The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2005 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #define LOG_TAG "ProcessState" |
| 18 | |
Mathias Agopian | c5b2c0b | 2009-05-19 19:08:10 -0700 | [diff] [blame] | 19 | #include <binder/ProcessState.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 20 | |
Sebastian Pickl | 25c1a3b | 2023-10-30 08:02:24 +0000 | [diff] [blame] | 21 | #include <android-base/scopeguard.h> |
Steven Moreland | 281abad | 2022-02-24 22:06:40 +0000 | [diff] [blame] | 22 | #include <android-base/strings.h> |
Mathias Agopian | c5b2c0b | 2009-05-19 19:08:10 -0700 | [diff] [blame] | 23 | #include <binder/BpBinder.h> |
| 24 | #include <binder/IPCThreadState.h> |
Steven Moreland | 2716e11 | 2018-02-23 14:57:20 -0800 | [diff] [blame] | 25 | #include <binder/IServiceManager.h> |
Steven Moreland | c709dd8 | 2019-08-05 20:30:14 -0700 | [diff] [blame] | 26 | #include <binder/Stability.h> |
Steven Moreland | 2716e11 | 2018-02-23 14:57:20 -0800 | [diff] [blame] | 27 | #include <cutils/atomic.h> |
Andrei Homescu | 8028ff4 | 2022-03-14 22:11:54 +0000 | [diff] [blame] | 28 | #include <utils/AndroidThreads.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 29 | #include <utils/Log.h> |
| 30 | #include <utils/String8.h> |
Andrei Homescu | 8028ff4 | 2022-03-14 22:11:54 +0000 | [diff] [blame] | 31 | #include <utils/Thread.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 32 | |
Steven Moreland | a4853cd | 2019-07-12 15:44:37 -0700 | [diff] [blame] | 33 | #include "Static.h" |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 34 | #include "Utils.h" |
Steven Moreland | 6ba5a25 | 2021-05-04 22:49:00 +0000 | [diff] [blame] | 35 | #include "binder_module.h" |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 36 | |
| 37 | #include <errno.h> |
| 38 | #include <fcntl.h> |
Elie Kheirallah | c2f5a7e | 2022-05-27 22:43:40 +0000 | [diff] [blame] | 39 | #include <pthread.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 40 | #include <stdio.h> |
| 41 | #include <stdlib.h> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 42 | #include <sys/ioctl.h> |
| 43 | #include <sys/mman.h> |
| 44 | #include <sys/stat.h> |
Philip Cuadra | a082fa8 | 2016-04-08 10:29:14 -0700 | [diff] [blame] | 45 | #include <sys/types.h> |
Elie Kheirallah | c2f5a7e | 2022-05-27 22:43:40 +0000 | [diff] [blame] | 46 | #include <unistd.h> |
| 47 | #include <mutex> |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 48 | |
Steven Moreland | 072cc7e | 2019-07-12 21:01:54 +0000 | [diff] [blame] | 49 | #define BINDER_VM_SIZE ((1 * 1024 * 1024) - sysconf(_SC_PAGE_SIZE) * 2) |
Wale Ogunwale | 376b822 | 2015-04-13 16:16:10 -0700 | [diff] [blame] | 50 | #define DEFAULT_MAX_BINDER_THREADS 15 |
Hang Lu | b185ac0 | 2021-03-24 13:17:22 +0800 | [diff] [blame] | 51 | #define DEFAULT_ENABLE_ONEWAY_SPAM_DETECTION 1 |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 52 | |
Martijn Coenen | 7bca77a | 2019-03-13 11:51:08 +0000 | [diff] [blame] | 53 | #ifdef __ANDROID_VNDK__ |
| 54 | const char* kDefaultDriver = "/dev/vndbinder"; |
| 55 | #else |
Steven Moreland | 2ae2f5e | 2018-07-06 13:02:53 -0700 | [diff] [blame] | 56 | const char* kDefaultDriver = "/dev/binder"; |
Martijn Coenen | 7bca77a | 2019-03-13 11:51:08 +0000 | [diff] [blame] | 57 | #endif |
Steven Moreland | 2ae2f5e | 2018-07-06 13:02:53 -0700 | [diff] [blame] | 58 | |
Philip Cuadra | a082fa8 | 2016-04-08 10:29:14 -0700 | [diff] [blame] | 59 | // ------------------------------------------------------------------------- |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 60 | |
| 61 | namespace android { |
Wale Ogunwale | 376b822 | 2015-04-13 16:16:10 -0700 | [diff] [blame] | 62 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 63 | class PoolThread : public Thread |
| 64 | { |
| 65 | public: |
Chih-Hung Hsieh | e2347b7 | 2016-04-25 15:41:05 -0700 | [diff] [blame] | 66 | explicit PoolThread(bool isMain) |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 67 | : mIsMain(isMain) |
| 68 | { |
| 69 | } |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 70 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 71 | protected: |
| 72 | virtual bool threadLoop() |
| 73 | { |
| 74 | IPCThreadState::self()->joinThreadPool(mIsMain); |
| 75 | return false; |
| 76 | } |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 77 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 78 | const bool mIsMain; |
| 79 | }; |
| 80 | |
| 81 | sp<ProcessState> ProcessState::self() |
