blob: 6e318ea478772a1045bca11621f8be89ac7c8e4e [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define LOG_TAG "ServiceManager"
18
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070019#include <binder/IServiceManager.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080020
Tom Cherry8fda97f2020-07-22 17:15:44 -070021#include <inttypes.h>
22#include <unistd.h>
23
Steven Moreland1c47b582019-08-27 18:05:27 -070024#include <android/os/BnServiceCallback.h>
Steven Moreland80e1e6d2019-06-21 12:35:59 -070025#include <android/os/IServiceManager.h>
Mathias Agopian375f5632009-06-15 18:24:59 -070026#include <binder/IPCThreadState.h>
Steven Moreland28723ae2019-04-01 18:52:30 -070027#include <binder/Parcel.h>
28#include <utils/Log.h>
29#include <utils/String8.h>
30#include <utils/SystemClock.h>
31
Jiyong Park47f876b2018-04-17 13:56:46 +090032#ifndef __ANDROID_VNDK__
33#include <binder/IPermissionController.h>
34#endif
Steven Moreland28723ae2019-04-01 18:52:30 -070035
Steven Morelanded3b5632019-09-20 11:24:28 -070036#ifdef __ANDROID__
Yunfan Chen788e1c42018-03-29 16:52:09 +090037#include <cutils/properties.h>
Yifan Hongf7760012021-06-04 16:04:42 -070038#else
39#include "ServiceManagerHost.h"
Steven Moreland28723ae2019-04-01 18:52:30 -070040#endif
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080041
Steven Morelanda4853cd2019-07-12 15:44:37 -070042#include "Static.h"
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080043
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080044namespace android {
45
Steven Moreland80e1e6d2019-06-21 12:35:59 -070046using AidlServiceManager = android::os::IServiceManager;
47using android::binder::Status;
48
Steven Moreland635a2912019-10-02 15:50:10 -070049// libbinder's IServiceManager.h can't rely on the values generated by AIDL
50// because many places use its headers via include_dirs (meaning, without
51// declaring the dependency in the build system). So, for now, we can just check
52// the values here.
53static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_CRITICAL == IServiceManager::DUMP_FLAG_PRIORITY_CRITICAL);
54static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_HIGH == IServiceManager::DUMP_FLAG_PRIORITY_HIGH);
55static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_NORMAL == IServiceManager::DUMP_FLAG_PRIORITY_NORMAL);
56static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_DEFAULT == IServiceManager::DUMP_FLAG_PRIORITY_DEFAULT);
57static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_ALL == IServiceManager::DUMP_FLAG_PRIORITY_ALL);
58static_assert(AidlServiceManager::DUMP_FLAG_PROTO == IServiceManager::DUMP_FLAG_PROTO);
59
Steven Moreland583685e2019-10-02 16:45:11 -070060const String16& IServiceManager::getInterfaceDescriptor() const {
61 return AidlServiceManager::descriptor;
62}
63IServiceManager::IServiceManager() {}
64IServiceManager::~IServiceManager() {}
65
66// From the old libbinder IServiceManager interface to IServiceManager.
67class ServiceManagerShim : public IServiceManager
68{
69public:
70 explicit ServiceManagerShim (const sp<AidlServiceManager>& impl);
71
72 sp<IBinder> getService(const String16& name) const override;
73 sp<IBinder> checkService(const String16& name) const override;
74 status_t addService(const String16& name, const sp<IBinder>& service,
75 bool allowIsolated, int dumpsysPriority) override;
76 Vector<String16> listServices(int dumpsysPriority) override;
77 sp<IBinder> waitForService(const String16& name16) override;
Steven Morelandb82b8f82019-10-28 10:52:34 -070078 bool isDeclared(const String16& name) override;
Steven Moreland2e293aa2020-09-23 00:25:16 +000079 Vector<String16> getDeclaredInstances(const String16& interface) override;
Steven Morelandedd4e072021-04-21 00:27:29 +000080 std::optional<String16> updatableViaApex(const String16& name) override;
Steven Moreland583685e2019-10-02 16:45:11 -070081
82 // for legacy ABI
83 const String16& getInterfaceDescriptor() const override {
84 return mTheRealServiceManager->getInterfaceDescriptor();
85 }
86 IBinder* onAsBinder() override {
87 return IInterface::asBinder(mTheRealServiceManager).get();
88 }
Yifan Hongf7760012021-06-04 16:04:42 -070089
90protected:
Steven Moreland583685e2019-10-02 16:45:11 -070091 sp<AidlServiceManager> mTheRealServiceManager;
Yifan Hongf7760012021-06-04 16:04:42 -070092
93 // Directly get the service in a way that, for lazy services, requests the service to be started
94 // if it is not currently started. This way, calls directly to ServiceManagerShim::getService
95 // will still have the 5s delay that is expected by a large amount of Android code.
