blob: 91279661b61f5d83dc09bacb6551e211a1b8994e [file] [log] [blame]
/*
* Copyright (C) 2017 The Android Open Source Project
*
* Licensed under the Apache License, versionCode 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define DEBUG true // STOPSHIP if true
#include "Log.h"
#include "guardrail/StatsdStats.h"
#include "packages/UidMap.h"
#include <android/os/IStatsCompanionService.h>
#include <binder/IServiceManager.h>
#include <utils/Errors.h>
#include <inttypes.h>
using namespace android;
namespace android {
namespace os {
namespace statsd {
UidMap::UidMap() : mBytesUsed(0) {}
UidMap::~UidMap() {}
bool UidMap::hasApp(int uid, const string& packageName) const {
lock_guard<mutex> lock(mMutex);
auto range = mMap.equal_range(uid);
for (auto it = range.first; it != range.second; ++it) {
if (it->second.packageName == packageName) {
return true;
}
}
return false;
}
string UidMap::normalizeAppName(const string& appName) const {
string normalizedName = appName;
std::transform(normalizedName.begin(), normalizedName.end(), normalizedName.begin(), ::tolower);
return normalizedName;
}
std::set<string> UidMap::getAppNamesFromUid(const int32_t& uid, bool returnNormalized) const {
lock_guard<mutex> lock(mMutex);
return getAppNamesFromUidLocked(uid,returnNormalized);
}
std::set<string> UidMap::getAppNamesFromUidLocked(const int32_t& uid, bool returnNormalized) const {
std::set<string> names;
auto range = mMap.equal_range(uid);
for (auto it = range.first; it != range.second; ++it) {
names.insert(returnNormalized ?
normalizeAppName(it->second.packageName) : it->second.packageName);
}
return names;
}
int64_t UidMap::getAppVersion(int uid, const string& packageName) const {
lock_guard<mutex> lock(mMutex);
auto range = mMap.equal_range(uid);
for (auto it = range.first; it != range.second; ++it) {
if (it->second.packageName == packageName) {
return it->second.versionCode;
}
}
return 0;
}
void UidMap::updateMap(const vector<int32_t>& uid, const vector<int64_t>& versionCode,
const vector<String16>& packageName) {
updateMap(time(nullptr) * NS_PER_SEC, uid, versionCode, packageName);
}
void UidMap::updateMap(const int64_t& timestamp, const vector<int32_t>& uid,
const vector<int64_t>& versionCode, const vector<String16>& packageName) {
vector<wp<PackageInfoListener>> broadcastList;
{
lock_guard<mutex> lock(mMutex); // Exclusively lock for updates.
mMap.clear();
for (size_t j = 0; j < uid.size(); j++) {
mMap.insert(make_pair(
uid[j], AppData(string(String8(packageName[j]).string()), versionCode[j])));
}
auto snapshot = mOutput.add_snapshots();
snapshot->set_timestamp_nanos(timestamp);
for (size_t j = 0; j < uid.size(); j++) {
auto t = snapshot->add_package_info();
t->set_name(string(String8(packageName[j]).string()));
t->set_version(int(versionCode[j]));
t->set_uid(uid[j]);
}
mBytesUsed += snapshot->ByteSize();
ensureBytesUsedBelowLimit();
StatsdStats::getInstance().setCurrentUidMapMemory(mBytesUsed);
StatsdStats::getInstance().setUidMapSnapshots(mOutput.snapshots_size());
getListenerListCopyLocked(&broadcastList);
}
// To avoid invoking callback while holding the internal lock. we get a copy of the listener
// list and invoke the callback. It's still possible that after we copy the list, a
// listener removes itself before we call it. It's then the listener's job to handle it (expect
// the callback to be called after listener is removed, and the listener should properly
// ignore it).