| 82 | { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 83 | return init(kDefaultDriver, false /*requireDefault*/); |
Martijn Coenen | 55d871c | 2017-03-21 15:56:40 -0700 | [diff] [blame] | 84 | } |
| 85 | |
| 86 | sp<ProcessState> ProcessState::initWithDriver(const char* driver) |
| 87 | { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 88 | return init(driver, true /*requireDefault*/); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 89 | } |
| 90 | |
Steven Moreland | 072cc7e | 2019-07-12 21:01:54 +0000 | [diff] [blame] | 91 | sp<ProcessState> ProcessState::selfOrNull() |
| 92 | { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 93 | return init(nullptr, false /*requireDefault*/); |
| 94 | } |
| 95 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 96 | [[clang::no_destroy]] static sp<ProcessState> gProcess; |
| 97 | [[clang::no_destroy]] static std::mutex gProcessMutex; |
| 98 | |
| 99 | static void verifyNotForked(bool forked) { |
Steven Moreland | bd98e0f | 2021-10-14 14:24:15 -0700 | [diff] [blame] | 100 | LOG_ALWAYS_FATAL_IF(forked, "libbinder ProcessState can not be used after fork"); |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 101 | } |
| 102 | |
Steven Moreland | 9a4278e | 2023-02-14 01:33:39 +0000 | [diff] [blame] | 103 | bool ProcessState::isVndservicemanagerEnabled() { |
| 104 | return access("/vendor/bin/vndservicemanager", R_OK) == 0; |
| 105 | } |
| 106 | |
Steven Moreland | 68275d7 | 2023-04-21 22:12:45 +0000 | [diff] [blame] | 107 | sp<ProcessState> ProcessState::init(const char* driver, bool requireDefault) { |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 108 | if (driver == nullptr) { |
| 109 | std::lock_guard<std::mutex> l(gProcessMutex); |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 110 | if (gProcess) { |
| 111 | verifyNotForked(gProcess->mForked); |
| 112 | } |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 113 | return gProcess; |
| 114 | } |
| 115 | |
| 116 | [[clang::no_destroy]] static std::once_flag gProcessOnce; |
| 117 | std::call_once(gProcessOnce, [&](){ |
| 118 | if (access(driver, R_OK) == -1) { |
| 119 | ALOGE("Binder driver %s is unavailable. Using /dev/binder instead.", driver); |
| 120 | driver = "/dev/binder"; |
| 121 | } |
| 122 | |
Steven Moreland | 9a4278e | 2023-02-14 01:33:39 +0000 | [diff] [blame] | 123 | if (0 == strcmp(driver, "/dev/vndbinder") && !isVndservicemanagerEnabled()) { |
| 124 | ALOGE("vndservicemanager is not started on this device, you can save resources/threads " |
| 125 | "by not initializing ProcessState with /dev/vndbinder."); |
| 126 | } |
| 127 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 128 | // we must install these before instantiating the gProcess object, |
| 129 | // otherwise this would race with creating it, and there could be the |
| 130 | // possibility of an invalid gProcess object forked by another thread |
| 131 | // before these are installed |
| 132 | int ret = pthread_atfork(ProcessState::onFork, ProcessState::parentPostFork, |
| 133 | ProcessState::childPostFork); |
| 134 | LOG_ALWAYS_FATAL_IF(ret != 0, "pthread_atfork error %s", strerror(ret)); |
| 135 | |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 136 | std::lock_guard<std::mutex> l(gProcessMutex); |
Steven Moreland | 1a3a8ef | 2021-04-02 02:52:46 +0000 | [diff] [blame] | 137 | gProcess = sp<ProcessState>::make(driver); |
Steven Moreland | 4fdb12f | 2020-07-21 02:21:48 +0000 | [diff] [blame] | 138 | }); |
| 139 | |
| 140 | if (requireDefault) { |
| 141 | // Detect if we are trying to initialize with a different driver, and |
| 142 | // consider that an error. ProcessState will only be initialized once above. |
| 143 | LOG_ALWAYS_FATAL_IF(gProcess->getDriverName() != driver, |
| 144 | "ProcessState was already initialized with %s," |
| 145 | " can't initialize with %s.", |
| 146 | gProcess->getDriverName().c_str(), driver); |
| 147 | } |
| 148 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 149 | verifyNotForked(gProcess->mForked); |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 150 | return gProcess; |
| 151 | } |
| 152 | |
Colin Cross | 6f4f3ab | 2014-02-05 17:42:44 -0800 | [diff] [blame] | 153 | sp<IBinder> ProcessState::getContextObject(const sp<IBinder>& /*caller*/) |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 154 | { |
Steven Moreland | c709dd8 | 2019-08-05 20:30:14 -0700 | [diff] [blame] | 155 | sp<IBinder> context = getStrongProxyForHandle(0); |
| 156 | |
Steven Moreland | 4da8fb0 | 2020-12-29 22:51:32 +0000 | [diff] [blame] | 157 | if (context) { |
