blob: 1445c7c69986dc62d1e5fecbabfaab06053bc08d [file] [log] [blame]
Andy Hung06f3aba2019-12-03 16:36:42 -08001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#pragma once
18
19#include <any>
20#include <map>
Andy Hung3ab1b322020-05-18 10:47:31 -070021#include <mutex>
Andy Hung06f3aba2019-12-03 16:36:42 -080022#include <sstream>
23#include <string>
24#include <variant>
25#include <vector>
26
Andy Hungf7c14102020-04-18 14:54:08 -070027#include <android-base/thread_annotations.h>
Ray Essickf27e9872019-12-07 06:28:46 -080028#include <media/MediaMetricsItem.h>
Andy Hung06f3aba2019-12-03 16:36:42 -080029#include <utils/Timers.h>
30
31namespace android::mediametrics {
32
33// define a way of printing the monostate
34inline std::ostream & operator<< (std::ostream& s,
35 std::monostate const& v __unused) {
36 s << "none_item";
37 return s;
38}
39
Andy Hunge8989ae2020-01-03 12:20:43 -080040// define a way of printing a std::pair.
41template <typename T, typename U>
42std::ostream & operator<< (std::ostream& s,
43 const std::pair<T, U>& v) {
44 s << "{ " << v.first << ", " << v.second << " }";
45 return s;
46}
47
Andy Hung06f3aba2019-12-03 16:36:42 -080048// define a way of printing a variant
49// see https://en.cppreference.com/w/cpp/utility/variant/visit
50template <typename T0, typename ... Ts>
51std::ostream & operator<< (std::ostream& s,
52 std::variant<T0, Ts...> const& v) {
53 std::visit([&s](auto && arg){ s << std::forward<decltype(arg)>(arg); }, v);
54 return s;
55}
56
57/**
58 * The TimeMachine is used to record timing changes of MediaAnalyticItem
59 * properties.
60 *
Andy Hung8f069622020-02-10 15:44:01 -080061 * Any URL that ends with '#' (AMEDIAMETRICS_PROP_SUFFIX_CHAR_DUPLICATES_ALLOWED)
62 * will have a time sequence that keeps duplicates.
Andy Hung06f3aba2019-12-03 16:36:42 -080063 *
64 * The TimeMachine is NOT thread safe.
65 */
Andy Hunga8f1c6e2020-01-02 18:25:41 -080066class TimeMachine final { // made final as we have copy constructor instead of dup() override.
Andy Hunge8989ae2020-01-03 12:20:43 -080067public:
68 using Elem = Item::Prop::Elem; // use the Item property element.
Andy Hung06f3aba2019-12-03 16:36:42 -080069 using PropertyHistory = std::multimap<int64_t /* time */, Elem>;
70
Andy Hunge8989ae2020-01-03 12:20:43 -080071private:
72
Andy Hung06f3aba2019-12-03 16:36:42 -080073 // KeyHistory contains no lock.
74 // Access is through the TimeMachine, and a hash-striped lock is used
75 // before calling into KeyHistory.
76 class KeyHistory {
77 public:
78 template <typename T>
Andy Hungd203eb62020-04-27 09:12:46 -070079 KeyHistory(T key, uid_t allowUid, int64_t time)
Andy Hung06f3aba2019-12-03 16:36:42 -080080 : mKey(key)
Andy Hungd203eb62020-04-27 09:12:46 -070081 , mAllowUid(allowUid)
Andy Hung06f3aba2019-12-03 16:36:42 -080082 , mCreationTime(time)
83 , mLastModificationTime(time)
84 {
Andy Hung3ab1b322020-05-18 10:47:31 -070085 (void)mCreationTime; // suppress unused warning.
86
Andy Hungd203eb62020-04-27 09:12:46 -070087 // allowUid allows an untrusted client with a matching uid to set properties
88 // in this key.
89 // If allowUid == (uid_t)-1, no untrusted client may set properties in the key.
90 if (allowUid != (uid_t)-1) {
91 // Set ALLOWUID property here; does not change after key creation.
92 putValue(AMEDIAMETRICS_PROP_ALLOWUID, (int32_t)allowUid, time);
93 }
Andy Hung06f3aba2019-12-03 16:36:42 -080094 }
95
Andy Hunga8f1c6e2020-01-02 18:25:41 -080096 KeyHistory(const KeyHistory &other) = default;
97
Andy Hungd203eb62020-04-27 09:12:46 -070098 // Return NO_ERROR only if the passed in uidCheck is -1 or matches
99 // the internal mAllowUid.
