blob: c3bbdbadaacc1f032b071d6199e4e0a6e5999f88 [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Jason Parksdcd39582009-11-03 12:14:38 -080017#define LOG_TAG "IPCThreadState"
18
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070019#include <binder/IPCThreadState.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080020
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070021#include <binder/Binder.h>
22#include <binder/BpBinder.h>
Mathias Agopian002e1e52013-05-06 20:20:50 -070023#include <binder/TextOutput.h>
24
Glenn Kastena26e1cf2012-03-16 07:15:23 -070025#include <cutils/sched_policy.h>
Steven Moreland7732a092019-01-02 17:54:16 -080026#include <utils/CallStack.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080027#include <utils/Log.h>
Colin Cross96e83222016-04-15 14:29:55 -070028#include <utils/SystemClock.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080029
Hans Boehma997b232019-04-12 16:59:00 -070030#include <atomic>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080031#include <errno.h>
Colin Cross96e83222016-04-15 14:29:55 -070032#include <inttypes.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080033#include <pthread.h>
34#include <sched.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080035#include <signal.h>
36#include <stdio.h>
37#include <sys/ioctl.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080038#include <sys/resource.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080039#include <unistd.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080040
Steven Moreland6ba5a252021-05-04 22:49:00 +000041#include "binder_module.h"
Steven Morelanda4853cd2019-07-12 15:44:37 -070042
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080043#if LOG_NDEBUG
44
45#define IF_LOG_TRANSACTIONS() if (false)
46#define IF_LOG_COMMANDS() if (false)
mattgilbride85897672022-10-22 17:42:44 +000047#define LOG_REMOTEREFS(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080048#define IF_LOG_REMOTEREFS() if (false)
Tim Murrayd429f4a2017-03-07 09:31:09 -080049
mattgilbride85897672022-10-22 17:42:44 +000050#define LOG_THREADPOOL(...)
51#define LOG_ONEWAY(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080052
53#else
54
Steve Block9f760152011-10-12 17:27:03 +010055#define IF_LOG_TRANSACTIONS() IF_ALOG(LOG_VERBOSE, "transact")
56#define IF_LOG_COMMANDS() IF_ALOG(LOG_VERBOSE, "ipc")
57#define LOG_REMOTEREFS(...) ALOG(LOG_DEBUG, "remoterefs", __VA_ARGS__)
58#define IF_LOG_REMOTEREFS() IF_ALOG(LOG_DEBUG, "remoterefs")
59#define LOG_THREADPOOL(...) ALOG(LOG_DEBUG, "threadpool", __VA_ARGS__)
60#define LOG_ONEWAY(...) ALOG(LOG_DEBUG, "ipc", __VA_ARGS__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080061
62#endif
63
64// ---------------------------------------------------------------------------
65
66namespace android {
67
Chih-Hung Hsieh8e5337d2014-10-24 14:10:09 -070068// Static const and functions will be optimized out if not used,
69// when LOG_NDEBUG and references in IF_LOG_COMMANDS() are optimized out.
Devin Moorea7499132023-12-15 18:48:39 +000070static const char* kReturnStrings[] = {
71 "BR_ERROR",
72 "BR_OK",
Devin Moore58029202023-12-15 18:58:48 +000073 "BR_TRANSACTION/BR_TRANSACTION_SEC_CTX",
Devin Moorea7499132023-12-15 18:48:39 +000074 "BR_REPLY",
75 "BR_ACQUIRE_RESULT",
76 "BR_DEAD_REPLY",
77 "BR_TRANSACTION_COMPLETE",
78 "BR_INCREFS",
79 "BR_ACQUIRE",
80 "BR_RELEASE",
81 "BR_DECREFS",
82 "BR_ATTEMPT_ACQUIRE",
83 "BR_NOOP",
84 "BR_SPAWN_LOOPER",
85 "BR_FINISHED",
86 "BR_DEAD_BINDER",
87 "BR_CLEAR_DEATH_NOTIFICATION_DONE",
88 "BR_FAILED_REPLY",
89 "BR_FROZEN_REPLY",
90 "BR_ONEWAY_SPAM_SUSPECT",
91 "BR_TRANSACTION_PENDING_FROZEN",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080092};
93
94static const char *kCommandStrings[] = {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080095 "BC_TRANSACTION",
96 "BC_REPLY",
97 "BC_ACQUIRE_RESULT",
98 "BC_FREE_BUFFER",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080099 "BC_INCREFS",
100 "BC_ACQUIRE",
101 "BC_RELEASE",
102 "BC_DECREFS",
103 "BC_INCREFS_DONE",
104 "BC_ACQUIRE_DONE",
105 "BC_ATTEMPT_ACQUIRE",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800106 "BC_REGISTER_LOOPER",
107 "BC_ENTER_LOOPER",
108 "BC_EXIT_LOOPER",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800109 "BC_REQUEST_DEATH_NOTIFICATION",
110 "BC_CLEAR_DEATH_NOTIFICATION",
111 "BC_DEAD_BINDER_DONE"
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800112};
113
Olivier Gaillard91a04802018-11-14 17:32:41 +0000114static const int64_t kWorkSourcePropagatedBitIndex = 32;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100115
songjinshi73a7dde2016-10-18 21:05:56 +0800116static const char* getReturnString(uint32_t cmd)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800117{
songjinshi8e486c62019-04-04 11:22:52 +0800118 size_t idx = cmd & _IOC_NRMASK;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800119 if (idx < sizeof(kReturnStrings) / sizeof(kReturnStrings[0]))
120 return kReturnStrings[idx];
121 else
122 return "unknown";
123}
124
Pawan Wagh7063b522022-09-28 18:52:26 +0000125static const void* printBinderTransactionData(std::ostream& out, const void* data) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800126 const binder_transaction_data* btd =
127 (const binder_transaction_data*)data;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700128 if (btd->target.handle < 1024) {
129 /* want to print descriptors in decimal; guess based on value */
Pawan Wagh7063b522022-09-28 18:52:26 +0000130 out << "\ttarget.desc=" << btd->target.handle;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700131 } else {
Pawan Wagh7063b522022-09-28 18:52:26 +0000132 out << "\ttarget.ptr=" << btd->target.ptr;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700133 }
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000134 out << "\t (cookie " << btd->cookie << ")\n"
Pawan Wagh7063b522022-09-28 18:52:26 +0000135 << "\tcode=" << TypeCode(btd->code) << ", flags=" << (void*)(uint64_t)btd->flags << "\n"
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000136 << "\tdata=" << btd->data.ptr.buffer << " (" << (void*)btd->data_size << " bytes)\n"
137 << "\toffsets=" << btd->data.ptr.offsets << " (" << (void*)btd->offsets_size << " bytes)\n";
138 return btd + 1;
139}
140
141static const void* printBinderTransactionDataSecCtx(std::ostream& out, const void* data) {
142 const binder_transaction_data_secctx* btd = (const binder_transaction_data_secctx*)data;
143
144 printBinderTransactionData(out, &btd->transaction_data);
145
146 char* secctx = (char*)btd->secctx;
147 out << "\tsecctx=" << secctx << "\n";
148
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800149 return btd+1;
150}
151
Pawan Wagh7063b522022-09-28 18:52:26 +0000152static const void* printReturnCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700153 static const size_t N = sizeof(kReturnStrings)/sizeof(kReturnStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800154 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100155 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700156 size_t cmdIndex = code & 0xff;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100157 if (code == BR_ERROR) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000158 out << "\tBR_ERROR: " << (void*)(uint64_t)(*cmd++) << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800159 return cmd;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700160 } else if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000161 out << "\tUnknown reply: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800162 return cmd;
163 }
Pawan Wagh7063b522022-09-28 18:52:26 +0000164 out << "\t" << kReturnStrings[cmdIndex];
Tim Murrayd429f4a2017-03-07 09:31:09 -0800165
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800166 switch (code) {
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000167 case BR_TRANSACTION_SEC_CTX: {
168 out << ": ";
169 cmd = (const int32_t*)printBinderTransactionDataSecCtx(out, cmd);
170 } break;
171
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800172 case BR_TRANSACTION:
173 case BR_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000174 out << ": ";
175 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800176 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800177
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800178 case BR_ACQUIRE_RESULT: {
179 const int32_t res = *cmd++;
180 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
181 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800182
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800183 case BR_INCREFS:
184 case BR_ACQUIRE:
185 case BR_RELEASE:
186 case BR_DECREFS: {
187 const int32_t b = *cmd++;
188 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900189 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800190 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800191
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800192 case BR_ATTEMPT_ACQUIRE: {
193 const int32_t p = *cmd++;
194 const int32_t b = *cmd++;
195 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900196 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800197 << "), pri=" << p;
198 } break;
199
200 case BR_DEAD_BINDER:
201 case BR_CLEAR_DEATH_NOTIFICATION_DONE: {
202 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900203 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800204 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700205
206 default:
207 // no details to show for: BR_OK, BR_DEAD_REPLY,
208 // BR_TRANSACTION_COMPLETE, BR_FINISHED
209 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800210 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800211
Pawan Wagh7063b522022-09-28 18:52:26 +0000212 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800213 return cmd;
214}
215
Pawan Wagh7063b522022-09-28 18:52:26 +0000216static const void* printCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700217 static const size_t N = sizeof(kCommandStrings)/sizeof(kCommandStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800218 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100219 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700220 size_t cmdIndex = code & 0xff;
221
