blob: ba79ff752c388a79f064b00460b53ceeaeee0d79 [file] [log] [blame]
/*
* Copyright (C) 2016 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define LOG_TAG "storaged"
#include <dirent.h>
#include <stdlib.h>
#include <stdio.h>
#include <time.h>
#include <unistd.h>
#include <zlib.h>
#include <chrono>
#include <fstream>
#include <sstream>
#include <string>
#include <utility>
#include <aidl/android/hardware/health/BnHealthInfoCallback.h>
#include <android-base/file.h>
#include <android-base/logging.h>
#include <android-base/unique_fd.h>
#include <android/binder_ibinder.h>
#include <android/binder_manager.h>
#include <android/hidl/manager/1.0/IServiceManager.h>
#include <batteryservice/BatteryServiceConstants.h>
#include <cutils/properties.h>
#include <health-shim/shim.h>
#include <healthhalutils/HealthHalUtils.h>
#include <hidl/HidlTransportSupport.h>
#include <hwbinder/IPCThreadState.h>
#include <log/log.h>
#include <storaged.h>
#include <storaged_utils.h>
using namespace android::base;
using namespace chrono;
using namespace google::protobuf::io;
using namespace storaged_proto;
namespace {
/*
* The system user is the initial user that is implicitly created on first boot
* and hosts most of the system services. Keep this in sync with
* frameworks/base/core/java/android/os/UserManager.java
*/
constexpr int USER_SYSTEM = 0;
constexpr ssize_t benchmark_unit_size = 16 * 1024; // 16KB
constexpr size_t min_benchmark_size = 128 * 1024; // 128KB
} // namespace
const uint32_t storaged_t::current_version = 4;
using aidl::android::hardware::health::BatteryStatus;
using aidl::android::hardware::health::BnHealthInfoCallback;
using aidl::android::hardware::health::HealthInfo;
using aidl::android::hardware::health::IHealth;
using aidl::android::hardware::health::IHealthInfoCallback;
using android::hardware::interfacesEqual;
using android::hardware::health::V2_0::get_health_service;
using android::hidl::manager::V1_0::IServiceManager;
using HidlHealth = android::hardware::health::V2_0::IHealth;
using aidl::android::hardware::health::HealthShim;
using ndk::ScopedAIBinder_DeathRecipient;
using ndk::ScopedAStatus;
HealthServicePair HealthServicePair::get() {
HealthServicePair ret;
auto service_name = IHealth::descriptor + "/default"s;
if (AServiceManager_isDeclared(service_name.c_str())) {
ndk::SpAIBinder binder(AServiceManager_waitForService(service_name.c_str()));
ret.aidl_health = IHealth::fromBinder(binder);
if (ret.aidl_health == nullptr) {
LOG(WARNING) << "AIDL health service is declared, but it cannot be retrieved.";
}
}
if (ret.aidl_health == nullptr) {
LOG(INFO) << "Unable to get AIDL health service, trying HIDL...";
ret.hidl_health = get_health_service();
if (ret.hidl_health != nullptr) {
ret.aidl_health = ndk::SharedRefBase::make<HealthShim>(ret.hidl_health);
}
}
if (ret.aidl_health == nullptr) {
LOG(WARNING) << "health: failed to find IHealth service";
return {};
}
return ret;
}
inline charger_stat_t is_charger_on(BatteryStatus prop) {
return (prop == BatteryStatus::CHARGING || prop == BatteryStatus::FULL) ?