for (auto weakPtr : broadcastList) {
auto strongPtr = weakPtr.promote();
if (strongPtr != NULL) {
strongPtr->onUidMapReceived();
}
}
}
void UidMap::updateApp(const String16& app_16, const int32_t& uid, const int64_t& versionCode) {
updateApp(time(nullptr) * NS_PER_SEC, app_16, uid, versionCode);
}
void UidMap::updateApp(const int64_t& timestamp, const String16& app_16, const int32_t& uid,
const int64_t& versionCode) {
vector<wp<PackageInfoListener>> broadcastList;
string appName = string(String8(app_16).string());
{
lock_guard<mutex> lock(mMutex);
auto log = mOutput.add_changes();
log->set_deletion(false);
log->set_timestamp_nanos(timestamp);
log->set_app(appName);
log->set_uid(uid);
log->set_version(versionCode);
mBytesUsed += log->ByteSize();
ensureBytesUsedBelowLimit();
StatsdStats::getInstance().setCurrentUidMapMemory(mBytesUsed);
StatsdStats::getInstance().setUidMapChanges(mOutput.changes_size());
auto range = mMap.equal_range(int(uid));
bool found = false;
for (auto it = range.first; it != range.second; ++it) {
// If we find the exact same app name and uid, update the app version directly.
if (it->second.packageName == appName) {
it->second.versionCode = versionCode;
found = true;
break;
}
}
if (!found) {
// Otherwise, we need to add an app at this uid.
mMap.insert(make_pair(uid, AppData(appName, versionCode)));
}
getListenerListCopyLocked(&broadcastList);
}
for (auto weakPtr : broadcastList) {
auto strongPtr = weakPtr.promote();
if (strongPtr != NULL) {
strongPtr->notifyAppUpgrade(appName, uid, versionCode);
}
}
}
void UidMap::ensureBytesUsedBelowLimit() {
size_t limit;
if (maxBytesOverride <= 0) {
limit = StatsdStats::kMaxBytesUsedUidMap;
} else {
limit = maxBytesOverride;
}
while (mBytesUsed > limit) {
VLOG("Bytes used %zu is above limit %zu, need to delete something", mBytesUsed, limit);
if (mOutput.snapshots_size() > 0) {
auto snapshots = mOutput.mutable_snapshots();
snapshots->erase(snapshots->begin()); // Remove first snapshot.
StatsdStats::getInstance().noteUidMapDropped(1, 0);
} else if (mOutput.changes_size() > 0) {
auto changes = mOutput.mutable_changes();
changes->DeleteSubrange(0, 1);
StatsdStats::getInstance().noteUidMapDropped(0, 1);
}
mBytesUsed = mOutput.ByteSize();
}
}
void UidMap::removeApp(const String16& app_16, const int32_t& uid) {
removeApp(time(nullptr) * NS_PER_SEC, app_16, uid);
}
void UidMap::getListenerListCopyLocked(vector<wp<PackageInfoListener>>* output) {
for (auto weakIt = mSubscribers.begin(); weakIt != mSubscribers.end();) {
auto strongPtr = weakIt->promote();
if (strongPtr != NULL) {
output->push_back(*weakIt);
weakIt++;
} else {
weakIt = mSubscribers.erase(weakIt);
VLOG("The UidMap listener is gone, remove it now");
}
}
}
void UidMap::removeApp(const int64_t& timestamp, const String16& app_16, const int32_t& uid) {
vector<wp<PackageInfoListener>> broadcastList;
string app = string(String8(app_16).string());
{
lock_guard<mutex> lock(mMutex);
auto log = mOutput.add_changes();
log->set_deletion(true);
log->set_timestamp_nanos(timestamp);
log->set_app(app);
log->set_uid(uid);
mBytesUsed += log->ByteSize();
ensureBytesUsedBelowLimit();
StatsdStats::getInstance().setCurrentUidMapMemory(mBytesUsed);
StatsdStats::getInstance().setUidMapChanges(mOutput.changes_size());
auto range = mMap.equal_range(int(uid));
for (auto it = range.first; it != range.second; ++it) {
if (it->second.packageName == app) {
mMap.erase(it);
break;
}
}
getListenerListCopyLocked(&broadcastList);
}
for (auto weakPtr : broadcastList) {
auto strongPtr = weakPtr.promote();
if (strongPtr != NULL) {
strongPtr->notifyAppRemoved(app, uid);
}
}
}
void UidMap::addListener(wp<PackageInfoListener> producer) {
lock_guard<mutex> lock(mMutex); // Lock for updates
mSubscribers.insert(producer);
}
void UidMap::removeListener(wp<PackageInfoListener> producer) {
lock_guard<mutex> lock(mMutex); // Lock for updates
mSubscribers.erase(producer);
}
void UidMap::assignIsolatedUid(int isolatedUid, int parentUid) {
lock_guard<mutex> lock(mIsolatedMutex);
mIsolatedUidMap[isolatedUid] = parentUid;
}
void UidMap::removeIsolatedUid(int isolatedUid, int parentUid) {
lock_guard<mutex> lock(mIsolatedMutex);
auto it = mIsolatedUidMap.find(isolatedUid);
if (it != mIsolatedUidMap.end()) {
mIsolatedUidMap.erase(it);
}
}
int UidMap::getHostUidOrSelf(int uid) const {
lock_guard<mutex> lock(mIsolatedMutex);
auto it = mIsolatedUidMap.find(uid);
if (it != mIsolatedUidMap.end()) {
return it->second;
}
return uid;
}
void UidMap::clearOutput() {
mOutput.Clear();
// Also update the guardrail trackers.