| 158 | // The root object is special since we get it directly from the driver, it is never |
| 159 | // written by Parcell::writeStrongBinder. |
| 160 | internal::Stability::markCompilationUnit(context.get()); |
| 161 | } else { |
| 162 | ALOGW("Not able to get context object on %s.", mDriverName.c_str()); |
Steven Moreland | 8d93a71 | 2020-02-19 15:16:15 -0800 | [diff] [blame] | 163 | } |
| 164 | |
Steven Moreland | c709dd8 | 2019-08-05 20:30:14 -0700 | [diff] [blame] | 165 | return context; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 166 | } |
| 167 | |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 168 | void ProcessState::onFork() { |
| 169 | // make sure another thread isn't currently retrieving ProcessState |
| 170 | gProcessMutex.lock(); |
| 171 | } |
| 172 | |
| 173 | void ProcessState::parentPostFork() { |
| 174 | gProcessMutex.unlock(); |
| 175 | } |
| 176 | |
| 177 | void ProcessState::childPostFork() { |
| 178 | // another thread might call fork before gProcess is instantiated, but after |
| 179 | // the thread handler is installed |
| 180 | if (gProcess) { |
| 181 | gProcess->mForked = true; |
Steven Moreland | df732ba | 2022-05-18 22:04:49 +0000 | [diff] [blame] | 182 | |
| 183 | // "O_CLOFORK" |
| 184 | close(gProcess->mDriverFD); |
| 185 | gProcess->mDriverFD = -1; |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 186 | } |
| 187 | gProcessMutex.unlock(); |
| 188 | } |
| 189 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 190 | void ProcessState::startThreadPool() |
| 191 | { |
Tomasz Wasilczyk | 66ee192 | 2023-10-26 14:53:49 -0700 | [diff] [blame] | 192 | std::unique_lock<std::mutex> _l(mLock); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 193 | if (!mThreadPoolStarted) { |
Steven Moreland | f5a5bb8 | 2021-12-16 00:04:29 +0000 | [diff] [blame] | 194 | if (mMaxThreads == 0) { |
Steven Moreland | 3e9debc | 2023-06-15 00:35:29 +0000 | [diff] [blame] | 195 | // see also getThreadPoolMaxTotalThreadCount |
Steven Moreland | f5a5bb8 | 2021-12-16 00:04:29 +0000 | [diff] [blame] | 196 | ALOGW("Extra binder thread started, but 0 threads requested. Do not use " |
| 197 | "*startThreadPool when zero threads are requested."); |
| 198 | } |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 199 | mThreadPoolStarted = true; |
| 200 | spawnPooledThread(true); |
| 201 | } |
| 202 | } |
| 203 | |
Steven Moreland | 6109662 | 2020-08-31 23:36:39 +0000 | [diff] [blame] | 204 | bool ProcessState::becomeContextManager() |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 205 | { |
Tomasz Wasilczyk | 66ee192 | 2023-10-26 14:53:49 -0700 | [diff] [blame] | 206 | std::unique_lock<std::mutex> _l(mLock); |
Jeff Brown | e16986c | 2011-07-08 18:52:57 -0700 | [diff] [blame] | 207 | |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 208 | flat_binder_object obj { |
| 209 | .flags = FLAT_BINDER_FLAG_TXN_SECURITY_CTX, |
| 210 | }; |
Steven Moreland | 3085a47 | 2018-12-26 13:59:23 -0800 | [diff] [blame] | 211 | |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 212 | int result = ioctl(mDriverFD, BINDER_SET_CONTEXT_MGR_EXT, &obj); |
Steven Moreland | 3085a47 | 2018-12-26 13:59:23 -0800 | [diff] [blame] | 213 | |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 214 | // fallback to original method |
| 215 | if (result != 0) { |
| 216 | android_errorWriteLog(0x534e4554, "121035042"); |
Steven Moreland | 3085a47 | 2018-12-26 13:59:23 -0800 | [diff] [blame] | 217 | |
Hungming Chen | 28b4252 | 2020-08-28 17:29:55 +0800 | [diff] [blame] | 218 | int unused = 0; |
| 219 | result = ioctl(mDriverFD, BINDER_SET_CONTEXT_MGR, &unused); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 220 | } |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 221 | |
| 222 | if (result == -1) { |
Steven Moreland | 4411d71 | 2019-07-12 14:02:53 -0700 | [diff] [blame] | 223 | ALOGE("Binder ioctl to become context manager failed: %s\n", strerror(errno)); |
| 224 | } |
| 225 | |
| 226 | return result == 0; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 227 | } |
| 228 | |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 229 | // Get references to userspace objects held by the kernel binder driver |
| 230 | // Writes up to count elements into buf, and returns the total number |
| 231 | // of references the kernel has, which may be larger than count. |
| 232 | // buf may be NULL if count is 0. The pointers returned by this method |
| 233 | // should only be used for debugging and not dereferenced, they may |
| 234 | // already be invalid. |
