blob: 61d0dbad315076c91222475c9d86d1ae7b33b2d9 [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Jason Parksdcd39582009-11-03 12:14:38 -080017#define LOG_TAG "IPCThreadState"
18
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070019#include <binder/IPCThreadState.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080020
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070021#include <binder/Binder.h>
22#include <binder/BpBinder.h>
Mathias Agopian002e1e52013-05-06 20:20:50 -070023#include <binder/TextOutput.h>
24
Glenn Kastena26e1cf2012-03-16 07:15:23 -070025#include <cutils/sched_policy.h>
Steven Moreland7732a092019-01-02 17:54:16 -080026#include <utils/CallStack.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080027#include <utils/Log.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080028
Hans Boehma997b232019-04-12 16:59:00 -070029#include <atomic>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080030#include <errno.h>
Colin Cross96e83222016-04-15 14:29:55 -070031#include <inttypes.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080032#include <pthread.h>
33#include <sched.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080034#include <signal.h>
35#include <stdio.h>
36#include <sys/ioctl.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080037#include <sys/resource.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080038#include <unistd.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080039
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -070040#include "Utils.h"
Steven Moreland6ba5a252021-05-04 22:49:00 +000041#include "binder_module.h"
Steven Morelanda4853cd2019-07-12 15:44:37 -070042
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080043#if LOG_NDEBUG
44
45#define IF_LOG_TRANSACTIONS() if (false)
46#define IF_LOG_COMMANDS() if (false)
mattgilbride85897672022-10-22 17:42:44 +000047#define LOG_REMOTEREFS(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080048#define IF_LOG_REMOTEREFS() if (false)
Tim Murrayd429f4a2017-03-07 09:31:09 -080049
mattgilbride85897672022-10-22 17:42:44 +000050#define LOG_THREADPOOL(...)
51#define LOG_ONEWAY(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080052
53#else
54
Steve Block9f760152011-10-12 17:27:03 +010055#define IF_LOG_TRANSACTIONS() IF_ALOG(LOG_VERBOSE, "transact")
56#define IF_LOG_COMMANDS() IF_ALOG(LOG_VERBOSE, "ipc")
57#define LOG_REMOTEREFS(...) ALOG(LOG_DEBUG, "remoterefs", __VA_ARGS__)
58#define IF_LOG_REMOTEREFS() IF_ALOG(LOG_DEBUG, "remoterefs")
59#define LOG_THREADPOOL(...) ALOG(LOG_DEBUG, "threadpool", __VA_ARGS__)
60#define LOG_ONEWAY(...) ALOG(LOG_DEBUG, "ipc", __VA_ARGS__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080061
62#endif
63
64// ---------------------------------------------------------------------------
65
66namespace android {
67
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -070068using namespace std::chrono_literals;
69
Chih-Hung Hsieh8e5337d2014-10-24 14:10:09 -070070// Static const and functions will be optimized out if not used,
71// when LOG_NDEBUG and references in IF_LOG_COMMANDS() are optimized out.
Devin Moorea7499132023-12-15 18:48:39 +000072static const char* kReturnStrings[] = {
73 "BR_ERROR",
74 "BR_OK",
Devin Moore58029202023-12-15 18:58:48 +000075 "BR_TRANSACTION/BR_TRANSACTION_SEC_CTX",
Devin Moorea7499132023-12-15 18:48:39 +000076 "BR_REPLY",
77 "BR_ACQUIRE_RESULT",
78 "BR_DEAD_REPLY",
79 "BR_TRANSACTION_COMPLETE",
80 "BR_INCREFS",
81 "BR_ACQUIRE",
82 "BR_RELEASE",
83 "BR_DECREFS",
84 "BR_ATTEMPT_ACQUIRE",
85 "BR_NOOP",
86 "BR_SPAWN_LOOPER",
87 "BR_FINISHED",
88 "BR_DEAD_BINDER",
89 "BR_CLEAR_DEATH_NOTIFICATION_DONE",
90 "BR_FAILED_REPLY",
91 "BR_FROZEN_REPLY",
92 "BR_ONEWAY_SPAM_SUSPECT",
93 "BR_TRANSACTION_PENDING_FROZEN",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080094};
95
96static const char *kCommandStrings[] = {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080097 "BC_TRANSACTION",
98 "BC_REPLY",
99 "BC_ACQUIRE_RESULT",
100 "BC_FREE_BUFFER",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800101 "BC_INCREFS",
102 "BC_ACQUIRE",
103 "BC_RELEASE",
104 "BC_DECREFS",
105 "BC_INCREFS_DONE",
106 "BC_ACQUIRE_DONE",
107 "BC_ATTEMPT_ACQUIRE",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800108 "BC_REGISTER_LOOPER",
109 "BC_ENTER_LOOPER",
110 "BC_EXIT_LOOPER",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800111 "BC_REQUEST_DEATH_NOTIFICATION",
112 "BC_CLEAR_DEATH_NOTIFICATION",
113 "BC_DEAD_BINDER_DONE"
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800114};
115
Olivier Gaillard91a04802018-11-14 17:32:41 +0000116static const int64_t kWorkSourcePropagatedBitIndex = 32;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100117
songjinshi73a7dde2016-10-18 21:05:56 +0800118static const char* getReturnString(uint32_t cmd)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800119{
songjinshi8e486c62019-04-04 11:22:52 +0800120 size_t idx = cmd & _IOC_NRMASK;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800121 if (idx < sizeof(kReturnStrings) / sizeof(kReturnStrings[0]))
122 return kReturnStrings[idx];
123 else
124 return "unknown";
125}
126
Pawan Wagh7063b522022-09-28 18:52:26 +0000127static const void* printBinderTransactionData(std::ostream& out, const void* data) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800128 const binder_transaction_data* btd =
129 (const binder_transaction_data*)data;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700130 if (btd->target.handle < 1024) {
131 /* want to print descriptors in decimal; guess based on value */
Pawan Wagh7063b522022-09-28 18:52:26 +0000132 out << "\ttarget.desc=" << btd->target.handle;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700133 } else {
Pawan Wagh7063b522022-09-28 18:52:26 +0000134 out << "\ttarget.ptr=" << btd->target.ptr;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700135 }
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000136 out << "\t (cookie " << btd->cookie << ")\n"
Pawan Wagh7063b522022-09-28 18:52:26 +0000137 << "\tcode=" << TypeCode(btd->code) << ", flags=" << (void*)(uint64_t)btd->flags << "\n"
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000138 << "\tdata=" << btd->data.ptr.buffer << " (" << (void*)btd->data_size << " bytes)\n"
139 << "\toffsets=" << btd->data.ptr.offsets << " (" << (void*)btd->offsets_size << " bytes)\n";
140 return btd + 1;
141}
142
143static const void* printBinderTransactionDataSecCtx(std::ostream& out, const void* data) {
144 const binder_transaction_data_secctx* btd = (const binder_transaction_data_secctx*)data;
145
146 printBinderTransactionData(out, &btd->transaction_data);
147
148 char* secctx = (char*)btd->secctx;
149 out << "\tsecctx=" << secctx << "\n";
150
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800151 return btd+1;
152}
153
Pawan Wagh7063b522022-09-28 18:52:26 +0000154static const void* printReturnCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700155 static const size_t N = sizeof(kReturnStrings)/sizeof(kReturnStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800156 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100157 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700158 size_t cmdIndex = code & 0xff;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100159 if (code == BR_ERROR) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000160 out << "\tBR_ERROR: " << (void*)(uint64_t)(*cmd++) << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800161 return cmd;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700162 } else if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000163 out << "\tUnknown reply: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800164 return cmd;
165 }
Pawan Wagh7063b522022-09-28 18:52:26 +0000166 out << "\t" << kReturnStrings[cmdIndex];
Tim Murrayd429f4a2017-03-07 09:31:09 -0800167
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800168 switch (code) {
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000169 case BR_TRANSACTION_SEC_CTX: {
170 out << ": ";
171 cmd = (const int32_t*)printBinderTransactionDataSecCtx(out, cmd);
172 } break;
173
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800174 case BR_TRANSACTION:
175 case BR_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000176 out << ": ";
177 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800178 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800179
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800180 case BR_ACQUIRE_RESULT: {
181 const int32_t res = *cmd++;
182 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
183 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800184
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800185 case BR_INCREFS:
186 case BR_ACQUIRE:
187 case BR_RELEASE:
188 case BR_DECREFS: {
189 const int32_t b = *cmd++;
190 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900191 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800192 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800193
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800194 case BR_ATTEMPT_ACQUIRE: {
195 const int32_t p = *cmd++;
196 const int32_t b = *cmd++;
197 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900198 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800199 << "), pri=" << p;
200 } break;
201
202 case BR_DEAD_BINDER:
203 case BR_CLEAR_DEATH_NOTIFICATION_DONE: {
204 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900205 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800206 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700207
208 default:
209 // no details to show for: BR_OK, BR_DEAD_REPLY,
210 // BR_TRANSACTION_COMPLETE, BR_FINISHED
211 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800212 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800213
Pawan Wagh7063b522022-09-28 18:52:26 +0000214 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800215 return cmd;
216}
217
Pawan Wagh7063b522022-09-28 18:52:26 +0000218static const void* printCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700219 static const size_t N = sizeof(kCommandStrings)/sizeof(kCommandStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800220 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100221 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700222 size_t cmdIndex = code & 0xff;
