The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2005 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #define LOG_TAG "ProcessState" |
| 18 | |
Mathias Agopian | c5b2c0b | 2009-05-19 19:08:10 -0700 | [diff] [blame] | 19 | #include <binder/ProcessState.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 20 | |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 21 | #include <android-base/result.h> |
Steven Moreland | 281abad | 2022-02-24 22:06:40 +0000 | [diff] [blame] | 22 | #include <android-base/strings.h> |
Mathias Agopian | c5b2c0b | 2009-05-19 19:08:10 -0700 | [diff] [blame] | 23 | #include <binder/BpBinder.h> |
| 24 | #include <binder/IPCThreadState.h> |
Steven Moreland | 2716e11 | 2018-02-23 14:57:20 -0800 | [diff] [blame] | 25 | #include <binder/IServiceManager.h> |
Steven Moreland | c709dd8 | 2019-08-05 20:30:14 -0700 | [diff] [blame] | 26 | #include <binder/Stability.h> |
Steven Moreland | 2716e11 | 2018-02-23 14:57:20 -0800 | [diff] [blame] | 27 | #include <cutils/atomic.h> |
Andrei Homescu | 8028ff4 | 2022-03-14 22:11:54 +0000 | [diff] [blame] | 28 | #include <utils/AndroidThreads.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 29 | #include <utils/Log.h> |
| 30 | #include <utils/String8.h> |
Andrei Homescu | 8028ff4 | 2022-03-14 22:11:54 +0000 | [diff] [blame] | 31 | #include <utils/Thread.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 32 | |
Steven Moreland | a4853cd | 2019-07-12 15:44:37 -0700 | [diff] [blame] | 33 | #include "Static.h" |
Steven Moreland | 6ba5a25 | 2021-05-04 22:49:00 +0000 | [diff] [blame] | 34 | #include "binder_module.h" |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 35 | |
| 36 | #include <errno.h> |
| 37 | #include <fcntl.h> |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 38 | #include <mutex> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 39 | #include <stdio.h> |
| 40 | #include <stdlib.h> |
| 41 | #include <unistd.h> |
| 42 | #include <sys/ioctl.h> |
| 43 | #include <sys/mman.h> |
| 44 | #include <sys/stat.h> |
Philip Cuadra | a082fa8 | 2016-04-08 10:29:14 -0700 | [diff] [blame] | 45 | #include <sys/types.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 46 | |
Steven Moreland | 072cc7e | 2019-07-12 21:01:54 +0000 | [diff] [blame] | 47 | #define BINDER_VM_SIZE ((1 * 1024 * 1024) - sysconf(_SC_PAGE_SIZE) * 2) |
Wale Ogunwale | 376b822 | 2015-04-13 16:16:10 -0700 | [diff] [blame] | 48 | #define DEFAULT_MAX_BINDER_THREADS 15 |
Hang Lu | b185ac0 | 2021-03-24 13:17:22 +0800 | [diff] [blame] | 49 | #define DEFAULT_ENABLE_ONEWAY_SPAM_DETECTION 1 |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 50 | |
Martijn Coenen | 7bca77a | 2019-03-13 11:51:08 +0000 | [diff] [blame] | 51 | #ifdef __ANDROID_VNDK__ |
| 52 | const char* kDefaultDriver = "/dev/vndbinder"; |
| 53 | #else |
Steven Moreland | 2ae2f5e | 2018-07-06 13:02:53 -0700 | [diff] [blame] | 54 | const char* kDefaultDriver = "/dev/binder"; |
Martijn Coenen | 7bca77a | 2019-03-13 11:51:08 +0000 | [diff] [blame] | 55 | #endif |
Steven Moreland | 2ae2f5e | 2018-07-06 13:02:53 -0700 | [diff] [blame] | 56 | |
Philip Cuadra | a082fa8 | 2016-04-08 10:29:14 -0700 | [diff] [blame] | 57 | // ------------------------------------------------------------------------- |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 58 | |
| 59 | namespace android { |
Wale Ogunwale | 376b822 | 2015-04-13 16:16:10 -0700 | [diff] [blame] | 60 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 61 | class PoolThread : public Thread |
| 62 | { |
| 63 | public: |
Chih-Hung Hsieh | e2347b7 | 2016-04-25 15:41:05 -0700 | [diff] [blame] | 64 | explicit PoolThread(bool isMain) |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 65 | : mIsMain(isMain) |
| 66 | { |
| 67 | } |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 68 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 69 | protected: |
