blob: 1d26d8543d6a22dcd4567ae1222b8f4dd5ff511b [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Jason Parksdcd39582009-11-03 12:14:38 -080017#define LOG_TAG "IPCThreadState"
18
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070019#include <binder/IPCThreadState.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080020
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070021#include <binder/Binder.h>
22#include <binder/BpBinder.h>
Mathias Agopian002e1e52013-05-06 20:20:50 -070023#include <binder/TextOutput.h>
24
Steven Moreland7732a092019-01-02 17:54:16 -080025#include <utils/CallStack.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080026
Hans Boehma997b232019-04-12 16:59:00 -070027#include <atomic>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080028#include <errno.h>
Colin Cross96e83222016-04-15 14:29:55 -070029#include <inttypes.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080030#include <pthread.h>
31#include <sched.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080032#include <signal.h>
33#include <stdio.h>
34#include <sys/ioctl.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080035#include <sys/resource.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080036#include <unistd.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080037
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -070038#include "Utils.h"
Steven Moreland6ba5a252021-05-04 22:49:00 +000039#include "binder_module.h"
Steven Morelanda4853cd2019-07-12 15:44:37 -070040
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080041#if LOG_NDEBUG
42
43#define IF_LOG_TRANSACTIONS() if (false)
44#define IF_LOG_COMMANDS() if (false)
mattgilbride85897672022-10-22 17:42:44 +000045#define LOG_REMOTEREFS(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080046#define IF_LOG_REMOTEREFS() if (false)
Tim Murrayd429f4a2017-03-07 09:31:09 -080047
mattgilbride85897672022-10-22 17:42:44 +000048#define LOG_THREADPOOL(...)
49#define LOG_ONEWAY(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080050
51#else
52
Steve Block9f760152011-10-12 17:27:03 +010053#define IF_LOG_TRANSACTIONS() IF_ALOG(LOG_VERBOSE, "transact")
54#define IF_LOG_COMMANDS() IF_ALOG(LOG_VERBOSE, "ipc")
55#define LOG_REMOTEREFS(...) ALOG(LOG_DEBUG, "remoterefs", __VA_ARGS__)
56#define IF_LOG_REMOTEREFS() IF_ALOG(LOG_DEBUG, "remoterefs")
57#define LOG_THREADPOOL(...) ALOG(LOG_DEBUG, "threadpool", __VA_ARGS__)
58#define LOG_ONEWAY(...) ALOG(LOG_DEBUG, "ipc", __VA_ARGS__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080059
60#endif
61
62// ---------------------------------------------------------------------------
63
64namespace android {
65
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -070066using namespace std::chrono_literals;
67
Chih-Hung Hsieh8e5337d2014-10-24 14:10:09 -070068// Static const and functions will be optimized out if not used,
69// when LOG_NDEBUG and references in IF_LOG_COMMANDS() are optimized out.
Devin Moorea7499132023-12-15 18:48:39 +000070static const char* kReturnStrings[] = {
71 "BR_ERROR",
72 "BR_OK",
Devin Moore58029202023-12-15 18:58:48 +000073 "BR_TRANSACTION/BR_TRANSACTION_SEC_CTX",
Devin Moorea7499132023-12-15 18:48:39 +000074 "BR_REPLY",
75 "BR_ACQUIRE_RESULT",
76 "BR_DEAD_REPLY",
77 "BR_TRANSACTION_COMPLETE",
78 "BR_INCREFS",
79 "BR_ACQUIRE",
80 "BR_RELEASE",
81 "BR_DECREFS",
82 "BR_ATTEMPT_ACQUIRE",
83 "BR_NOOP",
84 "BR_SPAWN_LOOPER",
85 "BR_FINISHED",
86 "BR_DEAD_BINDER",
87 "BR_CLEAR_DEATH_NOTIFICATION_DONE",
88 "BR_FAILED_REPLY",
89 "BR_FROZEN_REPLY",
90 "BR_ONEWAY_SPAM_SUSPECT",
91 "BR_TRANSACTION_PENDING_FROZEN",
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -070092 "BR_FROZEN_BINDER",
93 "BR_CLEAR_FREEZE_NOTIFICATION_DONE",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080094};
95
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -070096static const char* kCommandStrings[] = {
97 "BC_TRANSACTION",
98 "BC_REPLY",
99 "BC_ACQUIRE_RESULT",
100 "BC_FREE_BUFFER",
101 "BC_INCREFS",
102 "BC_ACQUIRE",
103 "BC_RELEASE",
104 "BC_DECREFS",
105 "BC_INCREFS_DONE",
106 "BC_ACQUIRE_DONE",
107 "BC_ATTEMPT_ACQUIRE",
108 "BC_REGISTER_LOOPER",
109 "BC_ENTER_LOOPER",
110 "BC_EXIT_LOOPER",
111 "BC_REQUEST_DEATH_NOTIFICATION",
112 "BC_CLEAR_DEATH_NOTIFICATION",
113 "BC_DEAD_BINDER_DONE",
114 "BC_TRANSACTION_SG",
115 "BC_REPLY_SG",
116 "BC_REQUEST_FREEZE_NOTIFICATION",
117 "BC_CLEAR_FREEZE_NOTIFICATION",
118 "BC_FREEZE_NOTIFICATION_DONE",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800119};
120
Olivier Gaillard91a04802018-11-14 17:32:41 +0000121static const int64_t kWorkSourcePropagatedBitIndex = 32;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100122
songjinshi73a7dde2016-10-18 21:05:56 +0800123static const char* getReturnString(uint32_t cmd)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800124{
songjinshi8e486c62019-04-04 11:22:52 +0800125 size_t idx = cmd & _IOC_NRMASK;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800126 if (idx < sizeof(kReturnStrings) / sizeof(kReturnStrings[0]))
127 return kReturnStrings[idx];
128 else
129 return "unknown";
130}
131
Pawan Wagh7063b522022-09-28 18:52:26 +0000132static const void* printBinderTransactionData(std::ostream& out, const void* data) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800133 const binder_transaction_data* btd =
134 (const binder_transaction_data*)data;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700135 if (btd->target.handle < 1024) {
136 /* want to print descriptors in decimal; guess based on value */
Pawan Wagh7063b522022-09-28 18:52:26 +0000137 out << "\ttarget.desc=" << btd->target.handle;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700138 } else {
Pawan Wagh7063b522022-09-28 18:52:26 +0000139 out << "\ttarget.ptr=" << btd->target.ptr;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700140 }
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000141 out << "\t (cookie " << btd->cookie << ")\n"
Pawan Wagh7063b522022-09-28 18:52:26 +0000142 << "\tcode=" << TypeCode(btd->code) << ", flags=" << (void*)(uint64_t)btd->flags << "\n"
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000143 << "\tdata=" << btd->data.ptr.buffer << " (" << (void*)btd->data_size << " bytes)\n"
144 << "\toffsets=" << btd->data.ptr.offsets << " (" << (void*)btd->offsets_size << " bytes)\n";
145 return btd + 1;
146}
147
148static const void* printBinderTransactionDataSecCtx(std::ostream& out, const void* data) {
149 const binder_transaction_data_secctx* btd = (const binder_transaction_data_secctx*)data;
150
151 printBinderTransactionData(out, &btd->transaction_data);
152
153 char* secctx = (char*)btd->secctx;
154 out << "\tsecctx=" << secctx << "\n";
155
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800156 return btd+1;
157}
158
Pawan Wagh7063b522022-09-28 18:52:26 +0000159static const void* printReturnCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700160 static const size_t N = sizeof(kReturnStrings)/sizeof(kReturnStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800161 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100162 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700163 size_t cmdIndex = code & 0xff;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100164 if (code == BR_ERROR) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000165 out << "\tBR_ERROR: " << (void*)(uint64_t)(*cmd++) << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800166 return cmd;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700167 } else if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000168 out << "\tUnknown reply: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800169 return cmd;
170 }
Pawan Wagh7063b522022-09-28 18:52:26 +0000171 out << "\t" << kReturnStrings[cmdIndex];
Tim Murrayd429f4a2017-03-07 09:31:09 -0800172
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800173 switch (code) {
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000174 case BR_TRANSACTION_SEC_CTX: {
175 out << ": ";
176 cmd = (const int32_t*)printBinderTransactionDataSecCtx(out, cmd);
177 } break;
178
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800179 case BR_TRANSACTION:
180 case BR_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000181 out << ": ";
182 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800183 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800184
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800185 case BR_ACQUIRE_RESULT: {
186 const int32_t res = *cmd++;
187 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
188 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800189
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800190 case BR_INCREFS:
191 case BR_ACQUIRE:
192 case BR_RELEASE:
193 case BR_DECREFS: {
194 const int32_t b = *cmd++;
195 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900196 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800197 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800198
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800199 case BR_ATTEMPT_ACQUIRE: {
200 const int32_t p = *cmd++;
201 const int32_t b = *cmd++;
202 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900203 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800204 << "), pri=" << p;
205 } break;
206
207 case BR_DEAD_BINDER:
208 case BR_CLEAR_DEATH_NOTIFICATION_DONE: {
209 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900210 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800211 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700212
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700213 case BR_FROZEN_BINDER: {
214 const int32_t c = *cmd++;
215 const int32_t h = *cmd++;
216 const int32_t isFrozen = *cmd++;
217 out << ": freeze cookie " << (void*)(uint64_t)c << " isFrozen: " << isFrozen;
218 } break;
219
220 case BR_CLEAR_FREEZE_NOTIFICATION_DONE: {
221 const int32_t c = *cmd++;
222 out << ": freeze cookie " << (void*)(uint64_t)c;
223 } break;
224
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700225 default:
226 // no details to show for: BR_OK, BR_DEAD_REPLY,
227 // BR_TRANSACTION_COMPLETE, BR_FINISHED
228 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800229 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800230
Pawan Wagh7063b522022-09-28 18:52:26 +0000231 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800232 return cmd;
233}
234
Pawan Wagh7063b522022-09-28 18:52:26 +0000235static const void* printCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700236 static const size_t N = sizeof(kCommandStrings)/sizeof(kCommandStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800237 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100238 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700239 size_t cmdIndex = code & 0xff;