223
224 if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000225 out << "Unknown command: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800226 return cmd;
227 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700228 out << kCommandStrings[cmdIndex];
229
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800230 switch (code) {
231 case BC_TRANSACTION:
232 case BC_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000233 out << ": ";
234 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800235 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800236
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800237 case BC_ACQUIRE_RESULT: {
238 const int32_t res = *cmd++;
239 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
240 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800241
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800242 case BC_FREE_BUFFER: {
243 const int32_t buf = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900244 out << ": buffer=" << (void*)(uint64_t)buf;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800245 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800246
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800247 case BC_INCREFS:
248 case BC_ACQUIRE:
249 case BC_RELEASE:
250 case BC_DECREFS: {
251 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700252 out << ": desc=" << d;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800253 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800254
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800255 case BC_INCREFS_DONE:
256 case BC_ACQUIRE_DONE: {
257 const int32_t b = *cmd++;
258 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900259 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800260 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800261
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800262 case BC_ATTEMPT_ACQUIRE: {
263 const int32_t p = *cmd++;
264 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700265 out << ": desc=" << d << ", pri=" << p;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800266 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800267
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800268 case BC_REQUEST_DEATH_NOTIFICATION:
269 case BC_CLEAR_DEATH_NOTIFICATION: {
270 const int32_t h = *cmd++;
271 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900272 out << ": handle=" << h << " (death cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800273 } break;
274
275 case BC_DEAD_BINDER_DONE: {
276 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900277 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800278 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700279
280 default:
281 // no details to show for: BC_REGISTER_LOOPER, BC_ENTER_LOOPER,
282 // BC_EXIT_LOOPER
283 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800284 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800285
Pawan Wagh7063b522022-09-28 18:52:26 +0000286 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800287 return cmd;
288}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800289
290static pthread_mutex_t gTLSMutex = PTHREAD_MUTEX_INITIALIZER;
Hans Boehma997b232019-04-12 16:59:00 -0700291static std::atomic<bool> gHaveTLS(false);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800292static pthread_key_t gTLS = 0;
Hans Boehma997b232019-04-12 16:59:00 -0700293static std::atomic<bool> gShutdown = false;
294static std::atomic<bool> gDisableBackgroundScheduling = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800295
296IPCThreadState* IPCThreadState::self()
297{
Hans Boehma997b232019-04-12 16:59:00 -0700298 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800299restart:
300 const pthread_key_t k = gTLS;
301 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
302 if (st) return st;
303 return new IPCThreadState;
304 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800305
Hans Boehma997b232019-04-12 16:59:00 -0700306 // Racey, heuristic test for simultaneous shutdown.
307 if (gShutdown.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800308 ALOGW("Calling IPCThreadState::self() during shutdown is dangerous, expect a crash.\n");
Yi Kongfdd8da92018-06-07 17:52:27 -0700309 return nullptr;
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800310 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800311
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800312 pthread_mutex_lock(&gTLSMutex);
Hans Boehma997b232019-04-12 16:59:00 -0700313 if (!gHaveTLS.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800314 int key_create_value = pthread_key_create(&gTLS, threadDestructor);
315 if (key_create_value != 0) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800316 pthread_mutex_unlock(&gTLSMutex);
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800317 ALOGW("IPCThreadState::self() unable to create TLS key, expect a crash: %s\n",
318 strerror(key_create_value));
Yi Kongfdd8da92018-06-07 17:52:27 -0700319 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800320 }
Hans Boehma997b232019-04-12 16:59:00 -0700321 gHaveTLS.store(true, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800322 }
323 pthread_mutex_unlock(&gTLSMutex);
324 goto restart;
325}
326
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800327IPCThreadState* IPCThreadState::selfOrNull()
328{
Hans Boehma997b232019-04-12 16:59:00 -0700329 if (gHaveTLS.load(std::memory_order_acquire)) {
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800330 const pthread_key_t k = gTLS;
331 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
332 return st;
333 }
Yi Kongfdd8da92018-06-07 17:52:27 -0700334 return nullptr;
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800335}
336
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800337void IPCThreadState::shutdown()
338{
Hans Boehma997b232019-04-12 16:59:00 -0700339 gShutdown.store(true, std::memory_order_relaxed);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800340
Hans Boehma997b232019-04-12 16:59:00 -0700341 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800342 // XXX Need to wait for all thread pool threads to exit!
343 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(gTLS);
344 if (st) {
345 delete st;
Yi Kongfdd8da92018-06-07 17:52:27 -0700346 pthread_setspecific(gTLS, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800347 }
zhongjieff405782016-03-09 15:05:04 +0800348 pthread_key_delete(gTLS);
Hans Boehma997b232019-04-12 16:59:00 -0700349 gHaveTLS.store(false, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800350 }
351}
352
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800353void IPCThreadState::disableBackgroundScheduling(bool disable)
354{
Hans Boehma997b232019-04-12 16:59:00 -0700355 gDisableBackgroundScheduling.store(disable, std::memory_order_relaxed);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800356}
357
Martijn Coenen2b631742017-05-05 11:16:59 -0700358bool IPCThreadState::backgroundSchedulingDisabled()
359{
Hans Boehma997b232019-04-12 16:59:00 -0700360 return gDisableBackgroundScheduling.load(std::memory_order_relaxed);
Martijn Coenen2b631742017-05-05 11:16:59 -0700361}
362
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800363status_t IPCThreadState::clearLastError()
364{
365 const status_t err = mLastError;
366 mLastError = NO_ERROR;
367 return err;
368}
369
Dan Stoza9c634fd2014-11-26 12:23:23 -0800370pid_t IPCThreadState::getCallingPid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800371{
Steven Moreland35626652021-05-15 01:32:04 +0000372 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800373 return mCallingPid;
374}
375
Steven Morelandf0212002018-12-26 13:59:23 -0800376const char* IPCThreadState::getCallingSid() const
377{
Steven Moreland35626652021-05-15 01:32:04 +0000378 checkContextIsBinderForUse(__func__);
Steven Morelandf0212002018-12-26 13:59:23 -0800379 return mCallingSid;
380}
381
Dan Stoza9c634fd2014-11-26 12:23:23 -0800382uid_t IPCThreadState::getCallingUid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800383{
Steven Moreland35626652021-05-15 01:32:04 +0000384 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800385 return mCallingUid;
386}
387
Steven Moreland35626652021-05-15 01:32:04 +0000388const IPCThreadState::SpGuard* IPCThreadState::pushGetCallingSpGuard(const SpGuard* guard) {
389 const SpGuard* orig = mServingStackPointerGuard;
390 mServingStackPointerGuard = guard;
391 return orig;
392}
393
394void IPCThreadState::restoreGetCallingSpGuard(const SpGuard* guard) {
395 mServingStackPointerGuard = guard;
396}
397
398void IPCThreadState::checkContextIsBinderForUse(const char* use) const {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700399 if (mServingStackPointerGuard == nullptr) [[likely]] {
400 return;
401 }
Steven Moreland35626652021-05-15 01:32:04 +0000402
403 if (!mServingStackPointer || mServingStackPointerGuard->address < mServingStackPointer) {
404 LOG_ALWAYS_FATAL("In context %s, %s does not make sense (binder sp: %p, guard: %p).",
405 mServingStackPointerGuard->context, use, mServingStackPointer,
406 mServingStackPointerGuard->address);
407 }
408
409 // in the case mServingStackPointer is deeper in the stack than the guard,
410 // we must be serving a binder transaction (maybe nested). This is a binder
411 // context, so we don't abort
412}
413
mattgilbride85897672022-10-22 17:42:44 +0000414constexpr uint32_t encodeExplicitIdentity(bool hasExplicitIdentity, pid_t callingPid) {
415 uint32_t as_unsigned = static_cast<uint32_t>(callingPid);
416 if (hasExplicitIdentity) {
417 return as_unsigned | (1 << 30);
418 } else {
419 return as_unsigned & ~(1 << 30);
420 }
421}
422
423constexpr int64_t packCallingIdentity(bool hasExplicitIdentity, uid_t callingUid,
424 pid_t callingPid) {
425 // Calling PID is a 32-bit signed integer, but doesn't consume the entire 32 bit space.
426 // To future-proof this and because we have extra capacity, we decided to also support -1,
427 // since this constant is used to represent invalid UID in other places of the system.
428 // Thus, we pack hasExplicitIdentity into the 2nd bit from the left. This allows us to
429 // preserve the (left-most) bit for the sign while also encoding the value of
430 // hasExplicitIdentity.