96 //
97 // When implementing ServiceManagerShim, use realGetService instead of
98 // mTheRealServiceManager->getService so that it can be overridden in ServiceManagerHostShim.
99 virtual Status realGetService(const std::string& name, sp<IBinder>* _aidl_return) {
100 return mTheRealServiceManager->getService(name, _aidl_return);
101 }
Steven Moreland583685e2019-10-02 16:45:11 -0700102};
103
Steven Moreland1698ffd2020-05-15 23:43:52 +0000104[[clang::no_destroy]] static std::once_flag gSmOnce;
105[[clang::no_destroy]] static sp<IServiceManager> gDefaultServiceManager;
Brett Chabot38dbade2020-01-24 12:59:43 -0800106
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800107sp<IServiceManager> defaultServiceManager()
108{
Martijn Coenen402c8672020-02-03 10:01:36 +0100109 std::call_once(gSmOnce, []() {
110 sp<AidlServiceManager> sm = nullptr;
111 while (sm == nullptr) {
112 sm = interface_cast<AidlServiceManager>(ProcessState::self()->getContextObject(nullptr));
113 if (sm == nullptr) {
Steven Moreland39a57212020-05-19 18:10:07 +0000114 ALOGE("Waiting 1s on context object on %s.", ProcessState::self()->getDriverName().c_str());
Todd Poynora7b0f042013-06-18 17:25:37 -0700115 sleep(1);
Martijn Coenen402c8672020-02-03 10:01:36 +0100116 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800117 }
Martijn Coenen402c8672020-02-03 10:01:36 +0100118
Steven Moreland1a3a8ef2021-04-02 02:52:46 +0000119 gDefaultServiceManager = sp<ServiceManagerShim>::make(sm);
Martijn Coenen402c8672020-02-03 10:01:36 +0100120 });
Daniel Eratc2832702015-10-13 15:29:32 -0600121
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800122 return gDefaultServiceManager;
123}
124
Brett Chabot38dbade2020-01-24 12:59:43 -0800125void setDefaultServiceManager(const sp<IServiceManager>& sm) {
Martijn Coenen402c8672020-02-03 10:01:36 +0100126 bool called = false;
127 std::call_once(gSmOnce, [&]() {
128 gDefaultServiceManager = sm;
129 called = true;
130 });
131
132 if (!called) {
133 LOG_ALWAYS_FATAL("setDefaultServiceManager() called after defaultServiceManager().");
134 }
Brett Chabot38dbade2020-01-24 12:59:43 -0800135}
136
Steven Morelanded3b5632019-09-20 11:24:28 -0700137#if !defined(__ANDROID_VNDK__) && defined(__ANDROID__)
Jiyong Park47f876b2018-04-17 13:56:46 +0900138// IPermissionController is not accessible to vendors
139
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800140bool checkCallingPermission(const String16& permission)
141{
Yi Kongfdd8da92018-06-07 17:52:27 -0700142 return checkCallingPermission(permission, nullptr, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800143}
144
Steven Moreland1b264072021-06-03 23:04:02 +0000145static StaticString16 _permission(u"permission");
Mathias Agopian375f5632009-06-15 18:24:59 -0700146
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800147bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid)
148{
149 IPCThreadState* ipcState = IPCThreadState::self();
Mathias Agopian375f5632009-06-15 18:24:59 -0700150 pid_t pid = ipcState->getCallingPid();
151 uid_t uid = ipcState->getCallingUid();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800152 if (outPid) *outPid = pid;
Mathias Agopian375f5632009-06-15 18:24:59 -0700153 if (outUid) *outUid = uid;
154 return checkPermission(permission, pid, uid);
155}
156
Jayant Chowdhary49bc34b2021-07-28 20:27:21 +0000157bool checkPermission(const String16& permission, pid_t pid, uid_t uid, bool logPermissionFailure) {
Steven Moreland92b17c62019-04-02 15:46:24 -0700158 static Mutex gPermissionControllerLock;
159 static sp<IPermissionController> gPermissionController;
160
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800161 sp<IPermissionController> pc;
Steven Moreland92b17c62019-04-02 15:46:24 -0700162 gPermissionControllerLock.lock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800163 pc = gPermissionController;
