2015-06-26 23:02:09 +02:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2017-10-18 00:06:32 +02:00
|
|
|
#include "IdleMaint.h"
|
2018-07-29 15:56:57 +02:00
|
|
|
#include "FileDeviceUtils.h"
|
2015-06-26 23:02:09 +02:00
|
|
|
#include "Utils.h"
|
2020-10-16 01:54:38 +02:00
|
|
|
#include "VoldUtil.h"
|
2015-06-26 23:02:09 +02:00
|
|
|
#include "VolumeManager.h"
|
2017-10-18 00:41:45 +02:00
|
|
|
#include "model/PrivateVolume.h"
|
2015-06-26 23:02:09 +02:00
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
#include <thread>
|
|
|
|
|
|
|
|
#include <android-base/chrono_utils.h>
|
|
|
|
#include <android-base/file.h>
|
2015-12-05 00:50:53 +01:00
|
|
|
#include <android-base/logging.h>
|
2018-08-10 22:50:46 +02:00
|
|
|
#include <android-base/stringprintf.h>
|
|
|
|
#include <android-base/strings.h>
|
2018-09-19 19:28:16 +02:00
|
|
|
#include <android/hardware/health/storage/1.0/IStorage.h>
|
2015-06-26 23:02:09 +02:00
|
|
|
#include <fs_mgr.h>
|
2018-08-10 22:50:46 +02:00
|
|
|
#include <private/android_filesystem_config.h>
|
2019-06-21 21:21:48 +02:00
|
|
|
#include <wakelock/wakelock.h>
|
2015-06-26 23:02:09 +02:00
|
|
|
|
|
|
|
#include <dirent.h>
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <fcntl.h>
|
2015-06-26 23:02:09 +02:00
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
using android::base::Basename;
|
|
|
|
using android::base::ReadFileToString;
|
|
|
|
using android::base::Realpath;
|
2015-06-26 23:02:09 +02:00
|
|
|
using android::base::StringPrintf;
|
2017-10-18 00:41:45 +02:00
|
|
|
using android::base::Timer;
|
|
|
|
using android::base::WriteStringToFile;
|
2018-08-10 22:50:46 +02:00
|
|
|
using android::hardware::Return;
|
|
|
|
using android::hardware::Void;
|
2018-09-19 19:28:16 +02:00
|
|
|
using android::hardware::health::storage::V1_0::IStorage;
|
|
|
|
using android::hardware::health::storage::V1_0::IGarbageCollectCallback;
|
|
|
|
using android::hardware::health::storage::V1_0::Result;
|
2015-06-26 23:02:09 +02:00
|
|
|
|
|
|
|
namespace android {
|
|
|
|
namespace vold {
|
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
enum class PathTypes {
|
|
|
|
kMountPoint = 1,
|
|
|
|
kBlkDevice,
|
|
|
|
};
|
|
|
|
|
|
|
|
enum class IdleMaintStats {
|
|
|
|
kStopped = 1,
|
|
|
|
kRunning,
|
|
|
|
kAbort,
|
|
|
|
};
|
|
|
|
|
2017-10-18 00:06:32 +02:00
|
|
|
static const char* kWakeLock = "IdleMaint";
|
2017-10-18 00:41:45 +02:00
|
|
|
static const int DIRTY_SEGMENTS_THRESHOLD = 100;
|
2018-02-13 06:57:04 +01:00
|
|
|
/*
|
|
|
|
* Timing policy:
|
|
|
|
* 1. F2FS_GC = 7 mins
|
|
|
|
* 2. Trim = 1 min
|
|
|
|
* 3. Dev GC = 2 mins
|
|
|
|
*/
|
|
|
|
static const int GC_TIMEOUT_SEC = 420;
|
|
|
|
static const int DEVGC_TIMEOUT_SEC = 120;
|
2015-06-26 23:02:09 +02:00
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
static IdleMaintStats idle_maint_stat(IdleMaintStats::kStopped);
|
|
|
|
static std::condition_variable cv_abort, cv_stop;
|
|
|
|
static std::mutex cv_m;
|
|
|
|
|
2018-09-18 22:30:21 +02:00
|
|
|
static void addFromVolumeManager(std::list<std::string>* paths, PathTypes path_type) {
|
2015-06-26 23:02:09 +02:00
|
|
|
VolumeManager* vm = VolumeManager::Instance();
|
|
|
|
std::list<std::string> privateIds;
|
|
|
|
vm->listVolumes(VolumeBase::Type::kPrivate, privateIds);
|
2016-07-27 23:11:02 +02:00
|
|
|
for (const auto& id : privateIds) {
|
2017-10-18 00:41:45 +02:00
|
|
|
PrivateVolume* vol = static_cast<PrivateVolume*>(vm->findVolume(id).get());
|
2015-06-26 23:02:09 +02:00
|
|
|
if (vol != nullptr && vol->getState() == VolumeBase::State::kMounted) {
|
2017-10-18 00:41:45 +02:00
|
|
|
if (path_type == PathTypes::kMountPoint) {
|
|
|
|