431 // 32b | 1b | 1b | 30b
432 // token = [ calling uid | calling pid(sign) | has explicit identity | calling pid(rest) ]
433 uint64_t token = (static_cast<uint64_t>(callingUid) << 32) |
434 encodeExplicitIdentity(hasExplicitIdentity, callingPid);
435 return static_cast<int64_t>(token);
436}
437
438constexpr bool unpackHasExplicitIdentity(int64_t token) {
439 return static_cast<int32_t>(token) & (1 << 30);
440}
441
442constexpr uid_t unpackCallingUid(int64_t token) {
443 return static_cast<uid_t>(token >> 32);
444}
445
446constexpr pid_t unpackCallingPid(int64_t token) {
447 int32_t encodedPid = static_cast<int32_t>(token);
448 if (encodedPid & (1 << 31)) {
449 return encodedPid | (1 << 30);
450 } else {
451 return encodedPid & ~(1 << 30);
452 }
453}
454
455static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, 9999)) == true,
456 "pack true hasExplicit");
457
458static_assert(unpackCallingUid(packCallingIdentity(true, 1000, 9999)) == 1000, "pack true uid");
459
460static_assert(unpackCallingPid(packCallingIdentity(true, 1000, 9999)) == 9999, "pack true pid");
461
462static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, 9999)) == false,
463 "pack false hasExplicit");
464
465static_assert(unpackCallingUid(packCallingIdentity(false, 1000, 9999)) == 1000, "pack false uid");
466
467static_assert(unpackCallingPid(packCallingIdentity(false, 1000, 9999)) == 9999, "pack false pid");
468
469static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, -1)) == true,
470 "pack true (negative) hasExplicit");
471
472static_assert(unpackCallingUid(packCallingIdentity(true, 1000, -1)) == 1000,
473 "pack true (negative) uid");
474
475static_assert(unpackCallingPid(packCallingIdentity(true, 1000, -1)) == -1,
476 "pack true (negative) pid");
477
478static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, -1)) == false,
479 "pack false (negative) hasExplicit");
480
481static_assert(unpackCallingUid(packCallingIdentity(false, 1000, -1)) == 1000,
482 "pack false (negative) uid");
483
484static_assert(unpackCallingPid(packCallingIdentity(false, 1000, -1)) == -1,
485 "pack false (negative) pid");
486
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800487int64_t IPCThreadState::clearCallingIdentity()
488{
Steven Morelandf0212002018-12-26 13:59:23 -0800489 // ignore mCallingSid for legacy reasons
mattgilbride85897672022-10-22 17:42:44 +0000490 int64_t token = packCallingIdentity(mHasExplicitIdentity, mCallingUid, mCallingPid);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800491 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +0000492 mHasExplicitIdentity = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800493 return token;
494}
495
mattgilbride85897672022-10-22 17:42:44 +0000496bool IPCThreadState::hasExplicitIdentity() {
497 return mHasExplicitIdentity;
498}
499
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700500void IPCThreadState::setStrictModePolicy(int32_t policy)
501{
502 mStrictModePolicy = policy;
503}
504
Brad Fitzpatricka877cd82010-07-07 16:06:39 -0700505int32_t IPCThreadState::getStrictModePolicy() const
506{
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700507 return mStrictModePolicy;
508}
509
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000510int64_t IPCThreadState::setCallingWorkSourceUid(uid_t uid)
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100511{
Olivier Gaillard91a04802018-11-14 17:32:41 +0000512 int64_t token = setCallingWorkSourceUidWithoutPropagation(uid);
513 mPropagateWorkSource = true;
514 return token;
515}
516
517int64_t IPCThreadState::setCallingWorkSourceUidWithoutPropagation(uid_t uid)
518{
519 const int64_t propagatedBit = ((int64_t)mPropagateWorkSource) << kWorkSourcePropagatedBitIndex;
520 int64_t token = propagatedBit | mWorkSource;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100521 mWorkSource = uid;
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000522 return token;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100523}
524
Olivier Gaillard91a04802018-11-14 17:32:41 +0000525void IPCThreadState::clearPropagateWorkSource()
526{
527 mPropagateWorkSource = false;
528}
529
530bool IPCThreadState::shouldPropagateWorkSource() const
531{
532 return mPropagateWorkSource;
533}
534
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000535uid_t IPCThreadState::getCallingWorkSourceUid() const
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100536{
537 return mWorkSource;
538}
539
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000540int64_t IPCThreadState::clearCallingWorkSource()
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100541{
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000542 return setCallingWorkSourceUid(kUnsetWorkSource);
543}
544
545void IPCThreadState::restoreCallingWorkSource(int64_t token)
546{
547 uid_t uid = (int)token;
Olivier Gaillard91a04802018-11-14 17:32:41 +0000548 setCallingWorkSourceUidWithoutPropagation(uid);
549 mPropagateWorkSource = ((token >> kWorkSourcePropagatedBitIndex) & 1) == 1;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100550}
551
Brad Fitzpatrick52736032010-08-30 16:01:16 -0700552void IPCThreadState::setLastTransactionBinderFlags(int32_t flags)
553{
554 mLastTransactionBinderFlags = flags;
555}
556
557int32_t IPCThreadState::getLastTransactionBinderFlags() const
558{
559 return mLastTransactionBinderFlags;
560}
561
Steven Moreland9514b202020-09-21 18:03:27 +0000562void IPCThreadState::setCallRestriction(ProcessState::CallRestriction restriction) {
563 mCallRestriction = restriction;
564}
565
566ProcessState::CallRestriction IPCThreadState::getCallRestriction() const {
567 return mCallRestriction;
568}
569
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800570void IPCThreadState::restoreCallingIdentity(int64_t token)
571{
mattgilbride85897672022-10-22 17:42:44 +0000572 mCallingUid = unpackCallingUid(token);
Steven Morelandf0212002018-12-26 13:59:23 -0800573 mCallingSid = nullptr; // not enough data to restore
mattgilbride85897672022-10-22 17:42:44 +0000574 mCallingPid = unpackCallingPid(token);
575 mHasExplicitIdentity = unpackHasExplicitIdentity(token);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800576}
577
578void IPCThreadState::clearCaller()
579{
Marco Nelissend43b1942009-07-17 07:59:17 -0700580 mCallingPid = getpid();
Steven Morelandf0212002018-12-26 13:59:23 -0800581 mCallingSid = nullptr; // expensive to lookup
Marco Nelissend43b1942009-07-17 07:59:17 -0700582 mCallingUid = getuid();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800583}
584
585void IPCThreadState::flushCommands()
586{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200587 if (mProcess->mDriverFD < 0)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800588 return;
589 talkWithDriver(false);
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700590 // The flush could have caused post-write refcount decrements to have
591 // been executed, which in turn could result in BC_RELEASE/BC_DECREFS
592 // being queued in mOut. So flush again, if we need to.
593 if (mOut.dataSize() > 0) {
594 talkWithDriver(false);
595 }
596 if (mOut.dataSize() > 0) {
597 ALOGW("mOut.dataSize() > 0 after flushCommands()");
598 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800599}
600
Martijn Coenen0442a862017-11-17 10:46:32 +0100601bool IPCThreadState::flushIfNeeded()
602{
Frankie Changf4c81372021-05-18 13:08:05 +0800603 if (mIsLooper || mServingStackPointer != nullptr || mIsFlushing) {
Martijn Coenen0442a862017-11-17 10:46:32 +0100604 return false;
605 }
Frankie Changf4c81372021-05-18 13:08:05 +0800606 mIsFlushing = true;
Martijn Coenen0442a862017-11-17 10:46:32 +0100607 // In case this thread is not a looper and is not currently serving a binder transaction,
608 // there's no guarantee that this thread will call back into the kernel driver any time
609 // soon. Therefore, flush pending commands such as BC_FREE_BUFFER, to prevent them from getting
610 // stuck in this thread's out buffer.