| 70 | virtual bool threadLoop() |
| 71 | { |
| 72 | IPCThreadState::self()->joinThreadPool(mIsMain); |
| 73 | return false; |
| 74 | } |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 75 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 76 | const bool mIsMain; |
| 77 | }; |
| 78 | |
| 79 | sp<ProcessState> ProcessState::self() |
| 80 | { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 81 | return init(kDefaultDriver, false /*requireDefault*/); |
Martijn Coenen | 55d871c | 2017-03-21 15:56:40 -0700 | [diff] [blame] | 82 | } |
| 83 | |
| 84 | sp<ProcessState> ProcessState::initWithDriver(const char* driver) |
| 85 | { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 86 | return init(driver, true /*requireDefault*/); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 87 | } |
| 88 | |
Steven Moreland | 072cc7e | 2019-07-12 21:01:54 +0000 | [diff] [blame] | 89 | sp<ProcessState> ProcessState::selfOrNull() |
| 90 | { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 91 | return init(nullptr, false /*requireDefault*/); |
| 92 | } |
| 93 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 94 | [[clang::no_destroy]] static sp<ProcessState> gProcess; |
| 95 | [[clang::no_destroy]] static std::mutex gProcessMutex; |
| 96 | |
| 97 | static void verifyNotForked(bool forked) { |
Steven Moreland | bd98e0f | 2021-10-14 14:24:15 -0700 | [diff] [blame] | 98 | LOG_ALWAYS_FATAL_IF(forked, "libbinder ProcessState can not be used after fork"); |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 99 | } |
| 100 | |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 101 | sp<ProcessState> ProcessState::init(const char *driver, bool requireDefault) |
| 102 | { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 103 | |
| 104 | if (driver == nullptr) { |
| 105 | std::lock_guard<std::mutex> l(gProcessMutex); |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 106 | if (gProcess) { |
| 107 | verifyNotForked(gProcess->mForked); |
| 108 | } |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 109 | return gProcess; |
| 110 | } |
| 111 | |
| 112 | [[clang::no_destroy]] static std::once_flag gProcessOnce; |
| 113 | std::call_once(gProcessOnce, [&](){ |
| 114 | if (access(driver, R_OK) == -1) { |
| 115 | ALOGE("Binder driver %s is unavailable. Using /dev/binder instead.", driver); |
| 116 | driver = "/dev/binder"; |
| 117 | } |
| 118 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 119 | // we must install these before instantiating the gProcess object, |
| 120 | // otherwise this would race with creating it, and there could be the |
| 121 | // possibility of an invalid gProcess object forked by another thread |
| 122 | // before these are installed |
| 123 | int ret = pthread_atfork(ProcessState::onFork, ProcessState::parentPostFork, |
| 124 | ProcessState::childPostFork); |
| 125 | LOG_ALWAYS_FATAL_IF(ret != 0, "pthread_atfork error %s", strerror(ret)); |
| 126 | |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 127 | std::lock_guard<std::mutex> l(gProcessMutex); |
Steven Moreland | 1a3a8ef | 2021-04-02 02:52:46 +0000 | [diff] [blame] | 128 | gProcess = sp<ProcessState>::make(driver); |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 129 | }); |
| 130 | |
| 131 | if (requireDefault) { |
| 132 | // Detect if we are trying to initialize with a different driver, and |
| 133 | // consider that an error. ProcessState will only be initialized once above. |
| 134 | LOG_ALWAYS_FATAL_IF(gProcess->getDriverName() != driver, |
| 135 | "ProcessState was already initialized with %s," |
| 136 | " can't initialize with %s.", |
| 137 | gProcess->getDriverName().c_str(), driver); |
| 138 | } |
| 139 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 140 | verifyNotForked(gProcess->mForked); |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 141 | return gProcess; |