CHARGER_ON : CHARGER_OFF;
}
class HealthInfoCallback : public BnHealthInfoCallback {
public:
HealthInfoCallback(uid_monitor* uidm) : mUidm(uidm) {}
ScopedAStatus healthInfoChanged(const HealthInfo& info) override {
mUidm->set_charger_state(is_charger_on(info.batteryStatus));
return ScopedAStatus::ok();
}
private:
uid_monitor* mUidm;
};
void storaged_t::init() {
init_health_service();
mDsm = std::make_unique<disk_stats_monitor>(health);
storage_info.reset(storage_info_t::get_storage_info(health));
}
static void onHealthBinderDied(void*) {
LOG(ERROR) << "health service died, exiting";
android::hardware::IPCThreadState::self()->stopProcess();
exit(1);
}
void storaged_t::init_health_service() {
if (!mUidm.enabled())
return;
auto [aidlHealth, hidlHealth] = HealthServicePair::get();
health = aidlHealth;
if (health == nullptr) return;
BatteryStatus status = BatteryStatus::UNKNOWN;
auto ret = health->getChargeStatus(&status);
if (!ret.isOk()) {
LOG(WARNING) << "health: cannot get battery status: " << ret.getDescription();
}
if (status == BatteryStatus::UNKNOWN) {
LOG(WARNING) << "health: invalid battery status";
}
mUidm.init(is_charger_on(status));
// register listener after init uid_monitor
aidl_health_callback = ndk::SharedRefBase::make<HealthInfoCallback>(&mUidm);
ret = health->registerCallback(aidl_health_callback);
if (!ret.isOk()) {
LOG(WARNING) << "health: failed to register callback: " << ret.getDescription();
}
if (hidlHealth != nullptr) {
hidl_death_recp = new hidl_health_death_recipient(hidlHealth);
auto ret = hidlHealth->linkToDeath(hidl_death_recp, 0 /* cookie */);
if (!ret.isOk()) {
LOG(WARNING) << "Failed to link to death (HIDL): " << ret.description();
}
} else {
aidl_death_recp =
ScopedAIBinder_DeathRecipient(AIBinder_DeathRecipient_new(onHealthBinderDied));
auto ret = AIBinder_linkToDeath(health->asBinder().get(), aidl_death_recp.get(),
nullptr /* cookie */);
if (ret != STATUS_OK) {
LOG(WARNING) << "Failed to link to death (AIDL): "
<< ScopedAStatus(AStatus_fromStatus(ret)).getDescription();
}
}
}
void hidl_health_death_recipient::serviceDied(uint64_t cookie,
const wp<::android::hidl::base::V1_0::IBase>& who) {
if (mHealth != nullptr && interfacesEqual(mHealth, who.promote())) {
onHealthBinderDied(reinterpret_cast<void*>(cookie));
} else {
LOG(ERROR) << "unknown service died";
}
}
void storaged_t::report_storage_info() {
storage_info->report();
}
/* storaged_t */
storaged_t::storaged_t(void) {
mConfig.periodic_chores_interval_unit =
property_get_int32("ro.storaged.event.interval",
DEFAULT_PERIODIC_CHORES_INTERVAL_UNIT);
mConfig.event_time_check_usec =
property_get_int32("ro.storaged.event.perf_check", 0);
mConfig.periodic_chores_interval_disk_stats_publish =
property_get_int32("ro.storaged.disk_stats_pub",
DEFAULT_PERIODIC_CHORES_INTERVAL_DISK_STATS_PUBLISH);
mConfig.periodic_chores_interval_uid_io =
property_get_int32("ro.storaged.uid_io.interval",
DEFAULT_PERIODIC_CHORES_INTERVAL_UID_IO);
mConfig.periodic_chores_interval_flush_proto =
property_get_int32("ro.storaged.flush_proto.interval",
DEFAULT_PERIODIC_CHORES_INTERVAL_FLUSH_PROTO);
mStarttime = time(NULL);
mTimer = 0;
}
void storaged_t::add_user_ce(userid_t user_id) {
Mutex::Autolock _l(proto_lock);
if (!proto_loaded[user_id]) {
load_proto(user_id);
proto_loaded[user_id] = true;
}
}
void storaged_t::remove_user_ce(userid_t user_id) {
Mutex::Autolock _l(proto_lock);
proto_loaded[user_id] = false;
mUidm.clear_user_history(user_id);
RemoveFileIfExists(proto_path(user_id), nullptr);
}
void storaged_t::load_proto(userid_t user_id) {
string proto_file = proto_path(user_id);
ifstream in(proto_file, ofstream::in | ofstream::binary);
if (!in.good()) return;
stringstream ss;
ss << in.rdbuf();
StoragedProto proto;
proto.ParseFromString(ss.str());
const UidIOUsage& uid_io_usage = proto.uid_io_usage();
uint32_t computed_crc =
crc32(current_version,
reinterpret_cast<const Bytef*>(uid_io_usage.SerializeAsString().c_str()),
uid_io_usage.ByteSizeLong());
if (proto.crc() != computed_crc) {
LOG(WARNING) << "CRC mismatch in " << proto_file;
return;
}
mUidm.load_uid_io_proto(user_id, proto.uid_io_usage());
if (user_id == USER_SYSTEM) {
storage_info->load_perf_history_proto(proto.perf_history());
}
}
