Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2019 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include "ServiceManager.h" |
| 18 | |
| 19 | #include <android-base/logging.h> |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 20 | #include <android-base/properties.h> |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 21 | #include <binder/BpBinder.h> |
| 22 | #include <binder/IPCThreadState.h> |
| 23 | #include <binder/ProcessState.h> |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 24 | #include <binder/Stability.h> |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 25 | #include <cutils/android_filesystem_config.h> |
| 26 | #include <cutils/multiuser.h> |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 27 | #include <thread> |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 28 | |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 29 | #ifndef VENDORSERVICEMANAGER |
| 30 | #include <vintf/VintfObject.h> |
| 31 | #include <vintf/constants.h> |
| 32 | #endif // !VENDORSERVICEMANAGER |
| 33 | |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 34 | using ::android::binder::Status; |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 35 | using ::android::internal::Stability; |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 36 | |
| 37 | namespace android { |
| 38 | |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 39 | #ifndef VENDORSERVICEMANAGER |
Steven Moreland | b82b8f8 | 2019-10-28 10:52:34 -0700 | [diff] [blame] | 40 | static bool isVintfDeclared(const std::string& name) { |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 41 | size_t firstSlash = name.find('/'); |
| 42 | size_t lastDot = name.rfind('.', firstSlash); |
| 43 | if (firstSlash == std::string::npos || lastDot == std::string::npos) { |
| 44 | LOG(ERROR) << "VINTF HALs require names in the format type/instance (e.g. " |
| 45 | << "some.package.foo.IFoo/default) but got: " << name; |
| 46 | return false; |
| 47 | } |
| 48 | const std::string package = name.substr(0, lastDot); |
| 49 | const std::string iface = name.substr(lastDot+1, firstSlash-lastDot-1); |
| 50 | const std::string instance = name.substr(firstSlash+1); |
| 51 | |
Steven Moreland | 2edde8e | 2020-04-30 17:04:54 -0700 | [diff] [blame] | 52 | struct ManifestWithDescription { |
| 53 | std::shared_ptr<const vintf::HalManifest> manifest; |
| 54 | const char* description; |
| 55 | }; |
| 56 | for (const ManifestWithDescription& mwd : { |
| 57 | ManifestWithDescription{ vintf::VintfObject::GetDeviceHalManifest(), "device" }, |
| 58 | ManifestWithDescription{ vintf::VintfObject::GetFrameworkHalManifest(), "framework" }, |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 59 | }) { |
Steven Moreland | 2edde8e | 2020-04-30 17:04:54 -0700 | [diff] [blame] | 60 | if (mwd.manifest == nullptr) { |
| 61 | LOG(ERROR) << "NULL VINTF MANIFEST!: " << mwd.description; |
| 62 | // note, we explicitly do not retry here, so that we can detect VINTF |
| 63 | // or other bugs (b/151696835) |
| 64 | continue; |
| 65 | } |
| 66 | if (mwd.manifest->hasAidlInstance(package, iface, instance)) { |
| 67 | LOG(INFO) << "Found " << name << " in " << mwd.description << " VINTF manifest."; |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 68 | return true; |
| 69 | } |
| 70 | } |
Steven Moreland | 2edde8e | 2020-04-30 17:04:54 -0700 | [diff] [blame] | 71 | |
| 72 | // Although it is tested, explicitly rebuilding qualified name, in case it |
| 73 | // becomes something unexpected. |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 74 | LOG(ERROR) << "Could not find " << package << "." << iface << "/" << instance |
| 75 | << " in the VINTF manifest."; |
| 76 | return false; |
| 77 | } |
Steven Moreland | b82b8f8 | 2019-10-28 10:52:34 -0700 | [diff] [blame] | 78 | |
| 79 | static bool meetsDeclarationRequirements(const sp<IBinder>& binder, const std::string& name) { |
| 80 | if (!Stability::requiresVintfDeclaration(binder)) { |
| 81 | return true; |
| 82 | } |
| 83 | |
| 84 | return isVintfDeclared(name); |
