blob: e80c3210f03512b140f9f4f3edf06edd49ce7505 [file] [log] [blame]
Steven Moreland80e1e6d2019-06-21 12:35:59 -07001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "ServiceManager.h"
18
19#include <android-base/logging.h>
Jon Spivack0d844302019-07-22 18:40:34 -070020#include <android-base/properties.h>
Jon Spivack9f503a42019-10-22 16:49:19 -070021#include <binder/BpBinder.h>
22#include <binder/IPCThreadState.h>
23#include <binder/ProcessState.h>
Steven Moreland86a17f82019-09-10 10:18:00 -070024#include <binder/Stability.h>
Steven Moreland80e1e6d2019-06-21 12:35:59 -070025#include <cutils/android_filesystem_config.h>
26#include <cutils/multiuser.h>
Jon Spivack0d844302019-07-22 18:40:34 -070027#include <thread>
Steven Moreland80e1e6d2019-06-21 12:35:59 -070028
Steven Moreland86a17f82019-09-10 10:18:00 -070029#ifndef VENDORSERVICEMANAGER
30#include <vintf/VintfObject.h>
31#include <vintf/constants.h>
32#endif // !VENDORSERVICEMANAGER
33
Steven Moreland80e1e6d2019-06-21 12:35:59 -070034using ::android::binder::Status;
Steven Moreland86a17f82019-09-10 10:18:00 -070035using ::android::internal::Stability;
Steven Moreland80e1e6d2019-06-21 12:35:59 -070036
37namespace android {
38
Steven Moreland86a17f82019-09-10 10:18:00 -070039#ifndef VENDORSERVICEMANAGER
Steven Morelandb82b8f82019-10-28 10:52:34 -070040static bool isVintfDeclared(const std::string& name) {
Steven Moreland86a17f82019-09-10 10:18:00 -070041 size_t firstSlash = name.find('/');
42 size_t lastDot = name.rfind('.', firstSlash);
43 if (firstSlash == std::string::npos || lastDot == std::string::npos) {
44 LOG(ERROR) << "VINTF HALs require names in the format type/instance (e.g. "
45 << "some.package.foo.IFoo/default) but got: " << name;
46 return false;
47 }
48 const std::string package = name.substr(0, lastDot);
49 const std::string iface = name.substr(lastDot+1, firstSlash-lastDot-1);
50 const std::string instance = name.substr(firstSlash+1);
51
Steven Moreland2edde8e2020-04-30 17:04:54 -070052 struct ManifestWithDescription {
53 std::shared_ptr<const vintf::HalManifest> manifest;
54 const char* description;
55 };
56 for (const ManifestWithDescription& mwd : {
57 ManifestWithDescription{ vintf::VintfObject::GetDeviceHalManifest(), "device" },
58 ManifestWithDescription{ vintf::VintfObject::GetFrameworkHalManifest(), "framework" },
Steven Moreland86a17f82019-09-10 10:18:00 -070059 }) {
Steven Moreland2edde8e2020-04-30 17:04:54 -070060 if (mwd.manifest == nullptr) {
61 LOG(ERROR) << "NULL VINTF MANIFEST!: " << mwd.description;
62 // note, we explicitly do not retry here, so that we can detect VINTF
63 // or other bugs (b/151696835)
64 continue;
65 }
66 if (mwd.manifest->hasAidlInstance(package, iface, instance)) {
67 LOG(INFO) << "Found " << name << " in " << mwd.description << " VINTF manifest.";
Steven Moreland86a17f82019-09-10 10:18:00 -070068 return true;
69 }
70 }
Steven Moreland2edde8e2020-04-30 17:04:54 -070071
72 // Although it is tested, explicitly rebuilding qualified name, in case it
73 // becomes something unexpected.
Steven Moreland86a17f82019-09-10 10:18:00 -070074 LOG(ERROR) << "Could not find " << package << "." << iface << "/" << instance
75 << " in the VINTF manifest.";
76 return false;
77}
Steven Morelandb82b8f82019-10-28 10:52:34 -070078
79static bool meetsDeclarationRequirements(const sp<IBinder>& binder, const std::string& name) {
80 if (!Stability::requiresVintfDeclaration(binder)) {
81 return true;
82 }
83
84 return isVintfDeclared(name);
85}
Steven Moreland86a17f82019-09-10 10:18:00 -070086#endif // !VENDORSERVICEMANAGER
87
Steven Morelandd13f08b2019-11-18 14:23:09 -080088ServiceManager::ServiceManager(std::unique_ptr<Access>&& access) : mAccess(std::move(access)) {
Steven Moreland8d0c9a72020-04-30 16:51:56 -070089// TODO(b/151696835): reenable performance hack when we solve bug, since with
90// this hack and other fixes, it is unlikely we will see even an ephemeral
91// failure when the manifest parse fails. The goal is that the manifest will
92// be read incorrectly and cause the process trying to register a HAL to
93// fail. If this is in fact an early boot kernel contention issue, then we
94// will get no failure, and by its absence, be signalled to invest more
95// effort in re-adding this performance hack.
