| /* |
| * Copyright (C) 2017 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| #define DEBUG true // STOPSHIP if true |
| #include "Log.h" |
| #include "MetricsManager.h" |
| #include "statslog.h" |
| |
| #include "CountMetricProducer.h" |
| #include "condition/CombinationConditionTracker.h" |
| #include "condition/SimpleConditionTracker.h" |
| #include "guardrail/StatsdStats.h" |
| #include "matchers/CombinationLogMatchingTracker.h" |
| #include "matchers/SimpleLogMatchingTracker.h" |
| #include "metrics_manager_util.h" |
| #include "stats_util.h" |
| #include "stats_log_util.h" |
| |
| #include <log/logprint.h> |
| #include <private/android_filesystem_config.h> |
| #include <utils/SystemClock.h> |
| |
| using android::util::FIELD_COUNT_REPEATED; |
| using android::util::FIELD_TYPE_MESSAGE; |
| using android::util::ProtoOutputStream; |
| |
| using std::make_unique; |
| using std::set; |
| using std::string; |
| using std::unordered_map; |
| using std::vector; |
| |
| namespace android { |
| namespace os { |
| namespace statsd { |
| |
| const int FIELD_ID_METRICS = 1; |
| |
| MetricsManager::MetricsManager(const ConfigKey& key, const StatsdConfig& config, |
| const long timeBaseSec, |
| const sp<UidMap> &uidMap, |
| const sp<AlarmMonitor>& anomalyAlarmMonitor, |
| const sp<AlarmMonitor>& periodicAlarmMonitor) |
| : mConfigKey(key), mUidMap(uidMap), mLastReportTimeNs(timeBaseSec * NS_PER_SEC) { |
| mConfigValid = |
| initStatsdConfig(key, config, *uidMap, anomalyAlarmMonitor, periodicAlarmMonitor, |
| timeBaseSec, mTagIds, mAllAtomMatchers, |
| mAllConditionTrackers, mAllMetricProducers, mAllAnomalyTrackers, |
| mAllPeriodicAlarmTrackers, mConditionToMetricMap, mTrackerToMetricMap, |
| mTrackerToConditionMap, mNoReportMetricIds); |
| |
| if (config.allowed_log_source_size() == 0) { |
| // TODO(b/70794411): uncomment the following line and remove the hard coded log source |
| // after all configs have the log source added. |
| // mConfigValid = false; |
| // ALOGE("Log source white list is empty! This config won't get any data."); |
| |
| mAllowedUid.push_back(AID_ROOT); |
| mAllowedUid.push_back(AID_STATSD); |
| mAllowedUid.push_back(AID_SYSTEM); |
| mAllowedLogSources.insert(mAllowedUid.begin(), mAllowedUid.end()); |
| } else { |
| for (const auto& source : config.allowed_log_source()) { |
| auto it = UidMap::sAidToUidMapping.find(source); |
| if (it != UidMap::sAidToUidMapping.end()) { |
| mAllowedUid.push_back(it->second); |
| } else { |
| mAllowedPkg.push_back(source); |
| } |
| } |
| |
| if (mAllowedUid.size() + mAllowedPkg.size() > StatsdStats::kMaxLogSourceCount) { |
| ALOGE("Too many log sources. This is likely to be an error in the config."); |
| mConfigValid = false; |
| } else { |
| initLogSourceWhiteList(); |
| } |
| } |
| |
| // Guardrail. Reject the config if it's too big. |
| if (mAllMetricProducers.size() > StatsdStats::kMaxMetricCountPerConfig || |
| mAllConditionTrackers.size() > StatsdStats::kMaxConditionCountPerConfig || |
| mAllAtomMatchers.size() > StatsdStats::kMaxMatcherCountPerConfig) { |
| ALOGE("This config is too big! Reject!"); |
| mConfigValid = false; |
| } |
| if (mAllAnomalyTrackers.size() > StatsdStats::kMaxAlertCountPerConfig) { |
| ALOGE("This config has too many alerts! Reject!"); |
| mConfigValid = false; |
| } |
| // no matter whether this config is valid, log it in the stats. |