| 85 | } |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 86 | #endif // !VENDORSERVICEMANAGER |
| 87 | |
Steven Moreland | d13f08b | 2019-11-18 14:23:09 -0800 | [diff] [blame] | 88 | ServiceManager::ServiceManager(std::unique_ptr<Access>&& access) : mAccess(std::move(access)) { |
Steven Moreland | 8d0c9a7 | 2020-04-30 16:51:56 -0700 | [diff] [blame] | 89 | // TODO(b/151696835): reenable performance hack when we solve bug, since with |
| 90 | // this hack and other fixes, it is unlikely we will see even an ephemeral |
| 91 | // failure when the manifest parse fails. The goal is that the manifest will |
| 92 | // be read incorrectly and cause the process trying to register a HAL to |
| 93 | // fail. If this is in fact an early boot kernel contention issue, then we |
| 94 | // will get no failure, and by its absence, be signalled to invest more |
| 95 | // effort in re-adding this performance hack. |
| 96 | // #ifndef VENDORSERVICEMANAGER |
| 97 | // // can process these at any times, don't want to delay first VINTF client |
| 98 | // std::thread([] { |
| 99 | // vintf::VintfObject::GetDeviceHalManifest(); |
| 100 | // vintf::VintfObject::GetFrameworkHalManifest(); |
| 101 | // }).detach(); |
| 102 | // #endif // !VENDORSERVICEMANAGER |
Steven Moreland | d13f08b | 2019-11-18 14:23:09 -0800 | [diff] [blame] | 103 | } |
Steven Moreland | 130242d | 2019-08-26 17:41:32 -0700 | [diff] [blame] | 104 | ServiceManager::~ServiceManager() { |
| 105 | // this should only happen in tests |
| 106 | |
Jon Spivack | f288b1d | 2019-12-19 17:15:51 -0800 | [diff] [blame] | 107 | for (const auto& [name, callbacks] : mNameToRegistrationCallback) { |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 108 | CHECK(!callbacks.empty()) << name; |
| 109 | for (const auto& callback : callbacks) { |
| 110 | CHECK(callback != nullptr) << name; |
| 111 | } |
| 112 | } |
| 113 | |
Steven Moreland | 130242d | 2019-08-26 17:41:32 -0700 | [diff] [blame] | 114 | for (const auto& [name, service] : mNameToService) { |
| 115 | CHECK(service.binder != nullptr) << name; |
| 116 | } |
| 117 | } |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 118 | |
| 119 | Status ServiceManager::getService(const std::string& name, sp<IBinder>* outBinder) { |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 120 | *outBinder = tryGetService(name, true); |
| 121 | // returns ok regardless of result for legacy reasons |
| 122 | return Status::ok(); |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 123 | } |
| 124 | |
| 125 | Status ServiceManager::checkService(const std::string& name, sp<IBinder>* outBinder) { |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 126 | *outBinder = tryGetService(name, false); |
| 127 | // returns ok regardless of result for legacy reasons |
| 128 | return Status::ok(); |
| 129 | } |
| 130 | |
| 131 | sp<IBinder> ServiceManager::tryGetService(const std::string& name, bool startIfNotFound) { |
Steven Moreland | a9fe474 | 2019-07-18 14:45:20 -0700 | [diff] [blame] | 132 | auto ctx = mAccess->getCallingContext(); |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 133 | |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 134 | sp<IBinder> out; |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 135 | Service* service = nullptr; |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 136 | if (auto it = mNameToService.find(name); it != mNameToService.end()) { |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 137 | service = &(it->second); |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 138 | |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 139 | if (!service->allowIsolated) { |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 140 | uid_t appid = multiuser_get_app_id(ctx.uid); |
| 141 | bool isIsolated = appid >= AID_ISOLATED_START && appid <= AID_ISOLATED_END; |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 142 | |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 143 | if (isIsolated) { |
| 144 | return nullptr; |