611 flushCommands();
Frankie Changf4c81372021-05-18 13:08:05 +0800612 mIsFlushing = false;
Martijn Coenen0442a862017-11-17 10:46:32 +0100613 return true;
614}
615
Wale Ogunwale376b8222015-04-13 16:16:10 -0700616void IPCThreadState::blockUntilThreadAvailable()
617{
Frederick Mayle263507f2024-05-30 14:54:27 -0700618 std::unique_lock lock_guard_(mProcess->mOnThreadAvailableLock);
619 mProcess->mOnThreadAvailableWaiting++;
620 mProcess->mOnThreadAvailableCondVar.wait(lock_guard_, [&] {
621 size_t max = mProcess->mMaxThreads;
622 size_t cur = mProcess->mExecutingThreadsCount;
623 if (cur < max) {
624 return true;
625 }
Frederick Mayle99490ac2024-06-18 12:21:18 -0700626 ALOGW("Waiting for thread to be free. mExecutingThreadsCount=%zu mMaxThreads=%zu\n", cur,
627 max);
Frederick Mayle263507f2024-05-30 14:54:27 -0700628 return false;
629 });
630 mProcess->mOnThreadAvailableWaiting--;
Wale Ogunwale376b8222015-04-13 16:16:10 -0700631}
632
Todd Poynor8d96cab2013-06-25 19:12:18 -0700633status_t IPCThreadState::getAndExecuteCommand()
634{
635 status_t result;
636 int32_t cmd;
637
638 result = talkWithDriver();
639 if (result >= NO_ERROR) {
640 size_t IN = mIn.dataAvail();
641 if (IN < sizeof(int32_t)) return result;
642 cmd = mIn.readInt32();
643 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000644 std::ostringstream logStream;
645 logStream << "Processing top-level Command: " << getReturnString(cmd) << "\n";
646 std::string message = logStream.str();
647 ALOGI("%s", message.c_str());
Todd Poynor8d96cab2013-06-25 19:12:18 -0700648 }
649
Frederick Mayle263507f2024-05-30 14:54:27 -0700650 size_t newThreadsCount = mProcess->mExecutingThreadsCount.fetch_add(1) + 1;
651 if (newThreadsCount >= mProcess->mMaxThreads) {
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700652 auto expected = ProcessState::never();
653 mProcess->mStarvationStartTime
654 .compare_exchange_strong(expected, std::chrono::steady_clock::now());
Colin Cross96e83222016-04-15 14:29:55 -0700655 }
Wale Ogunwale376b8222015-04-13 16:16:10 -0700656
Todd Poynor8d96cab2013-06-25 19:12:18 -0700657 result = executeCommand(cmd);
658
Frederick Mayle263507f2024-05-30 14:54:27 -0700659 size_t maxThreads = mProcess->mMaxThreads;
660 newThreadsCount = mProcess->mExecutingThreadsCount.fetch_sub(1) - 1;
661 if (newThreadsCount < maxThreads) {
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700662 auto starvationStartTime =
663 mProcess->mStarvationStartTime.exchange(ProcessState::never());
664 if (starvationStartTime != ProcessState::never()) {
665 auto starvationTime = std::chrono::steady_clock::now() - starvationStartTime;
666 if (starvationTime > 100ms) {
Frederick Mayle263507f2024-05-30 14:54:27 -0700667 ALOGE("binder thread pool (%zu threads) starved for %" PRId64 " ms", maxThreads,
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700668 to_ms(starvationTime));
Frederick Mayle263507f2024-05-30 14:54:27 -0700669 }
Colin Cross96e83222016-04-15 14:29:55 -0700670 }
Colin Cross96e83222016-04-15 14:29:55 -0700671 }
Steven Morelandc648a762021-01-16 02:39:45 +0000672
673 // Cond broadcast can be expensive, so don't send it every time a binder
674 // call is processed. b/168806193
Frederick Mayle263507f2024-05-30 14:54:27 -0700675 if (mProcess->mOnThreadAvailableWaiting > 0) {
676 std::lock_guard lock_guard_(mProcess->mOnThreadAvailableLock);
677 mProcess->mOnThreadAvailableCondVar.notify_all();
Steven Morelandc648a762021-01-16 02:39:45 +0000678 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700679 }
680
681 return result;
682}
683
684// When we've cleared the incoming command queue, process any pending derefs
685void IPCThreadState::processPendingDerefs()
686{
687 if (mIn.dataPosition() >= mIn.dataSize()) {
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200688 /*
689 * The decWeak()/decStrong() calls may cause a destructor to run,
690 * which in turn could have initiated an outgoing transaction,
691 * which in turn could cause us to add to the pending refs
692 * vectors; so instead of simply iterating, loop until they're empty.
693 *
694 * We do this in an outer loop, because calling decStrong()
695 * may result in something being added to mPendingWeakDerefs,
696 * which could be delayed until the next incoming command
697 * from the driver if we don't process it now.
698 */
699 while (mPendingWeakDerefs.size() > 0 || mPendingStrongDerefs.size() > 0) {
700 while (mPendingWeakDerefs.size() > 0) {
701 RefBase::weakref_type* refs = mPendingWeakDerefs[0];
702 mPendingWeakDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700703 refs->decWeak(mProcess.get());
704 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700705
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200706 if (mPendingStrongDerefs.size() > 0) {
707 // We don't use while() here because we don't want to re-order
708 // strong and weak decs at all; if this decStrong() causes both a
709 // decWeak() and a decStrong() to be queued, we want to process
710 // the decWeak() first.
711 BBinder* obj = mPendingStrongDerefs[0];
712 mPendingStrongDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700713 obj->decStrong(mProcess.get());
714 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700715 }
716 }
717}
718
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700719void IPCThreadState::processPostWriteDerefs()
720{
721 for (size_t i = 0; i < mPostWriteWeakDerefs.size(); i++) {
722 RefBase::weakref_type* refs = mPostWriteWeakDerefs[i];
723 refs->decWeak(mProcess.get());
724 }
725 mPostWriteWeakDerefs.clear();
726
727 for (size_t i = 0; i < mPostWriteStrongDerefs.size(); i++) {
728 RefBase* obj = mPostWriteStrongDerefs[i];
729 obj->decStrong(mProcess.get());
730 }
731 mPostWriteStrongDerefs.clear();
732}
733
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800734void IPCThreadState::joinThreadPool(bool isMain)
735{
Frederick Mayle263507f2024-05-30 14:54:27 -0700736 LOG_THREADPOOL("**** THREAD %p (PID %d) IS JOINING THE THREAD POOL\n", (void*)pthread_self(),
737 getpid());
Elie Kheirallah47431c12022-04-21 23:46:17 +0000738 mProcess->mCurrentThreads++;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800739 mOut.writeInt32(isMain ? BC_ENTER_LOOPER : BC_REGISTER_LOOPER);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800740
Martijn Coenen0442a862017-11-17 10:46:32 +0100741 mIsLooper = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800742 status_t result;
743 do {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700744 processPendingDerefs();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800745 // now get the next command to be processed, waiting if necessary
Todd Poynor8d96cab2013-06-25 19:12:18 -0700746 result = getAndExecuteCommand();
Jason Parksdcd39582009-11-03 12:14:38 -0800747
Todd Poynor8d96cab2013-06-25 19:12:18 -0700748 if (result < NO_ERROR && result != TIMED_OUT && result != -ECONNREFUSED && result != -EBADF) {
Steven Moreland6adf33c2019-09-25 13:18:09 -0700749 LOG_ALWAYS_FATAL("getAndExecuteCommand(fd=%d) returned unexpected error %d, aborting",
Jeff Tinkeref073862013-06-11 11:30:21 -0700750 mProcess->mDriverFD, result);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800751 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800752
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800753 // Let this thread exit the thread pool if it is no longer
754 // needed and it is not the main process thread.