paths->push_back(vol->getPath());
|
|
|
|
} else if (path_type == PathTypes::kBlkDevice) {
|
|
|
|
std::string gc_path;
|
|
|
|
const std::string& fs_type = vol->getFsType();
|
2018-07-29 15:56:57 +02:00
|
|
|
if (fs_type == "f2fs" && (Realpath(vol->getRawDmDevPath(), &gc_path) ||
|
|
|
|
Realpath(vol->getRawDevPath(), &gc_path))) {
|
2018-09-18 22:30:21 +02:00
|
|
|
paths->push_back(std::string("/sys/fs/") + fs_type + "/" + Basename(gc_path));
|
2017-10-18 00:41:45 +02:00
|
|
|
}
|
|
|
|
}
|
2015-06-26 23:02:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
static void addFromFstab(std::list<std::string>* paths, PathTypes path_type) {
|
2019-01-29 23:34:01 +01:00
|
|
|
std::string previous_mount_point;
|
2020-10-16 01:54:38 +02:00
|
|
|
for (const auto& entry : fstab_default) {
|
IdleMaint: skip swap space, bind mounts, and virtual filesystems
When the idle maintenance task runs on Cuttlefish, there are several
warnings printed to logcat after the expected messages:
D vold : Starting trim of /data
I vold : Trimmed 0 bytes on /data in 36ms
D vold : Starting trim of /cache
I vold : Trimmed 58662912 bytes on /cache in 0ms
D vold : Starting trim of /metadata
I vold : Trimmed 7725056 bytes on /metadata in 12ms
D vold : Starting trim of none
W vold : Failed to open none: No such file or directory
D vold : Starting trim of /sdcard
W vold : Failed to open /sdcard: Not a directory
D vold : Starting trim of /mnt/vendor/shared
W vold : Trim failed on /mnt/vendor/shared: Inappropriate ioctl for device
This is because vold gathers the filesystems to trim from the fstab, but
it fails to exclude some entries that aren't appropriate to trim:
/dev/block/zram0 none swap defaults zramsize=75%
/tmp /sdcard none defaults,bind recoveryonly
shared /mnt/vendor/shared virtiofs nosuid,nodev,noatime nofail
These should be excluded because they are swap space, a bind mount, and
a virtual filesystem respectively.
Fix addFromFstab() to exclude the above cases.
Afterwards, the messages on Cuttlefish are:
D vold : Starting trim of /data
I vold : Trimmed 0 bytes on /data in 39ms
D vold : Starting trim of /cache
I vold : Trimmed 58662912 bytes on /cache in 0ms
D vold : Starting trim of /metadata
I vold : Trimmed 9822208 bytes on /metadata in 12ms
Change-Id: Idc575106fe6f81c737f684429d58dba4bd5478ad
2020-10-16 01:54:38 +02:00
|
|
|
// Skip raw partitions and swap space.
|
|
|
|
if (entry.fs_type == "emmc" || entry.fs_type == "mtd" || entry.fs_type == "swap") {
|
2015-06-26 23:02:09 +02:00
|
|
|
continue;
|
|
|
|
}
|
IdleMaint: skip swap space, bind mounts, and virtual filesystems
When the idle maintenance task runs on Cuttlefish, there are several
warnings printed to logcat after the expected messages:
D vold : Starting trim of /data
I vold : Trimmed 0 bytes on /data in 36ms
D vold : Starting trim of /cache
I vold : Trimmed 58662912 bytes on /cache in 0ms
D vold : Starting trim of /metadata
I vold : Trimmed 7725056 bytes on /metadata in 12ms
D vold : Starting trim of none
W vold : Failed to open none: No such file or directory
D vold : Starting trim of /sdcard
W vold : Failed to open /sdcard: Not a directory
D vold : Starting trim of /mnt/vendor/shared
W vold : Trim failed on /mnt/vendor/shared: Inappropriate ioctl for device
This is because vold gathers the filesystems to trim from the fstab, but
it fails to exclude some entries that aren't appropriate to trim:
/dev/block/zram0 none swap defaults zramsize=75%
/tmp /sdcard none defaults,bind recoveryonly
shared /mnt/vendor/shared virtiofs nosuid,nodev,noatime nofail
These should be excluded because they are swap space, a bind mount, and
a virtual filesystem respectively.