StatsdStats::getInstance().setUidMapChanges(0);
StatsdStats::getInstance().setUidMapSnapshots(1);
mBytesUsed = 0;
StatsdStats::getInstance().setCurrentUidMapMemory(mBytesUsed);
}
int64_t UidMap::getMinimumTimestampNs() {
int64_t m = 0;
for (auto it : mLastUpdatePerConfigKey) {
if (m == 0) {
m = it.second;
} else if (it.second < m) {
m = it.second;
}
}
return m;
}
size_t UidMap::getBytesUsed() const {
return mBytesUsed;
}
UidMapping UidMap::getOutput(const ConfigKey& key) {
return getOutput(time(nullptr) * NS_PER_SEC, key);
}
UidMapping UidMap::getOutput(const int64_t& timestamp, const ConfigKey& key) {
lock_guard<mutex> lock(mMutex); // Lock for updates
auto ret = UidMapping(mOutput); // Copy that will be returned.
int64_t prevMin = getMinimumTimestampNs();
mLastUpdatePerConfigKey[key] = timestamp;
int64_t newMin = getMinimumTimestampNs();
if (newMin > prevMin) {
int64_t cutoff_nanos = newMin;
auto snapshots = mOutput.mutable_snapshots();
auto it_snapshots = snapshots->cbegin();
while (it_snapshots != snapshots->cend()) {
if (it_snapshots->timestamp_nanos() < cutoff_nanos) {
// it_snapshots now points to the following element.
it_snapshots = snapshots->erase(it_snapshots);
} else {
++it_snapshots;
}
}
auto deltas = mOutput.mutable_changes();
auto it_deltas = deltas->cbegin();
while (it_deltas != deltas->cend()) {
if (it_deltas->timestamp_nanos() < cutoff_nanos) {
// it_deltas now points to the following element.
it_deltas = deltas->erase(it_deltas);
} else {
++it_deltas;
}
}
if (mOutput.snapshots_size() == 0) {
// Produce another snapshot. This results in extra data being uploaded but helps
// ensure we can re-construct the UID->app name, versionCode mapping in server.
auto snapshot = mOutput.add_snapshots();
snapshot->set_timestamp_nanos(timestamp);
for (auto it : mMap) {
auto t = snapshot->add_package_info();
t->set_name(it.second.packageName);
t->set_version(it.second.versionCode);
t->set_uid(it.first);
}
}
}
mBytesUsed = mOutput.ByteSize(); // Compute actual size after potential deletions.
StatsdStats::getInstance().setCurrentUidMapMemory(mBytesUsed);
StatsdStats::getInstance().setUidMapChanges(mOutput.changes_size());
StatsdStats::getInstance().setUidMapSnapshots(mOutput.snapshots_size());
return ret;
}
void UidMap::printUidMap(FILE* out) const {
lock_guard<mutex> lock(mMutex);
for (auto it : mMap) {
fprintf(out, "%s, v%" PRId64 " (%i)\n", it.second.packageName.c_str(),
it.second.versionCode, it.first);
}
}
void UidMap::OnConfigUpdated(const ConfigKey& key) {
mLastUpdatePerConfigKey[key] = -1;
// Ensure there is at least one snapshot available since this configuration also needs to know
// what all the uid's represent.