240
241 if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000242 out << "Unknown command: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800243 return cmd;
244 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700245 out << kCommandStrings[cmdIndex];
246
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800247 switch (code) {
248 case BC_TRANSACTION:
249 case BC_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000250 out << ": ";
251 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800252 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800253
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800254 case BC_ACQUIRE_RESULT: {
255 const int32_t res = *cmd++;
256 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
257 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800258
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800259 case BC_FREE_BUFFER: {
260 const int32_t buf = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900261 out << ": buffer=" << (void*)(uint64_t)buf;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800262 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800263
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800264 case BC_INCREFS:
265 case BC_ACQUIRE:
266 case BC_RELEASE:
267 case BC_DECREFS: {
268 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700269 out << ": desc=" << d;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800270 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800271
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800272 case BC_INCREFS_DONE:
273 case BC_ACQUIRE_DONE: {
274 const int32_t b = *cmd++;
275 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900276 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800277 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800278
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800279 case BC_ATTEMPT_ACQUIRE: {
280 const int32_t p = *cmd++;
281 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700282 out << ": desc=" << d << ", pri=" << p;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800283 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800284
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800285 case BC_REQUEST_DEATH_NOTIFICATION:
286 case BC_CLEAR_DEATH_NOTIFICATION: {
287 const int32_t h = *cmd++;
288 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900289 out << ": handle=" << h << " (death cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800290 } break;
291
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700292 case BC_REQUEST_FREEZE_NOTIFICATION:
293 case BC_CLEAR_FREEZE_NOTIFICATION: {
294 const int32_t h = *cmd++;
295 const int32_t c = *cmd++;
296 out << ": handle=" << h << " (freeze cookie " << (void*)(uint64_t)c << ")";
297 } break;
298
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800299 case BC_DEAD_BINDER_DONE: {
300 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900301 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800302 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700303
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700304 case BC_FREEZE_NOTIFICATION_DONE: {
305 const int32_t c = *cmd++;
306 out << ": freeze cookie " << (void*)(uint64_t)c;
307 } break;
308
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700309 default:
310 // no details to show for: BC_REGISTER_LOOPER, BC_ENTER_LOOPER,
311 // BC_EXIT_LOOPER
312 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800313 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800314
Pawan Wagh7063b522022-09-28 18:52:26 +0000315 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800316 return cmd;
317}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800318
Tomasz Wasilczyk370408e2024-06-21 15:45:26 -0700319LIBBINDER_IGNORE("-Wzero-as-null-pointer-constant")
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800320static pthread_mutex_t gTLSMutex = PTHREAD_MUTEX_INITIALIZER;
Tomasz Wasilczyk370408e2024-06-21 15:45:26 -0700321LIBBINDER_IGNORE_END()
Hans Boehma997b232019-04-12 16:59:00 -0700322static std::atomic<bool> gHaveTLS(false);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800323static pthread_key_t gTLS = 0;
Hans Boehma997b232019-04-12 16:59:00 -0700324static std::atomic<bool> gShutdown = false;
325static std::atomic<bool> gDisableBackgroundScheduling = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800326
327IPCThreadState* IPCThreadState::self()
328{
Hans Boehma997b232019-04-12 16:59:00 -0700329 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800330restart:
331 const pthread_key_t k = gTLS;
332 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
333 if (st) return st;
334 return new IPCThreadState;
335 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800336
Hans Boehma997b232019-04-12 16:59:00 -0700337 // Racey, heuristic test for simultaneous shutdown.
338 if (gShutdown.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800339 ALOGW("Calling IPCThreadState::self() during shutdown is dangerous, expect a crash.\n");
Yi Kongfdd8da92018-06-07 17:52:27 -0700340 return nullptr;
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800341 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800342
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800343 pthread_mutex_lock(&gTLSMutex);
Hans Boehma997b232019-04-12 16:59:00 -0700344 if (!gHaveTLS.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800345 int key_create_value = pthread_key_create(&gTLS, threadDestructor);
346 if (key_create_value != 0) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800347 pthread_mutex_unlock(&gTLSMutex);
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800348 ALOGW("IPCThreadState::self() unable to create TLS key, expect a crash: %s\n",
349 strerror(key_create_value));
Yi Kongfdd8da92018-06-07 17:52:27 -0700350 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800351 }
Hans Boehma997b232019-04-12 16:59:00 -0700352 gHaveTLS.store(true, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800353 }
354 pthread_mutex_unlock(&gTLSMutex);
355 goto restart;
356}
357
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800358IPCThreadState* IPCThreadState::selfOrNull()
359{
Hans Boehma997b232019-04-12 16:59:00 -0700360 if (gHaveTLS.load(std::memory_order_acquire)) {
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800361 const pthread_key_t k = gTLS;
362 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
363 return st;
364 }
Yi Kongfdd8da92018-06-07 17:52:27 -0700365 return nullptr;
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800366}
367
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800368void IPCThreadState::shutdown()
369{
Hans Boehma997b232019-04-12 16:59:00 -0700370 gShutdown.store(true, std::memory_order_relaxed);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800371
Hans Boehma997b232019-04-12 16:59:00 -0700372 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800373 // XXX Need to wait for all thread pool threads to exit!
374 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(gTLS);
375 if (st) {
376 delete st;
Yi Kongfdd8da92018-06-07 17:52:27 -0700377 pthread_setspecific(gTLS, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800378 }
zhongjieff405782016-03-09 15:05:04 +0800379 pthread_key_delete(gTLS);
Hans Boehma997b232019-04-12 16:59:00 -0700380 gHaveTLS.store(false, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800381 }
382}
383
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800384void IPCThreadState::disableBackgroundScheduling(bool disable)
385{
Hans Boehma997b232019-04-12 16:59:00 -0700386 gDisableBackgroundScheduling.store(disable, std::memory_order_relaxed);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800387}
388
Martijn Coenen2b631742017-05-05 11:16:59 -0700389bool IPCThreadState::backgroundSchedulingDisabled()
390{
Hans Boehma997b232019-04-12 16:59:00 -0700391 return gDisableBackgroundScheduling.load(std::memory_order_relaxed);
Martijn Coenen2b631742017-05-05 11:16:59 -0700392}
393
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800394status_t IPCThreadState::clearLastError()
395{
396 const status_t err = mLastError;
397 mLastError = NO_ERROR;
398 return err;
399}
400
Dan Stoza9c634fd2014-11-26 12:23:23 -0800401pid_t IPCThreadState::getCallingPid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800402{
Steven Moreland35626652021-05-15 01:32:04 +0000403 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800404 return mCallingPid;
405}
406
Steven Morelandf0212002018-12-26 13:59:23 -0800407const char* IPCThreadState::getCallingSid() const
408{
Steven Moreland35626652021-05-15 01:32:04 +0000409 checkContextIsBinderForUse(__func__);
Steven Morelandf0212002018-12-26 13:59:23 -0800410 return mCallingSid;
411}
412
Dan Stoza9c634fd2014-11-26 12:23:23 -0800413uid_t IPCThreadState::getCallingUid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800414{
Steven Moreland35626652021-05-15 01:32:04 +0000415 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800416 return mCallingUid;
417}
418
Steven Moreland35626652021-05-15 01:32:04 +0000419const IPCThreadState::SpGuard* IPCThreadState::pushGetCallingSpGuard(const SpGuard* guard) {
420 const SpGuard* orig = mServingStackPointerGuard;
421 mServingStackPointerGuard = guard;
422 return orig;
423}
424
425void IPCThreadState::restoreGetCallingSpGuard(const SpGuard* guard) {
426 mServingStackPointerGuard = guard;
427}
428
429void IPCThreadState::checkContextIsBinderForUse(const char* use) const {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700430 if (mServingStackPointerGuard == nullptr) [[likely]] {
431 return;
432 }
Steven Moreland35626652021-05-15 01:32:04 +0000433
434 if (!mServingStackPointer || mServingStackPointerGuard->address < mServingStackPointer) {
435 LOG_ALWAYS_FATAL("In context %s, %s does not make sense (binder sp: %p, guard: %p).",
436 mServingStackPointerGuard->context, use, mServingStackPointer,
437 mServingStackPointerGuard->address);
438 }
439
440 // in the case mServingStackPointer is deeper in the stack than the guard,
441 // we must be serving a binder transaction (maybe nested). This is a binder
442 // context, so we don't abort
443}
444
mattgilbride85897672022-10-22 17:42:44 +0000445constexpr uint32_t encodeExplicitIdentity(bool hasExplicitIdentity, pid_t callingPid) {
446 uint32_t as_unsigned = static_cast<uint32_t>(callingPid);
447 if (hasExplicitIdentity) {
448 return as_unsigned | (1 << 30);
449 } else {
450 return as_unsigned & ~(1 << 30);
451 }
452}
453
454constexpr int64_t packCallingIdentity(bool hasExplicitIdentity, uid_t callingUid,
455 pid_t callingPid) {
456 // Calling PID is a 32-bit signed integer, but doesn't consume the entire 32 bit space.