Steven Moreland92b17c62019-04-02 15:46:24 -0700164 gPermissionControllerLock.unlock();
Daniel Eratc2832702015-10-13 15:29:32 -0600165
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800166 int64_t startTime = 0;
167
168 while (true) {
Yi Kongfdd8da92018-06-07 17:52:27 -0700169 if (pc != nullptr) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800170 bool res = pc->checkPermission(permission, pid, uid);
171 if (res) {
172 if (startTime != 0) {
Steve Blocka19954a2012-01-04 20:05:49 +0000173 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800174 (int)((uptimeMillis()-startTime)/1000),
175 String8(permission).string(), uid, pid);
176 }
177 return res;
178 }
Daniel Eratc2832702015-10-13 15:29:32 -0600179
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800180 // Is this a permission failure, or did the controller go away?
Marco Nelissen097ca272014-11-14 08:01:01 -0800181 if (IInterface::asBinder(pc)->isBinderAlive()) {
Jayant Chowdhary49bc34b2021-07-28 20:27:21 +0000182 if (logPermissionFailure) {
183 ALOGW("Permission failure: %s from uid=%d pid=%d", String8(permission).string(),
184 uid, pid);
185 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800186 return false;
187 }
Daniel Eratc2832702015-10-13 15:29:32 -0600188
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800189 // Object is dead!
Steven Moreland92b17c62019-04-02 15:46:24 -0700190 gPermissionControllerLock.lock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800191 if (gPermissionController == pc) {
Yi Kongfdd8da92018-06-07 17:52:27 -0700192 gPermissionController = nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800193 }
Steven Moreland92b17c62019-04-02 15:46:24 -0700194 gPermissionControllerLock.unlock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800195 }
Daniel Eratc2832702015-10-13 15:29:32 -0600196
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800197 // Need to retrieve the permission controller.
198 sp<IBinder> binder = defaultServiceManager()->checkService(_permission);
Yi Kongfdd8da92018-06-07 17:52:27 -0700199 if (binder == nullptr) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800200 // Wait for the permission controller to come back...
201 if (startTime == 0) {
202 startTime = uptimeMillis();
Steve Blocka19954a2012-01-04 20:05:49 +0000203 ALOGI("Waiting to check permission %s from uid=%d pid=%d",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800204 String8(permission).string(), uid, pid);
205 }
206 sleep(1);
207 } else {
208 pc = interface_cast<IPermissionController>(binder);
Daniel Eratc2832702015-10-13 15:29:32 -0600209 // Install the new permission controller, and try again.
Steven Moreland92b17c62019-04-02 15:46:24 -0700210 gPermissionControllerLock.lock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800211 gPermissionController = pc;
Steven Moreland92b17c62019-04-02 15:46:24 -0700212 gPermissionControllerLock.unlock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800213 }
214 }
215}
216
Jiyong Park47f876b2018-04-17 13:56:46 +0900217#endif //__ANDROID_VNDK__
218
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800219// ----------------------------------------------------------------------
220
Steven Moreland583685e2019-10-02 16:45:11 -0700221ServiceManagerShim::ServiceManagerShim(const sp<AidlServiceManager>& impl)
222 : mTheRealServiceManager(impl)
223{}
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700224
Steven Moreland5af7d852020-04-29 15:40:29 -0700225// This implementation could be simplified and made more efficient by delegating
226// to waitForService. However, this changes the threading structure in some
227// cases and could potentially break prebuilts. Once we have higher logistical
228// complexity, this could be attempted.