755 if(result == TIMED_OUT && !isMain) {
756 break;
757 }
758 } while (result != -ECONNREFUSED && result != -EBADF);
759
Wei Wangc7341432016-10-19 10:23:59 -0700760 LOG_THREADPOOL("**** THREAD %p (PID %d) IS LEAVING THE THREAD POOL err=%d\n",
761 (void*)pthread_self(), getpid(), result);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800762
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800763 mOut.writeInt32(BC_EXIT_LOOPER);
Martijn Coenen0442a862017-11-17 10:46:32 +0100764 mIsLooper = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800765 talkWithDriver(false);
Frederick Mayle263507f2024-05-30 14:54:27 -0700766 size_t oldCount = mProcess->mCurrentThreads.fetch_sub(1);
767 LOG_ALWAYS_FATAL_IF(oldCount == 0,
768 "Threadpool thread count underflowed. Thread cannot exist and exit in "
769 "empty threadpool\n"
Elie Kheirallah47431c12022-04-21 23:46:17 +0000770 "Misconfiguration. Increase threadpool max threads configuration\n");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800771}
772
Steven Morelandd8c85672020-07-24 21:30:41 +0000773status_t IPCThreadState::setupPolling(int* fd)
Todd Poynor8d96cab2013-06-25 19:12:18 -0700774{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200775 if (mProcess->mDriverFD < 0) {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700776 return -EBADF;
777 }
778
779 mOut.writeInt32(BC_ENTER_LOOPER);
Steven Morelandf210b502021-01-15 23:40:32 +0000780 flushCommands();
Todd Poynor8d96cab2013-06-25 19:12:18 -0700781 *fd = mProcess->mDriverFD;
Elie Kheirallah47431c12022-04-21 23:46:17 +0000782 mProcess->mCurrentThreads++;
Todd Poynor8d96cab2013-06-25 19:12:18 -0700783 return 0;
784}
785
786status_t IPCThreadState::handlePolledCommands()
787{
788 status_t result;
789
790 do {
791 result = getAndExecuteCommand();
792 } while (mIn.dataPosition() < mIn.dataSize());
793
794 processPendingDerefs();
795 flushCommands();
796 return result;
797}
798
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800799void IPCThreadState::stopProcess(bool /*immediate*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800800{
Steve Blocka19954a2012-01-04 20:05:49 +0000801 //ALOGI("**** STOPPING PROCESS");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800802 flushCommands();
803 int fd = mProcess->mDriverFD;
804 mProcess->mDriverFD = -1;
805 close(fd);
806 //kill(getpid(), SIGKILL);
807}
808
809status_t IPCThreadState::transact(int32_t handle,
810 uint32_t code, const Parcel& data,
811 Parcel* reply, uint32_t flags)
812{
Steven Moreland5553ac42020-11-11 02:14:45 +0000813 LOG_ALWAYS_FATAL_IF(data.isForRpc(), "Parcel constructed for RPC, but being used with binder.");
814
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800815 status_t err;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800816
817 flags |= TF_ACCEPT_FDS;
818
819 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000820 std::ostringstream logStream;
821 logStream << "BC_TRANSACTION thr " << (void*)pthread_self() << " / hand " << handle
822 << " / code " << TypeCode(code) << ": \t" << data << "\n";
823 std::string message = logStream.str();
824 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800825 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800826
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800827 LOG_ONEWAY(">>>> SEND from pid %d uid %d %s", getpid(), getuid(),
828 (flags & TF_ONE_WAY) == 0 ? "READ REPLY" : "ONE WAY");
Yi Kongfdd8da92018-06-07 17:52:27 -0700829 err = writeTransactionData(BC_TRANSACTION, flags, handle, code, data, nullptr);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800830
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800831 if (err != NO_ERROR) {
832 if (reply) reply->setError(err);
833 return (mLastError = err);
834 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800835
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800836 if ((flags & TF_ONE_WAY) == 0) {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700837 if (mCallRestriction != ProcessState::CallRestriction::NONE) [[unlikely]] {
Steven Moreland7732a092019-01-02 17:54:16 -0800838 if (mCallRestriction == ProcessState::CallRestriction::ERROR_IF_NOT_ONEWAY) {
Steven Moreland8cb34fc2019-05-13 11:44:55 -0700839 ALOGE("Process making non-oneway call (code: %u) but is restricted.", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800840 CallStack::logStack("non-oneway call", CallStack::getCurrent(10).get(),
841 ANDROID_LOG_ERROR);
842 } else /* FATAL_IF_NOT_ONEWAY */ {
Steven Morelandfcc77f12020-09-01 01:16:11 +0000843 LOG_ALWAYS_FATAL("Process may not make non-oneway calls (code: %u).", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800844 }
845 }
846
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700847#if 0
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700848 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000849 ALOGI(">>>>>> CALLING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700850 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000851 ALOGI(">>>>>> CALLING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700852 }
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700853#endif
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800854 if (reply) {
855 err = waitForResponse(reply);
856 } else {
857 Parcel fakeReply;
858 err = waitForResponse(&fakeReply);
859 }
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700860 #if 0
861 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000862 ALOGI("<<<<<< RETURNING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700863 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000864 ALOGI("<<<<<< RETURNING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700865 }
866 #endif
Tim Murrayd429f4a2017-03-07 09:31:09 -0800867
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800868 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000869 std::ostringstream logStream;
870 logStream << "BR_REPLY thr " << (void*)pthread_self() << " / hand " << handle << ": ";
871 if (reply)
872 logStream << "\t" << *reply << "\n";
873 else
874 logStream << "(none requested)"
875 << "\n";
876 std::string message = logStream.str();
877 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800878 }
879 } else {
Yi Kongfdd8da92018-06-07 17:52:27 -0700880 err = waitForResponse(nullptr, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800881 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800882
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800883 return err;
884}
885
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700886void IPCThreadState::incStrongHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800887{
888 LOG_REMOTEREFS("IPCThreadState::incStrongHandle(%d)\n", handle);
889 mOut.writeInt32(BC_ACQUIRE);
890 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100891 if (!flushIfNeeded()) {
892 // Create a temp reference until the driver has handled this command.
893 proxy->incStrong(mProcess.get());
894 mPostWriteStrongDerefs.push(proxy);
895 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800896}
897
898void IPCThreadState::decStrongHandle(int32_t handle)
899{
900 LOG_REMOTEREFS("IPCThreadState::decStrongHandle(%d)\n", handle);
901 mOut.writeInt32(BC_RELEASE);
902 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100903 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800904}
905
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700906void IPCThreadState::incWeakHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800907{
908 LOG_REMOTEREFS("IPCThreadState::incWeakHandle(%d)\n", handle);
909 mOut.writeInt32(BC_INCREFS);
910 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100911 if (!flushIfNeeded()) {
912 // Create a temp reference until the driver has handled this command.
913 proxy->getWeakRefs()->incWeak(mProcess.get());
914 mPostWriteWeakDerefs.push(proxy->getWeakRefs());
915 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800916}
917
918void IPCThreadState::decWeakHandle(int32_t handle)
919{
920 LOG_REMOTEREFS("IPCThreadState::decWeakHandle(%d)\n", handle);
921 mOut.writeInt32(BC_DECREFS);
922 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100923 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800924}
925
Steven Moreland1bf42912024-02-16 22:29:42 +0000926status_t IPCThreadState::attemptIncStrongHandle(int32_t handle) {
Arve HjønnevÄg11cfdcc2014-02-14 20:14:02 -0800927 (void)handle;
928 ALOGE("%s(%d): Not supported\n", __func__, handle);
929 return INVALID_OPERATION;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800930}
931
932void IPCThreadState::expungeHandle(int32_t handle, IBinder* binder)
933{
934#if LOG_REFCOUNTS
liangweikanga43ee152016-10-25 16:37:54 +0800935 ALOGV("IPCThreadState::expungeHandle(%ld)\n", handle);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800936#endif
Manoj Gupta9cec85b2017-09-19 16:34:29 -0700937 self()->mProcess->expungeHandle(handle, binder); // NOLINT
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800938}
939
940status_t IPCThreadState::requestDeathNotification(int32_t handle, BpBinder* proxy)
941{
942 mOut.writeInt32(BC_REQUEST_DEATH_NOTIFICATION);
943 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000944 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800945 return NO_ERROR;
946}
947
948status_t IPCThreadState::clearDeathNotification(int32_t handle, BpBinder* proxy)
949{
950 mOut.writeInt32(BC_CLEAR_DEATH_NOTIFICATION);
951 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000952 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800953 return NO_ERROR;
954}
955
956IPCThreadState::IPCThreadState()
Steven Moreland35626652021-05-15 01:32:04 +0000957 : mProcess(ProcessState::self()),
958 mServingStackPointer(nullptr),
959 mServingStackPointerGuard(nullptr),
960 mWorkSource(kUnsetWorkSource),
961 mPropagateWorkSource(false),
962 mIsLooper(false),
Frankie Changf4c81372021-05-18 13:08:05 +0800963 mIsFlushing(false),
Steven Moreland35626652021-05-15 01:32:04 +0000964 mStrictModePolicy(0),
965 mLastTransactionBinderFlags(0),
966 mCallRestriction(mProcess->mCallRestriction) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800967 pthread_setspecific(gTLS, this);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800968 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +0000969 mHasExplicitIdentity = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800970 mIn.setDataCapacity(256);
971 mOut.setDataCapacity(256);
972}
973
974IPCThreadState::~IPCThreadState()
975{
976}
977
Martijn Coenenea0090a2017-11-02 18:54:40 +0000978status_t IPCThreadState::sendReply(const Parcel& reply, uint32_t flags)
979{
980 status_t err;
981 status_t statusBuffer;
982 err = writeTransactionData(BC_REPLY, flags, -1, 0, reply, &statusBuffer);
983 if (err < NO_ERROR) return err;
984
Yi Kongfdd8da92018-06-07 17:52:27 -0700985 return waitForResponse(nullptr, nullptr);
Martijn Coenenea0090a2017-11-02 18:54:40 +0000986}
987