96// #ifndef VENDORSERVICEMANAGER
97// // can process these at any times, don't want to delay first VINTF client
98// std::thread([] {
99// vintf::VintfObject::GetDeviceHalManifest();
100// vintf::VintfObject::GetFrameworkHalManifest();
101// }).detach();
102// #endif // !VENDORSERVICEMANAGER
Steven Morelandd13f08b2019-11-18 14:23:09 -0800103}
Steven Moreland130242d2019-08-26 17:41:32 -0700104ServiceManager::~ServiceManager() {
105 // this should only happen in tests
106
Jon Spivackf288b1d2019-12-19 17:15:51 -0800107 for (const auto& [name, callbacks] : mNameToRegistrationCallback) {
Steven Moreland27cfab02019-08-12 14:34:16 -0700108 CHECK(!callbacks.empty()) << name;
109 for (const auto& callback : callbacks) {
110 CHECK(callback != nullptr) << name;
111 }
112 }
113
Steven Moreland130242d2019-08-26 17:41:32 -0700114 for (const auto& [name, service] : mNameToService) {
115 CHECK(service.binder != nullptr) << name;
116 }
117}
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700118
119Status ServiceManager::getService(const std::string& name, sp<IBinder>* outBinder) {
Jon Spivack0d844302019-07-22 18:40:34 -0700120 *outBinder = tryGetService(name, true);
121 // returns ok regardless of result for legacy reasons
122 return Status::ok();
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700123}
124
125Status ServiceManager::checkService(const std::string& name, sp<IBinder>* outBinder) {
Jon Spivack0d844302019-07-22 18:40:34 -0700126 *outBinder = tryGetService(name, false);
127 // returns ok regardless of result for legacy reasons
128 return Status::ok();
129}
130
131sp<IBinder> ServiceManager::tryGetService(const std::string& name, bool startIfNotFound) {
Steven Morelanda9fe4742019-07-18 14:45:20 -0700132 auto ctx = mAccess->getCallingContext();
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700133
Jon Spivack0d844302019-07-22 18:40:34 -0700134 sp<IBinder> out;
Jon Spivack9f503a42019-10-22 16:49:19 -0700135 Service* service = nullptr;
Jon Spivack0d844302019-07-22 18:40:34 -0700136 if (auto it = mNameToService.find(name); it != mNameToService.end()) {
Jon Spivack9f503a42019-10-22 16:49:19 -0700137 service = &(it->second);
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700138
Jon Spivack9f503a42019-10-22 16:49:19 -0700139 if (!service->allowIsolated) {
Jon Spivack0d844302019-07-22 18:40:34 -0700140 uid_t appid = multiuser_get_app_id(ctx.uid);
141 bool isIsolated = appid >= AID_ISOLATED_START && appid <= AID_ISOLATED_END;
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700142
Jon Spivack0d844302019-07-22 18:40:34 -0700143 if (isIsolated) {
144 return nullptr;
145 }
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700146 }
Jon Spivack9f503a42019-10-22 16:49:19 -0700147 out = service->binder;
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700148 }
149
Steven Morelanda9fe4742019-07-18 14:45:20 -0700150 if (!mAccess->canFind(ctx, name)) {
Jon Spivack0d844302019-07-22 18:40:34 -0700151 return nullptr;
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700152 }
153
Jon Spivack0d844302019-07-22 18:40:34 -0700154 if (!out && startIfNotFound) {
155 tryStartService(name);
156 }
157
Jon Spivack9f503a42019-10-22 16:49:19 -0700158 if (out) {
159 // Setting this guarantee each time we hand out a binder ensures that the client-checking
160 // loop knows about the event even if the client immediately drops the service
161 service->guaranteeClient = true;
162 }
163
Jon Spivack0d844302019-07-22 18:40:34 -0700164 return out;
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700165}
166
Steven Moreland905e2e82019-07-17 11:05:45 -0700167bool isValidServiceName(const std::string& name) {
168 if (name.size() == 0) return false;
169 if (name.size() > 127) return false;
170
171 for (char c : name) {
Steven Morelandbb7951d2019-08-20 16:58:25 -0700172 if (c == '_' || c == '-' || c == '.' || c == '/') continue;
Steven Moreland905e2e82019-07-17 11:05:45 -0700173 if (c >= 'a' && c <= 'z') continue;