Steven Moreland583685e2019-10-02 16:45:11 -0700229sp<IBinder> ServiceManagerShim::getService(const String16& name) const
230{
231 static bool gSystemBootCompleted = false;
232
233 sp<IBinder> svc = checkService(name);
234 if (svc != nullptr) return svc;
235
236 const bool isVendorService =
237 strcmp(ProcessState::self()->getDriverName().c_str(), "/dev/vndbinder") == 0;
Jiyong Park16c6e702020-11-13 20:53:12 +0900238 constexpr int64_t timeout = 5000;
Tom Cherry8fda97f2020-07-22 17:15:44 -0700239 int64_t startTime = uptimeMillis();
Steven Moreland583685e2019-10-02 16:45:11 -0700240 // Vendor code can't access system properties
241 if (!gSystemBootCompleted && !isVendorService) {
242#ifdef __ANDROID__
243 char bootCompleted[PROPERTY_VALUE_MAX];
244 property_get("sys.boot_completed", bootCompleted, "0");
245 gSystemBootCompleted = strcmp(bootCompleted, "1") == 0 ? true : false;
246#else
247 gSystemBootCompleted = true;
248#endif
249 }
250 // retry interval in millisecond; note that vendor services stay at 100ms
Jiyong Park16c6e702020-11-13 20:53:12 +0900251 const useconds_t sleepTime = gSystemBootCompleted ? 1000 : 100;
Steven Moreland583685e2019-10-02 16:45:11 -0700252
Tom Cherry8fda97f2020-07-22 17:15:44 -0700253 ALOGI("Waiting for service '%s' on '%s'...", String8(name).string(),
254 ProcessState::self()->getDriverName().c_str());
255
Steven Moreland583685e2019-10-02 16:45:11 -0700256 int n = 0;
Tom Cherry8fda97f2020-07-22 17:15:44 -0700257 while (uptimeMillis() - startTime < timeout) {
Steven Moreland583685e2019-10-02 16:45:11 -0700258 n++;
Steven Moreland583685e2019-10-02 16:45:11 -0700259 usleep(1000*sleepTime);
Steven Moreland92b17c62019-04-02 15:46:24 -0700260
Yunfan Chen788e1c42018-03-29 16:52:09 +0900261 sp<IBinder> svc = checkService(name);
Tom Cherry8fda97f2020-07-22 17:15:44 -0700262 if (svc != nullptr) {
263 ALOGI("Waiting for service '%s' on '%s' successful after waiting %" PRIi64 "ms",
264 String8(name).string(), ProcessState::self()->getDriverName().c_str(),
265 uptimeMillis() - startTime);
266 return svc;
267 }
Steven Moreland583685e2019-10-02 16:45:11 -0700268 }
269 ALOGW("Service %s didn't start. Returning NULL", String8(name).string());
270 return nullptr;
271}
Yunfan Chen788e1c42018-03-29 16:52:09 +0900272
Steven Moreland583685e2019-10-02 16:45:11 -0700273sp<IBinder> ServiceManagerShim::checkService(const String16& name) const
274{
275 sp<IBinder> ret;
276 if (!mTheRealServiceManager->checkService(String8(name).c_str(), &ret).isOk()) {
277 return nullptr;
278 }
279 return ret;
280}
281
282status_t ServiceManagerShim::addService(const String16& name, const sp<IBinder>& service,
283 bool allowIsolated, int dumpsysPriority)
284{
285 Status status = mTheRealServiceManager->addService(
286 String8(name).c_str(), service, allowIsolated, dumpsysPriority);
287 return status.exceptionCode();
288}
289
290Vector<String16> ServiceManagerShim::listServices(int dumpsysPriority)
291{
292 std::vector<std::string> ret;
293 if (!mTheRealServiceManager->listServices(dumpsysPriority, &ret).isOk()) {
294 return {};
295 }
296
297 Vector<String16> res;
298 res.setCapacity(ret.size());
299 for (const std::string& name : ret) {
300 res.push(String16(name.c_str()));
301 }
302 return res;
303}
304
305sp<IBinder> ServiceManagerShim::waitForService(const String16& name16)
306{
307 class Waiter : public android::os::BnServiceCallback {
308 Status onRegistration(const std::string& /*name*/,
309 const sp<IBinder>& binder) override {
310 std::unique_lock<std::mutex> lock(mMutex);
311 mBinder = binder;
312 lock.unlock();