| StatsdStats::getInstance().noteConfigReceived(key, mAllMetricProducers.size(), |
| mAllConditionTrackers.size(), |
| mAllAtomMatchers.size(), |
| mAllAnomalyTrackers.size(), |
| mConfigValid); |
| } |
| |
| MetricsManager::~MetricsManager() { |
| VLOG("~MetricsManager()"); |
| } |
| |
| void MetricsManager::initLogSourceWhiteList() { |
| std::lock_guard<std::mutex> lock(mAllowedLogSourcesMutex); |
| mAllowedLogSources.clear(); |
| mAllowedLogSources.insert(mAllowedUid.begin(), mAllowedUid.end()); |
| |
| for (const auto& pkg : mAllowedPkg) { |
| auto uids = mUidMap->getAppUid(pkg); |
| mAllowedLogSources.insert(uids.begin(), uids.end()); |
| } |
| if (DEBUG) { |
| for (const auto& uid : mAllowedLogSources) { |
| VLOG("Allowed uid %d", uid); |
| } |
| } |
| } |
| |
| bool MetricsManager::isConfigValid() const { |
| return mConfigValid; |
| } |
| |
| void MetricsManager::notifyAppUpgrade(const uint64_t& eventTimeNs, const string& apk, const int uid, |
| const int64_t version) { |
| // check if we care this package |
| if (std::find(mAllowedPkg.begin(), mAllowedPkg.end(), apk) == mAllowedPkg.end()) { |
| return; |
| } |
| // We will re-initialize the whole list because we don't want to keep the multi mapping of |
| // UID<->pkg inside MetricsManager to reduce the memory usage. |
| initLogSourceWhiteList(); |
| } |
| |
| void MetricsManager::notifyAppRemoved(const uint64_t& eventTimeNs, const string& apk, |
| const int uid) { |
| // check if we care this package |
| if (std::find(mAllowedPkg.begin(), mAllowedPkg.end(), apk) == mAllowedPkg.end()) { |
| return; |
| } |
| // We will re-initialize the whole list because we don't want to keep the multi mapping of |
| // UID<->pkg inside MetricsManager to reduce the memory usage. |
| initLogSourceWhiteList(); |
| } |
| |
| void MetricsManager::onUidMapReceived(const uint64_t& eventTimeNs) { |
| if (mAllowedPkg.size() == 0) { |
| return; |
| } |
| initLogSourceWhiteList(); |
| } |
| |
| void MetricsManager::dumpStates(FILE* out, bool verbose) { |
| fprintf(out, "ConfigKey %s, allowed source:", mConfigKey.ToString().c_str()); |
| { |
| std::lock_guard<std::mutex> lock(mAllowedLogSourcesMutex); |
| for (const auto& source : mAllowedLogSources) { |
| fprintf(out, "%d ", source); |
| } |
| } |
| fprintf(out, "\n"); |
| for (const auto& producer : mAllMetricProducers) { |
| producer->dumpStates(out, verbose); |
| } |
| } |
| |
| void MetricsManager::dropData(const uint64_t dropTimeNs) { |
| for (const auto& producer : mAllMetricProducers) { |
| producer->dropData(dropTimeNs); |
| } |
| } |
| |
| void MetricsManager::onDumpReport(const uint64_t dumpTimeStampNs, ProtoOutputStream* protoOutput) { |
| VLOG("=========================Metric Reports Start=========================="); |
| // one StatsLogReport per MetricProduer |
| for (const auto& producer : mAllMetricProducers) { |
| if (mNoReportMetricIds.find(producer->getMetricId()) == mNoReportMetricIds.end()) { |
| long long token = |
| protoOutput->start(FIELD_TYPE_MESSAGE | FIELD_COUNT_REPEATED | FIELD_ID_METRICS); |
| producer->onDumpReport(dumpTimeStampNs, protoOutput); |
| protoOutput->end(token); |
| } |
| } |
| mLastReportTimeNs = dumpTimeStampNs; |
| VLOG("=========================Metric Reports End=========================="); |
| } |
| |
| // Consume the stats log if it's interesting to this metric. |