| 142 | } |
| 143 | |
Colin Cross | 6f4f3ab | 2014-02-05 17:42:44 -0800 | [diff] [blame] | 144 | sp<IBinder> ProcessState::getContextObject(const sp<IBinder>& /*caller*/) |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 145 | { |
Steven Moreland | c709dd8 | 2019-08-05 20:30:14 -0700 | [diff] [blame] | 146 | sp<IBinder> context = getStrongProxyForHandle(0); |
| 147 | |
Steven Moreland | 4da8fb0 | 2020-12-29 22:51:32 +0000 | [diff] [blame] | 148 | if (context) { |
| 149 | // The root object is special since we get it directly from the driver, it is never |
| 150 | // written by Parcell::writeStrongBinder. |
| 151 | internal::Stability::markCompilationUnit(context.get()); |
| 152 | } else { |
| 153 | ALOGW("Not able to get context object on %s.", mDriverName.c_str()); |
Steven Moreland | 8d93a71 | 2020-02-19 15:16:15 -0800 | [diff] [blame] | 154 | } |
| 155 | |
Steven Moreland | c709dd8 | 2019-08-05 20:30:14 -0700 | [diff] [blame] | 156 | return context; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 157 | } |
| 158 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 159 | void ProcessState::onFork() { |
| 160 | // make sure another thread isn't currently retrieving ProcessState |
| 161 | gProcessMutex.lock(); |
| 162 | } |
| 163 | |
| 164 | void ProcessState::parentPostFork() { |
| 165 | gProcessMutex.unlock(); |
| 166 | } |
| 167 | |
| 168 | void ProcessState::childPostFork() { |
| 169 | // another thread might call fork before gProcess is instantiated, but after |
| 170 | // the thread handler is installed |
| 171 | if (gProcess) { |
| 172 | gProcess->mForked = true; |
| 173 | } |
| 174 | gProcessMutex.unlock(); |
| 175 | } |
| 176 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 177 | void ProcessState::startThreadPool() |
| 178 | { |
| 179 | AutoMutex _l(mLock); |
| 180 | if (!mThreadPoolStarted) { |
Steven Moreland | f5a5bb8 | 2021-12-16 00:04:29 +0000 | [diff] [blame] | 181 | if (mMaxThreads == 0) { |
| 182 | ALOGW("Extra binder thread started, but 0 threads requested. Do not use " |
| 183 | "*startThreadPool when zero threads are requested."); |
| 184 | } |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 185 | mThreadPoolStarted = true; |
| 186 | spawnPooledThread(true); |
| 187 | } |
| 188 | } |
| 189 | |
Steven Moreland | 6109662 | 2020-08-31 23:36:39 +0000 | [diff] [blame] | 190 | bool ProcessState::becomeContextManager() |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 191 | { |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 192 | AutoMutex _l(mLock); |
Jeff Brown | e16986c | 2011-07-08 18:52:57 -0700 | [diff] [blame] | 193 | |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 194 | flat_binder_object obj { |
| 195 | .flags = FLAT_BINDER_FLAG_TXN_SECURITY_CTX, |
| 196 | }; |
Steven Moreland | 3085a47 | 2018-12-26 13:59:23 -0800 | [diff] [blame] | 197 | |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 198 | int result = ioctl(mDriverFD, BINDER_SET_CONTEXT_MGR_EXT, &obj); |
Steven Moreland | 3085a47 | 2018-12-26 13:59:23 -0800 | [diff] [blame] | 199 | |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 200 | // fallback to original method |
| 201 | if (result != 0) { |
| 202 | android_errorWriteLog(0x534e4554, "121035042"); |
Steven Moreland | 3085a47 | 2018-12-26 13:59:23 -0800 | [diff] [blame] | 203 | |
Hungming Chen | 28b4252 | 2020-08-28 17:29:55 +0800 | [diff] [blame] | 204 | int unused = 0; |
| 205 | result = ioctl(mDriverFD, BINDER_SET_CONTEXT_MGR, &unused); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 206 | } |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 207 | |
| 208 | if (result == -1) { |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 209 | ALOGE("Binder ioctl to become context manager failed: %s\n", strerror(errno)); |
| 210 | } |
| 211 | |
| 212 | return result == 0; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 213 | } |