Jon Spivack9f503a42019-10-22 16:49:19 -0700313 // Flushing here helps ensure the service's ref count remains accurate
314 IPCThreadState::self()->flushCommands();
Steven Moreland583685e2019-10-02 16:45:11 -0700315 mCv.notify_one();
316 return Status::ok();
Yunfan Chen788e1c42018-03-29 16:52:09 +0900317 }
Steven Moreland583685e2019-10-02 16:45:11 -0700318 public:
319 sp<IBinder> mBinder;
320 std::mutex mMutex;
321 std::condition_variable mCv;
322 };
Yunfan Chen788e1c42018-03-29 16:52:09 +0900323
Jon Spivackfed6db42019-11-18 16:43:59 -0800324 // Simple RAII object to ensure a function call immediately before going out of scope
325 class Defer {
326 public:
Jiyong Park70072fd2020-11-13 17:19:14 +0900327 explicit Defer(std::function<void()>&& f) : mF(std::move(f)) {}
Jon Spivackfed6db42019-11-18 16:43:59 -0800328 ~Defer() { mF(); }
329 private:
330 std::function<void()> mF;
331 };
332
Steven Moreland583685e2019-10-02 16:45:11 -0700333 const std::string name = String8(name16).c_str();
Yunfan Chen788e1c42018-03-29 16:52:09 +0900334
Steven Moreland583685e2019-10-02 16:45:11 -0700335 sp<IBinder> out;
Yifan Hongf7760012021-06-04 16:04:42 -0700336 if (Status status = realGetService(name, &out); !status.isOk()) {
Steven Morelanda1d70172021-05-24 22:03:42 +0000337 ALOGW("Failed to getService in waitForService for %s: %s", name.c_str(),
338 status.toString8().c_str());
Steven Moreland583685e2019-10-02 16:45:11 -0700339 return nullptr;
340 }
Jon Spivackfed6db42019-11-18 16:43:59 -0800341 if (out != nullptr) return out;
Steven Moreland583685e2019-10-02 16:45:11 -0700342
Steven Moreland1a3a8ef2021-04-02 02:52:46 +0000343 sp<Waiter> waiter = sp<Waiter>::make();
Steven Morelanda1d70172021-05-24 22:03:42 +0000344 if (Status status = mTheRealServiceManager->registerForNotifications(name, waiter);
345 !status.isOk()) {
346 ALOGW("Failed to registerForNotifications in waitForService for %s: %s", name.c_str(),
347 status.toString8().c_str());
Yi Kongfdd8da92018-06-07 17:52:27 -0700348 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800349 }
Jon Spivackfed6db42019-11-18 16:43:59 -0800350 Defer unregister ([&] {
351 mTheRealServiceManager->unregisterForNotifications(name, waiter);
352 });
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700353
Steven Moreland583685e2019-10-02 16:45:11 -0700354 while(true) {
355 {
Steven Morelandf2677e22020-07-14 19:58:08 +0000356 // It would be really nice if we could read binder commands on this
357 // thread instead of needing a threadpool to be started, but for
358 // instance, if we call getAndExecuteCommand, it might be the case
359 // that another thread serves the callback, and we never get a
360 // command, so we hang indefinitely.
Steven Moreland583685e2019-10-02 16:45:11 -0700361 std::unique_lock<std::mutex> lock(waiter->mMutex);
362 using std::literals::chrono_literals::operator""s;
363 waiter->mCv.wait_for(lock, 1s, [&] {
364 return waiter->mBinder != nullptr;
365 });
366 if (waiter->mBinder != nullptr) return waiter->mBinder;
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700367 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800368
Steven Morelandf2677e22020-07-14 19:58:08 +0000369 ALOGW("Waited one second for %s (is service started? are binder threads started and available?)", name.c_str());
370
Steven Moreland583685e2019-10-02 16:45:11 -0700371 // Handle race condition for lazy services. Here is what can happen:
372 // - the service dies (not processed by init yet).
373 // - sm processes death notification.
374 // - sm gets getService and calls init to start service.
375 // - init gets the start signal, but the service already appears
376 // started, so it does nothing.