222 if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000223 out << "Unknown command: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800224 return cmd;
225 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700226 out << kCommandStrings[cmdIndex];
227
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800228 switch (code) {
229 case BC_TRANSACTION:
230 case BC_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000231 out << ": ";
232 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800233 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800234
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800235 case BC_ACQUIRE_RESULT: {
236 const int32_t res = *cmd++;
237 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
238 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800239
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800240 case BC_FREE_BUFFER: {
241 const int32_t buf = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900242 out << ": buffer=" << (void*)(uint64_t)buf;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800243 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800244
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800245 case BC_INCREFS:
246 case BC_ACQUIRE:
247 case BC_RELEASE:
248 case BC_DECREFS: {
249 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700250 out << ": desc=" << d;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800251 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800252
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800253 case BC_INCREFS_DONE:
254 case BC_ACQUIRE_DONE: {
255 const int32_t b = *cmd++;
256 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900257 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800258 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800259
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800260 case BC_ATTEMPT_ACQUIRE: {
261 const int32_t p = *cmd++;
262 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700263 out << ": desc=" << d << ", pri=" << p;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800264 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800265
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800266 case BC_REQUEST_DEATH_NOTIFICATION:
267 case BC_CLEAR_DEATH_NOTIFICATION: {
268 const int32_t h = *cmd++;
269 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900270 out << ": handle=" << h << " (death cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800271 } break;
272
273 case BC_DEAD_BINDER_DONE: {
274 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900275 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800276 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700277
278 default:
279 // no details to show for: BC_REGISTER_LOOPER, BC_ENTER_LOOPER,
280 // BC_EXIT_LOOPER
281 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800282 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800283
Pawan Wagh7063b522022-09-28 18:52:26 +0000284 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800285 return cmd;
286}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800287
288static pthread_mutex_t gTLSMutex = PTHREAD_MUTEX_INITIALIZER;
Hans Boehma997b232019-04-12 16:59:00 -0700289static std::atomic<bool> gHaveTLS(false);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800290static pthread_key_t gTLS = 0;
Hans Boehma997b232019-04-12 16:59:00 -0700291static std::atomic<bool> gShutdown = false;
292static std::atomic<bool> gDisableBackgroundScheduling = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800293
294IPCThreadState* IPCThreadState::self()
295{
Hans Boehma997b232019-04-12 16:59:00 -0700296 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800297restart:
298 const pthread_key_t k = gTLS;
299 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
300 if (st) return st;
301 return new IPCThreadState;
302 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800303
Hans Boehma997b232019-04-12 16:59:00 -0700304 // Racey, heuristic test for simultaneous shutdown.
305 if (gShutdown.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800306 ALOGW("Calling IPCThreadState::self() during shutdown is dangerous, expect a crash.\n");
Yi Kongfdd8da92018-06-07 17:52:27 -0700307 return nullptr;
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800308 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800309
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800310 pthread_mutex_lock(&gTLSMutex);
Hans Boehma997b232019-04-12 16:59:00 -0700311 if (!gHaveTLS.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800312 int key_create_value = pthread_key_create(&gTLS, threadDestructor);
313 if (key_create_value != 0) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800314 pthread_mutex_unlock(&gTLSMutex);
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800315 ALOGW("IPCThreadState::self() unable to create TLS key, expect a crash: %s\n",
316 strerror(key_create_value));
Yi Kongfdd8da92018-06-07 17:52:27 -0700317 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800318 }
Hans Boehma997b232019-04-12 16:59:00 -0700319 gHaveTLS.store(true, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800320 }
321 pthread_mutex_unlock(&gTLSMutex);
322 goto restart;
323}
324
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800325IPCThreadState* IPCThreadState::selfOrNull()
326{
Hans Boehma997b232019-04-12 16:59:00 -0700327 if (gHaveTLS.load(std::memory_order_acquire)) {
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800328 const pthread_key_t k = gTLS;
329 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
330 return st;
331 }
Yi Kongfdd8da92018-06-07 17:52:27 -0700332 return nullptr;
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800333}
334
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800335void IPCThreadState::shutdown()
336{
Hans Boehma997b232019-04-12 16:59:00 -0700337 gShutdown.store(true, std::memory_order_relaxed);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800338
Hans Boehma997b232019-04-12 16:59:00 -0700339 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800340 // XXX Need to wait for all thread pool threads to exit!
341 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(gTLS);
342 if (st) {
343 delete st;
Yi Kongfdd8da92018-06-07 17:52:27 -0700344 pthread_setspecific(gTLS, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800345 }
zhongjieff405782016-03-09 15:05:04 +0800346 pthread_key_delete(gTLS);
Hans Boehma997b232019-04-12 16:59:00 -0700347 gHaveTLS.store(false, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800348 }
349}
350
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800351void IPCThreadState::disableBackgroundScheduling(bool disable)
352{
Hans Boehma997b232019-04-12 16:59:00 -0700353 gDisableBackgroundScheduling.store(disable, std::memory_order_relaxed);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800354}
355
Martijn Coenen2b631742017-05-05 11:16:59 -0700356bool IPCThreadState::backgroundSchedulingDisabled()
357{
Hans Boehma997b232019-04-12 16:59:00 -0700358 return gDisableBackgroundScheduling.load(std::memory_order_relaxed);
Martijn Coenen2b631742017-05-05 11:16:59 -0700359}
360
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800361status_t IPCThreadState::clearLastError()
362{
363 const status_t err = mLastError;
364 mLastError = NO_ERROR;
365 return err;
366}
367
Dan Stoza9c634fd2014-11-26 12:23:23 -0800368pid_t IPCThreadState::getCallingPid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800369{
Steven Moreland35626652021-05-15 01:32:04 +0000370 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800371 return mCallingPid;
372}
373
Steven Morelandf0212002018-12-26 13:59:23 -0800374const char* IPCThreadState::getCallingSid() const
375{
Steven Moreland35626652021-05-15 01:32:04 +0000376 checkContextIsBinderForUse(__func__);
Steven Morelandf0212002018-12-26 13:59:23 -0800377 return mCallingSid;
378}
379
Dan Stoza9c634fd2014-11-26 12:23:23 -0800380uid_t IPCThreadState::getCallingUid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800381{
Steven Moreland35626652021-05-15 01:32:04 +0000382 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800383 return mCallingUid;
384}
385
Steven Moreland35626652021-05-15 01:32:04 +0000386const IPCThreadState::SpGuard* IPCThreadState::pushGetCallingSpGuard(const SpGuard* guard) {
387 const SpGuard* orig = mServingStackPointerGuard;
388 mServingStackPointerGuard = guard;
389 return orig;
390}
391
392void IPCThreadState::restoreGetCallingSpGuard(const SpGuard* guard) {
393 mServingStackPointerGuard = guard;
394}
395
396void IPCThreadState::checkContextIsBinderForUse(const char* use) const {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700397 if (mServingStackPointerGuard == nullptr) [[likely]] {
398 return;
399 }
Steven Moreland35626652021-05-15 01:32:04 +0000400
401 if (!mServingStackPointer || mServingStackPointerGuard->address < mServingStackPointer) {
402 LOG_ALWAYS_FATAL("In context %s, %s does not make sense (binder sp: %p, guard: %p).",
403 mServingStackPointerGuard->context, use, mServingStackPointer,
404 mServingStackPointerGuard->address);
405 }
406
407 // in the case mServingStackPointer is deeper in the stack than the guard,
408 // we must be serving a binder transaction (maybe nested). This is a binder
409 // context, so we don't abort
410}
411
mattgilbride85897672022-10-22 17:42:44 +0000412constexpr uint32_t encodeExplicitIdentity(bool hasExplicitIdentity, pid_t callingPid) {
413 uint32_t as_unsigned = static_cast<uint32_t>(callingPid);
414 if (hasExplicitIdentity) {
415 return as_unsigned | (1 << 30);
416 } else {
417 return as_unsigned & ~(1 << 30);
418 }
419}
420
421constexpr int64_t packCallingIdentity(bool hasExplicitIdentity, uid_t callingUid,
422 pid_t callingPid) {
423 // Calling PID is a 32-bit signed integer, but doesn't consume the entire 32 bit space.
424 // To future-proof this and because we have extra capacity, we decided to also support -1,
425 // since this constant is used to represent invalid UID in other places of the system.
426 // Thus, we pack hasExplicitIdentity into the 2nd bit from the left. This allows us to
427 // preserve the (left-most) bit for the sign while also encoding the value of
428 // hasExplicitIdentity.