| void MetricsManager::onLogEvent(const LogEvent& event) { |
| if (!mConfigValid) { |
| return; |
| } |
| |
| if (event.GetTagId() == android::util::APP_BREADCRUMB_REPORTED) { |
| // Check that app breadcrumb reported fields are valid. |
| // TODO: Find a way to make these checks easier to maintain. |
| status_t err = NO_ERROR; |
| |
| // Uid is 3rd from last field and must match the caller's uid, |
| // unless that caller is statsd itself (statsd is allowed to spoof uids). |
| long appHookUid = event.GetLong(event.size()-2, &err); |
| if (err != NO_ERROR ) { |
| VLOG("APP_BREADCRUMB_REPORTED had error when parsing the uid"); |
| return; |
| } |
| int32_t loggerUid = event.GetUid(); |
| if (loggerUid != appHookUid && loggerUid != AID_STATSD) { |
| VLOG("APP_BREADCRUMB_REPORTED has invalid uid: claimed %ld but caller is %d", |
| appHookUid, loggerUid); |
| return; |
| } |
| |
| // Label is 2nd from last field and must be from [0, 15]. |
| long appHookLabel = event.GetLong(event.size()-1, &err); |
| if (err != NO_ERROR ) { |
| VLOG("APP_BREADCRUMB_REPORTED had error when parsing the label field"); |
| return; |
| } else if (appHookLabel < 0 || appHookLabel > 15) { |
| VLOG("APP_BREADCRUMB_REPORTED does not have valid label %ld", appHookLabel); |
| return; |
| } |
| |
| // The state must be from 0,3. This part of code must be manually updated. |
| long appHookState = event.GetLong(event.size(), &err); |
| if (err != NO_ERROR ) { |
| VLOG("APP_BREADCRUMB_REPORTED had error when parsing the state field"); |
| return; |
| } else if (appHookState < 0 || appHookState > 3) { |
| VLOG("APP_BREADCRUMB_REPORTED does not have valid state %ld", appHookState); |
| return; |
| } |
| } else if (event.GetTagId() == android::util::DAVEY_OCCURRED) { |
| // Daveys can be logged from any app since they are logged in libs/hwui/JankTracker.cpp. |
| // Check that the davey duration is reasonable. Max length check is for privacy. |
| status_t err = NO_ERROR; |
| |
| // Uid is the first field provided. |
| long jankUid = event.GetLong(1, &err); |
| if (err != NO_ERROR ) { |
| VLOG("Davey occurred had error when parsing the uid"); |
| return; |
| } |
| int32_t loggerUid = event.GetUid(); |
| if (loggerUid != jankUid && loggerUid != AID_STATSD) { |
| VLOG("DAVEY_OCCURRED has invalid uid: claimed %ld but caller is %d", jankUid, |
| loggerUid); |
| return; |
| } |
| |
| long duration = event.GetLong(event.size(), &err); |
| if (err != NO_ERROR ) { |
| VLOG("Davey occurred had error when parsing the duration"); |
| return; |
| } else if (duration > 100000) { |
| VLOG("Davey duration is unreasonably long: %ld", duration); |
| return; |
| } |
| } else { |
| std::lock_guard<std::mutex> lock(mAllowedLogSourcesMutex); |
| if (mAllowedLogSources.find(event.GetUid()) == mAllowedLogSources.end()) { |
| VLOG("log source %d not on the whitelist", event.GetUid()); |
| return; |
| } |
| } |
| |
| int tagId = event.GetTagId(); |
| uint64_t eventTime = event.GetElapsedTimestampNs(); |
| if (mTagIds.find(tagId) == mTagIds.end()) { |
| // not interesting... |
| return; |
| } |
| |
| vector<MatchingState> matcherCache(mAllAtomMatchers.size(), MatchingState::kNotComputed); |
| |
| for (auto& matcher : mAllAtomMatchers) { |
| matcher->onLogEvent(event, mAllAtomMatchers, matcherCache); |
| } |
| |