Fix addFromFstab() to exclude the above cases.
Afterwards, the messages on Cuttlefish are:
D vold : Starting trim of /data
I vold : Trimmed 0 bytes on /data in 39ms
D vold : Starting trim of /cache
I vold : Trimmed 58662912 bytes on /cache in 0ms
D vold : Starting trim of /metadata
I vold : Trimmed 9822208 bytes on /metadata in 12ms
Change-Id: Idc575106fe6f81c737f684429d58dba4bd5478ad
2020-10-16 01:54:38 +02:00
|
|
|
// Skip read-only filesystems and bind mounts.
|
|
|
|
if (entry.flags & (MS_RDONLY | MS_BIND)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
// Skip anything without an underlying block device, e.g. virtiofs.
|
|
|
|
if (entry.blk_device[0] != '/') {
|
2015-06-26 23:02:09 +02:00
|
|
|
continue;
|
|
|
|
}
|
2019-01-29 23:34:01 +01:00
|
|
|
if (entry.fs_mgr_flags.vold_managed) {
|
|
|
|
continue; // Should we trim fat32 filesystems?
|
2015-06-26 23:02:09 +02:00
|
|
|
}
|
2019-01-29 23:34:01 +01:00
|
|
|
if (entry.fs_mgr_flags.no_trim) {
|
2015-06-26 23:02:09 +02:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2019-01-29 23:34:01 +01:00
|
|
|
// Skip the multi-type partitions, which are required to be following each other.
|
|
|
|
// See fs_mgr.c's mount_with_alternatives().
|
|
|
|
if (entry.mount_point == previous_mount_point) {
|
2015-06-26 23:02:09 +02:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
if (path_type == PathTypes::kMountPoint) {
|
2019-01-29 23:34:01 +01:00
|
|
|
paths->push_back(entry.mount_point);
|
2017-10-18 00:41:45 +02:00
|
|
|
} else if (path_type == PathTypes::kBlkDevice) {
|
|
|
|
std::string gc_path;
|
2019-01-29 23:34:01 +01:00
|
|
|
if (entry.fs_type == "f2fs" &&
|
|
|
|
Realpath(android::vold::BlockDeviceForPath(entry.mount_point + "/"), &gc_path)) {
|
|
|
|
paths->push_back("/sys/fs/" + entry.fs_type + "/" + Basename(gc_path));
|
2017-10-18 00:41:45 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-29 23:34:01 +01:00
|
|
|
previous_mount_point = entry.mount_point;
|
2015-06-26 23:02:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-18 00:06:32 +02:00
|
|
|
void Trim(const android::sp<android::os::IVoldTaskListener>& listener) {
|
2019-06-21 21:21:48 +02:00
|
|
|
android::wakelock::WakeLock wl{kWakeLock};
|
2015-06-26 23:02:09 +02:00
|
|
|
|
2017-10-18 00:06:32 +02:00
|
|
|
// Collect both fstab and vold volumes
|
|
|
|
std::list<std::string> paths;
|
2017-10-18 00:41:45 +02:00
|
|
|
addFromFstab(&paths, PathTypes::kMountPoint);
|
|
|
|
addFromVolumeManager(&paths, PathTypes::kMountPoint);
|
2017-10-18 00:06:32 +02:00
|
|
|
|
|
|
|
for (const auto& path : paths) {
|
2015-06-26 23:02:09 +02:00
|
|
|
LOG(DEBUG) << "Starting trim of " << path;
|
|
|
|
|
2017-09-15 20:57:44 +02:00
|
|
|
android::os::PersistableBundle extras;
|
|
|
|
extras.putString(String16("path"), String16(path.c_str()));
|
|
|
|
|
2015-06-26 23:02:09 +02:00
|
|
|
int fd = open(path.c_str(), O_RDONLY | O_DIRECTORY | O_CLOEXEC | O_NOFOLLOW);
|
|
|
|
if (fd < 0) {
|
|
|
|
PLOG(WARNING) << "Failed to open " << path;
|
2017-10-18 00:06:32 +02:00
|
|
|
if (listener) {
|
|
|
|
listener->onStatus(-1, extras);
|
2017-09-15 20:57:44 +02:00
|
|
|
}