| 214 | |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 215 | // Get references to userspace objects held by the kernel binder driver |
| 216 | // Writes up to count elements into buf, and returns the total number |
| 217 | // of references the kernel has, which may be larger than count. |
| 218 | // buf may be NULL if count is 0. The pointers returned by this method |
| 219 | // should only be used for debugging and not dereferenced, they may |
| 220 | // already be invalid. |
| 221 | ssize_t ProcessState::getKernelReferences(size_t buf_count, uintptr_t* buf) |
| 222 | { |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 223 | binder_node_debug_info info = {}; |
| 224 | |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 225 | uintptr_t* end = buf ? buf + buf_count : nullptr; |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 226 | size_t count = 0; |
| 227 | |
| 228 | do { |
| 229 | status_t result = ioctl(mDriverFD, BINDER_GET_NODE_DEBUG_INFO, &info); |
| 230 | if (result < 0) { |
| 231 | return -1; |
| 232 | } |
| 233 | if (info.ptr != 0) { |
| 234 | if (buf && buf < end) |
| 235 | *buf++ = info.ptr; |
| 236 | count++; |
| 237 | if (buf && buf < end) |
| 238 | *buf++ = info.cookie; |
| 239 | count++; |
| 240 | } |
| 241 | } while (info.ptr != 0); |
| 242 | |
| 243 | return count; |
| 244 | } |
| 245 | |
Jon Spivack | 902e6fc | 2019-10-18 21:22:37 -0700 | [diff] [blame] | 246 | // Queries the driver for the current strong reference count of the node |
| 247 | // that the handle points to. Can only be used by the servicemanager. |
| 248 | // |
| 249 | // Returns -1 in case of failure, otherwise the strong reference count. |
Steven Moreland | e839388 | 2020-12-18 02:27:20 +0000 | [diff] [blame] | 250 | ssize_t ProcessState::getStrongRefCountForNode(const sp<BpBinder>& binder) { |
Steven Moreland | 5553ac4 | 2020-11-11 02:14:45 +0000 | [diff] [blame] | 251 | if (binder->isRpcBinder()) return -1; |
| 252 | |
Jon Spivack | 902e6fc | 2019-10-18 21:22:37 -0700 | [diff] [blame] | 253 | binder_node_info_for_ref info; |
| 254 | memset(&info, 0, sizeof(binder_node_info_for_ref)); |
| 255 | |
Steven Moreland | 9915762 | 2021-09-13 16:27:34 -0700 | [diff] [blame] | 256 | info.handle = binder->getPrivateAccessor().binderHandle(); |
Jon Spivack | 902e6fc | 2019-10-18 21:22:37 -0700 | [diff] [blame] | 257 | |
| 258 | status_t result = ioctl(mDriverFD, BINDER_GET_NODE_INFO_FOR_REF, &info); |
| 259 | |
| 260 | if (result != OK) { |
| 261 | static bool logged = false; |
| 262 | if (!logged) { |
| 263 | ALOGW("Kernel does not support BINDER_GET_NODE_INFO_FOR_REF."); |
| 264 | logged = true; |
| 265 | } |
| 266 | return -1; |
| 267 | } |
| 268 | |
| 269 | return info.strong_count; |
| 270 | } |
| 271 | |
Steven Moreland | 7732a09 | 2019-01-02 17:54:16 -0800 | [diff] [blame] | 272 | void ProcessState::setCallRestriction(CallRestriction restriction) { |
Steven Moreland | 28723ae | 2019-04-01 18:52:30 -0700 | [diff] [blame] | 273 | LOG_ALWAYS_FATAL_IF(IPCThreadState::selfOrNull() != nullptr, |
| 274 | "Call restrictions must be set before the threadpool is started."); |
Steven Moreland | 7732a09 | 2019-01-02 17:54:16 -0800 | [diff] [blame] | 275 | |
| 276 | mCallRestriction = restriction; |
| 277 | } |
| 278 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 279 | ProcessState::handle_entry* ProcessState::lookupHandleLocked(int32_t handle) |
| 280 | { |
| 281 | const size_t N=mHandleToObject.size(); |
| 282 | if (N <= (size_t)handle) { |
| 283 | handle_entry e; |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 284 | e.binder = nullptr; |
| 285 | e.refs = nullptr; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 286 | status_t err = mHandleToObject.insertAt(e, N, handle+1-N); |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 287 | if (err < NO_ERROR) return nullptr; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 288 | } |