174 if (c >= 'A' && c <= 'Z') continue;
175 if (c >= '0' && c <= '9') continue;
176 return false;
177 }
178
179 return true;
180}
181
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700182Status ServiceManager::addService(const std::string& name, const sp<IBinder>& binder, bool allowIsolated, int32_t dumpPriority) {
Steven Morelanda9fe4742019-07-18 14:45:20 -0700183 auto ctx = mAccess->getCallingContext();
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700184
185 // apps cannot add services
186 if (multiuser_get_app_id(ctx.uid) >= AID_APP) {
187 return Status::fromExceptionCode(Status::EX_SECURITY);
188 }
189
Steven Morelanda9fe4742019-07-18 14:45:20 -0700190 if (!mAccess->canAdd(ctx, name)) {
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700191 return Status::fromExceptionCode(Status::EX_SECURITY);
192 }
193
194 if (binder == nullptr) {
195 return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
196 }
197
Steven Moreland905e2e82019-07-17 11:05:45 -0700198 if (!isValidServiceName(name)) {
199 LOG(ERROR) << "Invalid service name: " << name;
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700200 return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
201 }
202
Steven Moreland86a17f82019-09-10 10:18:00 -0700203#ifndef VENDORSERVICEMANAGER
204 if (!meetsDeclarationRequirements(binder, name)) {
205 // already logged
206 return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
207 }
208#endif // !VENDORSERVICEMANAGER
209
Steven Moreland88860b02019-08-12 14:24:14 -0700210 // implicitly unlinked when the binder is removed
Steven Moreland46f380b2019-10-16 16:28:21 -0700211 if (binder->remoteBinder() != nullptr && binder->linkToDeath(this) != OK) {
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700212 LOG(ERROR) << "Could not linkToDeath when adding " << name;
213 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
214 }
215
Devin Moore05ffe522020-08-06 13:58:29 -0700216 // Overwrite the old service if it exists
217 mNameToService[name] = Service {
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700218 .binder = binder,
219 .allowIsolated = allowIsolated,
220 .dumpPriority = dumpPriority,
Jon Spivack9f503a42019-10-22 16:49:19 -0700221 .debugPid = ctx.debugPid,
Devin Moore05ffe522020-08-06 13:58:29 -0700222 };
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700223
Jon Spivackf288b1d2019-12-19 17:15:51 -0800224 auto it = mNameToRegistrationCallback.find(name);
225 if (it != mNameToRegistrationCallback.end()) {
Steven Moreland27cfab02019-08-12 14:34:16 -0700226 for (const sp<IServiceCallback>& cb : it->second) {
Devin Moore05ffe522020-08-06 13:58:29 -0700227 mNameToService[name].guaranteeClient = true;
Steven Moreland27cfab02019-08-12 14:34:16 -0700228 // permission checked in registerForNotifications
229 cb->onRegistration(name, binder);
230 }
231 }
232
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700233 return Status::ok();
234}
235
236Status ServiceManager::listServices(int32_t dumpPriority, std::vector<std::string>* outList) {
Steven Morelanda9fe4742019-07-18 14:45:20 -0700237 if (!mAccess->canList(mAccess->getCallingContext())) {
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700238 return Status::fromExceptionCode(Status::EX_SECURITY);
239 }
240
241 size_t toReserve = 0;
242 for (auto const& [name, service] : mNameToService) {
243 (void) name;
244
245 if (service.dumpPriority & dumpPriority) ++toReserve;
246 }
247
248 CHECK(outList->empty());
249
250 outList->reserve(toReserve);
251 for (auto const& [name, service] : mNameToService) {
252 (void) service;
253
254 if (service.dumpPriority & dumpPriority) {
255 outList->push_back(name);
256 }
257 }
258
259 return Status::ok();
260}
261
Steven Moreland27cfab02019-08-12 14:34:16 -0700262Status ServiceManager::registerForNotifications(
263 const std::string& name, const sp<IServiceCallback>& callback) {
264 auto ctx = mAccess->getCallingContext();
