a7ebeb3e8b
Samples to these histograms are any 32-bit int value. BUG=chromium:222189 TEST=manual Change-Id: Ic8d5773d05d717a275c4a4b5616e0e4c307337b8 Reviewed-on: https://gerrit.chromium.org/gerrit/45897 Tested-by: Luigi Semenzato <semenzato@chromium.org> Reviewed-by: Darin Petkov <petkov@chromium.org> Commit-Queue: Luigi Semenzato <semenzato@chromium.org> Reviewed-by: Luigi Semenzato <semenzato@chromium.org>
344 lines
10 KiB
C++
344 lines
10 KiB
C++
// Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "metrics_library.h"
|
|
|
|
#include <errno.h>
|
|
#include <sys/file.h>
|
|
#include <sys/stat.h>
|
|
|
|
#include <cstdarg>
|
|
#include <cstdio>
|
|
#include <cstring>
|
|
|
|
// HANDLE_EINTR macro, no libbase required.
|
|
#include <base/posix/eintr_wrapper.h>
|
|
|
|
#include "policy/device_policy.h"
|
|
|
|
#define READ_WRITE_ALL_FILE_FLAGS \
|
|
(S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH)
|
|
#define ARRAY_SIZE(a) (sizeof(a) / sizeof((a)[0]))
|
|
|
|
static const char kAutotestPath[] = "/var/log/metrics/autotest-events";
|
|
static const char kUMAEventsPath[] = "/var/log/metrics/uma-events";
|
|
static const char kConsentFile[] = "/home/chronos/Consent To Send Stats";
|
|
static const int32_t kBufferSize = 1024;
|
|
static const char kCrosEventHistogramName[] = "Platform.CrOSEvent";
|
|
static const int kCrosEventHistogramMax = 100;
|
|
|
|
/* Add new cros events here.
|
|
*
|
|
* The index of the event is sent in the message, so please do not
|
|
* reorder the names.
|
|
*/
|
|
static const char *kCrosEventNames[] = {
|
|
"ModemManagerCommandSendFailure", // 0
|
|
"HwWatchdogReboot", // 1
|
|
"Cras.NoCodecsFoundAtBoot", // 2
|
|
};
|
|
|
|
time_t MetricsLibrary::cached_enabled_time_ = 0;
|
|
bool MetricsLibrary::cached_enabled_ = false;
|
|
|
|
using std::string;
|
|
|
|
// TODO(sosa@chromium.org) - use Chromium logger instead of stderr
|
|
static void PrintError(const char* message, const char* file,
|
|
int code) {
|
|
static const char kProgramName[] = "libmetrics";
|
|
if (code == 0) {
|
|
fprintf(stderr, "%s: %s\n", kProgramName, message);
|
|
} else if (file == NULL) {
|
|
fprintf(stderr, "%s: ", kProgramName);
|
|
perror(message);
|
|
} else {
|
|
fprintf(stderr, "%s: %s: ", kProgramName, file);
|
|
perror(message);
|
|
}
|
|
}
|
|
|
|
// Copied from libbase to avoid pulling in all of libbase just for libmetrics.
|
|
static int WriteFileDescriptor(const int fd, const char* data, int size) {
|
|
// Allow for partial writes.
|
|
ssize_t bytes_written_total = 0;
|
|
for (ssize_t bytes_written_partial = 0; bytes_written_total < size;
|
|
bytes_written_total += bytes_written_partial) {
|
|
bytes_written_partial =
|
|
HANDLE_EINTR(write(fd, data + bytes_written_total,
|
|
size - bytes_written_total));
|
|
if (bytes_written_partial < 0)
|
|
return -1;
|
|
}
|
|
|
|
return bytes_written_total;
|
|
}
|
|
|
|
MetricsLibrary::MetricsLibrary()
|
|
: uma_events_file_(NULL),
|
|
consent_file_(kConsentFile),
|
|
policy_provider_(NULL) {}
|
|
|
|
// We take buffer and buffer_size as parameters in order to simplify testing
|
|
// of various alignments of the |device_name| with |buffer_size|.
|
|
bool MetricsLibrary::IsDeviceMounted(const char* device_name,
|
|
const char* mounts_file,
|
|
char* buffer,
|
|
int buffer_size,
|
|
bool* result) {
|
|
if (buffer == NULL || buffer_size < 1)
|
|
return false;
|
|
int mounts_fd = open(mounts_file, O_RDONLY);
|
|
if (mounts_fd < 0)
|
|
return false;
|
|
// match_offset describes:
|
|
// -1 -- not beginning of line
|
|
// 0..strlen(device_name)-1 -- this offset in device_name is next to match
|
|
// strlen(device_name) -- matched full name, just need a space.