| // A bitmap to see which ConditionTracker needs to be re-evaluated. |
| vector<bool> conditionToBeEvaluated(mAllConditionTrackers.size(), false); |
| |
| for (const auto& pair : mTrackerToConditionMap) { |
| if (matcherCache[pair.first] == MatchingState::kMatched) { |
| const auto& conditionList = pair.second; |
| for (const int conditionIndex : conditionList) { |
| conditionToBeEvaluated[conditionIndex] = true; |
| } |
| } |
| } |
| |
| vector<ConditionState> conditionCache(mAllConditionTrackers.size(), |
| ConditionState::kNotEvaluated); |
| // A bitmap to track if a condition has changed value. |
| vector<bool> changedCache(mAllConditionTrackers.size(), false); |
| for (size_t i = 0; i < mAllConditionTrackers.size(); i++) { |
| if (conditionToBeEvaluated[i] == false) { |
| continue; |
| } |
| sp<ConditionTracker>& condition = mAllConditionTrackers[i]; |
| condition->evaluateCondition(event, matcherCache, mAllConditionTrackers, conditionCache, |
| changedCache); |
| } |
| |
| for (size_t i = 0; i < mAllConditionTrackers.size(); i++) { |
| if (changedCache[i] == false) { |
| continue; |
| } |
| auto pair = mConditionToMetricMap.find(i); |
| if (pair != mConditionToMetricMap.end()) { |
| auto& metricList = pair->second; |
| for (auto metricIndex : metricList) { |
| // metric cares about non sliced condition, and it's changed. |
| // Push the new condition to it directly. |
| if (!mAllMetricProducers[metricIndex]->isConditionSliced()) { |
| mAllMetricProducers[metricIndex]->onConditionChanged(conditionCache[i], |
| eventTime); |
| // metric cares about sliced conditions, and it may have changed. Send |
| // notification, and the metric can query the sliced conditions that are |
| // interesting to it. |
| } else { |
| mAllMetricProducers[metricIndex]->onSlicedConditionMayChange(eventTime); |
| } |
| } |
| } |
| } |
| |
| // For matched AtomMatchers, tell relevant metrics that a matched event has come. |
| for (size_t i = 0; i < mAllAtomMatchers.size(); i++) { |
| if (matcherCache[i] == MatchingState::kMatched) { |
| StatsdStats::getInstance().noteMatcherMatched(mConfigKey, |
| mAllAtomMatchers[i]->getId()); |
| auto pair = mTrackerToMetricMap.find(i); |
| if (pair != mTrackerToMetricMap.end()) { |
| auto& metricList = pair->second; |
| for (const int metricIndex : metricList) { |
| // pushed metrics are never scheduled pulls |
| mAllMetricProducers[metricIndex]->onMatchedLogEvent(i, event); |
| } |
| } |
| } |
| } |
| } |
| |
| void MetricsManager::onAnomalyAlarmFired( |
| const uint64_t timestampNs, |
| unordered_set<sp<const InternalAlarm>, SpHash<InternalAlarm>>& alarmSet) { |
| for (const auto& itr : mAllAnomalyTrackers) { |
| itr->informAlarmsFired(timestampNs, alarmSet); |
| } |
| } |
| |
| void MetricsManager::onPeriodicAlarmFired( |
| const uint64_t timestampNs, |
| unordered_set<sp<const InternalAlarm>, SpHash<InternalAlarm>>& alarmSet) { |
| for (const auto& itr : mAllPeriodicAlarmTrackers) { |
| itr->informAlarmsFired(timestampNs, alarmSet); |
| } |
| } |
| |
| // Returns the total byte size of all metrics managed by a single config source. |
| size_t MetricsManager::byteSize() { |
| size_t totalSize = 0; |
| for (auto metricProducer : mAllMetricProducers) { |
| totalSize += metricProducer->byteSize(); |
| } |
| return totalSize; |
| } |
| |
| } // namespace statsd |
| } // namespace os |
| } // namespace android |