| 289 | return &mHandleToObject.editItemAt(handle); |
| 290 | } |
| 291 | |
| 292 | sp<IBinder> ProcessState::getStrongProxyForHandle(int32_t handle) |
| 293 | { |
| 294 | sp<IBinder> result; |
| 295 | |
| 296 | AutoMutex _l(mLock); |
| 297 | |
| 298 | handle_entry* e = lookupHandleLocked(handle); |
| 299 | |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 300 | if (e != nullptr) { |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 301 | // We need to create a new BpBinder if there isn't currently one, OR we |
Steven Moreland | e171d62 | 2019-07-17 16:06:01 -0700 | [diff] [blame] | 302 | // are unable to acquire a weak reference on this current one. The |
| 303 | // attemptIncWeak() is safe because we know the BpBinder destructor will always |
| 304 | // call expungeHandle(), which acquires the same lock we are holding now. |
| 305 | // We need to do this because there is a race condition between someone |
| 306 | // releasing a reference on this BpBinder, and a new reference on its handle |
| 307 | // arriving from the driver. |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 308 | IBinder* b = e->binder; |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 309 | if (b == nullptr || !e->refs->attemptIncWeak(this)) { |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 310 | if (handle == 0) { |
| 311 | // Special case for context manager... |
| 312 | // The context manager is the only object for which we create |
| 313 | // a BpBinder proxy without already holding a reference. |
| 314 | // Perform a dummy transaction to ensure the context manager |
| 315 | // is registered before we create the first local reference |
| 316 | // to it (which will occur when creating the BpBinder). |
| 317 | // If a local reference is created for the BpBinder when the |
| 318 | // context manager is not present, the driver will fail to |
| 319 | // provide a reference to the context manager, but the |
| 320 | // driver API does not return status. |
| 321 | // |
| 322 | // Note that this is not race-free if the context manager |
| 323 | // dies while this code runs. |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 324 | |
Steven Moreland | 9514b20 | 2020-09-21 18:03:27 +0000 | [diff] [blame] | 325 | IPCThreadState* ipc = IPCThreadState::self(); |
| 326 | |
| 327 | CallRestriction originalCallRestriction = ipc->getCallRestriction(); |
| 328 | ipc->setCallRestriction(CallRestriction::NONE); |
| 329 | |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 330 | Parcel data; |
Steven Moreland | 9514b20 | 2020-09-21 18:03:27 +0000 | [diff] [blame] | 331 | status_t status = ipc->transact( |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 332 | 0, IBinder::PING_TRANSACTION, data, nullptr, 0); |
Steven Moreland | 9514b20 | 2020-09-21 18:03:27 +0000 | [diff] [blame] | 333 | |
| 334 | ipc->setCallRestriction(originalCallRestriction); |
| 335 | |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 336 | if (status == DEAD_OBJECT) |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 337 | return nullptr; |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 338 | } |
| 339 | |
Steven Moreland | 9915762 | 2021-09-13 16:27:34 -0700 | [diff] [blame] | 340 | sp<BpBinder> b = BpBinder::PrivateAccessor::create(handle); |
Steven Moreland | 1a3a8ef | 2021-04-02 02:52:46 +0000 | [diff] [blame] | 341 | e->binder = b.get(); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 342 | if (b) e->refs = b->getWeakRefs(); |
| 343 | result = b; |
| 344 | } else { |
| 345 | // This little bit of nastyness is to allow us to add a primary |
| 346 | // reference to the remote proxy when this team doesn't have one |
| 347 | // but another team is sending the handle to us. |
| 348 | result.force_set(b); |
