#include "performance_service.h" #include #include #include #include #include #include #include #include #include #include #include "task.h" // This prctl is only available in Android kernels. #define PR_SET_TIMERSLACK_PID 41 using android::dvr::IsTrustedUid; using android::dvr::Task; using android::pdx::ErrorStatus; using android::pdx::Message; using android::pdx::Status; using android::pdx::default_transport::Endpoint; using android::pdx::rpc::DispatchRemoteMethod; namespace { const char kCpuSetBasePath[] = "/dev/cpuset"; const char kRootCpuSet[] = "/"; constexpr unsigned long kTimerSlackForegroundNs = 50000; constexpr unsigned long kTimerSlackBackgroundNs = 40000000; // Expands the given parameter pack expression using an initializer list to // guarantee ordering and a comma expression to guarantee even void expressions // are valid elements of the initializer list. #define EXPAND_PACK(...) \ std::initializer_list { (__VA_ARGS__, 0)... } // Returns true if the sender's euid matches any of the uids in |UIDs|. template struct UserId { static bool Check(const Message& sender, const Task&) { const uid_t uid = sender.GetEffectiveUserId(); bool allow = false; EXPAND_PACK(allow |= (uid == UIDs)); return allow; } }; // Returns true if the sender's egid matches any of the gids in |GIDs|. template struct GroupId { static bool Check(const Message& sender, const Task&) { const gid_t gid = sender.GetEffectiveGroupId(); bool allow = false; EXPAND_PACK(allow |= (gid == GIDs)); return allow; } }; // Returns true if the sender's euid is trusted according to VR manager service. struct Trusted { static bool Check(const Message& sender, const Task&) { return IsTrustedUid(sender.GetEffectiveUserId()); } }; // Returns returns true if the task belongs to the sending process. struct SameProcess { static bool Check(const Message& sender, const Task& task) { return sender.GetProcessId() == task.thread_group_id(); } }; // Returns true if any of the checks in |Allows| pass, false otherwise. template struct CheckOr { static bool Check(const Message& sender, const Task& task) { bool allow = false; EXPAND_PACK(allow |= Allows::Check(sender, task)); return allow; } }; // Returns true if all of the checks in |Allows| pass, false otherwise. template struct CheckAnd { static bool Check(const Message& sender, const Task& task) { bool allow = true; EXPAND_PACK(allow &= Allows::Check(sender, task)); return allow; } }; } // anonymous namespace namespace android { namespace dvr { PerformanceService::PerformanceService() : BASE("PerformanceService", Endpoint::Create(PerformanceRPC::kClientPath)) { cpuset_.Load(kCpuSetBasePath); Task task(getpid()); ALOGI("Running in cpuset=%s uid=%d gid=%d", task.GetCpuSetPath().c_str(), task.user_id()[Task::kUidReal], task.group_id()[Task::kUidReal]); // Errors here are checked in IsInitialized(). sched_fifo_min_priority_ = sched_get_priority_min(SCHED_FIFO); sched_fifo_max_priority_ = sched_get_priority_max(SCHED_FIFO); const int fifo_range = sched_fifo_max_priority_ - sched_fifo_min_priority_; const int fifo_low = sched_fifo_min_priority_; const int fifo_medium = sched_fifo_min_priority_ + fifo_range / 5; // TODO(eieio): Make this configurable on the command line or config file. cpuset_.MoveUnboundTasks("/kernel"); // TODO(eieio): Replace this witha device-specific config file. This is just a // hack for now to put some form of permission logic in place while a longer // term solution is developed. using AllowRootSystem = CheckAnd, GroupId>>; using AllowRootSystemGraphics = CheckAnd, GroupId>>; using AllowRootSystemAudio = CheckAnd, GroupId>>; using AllowRootSystemTrusted = CheckOr, GroupId>; partition_permission_check_ = AllowRootSystemTrusted::Check; // Setup the scheduler classes. // TODO(eieio): Replace this with a device-specific config file. scheduler_policies_ = { {"audio:low", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_medium, .permission_check = AllowRootSystemAudio::Check}}, {"audio:high", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_medium + 3, .permission_check = AllowRootSystemAudio::Check}}, {"graphics", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_medium, .permission_check = AllowRootSystemGraphics::Check}}, {"graphics:low", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_medium, .permission_check = AllowRootSystemGraphics::Check}}, {"graphics:high", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_medium + 2, .permission_check = AllowRootSystemGraphics::Check}}, {"sensors", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_low, .permission_check = AllowRootSystem::Check}}, {"sensors:low", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_low, .permission_check = AllowRootSystem::Check}}, {"sensors:high", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_low + 1, .permission_check = AllowRootSystem::Check}}, {"vr:system:arp", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_medium + 2, .permission_check = AllowRootSystemTrusted::Check, "/system/performance"}}, {"vr:app:render", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_FIFO | SCHED_RESET_ON_FORK, .priority = fifo_medium + 1, .permission_check = AllowRootSystemTrusted::Check, "/application/performance"}}, {"normal", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_NORMAL, .priority = 0}}, {"foreground", {.timer_slack = kTimerSlackForegroundNs, .scheduler_policy = SCHED_NORMAL, .priority = 0}}, {"background", {.timer_slack = kTimerSlackBackgroundNs, .scheduler_policy = SCHED_BATCH, .priority = 0}}, {"batch", {.timer_slack = kTimerSlackBackgroundNs, .scheduler_policy = SCHED_BATCH, .priority = 0}}, }; } bool PerformanceService::IsInitialized() const { return BASE::IsInitialized() && cpuset_ && sched_fifo_min_priority_ >= 0 && sched_fifo_max_priority_ >= 0; } std::string PerformanceService::DumpState(size_t /*max_length*/) { return cpuset_.DumpState(); } Status PerformanceService::OnSetSchedulerPolicy( Message& message, pid_t task_id, const std::string& scheduler_policy) { ALOGI( "PerformanceService::OnSetSchedulerPolicy: task_id=%d " "scheduler_policy=%s", task_id, scheduler_policy.c_str()); Task task(task_id); if (!task) { ALOGE( "PerformanceService::OnSetSchedulerPolicy: Unable to access /proc/%d " "to gather task information.", task_id); return ErrorStatus(EINVAL); } auto search = scheduler_policies_.find(scheduler_policy); if (search != scheduler_policies_.end()) { auto config = search->second; // Make sure the sending process is allowed to make the requested change to // this task. if (!config.IsAllowed(message, task)) return ErrorStatus(EINVAL); // Get the thread group's cpu set. Policies that do not specify a cpuset // should default to this cpuset. std::string thread_group_cpuset; Task thread_group{task.thread_group_id()}; if (thread_group) { thread_group_cpuset = thread_group.GetCpuSetPath(); } else { ALOGE( "PerformanceService::OnSetSchedulerPolicy: Failed to get thread " "group tgid=%d for task_id=%d", task.thread_group_id(), task_id); thread_group_cpuset = kRootCpuSet; } std::string target_cpuset; if (config.cpuset.empty()) { target_cpuset = thread_group_cpuset; } else { target_cpuset = config.cpuset; } ALOGI("PerformanceService::OnSetSchedulerPolicy: Using cpuset=%s", target_cpuset.c_str()); auto target_set = cpuset_.Lookup(target_cpuset); if (target_set) { auto attach_status = target_set->AttachTask(task_id); ALOGW_IF(!attach_status, "PerformanceService::OnSetSchedulerPolicy: Failed to attach " "task=%d to cpuset=%s: %s", task_id, target_cpuset.c_str(), attach_status.GetErrorMessage().c_str()); } else { ALOGW( "PerformanceService::OnSetSchedulerPolicy: Failed to lookup " "cpuset=%s", target_cpuset.c_str()); } struct sched_param param; param.sched_priority = config.priority; sched_setscheduler(task_id, config.scheduler_policy, ¶m); prctl(PR_SET_TIMERSLACK_PID, config.timer_slack, task_id); return {}; } else { ALOGE( "PerformanceService::OnSetSchedulerPolicy: Invalid scheduler_policy=%s " "requested by task=%d.", scheduler_policy.c_str(), task_id); return ErrorStatus(EINVAL); } } Status PerformanceService::OnSetCpuPartition( Message& message, pid_t task_id, const std::string& partition) { Task task(task_id); if (!task || task.thread_group_id() != message.GetProcessId()) return ErrorStatus(EINVAL); // Temporary permission check. // TODO(eieio): Replace this with a configuration file. if (partition_permission_check_ && !partition_permission_check_(message, task)) { return ErrorStatus(EINVAL); } auto target_set = cpuset_.Lookup(partition); if (!target_set) return ErrorStatus(ENOENT); auto attach_status = target_set->AttachTask(task_id); if (!attach_status) return attach_status; return {}; } Status PerformanceService::OnSetSchedulerClass( Message& message, pid_t task_id, const std::string& scheduler_class) { Task task(task_id); if (!task) return ErrorStatus(EINVAL); auto search = scheduler_policies_.find(scheduler_class); if (search != scheduler_policies_.end()) { auto config = search->second; // Make sure the sending process is allowed to make the requested change to // this task. if (!config.IsAllowed(message, task)) return ErrorStatus(EINVAL); struct sched_param param; param.sched_priority = config.priority; sched_setscheduler(task_id, config.scheduler_policy, ¶m); prctl(PR_SET_TIMERSLACK_PID, config.timer_slack, task_id); ALOGI("PerformanceService::OnSetSchedulerClass: Set task=%d to class=%s.", task_id, scheduler_class.c_str()); return {}; } else { ALOGE( "PerformanceService::OnSetSchedulerClass: Invalid class=%s requested " "by task=%d.", scheduler_class.c_str(), task_id); return ErrorStatus(EINVAL); } } Status PerformanceService::OnGetCpuPartition(Message& message, pid_t task_id) { // Make sure the task id is valid and belongs to the sending process. Task task(task_id); if (!task || task.thread_group_id() != message.GetProcessId()) return ErrorStatus(EINVAL); return task.GetCpuSetPath(); } Status PerformanceService::HandleMessage(Message& message) { ALOGD_IF(TRACE, "PerformanceService::HandleMessage: op=%d", message.GetOp()); switch (message.GetOp()) { case PerformanceRPC::SetSchedulerPolicy::Opcode: DispatchRemoteMethod( *this, &PerformanceService::OnSetSchedulerPolicy, message); return {}; case PerformanceRPC::SetCpuPartition::Opcode: DispatchRemoteMethod( *this, &PerformanceService::OnSetCpuPartition, message); return {}; case PerformanceRPC::SetSchedulerClass::Opcode: DispatchRemoteMethod( *this, &PerformanceService::OnSetSchedulerClass, message); return {}; case PerformanceRPC::GetCpuPartition::Opcode: DispatchRemoteMethod( *this, &PerformanceService::OnGetCpuPartition, message); return {}; default: return Service::HandleMessage(message); } } } // namespace dvr } // namespace android