blob: a8dabc3a1dcf2f0d49633e65897c497e5a811083 [file] [log] [blame]
Andrei Homescu74a54452021-12-10 05:30:21 +00001/*
2 * Copyright (C) 2022 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Ayrton Munoz04137372022-08-03 17:05:09 -040017#if defined(TRUSTY_USERSPACE)
Andrei Homescu74a54452021-12-10 05:30:21 +000018#include <openssl/rand.h>
Andrei Homescu1c18a802022-08-17 04:59:01 +000019#include <trusty_ipc.h>
Ayrton Munoz04137372022-08-03 17:05:09 -040020#else
21#include <lib/rand/rand.h>
22#endif
Andrei Homescu74a54452021-12-10 05:30:21 +000023
Andrei Homescu024727b2022-08-24 23:54:59 +000024#include <binder/RpcTransportTipcTrusty.h>
Tomasz Wasilczykc7c22ea2023-11-30 20:13:44 -080025#include <log/log.h>
26#include <trusty_log.h>
Andrei Homescu024727b2022-08-24 23:54:59 +000027
Andrei Homescu74a54452021-12-10 05:30:21 +000028#include "../OS.h"
Andrei Homescu1c18a802022-08-17 04:59:01 +000029#include "TrustyStatus.h"
Andrei Homescu74a54452021-12-10 05:30:21 +000030
Tomasz Wasilczykc7c22ea2023-11-30 20:13:44 -080031#include <cstdarg>
32
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070033using android::binder::borrowed_fd;
34using android::binder::unique_fd;
35
Tomasz Wasilczyk0d9dec22023-10-06 20:28:49 +000036namespace android::binder::os {
Andrei Homescu74a54452021-12-10 05:30:21 +000037
Tomasz Wasilczykdaf727a2023-11-21 13:50:09 -080038void trace_begin(uint64_t, const char*) {}
39
40void trace_end(uint64_t) {}
41
42uint64_t GetThreadId() {
43 return 0;
44}
45
46bool report_sysprop_change() {
47 return false;
48}
49
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070050status_t setNonBlocking(borrowed_fd /*fd*/) {
Andrei Homescu74a54452021-12-10 05:30:21 +000051 // Trusty IPC syscalls are all non-blocking by default.
Tomasz Wasilczyk88aa8c32023-11-01 09:46:07 -070052 return OK;
Andrei Homescu74a54452021-12-10 05:30:21 +000053}
54
55status_t getRandomBytes(uint8_t* data, size_t size) {
Ayrton Munoz04137372022-08-03 17:05:09 -040056#if defined(TRUSTY_USERSPACE)
Andrei Homescu74a54452021-12-10 05:30:21 +000057 int res = RAND_bytes(data, size);
58 return res == 1 ? OK : UNKNOWN_ERROR;
Ayrton Munoz04137372022-08-03 17:05:09 -040059#else
60 int res = rand_get_bytes(data, size);
61 return res == 0 ? OK : UNKNOWN_ERROR;
62#endif // TRUSTY_USERSPACE
Andrei Homescu74a54452021-12-10 05:30:21 +000063}
64
Andrei Homescu1c18a802022-08-17 04:59:01 +000065status_t dupFileDescriptor(int oldFd, int* newFd) {
66 int res = dup(oldFd);
67 if (res < 0) {
68 return statusFromTrusty(res);
69 }
70
71 *newFd = res;
72 return OK;
Andrei Homescu24ad36e2022-08-04 01:33:33 +000073}
74
Andrei Homescu024727b2022-08-24 23:54:59 +000075std::unique_ptr<RpcTransportCtxFactory> makeDefaultRpcTransportCtxFactory() {
76 return RpcTransportCtxFactoryTipcTrusty::make();
77}
78
David Brazdilc3964f62022-10-24 23:06:14 +010079ssize_t sendMessageOnSocket(
David Brazdil21c887c2022-09-23 12:25:18 +010080 const RpcTransportFd& /* socket */, iovec* /* iovs */, int /* niovs */,
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070081 const std::vector<std::variant<unique_fd, borrowed_fd>>* /* ancillaryFds */) {
David Brazdil21c887c2022-09-23 12:25:18 +010082 errno = ENOTSUP;
83 return -1;
84}
85
David Brazdilc3964f62022-10-24 23:06:14 +010086ssize_t receiveMessageFromSocket(
David Brazdil21c887c2022-09-23 12:25:18 +010087 const RpcTransportFd& /* socket */, iovec* /* iovs */, int /* niovs */,
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070088 std::vector<std::variant<unique_fd, borrowed_fd>>* /* ancillaryFds */) {
David Brazdil21c887c2022-09-23 12:25:18 +010089 errno = ENOTSUP;
90 return -1;
91}
92
Tomasz Wasilczyk0d9dec22023-10-06 20:28:49 +000093} // namespace android::binder::os
Tomasz Wasilczykc7c22ea2023-11-30 20:13:44 -080094
95int __android_log_print(int prio [[maybe_unused]], const char* tag, const char* fmt, ...) {
96#ifdef TRUSTY_USERSPACE
97#define trusty_tlog _tlog
98#define trusty_vtlog _vtlog
99#else
100 // mapping taken from kernel trusty_log.h (TLOGx)
101 int kernelLogLevel;
102 if (prio <= ANDROID_LOG_DEBUG) {
103 kernelLogLevel = LK_DEBUGLEVEL_ALWAYS;
104 } else if (prio == ANDROID_LOG_INFO) {
105 kernelLogLevel = LK_DEBUGLEVEL_SPEW;
106 } else if (prio == ANDROID_LOG_WARN) {
107 kernelLogLevel = LK_DEBUGLEVEL_INFO;
108 } else if (prio == ANDROID_LOG_ERROR) {
109 kernelLogLevel = LK_DEBUGLEVEL_CRITICAL;
110 } else { /* prio >= ANDROID_LOG_FATAL */
111 kernelLogLevel = LK_DEBUGLEVEL_CRITICAL;
112 }
113#if LK_DEBUGLEVEL_NO_ALIASES
114 auto LK_DEBUGLEVEL_kernelLogLevel = kernelLogLevel;
115#endif
116
117#define trusty_tlog(...) _tlog(kernelLogLevel, __VA_ARGS__)
118#define trusty_vtlog(...) _vtlog(kernelLogLevel, __VA_ARGS__)
119#endif
120
121 va_list args;
122 va_start(args, fmt);
123 trusty_tlog((tag[0] == '\0') ? "libbinder" : "libbinder-");
124 trusty_vtlog(fmt, args);
125 va_end(args);
126
127 return 1;
128}