| 145 | } |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 146 | } |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 147 | out = service->binder; |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 148 | } |
| 149 | |
Steven Moreland | a9fe474 | 2019-07-18 14:45:20 -0700 | [diff] [blame] | 150 | if (!mAccess->canFind(ctx, name)) { |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 151 | return nullptr; |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 152 | } |
| 153 | |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 154 | if (!out && startIfNotFound) { |
| 155 | tryStartService(name); |
| 156 | } |
| 157 | |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 158 | if (out) { |
| 159 | // Setting this guarantee each time we hand out a binder ensures that the client-checking |
| 160 | // loop knows about the event even if the client immediately drops the service |
| 161 | service->guaranteeClient = true; |
| 162 | } |
| 163 | |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 164 | return out; |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 165 | } |
| 166 | |
Steven Moreland | 905e2e8 | 2019-07-17 11:05:45 -0700 | [diff] [blame] | 167 | bool isValidServiceName(const std::string& name) { |
| 168 | if (name.size() == 0) return false; |
| 169 | if (name.size() > 127) return false; |
| 170 | |
| 171 | for (char c : name) { |
Steven Moreland | bb7951d | 2019-08-20 16:58:25 -0700 | [diff] [blame] | 172 | if (c == '_' || c == '-' || c == '.' || c == '/') continue; |
Steven Moreland | 905e2e8 | 2019-07-17 11:05:45 -0700 | [diff] [blame] | 173 | if (c >= 'a' && c <= 'z') continue; |
| 174 | if (c >= 'A' && c <= 'Z') continue; |
| 175 | if (c >= '0' && c <= '9') continue; |
| 176 | return false; |
| 177 | } |
| 178 | |
| 179 | return true; |
| 180 | } |
| 181 | |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 182 | Status ServiceManager::addService(const std::string& name, const sp<IBinder>& binder, bool allowIsolated, int32_t dumpPriority) { |
Steven Moreland | a9fe474 | 2019-07-18 14:45:20 -0700 | [diff] [blame] | 183 | auto ctx = mAccess->getCallingContext(); |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 184 | |
| 185 | // apps cannot add services |
| 186 | if (multiuser_get_app_id(ctx.uid) >= AID_APP) { |
| 187 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 188 | } |
| 189 | |
Steven Moreland | a9fe474 | 2019-07-18 14:45:20 -0700 | [diff] [blame] | 190 | if (!mAccess->canAdd(ctx, name)) { |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 191 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 192 | } |
| 193 | |
| 194 | if (binder == nullptr) { |
| 195 | return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT); |
| 196 | } |
| 197 | |
Steven Moreland | 905e2e8 | 2019-07-17 11:05:45 -0700 | [diff] [blame] | 198 | if (!isValidServiceName(name)) { |
| 199 | LOG(ERROR) << "Invalid service name: " << name; |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 200 | return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT); |
| 201 | } |
| 202 | |
Steven Moreland | 86a17f8 | 2019-09-10 10:18:00 -0700 | [diff] [blame] | 203 | #ifndef VENDORSERVICEMANAGER |
| 204 | if (!meetsDeclarationRequirements(binder, name)) { |
| 205 | // already logged |
| 206 | return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT); |
| 207 | } |
| 208 | #endif // !VENDORSERVICEMANAGER |
| 209 | |
Steven Moreland | 88860b0 | 2019-08-12 14:24:14 -0700 | [diff] [blame] | 210 | // implicitly unlinked when the binder is removed |
Steven Moreland | 46f380b | 2019-10-16 16:28:21 -0700 | [diff] [blame] | 211 | if (binder->remoteBinder() != nullptr && binder->linkToDeath(this) != OK) { |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 212 | LOG(ERROR) << "Could not linkToDeath when adding " << name; |
| 213 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 214 | } |
| 215 | |
Devin Moore | 05ffe52 | 2020-08-06 13:58:29 -0700 | [diff] [blame^] | 216 | // Overwrite the old service if it exists |
| 217 | mNameToService[name] = Service { |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 218 | .binder = binder, |
| 219 | .allowIsolated = allowIsolated, |