100 // An external submit will always have a valid uidCheck parameter.
101 // An internal get request within mediametrics will have a uidCheck == -1 which
102 // we allow to proceed.
Andy Hung06f3aba2019-12-03 16:36:42 -0800103 status_t checkPermission(uid_t uidCheck) const {
Andy Hungd203eb62020-04-27 09:12:46 -0700104 return uidCheck != (uid_t)-1 && uidCheck != mAllowUid ? PERMISSION_DENIED : NO_ERROR;
Andy Hung06f3aba2019-12-03 16:36:42 -0800105 }
106
107 template <typename T>
Andy Hungf7c14102020-04-18 14:54:08 -0700108 status_t getValue(const std::string &property, T* value, int64_t time = 0) const
109 REQUIRES(mPseudoKeyHistoryLock) {
Andy Hunged416da2020-03-05 18:42:55 -0800110 if (time == 0) time = systemTime(SYSTEM_TIME_REALTIME);
Andy Hung06f3aba2019-12-03 16:36:42 -0800111 const auto tsptr = mPropertyMap.find(property);
112 if (tsptr == mPropertyMap.end()) return BAD_VALUE;
113 const auto& timeSequence = tsptr->second;
114 auto eptr = timeSequence.upper_bound(time);
115 if (eptr == timeSequence.begin()) return BAD_VALUE;
116 --eptr;
117 if (eptr == timeSequence.end()) return BAD_VALUE;
118 const T* vptr = std::get_if<T>(&eptr->second);
119 if (vptr == nullptr) return BAD_VALUE;
120 *value = *vptr;
121 return NO_ERROR;
122 }
123
124 template <typename T>
Andy Hungf7c14102020-04-18 14:54:08 -0700125 status_t getValue(const std::string &property, T defaultValue, int64_t time = 0) const
126 REQUIRES(mPseudoKeyHistoryLock){
Andy Hung06f3aba2019-12-03 16:36:42 -0800127 T value;
128 return getValue(property, &value, time) != NO_ERROR ? defaultValue : value;
129 }
130
131 void putProp(
Andy Hungf7c14102020-04-18 14:54:08 -0700132 const std::string &name, const mediametrics::Item::Prop &prop, int64_t time = 0)
133 REQUIRES(mPseudoKeyHistoryLock) {
Andy Hunge8989ae2020-01-03 12:20:43 -0800134 //alternatively: prop.visit([&](auto value) { putValue(name, value, time); });
135 putValue(name, prop.get(), time);
Andy Hung06f3aba2019-12-03 16:36:42 -0800136 }
137
138 template <typename T>
Andy Hungf7c14102020-04-18 14:54:08 -0700139 void putValue(const std::string &property, T&& e, int64_t time = 0)
140 REQUIRES(mPseudoKeyHistoryLock) {
Andy Hunged416da2020-03-05 18:42:55 -0800141 if (time == 0) time = systemTime(SYSTEM_TIME_REALTIME);
Andy Hung06f3aba2019-12-03 16:36:42 -0800142 mLastModificationTime = time;
Andy Hung5d3f2d12020-03-04 19:55:03 -0800143 if (mPropertyMap.size() >= kKeyMaxProperties &&
144 !mPropertyMap.count(property)) {
145 ALOGV("%s: too many properties, rejecting %s", __func__, property.c_str());
jiabin0fd85022023-03-14 23:59:15 +0000146 mRejectedPropertiesCount++;
Andy Hung5d3f2d12020-03-04 19:55:03 -0800147 return;
148 }
Andy Hung06f3aba2019-12-03 16:36:42 -0800149 auto& timeSequence = mPropertyMap[property];
150 Elem el{std::forward<T>(e)};
151 if (timeSequence.empty() // no elements
Andy Hung8f069622020-02-10 15:44:01 -0800152 || property.back() == AMEDIAMETRICS_PROP_SUFFIX_CHAR_DUPLICATES_ALLOWED
Andy Hung06f3aba2019-12-03 16:36:42 -0800153 || timeSequence.rbegin()->second != el) { // value changed
Andy Hung7d391082020-04-18 15:03:51 -0700154 timeSequence.emplace_hint(timeSequence.end(), time, std::move(el));
Andy Hung5d3f2d12020-03-04 19:55:03 -0800155
156 if (timeSequence.size() > kTimeSequenceMaxElements) {
157 ALOGV("%s: restricting maximum elements (discarding oldest) for %s",
158 __func__, property.c_str());