429 // 32b | 1b | 1b | 30b
430 // token = [ calling uid | calling pid(sign) | has explicit identity | calling pid(rest) ]
431 uint64_t token = (static_cast<uint64_t>(callingUid) << 32) |
432 encodeExplicitIdentity(hasExplicitIdentity, callingPid);
433 return static_cast<int64_t>(token);
434}
435
436constexpr bool unpackHasExplicitIdentity(int64_t token) {
437 return static_cast<int32_t>(token) & (1 << 30);
438}
439
440constexpr uid_t unpackCallingUid(int64_t token) {
441 return static_cast<uid_t>(token >> 32);
442}
443
444constexpr pid_t unpackCallingPid(int64_t token) {
445 int32_t encodedPid = static_cast<int32_t>(token);
446 if (encodedPid & (1 << 31)) {
447 return encodedPid | (1 << 30);
448 } else {
449 return encodedPid & ~(1 << 30);
450 }
451}
452
453static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, 9999)) == true,
454 "pack true hasExplicit");
455
456static_assert(unpackCallingUid(packCallingIdentity(true, 1000, 9999)) == 1000, "pack true uid");
457
458static_assert(unpackCallingPid(packCallingIdentity(true, 1000, 9999)) == 9999, "pack true pid");
459
460static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, 9999)) == false,
461 "pack false hasExplicit");
462
463static_assert(unpackCallingUid(packCallingIdentity(false, 1000, 9999)) == 1000, "pack false uid");
464
465static_assert(unpackCallingPid(packCallingIdentity(false, 1000, 9999)) == 9999, "pack false pid");
466
467static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, -1)) == true,
468 "pack true (negative) hasExplicit");
469
470static_assert(unpackCallingUid(packCallingIdentity(true, 1000, -1)) == 1000,
471 "pack true (negative) uid");
472
473static_assert(unpackCallingPid(packCallingIdentity(true, 1000, -1)) == -1,
474 "pack true (negative) pid");
475
476static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, -1)) == false,
477 "pack false (negative) hasExplicit");
478
479static_assert(unpackCallingUid(packCallingIdentity(false, 1000, -1)) == 1000,
480 "pack false (negative) uid");
481
482static_assert(unpackCallingPid(packCallingIdentity(false, 1000, -1)) == -1,
483 "pack false (negative) pid");
484
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800485int64_t IPCThreadState::clearCallingIdentity()
486{
Steven Morelandf0212002018-12-26 13:59:23 -0800487 // ignore mCallingSid for legacy reasons
mattgilbride85897672022-10-22 17:42:44 +0000488 int64_t token = packCallingIdentity(mHasExplicitIdentity, mCallingUid, mCallingPid);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800489 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +0000490 mHasExplicitIdentity = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800491 return token;
492}
493
mattgilbride85897672022-10-22 17:42:44 +0000494bool IPCThreadState::hasExplicitIdentity() {
495 return mHasExplicitIdentity;
496}
497
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700498void IPCThreadState::setStrictModePolicy(int32_t policy)
499{
500 mStrictModePolicy = policy;
501}
502
Brad Fitzpatricka877cd82010-07-07 16:06:39 -0700503int32_t IPCThreadState::getStrictModePolicy() const
504{
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700505 return mStrictModePolicy;
506}
507
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000508int64_t IPCThreadState::setCallingWorkSourceUid(uid_t uid)
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100509{
Olivier Gaillard91a04802018-11-14 17:32:41 +0000510 int64_t token = setCallingWorkSourceUidWithoutPropagation(uid);
511 mPropagateWorkSource = true;
512 return token;
513}
514
515int64_t IPCThreadState::setCallingWorkSourceUidWithoutPropagation(uid_t uid)
516{
517 const int64_t propagatedBit = ((int64_t)mPropagateWorkSource) << kWorkSourcePropagatedBitIndex;
518 int64_t token = propagatedBit | mWorkSource;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100519 mWorkSource = uid;
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000520 return token;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100521}
522
Olivier Gaillard91a04802018-11-14 17:32:41 +0000523void IPCThreadState::clearPropagateWorkSource()
524{
525 mPropagateWorkSource = false;
526}
527
528bool IPCThreadState::shouldPropagateWorkSource() const
529{
530 return mPropagateWorkSource;
531}
532
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000533uid_t IPCThreadState::getCallingWorkSourceUid() const
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100534{
535 return mWorkSource;
536}
537
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000538int64_t IPCThreadState::clearCallingWorkSource()
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100539{
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000540 return setCallingWorkSourceUid(kUnsetWorkSource);
541}
542
543void IPCThreadState::restoreCallingWorkSource(int64_t token)
544{
545 uid_t uid = (int)token;
Olivier Gaillard91a04802018-11-14 17:32:41 +0000546 setCallingWorkSourceUidWithoutPropagation(uid);
547 mPropagateWorkSource = ((token >> kWorkSourcePropagatedBitIndex) & 1) == 1;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100548}
549
Brad Fitzpatrick52736032010-08-30 16:01:16 -0700550void IPCThreadState::setLastTransactionBinderFlags(int32_t flags)
551{
552 mLastTransactionBinderFlags = flags;
553}
554
555int32_t IPCThreadState::getLastTransactionBinderFlags() const
556{
557 return mLastTransactionBinderFlags;
558}
559
Steven Moreland9514b202020-09-21 18:03:27 +0000560void IPCThreadState::setCallRestriction(ProcessState::CallRestriction restriction) {
561 mCallRestriction = restriction;
562}
563
564ProcessState::CallRestriction IPCThreadState::getCallRestriction() const {
565 return mCallRestriction;
566}
567
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800568void IPCThreadState::restoreCallingIdentity(int64_t token)
569{
mattgilbride85897672022-10-22 17:42:44 +0000570 mCallingUid = unpackCallingUid(token);
Steven Morelandf0212002018-12-26 13:59:23 -0800571 mCallingSid = nullptr; // not enough data to restore
mattgilbride85897672022-10-22 17:42:44 +0000572 mCallingPid = unpackCallingPid(token);
573 mHasExplicitIdentity = unpackHasExplicitIdentity(token);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800574}
575
576void IPCThreadState::clearCaller()
577{
Marco Nelissend43b1942009-07-17 07:59:17 -0700578 mCallingPid = getpid();
Steven Morelandf0212002018-12-26 13:59:23 -0800579 mCallingSid = nullptr; // expensive to lookup
Marco Nelissend43b1942009-07-17 07:59:17 -0700580 mCallingUid = getuid();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800581}
582
583void IPCThreadState::flushCommands()
584{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200585 if (mProcess->mDriverFD < 0)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800586 return;
587 talkWithDriver(false);
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700588 // The flush could have caused post-write refcount decrements to have
589 // been executed, which in turn could result in BC_RELEASE/BC_DECREFS
590 // being queued in mOut. So flush again, if we need to.
591 if (mOut.dataSize() > 0) {
592 talkWithDriver(false);
593 }
594 if (mOut.dataSize() > 0) {
595 ALOGW("mOut.dataSize() > 0 after flushCommands()");
596 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800597}
598
Martijn Coenen0442a862017-11-17 10:46:32 +0100599bool IPCThreadState::flushIfNeeded()
600{
Frankie Changf4c81372021-05-18 13:08:05 +0800601 if (mIsLooper || mServingStackPointer != nullptr || mIsFlushing) {
Martijn Coenen0442a862017-11-17 10:46:32 +0100602 return false;
603 }
Frankie Changf4c81372021-05-18 13:08:05 +0800604 mIsFlushing = true;
Martijn Coenen0442a862017-11-17 10:46:32 +0100605 // In case this thread is not a looper and is not currently serving a binder transaction,
606 // there's no guarantee that this thread will call back into the kernel driver any time
607 // soon. Therefore, flush pending commands such as BC_FREE_BUFFER, to prevent them from getting
608 // stuck in this thread's out buffer.