265
266 if (!mAccess->canFind(ctx, name)) {
267 return Status::fromExceptionCode(Status::EX_SECURITY);
268 }
269
270 if (!isValidServiceName(name)) {
271 LOG(ERROR) << "Invalid service name: " << name;
272 return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
273 }
274
275 if (callback == nullptr) {
276 return Status::fromExceptionCode(Status::EX_NULL_POINTER);
277 }
278
279 if (OK != IInterface::asBinder(callback)->linkToDeath(this)) {
280 LOG(ERROR) << "Could not linkToDeath when adding " << name;
281 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
282 }
283
Jon Spivackf288b1d2019-12-19 17:15:51 -0800284 mNameToRegistrationCallback[name].push_back(callback);
Steven Moreland27cfab02019-08-12 14:34:16 -0700285
286 if (auto it = mNameToService.find(name); it != mNameToService.end()) {
287 const sp<IBinder>& binder = it->second.binder;
288
289 // never null if an entry exists
290 CHECK(binder != nullptr) << name;
291 callback->onRegistration(name, binder);
292 }
293
294 return Status::ok();
295}
296Status ServiceManager::unregisterForNotifications(
297 const std::string& name, const sp<IServiceCallback>& callback) {
298 auto ctx = mAccess->getCallingContext();
299
300 if (!mAccess->canFind(ctx, name)) {
301 return Status::fromExceptionCode(Status::EX_SECURITY);
302 }
303
304 bool found = false;
305
Jon Spivackf288b1d2019-12-19 17:15:51 -0800306 auto it = mNameToRegistrationCallback.find(name);
307 if (it != mNameToRegistrationCallback.end()) {
308 removeRegistrationCallback(IInterface::asBinder(callback), &it, &found);
Steven Moreland27cfab02019-08-12 14:34:16 -0700309 }
310
311 if (!found) {
312 LOG(ERROR) << "Trying to unregister callback, but none exists " << name;
313 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
314 }
315
316 return Status::ok();
317}
318
Steven Morelandb82b8f82019-10-28 10:52:34 -0700319Status ServiceManager::isDeclared(const std::string& name, bool* outReturn) {
320 auto ctx = mAccess->getCallingContext();
321
322 if (!mAccess->canFind(ctx, name)) {
323 return Status::fromExceptionCode(Status::EX_SECURITY);
324 }
325
326 *outReturn = false;
327
328#ifndef VENDORSERVICEMANAGER
329 *outReturn = isVintfDeclared(name);
330#endif
331 return Status::ok();
332}
333
Jon Spivackf288b1d2019-12-19 17:15:51 -0800334void ServiceManager::removeRegistrationCallback(const wp<IBinder>& who,
335 ServiceCallbackMap::iterator* it,
Steven Moreland27cfab02019-08-12 14:34:16 -0700336 bool* found) {
337 std::vector<sp<IServiceCallback>>& listeners = (*it)->second;
338
339 for (auto lit = listeners.begin(); lit != listeners.end();) {
340 if (IInterface::asBinder(*lit) == who) {
341 if(found) *found = true;
342 lit = listeners.erase(lit);
343 } else {
344 ++lit;
345 }
346 }
347
348 if (listeners.empty()) {
Jon Spivackf288b1d2019-12-19 17:15:51 -0800349 *it = mNameToRegistrationCallback.erase(*it);
Steven Moreland27cfab02019-08-12 14:34:16 -0700350 } else {
Jon Spivacke223f082019-11-19 16:21:20 -0800351 (*it)++;
Steven Moreland27cfab02019-08-12 14:34:16 -0700352 }
353}
354
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700355void ServiceManager::binderDied(const wp<IBinder>& who) {
356 for (auto it = mNameToService.begin(); it != mNameToService.end();) {
357 if (who == it->second.binder) {
358 it = mNameToService.erase(it);
359 } else {
360 ++it;
361 }
362 }
Steven Moreland27cfab02019-08-12 14:34:16 -0700363
Jon Spivackf288b1d2019-12-19 17:15:51 -0800364 for (auto it = mNameToRegistrationCallback.begin(); it != mNameToRegistrationCallback.end();) {
365 removeRegistrationCallback(who, &it, nullptr /*found*/);
Steven Moreland27cfab02019-08-12 14:34:16 -0700366 }
Jon Spivack9f503a42019-10-22 16:49:19 -0700367
368 for (auto it = mNameToClientCallback.begin(); it != mNameToClientCallback.end();) {
369 removeClientCallback(who, &it);
370 }
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700371}
372