159 timeSequence.erase(timeSequence.begin());
160 }
Andy Hung06f3aba2019-12-03 16:36:42 -0800161 }
162 }
163
Andy Hungf7c14102020-04-18 14:54:08 -0700164 std::pair<std::string, int32_t> dump(int32_t lines, int64_t time) const
165 REQUIRES(mPseudoKeyHistoryLock) {
Andy Hung06f3aba2019-12-03 16:36:42 -0800166 std::stringstream ss;
167 int32_t ll = lines;
168 for (auto& tsPair : mPropertyMap) {
169 if (ll <= 0) break;
Andy Hung709b91e2020-04-04 14:23:36 -0700170 std::string s = dump(mKey, tsPair, time);
171 if (s.size() > 0) {
172 --ll;
Andy Hungb744faf2020-04-09 13:09:26 -0700173 ss << s;
Andy Hung709b91e2020-04-04 14:23:36 -0700174 }
Andy Hung06f3aba2019-12-03 16:36:42 -0800175 }
jiabin0fd85022023-03-14 23:59:15 +0000176 if (ll > 0 && mRejectedPropertiesCount > 0) {
177 ss << "Rejected properties: " << mRejectedPropertiesCount << "\n";
178 ll--;
179 }
Andy Hung06f3aba2019-12-03 16:36:42 -0800180 return { ss.str(), lines - ll };
181 }
182
Andy Hungf7c14102020-04-18 14:54:08 -0700183 int64_t getLastModificationTime() const REQUIRES(mPseudoKeyHistoryLock) {
184 return mLastModificationTime;
185 }
Andy Hung06f3aba2019-12-03 16:36:42 -0800186
187 private:
188 static std::string dump(
189 const std::string &key,
190 const std::pair<std::string /* prop */, PropertyHistory>& tsPair,
191 int64_t time) {
192 const auto timeSequence = tsPair.second;
193 auto eptr = timeSequence.lower_bound(time);
194 if (eptr == timeSequence.end()) {
Andy Hung709b91e2020-04-04 14:23:36 -0700195 return {}; // don't dump anything. tsPair.first + "={};\n";
Andy Hung06f3aba2019-12-03 16:36:42 -0800196 }
197 std::stringstream ss;
198 ss << key << "." << tsPair.first << "={";
Andy Hung3b4c1f02020-01-23 18:58:32 -0800199
200 time_string_t last_timestring{}; // last timestring used.
201 while (true) {
202 const time_string_t timestring = mediametrics::timeStringFromNs(eptr->first);
203 // find common prefix offset.
204 const size_t offset = commonTimePrefixPosition(timestring.time,
205 last_timestring.time);
206 last_timestring = timestring;
207 ss << "(" << (offset == 0 ? "" : "~") << &timestring.time[offset]
208 << ") " << eptr->second;
209 if (++eptr == timeSequence.end()) {
Andy Hung3b4c1f02020-01-23 18:58:32 -0800210 break;
211 }
212 ss << ", ";
213 }
Andy Hung06f3aba2019-12-03 16:36:42 -0800214 ss << "};\n";
215 return ss.str();
216 }
217
218 const std::string mKey;
Andy Hungd203eb62020-04-27 09:12:46 -0700219 const uid_t mAllowUid;
Andy Hung3ab1b322020-05-18 10:47:31 -0700220 const int64_t mCreationTime;
Andy Hung06f3aba2019-12-03 16:36:42 -0800221
jiabin0fd85022023-03-14 23:59:15 +0000222 unsigned int mRejectedPropertiesCount = 0;
Andy Hung06f3aba2019-12-03 16:36:42 -0800223 int64_t mLastModificationTime;
224 std::map<std::string /* property */, PropertyHistory> mPropertyMap;
225 };
226
227 using History = std::map<std::string /* key */, std::shared_ptr<KeyHistory>>;
228
Andy Hung47178c22020-06-18 18:57:35 -0700229 static inline constexpr size_t kTimeSequenceMaxElements = 50;
jiabin0fd85022023-03-14 23:59:15 +0000230 static inline constexpr size_t kKeyMaxProperties = 128;
Andy Hung47178c22020-06-18 18:57:35 -0700231 static inline constexpr size_t kKeyLowWaterMark = 400;
232 static inline constexpr size_t kKeyHighWaterMark = 500;
Andy Hung06f3aba2019-12-03 16:36:42 -0800233
234 // Estimated max data space usage is 3KB * kKeyHighWaterMark.