| 220 | .dumpPriority = dumpPriority, |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 221 | .debugPid = ctx.debugPid, |
Devin Moore | 05ffe52 | 2020-08-06 13:58:29 -0700 | [diff] [blame^] | 222 | }; |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 223 | |
Jon Spivack | f288b1d | 2019-12-19 17:15:51 -0800 | [diff] [blame] | 224 | auto it = mNameToRegistrationCallback.find(name); |
| 225 | if (it != mNameToRegistrationCallback.end()) { |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 226 | for (const sp<IServiceCallback>& cb : it->second) { |
Devin Moore | 05ffe52 | 2020-08-06 13:58:29 -0700 | [diff] [blame^] | 227 | mNameToService[name].guaranteeClient = true; |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 228 | // permission checked in registerForNotifications |
| 229 | cb->onRegistration(name, binder); |
| 230 | } |
| 231 | } |
| 232 | |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 233 | return Status::ok(); |
| 234 | } |
| 235 | |
| 236 | Status ServiceManager::listServices(int32_t dumpPriority, std::vector<std::string>* outList) { |
Steven Moreland | a9fe474 | 2019-07-18 14:45:20 -0700 | [diff] [blame] | 237 | if (!mAccess->canList(mAccess->getCallingContext())) { |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 238 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 239 | } |
| 240 | |
| 241 | size_t toReserve = 0; |
| 242 | for (auto const& [name, service] : mNameToService) { |
| 243 | (void) name; |
| 244 | |
| 245 | if (service.dumpPriority & dumpPriority) ++toReserve; |
| 246 | } |
| 247 | |
| 248 | CHECK(outList->empty()); |
| 249 | |
| 250 | outList->reserve(toReserve); |
| 251 | for (auto const& [name, service] : mNameToService) { |
| 252 | (void) service; |
| 253 | |
| 254 | if (service.dumpPriority & dumpPriority) { |
| 255 | outList->push_back(name); |
| 256 | } |
| 257 | } |
| 258 | |
| 259 | return Status::ok(); |
| 260 | } |
| 261 | |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 262 | Status ServiceManager::registerForNotifications( |
| 263 | const std::string& name, const sp<IServiceCallback>& callback) { |
| 264 | auto ctx = mAccess->getCallingContext(); |
| 265 | |
| 266 | if (!mAccess->canFind(ctx, name)) { |
| 267 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 268 | } |
| 269 | |
| 270 | if (!isValidServiceName(name)) { |
| 271 | LOG(ERROR) << "Invalid service name: " << name; |
| 272 | return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT); |
| 273 | } |
| 274 | |
| 275 | if (callback == nullptr) { |
| 276 | return Status::fromExceptionCode(Status::EX_NULL_POINTER); |
| 277 | } |
| 278 | |
| 279 | if (OK != IInterface::asBinder(callback)->linkToDeath(this)) { |
| 280 | LOG(ERROR) << "Could not linkToDeath when adding " << name; |
| 281 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 282 | } |
| 283 | |
Jon Spivack | f288b1d | 2019-12-19 17:15:51 -0800 | [diff] [blame] | 284 | mNameToRegistrationCallback[name].push_back(callback); |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 285 | |
| 286 | if (auto it = mNameToService.find(name); it != mNameToService.end()) { |
| 287 | const sp<IBinder>& binder = it->second.binder; |
| 288 | |
| 289 | // never null if an entry exists |
| 290 | CHECK(binder != nullptr) << name; |
| 291 | callback->onRegistration(name, binder); |
| 292 | } |
| 293 | |
| 294 | return Status::ok(); |
| 295 | } |
| 296 | Status ServiceManager::unregisterForNotifications( |
| 297 | const std::string& name, const sp<IServiceCallback>& callback) { |
| 298 | auto ctx = mAccess->getCallingContext(); |
| 299 | |
| 300 | if (!mAccess->canFind(ctx, name)) { |
| 301 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 302 | } |
| 303 | |
| 304 | bool found = false; |
| 305 | |
Jon Spivack | f288b1d | 2019-12-19 17:15:51 -0800 | [diff] [blame] | 306 | auto it = mNameToRegistrationCallback.find(name); |
| 307 | if (it != mNameToRegistrationCallback.end()) { |
| 308 | removeRegistrationCallback(IInterface::asBinder(callback), &it, &found); |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 309 | } |