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800988status_t IPCThreadState::waitForResponse(Parcel *reply, status_t *acquireResult)
989{
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100990 uint32_t cmd;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800991 int32_t err;
992
993 while (1) {
994 if ((err=talkWithDriver()) < NO_ERROR) break;
995 err = mIn.errorCheck();
996 if (err < NO_ERROR) break;
997 if (mIn.dataAvail() == 0) continue;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800998
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100999 cmd = (uint32_t)mIn.readInt32();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001000
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001001 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001002 std::ostringstream logStream;
1003 logStream << "Processing waitForResponse Command: " << getReturnString(cmd) << "\n";
1004 std::string message = logStream.str();
1005 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001006 }
1007
1008 switch (cmd) {
Hang Lub185ac02021-03-24 13:17:22 +08001009 case BR_ONEWAY_SPAM_SUSPECT:
1010 ALOGE("Process seems to be sending too many oneway calls.");
1011 CallStack::logStack("oneway spamming", CallStack::getCurrent().get(),
1012 ANDROID_LOG_ERROR);
1013 [[fallthrough]];
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001014 case BR_TRANSACTION_COMPLETE:
1015 if (!reply && !acquireResult) goto finish;
1016 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001017
Li Li0e3443d2022-12-07 21:51:19 -08001018 case BR_TRANSACTION_PENDING_FROZEN:
1019 ALOGW("Sending oneway calls to frozen process.");
1020 goto finish;
1021
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001022 case BR_DEAD_REPLY:
1023 err = DEAD_OBJECT;
1024 goto finish;
1025
1026 case BR_FAILED_REPLY:
1027 err = FAILED_TRANSACTION;
1028 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001029
Marco Ballesio7ee17572020-09-08 10:30:03 -07001030 case BR_FROZEN_REPLY:
Steven Moreland389154e2024-05-28 22:22:38 +00001031 ALOGW("Transaction failed because process frozen.");
Marco Ballesio7ee17572020-09-08 10:30:03 -07001032 err = FAILED_TRANSACTION;
1033 goto finish;
1034
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001035 case BR_ACQUIRE_RESULT:
1036 {
Steve Block67263472012-01-09 18:35:44 +00001037 ALOG_ASSERT(acquireResult != NULL, "Unexpected brACQUIRE_RESULT");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001038 const int32_t result = mIn.readInt32();
1039 if (!acquireResult) continue;
1040 *acquireResult = result ? NO_ERROR : INVALID_OPERATION;
1041 }
1042 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001043
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001044 case BR_REPLY:
1045 {
1046 binder_transaction_data tr;
1047 err = mIn.read(&tr, sizeof(tr));
Steve Block67263472012-01-09 18:35:44 +00001048 ALOG_ASSERT(err == NO_ERROR, "Not enough command data for brREPLY");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001049 if (err != NO_ERROR) goto finish;
1050
1051 if (reply) {
1052 if ((tr.flags & TF_STATUS_CODE) == 0) {
1053 reply->ipcSetDataReference(
1054 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1055 tr.data_size,
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001056 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1057 tr.offsets_size/sizeof(binder_size_t),
Steven Moreland161fe122020-11-12 23:16:47 +00001058 freeBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001059 } else {
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001060 err = *reinterpret_cast<const status_t*>(tr.data.ptr.buffer);
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001061 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1062 tr.data_size,
1063 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1064 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001065 }
1066 } else {
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001067 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer), tr.data_size,
1068 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1069 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001070 continue;
1071 }
1072 }
1073 goto finish;
1074
1075 default:
1076 err = executeCommand(cmd);
1077 if (err != NO_ERROR) goto finish;
1078 break;
1079 }
1080 }
1081
1082finish:
1083 if (err != NO_ERROR) {
1084 if (acquireResult) *acquireResult = err;
1085 if (reply) reply->setError(err);
1086 mLastError = err;
Carlos Llamasb235b122021-12-20 06:38:44 -08001087 logExtendedError();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001088 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001089
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001090 return err;
1091}
1092
1093status_t IPCThreadState::talkWithDriver(bool doReceive)
1094{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001095 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001096 return -EBADF;
1097 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001098
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001099 binder_write_read bwr;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001100
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001101 // Is the read buffer empty?
1102 const bool needRead = mIn.dataPosition() >= mIn.dataSize();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001103
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001104 // We don't want to write anything if we are still reading
1105 // from data left in the input buffer and the caller
1106 // has requested to read the next data.
1107 const size_t outAvail = (!doReceive || needRead) ? mOut.dataSize() : 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001108
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001109 bwr.write_size = outAvail;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001110 bwr.write_buffer = (uintptr_t)mOut.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001111
1112 // This is what we'll read.
1113 if (doReceive && needRead) {
1114 bwr.read_size = mIn.dataCapacity();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001115 bwr.read_buffer = (uintptr_t)mIn.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001116 } else {
1117 bwr.read_size = 0;
Ben Chengd640f892011-12-01 17:11:32 -08001118 bwr.read_buffer = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001119 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001120
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001121 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001122 std::ostringstream logStream;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001123 if (outAvail != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001124 logStream << "Sending commands to driver: ";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001125 const void* cmds = (const void*)bwr.write_buffer;
Pawan Wagh7063b522022-09-28 18:52:26 +00001126 const void* end = ((const uint8_t*)cmds) + bwr.write_size;
1127 logStream << "\t" << HexDump(cmds, bwr.write_size) << "\n";
1128 while (cmds < end) cmds = printCommand(logStream, cmds);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001129 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001130 logStream << "Size of receive buffer: " << bwr.read_size << ", needRead: " << needRead
1131 << ", doReceive: " << doReceive << "\n";
1132
1133 std::string message = logStream.str();
1134 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001135 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001136
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001137 // Return immediately if there is nothing to do.
1138 if ((bwr.write_size == 0) && (bwr.read_size == 0)) return NO_ERROR;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001139
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001140 bwr.write_consumed = 0;
1141 bwr.read_consumed = 0;
1142 status_t err;
1143 do {
1144 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001145 std::ostringstream logStream;
1146 logStream << "About to read/write, write size = " << mOut.dataSize() << "\n";
1147 std::string message = logStream.str();
1148 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001149 }
Elliott Hughes6071da72015-08-12 15:27:47 -07001150#if defined(__ANDROID__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001151 if (ioctl(mProcess->mDriverFD, BINDER_WRITE_READ, &bwr) >= 0)
1152 err = NO_ERROR;
1153 else
1154 err = -errno;
1155#else
1156 err = INVALID_OPERATION;
1157#endif
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001158 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001159 err = -EBADF;
1160 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001161 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001162 std::ostringstream logStream;
1163 logStream << "Finished read/write, write size = " << mOut.dataSize() << "\n";
1164 std::string message = logStream.str();
1165 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001166 }
1167 } while (err == -EINTR);
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001168
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001169 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001170 std::ostringstream logStream;
1171 logStream << "Our err: " << (void*)(intptr_t)err
1172 << ", write consumed: " << bwr.write_consumed << " (of " << mOut.dataSize()
1173 << "), read consumed: " << bwr.read_consumed << "\n";
1174 std::string message = logStream.str();
1175 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001176 }
1177
1178 if (err >= NO_ERROR) {
1179 if (bwr.write_consumed > 0) {
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001180 if (bwr.write_consumed < mOut.dataSize())
Steven Morelandb077deb2020-04-16 16:22:52 -07001181 LOG_ALWAYS_FATAL("Driver did not consume write buffer. "
1182 "err: %s consumed: %zu of %zu",
1183 statusToString(err).c_str(),
1184 (size_t)bwr.write_consumed,
1185 mOut.dataSize());
Martijn Coenen7c170bb2018-05-04 17:28:55 -07001186 else {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001187 mOut.setDataSize(0);
Martijn Coenen7c170bb2018-05-04 17:28:55 -07001188 processPostWriteDerefs();
1189 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001190 }
1191 if (bwr.read_consumed > 0) {
1192 mIn.setDataSize(bwr.read_consumed);
1193 mIn.setDataPosition(0);
1194 }
1195 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001196 std::ostringstream logStream;
1197 logStream << "Remaining data size: " << mOut.dataSize() << "\n";
1198 logStream << "Received commands from driver: ";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001199 const void* cmds = mIn.data();
1200 const void* end = mIn.data() + mIn.dataSize();
Pawan Wagh7063b522022-09-28 18:52:26 +00001201 logStream << "\t" << HexDump(cmds, mIn.dataSize()) << "\n";
1202 while (cmds < end) cmds = printReturnCommand(logStream, cmds);
1203 std::string message = logStream.str();
1204 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001205 }
1206 return NO_ERROR;
1207 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001208