| 349 | e->refs->decWeak(this); |
| 350 | } |
| 351 | } |
| 352 | |
| 353 | return result; |
| 354 | } |
| 355 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 356 | void ProcessState::expungeHandle(int32_t handle, IBinder* binder) |
| 357 | { |
| 358 | AutoMutex _l(mLock); |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 359 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 360 | handle_entry* e = lookupHandleLocked(handle); |
| 361 | |
| 362 | // This handle may have already been replaced with a new BpBinder |
| 363 | // (if someone failed the AttemptIncWeak() above); we don't want |
| 364 | // to overwrite it. |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 365 | if (e && e->binder == binder) e->binder = nullptr; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 366 | } |
| 367 | |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 368 | String8 ProcessState::makeBinderThreadName() { |
| 369 | int32_t s = android_atomic_add(1, &mThreadPoolSeq); |
Philip Cuadra | a082fa8 | 2016-04-08 10:29:14 -0700 | [diff] [blame] | 370 | pid_t pid = getpid(); |
Steven Moreland | 281abad | 2022-02-24 22:06:40 +0000 | [diff] [blame] | 371 | |
| 372 | std::string_view driverName = mDriverName.c_str(); |
| 373 | android::base::ConsumePrefix(&driverName, "/dev/"); |
| 374 | |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 375 | String8 name; |
Steven Moreland | 281abad | 2022-02-24 22:06:40 +0000 | [diff] [blame] | 376 | name.appendFormat("%.*s:%d_%X", static_cast<int>(driverName.length()), driverName.data(), pid, |
| 377 | s); |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 378 | return name; |
| 379 | } |
| 380 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 381 | void ProcessState::spawnPooledThread(bool isMain) |
| 382 | { |
| 383 | if (mThreadPoolStarted) { |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 384 | String8 name = makeBinderThreadName(); |
| 385 | ALOGV("Spawning new pooled thread, name=%s\n", name.string()); |
Steven Moreland | 1a3a8ef | 2021-04-02 02:52:46 +0000 | [diff] [blame] | 386 | sp<Thread> t = sp<PoolThread>::make(isMain); |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 387 | t->run(name.string()); |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame^] | 388 | mKernelStartedThreads++; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 389 | } |
| 390 | } |
| 391 | |
Mathias Agopian | 1b80f79 | 2012-04-17 16:11:08 -0700 | [diff] [blame] | 392 | status_t ProcessState::setThreadPoolMaxThreadCount(size_t maxThreads) { |
Steven Moreland | 1fdb98b | 2020-03-06 21:42:12 +0000 | [diff] [blame] | 393 | LOG_ALWAYS_FATAL_IF(mThreadPoolStarted && maxThreads < mMaxThreads, |
| 394 | "Binder threadpool cannot be shrunk after starting"); |
Mathias Agopian | 1b80f79 | 2012-04-17 16:11:08 -0700 | [diff] [blame] | 395 | status_t result = NO_ERROR; |
Wale Ogunwale | 376b822 | 2015-04-13 16:16:10 -0700 | [diff] [blame] | 396 | if (ioctl(mDriverFD, BINDER_SET_MAX_THREADS, &maxThreads) != -1) { |
| 397 | mMaxThreads = maxThreads; |
| 398 | } else { |
Mathias Agopian | 1b80f79 | 2012-04-17 16:11:08 -0700 | [diff] [blame] | 399 | result = -errno; |
| 400 | ALOGE("Binder ioctl to set max threads failed: %s", strerror(-result)); |
| 401 | } |
| 402 | return result; |
| 403 | } |
| 404 | |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame^] | 405 | size_t ProcessState::getThreadPoolMaxTotalThreadCount() const { |
Yifan Hong | 84bedeb | 2021-04-21 21:37:17 -0700 | [diff] [blame] | 406 | // may actually be one more than this, if join is called |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame^] | 407 | if (mThreadPoolStarted) { |
| 408 | return mCurrentThreads < mKernelStartedThreads |
| 409 | ? mMaxThreads |
| 410 | : mMaxThreads + mCurrentThreads - mKernelStartedThreads; |
| 411 | } |