| 310 | |
| 311 | if (!found) { |
| 312 | LOG(ERROR) << "Trying to unregister callback, but none exists " << name; |
| 313 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 314 | } |
| 315 | |
| 316 | return Status::ok(); |
| 317 | } |
| 318 | |
Steven Moreland | b82b8f8 | 2019-10-28 10:52:34 -0700 | [diff] [blame] | 319 | Status ServiceManager::isDeclared(const std::string& name, bool* outReturn) { |
| 320 | auto ctx = mAccess->getCallingContext(); |
| 321 | |
| 322 | if (!mAccess->canFind(ctx, name)) { |
| 323 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 324 | } |
| 325 | |
| 326 | *outReturn = false; |
| 327 | |
| 328 | #ifndef VENDORSERVICEMANAGER |
| 329 | *outReturn = isVintfDeclared(name); |
| 330 | #endif |
| 331 | return Status::ok(); |
| 332 | } |
| 333 | |
Jon Spivack | f288b1d | 2019-12-19 17:15:51 -0800 | [diff] [blame] | 334 | void ServiceManager::removeRegistrationCallback(const wp<IBinder>& who, |
| 335 | ServiceCallbackMap::iterator* it, |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 336 | bool* found) { |
| 337 | std::vector<sp<IServiceCallback>>& listeners = (*it)->second; |
| 338 | |
| 339 | for (auto lit = listeners.begin(); lit != listeners.end();) { |
| 340 | if (IInterface::asBinder(*lit) == who) { |
| 341 | if(found) *found = true; |
| 342 | lit = listeners.erase(lit); |
| 343 | } else { |
| 344 | ++lit; |
| 345 | } |
| 346 | } |
| 347 | |
| 348 | if (listeners.empty()) { |
Jon Spivack | f288b1d | 2019-12-19 17:15:51 -0800 | [diff] [blame] | 349 | *it = mNameToRegistrationCallback.erase(*it); |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 350 | } else { |
Jon Spivack | e223f08 | 2019-11-19 16:21:20 -0800 | [diff] [blame] | 351 | (*it)++; |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 352 | } |
| 353 | } |
| 354 | |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 355 | void ServiceManager::binderDied(const wp<IBinder>& who) { |
| 356 | for (auto it = mNameToService.begin(); it != mNameToService.end();) { |
| 357 | if (who == it->second.binder) { |
| 358 | it = mNameToService.erase(it); |
| 359 | } else { |
| 360 | ++it; |
| 361 | } |
| 362 | } |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 363 | |
Jon Spivack | f288b1d | 2019-12-19 17:15:51 -0800 | [diff] [blame] | 364 | for (auto it = mNameToRegistrationCallback.begin(); it != mNameToRegistrationCallback.end();) { |
| 365 | removeRegistrationCallback(who, &it, nullptr /*found*/); |
Steven Moreland | 27cfab0 | 2019-08-12 14:34:16 -0700 | [diff] [blame] | 366 | } |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 367 | |
| 368 | for (auto it = mNameToClientCallback.begin(); it != mNameToClientCallback.end();) { |
| 369 | removeClientCallback(who, &it); |
| 370 | } |
Steven Moreland | 80e1e6d | 2019-06-21 12:35:59 -0700 | [diff] [blame] | 371 | } |
| 372 | |
Jon Spivack | 0d84430 | 2019-07-22 18:40:34 -0700 | [diff] [blame] | 373 | void ServiceManager::tryStartService(const std::string& name) { |
| 374 | ALOGI("Since '%s' could not be found, trying to start it as a lazy AIDL service", |
| 375 | name.c_str()); |
| 376 | |
| 377 | std::thread([=] { |
| 378 | (void)base::SetProperty("ctl.interface_start", "aidl/" + name); |
| 379 | }).detach(); |
| 380 | } |
| 381 | |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 382 | Status ServiceManager::registerClientCallback(const std::string& name, const sp<IBinder>& service, |
| 383 | const sp<IClientCallback>& cb) { |
| 384 | if (cb == nullptr) { |
| 385 | return Status::fromExceptionCode(Status::EX_NULL_POINTER); |
| 386 | } |
| 387 | |
| 388 | auto ctx = mAccess->getCallingContext(); |
| 389 | if (!mAccess->canAdd(ctx, name)) { |
| 390 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 391 | } |
| 392 | |
| 393 | auto serviceIt = mNameToService.find(name); |
| 394 | if (serviceIt == mNameToService.end()) { |
| 395 | LOG(ERROR) << "Could not add callback for nonexistent service: " << name; |
| 396 | return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT); |
| 397 | } |
| 398 | |