457 // To future-proof this and because we have extra capacity, we decided to also support -1,
458 // since this constant is used to represent invalid UID in other places of the system.
459 // Thus, we pack hasExplicitIdentity into the 2nd bit from the left. This allows us to
460 // preserve the (left-most) bit for the sign while also encoding the value of
461 // hasExplicitIdentity.
462 // 32b | 1b | 1b | 30b
463 // token = [ calling uid | calling pid(sign) | has explicit identity | calling pid(rest) ]
464 uint64_t token = (static_cast<uint64_t>(callingUid) << 32) |
465 encodeExplicitIdentity(hasExplicitIdentity, callingPid);
466 return static_cast<int64_t>(token);
467}
468
469constexpr bool unpackHasExplicitIdentity(int64_t token) {
470 return static_cast<int32_t>(token) & (1 << 30);
471}
472
473constexpr uid_t unpackCallingUid(int64_t token) {
474 return static_cast<uid_t>(token >> 32);
475}
476
477constexpr pid_t unpackCallingPid(int64_t token) {
478 int32_t encodedPid = static_cast<int32_t>(token);
479 if (encodedPid & (1 << 31)) {
480 return encodedPid | (1 << 30);
481 } else {
482 return encodedPid & ~(1 << 30);
483 }
484}
485
486static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, 9999)) == true,
487 "pack true hasExplicit");
488
489static_assert(unpackCallingUid(packCallingIdentity(true, 1000, 9999)) == 1000, "pack true uid");
490
491static_assert(unpackCallingPid(packCallingIdentity(true, 1000, 9999)) == 9999, "pack true pid");
492
493static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, 9999)) == false,
494 "pack false hasExplicit");
495
496static_assert(unpackCallingUid(packCallingIdentity(false, 1000, 9999)) == 1000, "pack false uid");
497
498static_assert(unpackCallingPid(packCallingIdentity(false, 1000, 9999)) == 9999, "pack false pid");
499
500static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, -1)) == true,
501 "pack true (negative) hasExplicit");
502
503static_assert(unpackCallingUid(packCallingIdentity(true, 1000, -1)) == 1000,
504 "pack true (negative) uid");
505
506static_assert(unpackCallingPid(packCallingIdentity(true, 1000, -1)) == -1,
507 "pack true (negative) pid");
508
509static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, -1)) == false,
510 "pack false (negative) hasExplicit");
511
512static_assert(unpackCallingUid(packCallingIdentity(false, 1000, -1)) == 1000,
513 "pack false (negative) uid");
514
515static_assert(unpackCallingPid(packCallingIdentity(false, 1000, -1)) == -1,
516 "pack false (negative) pid");
517
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800518int64_t IPCThreadState::clearCallingIdentity()
519{
Steven Morelandf0212002018-12-26 13:59:23 -0800520 // ignore mCallingSid for legacy reasons
mattgilbride85897672022-10-22 17:42:44 +0000521 int64_t token = packCallingIdentity(mHasExplicitIdentity, mCallingUid, mCallingPid);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800522 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +0000523 mHasExplicitIdentity = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800524 return token;
525}
526
mattgilbride85897672022-10-22 17:42:44 +0000527bool IPCThreadState::hasExplicitIdentity() {
528 return mHasExplicitIdentity;
529}
530
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700531void IPCThreadState::setStrictModePolicy(int32_t policy)
532{
533 mStrictModePolicy = policy;
534}
535
Brad Fitzpatricka877cd82010-07-07 16:06:39 -0700536int32_t IPCThreadState::getStrictModePolicy() const
537{
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700538 return mStrictModePolicy;
539}
540
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000541int64_t IPCThreadState::setCallingWorkSourceUid(uid_t uid)
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100542{
Olivier Gaillard91a04802018-11-14 17:32:41 +0000543 int64_t token = setCallingWorkSourceUidWithoutPropagation(uid);
544 mPropagateWorkSource = true;
545 return token;
546}
547
548int64_t IPCThreadState::setCallingWorkSourceUidWithoutPropagation(uid_t uid)
549{
550 const int64_t propagatedBit = ((int64_t)mPropagateWorkSource) << kWorkSourcePropagatedBitIndex;
551 int64_t token = propagatedBit | mWorkSource;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100552 mWorkSource = uid;
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000553 return token;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100554}
555
Olivier Gaillard91a04802018-11-14 17:32:41 +0000556void IPCThreadState::clearPropagateWorkSource()
557{
558 mPropagateWorkSource = false;
559}
560
561bool IPCThreadState::shouldPropagateWorkSource() const
562{
563 return mPropagateWorkSource;
564}
565
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000566uid_t IPCThreadState::getCallingWorkSourceUid() const
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100567{
568 return mWorkSource;
569}
570
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000571int64_t IPCThreadState::clearCallingWorkSource()
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100572{
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000573 return setCallingWorkSourceUid(kUnsetWorkSource);
574}
575
576void IPCThreadState::restoreCallingWorkSource(int64_t token)
577{
578 uid_t uid = (int)token;
Olivier Gaillard91a04802018-11-14 17:32:41 +0000579 setCallingWorkSourceUidWithoutPropagation(uid);
580 mPropagateWorkSource = ((token >> kWorkSourcePropagatedBitIndex) & 1) == 1;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100581}
582
Brad Fitzpatrick52736032010-08-30 16:01:16 -0700583void IPCThreadState::setLastTransactionBinderFlags(int32_t flags)
584{
585 mLastTransactionBinderFlags = flags;
586}
587
588int32_t IPCThreadState::getLastTransactionBinderFlags() const
589{
590 return mLastTransactionBinderFlags;
591}
592
Steven Moreland9514b202020-09-21 18:03:27 +0000593void IPCThreadState::setCallRestriction(ProcessState::CallRestriction restriction) {
594 mCallRestriction = restriction;
595}
596
597ProcessState::CallRestriction IPCThreadState::getCallRestriction() const {
598 return mCallRestriction;
599}
600
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800601void IPCThreadState::restoreCallingIdentity(int64_t token)
602{
mattgilbride85897672022-10-22 17:42:44 +0000603 mCallingUid = unpackCallingUid(token);
Steven Morelandf0212002018-12-26 13:59:23 -0800604 mCallingSid = nullptr; // not enough data to restore
mattgilbride85897672022-10-22 17:42:44 +0000605 mCallingPid = unpackCallingPid(token);
606 mHasExplicitIdentity = unpackHasExplicitIdentity(token);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800607}
608
609void IPCThreadState::clearCaller()
610{
Marco Nelissend43b1942009-07-17 07:59:17 -0700611 mCallingPid = getpid();
Steven Morelandf0212002018-12-26 13:59:23 -0800612 mCallingSid = nullptr; // expensive to lookup
Marco Nelissend43b1942009-07-17 07:59:17 -0700613 mCallingUid = getuid();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800614}
615
616void IPCThreadState::flushCommands()
617{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200618 if (mProcess->mDriverFD < 0)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800619 return;
620 talkWithDriver(false);
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700621 // The flush could have caused post-write refcount decrements to have
622 // been executed, which in turn could result in BC_RELEASE/BC_DECREFS
623 // being queued in mOut. So flush again, if we need to.
624 if (mOut.dataSize() > 0) {
625 talkWithDriver(false);
626 }
627 if (mOut.dataSize() > 0) {
628 ALOGW("mOut.dataSize() > 0 after flushCommands()");
629 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800630}
631
Martijn Coenen0442a862017-11-17 10:46:32 +0100632bool IPCThreadState::flushIfNeeded()
633{
Frankie Changf4c81372021-05-18 13:08:05 +0800634 if (mIsLooper || mServingStackPointer != nullptr || mIsFlushing) {
Martijn Coenen0442a862017-11-17 10:46:32 +0100635 return false;
636 }
Frankie Changf4c81372021-05-18 13:08:05 +0800637 mIsFlushing = true;
Martijn Coenen0442a862017-11-17 10:46:32 +0100638 // In case this thread is not a looper and is not currently serving a binder transaction,
639 // there's no guarantee that this thread will call back into the kernel driver any time
640 // soon. Therefore, flush pending commands such as BC_FREE_BUFFER, to prevent them from getting
641 // stuck in this thread's out buffer.
