blob: 157ab3c85dd2c3fd998a368f10eda270a9f0ed59 [file] [log] [blame]
Andrei Homescu74a54452021-12-10 05:30:21 +00001/*
2 * Copyright (C) 2022 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Ayrton Munoz04137372022-08-03 17:05:09 -040017#if defined(TRUSTY_USERSPACE)
Andrei Homescu74a54452021-12-10 05:30:21 +000018#include <openssl/rand.h>
Andrei Homescu1c18a802022-08-17 04:59:01 +000019#include <trusty_ipc.h>
Ayrton Munoz04137372022-08-03 17:05:09 -040020#else
21#include <lib/rand/rand.h>
22#endif
Andrei Homescu74a54452021-12-10 05:30:21 +000023
Frederick Maylef7b65d12024-05-14 16:55:14 -070024#include <binder/Common.h>
Andrei Homescu024727b2022-08-24 23:54:59 +000025#include <binder/RpcTransportTipcTrusty.h>
Tomasz Wasilczykc7c22ea2023-11-30 20:13:44 -080026#include <log/log.h>
27#include <trusty_log.h>
Andrei Homescu024727b2022-08-24 23:54:59 +000028
Andrei Homescu74a54452021-12-10 05:30:21 +000029#include "../OS.h"
Andrei Homescu1c18a802022-08-17 04:59:01 +000030#include "TrustyStatus.h"
Andrei Homescu74a54452021-12-10 05:30:21 +000031
Tomasz Wasilczykc7c22ea2023-11-30 20:13:44 -080032#include <cstdarg>
33
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070034using android::binder::borrowed_fd;
35using android::binder::unique_fd;
36
Tomasz Wasilczyk0d9dec22023-10-06 20:28:49 +000037namespace android::binder::os {
Andrei Homescu74a54452021-12-10 05:30:21 +000038
Tomasz Wasilczykdaf727a2023-11-21 13:50:09 -080039void trace_begin(uint64_t, const char*) {}
40
41void trace_end(uint64_t) {}
42
Tomasz Wasilczyka9e451a2024-05-22 12:18:42 -070043void trace_int(uint64_t, const char*, int32_t) {}
44
Tomasz Wasilczykdaf727a2023-11-21 13:50:09 -080045uint64_t GetThreadId() {
46 return 0;
47}
48
49bool report_sysprop_change() {
50 return false;
51}
52
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070053status_t setNonBlocking(borrowed_fd /*fd*/) {
Andrei Homescu74a54452021-12-10 05:30:21 +000054 // Trusty IPC syscalls are all non-blocking by default.
Tomasz Wasilczyk88aa8c32023-11-01 09:46:07 -070055 return OK;
Andrei Homescu74a54452021-12-10 05:30:21 +000056}
57
58status_t getRandomBytes(uint8_t* data, size_t size) {
Ayrton Munoz04137372022-08-03 17:05:09 -040059#if defined(TRUSTY_USERSPACE)
Andrei Homescu74a54452021-12-10 05:30:21 +000060 int res = RAND_bytes(data, size);
61 return res == 1 ? OK : UNKNOWN_ERROR;
Ayrton Munoz04137372022-08-03 17:05:09 -040062#else
63 int res = rand_get_bytes(data, size);
64 return res == 0 ? OK : UNKNOWN_ERROR;
65#endif // TRUSTY_USERSPACE
Andrei Homescu74a54452021-12-10 05:30:21 +000066}
67
Andrei Homescu1c18a802022-08-17 04:59:01 +000068status_t dupFileDescriptor(int oldFd, int* newFd) {
69 int res = dup(oldFd);
70 if (res < 0) {
71 return statusFromTrusty(res);
72 }
73
74 *newFd = res;
75 return OK;
Andrei Homescu24ad36e2022-08-04 01:33:33 +000076}
77
Andrei Homescu024727b2022-08-24 23:54:59 +000078std::unique_ptr<RpcTransportCtxFactory> makeDefaultRpcTransportCtxFactory() {
79 return RpcTransportCtxFactoryTipcTrusty::make();
80}
81
David Brazdilc3964f62022-10-24 23:06:14 +010082ssize_t sendMessageOnSocket(
David Brazdil21c887c2022-09-23 12:25:18 +010083 const RpcTransportFd& /* socket */, iovec* /* iovs */, int /* niovs */,
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070084 const std::vector<std::variant<unique_fd, borrowed_fd>>* /* ancillaryFds */) {
David Brazdil21c887c2022-09-23 12:25:18 +010085 errno = ENOTSUP;
86 return -1;
87}
88
David Brazdilc3964f62022-10-24 23:06:14 +010089ssize_t receiveMessageFromSocket(
David Brazdil21c887c2022-09-23 12:25:18 +010090 const RpcTransportFd& /* socket */, iovec* /* iovs */, int /* niovs */,
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070091 std::vector<std::variant<unique_fd, borrowed_fd>>* /* ancillaryFds */) {
David Brazdil21c887c2022-09-23 12:25:18 +010092 errno = ENOTSUP;
93 return -1;
94}
95
Tomasz Wasilczyk0d9dec22023-10-06 20:28:49 +000096} // namespace android::binder::os
Tomasz Wasilczykc7c22ea2023-11-30 20:13:44 -080097
Frederick Maylef7b65d12024-05-14 16:55:14 -070098LIBBINDER_EXPORTED int __android_log_print(int prio [[maybe_unused]], const char* tag,
99 const char* fmt, ...) {
Tomasz Wasilczykc7c22ea2023-11-30 20:13:44 -0800100#ifdef TRUSTY_USERSPACE
101#define trusty_tlog _tlog
102#define trusty_vtlog _vtlog
103#else
104 // mapping taken from kernel trusty_log.h (TLOGx)
105 int kernelLogLevel;
106 if (prio <= ANDROID_LOG_DEBUG) {
107 kernelLogLevel = LK_DEBUGLEVEL_ALWAYS;
108 } else if (prio == ANDROID_LOG_INFO) {
109 kernelLogLevel = LK_DEBUGLEVEL_SPEW;
110 } else if (prio == ANDROID_LOG_WARN) {
111 kernelLogLevel = LK_DEBUGLEVEL_INFO;
112 } else if (prio == ANDROID_LOG_ERROR) {
113 kernelLogLevel = LK_DEBUGLEVEL_CRITICAL;
114 } else { /* prio >= ANDROID_LOG_FATAL */
115 kernelLogLevel = LK_DEBUGLEVEL_CRITICAL;
116 }
117#if LK_DEBUGLEVEL_NO_ALIASES
118 auto LK_DEBUGLEVEL_kernelLogLevel = kernelLogLevel;
119#endif
120
121#define trusty_tlog(...) _tlog(kernelLogLevel, __VA_ARGS__)
122#define trusty_vtlog(...) _vtlog(kernelLogLevel, __VA_ARGS__)
123#endif
124
125 va_list args;
126 va_start(args, fmt);
127 trusty_tlog((tag[0] == '\0') ? "libbinder" : "libbinder-");
128 trusty_vtlog(fmt, args);
129 va_end(args);
130
131 return 1;
132}