235
236public:
237
238 TimeMachine() = default;
239 TimeMachine(size_t keyLowWaterMark, size_t keyHighWaterMark)
240 : mKeyLowWaterMark(keyLowWaterMark)
241 , mKeyHighWaterMark(keyHighWaterMark) {
242 LOG_ALWAYS_FATAL_IF(keyHighWaterMark <= keyLowWaterMark,
243 "%s: required that keyHighWaterMark:%zu > keyLowWaterMark:%zu",
244 __func__, keyHighWaterMark, keyLowWaterMark);
245 }
246
Andy Hunga8f1c6e2020-01-02 18:25:41 -0800247 // The TimeMachine copy constructor/assignment uses a deep copy,
248 // though the snapshot is not instantaneous nor isochronous.
249 //
250 // If there are concurrent operations ongoing in the other TimeMachine
251 // then there may be some history more recent than others (a time shear).
252 // This is expected to be a benign addition in history as small number of
253 // future elements are incorporated.
254 TimeMachine(const TimeMachine& other) {
255 *this = other;
256 }
257 TimeMachine& operator=(const TimeMachine& other) {
258 std::lock_guard lock(mLock);
259 mHistory.clear();
260
261 {
262 std::lock_guard lock2(other.mLock);
263 mHistory = other.mHistory;
Andy Hung47178c22020-06-18 18:57:35 -0700264 mGarbageCollectionCount = other.mGarbageCollectionCount.load();
Andy Hunga8f1c6e2020-01-02 18:25:41 -0800265 }
266
267 // Now that we safely have our own shared pointers, let's dup them
268 // to ensure they are decoupled. We do this by acquiring the other lock.
269 for (const auto &[lkey, lhist] : mHistory) {
270 std::lock_guard lock2(other.getLockForKey(lkey));
271 mHistory[lkey] = std::make_shared<KeyHistory>(*lhist);
272 }
273 return *this;
274 }
275
Andy Hung06f3aba2019-12-03 16:36:42 -0800276 /**
277 * Put all the properties from an item into the Time Machine log.
278 */
Ray Essickf27e9872019-12-07 06:28:46 -0800279 status_t put(const std::shared_ptr<const mediametrics::Item>& item, bool isTrusted = false) {
Andy Hung06f3aba2019-12-03 16:36:42 -0800280 const int64_t time = item->getTimestamp();
281 const std::string &key = item->getKey();
282
Andy Hung5d3f2d12020-03-04 19:55:03 -0800283 ALOGV("%s(%zu, %zu): key: %s isTrusted:%d size:%zu",
284 __func__, mKeyLowWaterMark, mKeyHighWaterMark,
285 key.c_str(), (int)isTrusted, item->count());
Andy Hung06f3aba2019-12-03 16:36:42 -0800286 std::shared_ptr<KeyHistory> keyHistory;
287 {
288 std::vector<std::any> garbage;
289 std::lock_guard lock(mLock);
290
291 auto it = mHistory.find(key);
292 if (it == mHistory.end()) {
293 if (!isTrusted) return PERMISSION_DENIED;
294
Andy Hungf7c14102020-04-18 14:54:08 -0700295 (void)gc(garbage);
Andy Hung06f3aba2019-12-03 16:36:42 -0800296
Andy Hungd203eb62020-04-27 09:12:46 -0700297 // We set the allowUid for client access on key creation.
298 int32_t allowUid = -1;
299 (void)item->get(AMEDIAMETRICS_PROP_ALLOWUID, &allowUid);
Andy Hung06f3aba2019-12-03 16:36:42 -0800300 // no keylock needed here as we are sole owner
301 // until placed on mHistory.
302 keyHistory = std::make_shared<KeyHistory>(
Andy Hungd203eb62020-04-27 09:12:46 -0700303 key, allowUid, time);
Andy Hung06f3aba2019-12-03 16:36:42 -0800304 mHistory[key] = keyHistory;
305 } else {
306 keyHistory = it->second;
307 }
308 }
309
310 // deferred contains remote properties (for other keys) to do later.