| 235 | ssize_t ProcessState::getKernelReferences(size_t buf_count, uintptr_t* buf) |
| 236 | { |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 237 | binder_node_debug_info info = {}; |
| 238 | |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 239 | uintptr_t* end = buf ? buf + buf_count : nullptr; |
Colin Cross | 9d45ccc | 2017-06-20 17:48:33 -0700 | [diff] [blame] | 240 | size_t count = 0; |
| 241 | |
| 242 | do { |
| 243 | status_t result = ioctl(mDriverFD, BINDER_GET_NODE_DEBUG_INFO, &info); |
| 244 | if (result < 0) { |
| 245 | return -1; |
| 246 | } |
| 247 | if (info.ptr != 0) { |
| 248 | if (buf && buf < end) |
| 249 | *buf++ = info.ptr; |
| 250 | count++; |
| 251 | if (buf && buf < end) |
| 252 | *buf++ = info.cookie; |
| 253 | count++; |
| 254 | } |
| 255 | } while (info.ptr != 0); |
| 256 | |
| 257 | return count; |
| 258 | } |
| 259 | |
Jon Spivack | 902e6fc | 2019-10-18 21:22:37 -0700 | [diff] [blame] | 260 | // Queries the driver for the current strong reference count of the node |
| 261 | // that the handle points to. Can only be used by the servicemanager. |
| 262 | // |
| 263 | // Returns -1 in case of failure, otherwise the strong reference count. |
Steven Moreland | e839388 | 2020-12-18 02:27:20 +0000 | [diff] [blame] | 264 | ssize_t ProcessState::getStrongRefCountForNode(const sp<BpBinder>& binder) { |
Steven Moreland | 5553ac4 | 2020-11-11 02:14:45 +0000 | [diff] [blame] | 265 | if (binder->isRpcBinder()) return -1; |
| 266 | |
Jon Spivack | 902e6fc | 2019-10-18 21:22:37 -0700 | [diff] [blame] | 267 | binder_node_info_for_ref info; |
| 268 | memset(&info, 0, sizeof(binder_node_info_for_ref)); |
| 269 | |
Steven Moreland | 9915762 | 2021-09-13 16:27:34 -0700 | [diff] [blame] | 270 | info.handle = binder->getPrivateAccessor().binderHandle(); |
Jon Spivack | 902e6fc | 2019-10-18 21:22:37 -0700 | [diff] [blame] | 271 | |
| 272 | status_t result = ioctl(mDriverFD, BINDER_GET_NODE_INFO_FOR_REF, &info); |
| 273 | |
| 274 | if (result != OK) { |
| 275 | static bool logged = false; |
| 276 | if (!logged) { |
| 277 | ALOGW("Kernel does not support BINDER_GET_NODE_INFO_FOR_REF."); |
| 278 | logged = true; |
| 279 | } |
| 280 | return -1; |
| 281 | } |
| 282 | |
| 283 | return info.strong_count; |
| 284 | } |
| 285 | |
Steven Moreland | 7732a09 | 2019-01-02 17:54:16 -0800 | [diff] [blame] | 286 | void ProcessState::setCallRestriction(CallRestriction restriction) { |
Steven Moreland | 28723ae | 2019-04-01 18:52:30 -0700 | [diff] [blame] | 287 | LOG_ALWAYS_FATAL_IF(IPCThreadState::selfOrNull() != nullptr, |
| 288 | "Call restrictions must be set before the threadpool is started."); |
Steven Moreland | 7732a09 | 2019-01-02 17:54:16 -0800 | [diff] [blame] | 289 | |
| 290 | mCallRestriction = restriction; |
| 291 | } |
| 292 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 293 | ProcessState::handle_entry* ProcessState::lookupHandleLocked(int32_t handle) |
| 294 | { |
| 295 | const size_t N=mHandleToObject.size(); |
| 296 | if (N <= (size_t)handle) { |
| 297 | handle_entry e; |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 298 | e.binder = nullptr; |
| 299 | e.refs = nullptr; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 300 | status_t err = mHandleToObject.insertAt(e, N, handle+1-N); |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 301 | if (err < NO_ERROR) return nullptr; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 302 | } |
| 303 | return &mHandleToObject.editItemAt(handle); |
| 304 | } |
| 305 | |
Steven Moreland | 5c75a5a | 2022-05-11 22:15:10 +0000 | [diff] [blame] | 306 | // see b/166779391: cannot change the VNDK interface, so access like this |
| 307 | extern sp<BBinder> the_context_object; |
| 308 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 309 | sp<IBinder> ProcessState::getStrongProxyForHandle(int32_t handle) |
| 310 | { |
| 311 | sp<IBinder> result; |
| 312 | |
Tomasz Wasilczyk | 66ee192 | 2023-10-26 14:53:49 -0700 | [diff] [blame] | 313 | std::unique_lock<std::mutex> _l(mLock); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 314 | |
Steven Moreland | 5c75a5a | 2022-05-11 22:15:10 +0000 | [diff] [blame] | 315 | if (handle == 0 && the_context_object != nullptr) return the_context_object; |
| 316 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 317 | handle_entry* e = lookupHandleLocked(handle); |
| 318 | |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 319 | if (e != nullptr) { |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 320 | // We need to create a new BpBinder if there isn't currently one, OR we |