Jon Spivack0d844302019-07-22 18:40:34 -0700373void ServiceManager::tryStartService(const std::string& name) {
374 ALOGI("Since '%s' could not be found, trying to start it as a lazy AIDL service",
375 name.c_str());
376
377 std::thread([=] {
378 (void)base::SetProperty("ctl.interface_start", "aidl/" + name);
379 }).detach();
380}
381
Jon Spivack9f503a42019-10-22 16:49:19 -0700382Status ServiceManager::registerClientCallback(const std::string& name, const sp<IBinder>& service,
383 const sp<IClientCallback>& cb) {
384 if (cb == nullptr) {
385 return Status::fromExceptionCode(Status::EX_NULL_POINTER);
386 }
387
388 auto ctx = mAccess->getCallingContext();
389 if (!mAccess->canAdd(ctx, name)) {
390 return Status::fromExceptionCode(Status::EX_SECURITY);
391 }
392
393 auto serviceIt = mNameToService.find(name);
394 if (serviceIt == mNameToService.end()) {
395 LOG(ERROR) << "Could not add callback for nonexistent service: " << name;
396 return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
397 }
398
399 if (serviceIt->second.debugPid != IPCThreadState::self()->getCallingPid()) {
400 LOG(WARNING) << "Only a server can register for client callbacks (for " << name << ")";
401 return Status::fromExceptionCode(Status::EX_UNSUPPORTED_OPERATION);
402 }
403
404 if (serviceIt->second.binder != service) {
405 LOG(WARNING) << "Tried to register client callback for " << name
406 << " but a different service is registered under this name.";
407 return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
408 }
409
410 if (OK != IInterface::asBinder(cb)->linkToDeath(this)) {
411 LOG(ERROR) << "Could not linkToDeath when adding client callback for " << name;
412 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
413 }
414
415 mNameToClientCallback[name].push_back(cb);
416
417 return Status::ok();
418}
419
420void ServiceManager::removeClientCallback(const wp<IBinder>& who,
421 ClientCallbackMap::iterator* it) {
422 std::vector<sp<IClientCallback>>& listeners = (*it)->second;
423
424 for (auto lit = listeners.begin(); lit != listeners.end();) {
425 if (IInterface::asBinder(*lit) == who) {
426 lit = listeners.erase(lit);
427 } else {
428 ++lit;
429 }
430 }
431
432 if (listeners.empty()) {
433 *it = mNameToClientCallback.erase(*it);
434 } else {
435 (*it)++;
436 }
437}
438
439ssize_t ServiceManager::Service::getNodeStrongRefCount() {
440 sp<BpBinder> bpBinder = binder->remoteBinder();
441 if (bpBinder == nullptr) return -1;
442
443 return ProcessState::self()->getStrongRefCountForNodeByHandle(bpBinder->handle());
444}
445
446void ServiceManager::handleClientCallbacks() {
447 for (const auto& [name, service] : mNameToService) {
Jon Spivackd9533c22020-01-27 22:19:22 +0000448 handleServiceClientCallback(name, true);
Jon Spivack9f503a42019-10-22 16:49:19 -0700449 }
450}
451
Jon Spivackd9533c22020-01-27 22:19:22 +0000452ssize_t ServiceManager::handleServiceClientCallback(const std::string& serviceName,
453 bool isCalledOnInterval) {
Jon Spivack9f503a42019-10-22 16:49:19 -0700454 auto serviceIt = mNameToService.find(serviceName);
455 if (serviceIt == mNameToService.end() || mNameToClientCallback.count(serviceName) < 1) {
456 return -1;
457 }
458
459 Service& service = serviceIt->second;
460 ssize_t count = service.getNodeStrongRefCount();
461
462 // binder driver doesn't support this feature
463 if (count == -1) return count;
464
465 bool hasClients = count > 1; // this process holds a strong count
466
467 if (service.guaranteeClient) {
468 // we have no record of this client
469 if (!service.hasClients && !hasClients) {
470 sendClientCallbackNotifications(serviceName, true);
471 }
472
473 // guarantee is temporary
474 service.guaranteeClient = false;
475 }
476
Jon Spivackd9533c22020-01-27 22:19:22 +0000477 // only send notifications if this was called via the interval checking workflow
478 if (isCalledOnInterval) {
479 if (hasClients && !service.hasClients) {
480 // client was retrieved in some other way