|
2015-06-26 23:02:09 +02:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct fstrim_range range;
|
|
|
|
memset(&range, 0, sizeof(range));
|
|
|
|
range.len = ULLONG_MAX;
|
|
|
|
|
|
|
|
nsecs_t start = systemTime(SYSTEM_TIME_BOOTTIME);
|
2017-10-18 00:06:32 +02:00
|
|
|
if (ioctl(fd, FITRIM, &range)) {
|
2015-06-26 23:02:09 +02:00
|
|
|
PLOG(WARNING) << "Trim failed on " << path;
|
2017-10-18 00:06:32 +02:00
|
|
|
if (listener) {
|
|
|
|
listener->onStatus(-1, extras);
|
2017-09-15 20:57:44 +02:00
|
|
|
}
|
2015-06-26 23:02:09 +02:00
|
|
|
} else {
|
2017-09-15 20:57:44 +02:00
|
|
|
nsecs_t time = systemTime(SYSTEM_TIME_BOOTTIME) - start;
|
2018-09-18 22:30:21 +02:00
|
|
|
LOG(INFO) << "Trimmed " << range.len << " bytes on " << path << " in "
|
|
|
|
<< nanoseconds_to_milliseconds(time) << "ms";
|
2017-09-15 20:57:44 +02:00
|
|
|
extras.putLong(String16("bytes"), range.len);
|
|
|
|
extras.putLong(String16("time"), time);
|
2017-10-18 00:06:32 +02:00
|
|
|
if (listener) {
|
|
|
|
listener->onStatus(0, extras);
|
2017-09-15 20:57:44 +02:00
|
|
|
}
|
2015-06-26 23:02:09 +02:00
|
|
|
}
|
|
|
|
close(fd);
|
2017-09-15 20:57:44 +02:00
|
|
|
}
|
2015-06-26 23:02:09 +02:00
|
|
|
|
2017-10-18 00:06:32 +02:00
|
|
|
if (listener) {
|
2017-09-15 20:57:44 +02:00
|
|
|
android::os::PersistableBundle extras;
|
2017-10-18 00:06:32 +02:00
|
|
|
listener->onFinished(0, extras);
|
2015-06-26 23:02:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
static bool waitForGc(const std::list<std::string>& paths) {
|
|
|
|
std::unique_lock<std::mutex> lk(cv_m, std::defer_lock);
|
|
|
|
bool stop = false, aborted = false;
|
|
|
|
Timer timer;
|
|
|
|
|
|
|
|
while (!stop && !aborted) {
|
|
|
|
stop = true;
|
|
|
|
for (const auto& path : paths) {
|
|
|
|
std::string dirty_segments;
|
|
|
|
if (!ReadFileToString(path + "/dirty_segments", &dirty_segments)) {
|
|
|
|
PLOG(WARNING) << "Reading dirty_segments failed in " << path;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (std::stoi(dirty_segments) > DIRTY_SEGMENTS_THRESHOLD) {
|
|
|
|
stop = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (stop) break;
|
|
|
|
|
|
|
|
if (timer.duration() >= std::chrono::seconds(GC_TIMEOUT_SEC)) {
|
|
|
|
LOG(WARNING) << "GC timeout";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
lk.lock();
|
2018-09-18 22:30:21 +02:00
|
|
|
aborted =
|
|
|
|
cv_abort.wait_for(lk, 10s, [] { return idle_maint_stat == IdleMaintStats::kAbort; });
|
2017-10-18 00:41:45 +02:00
|
|
|
lk.unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
return aborted;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int startGc(const std::list<std::string>& paths) {
|
|
|
|
for (const auto& path : paths) {
|
|
|
|
LOG(DEBUG) << "Start GC on " << path;
|
|
|
|
if (!WriteStringToFile("1", path + "/gc_urgent")) {
|
|
|
|
PLOG(WARNING) << "Start GC failed on " << path;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return android::OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int stopGc(const std::list<std::string>& paths) {
|
|
|
|
for (const auto& path : paths) {
|
|
|
|
LOG(DEBUG) << "Stop GC on " << path;
