blob: c57c9cdd62d734265661aec87eb662bdc544722c [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070017#include <binder/Binder.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080018
Bailey Forrest6913c462015-08-18 17:15:10 -070019#include <atomic>
Yifan Hong8b890852021-06-10 13:44:09 -070020#include <set>
Yifan Hong84bedeb2021-04-21 21:37:17 -070021
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070022#include <binder/BpBinder.h>
23#include <binder/IInterface.h>
Yifan Hong84bedeb2021-04-21 21:37:17 -070024#include <binder/IPCThreadState.h>
Dianne Hackborn23eb1e22015-10-07 17:35:27 -070025#include <binder/IResultReceiver.h>
Dianne Hackborn1941a402016-08-29 12:30:43 -070026#include <binder/IShellCallback.h>
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070027#include <binder/Parcel.h>
Fabián Cañas356a0222023-01-13 16:32:53 -050028#include <binder/RecordedTransaction.h>
Yifan Hong84bedeb2021-04-21 21:37:17 -070029#include <binder/RpcServer.h>
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070030#include <binder/unique_fd.h>
Sahil Somani2522b072022-08-08 14:07:47 -070031#include <pthread.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080032
Yifan Hong84bedeb2021-04-21 21:37:17 -070033#include <inttypes.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080034#include <stdio.h>
35
Andrei Homescuf55d6882022-04-30 00:50:20 +000036#ifdef __linux__
37#include <linux/sched.h>
38#endif
39
Steven Moreland32150282021-11-12 22:54:53 +000040#include "BuildFlags.h"
Tomasz Wasilczyk346f1042023-10-09 17:02:46 +000041#include "OS.h"
Yifan Hong84bedeb2021-04-21 21:37:17 -070042#include "RpcState.h"
43
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080044namespace android {
45
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070046using android::binder::unique_fd;
47
Tomasz Wasilczykb8ebcca2023-10-09 19:54:20 +000048constexpr uid_t kUidRoot = 0;
49
Steven Moreland90c1f9a2021-05-03 18:27:24 +000050// Service implementations inherit from BBinder and IBinder, and this is frozen
51// in prebuilts.
52#ifdef __LP64__
53static_assert(sizeof(IBinder) == 24);
54static_assert(sizeof(BBinder) == 40);
55#else
56static_assert(sizeof(IBinder) == 12);
57static_assert(sizeof(BBinder) == 20);
58#endif
59
Steven Morelandd9a74002022-06-02 00:03:18 +000060// global b/c b/230079120 - consistent symbol table
Yifan Hong84bedeb2021-04-21 21:37:17 -070061#ifdef BINDER_RPC_DEV_SERVERS
Steven Moreland5255c972023-05-19 22:53:41 +000062constexpr bool kEnableRpcDevServers = true;
Yifan Hong84bedeb2021-04-21 21:37:17 -070063#else
Steven Moreland5255c972023-05-19 22:53:41 +000064constexpr bool kEnableRpcDevServers = false;
Yifan Hong84bedeb2021-04-21 21:37:17 -070065#endif
66
Sahil Somani2522b072022-08-08 14:07:47 -070067#ifdef BINDER_ENABLE_RECORDING
Steven Moreland5255c972023-05-19 22:53:41 +000068constexpr bool kEnableRecording = true;
Sahil Somani2522b072022-08-08 14:07:47 -070069#else
Steven Moreland5255c972023-05-19 22:53:41 +000070constexpr bool kEnableRecording = false;
Sahil Somani2522b072022-08-08 14:07:47 -070071#endif
72
Martijn Coenen1cad19c2021-10-04 09:19:01 +020073// Log any reply transactions for which the data exceeds this size
74#define LOG_REPLIES_OVER_SIZE (300 * 1024)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080075// ---------------------------------------------------------------------------
76
Mathias Agopian83c04462009-05-22 19:00:22 -070077IBinder::IBinder()
78 : RefBase()
79{
80}
81
82IBinder::~IBinder()
83{
84}
85
86// ---------------------------------------------------------------------------
87
Colin Cross6f4f3ab2014-02-05 17:42:44 -080088sp<IInterface> IBinder::queryLocalInterface(const String16& /*descriptor*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080089{
Yi Kongfdd8da92018-06-07 17:52:27 -070090 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080091}
92
93BBinder* IBinder::localBinder()
94{