642 flushCommands();
Frankie Changf4c81372021-05-18 13:08:05 +0800643 mIsFlushing = false;
Martijn Coenen0442a862017-11-17 10:46:32 +0100644 return true;
645}
646
Wale Ogunwale376b8222015-04-13 16:16:10 -0700647void IPCThreadState::blockUntilThreadAvailable()
648{
Frederick Mayle263507f2024-05-30 14:54:27 -0700649 std::unique_lock lock_guard_(mProcess->mOnThreadAvailableLock);
650 mProcess->mOnThreadAvailableWaiting++;
651 mProcess->mOnThreadAvailableCondVar.wait(lock_guard_, [&] {
652 size_t max = mProcess->mMaxThreads;
653 size_t cur = mProcess->mExecutingThreadsCount;
654 if (cur < max) {
655 return true;
656 }
Frederick Mayle99490ac2024-06-18 12:21:18 -0700657 ALOGW("Waiting for thread to be free. mExecutingThreadsCount=%zu mMaxThreads=%zu\n", cur,
658 max);
Frederick Mayle263507f2024-05-30 14:54:27 -0700659 return false;
660 });
661 mProcess->mOnThreadAvailableWaiting--;
Wale Ogunwale376b8222015-04-13 16:16:10 -0700662}
663
Todd Poynor8d96cab2013-06-25 19:12:18 -0700664status_t IPCThreadState::getAndExecuteCommand()
665{
666 status_t result;
667 int32_t cmd;
668
669 result = talkWithDriver();
670 if (result >= NO_ERROR) {
671 size_t IN = mIn.dataAvail();
672 if (IN < sizeof(int32_t)) return result;
673 cmd = mIn.readInt32();
674 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000675 std::ostringstream logStream;
676 logStream << "Processing top-level Command: " << getReturnString(cmd) << "\n";
677 std::string message = logStream.str();
678 ALOGI("%s", message.c_str());
Todd Poynor8d96cab2013-06-25 19:12:18 -0700679 }
680
Frederick Mayle263507f2024-05-30 14:54:27 -0700681 size_t newThreadsCount = mProcess->mExecutingThreadsCount.fetch_add(1) + 1;
682 if (newThreadsCount >= mProcess->mMaxThreads) {
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700683 auto expected = ProcessState::never();
684 mProcess->mStarvationStartTime
685 .compare_exchange_strong(expected, std::chrono::steady_clock::now());
Colin Cross96e83222016-04-15 14:29:55 -0700686 }
Wale Ogunwale376b8222015-04-13 16:16:10 -0700687
Todd Poynor8d96cab2013-06-25 19:12:18 -0700688 result = executeCommand(cmd);
689
Frederick Mayle263507f2024-05-30 14:54:27 -0700690 size_t maxThreads = mProcess->mMaxThreads;
691 newThreadsCount = mProcess->mExecutingThreadsCount.fetch_sub(1) - 1;
692 if (newThreadsCount < maxThreads) {
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700693 auto starvationStartTime =
694 mProcess->mStarvationStartTime.exchange(ProcessState::never());
695 if (starvationStartTime != ProcessState::never()) {
696 auto starvationTime = std::chrono::steady_clock::now() - starvationStartTime;
697 if (starvationTime > 100ms) {
Frederick Mayle263507f2024-05-30 14:54:27 -0700698 ALOGE("binder thread pool (%zu threads) starved for %" PRId64 " ms", maxThreads,
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700699 to_ms(starvationTime));
Frederick Mayle263507f2024-05-30 14:54:27 -0700700 }
Colin Cross96e83222016-04-15 14:29:55 -0700701 }
Colin Cross96e83222016-04-15 14:29:55 -0700702 }
Steven Morelandc648a762021-01-16 02:39:45 +0000703
704 // Cond broadcast can be expensive, so don't send it every time a binder
705 // call is processed. b/168806193
Frederick Mayle263507f2024-05-30 14:54:27 -0700706 if (mProcess->mOnThreadAvailableWaiting > 0) {
707 std::lock_guard lock_guard_(mProcess->mOnThreadAvailableLock);
708 mProcess->mOnThreadAvailableCondVar.notify_all();
Steven Morelandc648a762021-01-16 02:39:45 +0000709 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700710 }
711
712 return result;
713}
714
715// When we've cleared the incoming command queue, process any pending derefs
716void IPCThreadState::processPendingDerefs()
717{
718 if (mIn.dataPosition() >= mIn.dataSize()) {
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200719 /*
720 * The decWeak()/decStrong() calls may cause a destructor to run,
721 * which in turn could have initiated an outgoing transaction,
722 * which in turn could cause us to add to the pending refs
723 * vectors; so instead of simply iterating, loop until they're empty.
724 *
725 * We do this in an outer loop, because calling decStrong()
726 * may result in something being added to mPendingWeakDerefs,
727 * which could be delayed until the next incoming command
728 * from the driver if we don't process it now.
729 */
730 while (mPendingWeakDerefs.size() > 0 || mPendingStrongDerefs.size() > 0) {
731 while (mPendingWeakDerefs.size() > 0) {
732 RefBase::weakref_type* refs = mPendingWeakDerefs[0];
733 mPendingWeakDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700734 refs->decWeak(mProcess.get());
735 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700736
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200737 if (mPendingStrongDerefs.size() > 0) {
738 // We don't use while() here because we don't want to re-order
739 // strong and weak decs at all; if this decStrong() causes both a
740 // decWeak() and a decStrong() to be queued, we want to process
741 // the decWeak() first.
742 BBinder* obj = mPendingStrongDerefs[0];
743 mPendingStrongDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700744 obj->decStrong(mProcess.get());
745 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700746 }
747 }
748}
749
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700750void IPCThreadState::processPostWriteDerefs()
751{
752 for (size_t i = 0; i < mPostWriteWeakDerefs.size(); i++) {
753 RefBase::weakref_type* refs = mPostWriteWeakDerefs[i];
754 refs->decWeak(mProcess.get());
755 }
756 mPostWriteWeakDerefs.clear();
757
758 for (size_t i = 0; i < mPostWriteStrongDerefs.size(); i++) {
759 RefBase* obj = mPostWriteStrongDerefs[i];
760 obj->decStrong(mProcess.get());
761 }
762 mPostWriteStrongDerefs.clear();
763}
764
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800765void IPCThreadState::joinThreadPool(bool isMain)
766{
Frederick Mayle263507f2024-05-30 14:54:27 -0700767 LOG_THREADPOOL("**** THREAD %p (PID %d) IS JOINING THE THREAD POOL\n", (void*)pthread_self(),
768 getpid());
Elie Kheirallah47431c12022-04-21 23:46:17 +0000769 mProcess->mCurrentThreads++;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800770 mOut.writeInt32(isMain ? BC_ENTER_LOOPER : BC_REGISTER_LOOPER);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800771
Martijn Coenen0442a862017-11-17 10:46:32 +0100772 mIsLooper = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800773 status_t result;
774 do {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700775 processPendingDerefs();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800776 // now get the next command to be processed, waiting if necessary
Todd Poynor8d96cab2013-06-25 19:12:18 -0700777 result = getAndExecuteCommand();
Jason Parksdcd39582009-11-03 12:14:38 -0800778
Todd Poynor8d96cab2013-06-25 19:12:18 -0700779 if (result < NO_ERROR && result != TIMED_OUT && result != -ECONNREFUSED && result != -EBADF) {
Steven Moreland6adf33c2019-09-25 13:18:09 -0700780 LOG_ALWAYS_FATAL("getAndExecuteCommand(fd=%d) returned unexpected error %d, aborting",
Jeff Tinkeref073862013-06-11 11:30:21 -0700781 mProcess->mDriverFD, result);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800782 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800783
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800784 // Let this thread exit the thread pool if it is no longer
785 // needed and it is not the main process thread.