481 sendClientCallbackNotifications(serviceName, true);
482 }
Jon Spivack9f503a42019-10-22 16:49:19 -0700483
Jon Spivackd9533c22020-01-27 22:19:22 +0000484 // there are no more clients, but the callback has not been called yet
485 if (!hasClients && service.hasClients) {
486 sendClientCallbackNotifications(serviceName, false);
487 }
Jon Spivack9f503a42019-10-22 16:49:19 -0700488 }
489
490 return count;
491}
492
493void ServiceManager::sendClientCallbackNotifications(const std::string& serviceName, bool hasClients) {
494 auto serviceIt = mNameToService.find(serviceName);
495 if (serviceIt == mNameToService.end()) {
496 LOG(WARNING) << "sendClientCallbackNotifications could not find service " << serviceName;
497 return;
498 }
499 Service& service = serviceIt->second;
500
501 CHECK(hasClients != service.hasClients) << "Record shows: " << service.hasClients
502 << " so we can't tell clients again that we have client: " << hasClients;
503
504 LOG(INFO) << "Notifying " << serviceName << " they have clients: " << hasClients;
505
506 auto ccIt = mNameToClientCallback.find(serviceName);
507 CHECK(ccIt != mNameToClientCallback.end())
508 << "sendClientCallbackNotifications could not find callbacks for service ";
509
510 for (const auto& callback : ccIt->second) {
511 callback->onClients(service.binder, hasClients);
512 }
513
514 service.hasClients = hasClients;
515}
516
517Status ServiceManager::tryUnregisterService(const std::string& name, const sp<IBinder>& binder) {
518 if (binder == nullptr) {
519 return Status::fromExceptionCode(Status::EX_NULL_POINTER);
520 }
521
522 auto ctx = mAccess->getCallingContext();
523 if (!mAccess->canAdd(ctx, name)) {
524 return Status::fromExceptionCode(Status::EX_SECURITY);
525 }
526
527 auto serviceIt = mNameToService.find(name);
528 if (serviceIt == mNameToService.end()) {
529 LOG(WARNING) << "Tried to unregister " << name
530 << ", but that service wasn't registered to begin with.";
531 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
532 }
533
534 if (serviceIt->second.debugPid != IPCThreadState::self()->getCallingPid()) {
535 LOG(WARNING) << "Only a server can unregister itself (for " << name << ")";
536 return Status::fromExceptionCode(Status::EX_UNSUPPORTED_OPERATION);
537 }
538
539 sp<IBinder> storedBinder = serviceIt->second.binder;
540
541 if (binder != storedBinder) {
542 LOG(WARNING) << "Tried to unregister " << name
543 << ", but a different service is registered under this name.";
544 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
545 }
546
Jon Spivack0f18f2c2020-03-13 20:45:18 -0700547 if (serviceIt->second.guaranteeClient) {
548 LOG(INFO) << "Tried to unregister " << name << ", but there is about to be a client.";
549 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
550 }
551
Jon Spivackd9533c22020-01-27 22:19:22 +0000552 int clients = handleServiceClientCallback(name, false);
Jon Spivack9f503a42019-10-22 16:49:19 -0700553
554 // clients < 0: feature not implemented or other error. Assume clients.
555 // Otherwise:
556 // - kernel driver will hold onto one refcount (during this transaction)
557 // - servicemanager has a refcount (guaranteed by this transaction)
558 // So, if clients > 2, then at least one other service on the system must hold a refcount.
559 if (clients < 0 || clients > 2) {
560 // client callbacks are either disabled or there are other clients
Jon Spivackd9533c22020-01-27 22:19:22 +0000561 LOG(INFO) << "Tried to unregister " << name << ", but there are clients: " << clients;
Jon Spivack620d2dc2020-03-06 13:58:01 -0800562 // Set this flag to ensure the clients are acknowledged in the next callback
563 serviceIt->second.guaranteeClient = true;
Jon Spivack9f503a42019-10-22 16:49:19 -0700564 return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
565 }
566
567 mNameToService.erase(name);
568
569 return Status::ok();
570}
571
Steven Moreland8d0c9a72020-04-30 16:51:56 -0700572} // namespace android