|
|
int match_offset = 0;
|
|
bool match = false;
|
|
while (!match) {
|
|
int read_size = read(mounts_fd, buffer, buffer_size);
|
|
if (read_size <= 0) {
|
|
if (errno == -EINTR)
|
|
continue;
|
|
break;
|
|
}
|
|
for (int i = 0; i < read_size; ++i) {
|
|
if (buffer[i] == '\n') {
|
|
match_offset = 0;
|
|
continue;
|
|
}
|
|
if (match_offset < 0) {
|
|
continue;
|
|
}
|
|
if (device_name[match_offset] == '\0') {
|
|
if (buffer[i] == ' ') {
|
|
match = true;
|
|
break;
|
|
}
|
|
match_offset = -1;
|
|
continue;
|
|
}
|
|
|
|
if (buffer[i] == device_name[match_offset]) {
|
|
++match_offset;
|
|
} else {
|
|
match_offset = -1;
|
|
}
|
|
}
|
|
}
|
|
close(mounts_fd);
|
|
*result = match;
|
|
return true;
|
|
}
|
|
|
|
bool MetricsLibrary::IsGuestMode() {
|
|
char buffer[256];
|
|
bool result = false;
|
|
if (!IsDeviceMounted("guestfs",
|
|
"/proc/mounts",
|
|
buffer,
|
|
sizeof(buffer),
|
|
&result)) {
|
|
return false;
|
|
}
|
|
return result && (access("/var/run/state/logged-in", F_OK) == 0);
|
|
}
|
|
|
|
bool MetricsLibrary::AreMetricsEnabled() {
|
|
static struct stat stat_buffer;
|
|
time_t this_check_time = time(NULL);
|
|
if (this_check_time != cached_enabled_time_) {
|
|
cached_enabled_time_ = this_check_time;
|
|
|
|
if (!policy_provider_.get())
|
|
policy_provider_.reset(new policy::PolicyProvider());
|
|
policy_provider_->Reload();
|
|
// We initialize with the default value which is false and will be preserved
|
|
// if the policy is not set.
|
|
bool enabled = false;
|
|
bool has_policy = false;
|
|
if (policy_provider_->device_policy_is_loaded()) {
|
|
has_policy =
|
|
policy_provider_->GetDevicePolicy().GetMetricsEnabled(&enabled);
|
|
}
|
|
// If policy couldn't be loaded or the metrics policy is not set we should
|
|
// still respect the consent file if it is present for migration purposes.
|
|
// TODO(pastarmovj)
|
|
if (!has_policy) {
|
|
enabled = stat(consent_file_, &stat_buffer) >= 0;
|
|
}
|
|
|
|
if (enabled && !IsGuestMode())
|
|
cached_enabled_ = true;
|
|
else
|
|
cached_enabled_ = false;
|
|
}
|
|
return cached_enabled_;
|
|
}
|
|
|
|
bool MetricsLibrary::SendMessageToChrome(int32_t length, const char* message) {
|
|
|
|
int chrome_fd = HANDLE_EINTR(open(uma_events_file_,
|
|
O_WRONLY | O_APPEND | O_CREAT,
|
|
READ_WRITE_ALL_FILE_FLAGS));
|
|
// If we failed to open it, return.
|
|
if (chrome_fd < 0) {
|
|
PrintError("open", uma_events_file_, errno);
|
|
return false;
|
|
}
|
|
|
|
// Need to chmod because open flags are anded with umask. Ignore the
|
|
// exit code -- a chronos process may fail chmoding because the file
|
|
// has been created by a root process but that should be OK.
|
|
fchmod(chrome_fd, READ_WRITE_ALL_FILE_FLAGS);
|
|
|
|
// Grab an exclusive lock to protect Chrome from truncating
|
|
// underneath us. Keep the file locked as briefly as possible.
|
|
if (HANDLE_EINTR(flock(chrome_fd, LOCK_EX)) < 0) {
|
|
PrintError("flock", uma_events_file_, errno);
|
|
HANDLE_EINTR(close(chrome_fd));
|
|
return false;
|
|
}
|
|
|
|
bool success = true;
|
|
if (WriteFileDescriptor(chrome_fd, message, length) != length) {
|
|
PrintError("write", uma_events_file_, errno);
|
|
success = false;
|
|
}
|
|
|
|
// Close the file and release the lock.
|
|
HANDLE_EINTR(close(chrome_fd));
|
|
return success;
|
|
}
|
|
|
|
int32_t MetricsLibrary::FormatChromeMessage(int32_t buffer_size, char* buffer,
|
|
const char* format, ...) {
|
|
int32_t message_length;
|
|
size_t len_size = sizeof(message_length);
|
|
|
|
// Format the non-LENGTH contents in the buffer by leaving space for
|
|
// LENGTH at the start of the buffer.