Theodore Duboisbf144632023-01-09 15:36:49 -08001209 ALOGE_IF(mProcess->mDriverFD >= 0,
1210 "Driver returned error (%s). This is a bug in either libbinder or the driver. This "
1211 "thread's connection to %s will no longer work.",
1212 statusToString(err).c_str(), mProcess->mDriverName.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001213 return err;
1214}
1215
1216status_t IPCThreadState::writeTransactionData(int32_t cmd, uint32_t binderFlags,
1217 int32_t handle, uint32_t code, const Parcel& data, status_t* statusBuffer)
1218{
1219 binder_transaction_data tr;
1220
Arve HjønnevÄg07fd0f12014-02-18 21:10:29 -08001221 tr.target.ptr = 0; /* Don't pass uninitialized stack data to a remote process */
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001222 tr.target.handle = handle;
1223 tr.code = code;
1224 tr.flags = binderFlags;
Evgeniy Stepanovd5474322011-04-21 14:15:00 +04001225 tr.cookie = 0;
1226 tr.sender_pid = 0;
1227 tr.sender_euid = 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001228
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001229 const status_t err = data.errorCheck();
1230 if (err == NO_ERROR) {
1231 tr.data_size = data.ipcDataSize();
1232 tr.data.ptr.buffer = data.ipcData();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001233 tr.offsets_size = data.ipcObjectsCount()*sizeof(binder_size_t);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001234 tr.data.ptr.offsets = data.ipcObjects();
1235 } else if (statusBuffer) {
1236 tr.flags |= TF_STATUS_CODE;
1237 *statusBuffer = err;
1238 tr.data_size = sizeof(status_t);
Arve HjønnevÄg87b30d02014-02-18 21:04:31 -08001239 tr.data.ptr.buffer = reinterpret_cast<uintptr_t>(statusBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001240 tr.offsets_size = 0;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001241 tr.data.ptr.offsets = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001242 } else {
1243 return (mLastError = err);
1244 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001245
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001246 mOut.writeInt32(cmd);
1247 mOut.write(&tr, sizeof(tr));
Tim Murrayd429f4a2017-03-07 09:31:09 -08001248
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001249 return NO_ERROR;
1250}
1251
1252sp<BBinder> the_context_object;
1253
Jiyong Park384328e2020-11-13 17:16:48 +09001254void IPCThreadState::setTheContextObject(const sp<BBinder>& obj)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001255{
1256 the_context_object = obj;
1257}
1258
1259status_t IPCThreadState::executeCommand(int32_t cmd)
1260{
1261 BBinder* obj;
1262 RefBase::weakref_type* refs;
1263 status_t result = NO_ERROR;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001264
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001265 switch ((uint32_t)cmd) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001266 case BR_ERROR:
1267 result = mIn.readInt32();
1268 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001269
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001270 case BR_OK:
1271 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001272
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001273 case BR_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001274 refs = (RefBase::weakref_type*)mIn.readPointer();
1275 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001276 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001277 "BR_ACQUIRE: object %p does not match cookie %p (expected %p)",
1278 refs, obj, refs->refBase());
1279 obj->incStrong(mProcess.get());
1280 IF_LOG_REMOTEREFS() {
1281 LOG_REMOTEREFS("BR_ACQUIRE from driver on %p", obj);
1282 obj->printRefs();
1283 }
1284 mOut.writeInt32(BC_ACQUIRE_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001285 mOut.writePointer((uintptr_t)refs);
1286 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001287 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001288
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001289 case BR_RELEASE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001290 refs = (RefBase::weakref_type*)mIn.readPointer();
1291 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001292 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001293 "BR_RELEASE: object %p does not match cookie %p (expected %p)",
1294 refs, obj, refs->refBase());
1295 IF_LOG_REMOTEREFS() {
1296 LOG_REMOTEREFS("BR_RELEASE from driver on %p", obj);
1297 obj->printRefs();
1298 }
1299 mPendingStrongDerefs.push(obj);
1300 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001301
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001302 case BR_INCREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001303 refs = (RefBase::weakref_type*)mIn.readPointer();
1304 obj = (BBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001305 refs->incWeak(mProcess.get());
1306 mOut.writeInt32(BC_INCREFS_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001307 mOut.writePointer((uintptr_t)refs);
1308 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001309 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001310
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001311 case BR_DECREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001312 refs = (RefBase::weakref_type*)mIn.readPointer();
Jiyong Park5970d0a2022-03-08 16:56:13 +09001313 // NOLINTNEXTLINE(clang-analyzer-deadcode.DeadStores)
1314 obj = (BBinder*)mIn.readPointer(); // consume
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001315 // NOTE: This assertion is not valid, because the object may no
1316 // longer exist (thus the (BBinder*)cast above resulting in a different
1317 // memory address).
Steve Block67263472012-01-09 18:35:44 +00001318 //ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001319 // "BR_DECREFS: object %p does not match cookie %p (expected %p)",
1320 // refs, obj, refs->refBase());
1321 mPendingWeakDerefs.push(refs);
1322 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001323
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001324 case BR_ATTEMPT_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001325 refs = (RefBase::weakref_type*)mIn.readPointer();
1326 obj = (BBinder*)mIn.readPointer();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001327
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001328 {
1329 const bool success = refs->attemptIncStrong(mProcess.get());
Steve Block67263472012-01-09 18:35:44 +00001330 ALOG_ASSERT(success && refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001331 "BR_ATTEMPT_ACQUIRE: object %p does not match cookie %p (expected %p)",
1332 refs, obj, refs->refBase());
Tim Murrayd429f4a2017-03-07 09:31:09 -08001333
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001334 mOut.writeInt32(BC_ACQUIRE_RESULT);
1335 mOut.writeInt32((int32_t)success);
1336 }
1337 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001338
Steven Morelandf0212002018-12-26 13:59:23 -08001339 case BR_TRANSACTION_SEC_CTX:
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001340 case BR_TRANSACTION:
1341 {
Steven Morelandf0212002018-12-26 13:59:23 -08001342 binder_transaction_data_secctx tr_secctx;
1343 binder_transaction_data& tr = tr_secctx.transaction_data;
1344
1345 if (cmd == (int) BR_TRANSACTION_SEC_CTX) {
1346 result = mIn.read(&tr_secctx, sizeof(tr_secctx));
1347 } else {
1348 result = mIn.read(&tr, sizeof(tr));
1349 tr_secctx.secctx = 0;
1350 }
1351
Steve Block67263472012-01-09 18:35:44 +00001352 ALOG_ASSERT(result == NO_ERROR,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001353 "Not enough command data for brTRANSACTION");
1354 if (result != NO_ERROR) break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001355
Martijn Coenenea0090a2017-11-02 18:54:40 +00001356 Parcel buffer;
1357 buffer.ipcSetDataReference(
1358 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1359 tr.data_size,
1360 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
Steven Moreland161fe122020-11-12 23:16:47 +00001361 tr.offsets_size/sizeof(binder_size_t), freeBuffer);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001362
Steven Moreland39d887d2020-01-31 14:56:45 -08001363 const void* origServingStackPointer = mServingStackPointer;
Steven Moreland35626652021-05-15 01:32:04 +00001364 mServingStackPointer = __builtin_frame_address(0);
Steven Moreland39d887d2020-01-31 14:56:45 -08001365
Martijn Coenenea0090a2017-11-02 18:54:40 +00001366 const pid_t origPid = mCallingPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001367 const char* origSid = mCallingSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001368 const uid_t origUid = mCallingUid;
mattgilbride85897672022-10-22 17:42:44 +00001369 const bool origHasExplicitIdentity = mHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001370 const int32_t origStrictModePolicy = mStrictModePolicy;
1371 const int32_t origTransactionBinderFlags = mLastTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001372 const int32_t origWorkSource = mWorkSource;
1373 const bool origPropagateWorkSet = mPropagateWorkSource;
1374 // Calling work source will be set by Parcel#enforceInterface. Parcel#enforceInterface
1375 // is only guaranteed to be called for AIDL-generated stubs so we reset the work source
1376 // here to never propagate it.
1377 clearCallingWorkSource();
1378 clearPropagateWorkSource();
Martijn Coenenea0090a2017-11-02 18:54:40 +00001379
1380 mCallingPid = tr.sender_pid;
Steven Morelandf0212002018-12-26 13:59:23 -08001381 mCallingSid = reinterpret_cast<const char*>(tr_secctx.secctx);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001382 mCallingUid = tr.sender_euid;
mattgilbride85897672022-10-22 17:42:44 +00001383 mHasExplicitIdentity = false;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001384 mLastTransactionBinderFlags = tr.flags;
1385
Steven Morelandf0212002018-12-26 13:59:23 -08001386 // ALOGI(">>>> TRANSACT from pid %d sid %s uid %d\n", mCallingPid,
1387 // (mCallingSid ? mCallingSid : "<N/A>"), mCallingUid);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001388
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001389 Parcel reply;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001390 status_t error;
1391 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001392 std::ostringstream logStream;
1393 logStream << "BR_TRANSACTION thr " << (void*)pthread_self() << " / obj "
1394 << tr.target.ptr << " / code " << TypeCode(tr.code) << ": \t" << buffer
1395 << "\n"
1396 << "Data addr = " << reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer)
1397 << ", offsets addr="
1398 << reinterpret_cast<const size_t*>(tr.data.ptr.offsets) << "\n";
1399 std::string message = logStream.str();
1400 ALOGI("%s", message.c_str());
Martijn Coenenea0090a2017-11-02 18:54:40 +00001401 }
1402 if (tr.target.ptr) {
1403 // We only have a weak reference on the target object, so we must first try to
1404 // safely acquire a strong reference before doing anything else with it.