|
|
|
|
if (!WriteStringToFile("0", path + "/gc_urgent")) {
|
|
|
|
PLOG(WARNING) << "Stop GC failed on " << path;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return android::OK;
|
|
|
|
}
|
|
|
|
|
2018-08-10 22:50:46 +02:00
|
|
|
static void runDevGcFstab(void) {
|
2019-01-29 23:34:01 +01:00
|
|
|
std::string path;
|
2020-10-16 01:54:38 +02:00
|
|
|
for (const auto& entry : fstab_default) {
|
2019-01-29 23:34:01 +01:00
|
|
|
if (!entry.sysfs_path.empty()) {
|
|
|
|
path = entry.sysfs_path;
|
2018-02-13 06:57:04 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2019-01-29 23:34:01 +01:00
|
|
|
|
|
|
|
if (path.empty()) {
|
2018-02-13 06:57:04 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
path = path + "/manual_gc";
|
|
|
|
Timer timer;
|
|
|
|
|
|
|
|
LOG(DEBUG) << "Start Dev GC on " << path;
|
|
|
|
while (1) {
|
|
|
|
std::string require;
|
|
|
|
if (!ReadFileToString(path, &require)) {
|
|
|
|
PLOG(WARNING) << "Reading manual_gc failed in " << path;
|
|
|
|
break;
|
|
|
|
}
|
2018-08-10 22:50:46 +02:00
|
|
|
require = android::base::Trim(require);
|
2018-02-13 06:57:04 +01:00
|
|
|
if (require == "" || require == "off" || require == "disabled") {
|
|
|
|
LOG(DEBUG) << "No more to do Dev GC";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG(DEBUG) << "Trigger Dev GC on " << path;
|
|
|
|
if (!WriteStringToFile("1", path)) {
|
|
|
|
PLOG(WARNING) << "Start Dev GC failed on " << path;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (timer.duration() >= std::chrono::seconds(DEVGC_TIMEOUT_SEC)) {
|
|
|
|
LOG(WARNING) << "Dev GC timeout";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
sleep(2);
|
|
|
|
}
|
|
|
|
LOG(DEBUG) << "Stop Dev GC on " << path;
|
|
|
|
if (!WriteStringToFile("0", path)) {
|
|
|
|
PLOG(WARNING) << "Stop Dev GC failed on " << path;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2018-08-10 22:50:46 +02:00
|
|
|
class GcCallback : public IGarbageCollectCallback {
|
|
|
|
public:
|
|
|
|
Return<void> onFinish(Result result) override {
|
|
|
|
std::unique_lock<std::mutex> lock(mMutex);
|
|
|
|
mFinished = true;
|
|
|
|
mResult = result;
|
|
|
|
lock.unlock();
|
|
|
|
mCv.notify_all();
|
|
|
|
return Void();
|
|
|
|
}
|
|
|
|
void wait(uint64_t seconds) {
|
|
|
|
std::unique_lock<std::mutex> lock(mMutex);
|
|
|
|
mCv.wait_for(lock, std::chrono::seconds(seconds), [this] { return mFinished; });
|
|
|
|
|
|
|
|
if (!mFinished) {
|
|
|
|
LOG(WARNING) << "Dev GC on HAL timeout";
|
|
|
|
} else if (mResult != Result::SUCCESS) {
|
|
|
|
LOG(WARNING) << "Dev GC on HAL failed with " << toString(mResult);
|
|
|
|
} else {
|
|
|
|
LOG(INFO) << "Dev GC on HAL successful";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
std::mutex mMutex;
|
|
|
|
std::condition_variable mCv;
|
|
|
|
bool mFinished{false};
|
|
|
|
Result mResult{Result::UNKNOWN_ERROR};
|
|
|
|
};
|
|
|
|
|
2018-09-19 19:28:16 +02:00
|
|
|
static void runDevGcOnHal(sp<IStorage> service) {
|
2018-08-10 22:50:46 +02:00
|
|
|
LOG(DEBUG) << "Start Dev GC on HAL";
|
|
|
|
sp<GcCallback> cb = new GcCallback();
|
|
|
|
auto ret = service->garbageCollect(DEVGC_TIMEOUT_SEC, cb);