609 flushCommands();
Frankie Changf4c81372021-05-18 13:08:05 +0800610 mIsFlushing = false;
Martijn Coenen0442a862017-11-17 10:46:32 +0100611 return true;
612}
613
Wale Ogunwale376b8222015-04-13 16:16:10 -0700614void IPCThreadState::blockUntilThreadAvailable()
615{
Frederick Mayle263507f2024-05-30 14:54:27 -0700616 std::unique_lock lock_guard_(mProcess->mOnThreadAvailableLock);
617 mProcess->mOnThreadAvailableWaiting++;
618 mProcess->mOnThreadAvailableCondVar.wait(lock_guard_, [&] {
619 size_t max = mProcess->mMaxThreads;
620 size_t cur = mProcess->mExecutingThreadsCount;
621 if (cur < max) {
622 return true;
623 }
Frederick Mayle99490ac2024-06-18 12:21:18 -0700624 ALOGW("Waiting for thread to be free. mExecutingThreadsCount=%zu mMaxThreads=%zu\n", cur,
625 max);
Frederick Mayle263507f2024-05-30 14:54:27 -0700626 return false;
627 });
628 mProcess->mOnThreadAvailableWaiting--;
Wale Ogunwale376b8222015-04-13 16:16:10 -0700629}
630
Todd Poynor8d96cab2013-06-25 19:12:18 -0700631status_t IPCThreadState::getAndExecuteCommand()
632{
633 status_t result;
634 int32_t cmd;
635
636 result = talkWithDriver();
637 if (result >= NO_ERROR) {
638 size_t IN = mIn.dataAvail();
639 if (IN < sizeof(int32_t)) return result;
640 cmd = mIn.readInt32();
641 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000642 std::ostringstream logStream;
643 logStream << "Processing top-level Command: " << getReturnString(cmd) << "\n";
644 std::string message = logStream.str();
645 ALOGI("%s", message.c_str());
Todd Poynor8d96cab2013-06-25 19:12:18 -0700646 }
647
Frederick Mayle263507f2024-05-30 14:54:27 -0700648 size_t newThreadsCount = mProcess->mExecutingThreadsCount.fetch_add(1) + 1;
649 if (newThreadsCount >= mProcess->mMaxThreads) {
650 int64_t expected = 0;
651 mProcess->mStarvationStartTimeMs.compare_exchange_strong(expected, uptimeMillis());
Colin Cross96e83222016-04-15 14:29:55 -0700652 }
Wale Ogunwale376b8222015-04-13 16:16:10 -0700653
Todd Poynor8d96cab2013-06-25 19:12:18 -0700654 result = executeCommand(cmd);
655
Frederick Mayle263507f2024-05-30 14:54:27 -0700656 size_t maxThreads = mProcess->mMaxThreads;
657 newThreadsCount = mProcess->mExecutingThreadsCount.fetch_sub(1) - 1;
658 if (newThreadsCount < maxThreads) {
659 size_t starvationStartTimeMs = mProcess->mStarvationStartTimeMs.exchange(0);
660 if (starvationStartTimeMs != 0) {
661 int64_t starvationTimeMs = uptimeMillis() - starvationStartTimeMs;
662 if (starvationTimeMs > 100) {
663 ALOGE("binder thread pool (%zu threads) starved for %" PRId64 " ms", maxThreads,
664 starvationTimeMs);
665 }
Colin Cross96e83222016-04-15 14:29:55 -0700666 }
Colin Cross96e83222016-04-15 14:29:55 -0700667 }
Steven Morelandc648a762021-01-16 02:39:45 +0000668
669 // Cond broadcast can be expensive, so don't send it every time a binder
670 // call is processed. b/168806193
Frederick Mayle263507f2024-05-30 14:54:27 -0700671 if (mProcess->mOnThreadAvailableWaiting > 0) {
672 std::lock_guard lock_guard_(mProcess->mOnThreadAvailableLock);
673 mProcess->mOnThreadAvailableCondVar.notify_all();
Steven Morelandc648a762021-01-16 02:39:45 +0000674 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700675 }
676
677 return result;
678}
679
680// When we've cleared the incoming command queue, process any pending derefs
681void IPCThreadState::processPendingDerefs()
682{
683 if (mIn.dataPosition() >= mIn.dataSize()) {
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200684 /*
685 * The decWeak()/decStrong() calls may cause a destructor to run,
686 * which in turn could have initiated an outgoing transaction,
687 * which in turn could cause us to add to the pending refs
688 * vectors; so instead of simply iterating, loop until they're empty.
689 *
690 * We do this in an outer loop, because calling decStrong()
691 * may result in something being added to mPendingWeakDerefs,
692 * which could be delayed until the next incoming command
693 * from the driver if we don't process it now.
694 */
695 while (mPendingWeakDerefs.size() > 0 || mPendingStrongDerefs.size() > 0) {
696 while (mPendingWeakDerefs.size() > 0) {
697 RefBase::weakref_type* refs = mPendingWeakDerefs[0];
698 mPendingWeakDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700699 refs->decWeak(mProcess.get());
700 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700701
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200702 if (mPendingStrongDerefs.size() > 0) {
703 // We don't use while() here because we don't want to re-order
704 // strong and weak decs at all; if this decStrong() causes both a
705 // decWeak() and a decStrong() to be queued, we want to process
706 // the decWeak() first.
707 BBinder* obj = mPendingStrongDerefs[0];
708 mPendingStrongDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700709 obj->decStrong(mProcess.get());
710 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700711 }
712 }
713}
714
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700715void IPCThreadState::processPostWriteDerefs()
716{
717 for (size_t i = 0; i < mPostWriteWeakDerefs.size(); i++) {
718 RefBase::weakref_type* refs = mPostWriteWeakDerefs[i];
719 refs->decWeak(mProcess.get());
720 }
721 mPostWriteWeakDerefs.clear();
722
723 for (size_t i = 0; i < mPostWriteStrongDerefs.size(); i++) {
724 RefBase* obj = mPostWriteStrongDerefs[i];
725 obj->decStrong(mProcess.get());
726 }
727 mPostWriteStrongDerefs.clear();
728}
729
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800730void IPCThreadState::joinThreadPool(bool isMain)
731{
Frederick Mayle263507f2024-05-30 14:54:27 -0700732 LOG_THREADPOOL("**** THREAD %p (PID %d) IS JOINING THE THREAD POOL\n", (void*)pthread_self(),
733 getpid());
Elie Kheirallah47431c12022-04-21 23:46:17 +0000734 mProcess->mCurrentThreads++;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800735 mOut.writeInt32(isMain ? BC_ENTER_LOOPER : BC_REGISTER_LOOPER);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800736
Martijn Coenen0442a862017-11-17 10:46:32 +0100737 mIsLooper = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800738 status_t result;
739 do {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700740 processPendingDerefs();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800741 // now get the next command to be processed, waiting if necessary
Todd Poynor8d96cab2013-06-25 19:12:18 -0700742 result = getAndExecuteCommand();
Jason Parksdcd39582009-11-03 12:14:38 -0800743
Todd Poynor8d96cab2013-06-25 19:12:18 -0700744 if (result < NO_ERROR && result != TIMED_OUT && result != -ECONNREFUSED && result != -EBADF) {
Steven Moreland6adf33c2019-09-25 13:18:09 -0700745 LOG_ALWAYS_FATAL("getAndExecuteCommand(fd=%d) returned unexpected error %d, aborting",
Jeff Tinkeref073862013-06-11 11:30:21 -0700746 mProcess->mDriverFD, result);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800747 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800748
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800749 // Let this thread exit the thread pool if it is no longer
750 // needed and it is not the main process thread.