char* storaged_t:: prepare_proto(userid_t user_id, StoragedProto* proto) {
proto->set_version(current_version);
const UidIOUsage& uid_io_usage = proto->uid_io_usage();
proto->set_crc(crc32(current_version,
reinterpret_cast<const Bytef*>(uid_io_usage.SerializeAsString().c_str()),
uid_io_usage.ByteSizeLong()));
uint32_t pagesize = sysconf(_SC_PAGESIZE);
if (user_id == USER_SYSTEM) {
proto->set_padding("", 1);
vector<char> padding;
ssize_t size = ROUND_UP(std::max(min_benchmark_size, proto->ByteSizeLong()), pagesize);
padding = vector<char>(size - proto->ByteSizeLong(), 0xFD);
proto->set_padding(padding.data(), padding.size());
while (!IS_ALIGNED(proto->ByteSizeLong(), pagesize)) {
padding.push_back(0xFD);
proto->set_padding(padding.data(), padding.size());
}
}
char* data = nullptr;
if (posix_memalign(reinterpret_cast<void**>(&data), pagesize, proto->ByteSizeLong())) {
PLOG(ERROR) << "Faied to alloc aligned buffer (size: " << proto->ByteSizeLong() << ")";
return data;
}
proto->SerializeToArray(data, proto->ByteSizeLong());
return data;
}
void storaged_t::flush_proto_data(userid_t user_id,
const char* data, ssize_t size) {
string proto_file = proto_path(user_id);
string tmp_file = proto_file + "_tmp";
unique_fd fd(TEMP_FAILURE_RETRY(open(tmp_file.c_str(),
O_SYNC | O_CREAT | O_TRUNC | O_WRONLY | O_CLOEXEC |
(user_id == USER_SYSTEM ? O_DIRECT : 0),
S_IRUSR | S_IWUSR)));
if (fd == -1) {
PLOG(ERROR) << "Faied to open tmp file: " << tmp_file;
return;
}
if (user_id == USER_SYSTEM) {
time_point<steady_clock> start, end;
uint32_t benchmark_size = 0;
uint64_t benchmark_time_ns = 0;
ssize_t ret;
bool first_write = true;
while (size > 0) {
start = steady_clock::now();
ret = write(fd, data, std::min(benchmark_unit_size, size));
if (ret <= 0) {
PLOG(ERROR) << "Faied to write tmp file: " << tmp_file;
return;
}
end = steady_clock::now();
/*
* compute bandwidth after the first write and if write returns
* exactly unit size.
*/
if (!first_write && ret == benchmark_unit_size) {
benchmark_size += benchmark_unit_size;
benchmark_time_ns += duration_cast<nanoseconds>(end - start).count();
}
size -= ret;
data += ret;
first_write = false;
}
if (benchmark_size && benchmark_time_ns) {
int perf = benchmark_size * 1000000LLU / benchmark_time_ns;
storage_info->update_perf_history(perf, system_clock::now());
}
} else {
if (!WriteFully(fd, data, size)) {
PLOG(ERROR) << "Faied to write tmp file: " << tmp_file;
return;
}
}
fd.reset(-1);
rename(tmp_file.c_str(), proto_file.c_str());
}
void storaged_t::flush_proto(userid_t user_id, StoragedProto* proto) {
unique_ptr<char> proto_data(prepare_proto(user_id, proto));
if (proto_data == nullptr) return;
flush_proto_data(user_id, proto_data.get(), proto->ByteSizeLong());
}
void storaged_t::flush_protos(unordered_map<int, StoragedProto>* protos) {
Mutex::Autolock _l(proto_lock);
for (auto& it : *protos) {
/*
* Don't flush proto if we haven't attempted to load it from file.
*/
if (proto_loaded[it.first]) {
flush_proto(it.first, &it.second);
}
}
}
void storaged_t::event(void) {
unordered_map<int, StoragedProto> protos;
if (mDsm->enabled()) {
mDsm->update();
if (!(mTimer % mConfig.periodic_chores_interval_disk_stats_publish)) {
mDsm->publish();
}
}
if (!(mTimer % mConfig.periodic_chores_interval_uid_io)) {
mUidm.report(&protos);
}
if (storage_info) {
storage_info->refresh(protos[USER_SYSTEM].mutable_perf_history());
}
if (!(mTimer % mConfig.periodic_chores_interval_flush_proto)) {
flush_protos(&protos);
}
mTimer += mConfig.periodic_chores_interval_unit;
}
void storaged_t::event_checked(void) {
struct timespec start_ts, end_ts;
bool check_time = true;
if (mConfig.event_time_check_usec &&
clock_gettime(CLOCK_PROCESS_CPUTIME_ID, &start_ts) < 0) {
check_time = false;
PLOG(ERROR) << "clock_gettime() failed";
}
event();
if (mConfig.event_time_check_usec && check_time) {
if (clock_gettime(CLOCK_PROCESS_CPUTIME_ID, &end_ts) < 0) {
PLOG(ERROR) << "clock_gettime() failed";
return;
}
int64_t cost = (end_ts.tv_sec - start_ts.tv_sec) * SEC_TO_USEC +
(end_ts.tv_nsec - start_ts.tv_nsec) / USEC_TO_NSEC;
if (cost > mConfig.event_time_check_usec) {
LOG(ERROR) << "event loop spent " << cost << " usec, threshold "
<< mConfig.event_time_check_usec << " usec";
}
}
}