Yi Kongfdd8da92018-06-07 17:52:27 -070095 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080096}
97
98BpBinder* IBinder::remoteBinder()
99{
Yi Kongfdd8da92018-06-07 17:52:27 -0700100 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800101}
102
103bool IBinder::checkSubclass(const void* /*subclassID*/) const
104{
105 return false;
106}
107
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700108
Dianne Hackbornf2bf93b2015-10-14 15:13:02 -0700109status_t IBinder::shellCommand(const sp<IBinder>& target, int in, int out, int err,
Dianne Hackborn1941a402016-08-29 12:30:43 -0700110 Vector<String16>& args, const sp<IShellCallback>& callback,
111 const sp<IResultReceiver>& resultReceiver)
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700112{
Dianne Hackbornf2bf93b2015-10-14 15:13:02 -0700113 Parcel send;
114 Parcel reply;
115 send.writeFileDescriptor(in);
116 send.writeFileDescriptor(out);
117 send.writeFileDescriptor(err);
118 const size_t numArgs = args.size();
119 send.writeInt32(numArgs);
120 for (size_t i = 0; i < numArgs; i++) {
121 send.writeString16(args[i]);
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700122 }
Yi Kongfdd8da92018-06-07 17:52:27 -0700123 send.writeStrongBinder(callback != nullptr ? IInterface::asBinder(callback) : nullptr);
124 send.writeStrongBinder(resultReceiver != nullptr ? IInterface::asBinder(resultReceiver) : nullptr);
Dianne Hackbornf2bf93b2015-10-14 15:13:02 -0700125 return target->transact(SHELL_COMMAND_TRANSACTION, send, &reply);
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700126}
127
Steven Morelandb8ad08d2019-08-09 14:42:56 -0700128status_t IBinder::getExtension(sp<IBinder>* out) {
129 BBinder* local = this->localBinder();
130 if (local != nullptr) {
131 *out = local->getExtension();
132 return OK;
133 }
134
135 BpBinder* proxy = this->remoteBinder();
136 LOG_ALWAYS_FATAL_IF(proxy == nullptr);
137
138 Parcel data;
139 Parcel reply;
140 status_t status = transact(EXTENSION_TRANSACTION, data, &reply);
141 if (status != OK) return status;
142
143 return reply.readNullableStrongBinder(out);
144}
145
Steven Moreland86080b82019-09-23 15:41:18 -0700146status_t IBinder::getDebugPid(pid_t* out) {
147 BBinder* local = this->localBinder();
148 if (local != nullptr) {
149 *out = local->getDebugPid();
150 return OK;
151 }
152
153 BpBinder* proxy = this->remoteBinder();
154 LOG_ALWAYS_FATAL_IF(proxy == nullptr);
155
156 Parcel data;
157 Parcel reply;
158 status_t status = transact(DEBUG_PID_TRANSACTION, data, &reply);
159 if (status != OK) return status;
160
161 int32_t pid;
162 status = reply.readInt32(&pid);
163 if (status != OK) return status;
164
165 if (pid < 0 || pid > std::numeric_limits<pid_t>::max()) {
166 return BAD_VALUE;
167 }
168 *out = pid;
169 return OK;
170}
171
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -0700172status_t IBinder::setRpcClientDebug(unique_fd socketFd, const sp<IBinder>& keepAliveBinder) {
Steven Morelandd9a74002022-06-02 00:03:18 +0000173 if (!kEnableRpcDevServers) {
Yifan Hong84bedeb2021-04-21 21:37:17 -0700174 ALOGW("setRpcClientDebug disallowed because RPC is not enabled");
175 return INVALID_OPERATION;
176 }
Steven Moreland32150282021-11-12 22:54:53 +0000177 if (!kEnableKernelIpc) {
178 ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled");
179 return INVALID_OPERATION;
180 }
Yifan Hong84bedeb2021-04-21 21:37:17 -0700181
182 BBinder* local = this->localBinder();
183 if (local != nullptr) {
Yifan Hong02530ec2021-06-10 13:38:38 -0700184 return local->BBinder::setRpcClientDebug(std::move(socketFd), keepAliveBinder);
Yifan Hong84bedeb2021-04-21 21:37:17 -0700185 }
186
187 BpBinder* proxy = this->remoteBinder();
188 LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote");
189
190 Parcel data;
191 Parcel reply;
192 status_t status;
193 if (status = data.writeBool(socketFd.ok()); status != OK) return status;
194 if (socketFd.ok()) {
195 // writeUniqueFileDescriptor currently makes an unnecessary dup().