|
|
|
|
if (!ret.isOk()) {
|
|
|
|
LOG(WARNING) << "Cannot start Dev GC on HAL: " << ret.description();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
cb->wait(DEVGC_TIMEOUT_SEC);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void runDevGc(void) {
|
2018-09-19 19:28:16 +02:00
|
|
|
auto service = IStorage::getService();
|
2018-08-10 22:50:46 +02:00
|
|
|
if (service != nullptr) {
|
|
|
|
runDevGcOnHal(service);
|
|
|
|
} else {
|
|
|
|
// fallback to legacy code path
|
|
|
|
runDevGcFstab();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-10-18 00:41:45 +02:00
|
|
|
int RunIdleMaint(const android::sp<android::os::IVoldTaskListener>& listener) {
|
|
|
|
std::unique_lock<std::mutex> lk(cv_m);
|
|
|
|
if (idle_maint_stat != IdleMaintStats::kStopped) {
|
|
|
|
LOG(DEBUG) << "idle maintenance is already running";
|
|
|
|
if (listener) {
|
|
|
|
android::os::PersistableBundle extras;
|
|
|
|
listener->onFinished(0, extras);
|
|
|
|
}
|
|
|
|
return android::OK;
|
|
|
|
}
|
|
|
|
idle_maint_stat = IdleMaintStats::kRunning;
|
|
|
|
lk.unlock();
|
|
|
|
|
|
|
|
LOG(DEBUG) << "idle maintenance started";
|
|
|
|
|
2019-06-21 21:21:48 +02:00
|
|
|
android::wakelock::WakeLock wl{kWakeLock};
|
2017-10-18 00:41:45 +02:00
|
|
|
|
|
|
|
std::list<std::string> paths;
|
|
|
|
addFromFstab(&paths, PathTypes::kBlkDevice);
|
|
|
|
addFromVolumeManager(&paths, PathTypes::kBlkDevice);
|
|
|
|
|
|
|
|
startGc(paths);
|
|
|
|
|
|
|
|
bool gc_aborted = waitForGc(paths);
|
|
|
|
|
|
|
|
stopGc(paths);
|
|
|
|
|
|
|
|
lk.lock();
|
|
|
|
idle_maint_stat = IdleMaintStats::kStopped;
|
|
|
|
lk.unlock();
|
|
|
|
|
|
|
|
cv_stop.notify_one();
|
|
|
|
|
|
|
|
if (!gc_aborted) {
|
|
|
|
Trim(nullptr);
|
2018-02-13 06:57:04 +01:00
|
|
|
runDevGc();
|
2017-10-18 00:41:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (listener) {
|
|
|
|
android::os::PersistableBundle extras;
|
|
|
|
listener->onFinished(0, extras);
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG(DEBUG) << "idle maintenance completed";
|
|
|
|
|
|
|
|
return android::OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
int AbortIdleMaint(const android::sp<android::os::IVoldTaskListener>& listener) {
|
2019-06-21 21:21:48 +02:00
|
|
|
android::wakelock::WakeLock wl{kWakeLock};
|
2017-10-18 00:41:45 +02:00
|
|
|
|
|
|
|
std::unique_lock<std::mutex> lk(cv_m);
|
|
|
|
if (idle_maint_stat != IdleMaintStats::kStopped) {
|
|
|
|
idle_maint_stat = IdleMaintStats::kAbort;
|
|
|
|
lk.unlock();
|
|
|
|
cv_abort.notify_one();
|
|
|
|
lk.lock();
|
|
|
|
LOG(DEBUG) << "aborting idle maintenance";
|
2018-09-18 22:30:21 +02:00
|
|
|
cv_stop.wait(lk, [] { return idle_maint_stat == IdleMaintStats::kStopped; });
|
2017-10-18 00:41:45 +02:00
|
|
|
}
|
|
|
|
lk.unlock();
|
|
|
|
|
|
|
|
if (listener) {
|
|
|
|
android::os::PersistableBundle extras;
|
|
|
|
listener->onFinished(0, extras);
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG(DEBUG) << "idle maintenance stopped";
|
|
|
|
|
|
|
|
return android::OK;
|
|
|
|
}
|
|
|
|
|
2015-06-26 23:02:09 +02:00
|
|
|
} // namespace vold
|
|
|
|
} // namespace android
|