Ray Essickf27e9872019-12-07 06:28:46 -0800311 std::vector<const mediametrics::Item::Prop *> deferred;
Andy Hung06f3aba2019-12-03 16:36:42 -0800312 {
313 // handle local properties
314 std::lock_guard lock(getLockForKey(key));
315 if (!isTrusted) {
316 status_t status = keyHistory->checkPermission(item->getUid());
317 if (status != NO_ERROR) return status;
318 }
319
320 for (const auto &prop : *item) {
321 const std::string &name = prop.getName();
322 if (name.size() == 0 || name[0] == '_') continue;
323
324 // Cross key settings are with [key]property
325 if (name[0] == '[') {
326 if (!isTrusted) continue;
327 deferred.push_back(&prop);
328 } else {
329 keyHistory->putProp(name, prop, time);
330 }
331 }
332 }
333
334 // handle remote properties, if any
335 for (const auto propptr : deferred) {
336 const auto &prop = *propptr;
337 const std::string &name = prop.getName();
338 size_t end = name.find_first_of(']'); // TODO: handle nested [] or escape?
339 if (end == 0) continue;
340 std::string remoteKey = name.substr(1, end - 1);
341 std::string remoteName = name.substr(end + 1);
342 if (remoteKey.size() == 0 || remoteName.size() == 0) continue;
343 std::shared_ptr<KeyHistory> remoteKeyHistory;
344 {
345 std::lock_guard lock(mLock);
346 auto it = mHistory.find(remoteKey);
347 if (it == mHistory.end()) continue;
348 remoteKeyHistory = it->second;
349 }
Andy Hungb744faf2020-04-09 13:09:26 -0700350 std::lock_guard lock(getLockForKey(remoteKey));
Andy Hung06f3aba2019-12-03 16:36:42 -0800351 remoteKeyHistory->putProp(remoteName, prop, time);
352 }
353 return NO_ERROR;
354 }
355
356 template <typename T>
357 status_t get(const std::string &key, const std::string &property,
358 T* value, int32_t uidCheck = -1, int64_t time = 0) const {
359 std::shared_ptr<KeyHistory> keyHistory;
360 {
361 std::lock_guard lock(mLock);
362 const auto it = mHistory.find(key);
363 if (it == mHistory.end()) return BAD_VALUE;
364 keyHistory = it->second;
365 }
366 std::lock_guard lock(getLockForKey(key));
367 return keyHistory->checkPermission(uidCheck)
368 ?: keyHistory->getValue(property, value, time);
369 }
370
371 /**
372 * Individual property put.
373 *
Andy Hunged416da2020-03-05 18:42:55 -0800374 * Put takes in a time (if none is provided then SYSTEM_TIME_REALTIME is used).
Andy Hung06f3aba2019-12-03 16:36:42 -0800375 */
376 template <typename T>
377 status_t put(const std::string &url, T &&e, int64_t time = 0) {
378 std::string key;
379 std::string prop;
380 std::shared_ptr<KeyHistory> keyHistory =
381 getKeyHistoryFromUrl(url, &key, &prop);
382 if (keyHistory == nullptr) return BAD_VALUE;
Andy Hunged416da2020-03-05 18:42:55 -0800383 if (time == 0) time = systemTime(SYSTEM_TIME_REALTIME);
Andy Hung06f3aba2019-12-03 16:36:42 -0800384 std::lock_guard lock(getLockForKey(key));
385 keyHistory->putValue(prop, std::forward<T>(e), time);
386 return NO_ERROR;
387 }
388
389 /**
390 * Individual property get
391 */
392 template <typename T>
393 status_t get(const std::string &url, T* value, int32_t uidCheck, int64_t time = 0) const {
394 std::string key;
395 std::string prop;
396 std::shared_ptr<KeyHistory> keyHistory =
397 getKeyHistoryFromUrl(url, &key, &prop);
398 if (keyHistory == nullptr) return BAD_VALUE;
399
400 std::lock_guard lock(getLockForKey(key));
401 return keyHistory->checkPermission(uidCheck)
402 ?: keyHistory->getValue(prop, value, time);
403 }
404
405 /**
406 * Individual property get with default
407 */
408 template <typename T>
409 T get(const std::string &url, const T &defaultValue, int32_t uidCheck,
410 int64_t time = 0) const {
411 T value;
412 return get(url, &value, uidCheck, time) == NO_ERROR
413 ? value : defaultValue;
414 }
415
416 /**
417 * Returns number of keys in the Time Machine.