196 status = data.writeFileDescriptor(socketFd.release(), true /* own */);
197 if (status != OK) return status;
198 }
Yifan Hong02530ec2021-06-10 13:38:38 -0700199 if (status = data.writeStrongBinder(keepAliveBinder); status != OK) return status;
Yifan Hong84bedeb2021-04-21 21:37:17 -0700200 return transact(SET_RPC_CLIENT_TRANSACTION, data, &reply);
201}
202
Steven Moreland9e759e82021-06-25 21:30:23 +0000203void IBinder::withLock(const std::function<void()>& doWithLock) {
204 BBinder* local = localBinder();
205 if (local) {
206 local->withLock(doWithLock);
207 return;
208 }
209 BpBinder* proxy = this->remoteBinder();
210 LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote");
211 proxy->withLock(doWithLock);
212}
213
Devin Moore3faaa002022-07-27 15:54:06 +0000214sp<IBinder> IBinder::lookupOrCreateWeak(const void* objectID, object_make_func make,
215 const void* makeArgs) {
216 BBinder* local = localBinder();
217 if (local) {
218 return local->lookupOrCreateWeak(objectID, make, makeArgs);
219 }
220 BpBinder* proxy = this->remoteBinder();
221 LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote");
222 return proxy->lookupOrCreateWeak(objectID, make, makeArgs);
223}
224
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800225// ---------------------------------------------------------------------------
226
Yifan Hong8b890852021-06-10 13:44:09 -0700227class BBinder::RpcServerLink : public IBinder::DeathRecipient {
228public:
229 // On binder died, calls RpcServer::shutdown on @a rpcServer, and removes itself from @a binder.
230 RpcServerLink(const sp<RpcServer>& rpcServer, const sp<IBinder>& keepAliveBinder,
231 const wp<BBinder>& binder)
232 : mRpcServer(rpcServer), mKeepAliveBinder(keepAliveBinder), mBinder(binder) {}
Steven Morelandd9a74002022-06-02 00:03:18 +0000233 virtual ~RpcServerLink();
Yifan Hong8b890852021-06-10 13:44:09 -0700234 void binderDied(const wp<IBinder>&) override {
Steven Morelandf6957b72022-09-24 03:12:16 +0000235 auto promoted = mBinder.promote();
236 ALOGI("RpcBinder: binder died, shutting down RpcServer for %s",
237 promoted ? String8(promoted->getInterfaceDescriptor()).c_str() : "<NULL>");
238
Yifan Hong8b890852021-06-10 13:44:09 -0700239 if (mRpcServer == nullptr) {
240 ALOGW("RpcServerLink: Unable to shut down RpcServer because it does not exist.");
241 } else {
242 ALOGW_IF(!mRpcServer->shutdown(),
243 "RpcServerLink: RpcServer did not shut down properly. Not started?");
244 }
245 mRpcServer.clear();
246
Steven Morelandf6957b72022-09-24 03:12:16 +0000247 if (promoted) {
Yifan Hong8b890852021-06-10 13:44:09 -0700248 promoted->removeRpcServerLink(sp<RpcServerLink>::fromExisting(this));
249 }
250 mBinder.clear();
251 }
252
253private:
254 sp<RpcServer> mRpcServer;
255 sp<IBinder> mKeepAliveBinder; // hold to avoid automatically unlinking
256 wp<BBinder> mBinder;
257};
Steven Morelandd9a74002022-06-02 00:03:18 +0000258BBinder::RpcServerLink::~RpcServerLink() {}
Yifan Hong8b890852021-06-10 13:44:09 -0700259
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800260class BBinder::Extras
261{
262public:
Steven Morelandf0212002018-12-26 13:59:23 -0800263 // unlocked objects
Steven Morelandb8ad08d2019-08-09 14:42:56 -0700264 sp<IBinder> mExtension;
Andrei Homescuf55d6882022-04-30 00:50:20 +0000265#ifdef __linux__
Steven Morelandbf1915b2020-07-16 22:43:02 +0000266 int mPolicy = SCHED_NORMAL;
267 int mPriority = 0;
Andrei Homescuf55d6882022-04-30 00:50:20 +0000268#endif
269 bool mRequestingSid = false;
270 bool mInheritRt = false;
Steven Morelandf0212002018-12-26 13:59:23 -0800271
272 // for below objects
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700273 RpcMutex mLock;
Yifan Hong8b890852021-06-10 13:44:09 -0700274 std::set<sp<RpcServerLink>> mRpcServerLinks;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800275 BpBinder::ObjectManager mObjects;
Sahil Somani2522b072022-08-08 14:07:47 -0700276