Steven Moreland | e171d62 | 2019-07-17 16:06:01 -0700 | [diff] [blame] | 321 | // are unable to acquire a weak reference on this current one. The |
| 322 | // attemptIncWeak() is safe because we know the BpBinder destructor will always |
| 323 | // call expungeHandle(), which acquires the same lock we are holding now. |
| 324 | // We need to do this because there is a race condition between someone |
| 325 | // releasing a reference on this BpBinder, and a new reference on its handle |
| 326 | // arriving from the driver. |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 327 | IBinder* b = e->binder; |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 328 | if (b == nullptr || !e->refs->attemptIncWeak(this)) { |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 329 | if (handle == 0) { |
| 330 | // Special case for context manager... |
| 331 | // The context manager is the only object for which we create |
| 332 | // a BpBinder proxy without already holding a reference. |
| 333 | // Perform a dummy transaction to ensure the context manager |
| 334 | // is registered before we create the first local reference |
| 335 | // to it (which will occur when creating the BpBinder). |
| 336 | // If a local reference is created for the BpBinder when the |
| 337 | // context manager is not present, the driver will fail to |
| 338 | // provide a reference to the context manager, but the |
| 339 | // driver API does not return status. |
| 340 | // |
| 341 | // Note that this is not race-free if the context manager |
| 342 | // dies while this code runs. |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 343 | |
Steven Moreland | 9514b20 | 2020-09-21 18:03:27 +0000 | [diff] [blame] | 344 | IPCThreadState* ipc = IPCThreadState::self(); |
| 345 | |
| 346 | CallRestriction originalCallRestriction = ipc->getCallRestriction(); |
| 347 | ipc->setCallRestriction(CallRestriction::NONE); |
| 348 | |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 349 | Parcel data; |
Steven Moreland | 9514b20 | 2020-09-21 18:03:27 +0000 | [diff] [blame] | 350 | status_t status = ipc->transact( |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 351 | 0, IBinder::PING_TRANSACTION, data, nullptr, 0); |
Steven Moreland | 9514b20 | 2020-09-21 18:03:27 +0000 | [diff] [blame] | 352 | |
| 353 | ipc->setCallRestriction(originalCallRestriction); |
| 354 | |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 355 | if (status == DEAD_OBJECT) |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 356 | return nullptr; |
Todd Poynor | a7b0f04 | 2013-06-18 17:25:37 -0700 | [diff] [blame] | 357 | } |
| 358 | |
Steven Moreland | 9915762 | 2021-09-13 16:27:34 -0700 | [diff] [blame] | 359 | sp<BpBinder> b = BpBinder::PrivateAccessor::create(handle); |
Steven Moreland | 1a3a8ef | 2021-04-02 02:52:46 +0000 | [diff] [blame] | 360 | e->binder = b.get(); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 361 | if (b) e->refs = b->getWeakRefs(); |
| 362 | result = b; |
| 363 | } else { |
| 364 | // This little bit of nastyness is to allow us to add a primary |
| 365 | // reference to the remote proxy when this team doesn't have one |
| 366 | // but another team is sending the handle to us. |
| 367 | result.force_set(b); |
| 368 | e->refs->decWeak(this); |
| 369 | } |
| 370 | } |
| 371 | |
| 372 | return result; |
| 373 | } |
| 374 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 375 | void ProcessState::expungeHandle(int32_t handle, IBinder* binder) |
| 376 | { |
Tomasz Wasilczyk | 66ee192 | 2023-10-26 14:53:49 -0700 | [diff] [blame] | 377 | std::unique_lock<std::mutex> _l(mLock); |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 378 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 379 | handle_entry* e = lookupHandleLocked(handle); |
| 380 | |
| 381 | // This handle may have already been replaced with a new BpBinder |
| 382 | // (if someone failed the AttemptIncWeak() above); we don't want |
| 383 | // to overwrite it. |
Yi Kong | fdd8da9 | 2018-06-07 17:52:27 -0700 | [diff] [blame] | 384 | if (e && e->binder == binder) e->binder = nullptr; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 385 | } |
| 386 | |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 387 | String8 ProcessState::makeBinderThreadName() { |
| 388 | int32_t s = android_atomic_add(1, &mThreadPoolSeq); |
Philip Cuadra | a082fa8 | 2016-04-08 10:29:14 -0700 | [diff] [blame] | 389 | pid_t pid = getpid(); |
Steven Moreland | 281abad | 2022-02-24 22:06:40 +0000 | [diff] [blame] | 390 | |