| 399 | if (serviceIt->second.debugPid != IPCThreadState::self()->getCallingPid()) { |
| 400 | LOG(WARNING) << "Only a server can register for client callbacks (for " << name << ")"; |
| 401 | return Status::fromExceptionCode(Status::EX_UNSUPPORTED_OPERATION); |
| 402 | } |
| 403 | |
| 404 | if (serviceIt->second.binder != service) { |
| 405 | LOG(WARNING) << "Tried to register client callback for " << name |
| 406 | << " but a different service is registered under this name."; |
| 407 | return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT); |
| 408 | } |
| 409 | |
| 410 | if (OK != IInterface::asBinder(cb)->linkToDeath(this)) { |
| 411 | LOG(ERROR) << "Could not linkToDeath when adding client callback for " << name; |
| 412 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 413 | } |
| 414 | |
| 415 | mNameToClientCallback[name].push_back(cb); |
| 416 | |
| 417 | return Status::ok(); |
| 418 | } |
| 419 | |
| 420 | void ServiceManager::removeClientCallback(const wp<IBinder>& who, |
| 421 | ClientCallbackMap::iterator* it) { |
| 422 | std::vector<sp<IClientCallback>>& listeners = (*it)->second; |
| 423 | |
| 424 | for (auto lit = listeners.begin(); lit != listeners.end();) { |
| 425 | if (IInterface::asBinder(*lit) == who) { |
| 426 | lit = listeners.erase(lit); |
| 427 | } else { |
| 428 | ++lit; |
| 429 | } |
| 430 | } |
| 431 | |
| 432 | if (listeners.empty()) { |
| 433 | *it = mNameToClientCallback.erase(*it); |
| 434 | } else { |
| 435 | (*it)++; |
| 436 | } |
| 437 | } |
| 438 | |
| 439 | ssize_t ServiceManager::Service::getNodeStrongRefCount() { |
| 440 | sp<BpBinder> bpBinder = binder->remoteBinder(); |
| 441 | if (bpBinder == nullptr) return -1; |
| 442 | |
| 443 | return ProcessState::self()->getStrongRefCountForNodeByHandle(bpBinder->handle()); |
| 444 | } |
| 445 | |
| 446 | void ServiceManager::handleClientCallbacks() { |
| 447 | for (const auto& [name, service] : mNameToService) { |
Jon Spivack | d9533c2 | 2020-01-27 22:19:22 +0000 | [diff] [blame] | 448 | handleServiceClientCallback(name, true); |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 449 | } |
| 450 | } |
| 451 | |
Jon Spivack | d9533c2 | 2020-01-27 22:19:22 +0000 | [diff] [blame] | 452 | ssize_t ServiceManager::handleServiceClientCallback(const std::string& serviceName, |
| 453 | bool isCalledOnInterval) { |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 454 | auto serviceIt = mNameToService.find(serviceName); |
| 455 | if (serviceIt == mNameToService.end() || mNameToClientCallback.count(serviceName) < 1) { |
| 456 | return -1; |
| 457 | } |
| 458 | |
| 459 | Service& service = serviceIt->second; |
| 460 | ssize_t count = service.getNodeStrongRefCount(); |
| 461 | |
| 462 | // binder driver doesn't support this feature |
| 463 | if (count == -1) return count; |
| 464 | |
| 465 | bool hasClients = count > 1; // this process holds a strong count |
| 466 | |
| 467 | if (service.guaranteeClient) { |
| 468 | // we have no record of this client |
| 469 | if (!service.hasClients && !hasClients) { |
| 470 | sendClientCallbackNotifications(serviceName, true); |
| 471 | } |
| 472 | |
| 473 | // guarantee is temporary |
| 474 | service.guaranteeClient = false; |
| 475 | } |
| 476 | |
Jon Spivack | d9533c2 | 2020-01-27 22:19:22 +0000 | [diff] [blame] | 477 | // only send notifications if this was called via the interval checking workflow |
| 478 | if (isCalledOnInterval) { |
| 479 | if (hasClients && !service.hasClients) { |
| 480 | // client was retrieved in some other way |
| 481 | sendClientCallbackNotifications(serviceName, true); |
| 482 | } |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 483 | |
Jon Spivack | d9533c2 | 2020-01-27 22:19:22 +0000 | [diff] [blame] | 484 | // there are no more clients, but the callback has not been called yet |
| 485 | if (!hasClients && service.hasClients) { |
| 486 | sendClientCallbackNotifications(serviceName, false); |
| 487 | } |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 488 | } |
| 489 | |
| 490 | return count; |
| 491 | } |
| 492 | |
| 493 | void ServiceManager::sendClientCallbackNotifications(const std::string& serviceName, bool hasClients) { |