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -0700277 unique_fd mRecordingFd;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800278};
279
280// ---------------------------------------------------------------------------
281
Sahil Somani2522b072022-08-08 14:07:47 -0700282BBinder::BBinder() : mExtras(nullptr), mStability(0), mParceled(false), mRecordingOn(false) {}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800283
284bool BBinder::isBinderAlive() const
285{
286 return true;
287}
288
289status_t BBinder::pingBinder()
290{
291 return NO_ERROR;
292}
293
Sahil Somani2522b072022-08-08 14:07:47 -0700294status_t BBinder::startRecordingTransactions(const Parcel& data) {
295 if (!kEnableRecording) {
296 ALOGW("Binder recording disallowed because recording is not enabled");
297 return INVALID_OPERATION;
298 }
299 if (!kEnableKernelIpc) {
300 ALOGW("Binder recording disallowed because kernel binder is not enabled");
301 return INVALID_OPERATION;
302 }
303 uid_t uid = IPCThreadState::self()->getCallingUid();
Tomasz Wasilczykb8ebcca2023-10-09 19:54:20 +0000304 if (uid != kUidRoot) {
Sahil Somani2522b072022-08-08 14:07:47 -0700305 ALOGE("Binder recording not allowed because client %" PRIu32 " is not root", uid);
306 return PERMISSION_DENIED;
307 }
308 Extras* e = getOrCreateExtras();
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700309 RpcMutexUniqueLock lock(e->mLock);
Sahil Somani2522b072022-08-08 14:07:47 -0700310 if (mRecordingOn) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700311 ALOGI("Could not start Binder recording. Another is already in progress.");
Sahil Somani2522b072022-08-08 14:07:47 -0700312 return INVALID_OPERATION;
313 } else {
314 status_t readStatus = data.readUniqueFileDescriptor(&(e->mRecordingFd));
315 if (readStatus != OK) {
316 return readStatus;
317 }
318 mRecordingOn = true;
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700319 ALOGI("Started Binder recording.");
Sahil Somani2522b072022-08-08 14:07:47 -0700320 return NO_ERROR;
321 }
322}
323
324status_t BBinder::stopRecordingTransactions() {
325 if (!kEnableRecording) {
326 ALOGW("Binder recording disallowed because recording is not enabled");
327 return INVALID_OPERATION;
328 }
329 if (!kEnableKernelIpc) {
330 ALOGW("Binder recording disallowed because kernel binder is not enabled");
331 return INVALID_OPERATION;
332 }
333 uid_t uid = IPCThreadState::self()->getCallingUid();
Tomasz Wasilczykb8ebcca2023-10-09 19:54:20 +0000334 if (uid != kUidRoot) {
Sahil Somani2522b072022-08-08 14:07:47 -0700335 ALOGE("Binder recording not allowed because client %" PRIu32 " is not root", uid);
336 return PERMISSION_DENIED;
337 }
338 Extras* e = getOrCreateExtras();
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700339 RpcMutexUniqueLock lock(e->mLock);
Sahil Somani2522b072022-08-08 14:07:47 -0700340 if (mRecordingOn) {
341 e->mRecordingFd.reset();
342 mRecordingOn = false;
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700343 ALOGI("Stopped Binder recording.");
Sahil Somani2522b072022-08-08 14:07:47 -0700344 return NO_ERROR;
345 } else {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700346 ALOGI("Could not stop Binder recording. One is not in progress.");
Sahil Somani2522b072022-08-08 14:07:47 -0700347 return INVALID_OPERATION;
348 }
349}
350
Mathias Agopian83c04462009-05-22 19:00:22 -0700351const String16& BBinder::getInterfaceDescriptor() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800352{
Steven Moreland1ef0eb62022-08-18 20:09:30 +0000353 static StaticString16 sBBinder(u"BBinder");
354 ALOGW("Reached BBinder::getInterfaceDescriptor (this=%p). Override?", this);
355 return sBBinder;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800356}
357
Jiyong Parkb86c8662018-10-29 23:01:57 +0900358// NOLINTNEXTLINE(google-default-arguments)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800359status_t BBinder::transact(
360 uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags)
361{
362 data.setDataPosition(0);
363