| 391 | std::string_view driverName = mDriverName.c_str(); |
| 392 | android::base::ConsumePrefix(&driverName, "/dev/"); |
| 393 | |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 394 | String8 name; |
Steven Moreland | 281abad | 2022-02-24 22:06:40 +0000 | [diff] [blame] | 395 | name.appendFormat("%.*s:%d_%X", static_cast<int>(driverName.length()), driverName.data(), pid, |
| 396 | s); |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 397 | return name; |
| 398 | } |
| 399 | |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 400 | void ProcessState::spawnPooledThread(bool isMain) |
| 401 | { |
| 402 | if (mThreadPoolStarted) { |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 403 | String8 name = makeBinderThreadName(); |
Tomasz Wasilczyk | 0bfea2d | 2023-08-11 00:06:51 +0000 | [diff] [blame] | 404 | ALOGV("Spawning new pooled thread, name=%s\n", name.c_str()); |
Steven Moreland | 1a3a8ef | 2021-04-02 02:52:46 +0000 | [diff] [blame] | 405 | sp<Thread> t = sp<PoolThread>::make(isMain); |
Tomasz Wasilczyk | 0bfea2d | 2023-08-11 00:06:51 +0000 | [diff] [blame] | 406 | t->run(name.c_str()); |
Elie Kheirallah | c2f5a7e | 2022-05-27 22:43:40 +0000 | [diff] [blame] | 407 | pthread_mutex_lock(&mThreadCountLock); |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame] | 408 | mKernelStartedThreads++; |
Elie Kheirallah | c2f5a7e | 2022-05-27 22:43:40 +0000 | [diff] [blame] | 409 | pthread_mutex_unlock(&mThreadCountLock); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 410 | } |
Steven Moreland | 3e9debc | 2023-06-15 00:35:29 +0000 | [diff] [blame] | 411 | // TODO: if startThreadPool is called on another thread after the process |
| 412 | // starts up, the kernel might think that it already requested those |
| 413 | // binder threads, and additional won't be started. This is likely to |
| 414 | // cause deadlocks, and it will also cause getThreadPoolMaxTotalThreadCount |
| 415 | // to return too high of a value. |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 416 | } |
| 417 | |
Mathias Agopian | 1b80f79 | 2012-04-17 16:11:08 -0700 | [diff] [blame] | 418 | status_t ProcessState::setThreadPoolMaxThreadCount(size_t maxThreads) { |
Steven Moreland | 1fdb98b | 2020-03-06 21:42:12 +0000 | [diff] [blame] | 419 | LOG_ALWAYS_FATAL_IF(mThreadPoolStarted && maxThreads < mMaxThreads, |
| 420 | "Binder threadpool cannot be shrunk after starting"); |
Mathias Agopian | 1b80f79 | 2012-04-17 16:11:08 -0700 | [diff] [blame] | 421 | status_t result = NO_ERROR; |
Wale Ogunwale | 376b822 | 2015-04-13 16:16:10 -0700 | [diff] [blame] | 422 | if (ioctl(mDriverFD, BINDER_SET_MAX_THREADS, &maxThreads) != -1) { |
| 423 | mMaxThreads = maxThreads; |
| 424 | } else { |
Mathias Agopian | 1b80f79 | 2012-04-17 16:11:08 -0700 | [diff] [blame] | 425 | result = -errno; |
| 426 | ALOGE("Binder ioctl to set max threads failed: %s", strerror(-result)); |
| 427 | } |
| 428 | return result; |
| 429 | } |
| 430 | |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame] | 431 | size_t ProcessState::getThreadPoolMaxTotalThreadCount() const { |
Steven Moreland | b763b14 | 2022-07-13 01:24:24 +0000 | [diff] [blame] | 432 | pthread_mutex_lock(&mThreadCountLock); |
Sebastian Pickl | 25c1a3b | 2023-10-30 08:02:24 +0000 | [diff] [blame] | 433 | base::ScopeGuard detachGuard = [&]() { pthread_mutex_unlock(&mThreadCountLock); }; |
Steven Moreland | b763b14 | 2022-07-13 01:24:24 +0000 | [diff] [blame] | 434 | |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame] | 435 | if (mThreadPoolStarted) { |
Steven Moreland | 3e9debc | 2023-06-15 00:35:29 +0000 | [diff] [blame] | 436 | LOG_ALWAYS_FATAL_IF(mKernelStartedThreads > mMaxThreads + 1, |
| 437 | "too many kernel-started threads: %zu > %zu + 1", mKernelStartedThreads, |
| 438 | mMaxThreads); |
| 439 | |
| 440 | // calling startThreadPool starts a thread |
| 441 | size_t threads = 1; |
| 442 | |
| 443 | // the kernel is configured to start up to mMaxThreads more threads |
| 444 | threads += mMaxThreads; |
| 445 | |
| 446 | // Users may call IPCThreadState::joinThreadPool directly. We don't |
| 447 | // currently have a way to count this directly (it could be added by |
| 448 | // adding a separate private joinKernelThread method in IPCThreadState). |
| 449 | // So, if we are in a race between the kernel thread variable being |
| 450 | // incremented in this file and mCurrentThreads being incremented |
| 451 | // in IPCThreadState, temporarily forget about the extra join threads. |
| 452 | // This is okay, because most callers of this method only care about |