418 */
419 size_t size() const {
420 std::lock_guard lock(mLock);
421 return mHistory.size();
422 }
423
424 /**
425 * Clears all properties from the Time Machine.
426 */
427 void clear() {
428 std::lock_guard lock(mLock);
429 mHistory.clear();
Andy Hung47178c22020-06-18 18:57:35 -0700430 mGarbageCollectionCount = 0;
Andy Hung06f3aba2019-12-03 16:36:42 -0800431 }
432
433 /**
434 * Returns a pair consisting of the TimeMachine state as a string
435 * and the number of lines in the string.
436 *
437 * The number of lines in the returned pair is used as an optimization
438 * for subsequent line limiting.
439 *
440 * \param lines the maximum number of lines in the string returned.
441 * \param key selects only that key.
Andy Hung709b91e2020-04-04 14:23:36 -0700442 * \param sinceNs the nanoseconds since Unix epoch to start dump (0 shows all)
443 * \param prefix the desired key prefix to match (nullptr shows all)
Andy Hung06f3aba2019-12-03 16:36:42 -0800444 */
445 std::pair<std::string, int32_t> dump(
Andy Hung709b91e2020-04-04 14:23:36 -0700446 int32_t lines = INT32_MAX, int64_t sinceNs = 0, const char *prefix = nullptr) const {
Andy Hung06f3aba2019-12-03 16:36:42 -0800447 std::lock_guard lock(mLock);
Andy Hung06f3aba2019-12-03 16:36:42 -0800448 std::stringstream ss;
449 int32_t ll = lines;
Andy Hung709b91e2020-04-04 14:23:36 -0700450
451 for (auto it = prefix != nullptr ? mHistory.lower_bound(prefix) : mHistory.begin();
452 it != mHistory.end();
453 ++it) {
454 if (ll <= 0) break;
455 if (prefix != nullptr && !startsWith(it->first, prefix)) break;
Andy Hung3ab1b322020-05-18 10:47:31 -0700456 std::lock_guard lock2(getLockForKey(it->first));
Andy Hung709b91e2020-04-04 14:23:36 -0700457 auto [s, l] = it->second->dump(ll, sinceNs);
Andy Hungb744faf2020-04-09 13:09:26 -0700458 ss << s;
Andy Hung06f3aba2019-12-03 16:36:42 -0800459 ll -= l;
460 }
461 return { ss.str(), lines - ll };
462 }
463
Andy Hung47178c22020-06-18 18:57:35 -0700464 size_t getGarbageCollectionCount() const {
465 return mGarbageCollectionCount;
466 }
467
Andy Hung06f3aba2019-12-03 16:36:42 -0800468private:
469
470 // Obtains the lock for a KeyHistory.
Andy Hungf7c14102020-04-18 14:54:08 -0700471 std::mutex &getLockForKey(const std::string &key) const
472 RETURN_CAPABILITY(mPseudoKeyHistoryLock) {
Andy Hung06f3aba2019-12-03 16:36:42 -0800473 return mKeyLocks[std::hash<std::string>{}(key) % std::size(mKeyLocks)];
474 }
475
476 // Finds a KeyHistory from a URL. Returns nullptr if not found.
477 std::shared_ptr<KeyHistory> getKeyHistoryFromUrl(
Andy Hungb744faf2020-04-09 13:09:26 -0700478 const std::string& url, std::string* key, std::string *prop) const {
Andy Hung06f3aba2019-12-03 16:36:42 -0800479 std::lock_guard lock(mLock);
480
481 auto it = mHistory.upper_bound(url);
482 if (it == mHistory.begin()) {
483 return nullptr;
484 }
485 --it; // go to the actual key, if it exists.
486
487 const std::string& itKey = it->first;
488 if (strncmp(itKey.c_str(), url.c_str(), itKey.size())) {
489 return nullptr;
490 }
491 if (key) *key = itKey;
492 if (prop) *prop = url.substr(itKey.size() + 1);
493 return it->second;
494 }
495
Andy Hung06f3aba2019-12-03 16:36:42 -0800496 /**
497 * Garbage collects if the TimeMachine size exceeds the high water mark.
498 *
Andy Hung5d3f2d12020-03-04 19:55:03 -0800499 * This GC operation limits the number of keys stored (not the size of properties
500 * stored in each key).
501 *
Andy Hung06f3aba2019-12-03 16:36:42 -0800502 * \param garbage a type-erased vector of elements to be destroyed
503 * outside of lock. Move large items to be destroyed here.