751 if(result == TIMED_OUT && !isMain) {
752 break;
753 }
754 } while (result != -ECONNREFUSED && result != -EBADF);
755
Wei Wangc7341432016-10-19 10:23:59 -0700756 LOG_THREADPOOL("**** THREAD %p (PID %d) IS LEAVING THE THREAD POOL err=%d\n",
757 (void*)pthread_self(), getpid(), result);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800758
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800759 mOut.writeInt32(BC_EXIT_LOOPER);
Martijn Coenen0442a862017-11-17 10:46:32 +0100760 mIsLooper = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800761 talkWithDriver(false);
Frederick Mayle263507f2024-05-30 14:54:27 -0700762 size_t oldCount = mProcess->mCurrentThreads.fetch_sub(1);
763 LOG_ALWAYS_FATAL_IF(oldCount == 0,
764 "Threadpool thread count underflowed. Thread cannot exist and exit in "
765 "empty threadpool\n"
Elie Kheirallah47431c12022-04-21 23:46:17 +0000766 "Misconfiguration. Increase threadpool max threads configuration\n");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800767}
768
Steven Morelandd8c85672020-07-24 21:30:41 +0000769status_t IPCThreadState::setupPolling(int* fd)
Todd Poynor8d96cab2013-06-25 19:12:18 -0700770{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200771 if (mProcess->mDriverFD < 0) {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700772 return -EBADF;
773 }
774
775 mOut.writeInt32(BC_ENTER_LOOPER);
Steven Morelandf210b502021-01-15 23:40:32 +0000776 flushCommands();
Todd Poynor8d96cab2013-06-25 19:12:18 -0700777 *fd = mProcess->mDriverFD;
Elie Kheirallah47431c12022-04-21 23:46:17 +0000778 mProcess->mCurrentThreads++;
Todd Poynor8d96cab2013-06-25 19:12:18 -0700779 return 0;
780}
781
782status_t IPCThreadState::handlePolledCommands()
783{
784 status_t result;
785
786 do {
787 result = getAndExecuteCommand();
788 } while (mIn.dataPosition() < mIn.dataSize());
789
790 processPendingDerefs();
791 flushCommands();
792 return result;
793}
794
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800795void IPCThreadState::stopProcess(bool /*immediate*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800796{
Steve Blocka19954a2012-01-04 20:05:49 +0000797 //ALOGI("**** STOPPING PROCESS");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800798 flushCommands();
799 int fd = mProcess->mDriverFD;
800 mProcess->mDriverFD = -1;
801 close(fd);
802 //kill(getpid(), SIGKILL);
803}
804
805status_t IPCThreadState::transact(int32_t handle,
806 uint32_t code, const Parcel& data,
807 Parcel* reply, uint32_t flags)
808{
Steven Moreland5553ac42020-11-11 02:14:45 +0000809 LOG_ALWAYS_FATAL_IF(data.isForRpc(), "Parcel constructed for RPC, but being used with binder.");
810
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800811 status_t err;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800812
813 flags |= TF_ACCEPT_FDS;
814
815 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000816 std::ostringstream logStream;
817 logStream << "BC_TRANSACTION thr " << (void*)pthread_self() << " / hand " << handle
818 << " / code " << TypeCode(code) << ": \t" << data << "\n";
819 std::string message = logStream.str();
820 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800821 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800822
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800823 LOG_ONEWAY(">>>> SEND from pid %d uid %d %s", getpid(), getuid(),
824 (flags & TF_ONE_WAY) == 0 ? "READ REPLY" : "ONE WAY");
Yi Kongfdd8da92018-06-07 17:52:27 -0700825 err = writeTransactionData(BC_TRANSACTION, flags, handle, code, data, nullptr);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800826
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800827 if (err != NO_ERROR) {
828 if (reply) reply->setError(err);
829 return (mLastError = err);
830 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800831
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800832 if ((flags & TF_ONE_WAY) == 0) {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700833 if (mCallRestriction != ProcessState::CallRestriction::NONE) [[unlikely]] {
Steven Moreland7732a092019-01-02 17:54:16 -0800834 if (mCallRestriction == ProcessState::CallRestriction::ERROR_IF_NOT_ONEWAY) {
Steven Moreland8cb34fc2019-05-13 11:44:55 -0700835 ALOGE("Process making non-oneway call (code: %u) but is restricted.", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800836 CallStack::logStack("non-oneway call", CallStack::getCurrent(10).get(),
837 ANDROID_LOG_ERROR);
838 } else /* FATAL_IF_NOT_ONEWAY */ {
Steven Morelandfcc77f12020-09-01 01:16:11 +0000839 LOG_ALWAYS_FATAL("Process may not make non-oneway calls (code: %u).", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800840 }
841 }
842
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700843#if 0
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700844 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000845 ALOGI(">>>>>> CALLING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700846 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000847 ALOGI(">>>>>> CALLING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700848 }
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700849#endif
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800850 if (reply) {
851 err = waitForResponse(reply);
852 } else {
853 Parcel fakeReply;
854 err = waitForResponse(&fakeReply);
855 }
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700856 #if 0
857 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000858 ALOGI("<<<<<< RETURNING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700859 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000860 ALOGI("<<<<<< RETURNING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700861 }
862 #endif
Tim Murrayd429f4a2017-03-07 09:31:09 -0800863
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800864 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000865 std::ostringstream logStream;
866 logStream << "BR_REPLY thr " << (void*)pthread_self() << " / hand " << handle << ": ";
867 if (reply)
868 logStream << "\t" << *reply << "\n";
869 else
870 logStream << "(none requested)"
871 << "\n";
872 std::string message = logStream.str();
873 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800874 }
875 } else {
Yi Kongfdd8da92018-06-07 17:52:27 -0700876 err = waitForResponse(nullptr, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800877 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800878
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800879 return err;
880}
881
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700882void IPCThreadState::incStrongHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800883{
884 LOG_REMOTEREFS("IPCThreadState::incStrongHandle(%d)\n", handle);
885 mOut.writeInt32(BC_ACQUIRE);
886 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100887 if (!flushIfNeeded()) {
888 // Create a temp reference until the driver has handled this command.
889 proxy->incStrong(mProcess.get());
890 mPostWriteStrongDerefs.push(proxy);
891 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800892}
893
894void IPCThreadState::decStrongHandle(int32_t handle)
895{
896 LOG_REMOTEREFS("IPCThreadState::decStrongHandle(%d)\n", handle);
897 mOut.writeInt32(BC_RELEASE);
898 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100899 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800900}
901
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700902void IPCThreadState::incWeakHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800903{
904 LOG_REMOTEREFS("IPCThreadState::incWeakHandle(%d)\n", handle);
905 mOut.writeInt32(BC_INCREFS);
906 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100907 if (!flushIfNeeded()) {
908 // Create a temp reference until the driver has handled this command.
909 proxy->getWeakRefs()->incWeak(mProcess.get());
910 mPostWriteWeakDerefs.push(proxy->getWeakRefs());
911 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800912}
913
914void IPCThreadState::decWeakHandle(int32_t handle)
915{
916 LOG_REMOTEREFS("IPCThreadState::decWeakHandle(%d)\n", handle);
917 mOut.writeInt32(BC_DECREFS);
918 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100919 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800920}
921
Steven Moreland1bf42912024-02-16 22:29:42 +0000922status_t IPCThreadState::attemptIncStrongHandle(int32_t handle) {
Arve HjønnevÄg11cfdcc2014-02-14 20:14:02 -0800923 (void)handle;
924 ALOGE("%s(%d): Not supported\n", __func__, handle);
925 return INVALID_OPERATION;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800926}
927
928void IPCThreadState::expungeHandle(int32_t handle, IBinder* binder)
929{
930#if LOG_REFCOUNTS
liangweikanga43ee152016-10-25 16:37:54 +0800931 ALOGV("IPCThreadState::expungeHandle(%ld)\n", handle);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800932#endif
Manoj Gupta9cec85b2017-09-19 16:34:29 -0700933 self()->mProcess->expungeHandle(handle, binder); // NOLINT
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800934}
935
936status_t IPCThreadState::requestDeathNotification(int32_t handle, BpBinder* proxy)
937{
938 mOut.writeInt32(BC_REQUEST_DEATH_NOTIFICATION);
939 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000940 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800941 return NO_ERROR;
942}
943
944status_t IPCThreadState::clearDeathNotification(int32_t handle, BpBinder* proxy)
945{
946 mOut.writeInt32(BC_CLEAR_DEATH_NOTIFICATION);
947 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000948 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800949 return NO_ERROR;
950}
951
952IPCThreadState::IPCThreadState()
Steven Moreland35626652021-05-15 01:32:04 +0000953 : mProcess(ProcessState::self()),
954 mServingStackPointer(nullptr),
955 mServingStackPointerGuard(nullptr),
956 mWorkSource(kUnsetWorkSource),
957 mPropagateWorkSource(false),
958 mIsLooper(false),
Frankie Changf4c81372021-05-18 13:08:05 +0800959 mIsFlushing(false),
Steven Moreland35626652021-05-15 01:32:04 +0000960 mStrictModePolicy(0),
961 mLastTransactionBinderFlags(0),
962 mCallRestriction(mProcess->mCallRestriction) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800963 pthread_setspecific(gTLS, this);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800964 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +0000965 mHasExplicitIdentity = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800966 mIn.setDataCapacity(256);
967 mOut.setDataCapacity(256);
968}
969
970IPCThreadState::~IPCThreadState()
971{
972}
973
Martijn Coenenea0090a2017-11-02 18:54:40 +0000974status_t IPCThreadState::sendReply(const Parcel& reply, uint32_t flags)
975{
976 status_t err;
977 status_t statusBuffer;
978 err = writeTransactionData(BC_REPLY, flags, -1, 0, reply, &statusBuffer);
979 if (err < NO_ERROR) return err;
980
Yi Kongfdd8da92018-06-07 17:52:27 -0700981 return waitForResponse(nullptr, nullptr);
Martijn Coenenea0090a2017-11-02 18:54:40 +0000982}
983