377 // - init gets death signal, but doesn't know it needs to restart
378 // the service
379 // - we need to request service again to get it to start
Yifan Hongf7760012021-06-04 16:04:42 -0700380 if (Status status = realGetService(name, &out); !status.isOk()) {
Steven Morelanda1d70172021-05-24 22:03:42 +0000381 ALOGW("Failed to getService in waitForService on later try for %s: %s", name.c_str(),
382 status.toString8().c_str());
Steven Moreland1c47b582019-08-27 18:05:27 -0700383 return nullptr;
384 }
Jon Spivackfed6db42019-11-18 16:43:59 -0800385 if (out != nullptr) return out;
Steven Moreland1c47b582019-08-27 18:05:27 -0700386 }
Steven Moreland583685e2019-10-02 16:45:11 -0700387}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800388
Steven Morelandb82b8f82019-10-28 10:52:34 -0700389bool ServiceManagerShim::isDeclared(const String16& name) {
390 bool declared;
Steven Morelanda1d70172021-05-24 22:03:42 +0000391 if (Status status = mTheRealServiceManager->isDeclared(String8(name).c_str(), &declared);
392 !status.isOk()) {
393 ALOGW("Failed to get isDeclard for %s: %s", String8(name).c_str(),
394 status.toString8().c_str());
Steven Morelandb82b8f82019-10-28 10:52:34 -0700395 return false;
396 }
397 return declared;
398}
399
Steven Moreland2e293aa2020-09-23 00:25:16 +0000400Vector<String16> ServiceManagerShim::getDeclaredInstances(const String16& interface) {
401 std::vector<std::string> out;
Steven Morelanda1d70172021-05-24 22:03:42 +0000402 if (Status status =
403 mTheRealServiceManager->getDeclaredInstances(String8(interface).c_str(), &out);
404 !status.isOk()) {
405 ALOGW("Failed to getDeclaredInstances for %s: %s", String8(interface).c_str(),
406 status.toString8().c_str());
Steven Moreland2e293aa2020-09-23 00:25:16 +0000407 return {};
408 }
409
410 Vector<String16> res;
411 res.setCapacity(out.size());
412 for (const std::string& instance : out) {
413 res.push(String16(instance.c_str()));
414 }
415 return res;
416}
417
Steven Morelandedd4e072021-04-21 00:27:29 +0000418std::optional<String16> ServiceManagerShim::updatableViaApex(const String16& name) {
419 std::optional<std::string> declared;
Steven Morelanda1d70172021-05-24 22:03:42 +0000420 if (Status status = mTheRealServiceManager->updatableViaApex(String8(name).c_str(), &declared);
421 !status.isOk()) {
422 ALOGW("Failed to get updatableViaApex for %s: %s", String8(name).c_str(),
423 status.toString8().c_str());
Steven Morelandedd4e072021-04-21 00:27:29 +0000424 return std::nullopt;
425 }
426 return declared ? std::optional<String16>(String16(declared.value().c_str())) : std::nullopt;
427}
428
Yifan Hongf7760012021-06-04 16:04:42 -0700429#ifndef __ANDROID__
430// ServiceManagerShim for host. Implements the old libbinder android::IServiceManager API.
431// The internal implementation of the AIDL interface android::os::IServiceManager calls into
432// on-device service manager.
433class ServiceManagerHostShim : public ServiceManagerShim {
434public:
435 using ServiceManagerShim::ServiceManagerShim;
436 // ServiceManagerShim::getService is based on checkService, so no need to override it.
437 sp<IBinder> checkService(const String16& name) const override {
438 return getDeviceService({String8(name).c_str()});
439 }
440
441protected:
442 // Override realGetService for ServiceManagerShim::waitForService.
443 Status realGetService(const std::string& name, sp<IBinder>* _aidl_return) {
444 *_aidl_return = getDeviceService({"-g", name});
445 return Status::ok();
446 }
447};
448sp<IServiceManager> createRpcDelegateServiceManager() {
449 auto binder = getDeviceService({"manager"});
450 if (binder == nullptr) {
451 ALOGE("getDeviceService(\"manager\") returns null");
452 return nullptr;
453 }
454 auto interface = AidlServiceManager::asInterface(binder);
455 if (interface == nullptr) {
456 ALOGE("getDeviceService(\"manager\") returns non service manager");
457 return nullptr;
458 }
459 return sp<ServiceManagerHostShim>::make(interface);
460}
461#endif
462
Steven Moreland61ff8492019-09-26 16:05:45 -0700463} // namespace android