fprintf(stderr, "calling atrace HAL failed: %s\n", toString(ret).c_str()); 1254 return false; 1255 } 1256 return true; 1257 } 1258 1259 int main(int argc, char **argv) 1260 { 1261 bool async = false; 1262 bool traceStart = true; 1263 bool traceStop = true; 1264 bool traceDump = true; 1265 bool traceStream = false; 1266 bool onlyUserspace = false; 1267 1268 if (argc == 2 && 0 == strcmp(argv[1], "--help")) { 1269 showHelp(argv[0]); 1270 exit(0); 1271 } 1272 1273 if (!findTraceFiles()) { 1274 fprintf(stderr, "No trace folder found\n"); 1275 exit(-1); 1276 } 1277 1278 initVendorCategories(); 1279 1280 for (;;) { 1281 int ret; 1282 int option_index = 0; 1283 static struct option long_options[] = { 1284 {"async_start", no_argument, nullptr, 0 }, 1285 {"async_stop", no_argument, nullptr, 0 }, 1286 {"async_dump", no_argument, nullptr, 0 }, 1287 {"only_userspace", no_argument, nullptr, 0 }, 1288 {"list_categories", no_argument, nullptr, 0 }, 1289 {"stream", no_argument, nullptr, 0 }, 1290 {nullptr, 0, nullptr, 0 } 1291 }; 1292 1293 ret = getopt_long(argc, argv, "a:b:cf:k:ns:t:zo:", 1294 long_options, &option_index); 1295 1296 if (ret < 0) { 1297 for (int i = optind; i < argc; i++) { 1298 if (!setCategoryEnable(argv[i])) { 1299 fprintf(stderr, "error enabling tracing category \"%s\"\n", argv[i]); 1300 exit(1); 1301 } 1302 } 1303 break; 1304 } 1305 1306 switch(ret) { 1307 case 'a': 1308 g_debugAppCmdLine = optarg; 1309 break; 1310 1311 case 'b': 1312 g_traceBufferSizeKB = atoi(optarg); 1313 break; 1314 1315 case 'c': 1316 g_traceOverwrite = true; 1317 break; 1318 1319 case 'f': 1320 g_categoriesFile = optarg; 1321 break; 1322 1323 case 'k': 1324 g_kernelTraceFuncs = optarg; 1325 break; 1326 1327 case 'n': 1328 g_nohup = true; 1329 break; 1330 1331 case 's': 1332 g_initialSleepSecs = atoi(optarg); 1333 break; 1334 1335 case 't': 1336 g_traceDurationSeconds = atoi(optarg); 1337 break; 1338 1339 case 'z': 1340 g_compress = true; 1341 break; 1342 1343 case 'o': 1344 g_outputFile = optarg; 1345 break; 1346 1347 case 0: 1348 if (!strcmp(long_options[option_index].name, "async_start")) { 1349 async = true; 1350 traceStop = false; 1351 traceDump = false; 1352 g_traceOverwrite = true; 1353 } else if (!strcmp(long_options[option_index].name, "async_stop")) { 1354 async = true; 1355 traceStart = false; 1356 } else if (!strcmp(long_options[option_index].name, "async_dump")) { 1357 async = true; 1358 traceStart = false; 1359 traceStop = false; 1360 } else if (!strcmp(long_options[option_index].name, "only_userspace")) { 1361 onlyUserspace = true; 1362 } else if (!strcmp(long_options[option_index].name, "stream")) { 1363 traceStream = true; 1364 traceDump = false; 1365 } else if (!strcmp(long_options[option_index].name, "list_categories")) { 1366 listSupportedCategories(); 1367 exit(0); 1368 } 1369 break; 1370 1371 default: 1372 fprintf(stderr, "\n"); 1373 showHelp(argv[0]); 1374 exit(-1); 1375 break; 1376 } 1377 } 1378 1379 if (onlyUserspace) { 1380 if (!async || !(traceStart || traceStop)) { 1381 fprintf(stderr, "--only_userspace can only be used with " 1382 "--async_start or --async_stop\n"); 1383 exit(1); 1384 } 1385 } 1386 1387 registerSigHandler(); 1388 1389 if (g_initialSleepSecs > 0) { 1390 sleep(g_initialSleepSecs); 1391 } 1392 1393 bool ok = true; 1394 1395 if (traceStart) { 1396 ok &= setUpUserspaceTracing(); 1397 } 1398 1399 if (ok && traceStart && !onlyUserspace) { 1400 ok &= setUpKernelTracing(); 1401 ok &= setUpVendorTracing(); 1402 ok &= startTrace(); 1403 } 1404 1405 if (ok && traceStart) { 1406 1407 if (!traceStream && !onlyUserspace) { 1408 printf("capturing trace..."); 1409 fflush(stdout); 1410 } 1411 1412 // We clear the trace after starting it because tracing gets enabled for 1413 // each CPU individually in the kernel. Having the beginning of the trace 1414 // contain entries from only one CPU can cause "begin" entries without a 1415 // matching "end" entry to show up if a task gets migrated from one CPU to 1416 // another. 1417 if (!onlyUserspace) 1418 ok = clearTrace(); 1419 1420 writeClockSyncMarker(); 1421 if (ok && !async && !traceStream) { 1422 // Sleep to allow the trace to be captured. 1423 struct timespec timeLeft; 1424 timeLeft.tv_sec = g_traceDurationSeconds; 1425 timeLeft.tv_nsec = 0; 1426 do { 1427 if (g_traceAborted) { 1428 break; 1429 } 1430 } while (nanosleep(&timeLeft, &timeLeft) == -1 && errno == EINTR); 1431 } 1432 1433 if (traceStream) { 1434 streamTrace(); 1435 } 1436 } 1437 1438 // Stop the trace and restore the default settings. 1439 if (traceStop && !onlyUserspace) 1440 stopTrace(); 1441 1442 if (ok && traceDump && !onlyUserspace) { 1443 if (!g_traceAborted) { 1444 printf(" done\n"); 1445 fflush(stdout); 1446 int outFd = STDOUT_FILENO; 1447 if (g_outputFile) { 1448 outFd = open(g_outputFile, O_WRONLY | O_CREAT | O_TRUNC, 0644); 1449 } 1450 if (outFd == -1) { 1451 printf("Failed to open '%s', err=%d", g_outputFile, errno); 1452 } else { 1453 dprintf(outFd, "TRACE:\n"); 1454 dumpTrace(outFd); 1455 if (g_outputFile) { 1456 close(outFd); 1457 } 1458 } 1459 } else { 1460 printf("\ntrace aborted.\n"); 1461 fflush(stdout); 1462 } 1463 clearTrace(); 1464 } else if (!ok) { 1465 fprintf(stderr, "unable to start tracing\n"); 1466 } 1467 1468 // Reset the trace buffer size to 1. 1469 if (traceStop) { 1470 cleanUpVendorTracing(); 1471 cleanUpUserspaceTracing(); 1472 if (!onlyUserspace) 1473 cleanUpKernelTracing(); 1474 } 1475 1476 return g_traceAborted ? 1 : 0; 1477 } 1478