1405 if (reinterpret_cast<RefBase::weakref_type*>(
1406 tr.target.ptr)->attemptIncStrong(this)) {
1407 error = reinterpret_cast<BBinder*>(tr.cookie)->transact(tr.code, buffer,
1408 &reply, tr.flags);
1409 reinterpret_cast<BBinder*>(tr.cookie)->decStrong(this);
Dianne Hackbornc1114612016-03-21 10:36:54 -07001410 } else {
Martijn Coenenea0090a2017-11-02 18:54:40 +00001411 error = UNKNOWN_TRANSACTION;
Dianne Hackbornc1114612016-03-21 10:36:54 -07001412 }
Brad Fitzpatrick52736032010-08-30 16:01:16 -07001413
Martijn Coenenea0090a2017-11-02 18:54:40 +00001414 } else {
1415 error = the_context_object->transact(tr.code, buffer, &reply, tr.flags);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001416 }
Dianne Hackborn5ee2c9d2014-09-30 11:30:03 -07001417
Steven Morelandf0212002018-12-26 13:59:23 -08001418 //ALOGI("<<<< TRANSACT from pid %d restore pid %d sid %s uid %d\n",
1419 // mCallingPid, origPid, (origSid ? origSid : "<N/A>"), origUid);
Tim Murrayd429f4a2017-03-07 09:31:09 -08001420
Martijn Coenenea0090a2017-11-02 18:54:40 +00001421 if ((tr.flags & TF_ONE_WAY) == 0) {
1422 LOG_ONEWAY("Sending reply to %d!", mCallingPid);
1423 if (error < NO_ERROR) reply.setError(error);
Steven Morelandf183fdd2020-10-27 00:12:12 +00001424
Steven Morelandce15b9f2022-09-08 17:42:45 +00001425 // b/238777741: clear buffer before we send the reply.
1426 // Otherwise, there is a race where the client may
1427 // receive the reply and send another transaction
1428 // here and the space used by this transaction won't
1429 // be freed for the client.
1430 buffer.setDataSize(0);
1431
Steven Morelandf183fdd2020-10-27 00:12:12 +00001432 constexpr uint32_t kForwardReplyFlags = TF_CLEAR_BUF;
1433 sendReply(reply, (tr.flags & kForwardReplyFlags));
Martijn Coenenea0090a2017-11-02 18:54:40 +00001434 } else {
Steven Moreland80844f72020-12-12 02:06:08 +00001435 if (error != OK) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001436 std::ostringstream logStream;
1437 logStream << "oneway function results for code " << tr.code << " on binder at "
1438 << reinterpret_cast<void*>(tr.target.ptr)
1439 << " will be dropped but finished with status "
1440 << statusToString(error);
Steven Moreland80844f72020-12-12 02:06:08 +00001441
1442 // ideally we could log this even when error == OK, but it
1443 // causes too much logspam because some manually-written
1444 // interfaces have clients that call methods which always
1445 // write results, sometimes as oneway methods.
1446 if (reply.dataSize() != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001447 logStream << " and reply parcel size " << reply.dataSize();
Steven Moreland80844f72020-12-12 02:06:08 +00001448 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001449 std::string message = logStream.str();
1450 ALOGI("%s", message.c_str());
Steven Morelandce66b8a2020-02-10 14:43:14 -08001451 }
Martijn Coenenea0090a2017-11-02 18:54:40 +00001452 LOG_ONEWAY("NOT sending reply to %d!", mCallingPid);
1453 }
1454
Steven Moreland39d887d2020-01-31 14:56:45 -08001455 mServingStackPointer = origServingStackPointer;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001456 mCallingPid = origPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001457 mCallingSid = origSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001458 mCallingUid = origUid;
mattgilbride85897672022-10-22 17:42:44 +00001459 mHasExplicitIdentity = origHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001460 mStrictModePolicy = origStrictModePolicy;
1461 mLastTransactionBinderFlags = origTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001462 mWorkSource = origWorkSource;
1463 mPropagateWorkSource = origPropagateWorkSet;
Christopher Tate440fd872010-03-18 17:55:03 -07001464
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001465 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001466 std::ostringstream logStream;
1467 logStream << "BC_REPLY thr " << (void*)pthread_self() << " / obj " << tr.target.ptr
1468 << ": \t" << reply << "\n";
1469 std::string message = logStream.str();
1470 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001471 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001472
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001473 }
1474 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001475
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001476 case BR_DEAD_BINDER:
1477 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001478 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001479 proxy->sendObituary();
1480 mOut.writeInt32(BC_DEAD_BINDER_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001481 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001482 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001483
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001484 case BR_CLEAR_DEATH_NOTIFICATION_DONE:
1485 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001486 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001487 proxy->getWeakRefs()->decWeak(proxy);
1488 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001489
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001490 case BR_FINISHED:
1491 result = TIMED_OUT;
1492 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001493
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001494 case BR_NOOP:
1495 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001496
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001497 case BR_SPAWN_LOOPER:
1498 mProcess->spawnPooledThread(false);
1499 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001500
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001501 default:
liangweikanga43ee152016-10-25 16:37:54 +08001502 ALOGE("*** BAD COMMAND %d received from Binder driver\n", cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001503 result = UNKNOWN_ERROR;
1504 break;
1505 }
1506
1507 if (result != NO_ERROR) {
1508 mLastError = result;
1509 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001510
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001511 return result;
1512}
1513
Steven Moreland39d887d2020-01-31 14:56:45 -08001514const void* IPCThreadState::getServingStackPointer() const {
1515 return mServingStackPointer;
Jayant Chowdharydac6dc82018-10-01 22:52:44 +00001516}
1517
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001518void IPCThreadState::threadDestructor(void *st)
1519{
Todd Poynor8d96cab2013-06-25 19:12:18 -07001520 IPCThreadState* const self = static_cast<IPCThreadState*>(st);
1521 if (self) {
1522 self->flushCommands();
Elliott Hughes6071da72015-08-12 15:27:47 -07001523#if defined(__ANDROID__)
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001524 if (self->mProcess->mDriverFD >= 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001525 ioctl(self->mProcess->mDriverFD, BINDER_THREAD_EXIT, 0);
1526 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001527#endif
Todd Poynor8d96cab2013-06-25 19:12:18 -07001528 delete self;
1529 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001530}
1531
Li Li6f059292021-09-10 09:59:30 -07001532status_t IPCThreadState::getProcessFreezeInfo(pid_t pid, uint32_t *sync_received,
1533 uint32_t *async_received)
1534{
1535 int ret = 0;
Jiyong Park5970d0a2022-03-08 16:56:13 +09001536 binder_frozen_status_info info = {};
Li Li6f059292021-09-10 09:59:30 -07001537 info.pid = pid;
1538
1539#if defined(__ANDROID__)
1540 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_FROZEN_INFO, &info) < 0)
1541 ret = -errno;
1542#endif
1543 *sync_received = info.sync_recv;
1544 *async_received = info.async_recv;
1545
1546 return ret;
1547}
Li Li6f059292021-09-10 09:59:30 -07001548
Marco Ballesio7ee17572020-09-08 10:30:03 -07001549status_t IPCThreadState::freeze(pid_t pid, bool enable, uint32_t timeout_ms) {
1550 struct binder_freeze_info info;
1551 int ret = 0;
1552
1553 info.pid = pid;
1554 info.enable = enable;
1555 info.timeout_ms = timeout_ms;
1556
1557
1558#if defined(__ANDROID__)
1559 if (ioctl(self()->mProcess->mDriverFD, BINDER_FREEZE, &info) < 0)
1560 ret = -errno;
1561#endif
1562
1563 //
1564 // ret==-EAGAIN indicates that transactions have not drained.
1565 // Call again to poll for completion.
1566 //
1567 return ret;
1568}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001569
Carlos Llamasb235b122021-12-20 06:38:44 -08001570void IPCThreadState::logExtendedError() {
1571 struct binder_extended_error ee = {.command = BR_OK};
1572
1573 if (!ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::EXTENDED_ERROR))
1574 return;
1575
1576#if defined(__ANDROID__)
1577 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_EXTENDED_ERROR, &ee) < 0) {
1578 ALOGE("Failed to get extended error: %s", strerror(errno));
1579 return;
1580 }
1581#endif
1582
Steven Morelandb6fe2422024-05-25 00:25:02 +00001583 ALOGE_IF(ee.command != BR_OK, "Binder transaction failure. id: %d, BR_*: %d, error: %d (%s)",
1584 ee.id, ee.command, ee.param, strerror(-ee.param));
Carlos Llamasb235b122021-12-20 06:38:44 -08001585}
1586
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001587void IPCThreadState::freeBuffer(const uint8_t* data, size_t /*dataSize*/,
1588 const binder_size_t* /*objects*/, size_t /*objectsSize*/) {
Steve Blocka19954a2012-01-04 20:05:49 +00001589 //ALOGI("Freeing parcel %p", &parcel);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001590 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001591 std::ostringstream logStream;
1592 logStream << "Writing BC_FREE_BUFFER for " << data << "\n";
1593 std::string message = logStream.str();
1594 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001595 }
Steve Block67263472012-01-09 18:35:44 +00001596 ALOG_ASSERT(data != NULL, "Called with NULL data");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001597 IPCThreadState* state = self();
1598 state->mOut.writeInt32(BC_FREE_BUFFER);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001599 state->mOut.writePointer((uintptr_t)data);
Martijn Coenen0442a862017-11-17 10:46:32 +01001600 state->flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001601}
1602
Steven Moreland61ff8492019-09-26 16:05:45 -07001603} // namespace android