Steven Morelandf183fdd2020-10-27 00:12:12 +0000364 if (reply != nullptr && (flags & FLAG_CLEAR_BUF)) {
365 reply->markSensitive();
366 }
367
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800368 status_t err = NO_ERROR;
369 switch (code) {
370 case PING_TRANSACTION:
Steven Moreland6e69d652019-07-10 14:17:55 -0700371 err = pingBinder();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800372 break;
Sahil Somani2522b072022-08-08 14:07:47 -0700373 case START_RECORDING_TRANSACTION:
374 err = startRecordingTransactions(data);
375 break;
376 case STOP_RECORDING_TRANSACTION:
377 err = stopRecordingTransactions();
378 break;
Steven Morelandb8ad08d2019-08-09 14:42:56 -0700379 case EXTENSION_TRANSACTION:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700380 LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr");
Steven Morelandb8ad08d2019-08-09 14:42:56 -0700381 err = reply->writeStrongBinder(getExtension());
382 break;
Steven Moreland86080b82019-09-23 15:41:18 -0700383 case DEBUG_PID_TRANSACTION:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700384 LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr");
Steven Moreland86080b82019-09-23 15:41:18 -0700385 err = reply->writeInt32(getDebugPid());
386 break;
Yifan Hong84bedeb2021-04-21 21:37:17 -0700387 case SET_RPC_CLIENT_TRANSACTION: {
388 err = setRpcClientDebug(data);
389 break;
390 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800391 default:
392 err = onTransact(code, data, reply, flags);
393 break;
394 }
395
Steven Morelanda86a3562019-08-01 23:28:34 +0000396 // In case this is being transacted on in the same process.
Yi Kongfdd8da92018-06-07 17:52:27 -0700397 if (reply != nullptr) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800398 reply->setDataPosition(0);
Martijn Coenen1cad19c2021-10-04 09:19:01 +0200399 if (reply->dataSize() > LOG_REPLIES_OVER_SIZE) {
400 ALOGW("Large reply transaction of %zu bytes, interface descriptor %s, code %d",
401 reply->dataSize(), String8(getInterfaceDescriptor()).c_str(), code);
402 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800403 }
404
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000405 if (kEnableKernelIpc && mRecordingOn && code != START_RECORDING_TRANSACTION) [[unlikely]] {
Sahil Somani2522b072022-08-08 14:07:47 -0700406 Extras* e = mExtras.load(std::memory_order_acquire);
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700407 RpcMutexUniqueLock lock(e->mLock);
Sahil Somani2522b072022-08-08 14:07:47 -0700408 if (mRecordingOn) {
409 Parcel emptyReply;
Fabián Cañas68dbcfe2023-01-06 15:37:39 -0500410 timespec ts;
411 timespec_get(&ts, TIME_UTC);
Fabián Cañas6c0c9632023-01-13 15:21:16 -0500412 auto transaction = android::binder::debug::RecordedTransaction::
413 fromDetails(getInterfaceDescriptor(), code, flags, ts, data,
414 reply ? *reply : emptyReply, err);
Sahil Somani2522b072022-08-08 14:07:47 -0700415 if (transaction) {
416 if (status_t err = transaction->dumpToFile(e->mRecordingFd); err != NO_ERROR) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700417 ALOGI("Failed to dump RecordedTransaction to file with error %d", err);
Sahil Somani2522b072022-08-08 14:07:47 -0700418 }
419 } else {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700420 ALOGI("Failed to create RecordedTransaction object.");
Sahil Somani2522b072022-08-08 14:07:47 -0700421 }
422 }
423 }
424
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800425 return err;
426}
427
Jiyong Parkb86c8662018-10-29 23:01:57 +0900428// NOLINTNEXTLINE(google-default-arguments)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800429status_t BBinder::linkToDeath(
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800430 const sp<DeathRecipient>& /*recipient*/, void* /*cookie*/,
431 uint32_t /*flags*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800432{
433 return INVALID_OPERATION;
434}
435
Jiyong Parkb86c8662018-10-29 23:01:57 +0900436// NOLINTNEXTLINE(google-default-arguments)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800437status_t BBinder::unlinkToDeath(