786 if(result == TIMED_OUT && !isMain) {
787 break;
788 }
789 } while (result != -ECONNREFUSED && result != -EBADF);
790
Wei Wangc7341432016-10-19 10:23:59 -0700791 LOG_THREADPOOL("**** THREAD %p (PID %d) IS LEAVING THE THREAD POOL err=%d\n",
792 (void*)pthread_self(), getpid(), result);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800793
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800794 mOut.writeInt32(BC_EXIT_LOOPER);
Martijn Coenen0442a862017-11-17 10:46:32 +0100795 mIsLooper = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800796 talkWithDriver(false);
Frederick Mayle263507f2024-05-30 14:54:27 -0700797 size_t oldCount = mProcess->mCurrentThreads.fetch_sub(1);
798 LOG_ALWAYS_FATAL_IF(oldCount == 0,
799 "Threadpool thread count underflowed. Thread cannot exist and exit in "
800 "empty threadpool\n"
Elie Kheirallah47431c12022-04-21 23:46:17 +0000801 "Misconfiguration. Increase threadpool max threads configuration\n");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800802}
803
Steven Morelandd8c85672020-07-24 21:30:41 +0000804status_t IPCThreadState::setupPolling(int* fd)
Todd Poynor8d96cab2013-06-25 19:12:18 -0700805{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200806 if (mProcess->mDriverFD < 0) {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700807 return -EBADF;
808 }
809
810 mOut.writeInt32(BC_ENTER_LOOPER);
Steven Morelandf210b502021-01-15 23:40:32 +0000811 flushCommands();
Todd Poynor8d96cab2013-06-25 19:12:18 -0700812 *fd = mProcess->mDriverFD;
Elie Kheirallah47431c12022-04-21 23:46:17 +0000813 mProcess->mCurrentThreads++;
Todd Poynor8d96cab2013-06-25 19:12:18 -0700814 return 0;
815}
816
817status_t IPCThreadState::handlePolledCommands()
818{
819 status_t result;
820
821 do {
822 result = getAndExecuteCommand();
823 } while (mIn.dataPosition() < mIn.dataSize());
824
825 processPendingDerefs();
826 flushCommands();
827 return result;
828}
829
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800830void IPCThreadState::stopProcess(bool /*immediate*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800831{
Steve Blocka19954a2012-01-04 20:05:49 +0000832 //ALOGI("**** STOPPING PROCESS");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800833 flushCommands();
834 int fd = mProcess->mDriverFD;
835 mProcess->mDriverFD = -1;
836 close(fd);
837 //kill(getpid(), SIGKILL);
838}
839
840status_t IPCThreadState::transact(int32_t handle,
841 uint32_t code, const Parcel& data,
842 Parcel* reply, uint32_t flags)
843{
Steven Moreland5553ac42020-11-11 02:14:45 +0000844 LOG_ALWAYS_FATAL_IF(data.isForRpc(), "Parcel constructed for RPC, but being used with binder.");
845
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800846 status_t err;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800847
848 flags |= TF_ACCEPT_FDS;
849
850 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000851 std::ostringstream logStream;
852 logStream << "BC_TRANSACTION thr " << (void*)pthread_self() << " / hand " << handle
853 << " / code " << TypeCode(code) << ": \t" << data << "\n";
854 std::string message = logStream.str();
855 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800856 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800857
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800858 LOG_ONEWAY(">>>> SEND from pid %d uid %d %s", getpid(), getuid(),
859 (flags & TF_ONE_WAY) == 0 ? "READ REPLY" : "ONE WAY");
Yi Kongfdd8da92018-06-07 17:52:27 -0700860 err = writeTransactionData(BC_TRANSACTION, flags, handle, code, data, nullptr);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800861
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800862 if (err != NO_ERROR) {
863 if (reply) reply->setError(err);
864 return (mLastError = err);
865 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800866
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800867 if ((flags & TF_ONE_WAY) == 0) {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700868 if (mCallRestriction != ProcessState::CallRestriction::NONE) [[unlikely]] {
Steven Moreland7732a092019-01-02 17:54:16 -0800869 if (mCallRestriction == ProcessState::CallRestriction::ERROR_IF_NOT_ONEWAY) {
Steven Moreland8cb34fc2019-05-13 11:44:55 -0700870 ALOGE("Process making non-oneway call (code: %u) but is restricted.", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800871 CallStack::logStack("non-oneway call", CallStack::getCurrent(10).get(),
872 ANDROID_LOG_ERROR);
873 } else /* FATAL_IF_NOT_ONEWAY */ {
Steven Morelandfcc77f12020-09-01 01:16:11 +0000874 LOG_ALWAYS_FATAL("Process may not make non-oneway calls (code: %u).", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800875 }
876 }
877
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700878#if 0
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700879 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000880 ALOGI(">>>>>> CALLING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700881 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000882 ALOGI(">>>>>> CALLING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700883 }
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700884#endif
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800885 if (reply) {
886 err = waitForResponse(reply);
887 } else {
888 Parcel fakeReply;
889 err = waitForResponse(&fakeReply);
890 }
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700891 #if 0
892 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000893 ALOGI("<<<<<< RETURNING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700894 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000895 ALOGI("<<<<<< RETURNING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700896 }
897 #endif
Tim Murrayd429f4a2017-03-07 09:31:09 -0800898
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800899 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000900 std::ostringstream logStream;
901 logStream << "BR_REPLY thr " << (void*)pthread_self() << " / hand " << handle << ": ";
902 if (reply)
903 logStream << "\t" << *reply << "\n";
904 else
905 logStream << "(none requested)"
906 << "\n";
907 std::string message = logStream.str();
908 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800909 }
910 } else {
Yi Kongfdd8da92018-06-07 17:52:27 -0700911 err = waitForResponse(nullptr, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800912 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800913
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800914 return err;
915}
916
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700917void IPCThreadState::incStrongHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800918{
919 LOG_REMOTEREFS("IPCThreadState::incStrongHandle(%d)\n", handle);
920 mOut.writeInt32(BC_ACQUIRE);
921 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100922 if (!flushIfNeeded()) {
923 // Create a temp reference until the driver has handled this command.
924 proxy->incStrong(mProcess.get());
925 mPostWriteStrongDerefs.push(proxy);
926 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800927}
928
929void IPCThreadState::decStrongHandle(int32_t handle)
930{
931 LOG_REMOTEREFS("IPCThreadState::decStrongHandle(%d)\n", handle);
932 mOut.writeInt32(BC_RELEASE);
933 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100934 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800935}
936
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700937void IPCThreadState::incWeakHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800938{
939 LOG_REMOTEREFS("IPCThreadState::incWeakHandle(%d)\n", handle);
940 mOut.writeInt32(BC_INCREFS);
941 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100942 if (!flushIfNeeded()) {
943 // Create a temp reference until the driver has handled this command.
944 proxy->getWeakRefs()->incWeak(mProcess.get());
945 mPostWriteWeakDerefs.push(proxy->getWeakRefs());
946 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800947}
948
949void IPCThreadState::decWeakHandle(int32_t handle)
950{
951 LOG_REMOTEREFS("IPCThreadState::decWeakHandle(%d)\n", handle);
952 mOut.writeInt32(BC_DECREFS);
953 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100954 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800955}
956
Steven Moreland1bf42912024-02-16 22:29:42 +0000957status_t IPCThreadState::attemptIncStrongHandle(int32_t handle) {
Arve HjønnevÄg11cfdcc2014-02-14 20:14:02 -0800958 (void)handle;
959 ALOGE("%s(%d): Not supported\n", __func__, handle);
960 return INVALID_OPERATION;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800961}
962
963void IPCThreadState::expungeHandle(int32_t handle, IBinder* binder)
964{
965#if LOG_REFCOUNTS
liangweikanga43ee152016-10-25 16:37:54 +0800966 ALOGV("IPCThreadState::expungeHandle(%ld)\n", handle);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800967#endif
Manoj Gupta9cec85b2017-09-19 16:34:29 -0700968 self()->mProcess->expungeHandle(handle, binder); // NOLINT
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800969}
970
971status_t IPCThreadState::requestDeathNotification(int32_t handle, BpBinder* proxy)
972{
973 mOut.writeInt32(BC_REQUEST_DEATH_NOTIFICATION);
974 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000975 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800976 return NO_ERROR;
977}
978
979status_t IPCThreadState::clearDeathNotification(int32_t handle, BpBinder* proxy)
980{
981 mOut.writeInt32(BC_CLEAR_DEATH_NOTIFICATION);
982 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000983 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800984 return NO_ERROR;
985}
986
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700987status_t IPCThreadState::addFrozenStateChangeCallback(int32_t handle, BpBinder* proxy) {
988 static bool isSupported =
989 ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::FREEZE_NOTIFICATION);
990 if (!isSupported) {
991 return INVALID_OPERATION;
992 }
993 proxy->getWeakRefs()->incWeak(proxy);
994 mOut.writeInt32(BC_REQUEST_FREEZE_NOTIFICATION);
995 mOut.writeInt32((int32_t)handle);
996 mOut.writePointer((uintptr_t)proxy);
997 flushCommands();
998 return NO_ERROR;
999}
1000
1001status_t IPCThreadState::removeFrozenStateChangeCallback(int32_t handle, BpBinder* proxy) {
1002 static bool isSupported =
1003 ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::FREEZE_NOTIFICATION);
1004 if (!isSupported) {
1005 return INVALID_OPERATION;
1006 }
1007 mOut.writeInt32(BC_CLEAR_FREEZE_NOTIFICATION);
1008 mOut.writeInt32((int32_t)handle);
1009 mOut.writePointer((uintptr_t)proxy);
1010 flushCommands();
1011 return NO_ERROR;
1012}
1013
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001014IPCThreadState::IPCThreadState()
Steven Moreland35626652021-05-15 01:32:04 +00001015 : mProcess(ProcessState::self()),
1016 mServingStackPointer(nullptr),
1017 mServingStackPointerGuard(nullptr),
1018 mWorkSource(kUnsetWorkSource),
1019 mPropagateWorkSource(false),
1020 mIsLooper(false),
Frankie Changf4c81372021-05-18 13:08:05 +08001021 mIsFlushing(false),
Steven Moreland35626652021-05-15 01:32:04 +00001022 mStrictModePolicy(0),
1023 mLastTransactionBinderFlags(0),
1024 mCallRestriction(mProcess->mCallRestriction) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001025 pthread_setspecific(gTLS, this);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -08001026 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +00001027 mHasExplicitIdentity = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001028 mIn.setDataCapacity(256);
1029 mOut.setDataCapacity(256);
1030}
1031
1032IPCThreadState::~IPCThreadState()
1033{
1034}
1035
Martijn Coenenea0090a2017-11-02 18:54:40 +00001036status_t IPCThreadState::sendReply(const Parcel& reply, uint32_t flags)
1037{
1038 status_t err;
1039 status_t statusBuffer;