504 *
505 * \return true if garbage collection was done.
506 */
Andy Hungf7c14102020-04-18 14:54:08 -0700507 bool gc(std::vector<std::any>& garbage) REQUIRES(mLock) {
Andy Hung06f3aba2019-12-03 16:36:42 -0800508 // TODO: something better than this for garbage collection.
509 if (mHistory.size() < mKeyHighWaterMark) return false;
510
Andy Hung06f3aba2019-12-03 16:36:42 -0800511 // erase everything explicitly expired.
512 std::multimap<int64_t, std::string> accessList;
513 // use a stale vector with precise type to avoid type erasure overhead in garbage
514 std::vector<std::shared_ptr<KeyHistory>> stale;
515
516 for (auto it = mHistory.begin(); it != mHistory.end();) {
517 const std::string& key = it->first;
518 std::shared_ptr<KeyHistory> &keyHist = it->second;
519
520 std::lock_guard lock(getLockForKey(it->first));
521 int64_t expireTime = keyHist->getValue("_expire", -1 /* default */);
522 if (expireTime != -1) {
523 stale.emplace_back(std::move(it->second));
524 it = mHistory.erase(it);
525 } else {
526 accessList.emplace(keyHist->getLastModificationTime(), key);
527 ++it;
528 }
529 }
530
531 if (mHistory.size() > mKeyLowWaterMark) {
532 const size_t toDelete = mHistory.size() - mKeyLowWaterMark;
533 auto it = accessList.begin();
534 for (size_t i = 0; i < toDelete; ++i) {
535 auto it2 = mHistory.find(it->second);
536 stale.emplace_back(std::move(it2->second));
537 mHistory.erase(it2);
538 ++it;
539 }
540 }
541 garbage.emplace_back(std::move(accessList));
542 garbage.emplace_back(std::move(stale));
543
544 ALOGD("%s(%zu, %zu): key size:%zu",
545 __func__, mKeyLowWaterMark, mKeyHighWaterMark,
546 mHistory.size());
Andy Hung47178c22020-06-18 18:57:35 -0700547
548 ++mGarbageCollectionCount;
Andy Hung06f3aba2019-12-03 16:36:42 -0800549 return true;
550 }
551
552 const size_t mKeyLowWaterMark = kKeyLowWaterMark;
553 const size_t mKeyHighWaterMark = kKeyHighWaterMark;
554
Andy Hung47178c22020-06-18 18:57:35 -0700555 std::atomic<size_t> mGarbageCollectionCount{};
556
Andy Hung06f3aba2019-12-03 16:36:42 -0800557 /**
558 * Locking Strategy
559 *
560 * Each key in the History has a KeyHistory. To get a shared pointer to
561 * the KeyHistory requires a lookup of mHistory under mLock. Once the shared
562 * pointer to KeyHistory is obtained, the mLock for mHistory can be released.
563 *
564 * Once the shared pointer to the key's KeyHistory is obtained, the KeyHistory
565 * can be locked for read and modification through the method getLockForKey().
566 *
567 * Instead of having a mutex per KeyHistory, we use a hash striped lock
568 * which assigns a mutex based on the hash of the key string.
569 *
570 * Once the last shared pointer reference to KeyHistory is released, it is
571 * destroyed. This is done through the garbage collection method.
572 *
573 * This two level locking allows multiple threads to access the TimeMachine
574 * in parallel.
575 */
576
577 mutable std::mutex mLock; // Lock for mHistory
Andy Hungf7c14102020-04-18 14:54:08 -0700578 History mHistory GUARDED_BY(mLock);
Andy Hung06f3aba2019-12-03 16:36:42 -0800579
580 // KEY_LOCKS is the number of mutexes for keys.
581 // It need not be a power of 2, but faster that way.
582 static inline constexpr size_t KEY_LOCKS = 256;
583 mutable std::mutex mKeyLocks[KEY_LOCKS]; // Hash-striped lock for KeyHistory based on key.
Andy Hungf7c14102020-04-18 14:54:08 -0700584
585 // Used for thread-safety analysis, we create a fake mutex object to represent
586 // the hash stripe lock mechanism, which is then tracked by the compiler.
587 class CAPABILITY("mutex") PseudoLock {};
588 static inline PseudoLock mPseudoKeyHistoryLock;
Andy Hung06f3aba2019-12-03 16:36:42 -0800589};
590
591} // namespace android::mediametrics