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800984status_t IPCThreadState::waitForResponse(Parcel *reply, status_t *acquireResult)
985{
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100986 uint32_t cmd;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800987 int32_t err;
988
989 while (1) {
990 if ((err=talkWithDriver()) < NO_ERROR) break;
991 err = mIn.errorCheck();
992 if (err < NO_ERROR) break;
993 if (mIn.dataAvail() == 0) continue;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800994
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100995 cmd = (uint32_t)mIn.readInt32();
Tim Murrayd429f4a2017-03-07 09:31:09 -0800996
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800997 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000998 std::ostringstream logStream;
999 logStream << "Processing waitForResponse Command: " << getReturnString(cmd) << "\n";
1000 std::string message = logStream.str();
1001 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001002 }
1003
1004 switch (cmd) {
Hang Lub185ac02021-03-24 13:17:22 +08001005 case BR_ONEWAY_SPAM_SUSPECT:
1006 ALOGE("Process seems to be sending too many oneway calls.");
1007 CallStack::logStack("oneway spamming", CallStack::getCurrent().get(),
1008 ANDROID_LOG_ERROR);
1009 [[fallthrough]];
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001010 case BR_TRANSACTION_COMPLETE:
1011 if (!reply && !acquireResult) goto finish;
1012 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001013
Li Li0e3443d2022-12-07 21:51:19 -08001014 case BR_TRANSACTION_PENDING_FROZEN:
1015 ALOGW("Sending oneway calls to frozen process.");
1016 goto finish;
1017
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001018 case BR_DEAD_REPLY:
1019 err = DEAD_OBJECT;
1020 goto finish;
1021
1022 case BR_FAILED_REPLY:
1023 err = FAILED_TRANSACTION;
1024 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001025
Marco Ballesio7ee17572020-09-08 10:30:03 -07001026 case BR_FROZEN_REPLY:
Steven Moreland389154e2024-05-28 22:22:38 +00001027 ALOGW("Transaction failed because process frozen.");
Marco Ballesio7ee17572020-09-08 10:30:03 -07001028 err = FAILED_TRANSACTION;
1029 goto finish;
1030
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001031 case BR_ACQUIRE_RESULT:
1032 {
Steve Block67263472012-01-09 18:35:44 +00001033 ALOG_ASSERT(acquireResult != NULL, "Unexpected brACQUIRE_RESULT");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001034 const int32_t result = mIn.readInt32();
1035 if (!acquireResult) continue;
1036 *acquireResult = result ? NO_ERROR : INVALID_OPERATION;
1037 }
1038 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001039
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001040 case BR_REPLY:
1041 {
1042 binder_transaction_data tr;
1043 err = mIn.read(&tr, sizeof(tr));
Steve Block67263472012-01-09 18:35:44 +00001044 ALOG_ASSERT(err == NO_ERROR, "Not enough command data for brREPLY");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001045 if (err != NO_ERROR) goto finish;
1046
1047 if (reply) {
1048 if ((tr.flags & TF_STATUS_CODE) == 0) {
1049 reply->ipcSetDataReference(
1050 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1051 tr.data_size,
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001052 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1053 tr.offsets_size/sizeof(binder_size_t),
Steven Moreland161fe122020-11-12 23:16:47 +00001054 freeBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001055 } else {
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001056 err = *reinterpret_cast<const status_t*>(tr.data.ptr.buffer);
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001057 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1058 tr.data_size,
1059 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1060 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001061 }
1062 } else {
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001063 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer), tr.data_size,
1064 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1065 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001066 continue;
1067 }
1068 }
1069 goto finish;
1070
1071 default:
1072 err = executeCommand(cmd);
1073 if (err != NO_ERROR) goto finish;
1074 break;
1075 }
1076 }
1077
1078finish:
1079 if (err != NO_ERROR) {
1080 if (acquireResult) *acquireResult = err;
1081 if (reply) reply->setError(err);
1082 mLastError = err;
Carlos Llamasb235b122021-12-20 06:38:44 -08001083 logExtendedError();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001084 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001085
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001086 return err;
1087}
1088
1089status_t IPCThreadState::talkWithDriver(bool doReceive)
1090{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001091 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001092 return -EBADF;
1093 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001094
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001095 binder_write_read bwr;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001096
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001097 // Is the read buffer empty?
1098 const bool needRead = mIn.dataPosition() >= mIn.dataSize();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001099
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001100 // We don't want to write anything if we are still reading
1101 // from data left in the input buffer and the caller
1102 // has requested to read the next data.
1103 const size_t outAvail = (!doReceive || needRead) ? mOut.dataSize() : 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001104
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001105 bwr.write_size = outAvail;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001106 bwr.write_buffer = (uintptr_t)mOut.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001107
1108 // This is what we'll read.
1109 if (doReceive && needRead) {
1110 bwr.read_size = mIn.dataCapacity();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001111 bwr.read_buffer = (uintptr_t)mIn.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001112 } else {
1113 bwr.read_size = 0;
Ben Chengd640f892011-12-01 17:11:32 -08001114 bwr.read_buffer = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001115 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001116
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001117 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001118 std::ostringstream logStream;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001119 if (outAvail != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001120 logStream << "Sending commands to driver: ";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001121 const void* cmds = (const void*)bwr.write_buffer;
Pawan Wagh7063b522022-09-28 18:52:26 +00001122 const void* end = ((const uint8_t*)cmds) + bwr.write_size;
1123 logStream << "\t" << HexDump(cmds, bwr.write_size) << "\n";
1124 while (cmds < end) cmds = printCommand(logStream, cmds);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001125 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001126 logStream << "Size of receive buffer: " << bwr.read_size << ", needRead: " << needRead
1127 << ", doReceive: " << doReceive << "\n";
1128
1129 std::string message = logStream.str();
1130 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001131 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001132
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001133 // Return immediately if there is nothing to do.
1134 if ((bwr.write_size == 0) && (bwr.read_size == 0)) return NO_ERROR;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001135
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001136 bwr.write_consumed = 0;
1137 bwr.read_consumed = 0;
1138 status_t err;
1139 do {
1140 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001141 std::ostringstream logStream;
1142 logStream << "About to read/write, write size = " << mOut.dataSize() << "\n";
1143 std::string message = logStream.str();
1144 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001145 }
Elliott Hughes6071da72015-08-12 15:27:47 -07001146#if defined(__ANDROID__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001147 if (ioctl(mProcess->mDriverFD, BINDER_WRITE_READ, &bwr) >= 0)
1148 err = NO_ERROR;
1149 else
1150 err = -errno;
1151#else
1152 err = INVALID_OPERATION;
1153#endif
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001154 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001155 err = -EBADF;
1156 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001157 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001158 std::ostringstream logStream;
1159 logStream << "Finished read/write, write size = " << mOut.dataSize() << "\n";
1160 std::string message = logStream.str();
1161 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001162 }
1163 } while (err == -EINTR);
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001164
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001165 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001166 std::ostringstream logStream;
1167 logStream << "Our err: " << (void*)(intptr_t)err
1168 << ", write consumed: " << bwr.write_consumed << " (of " << mOut.dataSize()
1169 << "), read consumed: " << bwr.read_consumed << "\n";
1170 std::string message = logStream.str();
1171 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001172 }
1173
1174 if (err >= NO_ERROR) {
1175 if (bwr.write_consumed > 0) {
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001176 if (bwr.write_consumed < mOut.dataSize())
Steven Morelandb077deb2020-04-16 16:22:52 -07001177 LOG_ALWAYS_FATAL("Driver did not consume write buffer. "
1178 "err: %s consumed: %zu of %zu",
1179 statusToString(err).c_str(),
1180 (size_t)bwr.write_consumed,
1181 mOut.dataSize());
Martijn Coenen7c170bb2018-05-04 17:28:55 -07001182 else {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001183 mOut.setDataSize(0);
Martijn Coenen7c170bb2018-05-04 17:28:55 -07001184 processPostWriteDerefs();
1185 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001186 }
1187 if (bwr.read_consumed > 0) {
1188 mIn.setDataSize(bwr.read_consumed);
1189 mIn.setDataPosition(0);
1190 }
1191 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001192 std::ostringstream logStream;
1193 logStream << "Remaining data size: " << mOut.dataSize() << "\n";
1194 logStream << "Received commands from driver: ";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001195 const void* cmds = mIn.data();
1196 const void* end = mIn.data() + mIn.dataSize();
Pawan Wagh7063b522022-09-28 18:52:26 +00001197 logStream << "\t" << HexDump(cmds, mIn.dataSize()) << "\n";
1198 while (cmds < end) cmds = printReturnCommand(logStream, cmds);
1199 std::string message = logStream.str();
1200 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001201 }
1202 return NO_ERROR;
1203 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001204