Yifan Hong | 84bedeb | 2021-04-21 21:37:17 -0700 | [diff] [blame] | 412 | // must not be initialized or maybe has poll thread setup, we |
| 413 | // currently don't track this in libbinder |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame^] | 414 | LOG_ALWAYS_FATAL_IF(mKernelStartedThreads != 0, |
| 415 | "Expecting 0 kernel started threads but have" |
| 416 | " %zu", |
| 417 | mKernelStartedThreads); |
| 418 | return mCurrentThreads; |
Yifan Hong | 84bedeb | 2021-04-21 21:37:17 -0700 | [diff] [blame] | 419 | } |
| 420 | |
Carlos Llamas | 4f88670 | 2022-03-07 22:07:03 -0800 | [diff] [blame] | 421 | #define DRIVER_FEATURES_PATH "/dev/binderfs/features/" |
| 422 | bool ProcessState::isDriverFeatureEnabled(const DriverFeature feature) { |
| 423 | static const char* const names[] = { |
| 424 | [static_cast<int>(DriverFeature::ONEWAY_SPAM_DETECTION)] = |
| 425 | DRIVER_FEATURES_PATH "oneway_spam_detection", |
Carlos Llamas | b235b12 | 2021-12-20 06:38:44 -0800 | [diff] [blame] | 426 | [static_cast<int>(DriverFeature::EXTENDED_ERROR)] = |
| 427 | DRIVER_FEATURES_PATH "extended_error", |
Carlos Llamas | 4f88670 | 2022-03-07 22:07:03 -0800 | [diff] [blame] | 428 | }; |
| 429 | int fd = open(names[static_cast<int>(feature)], O_RDONLY | O_CLOEXEC); |
| 430 | char on; |
| 431 | if (fd == -1) { |
| 432 | ALOGE_IF(errno != ENOENT, "%s: cannot open %s: %s", __func__, |
| 433 | names[static_cast<int>(feature)], strerror(errno)); |
| 434 | return false; |
| 435 | } |
| 436 | if (read(fd, &on, sizeof(on)) == -1) { |
| 437 | ALOGE("%s: error reading to %s: %s", __func__, |
| 438 | names[static_cast<int>(feature)], strerror(errno)); |
| 439 | return false; |
| 440 | } |
| 441 | close(fd); |
| 442 | return on == '1'; |
| 443 | } |
| 444 | |
Hang Lu | b185ac0 | 2021-03-24 13:17:22 +0800 | [diff] [blame] | 445 | status_t ProcessState::enableOnewaySpamDetection(bool enable) { |
| 446 | uint32_t enableDetection = enable ? 1 : 0; |
| 447 | if (ioctl(mDriverFD, BINDER_ENABLE_ONEWAY_SPAM_DETECTION, &enableDetection) == -1) { |
Martijn Coenen | de0a39e | 2021-04-22 14:38:46 +0200 | [diff] [blame] | 448 | ALOGI("Binder ioctl to enable oneway spam detection failed: %s", strerror(errno)); |
Hang Lu | b185ac0 | 2021-03-24 13:17:22 +0800 | [diff] [blame] | 449 | return -errno; |
| 450 | } |
| 451 | return NO_ERROR; |
| 452 | } |
| 453 | |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 454 | void ProcessState::giveThreadPoolName() { |
| 455 | androidSetThreadName( makeBinderThreadName().string() ); |
| 456 | } |
| 457 | |
Iliyan Malchev | 3206224 | 2017-04-10 14:06:11 -0700 | [diff] [blame] | 458 | String8 ProcessState::getDriverName() { |
| 459 | return mDriverName; |
| 460 | } |
| 461 | |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 462 | static base::Result<int> open_driver(const char* driver) { |
Martijn Coenen | 55d871c | 2017-03-21 15:56:40 -0700 | [diff] [blame] | 463 | int fd = open(driver, O_RDWR | O_CLOEXEC); |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 464 | if (fd < 0) { |
| 465 | return base::ErrnoError() << "Opening '" << driver << "' failed"; |
| 466 | } |
| 467 | int vers = 0; |
| 468 | status_t result = ioctl(fd, BINDER_VERSION, &vers); |
| 469 | if (result == -1) { |
| 470 | close(fd); |
| 471 | return base::ErrnoError() << "Binder ioctl to obtain version failed"; |
| 472 | } |
| 473 | if (result != 0 || vers != BINDER_CURRENT_PROTOCOL_VERSION) { |
| 474 | close(fd); |
| 475 | return base::Error() << "Binder driver protocol(" << vers |
| 476 | << ") does not match user space protocol(" |
| 477 | << BINDER_CURRENT_PROTOCOL_VERSION |
| 478 | << ")! ioctl() return value: " << result; |
| 479 | } |
| 480 | size_t maxThreads = DEFAULT_MAX_BINDER_THREADS; |
| 481 | result = ioctl(fd, BINDER_SET_MAX_THREADS, &maxThreads); |
| 482 | if (result == -1) { |
| 483 | ALOGE("Binder ioctl to set max threads failed: %s", strerror(errno)); |
| 484 | } |