| 453 | // having 0, 1, or more threads. |
| 454 | if (mCurrentThreads > mKernelStartedThreads) { |
| 455 | threads += mCurrentThreads - mKernelStartedThreads; |
| 456 | } |
| 457 | |
| 458 | return threads; |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame] | 459 | } |
Steven Moreland | 3e9debc | 2023-06-15 00:35:29 +0000 | [diff] [blame] | 460 | |
Yifan Hong | 84bedeb | 2021-04-21 21:37:17 -0700 | [diff] [blame] | 461 | // must not be initialized or maybe has poll thread setup, we |
| 462 | // currently don't track this in libbinder |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame] | 463 | LOG_ALWAYS_FATAL_IF(mKernelStartedThreads != 0, |
| 464 | "Expecting 0 kernel started threads but have" |
| 465 | " %zu", |
| 466 | mKernelStartedThreads); |
| 467 | return mCurrentThreads; |
Yifan Hong | 84bedeb | 2021-04-21 21:37:17 -0700 | [diff] [blame] | 468 | } |
| 469 | |
Devin Moore | 4354f71 | 2022-12-08 01:44:46 +0000 | [diff] [blame] | 470 | bool ProcessState::isThreadPoolStarted() const { |
| 471 | return mThreadPoolStarted; |
| 472 | } |
| 473 | |
Carlos Llamas | 4f88670 | 2022-03-07 22:07:03 -0800 | [diff] [blame] | 474 | #define DRIVER_FEATURES_PATH "/dev/binderfs/features/" |
| 475 | bool ProcessState::isDriverFeatureEnabled(const DriverFeature feature) { |
| 476 | static const char* const names[] = { |
| 477 | [static_cast<int>(DriverFeature::ONEWAY_SPAM_DETECTION)] = |
| 478 | DRIVER_FEATURES_PATH "oneway_spam_detection", |
Carlos Llamas | b235b12 | 2021-12-20 06:38:44 -0800 | [diff] [blame] | 479 | [static_cast<int>(DriverFeature::EXTENDED_ERROR)] = |
| 480 | DRIVER_FEATURES_PATH "extended_error", |
Carlos Llamas | 4f88670 | 2022-03-07 22:07:03 -0800 | [diff] [blame] | 481 | }; |
| 482 | int fd = open(names[static_cast<int>(feature)], O_RDONLY | O_CLOEXEC); |
| 483 | char on; |
| 484 | if (fd == -1) { |
| 485 | ALOGE_IF(errno != ENOENT, "%s: cannot open %s: %s", __func__, |
| 486 | names[static_cast<int>(feature)], strerror(errno)); |
| 487 | return false; |
| 488 | } |
| 489 | if (read(fd, &on, sizeof(on)) == -1) { |
| 490 | ALOGE("%s: error reading to %s: %s", __func__, |
| 491 | names[static_cast<int>(feature)], strerror(errno)); |
| 492 | return false; |
| 493 | } |
| 494 | close(fd); |
| 495 | return on == '1'; |
| 496 | } |
| 497 | |
Hang Lu | b185ac0 | 2021-03-24 13:17:22 +0800 | [diff] [blame] | 498 | status_t ProcessState::enableOnewaySpamDetection(bool enable) { |
| 499 | uint32_t enableDetection = enable ? 1 : 0; |
| 500 | if (ioctl(mDriverFD, BINDER_ENABLE_ONEWAY_SPAM_DETECTION, &enableDetection) == -1) { |
Martijn Coenen | de0a39e | 2021-04-22 14:38:46 +0200 | [diff] [blame] | 501 | ALOGI("Binder ioctl to enable oneway spam detection failed: %s", strerror(errno)); |
Hang Lu | b185ac0 | 2021-03-24 13:17:22 +0800 | [diff] [blame] | 502 | return -errno; |
| 503 | } |
| 504 | return NO_ERROR; |
| 505 | } |
| 506 | |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 507 | void ProcessState::giveThreadPoolName() { |
Tomasz Wasilczyk | 0bfea2d | 2023-08-11 00:06:51 +0000 | [diff] [blame] | 508 | androidSetThreadName(makeBinderThreadName().c_str()); |
Mathias Agopian | e3e43b3 | 2013-03-07 15:34:28 -0800 | [diff] [blame] | 509 | } |
| 510 | |
Iliyan Malchev | 3206224 | 2017-04-10 14:06:11 -0700 | [diff] [blame] | 511 | String8 ProcessState::getDriverName() { |
| 512 | return mDriverName; |
| 513 | } |
| 514 | |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 515 | static base::unique_fd open_driver(const char* driver) { |
| 516 | auto fd = base::unique_fd(open(driver, O_RDWR | O_CLOEXEC)); |
| 517 | if (!fd.ok()) { |
| 518 | PLOGE("Opening '%s' failed", driver); |
| 519 | return {}; |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 520 | } |
| 521 | int vers = 0; |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 522 | int result = ioctl(fd.get(), BINDER_VERSION, &vers); |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 523 | if (result == -1) { |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 524 | PLOGE("Binder ioctl to obtain version failed"); |
| 525 | return {}; |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 526 | } |
| 527 | if (result != 0 || vers != BINDER_CURRENT_PROTOCOL_VERSION) { |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 528 | ALOGE("Binder driver protocol(%d) does not match user space protocol(%d)! " |
| 529 | "ioctl() return value: %d", |
| 530 | vers, BINDER_CURRENT_PROTOCOL_VERSION, result); |
| 531 | return {}; |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 532 | } |