Theodore Duboisbf144632023-01-09 15:36:49 -08001205 ALOGE_IF(mProcess->mDriverFD >= 0,
1206 "Driver returned error (%s). This is a bug in either libbinder or the driver. This "
1207 "thread's connection to %s will no longer work.",
1208 statusToString(err).c_str(), mProcess->mDriverName.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001209 return err;
1210}
1211
1212status_t IPCThreadState::writeTransactionData(int32_t cmd, uint32_t binderFlags,
1213 int32_t handle, uint32_t code, const Parcel& data, status_t* statusBuffer)
1214{
1215 binder_transaction_data tr;
1216
Arve HjønnevÄg07fd0f12014-02-18 21:10:29 -08001217 tr.target.ptr = 0; /* Don't pass uninitialized stack data to a remote process */
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001218 tr.target.handle = handle;
1219 tr.code = code;
1220 tr.flags = binderFlags;
Evgeniy Stepanovd5474322011-04-21 14:15:00 +04001221 tr.cookie = 0;
1222 tr.sender_pid = 0;
1223 tr.sender_euid = 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001224
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001225 const status_t err = data.errorCheck();
1226 if (err == NO_ERROR) {
1227 tr.data_size = data.ipcDataSize();
1228 tr.data.ptr.buffer = data.ipcData();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001229 tr.offsets_size = data.ipcObjectsCount()*sizeof(binder_size_t);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001230 tr.data.ptr.offsets = data.ipcObjects();
1231 } else if (statusBuffer) {
1232 tr.flags |= TF_STATUS_CODE;
1233 *statusBuffer = err;
1234 tr.data_size = sizeof(status_t);
Arve HjønnevÄg87b30d02014-02-18 21:04:31 -08001235 tr.data.ptr.buffer = reinterpret_cast<uintptr_t>(statusBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001236 tr.offsets_size = 0;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001237 tr.data.ptr.offsets = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001238 } else {
1239 return (mLastError = err);
1240 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001241
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001242 mOut.writeInt32(cmd);
1243 mOut.write(&tr, sizeof(tr));
Tim Murrayd429f4a2017-03-07 09:31:09 -08001244
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001245 return NO_ERROR;
1246}
1247
1248sp<BBinder> the_context_object;
1249
Jiyong Park384328e2020-11-13 17:16:48 +09001250void IPCThreadState::setTheContextObject(const sp<BBinder>& obj)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001251{
1252 the_context_object = obj;
1253}
1254
1255status_t IPCThreadState::executeCommand(int32_t cmd)
1256{
1257 BBinder* obj;
1258 RefBase::weakref_type* refs;
1259 status_t result = NO_ERROR;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001260
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001261 switch ((uint32_t)cmd) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001262 case BR_ERROR:
1263 result = mIn.readInt32();
1264 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001265
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001266 case BR_OK:
1267 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001268
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001269 case BR_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001270 refs = (RefBase::weakref_type*)mIn.readPointer();
1271 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001272 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001273 "BR_ACQUIRE: object %p does not match cookie %p (expected %p)",
1274 refs, obj, refs->refBase());
1275 obj->incStrong(mProcess.get());
1276 IF_LOG_REMOTEREFS() {
1277 LOG_REMOTEREFS("BR_ACQUIRE from driver on %p", obj);
1278 obj->printRefs();
1279 }
1280 mOut.writeInt32(BC_ACQUIRE_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001281 mOut.writePointer((uintptr_t)refs);
1282 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001283 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001284
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001285 case BR_RELEASE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001286 refs = (RefBase::weakref_type*)mIn.readPointer();
1287 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001288 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001289 "BR_RELEASE: object %p does not match cookie %p (expected %p)",
1290 refs, obj, refs->refBase());
1291 IF_LOG_REMOTEREFS() {
1292 LOG_REMOTEREFS("BR_RELEASE from driver on %p", obj);
1293 obj->printRefs();
1294 }
1295 mPendingStrongDerefs.push(obj);
1296 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001297
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001298 case BR_INCREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001299 refs = (RefBase::weakref_type*)mIn.readPointer();
1300 obj = (BBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001301 refs->incWeak(mProcess.get());
1302 mOut.writeInt32(BC_INCREFS_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001303 mOut.writePointer((uintptr_t)refs);
1304 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001305 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001306
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001307 case BR_DECREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001308 refs = (RefBase::weakref_type*)mIn.readPointer();
Jiyong Park5970d0a2022-03-08 16:56:13 +09001309 // NOLINTNEXTLINE(clang-analyzer-deadcode.DeadStores)
1310 obj = (BBinder*)mIn.readPointer(); // consume
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001311 // NOTE: This assertion is not valid, because the object may no
1312 // longer exist (thus the (BBinder*)cast above resulting in a different
1313 // memory address).
Steve Block67263472012-01-09 18:35:44 +00001314 //ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001315 // "BR_DECREFS: object %p does not match cookie %p (expected %p)",
1316 // refs, obj, refs->refBase());
1317 mPendingWeakDerefs.push(refs);
1318 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001319
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001320 case BR_ATTEMPT_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001321 refs = (RefBase::weakref_type*)mIn.readPointer();
1322 obj = (BBinder*)mIn.readPointer();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001323
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001324 {
1325 const bool success = refs->attemptIncStrong(mProcess.get());
Steve Block67263472012-01-09 18:35:44 +00001326 ALOG_ASSERT(success && refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001327 "BR_ATTEMPT_ACQUIRE: object %p does not match cookie %p (expected %p)",
1328 refs, obj, refs->refBase());
Tim Murrayd429f4a2017-03-07 09:31:09 -08001329
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001330 mOut.writeInt32(BC_ACQUIRE_RESULT);
1331 mOut.writeInt32((int32_t)success);
1332 }
1333 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001334
Steven Morelandf0212002018-12-26 13:59:23 -08001335 case BR_TRANSACTION_SEC_CTX:
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001336 case BR_TRANSACTION:
1337 {
Steven Morelandf0212002018-12-26 13:59:23 -08001338 binder_transaction_data_secctx tr_secctx;
1339 binder_transaction_data& tr = tr_secctx.transaction_data;
1340
1341 if (cmd == (int) BR_TRANSACTION_SEC_CTX) {
1342 result = mIn.read(&tr_secctx, sizeof(tr_secctx));
1343 } else {
1344 result = mIn.read(&tr, sizeof(tr));
1345 tr_secctx.secctx = 0;
1346 }
1347
Steve Block67263472012-01-09 18:35:44 +00001348 ALOG_ASSERT(result == NO_ERROR,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001349 "Not enough command data for brTRANSACTION");
1350 if (result != NO_ERROR) break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001351
Martijn Coenenea0090a2017-11-02 18:54:40 +00001352 Parcel buffer;
1353 buffer.ipcSetDataReference(
1354 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1355 tr.data_size,
1356 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
Steven Moreland161fe122020-11-12 23:16:47 +00001357 tr.offsets_size/sizeof(binder_size_t), freeBuffer);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001358
Steven Moreland39d887d2020-01-31 14:56:45 -08001359 const void* origServingStackPointer = mServingStackPointer;
Steven Moreland35626652021-05-15 01:32:04 +00001360 mServingStackPointer = __builtin_frame_address(0);
Steven Moreland39d887d2020-01-31 14:56:45 -08001361
Martijn Coenenea0090a2017-11-02 18:54:40 +00001362 const pid_t origPid = mCallingPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001363 const char* origSid = mCallingSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001364 const uid_t origUid = mCallingUid;
mattgilbride85897672022-10-22 17:42:44 +00001365 const bool origHasExplicitIdentity = mHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001366 const int32_t origStrictModePolicy = mStrictModePolicy;
1367 const int32_t origTransactionBinderFlags = mLastTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001368 const int32_t origWorkSource = mWorkSource;
1369 const bool origPropagateWorkSet = mPropagateWorkSource;
1370 // Calling work source will be set by Parcel#enforceInterface. Parcel#enforceInterface
1371 // is only guaranteed to be called for AIDL-generated stubs so we reset the work source
1372 // here to never propagate it.
1373 clearCallingWorkSource();
1374 clearPropagateWorkSource();
Martijn Coenenea0090a2017-11-02 18:54:40 +00001375
1376 mCallingPid = tr.sender_pid;
Steven Morelandf0212002018-12-26 13:59:23 -08001377 mCallingSid = reinterpret_cast<const char*>(tr_secctx.secctx);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001378 mCallingUid = tr.sender_euid;
mattgilbride85897672022-10-22 17:42:44 +00001379 mHasExplicitIdentity = false;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001380 mLastTransactionBinderFlags = tr.flags;
1381
Steven Morelandf0212002018-12-26 13:59:23 -08001382 // ALOGI(">>>> TRANSACT from pid %d sid %s uid %d\n", mCallingPid,
1383 // (mCallingSid ? mCallingSid : "<N/A>"), mCallingUid);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001384
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001385 Parcel reply;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001386 status_t error;
1387 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001388 std::ostringstream logStream;
1389 logStream << "BR_TRANSACTION thr " << (void*)pthread_self() << " / obj "
1390 << tr.target.ptr << " / code " << TypeCode(tr.code) << ": \t" << buffer
1391 << "\n"
1392 << "Data addr = " << reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer)
1393 << ", offsets addr="
1394 << reinterpret_cast<const size_t*>(tr.data.ptr.offsets) << "\n";
1395 std::string message = logStream.str();
1396 ALOGI("%s", message.c_str());
Martijn Coenenea0090a2017-11-02 18:54:40 +00001397 }
1398 if (tr.target.ptr) {
1399 // We only have a weak reference on the target object, so we must first try to
1400 // safely acquire a strong reference before doing anything else with it.