|
|
va_list args;
|
|
va_start(args, format);
|
|
message_length = vsnprintf(&buffer[len_size], buffer_size - len_size,
|
|
format, args);
|
|
va_end(args);
|
|
|
|
if (message_length < 0) {
|
|
PrintError("chrome message format error", NULL, 0);
|
|
return -1;
|
|
}
|
|
|
|
// +1 to account for the trailing \0.
|
|
message_length += len_size + 1;
|
|
if (message_length > buffer_size) {
|
|
PrintError("chrome message too long", NULL, 0);
|
|
return -1;
|
|
}
|
|
|
|
// Prepend LENGTH to the message.
|
|
memcpy(buffer, &message_length, len_size);
|
|
return message_length;
|
|
}
|
|
|
|
void MetricsLibrary::Init() {
|
|
uma_events_file_ = kUMAEventsPath;
|
|
}
|
|
|
|
bool MetricsLibrary::SendToAutotest(const string& name, int value) {
|
|
FILE* autotest_file = fopen(kAutotestPath, "a+");
|
|
if (autotest_file == NULL) {
|
|
PrintError("fopen", kAutotestPath, errno);
|
|
return false;
|
|
}
|
|
|
|
fprintf(autotest_file, "%s=%d\n", name.c_str(), value);
|
|
fclose(autotest_file);
|
|
return true;
|
|
}
|
|
|
|
bool MetricsLibrary::SendToUMA(const string& name, int sample,
|
|
int min, int max, int nbuckets) {
|
|
// Format the message.
|
|
char message[kBufferSize];
|
|
int32_t message_length =
|
|
FormatChromeMessage(kBufferSize, message,
|
|
"histogram%c%s %d %d %d %d", '\0',
|
|
name.c_str(), sample, min, max, nbuckets);
|
|
if (message_length < 0)
|
|
return false;
|
|
|
|
// Send the message.
|
|
return SendMessageToChrome(message_length, message);
|
|
}
|
|
|
|
bool MetricsLibrary::SendEnumToUMA(const std::string& name, int sample,
|
|
int max) {
|
|
// Format the message.
|
|
char message[kBufferSize];
|
|
int32_t message_length =
|
|
FormatChromeMessage(kBufferSize, message,
|
|
"linearhistogram%c%s %d %d", '\0',
|
|
name.c_str(), sample, max);
|
|
if (message_length < 0)
|
|
return false;
|
|
|
|
// Send the message.
|
|
return SendMessageToChrome(message_length, message);
|
|
}
|
|
|
|
bool MetricsLibrary::SendSparseToUMA(const std::string& name, int sample) {
|
|
// Format the message.
|
|
char message[kBufferSize];
|
|
int32_t message_length =
|
|
FormatChromeMessage(kBufferSize, message, "sparsehistogram%c%s %d",
|
|
'\0', name.c_str(), sample);
|
|
if (message_length < 0)
|
|
return false;
|
|
|
|
// Send the message.
|
|
return SendMessageToChrome(message_length, message);
|
|
}
|
|
|
|
bool MetricsLibrary::SendUserActionToUMA(const std::string& action) {
|
|
// Format the message.
|
|
char message[kBufferSize];
|
|
int32_t message_length =
|
|
FormatChromeMessage(kBufferSize, message,
|
|
"useraction%c%s", '\0', action.c_str());
|
|
if (message_length < 0)
|
|
return false;
|
|
|
|
// Send the message.
|
|
return SendMessageToChrome(message_length, message);
|
|
}
|
|
|
|
bool MetricsLibrary::SendCrashToUMA(const char *crash_kind) {
|
|
// Format the message.
|
|
char message[kBufferSize];
|
|
int32_t message_length =
|
|
FormatChromeMessage(kBufferSize, message,
|
|
"crash%c%s", '\0', crash_kind);
|
|
|
|
if (message_length < 0)
|
|
return false;
|
|
|
|
// Send the message.
|
|
return SendMessageToChrome(message_length, message);
|
|
}
|
|
|
|
void MetricsLibrary::SetPolicyProvider(policy::PolicyProvider* provider) {
|
|
policy_provider_.reset(provider);
|
|
}
|
|
|
|
bool MetricsLibrary::SendCrosEventToUMA(const std::string& event) {
|
|
for (size_t i = 0; i < ARRAY_SIZE(kCrosEventNames); i++) {
|
|
if (strcmp(event.c_str(), kCrosEventNames[i]) == 0) {
|
|
return SendEnumToUMA(kCrosEventHistogramName, i, kCrosEventHistogramMax);
|
|
}
|
|
}
|
|
return false;
|
|
}
|