1040 err = writeTransactionData(BC_REPLY, flags, -1, 0, reply, &statusBuffer);
1041 if (err < NO_ERROR) return err;
1042
Yi Kongfdd8da92018-06-07 17:52:27 -07001043 return waitForResponse(nullptr, nullptr);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001044}
1045
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001046status_t IPCThreadState::waitForResponse(Parcel *reply, status_t *acquireResult)
1047{
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001048 uint32_t cmd;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001049 int32_t err;
1050
1051 while (1) {
1052 if ((err=talkWithDriver()) < NO_ERROR) break;
1053 err = mIn.errorCheck();
1054 if (err < NO_ERROR) break;
1055 if (mIn.dataAvail() == 0) continue;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001056
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001057 cmd = (uint32_t)mIn.readInt32();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001058
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001059 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001060 std::ostringstream logStream;
1061 logStream << "Processing waitForResponse Command: " << getReturnString(cmd) << "\n";
1062 std::string message = logStream.str();
1063 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001064 }
1065
1066 switch (cmd) {
Hang Lub185ac02021-03-24 13:17:22 +08001067 case BR_ONEWAY_SPAM_SUSPECT:
1068 ALOGE("Process seems to be sending too many oneway calls.");
1069 CallStack::logStack("oneway spamming", CallStack::getCurrent().get(),
1070 ANDROID_LOG_ERROR);
1071 [[fallthrough]];
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001072 case BR_TRANSACTION_COMPLETE:
1073 if (!reply && !acquireResult) goto finish;
1074 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001075
Li Li0e3443d2022-12-07 21:51:19 -08001076 case BR_TRANSACTION_PENDING_FROZEN:
1077 ALOGW("Sending oneway calls to frozen process.");
1078 goto finish;
1079
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001080 case BR_DEAD_REPLY:
1081 err = DEAD_OBJECT;
1082 goto finish;
1083
1084 case BR_FAILED_REPLY:
1085 err = FAILED_TRANSACTION;
1086 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001087
Marco Ballesio7ee17572020-09-08 10:30:03 -07001088 case BR_FROZEN_REPLY:
Steven Moreland389154e2024-05-28 22:22:38 +00001089 ALOGW("Transaction failed because process frozen.");
Marco Ballesio7ee17572020-09-08 10:30:03 -07001090 err = FAILED_TRANSACTION;
1091 goto finish;
1092
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001093 case BR_ACQUIRE_RESULT:
1094 {
Steve Block67263472012-01-09 18:35:44 +00001095 ALOG_ASSERT(acquireResult != NULL, "Unexpected brACQUIRE_RESULT");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001096 const int32_t result = mIn.readInt32();
1097 if (!acquireResult) continue;
1098 *acquireResult = result ? NO_ERROR : INVALID_OPERATION;
1099 }
1100 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001101
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001102 case BR_REPLY:
1103 {
1104 binder_transaction_data tr;
1105 err = mIn.read(&tr, sizeof(tr));
Steve Block67263472012-01-09 18:35:44 +00001106 ALOG_ASSERT(err == NO_ERROR, "Not enough command data for brREPLY");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001107 if (err != NO_ERROR) goto finish;
1108
1109 if (reply) {
1110 if ((tr.flags & TF_STATUS_CODE) == 0) {
1111 reply->ipcSetDataReference(
1112 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1113 tr.data_size,
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001114 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1115 tr.offsets_size/sizeof(binder_size_t),
Steven Moreland161fe122020-11-12 23:16:47 +00001116 freeBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001117 } else {
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001118 err = *reinterpret_cast<const status_t*>(tr.data.ptr.buffer);
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001119 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1120 tr.data_size,
1121 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1122 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001123 }
1124 } else {
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001125 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer), tr.data_size,
1126 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1127 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001128 continue;
1129 }
1130 }
1131 goto finish;
1132
1133 default:
1134 err = executeCommand(cmd);
1135 if (err != NO_ERROR) goto finish;
1136 break;
1137 }
1138 }
1139
1140finish:
1141 if (err != NO_ERROR) {
1142 if (acquireResult) *acquireResult = err;
1143 if (reply) reply->setError(err);
1144 mLastError = err;
Carlos Llamasb235b122021-12-20 06:38:44 -08001145 logExtendedError();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001146 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001147
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001148 return err;
1149}
1150
1151status_t IPCThreadState::talkWithDriver(bool doReceive)
1152{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001153 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001154 return -EBADF;
1155 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001156
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001157 binder_write_read bwr;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001158
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001159 // Is the read buffer empty?
1160 const bool needRead = mIn.dataPosition() >= mIn.dataSize();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001161
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001162 // We don't want to write anything if we are still reading
1163 // from data left in the input buffer and the caller
1164 // has requested to read the next data.
1165 const size_t outAvail = (!doReceive || needRead) ? mOut.dataSize() : 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001166
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001167 bwr.write_size = outAvail;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001168 bwr.write_buffer = (uintptr_t)mOut.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001169
1170 // This is what we'll read.
1171 if (doReceive && needRead) {
1172 bwr.read_size = mIn.dataCapacity();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001173 bwr.read_buffer = (uintptr_t)mIn.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001174 } else {
1175 bwr.read_size = 0;
Ben Chengd640f892011-12-01 17:11:32 -08001176 bwr.read_buffer = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001177 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001178
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001179 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001180 std::ostringstream logStream;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001181 if (outAvail != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001182 logStream << "Sending commands to driver: ";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001183 const void* cmds = (const void*)bwr.write_buffer;
Pawan Wagh7063b522022-09-28 18:52:26 +00001184 const void* end = ((const uint8_t*)cmds) + bwr.write_size;
1185 logStream << "\t" << HexDump(cmds, bwr.write_size) << "\n";
1186 while (cmds < end) cmds = printCommand(logStream, cmds);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001187 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001188 logStream << "Size of receive buffer: " << bwr.read_size << ", needRead: " << needRead
1189 << ", doReceive: " << doReceive << "\n";
1190
1191 std::string message = logStream.str();
1192 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001193 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001194
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001195 // Return immediately if there is nothing to do.
1196 if ((bwr.write_size == 0) && (bwr.read_size == 0)) return NO_ERROR;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001197
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001198 bwr.write_consumed = 0;
1199 bwr.read_consumed = 0;
1200 status_t err;
1201 do {
1202 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001203 std::ostringstream logStream;
1204 logStream << "About to read/write, write size = " << mOut.dataSize() << "\n";
1205 std::string message = logStream.str();
1206 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001207 }
Elliott Hughes6071da72015-08-12 15:27:47 -07001208#if defined(__ANDROID__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001209 if (ioctl(mProcess->mDriverFD, BINDER_WRITE_READ, &bwr) >= 0)
1210 err = NO_ERROR;
1211 else
1212 err = -errno;
1213#else
1214 err = INVALID_OPERATION;
1215#endif
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001216 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001217 err = -EBADF;
1218 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001219 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001220 std::ostringstream logStream;
1221 logStream << "Finished read/write, write size = " << mOut.dataSize() << "\n";
1222 std::string message = logStream.str();
1223 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001224 }
1225 } while (err == -EINTR);
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001226
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001227 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001228 std::ostringstream logStream;
1229 logStream << "Our err: " << (void*)(intptr_t)err
1230 << ", write consumed: " << bwr.write_consumed << " (of " << mOut.dataSize()
1231 << "), read consumed: " << bwr.read_consumed << "\n";
1232 std::string message = logStream.str();
1233 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001234 }
1235
1236 if (err >= NO_ERROR) {
1237 if (bwr.write_consumed > 0) {
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001238 if (bwr.write_consumed < mOut.dataSize())
Steven Morelandb077deb2020-04-16 16:22:52 -07001239 LOG_ALWAYS_FATAL("Driver did not consume write buffer. "
1240 "err: %s consumed: %zu of %zu",
1241 statusToString(err).c_str(),
1242 (size_t)bwr.write_consumed,
1243 mOut.dataSize());
Martijn Coenen7c170bb2018-05-04 17:28:55 -07001244 else {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001245 mOut.setDataSize(0);
Martijn Coenen7c170bb2018-05-04 17:28:55 -07001246 processPostWriteDerefs();
1247 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001248 }
1249 if (bwr.read_consumed > 0) {
1250 mIn.setDataSize(bwr.read_consumed);
1251 mIn.setDataPosition(0);
1252 }
1253 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001254 std::ostringstream logStream;
1255 logStream << "Remaining data size: " << mOut.dataSize() << "\n";
1256 logStream << "Received commands from driver: ";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001257 const void* cmds = mIn.data();
1258 const void* end = mIn.data() + mIn.dataSize();
Pawan Wagh7063b522022-09-28 18:52:26 +00001259 logStream << "\t" << HexDump(cmds, mIn.dataSize()) << "\n";
1260 while (cmds < end) cmds = printReturnCommand(logStream, cmds);
1261 std::string message = logStream.str();
1262 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001263 }
1264 return NO_ERROR;
1265 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001266
Theodore Duboisbf144632023-01-09 15:36:49 -08001267 ALOGE_IF(mProcess->mDriverFD >= 0,
1268 "Driver returned error (%s). This is a bug in either libbinder or the driver. This "
1269 "thread's connection to %s will no longer work.",
1270 statusToString(err).c_str(), mProcess->mDriverName.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001271 return err;
1272}
1273
1274status_t IPCThreadState::writeTransactionData(int32_t cmd, uint32_t binderFlags,
1275 int32_t handle, uint32_t code, const Parcel& data, status_t* statusBuffer)