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800438 const wp<DeathRecipient>& /*recipient*/, void* /*cookie*/,
439 uint32_t /*flags*/, wp<DeathRecipient>* /*outRecipient*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800440{
441 return INVALID_OPERATION;
442}
443
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700444status_t BBinder::dump(int /*fd*/, const Vector<String16>& /*args*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800445{
446 return NO_ERROR;
447}
448
Steven Moreland63a2d512021-06-25 01:10:15 +0000449void* BBinder::attachObject(const void* objectID, void* object, void* cleanupCookie,
450 object_cleanup_func func) {
Steven Morelandf0212002018-12-26 13:59:23 -0800451 Extras* e = getOrCreateExtras();
Steven Moreland5ce7ca52021-06-25 21:59:50 +0000452 LOG_ALWAYS_FATAL_IF(!e, "no memory");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800453
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700454 RpcMutexUniqueLock _l(e->mLock);
Steven Moreland63a2d512021-06-25 01:10:15 +0000455 return e->mObjects.attach(objectID, object, cleanupCookie, func);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800456}
457
458void* BBinder::findObject(const void* objectID) const
459{
Bailey Forrest6913c462015-08-18 17:15:10 -0700460 Extras* e = mExtras.load(std::memory_order_acquire);
Yi Kongfdd8da92018-06-07 17:52:27 -0700461 if (!e) return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800462
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700463 RpcMutexUniqueLock _l(e->mLock);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800464 return e->mObjects.find(objectID);
465}
466
Steven Moreland63a2d512021-06-25 01:10:15 +0000467void* BBinder::detachObject(const void* objectID) {
Bailey Forrest6913c462015-08-18 17:15:10 -0700468 Extras* e = mExtras.load(std::memory_order_acquire);
Steven Moreland63a2d512021-06-25 01:10:15 +0000469 if (!e) return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800470
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700471 RpcMutexUniqueLock _l(e->mLock);
Steven Moreland63a2d512021-06-25 01:10:15 +0000472 return e->mObjects.detach(objectID);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800473}
474
Steven Moreland9e759e82021-06-25 21:30:23 +0000475void BBinder::withLock(const std::function<void()>& doWithLock) {
476 Extras* e = getOrCreateExtras();
477 LOG_ALWAYS_FATAL_IF(!e, "no memory");
478
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700479 RpcMutexUniqueLock _l(e->mLock);
Steven Moreland9e759e82021-06-25 21:30:23 +0000480 doWithLock();
481}
482
Devin Moore3faaa002022-07-27 15:54:06 +0000483sp<IBinder> BBinder::lookupOrCreateWeak(const void* objectID, object_make_func make,
484 const void* makeArgs) {
485 Extras* e = getOrCreateExtras();
486 LOG_ALWAYS_FATAL_IF(!e, "no memory");
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700487 RpcMutexUniqueLock _l(e->mLock);
Devin Moore3faaa002022-07-27 15:54:06 +0000488 return e->mObjects.lookupOrCreateWeak(objectID, make, makeArgs);
489}
490
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800491BBinder* BBinder::localBinder()
492{
493 return this;
494}
495
Steven Morelandf0212002018-12-26 13:59:23 -0800496bool BBinder::isRequestingSid()
497{
498 Extras* e = mExtras.load(std::memory_order_acquire);
499
500 return e && e->mRequestingSid;
501}
502
503void BBinder::setRequestingSid(bool requestingSid)
504{
Steven Morelandd37e6dd2021-06-16 22:07:51 +0000505 LOG_ALWAYS_FATAL_IF(mParceled,
506 "setRequestingSid() should not be called after a binder object "
507 "is parceled/sent to another process");
Kalesh Singhd67c8e82020-12-29 15:46:25 -0500508
Steven Morelandf0212002018-12-26 13:59:23 -0800509 Extras* e = mExtras.load(std::memory_order_acquire);
510
511 if (!e) {
512 // default is false. Most things don't need sids, so avoiding allocations when possible.