| 485 | uint32_t enable = DEFAULT_ENABLE_ONEWAY_SPAM_DETECTION; |
| 486 | result = ioctl(fd, BINDER_ENABLE_ONEWAY_SPAM_DETECTION, &enable); |
| 487 | if (result == -1) { |
Carlos Llamas | 4f88670 | 2022-03-07 22:07:03 -0800 | [diff] [blame] | 488 | ALOGE_IF(ProcessState::isDriverFeatureEnabled( |
| 489 | ProcessState::DriverFeature::ONEWAY_SPAM_DETECTION), |
| 490 | "Binder ioctl to enable oneway spam detection failed: %s", strerror(errno)); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 491 | } |
| 492 | return fd; |
| 493 | } |
| 494 | |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 495 | ProcessState::ProcessState(const char* driver) |
| 496 | : mDriverName(String8(driver)), |
| 497 | mDriverFD(-1), |
| 498 | mVMStart(MAP_FAILED), |
| 499 | mThreadCountLock(PTHREAD_MUTEX_INITIALIZER), |
| 500 | mThreadCountDecrement(PTHREAD_COND_INITIALIZER), |
| 501 | mExecutingThreadsCount(0), |
| 502 | mWaitingForThreads(0), |
| 503 | mMaxThreads(DEFAULT_MAX_BINDER_THREADS), |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame^] | 504 | mCurrentThreads(0), |
| 505 | mKernelStartedThreads(0), |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 506 | mStarvationStartTimeMs(0), |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 507 | mForked(false), |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 508 | mThreadPoolStarted(false), |
| 509 | mThreadPoolSeq(1), |
| 510 | mCallRestriction(CallRestriction::NONE) { |
| 511 | base::Result<int> opened = open_driver(driver); |
| 512 | |
| 513 | if (opened.ok()) { |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 514 | // mmap the binder, providing a chunk of virtual address space to receive transactions. |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 515 | mVMStart = mmap(nullptr, BINDER_VM_SIZE, PROT_READ, MAP_PRIVATE | MAP_NORESERVE, |
| 516 | opened.value(), 0); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 517 | if (mVMStart == MAP_FAILED) { |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 518 | close(opened.value()); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 519 | // *sigh* |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 520 | opened = base::Error() |
| 521 | << "Using " << driver << " failed: unable to mmap transaction memory."; |
Iliyan Malchev | 3206224 | 2017-04-10 14:06:11 -0700 | [diff] [blame] | 522 | mDriverName.clear(); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 523 | } |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 524 | } |
Jeff Brown | e16986c | 2011-07-08 18:52:57 -0700 | [diff] [blame] | 525 | |
Steven Moreland | 24bc0d1 | 2019-10-11 12:29:20 -0700 | [diff] [blame] | 526 | #ifdef __ANDROID__ |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 527 | LOG_ALWAYS_FATAL_IF(!opened.ok(), "Binder driver '%s' could not be opened. Terminating: %s", |
| 528 | driver, opened.error().message().c_str()); |
Steven Moreland | 24bc0d1 | 2019-10-11 12:29:20 -0700 | [diff] [blame] | 529 | #endif |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 530 | |
| 531 | if (opened.ok()) { |
| 532 | mDriverFD = opened.value(); |
| 533 | } |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 534 | } |
| 535 | |
| 536 | ProcessState::~ProcessState() |
| 537 | { |
zhongjie | ff40578 | 2016-03-09 15:05:04 +0800 | [diff] [blame] | 538 | if (mDriverFD >= 0) { |
| 539 | if (mVMStart != MAP_FAILED) { |
Steven Moreland | 072cc7e | 2019-07-12 21:01:54 +0000 | [diff] [blame] | 540 | munmap(mVMStart, BINDER_VM_SIZE); |
zhongjie | ff40578 | 2016-03-09 15:05:04 +0800 | [diff] [blame] | 541 | } |
| 542 | close(mDriverFD); |
| 543 | } |
| 544 | mDriverFD = -1; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 545 | } |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 546 | |
Steven Moreland | 61ff849 | 2019-09-26 16:05:45 -0700 | [diff] [blame] | 547 | } // namespace android |