1276{
1277 binder_transaction_data tr;
1278
Arve HjønnevÄg07fd0f12014-02-18 21:10:29 -08001279 tr.target.ptr = 0; /* Don't pass uninitialized stack data to a remote process */
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001280 tr.target.handle = handle;
1281 tr.code = code;
1282 tr.flags = binderFlags;
Evgeniy Stepanovd5474322011-04-21 14:15:00 +04001283 tr.cookie = 0;
1284 tr.sender_pid = 0;
1285 tr.sender_euid = 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001286
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001287 const status_t err = data.errorCheck();
1288 if (err == NO_ERROR) {
1289 tr.data_size = data.ipcDataSize();
1290 tr.data.ptr.buffer = data.ipcData();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001291 tr.offsets_size = data.ipcObjectsCount()*sizeof(binder_size_t);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001292 tr.data.ptr.offsets = data.ipcObjects();
1293 } else if (statusBuffer) {
1294 tr.flags |= TF_STATUS_CODE;
1295 *statusBuffer = err;
1296 tr.data_size = sizeof(status_t);
Arve HjønnevÄg87b30d02014-02-18 21:04:31 -08001297 tr.data.ptr.buffer = reinterpret_cast<uintptr_t>(statusBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001298 tr.offsets_size = 0;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001299 tr.data.ptr.offsets = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001300 } else {
1301 return (mLastError = err);
1302 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001303
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001304 mOut.writeInt32(cmd);
1305 mOut.write(&tr, sizeof(tr));
Tim Murrayd429f4a2017-03-07 09:31:09 -08001306
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001307 return NO_ERROR;
1308}
1309
1310sp<BBinder> the_context_object;
1311
Jiyong Park384328e2020-11-13 17:16:48 +09001312void IPCThreadState::setTheContextObject(const sp<BBinder>& obj)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001313{
1314 the_context_object = obj;
1315}
1316
1317status_t IPCThreadState::executeCommand(int32_t cmd)
1318{
1319 BBinder* obj;
1320 RefBase::weakref_type* refs;
1321 status_t result = NO_ERROR;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001322
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001323 switch ((uint32_t)cmd) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001324 case BR_ERROR:
1325 result = mIn.readInt32();
1326 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001327
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001328 case BR_OK:
1329 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001330
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001331 case BR_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001332 refs = (RefBase::weakref_type*)mIn.readPointer();
1333 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001334 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001335 "BR_ACQUIRE: object %p does not match cookie %p (expected %p)",
1336 refs, obj, refs->refBase());
1337 obj->incStrong(mProcess.get());
1338 IF_LOG_REMOTEREFS() {
1339 LOG_REMOTEREFS("BR_ACQUIRE from driver on %p", obj);
1340 obj->printRefs();
1341 }
1342 mOut.writeInt32(BC_ACQUIRE_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001343 mOut.writePointer((uintptr_t)refs);
1344 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001345 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001346
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001347 case BR_RELEASE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001348 refs = (RefBase::weakref_type*)mIn.readPointer();
1349 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001350 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001351 "BR_RELEASE: object %p does not match cookie %p (expected %p)",
1352 refs, obj, refs->refBase());
1353 IF_LOG_REMOTEREFS() {
1354 LOG_REMOTEREFS("BR_RELEASE from driver on %p", obj);
1355 obj->printRefs();
1356 }
1357 mPendingStrongDerefs.push(obj);
1358 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001359
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001360 case BR_INCREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001361 refs = (RefBase::weakref_type*)mIn.readPointer();
1362 obj = (BBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001363 refs->incWeak(mProcess.get());
1364 mOut.writeInt32(BC_INCREFS_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001365 mOut.writePointer((uintptr_t)refs);
1366 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001367 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001368
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001369 case BR_DECREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001370 refs = (RefBase::weakref_type*)mIn.readPointer();
Jiyong Park5970d0a2022-03-08 16:56:13 +09001371 // NOLINTNEXTLINE(clang-analyzer-deadcode.DeadStores)
1372 obj = (BBinder*)mIn.readPointer(); // consume
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001373 // NOTE: This assertion is not valid, because the object may no
1374 // longer exist (thus the (BBinder*)cast above resulting in a different
1375 // memory address).
Steve Block67263472012-01-09 18:35:44 +00001376 //ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001377 // "BR_DECREFS: object %p does not match cookie %p (expected %p)",
1378 // refs, obj, refs->refBase());
1379 mPendingWeakDerefs.push(refs);
1380 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001381
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001382 case BR_ATTEMPT_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001383 refs = (RefBase::weakref_type*)mIn.readPointer();
1384 obj = (BBinder*)mIn.readPointer();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001385
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001386 {
1387 const bool success = refs->attemptIncStrong(mProcess.get());
Steve Block67263472012-01-09 18:35:44 +00001388 ALOG_ASSERT(success && refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001389 "BR_ATTEMPT_ACQUIRE: object %p does not match cookie %p (expected %p)",
1390 refs, obj, refs->refBase());
Tim Murrayd429f4a2017-03-07 09:31:09 -08001391
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001392 mOut.writeInt32(BC_ACQUIRE_RESULT);
1393 mOut.writeInt32((int32_t)success);
1394 }
1395 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001396
Steven Morelandf0212002018-12-26 13:59:23 -08001397 case BR_TRANSACTION_SEC_CTX:
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001398 case BR_TRANSACTION:
1399 {
Steven Morelandf0212002018-12-26 13:59:23 -08001400 binder_transaction_data_secctx tr_secctx;
1401 binder_transaction_data& tr = tr_secctx.transaction_data;
1402
1403 if (cmd == (int) BR_TRANSACTION_SEC_CTX) {
1404 result = mIn.read(&tr_secctx, sizeof(tr_secctx));
1405 } else {
1406 result = mIn.read(&tr, sizeof(tr));
1407 tr_secctx.secctx = 0;
1408 }
1409
Steve Block67263472012-01-09 18:35:44 +00001410 ALOG_ASSERT(result == NO_ERROR,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001411 "Not enough command data for brTRANSACTION");
1412 if (result != NO_ERROR) break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001413
Martijn Coenenea0090a2017-11-02 18:54:40 +00001414 Parcel buffer;
1415 buffer.ipcSetDataReference(
1416 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1417 tr.data_size,
1418 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
Steven Moreland161fe122020-11-12 23:16:47 +00001419 tr.offsets_size/sizeof(binder_size_t), freeBuffer);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001420
Steven Moreland39d887d2020-01-31 14:56:45 -08001421 const void* origServingStackPointer = mServingStackPointer;
Steven Moreland35626652021-05-15 01:32:04 +00001422 mServingStackPointer = __builtin_frame_address(0);
Steven Moreland39d887d2020-01-31 14:56:45 -08001423
Martijn Coenenea0090a2017-11-02 18:54:40 +00001424 const pid_t origPid = mCallingPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001425 const char* origSid = mCallingSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001426 const uid_t origUid = mCallingUid;
mattgilbride85897672022-10-22 17:42:44 +00001427 const bool origHasExplicitIdentity = mHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001428 const int32_t origStrictModePolicy = mStrictModePolicy;
1429 const int32_t origTransactionBinderFlags = mLastTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001430 const int32_t origWorkSource = mWorkSource;
1431 const bool origPropagateWorkSet = mPropagateWorkSource;
1432 // Calling work source will be set by Parcel#enforceInterface. Parcel#enforceInterface
1433 // is only guaranteed to be called for AIDL-generated stubs so we reset the work source
1434 // here to never propagate it.
1435 clearCallingWorkSource();
1436 clearPropagateWorkSource();
Martijn Coenenea0090a2017-11-02 18:54:40 +00001437
1438 mCallingPid = tr.sender_pid;
Steven Morelandf0212002018-12-26 13:59:23 -08001439 mCallingSid = reinterpret_cast<const char*>(tr_secctx.secctx);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001440 mCallingUid = tr.sender_euid;
mattgilbride85897672022-10-22 17:42:44 +00001441 mHasExplicitIdentity = false;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001442 mLastTransactionBinderFlags = tr.flags;
1443
Steven Morelandf0212002018-12-26 13:59:23 -08001444 // ALOGI(">>>> TRANSACT from pid %d sid %s uid %d\n", mCallingPid,
1445 // (mCallingSid ? mCallingSid : "<N/A>"), mCallingUid);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001446
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001447 Parcel reply;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001448 status_t error;
1449 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001450 std::ostringstream logStream;
1451 logStream << "BR_TRANSACTION thr " << (void*)pthread_self() << " / obj "
1452 << tr.target.ptr << " / code " << TypeCode(tr.code) << ": \t" << buffer
1453 << "\n"
1454 << "Data addr = " << reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer)
1455 << ", offsets addr="
1456 << reinterpret_cast<const size_t*>(tr.data.ptr.offsets) << "\n";
1457 std::string message = logStream.str();
1458 ALOGI("%s", message.c_str());
Martijn Coenenea0090a2017-11-02 18:54:40 +00001459 }
1460 if (tr.target.ptr) {
1461 // We only have a weak reference on the target object, so we must first try to
1462 // safely acquire a strong reference before doing anything else with it.
1463 if (reinterpret_cast<RefBase::weakref_type*>(
1464 tr.target.ptr)->attemptIncStrong(this)) {
1465 error = reinterpret_cast<BBinder*>(tr.cookie)->transact(tr.code, buffer,
1466 &reply, tr.flags);
1467 reinterpret_cast<BBinder*>(tr.cookie)->decStrong(this);
Dianne Hackbornc1114612016-03-21 10:36:54 -07001468 } else {
Martijn Coenenea0090a2017-11-02 18:54:40 +00001469 error = UNKNOWN_TRANSACTION;
Dianne Hackbornc1114612016-03-21 10:36:54 -07001470 }
Brad Fitzpatrick52736032010-08-30 16:01:16 -07001471
Martijn Coenenea0090a2017-11-02 18:54:40 +00001472 } else {
1473 error = the_context_object->transact(tr.code, buffer, &reply, tr.flags);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001474 }
Dianne Hackborn5ee2c9d2014-09-30 11:30:03 -07001475
Steven Morelandf0212002018-12-26 13:59:23 -08001476 //ALOGI("<<<< TRANSACT from pid %d restore pid %d sid %s uid %d\n",
1477 // mCallingPid, origPid, (origSid ? origSid : "<N/A>"), origUid);
Tim Murrayd429f4a2017-03-07 09:31:09 -08001478
Martijn Coenenea0090a2017-11-02 18:54:40 +00001479 if ((tr.flags & TF_ONE_WAY) == 0) {
1480 LOG_ONEWAY("Sending reply to %d!", mCallingPid);
1481 if (error < NO_ERROR) reply.setError(error);
Steven Morelandf183fdd2020-10-27 00:12:12 +00001482
Steven Morelandce15b9f2022-09-08 17:42:45 +00001483 // b/238777741: clear buffer before we send the reply.