if (mOutput.snapshots_size() == 0) {
sp<IStatsCompanionService> statsCompanion = nullptr;
// Get statscompanion service from service manager
const sp<IServiceManager> sm(defaultServiceManager());
if (sm != nullptr) {
const String16 name("statscompanion");
statsCompanion = interface_cast<IStatsCompanionService>(sm->checkService(name));
if (statsCompanion == nullptr) {
ALOGW("statscompanion service unavailable!");
return;
}
statsCompanion->triggerUidSnapshot();
}
}
}
void UidMap::OnConfigRemoved(const ConfigKey& key) {
mLastUpdatePerConfigKey.erase(key);
}
set<int32_t> UidMap::getAppUid(const string& package) const {
lock_guard<mutex> lock(mMutex);
set<int32_t> results;
for (const auto& pair : mMap) {
if (pair.second.packageName == package) {
results.insert(pair.first);
}
}
return results;
}
// Note not all the following AIDs are used as uids. Some are used only for gids.
// It's ok to leave them in the map, but we won't ever see them in the log's uid field.
// App's uid starts from 10000, and will not overlap with the following AIDs.
const std::map<string, uint32_t> UidMap::sAidToUidMapping = {{"AID_ROOT", 0},
{"AID_SYSTEM", 1000},
{"AID_RADIO", 1001},
{"AID_BLUETOOTH", 1002},
{"AID_GRAPHICS", 1003},
{"AID_INPUT", 1004},
{"AID_AUDIO", 1005},
{"AID_CAMERA", 1006},
{"AID_LOG", 1007},
{"AID_COMPASS", 1008},
{"AID_MOUNT", 1009},
{"AID_WIFI", 1010},
{"AID_ADB", 1011},
{"AID_INSTALL", 1012},
{"AID_MEDIA", 1013},
{"AID_DHCP", 1014},
{"AID_SDCARD_RW", 1015},
{"AID_VPN", 1016},
{"AID_KEYSTORE", 1017},
{"AID_USB", 1018},
{"AID_DRM", 1019},
{"AID_MDNSR", 1020},
{"AID_GPS", 1021},
// {"AID_UNUSED1", 1022},
{"AID_MEDIA_RW", 1023},
{"AID_MTP", 1024},
// {"AID_UNUSED2", 1025},
{"AID_DRMRPC", 1026},
{"AID_NFC", 1027},
{"AID_SDCARD_R", 1028},
{"AID_CLAT", 1029},
{"AID_LOOP_RADIO", 1030},
{"AID_MEDIA_DRM", 1031},
{"AID_PACKAGE_INFO", 1032},
{"AID_SDCARD_PICS", 1033},
{"AID_SDCARD_AV", 1034},
{"AID_SDCARD_ALL", 1035},
{"AID_LOGD", 1036},
{"AID_SHARED_RELRO", 1037},
{"AID_DBUS", 1038},
{"AID_TLSDATE", 1039},
{"AID_MEDIA_EX", 1040},
{"AID_AUDIOSERVER", 1041},
{"AID_METRICS_COLL", 1042},
{"AID_METRICSD", 1043},
{"AID_WEBSERV", 1044},
{"AID_DEBUGGERD", 1045},
{"AID_MEDIA_CODEC", 1046},
{"AID_CAMERASERVER", 1047},
{"AID_FIREWALL", 1048},
{"AID_TRUNKS", 1049},
{"AID_NVRAM", 1050},
{"AID_DNS", 1051},
{"AID_DNS_TETHER", 1052},
{"AID_WEBVIEW_ZYGOTE", 1053},
{"AID_VEHICLE_NETWORK", 1054},
{"AID_MEDIA_AUDIO", 1055},
{"AID_MEDIA_VIDEO", 1056},
{"AID_MEDIA_IMAGE", 1057},
{"AID_TOMBSTONED", 1058},
{"AID_MEDIA_OBB", 1059},
{"AID_ESE", 1060},
{"AID_OTA_UPDATE", 1061},
{"AID_AUTOMOTIVE_EVS", 1062},
{"AID_LOWPAN", 1063},
{"AID_HSM", 1064},
{"AID_RESERVED_DISK", 1065},
{"AID_STATSD", 1066},
{"AID_INCIDENTD", 1067},
{"AID_SHELL", 2000},
{"AID_CACHE", 2001},
{"AID_DIAG", 2002}};
} // namespace statsd
} // namespace os
} // namespace android