| 533 | size_t maxThreads = DEFAULT_MAX_BINDER_THREADS; |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 534 | result = ioctl(fd.get(), BINDER_SET_MAX_THREADS, &maxThreads); |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 535 | if (result == -1) { |
| 536 | ALOGE("Binder ioctl to set max threads failed: %s", strerror(errno)); |
| 537 | } |
| 538 | uint32_t enable = DEFAULT_ENABLE_ONEWAY_SPAM_DETECTION; |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 539 | result = ioctl(fd.get(), BINDER_ENABLE_ONEWAY_SPAM_DETECTION, &enable); |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 540 | if (result == -1) { |
Carlos Llamas | 4f88670 | 2022-03-07 22:07:03 -0800 | [diff] [blame] | 541 | ALOGE_IF(ProcessState::isDriverFeatureEnabled( |
| 542 | ProcessState::DriverFeature::ONEWAY_SPAM_DETECTION), |
| 543 | "Binder ioctl to enable oneway spam detection failed: %s", strerror(errno)); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 544 | } |
| 545 | return fd; |
| 546 | } |
| 547 | |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 548 | ProcessState::ProcessState(const char* driver) |
| 549 | : mDriverName(String8(driver)), |
| 550 | mDriverFD(-1), |
| 551 | mVMStart(MAP_FAILED), |
| 552 | mThreadCountLock(PTHREAD_MUTEX_INITIALIZER), |
| 553 | mThreadCountDecrement(PTHREAD_COND_INITIALIZER), |
| 554 | mExecutingThreadsCount(0), |
| 555 | mWaitingForThreads(0), |
| 556 | mMaxThreads(DEFAULT_MAX_BINDER_THREADS), |
Elie Kheirallah | 47431c1 | 2022-04-21 23:46:17 +0000 | [diff] [blame] | 557 | mCurrentThreads(0), |
| 558 | mKernelStartedThreads(0), |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 559 | mStarvationStartTimeMs(0), |
Steven Moreland | ee9df90 | 2021-10-14 14:00:08 -0700 | [diff] [blame] | 560 | mForked(false), |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 561 | mThreadPoolStarted(false), |
| 562 | mThreadPoolSeq(1), |
| 563 | mCallRestriction(CallRestriction::NONE) { |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 564 | base::unique_fd opened = open_driver(driver); |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 565 | |
| 566 | if (opened.ok()) { |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 567 | // mmap the binder, providing a chunk of virtual address space to receive transactions. |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 568 | mVMStart = mmap(nullptr, BINDER_VM_SIZE, PROT_READ, MAP_PRIVATE | MAP_NORESERVE, |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 569 | opened.get(), 0); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 570 | if (mVMStart == MAP_FAILED) { |
| 571 | // *sigh* |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 572 | ALOGE("Using %s failed: unable to mmap transaction memory.", driver); |
| 573 | opened.reset(); |
Iliyan Malchev | 3206224 | 2017-04-10 14:06:11 -0700 | [diff] [blame] | 574 | mDriverName.clear(); |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 575 | } |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 576 | } |
Jeff Brown | e16986c | 2011-07-08 18:52:57 -0700 | [diff] [blame] | 577 | |
Steven Moreland | 24bc0d1 | 2019-10-11 12:29:20 -0700 | [diff] [blame] | 578 | #ifdef __ANDROID__ |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 579 | LOG_ALWAYS_FATAL_IF(!opened.ok(), "Binder driver '%s' could not be opened. Terminating.", |
| 580 | driver); |
Steven Moreland | 24bc0d1 | 2019-10-11 12:29:20 -0700 | [diff] [blame] | 581 | #endif |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 582 | |
| 583 | if (opened.ok()) { |
Tomasz Wasilczyk | 88aa8c3 | 2023-11-01 09:46:07 -0700 | [diff] [blame] | 584 | mDriverFD = opened.release(); |
Steven Moreland | 13a43c9 | 2021-08-30 13:21:48 -0700 | [diff] [blame] | 585 | } |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 586 | } |
| 587 | |
| 588 | ProcessState::~ProcessState() |
| 589 | { |
zhongjie | ff40578 | 2016-03-09 15:05:04 +0800 | [diff] [blame] | 590 | if (mDriverFD >= 0) { |
| 591 | if (mVMStart != MAP_FAILED) { |
Steven Moreland | 072cc7e | 2019-07-12 21:01:54 +0000 | [diff] [blame] | 592 | munmap(mVMStart, BINDER_VM_SIZE); |
zhongjie | ff40578 | 2016-03-09 15:05:04 +0800 | [diff] [blame] | 593 | } |
| 594 | close(mDriverFD); |
| 595 | } |
| 596 | mDriverFD = -1; |
The Android Open Source Project | edbf3b6 | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 597 | } |
Jooyung Han | 1b228f4 | 2020-01-30 13:41:12 +0900 | [diff] [blame] | 598 | |
Steven Moreland | 61ff849 | 2019-09-26 16:05:45 -0700 | [diff] [blame] | 599 | } // namespace android |