1401 if (reinterpret_cast<RefBase::weakref_type*>(
1402 tr.target.ptr)->attemptIncStrong(this)) {
1403 error = reinterpret_cast<BBinder*>(tr.cookie)->transact(tr.code, buffer,
1404 &reply, tr.flags);
1405 reinterpret_cast<BBinder*>(tr.cookie)->decStrong(this);
Dianne Hackbornc1114612016-03-21 10:36:54 -07001406 } else {
Martijn Coenenea0090a2017-11-02 18:54:40 +00001407 error = UNKNOWN_TRANSACTION;
Dianne Hackbornc1114612016-03-21 10:36:54 -07001408 }
Brad Fitzpatrick52736032010-08-30 16:01:16 -07001409
Martijn Coenenea0090a2017-11-02 18:54:40 +00001410 } else {
1411 error = the_context_object->transact(tr.code, buffer, &reply, tr.flags);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001412 }
Dianne Hackborn5ee2c9d2014-09-30 11:30:03 -07001413
Steven Morelandf0212002018-12-26 13:59:23 -08001414 //ALOGI("<<<< TRANSACT from pid %d restore pid %d sid %s uid %d\n",
1415 // mCallingPid, origPid, (origSid ? origSid : "<N/A>"), origUid);
Tim Murrayd429f4a2017-03-07 09:31:09 -08001416
Martijn Coenenea0090a2017-11-02 18:54:40 +00001417 if ((tr.flags & TF_ONE_WAY) == 0) {
1418 LOG_ONEWAY("Sending reply to %d!", mCallingPid);
1419 if (error < NO_ERROR) reply.setError(error);
Steven Morelandf183fdd2020-10-27 00:12:12 +00001420
Steven Morelandce15b9f2022-09-08 17:42:45 +00001421 // b/238777741: clear buffer before we send the reply.
1422 // Otherwise, there is a race where the client may
1423 // receive the reply and send another transaction
1424 // here and the space used by this transaction won't
1425 // be freed for the client.
1426 buffer.setDataSize(0);
1427
Steven Morelandf183fdd2020-10-27 00:12:12 +00001428 constexpr uint32_t kForwardReplyFlags = TF_CLEAR_BUF;
1429 sendReply(reply, (tr.flags & kForwardReplyFlags));
Martijn Coenenea0090a2017-11-02 18:54:40 +00001430 } else {
Steven Moreland80844f72020-12-12 02:06:08 +00001431 if (error != OK) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001432 std::ostringstream logStream;
1433 logStream << "oneway function results for code " << tr.code << " on binder at "
1434 << reinterpret_cast<void*>(tr.target.ptr)
1435 << " will be dropped but finished with status "
1436 << statusToString(error);
Steven Moreland80844f72020-12-12 02:06:08 +00001437
1438 // ideally we could log this even when error == OK, but it
1439 // causes too much logspam because some manually-written
1440 // interfaces have clients that call methods which always
1441 // write results, sometimes as oneway methods.
1442 if (reply.dataSize() != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001443 logStream << " and reply parcel size " << reply.dataSize();
Steven Moreland80844f72020-12-12 02:06:08 +00001444 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001445 std::string message = logStream.str();
1446 ALOGI("%s", message.c_str());
Steven Morelandce66b8a2020-02-10 14:43:14 -08001447 }
Martijn Coenenea0090a2017-11-02 18:54:40 +00001448 LOG_ONEWAY("NOT sending reply to %d!", mCallingPid);
1449 }
1450
Steven Moreland39d887d2020-01-31 14:56:45 -08001451 mServingStackPointer = origServingStackPointer;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001452 mCallingPid = origPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001453 mCallingSid = origSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001454 mCallingUid = origUid;
mattgilbride85897672022-10-22 17:42:44 +00001455 mHasExplicitIdentity = origHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001456 mStrictModePolicy = origStrictModePolicy;
1457 mLastTransactionBinderFlags = origTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001458 mWorkSource = origWorkSource;
1459 mPropagateWorkSource = origPropagateWorkSet;
Christopher Tate440fd872010-03-18 17:55:03 -07001460
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001461 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001462 std::ostringstream logStream;
1463 logStream << "BC_REPLY thr " << (void*)pthread_self() << " / obj " << tr.target.ptr
1464 << ": \t" << reply << "\n";
1465 std::string message = logStream.str();
1466 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001467 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001468
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001469 }
1470 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001471
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001472 case BR_DEAD_BINDER:
1473 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001474 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001475 proxy->sendObituary();
1476 mOut.writeInt32(BC_DEAD_BINDER_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001477 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001478 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001479
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001480 case BR_CLEAR_DEATH_NOTIFICATION_DONE:
1481 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001482 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001483 proxy->getWeakRefs()->decWeak(proxy);
1484 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001485
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001486 case BR_FINISHED:
1487 result = TIMED_OUT;
1488 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001489
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001490 case BR_NOOP:
1491 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001492
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001493 case BR_SPAWN_LOOPER:
1494 mProcess->spawnPooledThread(false);
1495 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001496
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001497 default:
liangweikanga43ee152016-10-25 16:37:54 +08001498 ALOGE("*** BAD COMMAND %d received from Binder driver\n", cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001499 result = UNKNOWN_ERROR;
1500 break;
1501 }
1502
1503 if (result != NO_ERROR) {
1504 mLastError = result;
1505 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001506
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001507 return result;
1508}
1509
Steven Moreland39d887d2020-01-31 14:56:45 -08001510const void* IPCThreadState::getServingStackPointer() const {
1511 return mServingStackPointer;
Jayant Chowdharydac6dc82018-10-01 22:52:44 +00001512}
1513
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001514void IPCThreadState::threadDestructor(void *st)
1515{
Todd Poynor8d96cab2013-06-25 19:12:18 -07001516 IPCThreadState* const self = static_cast<IPCThreadState*>(st);
1517 if (self) {
1518 self->flushCommands();
Elliott Hughes6071da72015-08-12 15:27:47 -07001519#if defined(__ANDROID__)
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001520 if (self->mProcess->mDriverFD >= 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001521 ioctl(self->mProcess->mDriverFD, BINDER_THREAD_EXIT, 0);
1522 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001523#endif
Todd Poynor8d96cab2013-06-25 19:12:18 -07001524 delete self;
1525 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001526}
1527
Li Li6f059292021-09-10 09:59:30 -07001528status_t IPCThreadState::getProcessFreezeInfo(pid_t pid, uint32_t *sync_received,
1529 uint32_t *async_received)
1530{
1531 int ret = 0;
Jiyong Park5970d0a2022-03-08 16:56:13 +09001532 binder_frozen_status_info info = {};
Li Li6f059292021-09-10 09:59:30 -07001533 info.pid = pid;
1534
1535#if defined(__ANDROID__)
1536 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_FROZEN_INFO, &info) < 0)
1537 ret = -errno;
1538#endif
1539 *sync_received = info.sync_recv;
1540 *async_received = info.async_recv;
1541
1542 return ret;
1543}
Li Li6f059292021-09-10 09:59:30 -07001544
Marco Ballesio7ee17572020-09-08 10:30:03 -07001545status_t IPCThreadState::freeze(pid_t pid, bool enable, uint32_t timeout_ms) {
1546 struct binder_freeze_info info;
1547 int ret = 0;
1548
1549 info.pid = pid;
1550 info.enable = enable;
1551 info.timeout_ms = timeout_ms;
1552
1553
1554#if defined(__ANDROID__)
1555 if (ioctl(self()->mProcess->mDriverFD, BINDER_FREEZE, &info) < 0)
1556 ret = -errno;
1557#endif
1558
1559 //
1560 // ret==-EAGAIN indicates that transactions have not drained.
1561 // Call again to poll for completion.
1562 //
1563 return ret;
1564}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001565
Carlos Llamasb235b122021-12-20 06:38:44 -08001566void IPCThreadState::logExtendedError() {
1567 struct binder_extended_error ee = {.command = BR_OK};
1568
1569 if (!ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::EXTENDED_ERROR))
1570 return;
1571
1572#if defined(__ANDROID__)
1573 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_EXTENDED_ERROR, &ee) < 0) {
1574 ALOGE("Failed to get extended error: %s", strerror(errno));
1575 return;
1576 }
1577#endif
1578
Steven Morelandb6fe2422024-05-25 00:25:02 +00001579 ALOGE_IF(ee.command != BR_OK, "Binder transaction failure. id: %d, BR_*: %d, error: %d (%s)",
1580 ee.id, ee.command, ee.param, strerror(-ee.param));
Carlos Llamasb235b122021-12-20 06:38:44 -08001581}
1582
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001583void IPCThreadState::freeBuffer(const uint8_t* data, size_t /*dataSize*/,
1584 const binder_size_t* /*objects*/, size_t /*objectsSize*/) {
Steve Blocka19954a2012-01-04 20:05:49 +00001585 //ALOGI("Freeing parcel %p", &parcel);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001586 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001587 std::ostringstream logStream;
1588 logStream << "Writing BC_FREE_BUFFER for " << data << "\n";
1589 std::string message = logStream.str();
1590 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001591 }
Steve Block67263472012-01-09 18:35:44 +00001592 ALOG_ASSERT(data != NULL, "Called with NULL data");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001593 IPCThreadState* state = self();
1594 state->mOut.writeInt32(BC_FREE_BUFFER);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001595 state->mOut.writePointer((uintptr_t)data);
Martijn Coenen0442a862017-11-17 10:46:32 +01001596 state->flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001597}
1598
Steven Moreland61ff8492019-09-26 16:05:45 -07001599} // namespace android