| 494 | auto serviceIt = mNameToService.find(serviceName); |
| 495 | if (serviceIt == mNameToService.end()) { |
| 496 | LOG(WARNING) << "sendClientCallbackNotifications could not find service " << serviceName; |
| 497 | return; |
| 498 | } |
| 499 | Service& service = serviceIt->second; |
| 500 | |
| 501 | CHECK(hasClients != service.hasClients) << "Record shows: " << service.hasClients |
| 502 | << " so we can't tell clients again that we have client: " << hasClients; |
| 503 | |
| 504 | LOG(INFO) << "Notifying " << serviceName << " they have clients: " << hasClients; |
| 505 | |
| 506 | auto ccIt = mNameToClientCallback.find(serviceName); |
| 507 | CHECK(ccIt != mNameToClientCallback.end()) |
| 508 | << "sendClientCallbackNotifications could not find callbacks for service "; |
| 509 | |
| 510 | for (const auto& callback : ccIt->second) { |
| 511 | callback->onClients(service.binder, hasClients); |
| 512 | } |
| 513 | |
| 514 | service.hasClients = hasClients; |
| 515 | } |
| 516 | |
| 517 | Status ServiceManager::tryUnregisterService(const std::string& name, const sp<IBinder>& binder) { |
| 518 | if (binder == nullptr) { |
| 519 | return Status::fromExceptionCode(Status::EX_NULL_POINTER); |
| 520 | } |
| 521 | |
| 522 | auto ctx = mAccess->getCallingContext(); |
| 523 | if (!mAccess->canAdd(ctx, name)) { |
| 524 | return Status::fromExceptionCode(Status::EX_SECURITY); |
| 525 | } |
| 526 | |
| 527 | auto serviceIt = mNameToService.find(name); |
| 528 | if (serviceIt == mNameToService.end()) { |
| 529 | LOG(WARNING) << "Tried to unregister " << name |
| 530 | << ", but that service wasn't registered to begin with."; |
| 531 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 532 | } |
| 533 | |
| 534 | if (serviceIt->second.debugPid != IPCThreadState::self()->getCallingPid()) { |
| 535 | LOG(WARNING) << "Only a server can unregister itself (for " << name << ")"; |
| 536 | return Status::fromExceptionCode(Status::EX_UNSUPPORTED_OPERATION); |
| 537 | } |
| 538 | |
| 539 | sp<IBinder> storedBinder = serviceIt->second.binder; |
| 540 | |
| 541 | if (binder != storedBinder) { |
| 542 | LOG(WARNING) << "Tried to unregister " << name |
| 543 | << ", but a different service is registered under this name."; |
| 544 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 545 | } |
| 546 | |
Jon Spivack | 0f18f2c | 2020-03-13 20:45:18 -0700 | [diff] [blame] | 547 | if (serviceIt->second.guaranteeClient) { |
| 548 | LOG(INFO) << "Tried to unregister " << name << ", but there is about to be a client."; |
| 549 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 550 | } |
| 551 | |
Jon Spivack | d9533c2 | 2020-01-27 22:19:22 +0000 | [diff] [blame] | 552 | int clients = handleServiceClientCallback(name, false); |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 553 | |
| 554 | // clients < 0: feature not implemented or other error. Assume clients. |
| 555 | // Otherwise: |
| 556 | // - kernel driver will hold onto one refcount (during this transaction) |
| 557 | // - servicemanager has a refcount (guaranteed by this transaction) |
| 558 | // So, if clients > 2, then at least one other service on the system must hold a refcount. |
| 559 | if (clients < 0 || clients > 2) { |
| 560 | // client callbacks are either disabled or there are other clients |
Jon Spivack | d9533c2 | 2020-01-27 22:19:22 +0000 | [diff] [blame] | 561 | LOG(INFO) << "Tried to unregister " << name << ", but there are clients: " << clients; |
Jon Spivack | 620d2dc | 2020-03-06 13:58:01 -0800 | [diff] [blame] | 562 | // Set this flag to ensure the clients are acknowledged in the next callback |
| 563 | serviceIt->second.guaranteeClient = true; |
Jon Spivack | 9f503a4 | 2019-10-22 16:49:19 -0700 | [diff] [blame] | 564 | return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE); |
| 565 | } |
| 566 | |
| 567 | mNameToService.erase(name); |
| 568 | |
| 569 | return Status::ok(); |
| 570 | } |
| 571 | |
Steven Moreland | 8d0c9a7 | 2020-04-30 16:51:56 -0700 | [diff] [blame] | 572 | } // namespace android |