1484 // Otherwise, there is a race where the client may
1485 // receive the reply and send another transaction
1486 // here and the space used by this transaction won't
1487 // be freed for the client.
1488 buffer.setDataSize(0);
1489
Steven Morelandf183fdd2020-10-27 00:12:12 +00001490 constexpr uint32_t kForwardReplyFlags = TF_CLEAR_BUF;
1491 sendReply(reply, (tr.flags & kForwardReplyFlags));
Martijn Coenenea0090a2017-11-02 18:54:40 +00001492 } else {
Steven Moreland80844f72020-12-12 02:06:08 +00001493 if (error != OK) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001494 std::ostringstream logStream;
1495 logStream << "oneway function results for code " << tr.code << " on binder at "
1496 << reinterpret_cast<void*>(tr.target.ptr)
1497 << " will be dropped but finished with status "
1498 << statusToString(error);
Steven Moreland80844f72020-12-12 02:06:08 +00001499
1500 // ideally we could log this even when error == OK, but it
1501 // causes too much logspam because some manually-written
1502 // interfaces have clients that call methods which always
1503 // write results, sometimes as oneway methods.
1504 if (reply.dataSize() != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001505 logStream << " and reply parcel size " << reply.dataSize();
Steven Moreland80844f72020-12-12 02:06:08 +00001506 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001507 std::string message = logStream.str();
1508 ALOGI("%s", message.c_str());
Steven Morelandce66b8a2020-02-10 14:43:14 -08001509 }
Martijn Coenenea0090a2017-11-02 18:54:40 +00001510 LOG_ONEWAY("NOT sending reply to %d!", mCallingPid);
1511 }
1512
Steven Moreland39d887d2020-01-31 14:56:45 -08001513 mServingStackPointer = origServingStackPointer;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001514 mCallingPid = origPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001515 mCallingSid = origSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001516 mCallingUid = origUid;
mattgilbride85897672022-10-22 17:42:44 +00001517 mHasExplicitIdentity = origHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001518 mStrictModePolicy = origStrictModePolicy;
1519 mLastTransactionBinderFlags = origTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001520 mWorkSource = origWorkSource;
1521 mPropagateWorkSource = origPropagateWorkSet;
Christopher Tate440fd872010-03-18 17:55:03 -07001522
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001523 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001524 std::ostringstream logStream;
1525 logStream << "BC_REPLY thr " << (void*)pthread_self() << " / obj " << tr.target.ptr
1526 << ": \t" << reply << "\n";
1527 std::string message = logStream.str();
1528 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001529 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001530
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001531 }
1532 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001533
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001534 case BR_DEAD_BINDER:
1535 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001536 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001537 proxy->sendObituary();
1538 mOut.writeInt32(BC_DEAD_BINDER_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001539 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001540 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001541
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001542 case BR_CLEAR_DEATH_NOTIFICATION_DONE:
1543 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001544 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001545 proxy->getWeakRefs()->decWeak(proxy);
1546 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001547
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -07001548 case BR_FROZEN_BINDER: {
1549 const struct binder_frozen_state_info* data =
1550 reinterpret_cast<const struct binder_frozen_state_info*>(
1551 mIn.readInplace(sizeof(struct binder_frozen_state_info)));
1552 if (data == nullptr) {
1553 result = UNKNOWN_ERROR;
1554 break;
1555 }
1556 BpBinder* proxy = (BpBinder*)data->cookie;
1557 bool isFrozen = mIn.readInt32() > 0;
1558 proxy->getPrivateAccessor().onFrozenStateChanged(data->is_frozen);
1559 mOut.writeInt32(BC_FREEZE_NOTIFICATION_DONE);
1560 mOut.writePointer(data->cookie);
1561 } break;
1562
1563 case BR_CLEAR_FREEZE_NOTIFICATION_DONE: {
1564 BpBinder* proxy = (BpBinder*)mIn.readPointer();
1565 proxy->getWeakRefs()->decWeak(proxy);
1566 } break;
1567
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001568 case BR_FINISHED:
1569 result = TIMED_OUT;
1570 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001571
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001572 case BR_NOOP:
1573 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001574
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001575 case BR_SPAWN_LOOPER:
1576 mProcess->spawnPooledThread(false);
1577 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001578
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001579 default:
liangweikanga43ee152016-10-25 16:37:54 +08001580 ALOGE("*** BAD COMMAND %d received from Binder driver\n", cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001581 result = UNKNOWN_ERROR;
1582 break;
1583 }
1584
1585 if (result != NO_ERROR) {
1586 mLastError = result;
1587 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001588
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001589 return result;
1590}
1591
Steven Moreland39d887d2020-01-31 14:56:45 -08001592const void* IPCThreadState::getServingStackPointer() const {
1593 return mServingStackPointer;
Jayant Chowdharydac6dc82018-10-01 22:52:44 +00001594}
1595
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001596void IPCThreadState::threadDestructor(void *st)
1597{
Todd Poynor8d96cab2013-06-25 19:12:18 -07001598 IPCThreadState* const self = static_cast<IPCThreadState*>(st);
1599 if (self) {
1600 self->flushCommands();
Elliott Hughes6071da72015-08-12 15:27:47 -07001601#if defined(__ANDROID__)
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001602 if (self->mProcess->mDriverFD >= 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001603 ioctl(self->mProcess->mDriverFD, BINDER_THREAD_EXIT, 0);
1604 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001605#endif
Todd Poynor8d96cab2013-06-25 19:12:18 -07001606 delete self;
1607 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001608}
1609
Li Li6f059292021-09-10 09:59:30 -07001610status_t IPCThreadState::getProcessFreezeInfo(pid_t pid, uint32_t *sync_received,
1611 uint32_t *async_received)
1612{
1613 int ret = 0;
Jiyong Park5970d0a2022-03-08 16:56:13 +09001614 binder_frozen_status_info info = {};
Li Li6f059292021-09-10 09:59:30 -07001615 info.pid = pid;
1616
1617#if defined(__ANDROID__)
1618 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_FROZEN_INFO, &info) < 0)
1619 ret = -errno;
1620#endif
1621 *sync_received = info.sync_recv;
1622 *async_received = info.async_recv;
1623
1624 return ret;
1625}
Li Li6f059292021-09-10 09:59:30 -07001626
Marco Ballesio7ee17572020-09-08 10:30:03 -07001627status_t IPCThreadState::freeze(pid_t pid, bool enable, uint32_t timeout_ms) {
1628 struct binder_freeze_info info;
1629 int ret = 0;
1630
1631 info.pid = pid;
1632 info.enable = enable;
1633 info.timeout_ms = timeout_ms;
1634
1635
1636#if defined(__ANDROID__)
1637 if (ioctl(self()->mProcess->mDriverFD, BINDER_FREEZE, &info) < 0)
1638 ret = -errno;
1639#endif
1640
1641 //
1642 // ret==-EAGAIN indicates that transactions have not drained.
1643 // Call again to poll for completion.
1644 //
1645 return ret;
1646}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001647
Carlos Llamasb235b122021-12-20 06:38:44 -08001648void IPCThreadState::logExtendedError() {
1649 struct binder_extended_error ee = {.command = BR_OK};
1650
1651 if (!ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::EXTENDED_ERROR))
1652 return;
1653
1654#if defined(__ANDROID__)
1655 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_EXTENDED_ERROR, &ee) < 0) {
1656 ALOGE("Failed to get extended error: %s", strerror(errno));
1657 return;
1658 }
1659#endif
1660
Steven Morelandb6fe2422024-05-25 00:25:02 +00001661 ALOGE_IF(ee.command != BR_OK, "Binder transaction failure. id: %d, BR_*: %d, error: %d (%s)",
1662 ee.id, ee.command, ee.param, strerror(-ee.param));
Carlos Llamasb235b122021-12-20 06:38:44 -08001663}
1664
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001665void IPCThreadState::freeBuffer(const uint8_t* data, size_t /*dataSize*/,
1666 const binder_size_t* /*objects*/, size_t /*objectsSize*/) {
Steve Blocka19954a2012-01-04 20:05:49 +00001667 //ALOGI("Freeing parcel %p", &parcel);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001668 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001669 std::ostringstream logStream;
1670 logStream << "Writing BC_FREE_BUFFER for " << data << "\n";
1671 std::string message = logStream.str();
1672 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001673 }
Steve Block67263472012-01-09 18:35:44 +00001674 ALOG_ASSERT(data != NULL, "Called with NULL data");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001675 IPCThreadState* state = self();
1676 state->mOut.writeInt32(BC_FREE_BUFFER);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001677 state->mOut.writePointer((uintptr_t)data);
Martijn Coenen0442a862017-11-17 10:46:32 +01001678 state->flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001679}
1680
Steven Moreland61ff8492019-09-26 16:05:45 -07001681} // namespace android