513 if (!requestingSid) {
514 return;
515 }
516
517 e = getOrCreateExtras();
518 if (!e) return; // out of memory
519 }
520
Steven Moreland3668be62019-02-08 17:56:55 -0800521 e->mRequestingSid = requestingSid;
Steven Morelandf0212002018-12-26 13:59:23 -0800522}
523
Steven Morelandb8ad08d2019-08-09 14:42:56 -0700524sp<IBinder> BBinder::getExtension() {
525 Extras* e = mExtras.load(std::memory_order_acquire);
526 if (e == nullptr) return nullptr;
527 return e->mExtension;
528}
529
Andrei Homescuf55d6882022-04-30 00:50:20 +0000530#ifdef __linux__
Steven Morelandbf1915b2020-07-16 22:43:02 +0000531void BBinder::setMinSchedulerPolicy(int policy, int priority) {
Steven Morelandd37e6dd2021-06-16 22:07:51 +0000532 LOG_ALWAYS_FATAL_IF(mParceled,
533 "setMinSchedulerPolicy() should not be called after a binder object "
534 "is parceled/sent to another process");
Kalesh Singhd67c8e82020-12-29 15:46:25 -0500535
Steven Morelandbf1915b2020-07-16 22:43:02 +0000536 switch (policy) {
537 case SCHED_NORMAL:
538 LOG_ALWAYS_FATAL_IF(priority < -20 || priority > 19, "Invalid priority for SCHED_NORMAL: %d", priority);
539 break;
540 case SCHED_RR:
541 case SCHED_FIFO:
542 LOG_ALWAYS_FATAL_IF(priority < 1 || priority > 99, "Invalid priority for sched %d: %d", policy, priority);
543 break;
544 default:
545 LOG_ALWAYS_FATAL("Unrecognized scheduling policy: %d", policy);
546 }
547
548 Extras* e = mExtras.load(std::memory_order_acquire);
549
550 if (e == nullptr) {
551 // Avoid allocations if called with default.
552 if (policy == SCHED_NORMAL && priority == 0) {
553 return;
554 }
555
556 e = getOrCreateExtras();
557 if (!e) return; // out of memory
558 }
559
560 e->mPolicy = policy;
561 e->mPriority = priority;
562}
563
564int BBinder::getMinSchedulerPolicy() {
565 Extras* e = mExtras.load(std::memory_order_acquire);
566 if (e == nullptr) return SCHED_NORMAL;
567 return e->mPolicy;
568}
569
570int BBinder::getMinSchedulerPriority() {
571 Extras* e = mExtras.load(std::memory_order_acquire);
572 if (e == nullptr) return 0;
573 return e->mPriority;
574}
Andrei Homescuf55d6882022-04-30 00:50:20 +0000575#endif // __linux__
Steven Morelandbf1915b2020-07-16 22:43:02 +0000576
Steven Morelandcf03cf12020-12-04 02:58:40 +0000577bool BBinder::isInheritRt() {
578 Extras* e = mExtras.load(std::memory_order_acquire);
579
580 return e && e->mInheritRt;
581}
582
583void BBinder::setInheritRt(bool inheritRt) {
Steven Morelandd37e6dd2021-06-16 22:07:51 +0000584 LOG_ALWAYS_FATAL_IF(mParceled,
585 "setInheritRt() should not be called after a binder object "
586 "is parceled/sent to another process");
Kalesh Singhd67c8e82020-12-29 15:46:25 -0500587
Steven Morelandcf03cf12020-12-04 02:58:40 +0000588 Extras* e = mExtras.load(std::memory_order_acquire);
589
590 if (!e) {
591 if (!inheritRt) {
592 return;
593 }
594
595 e = getOrCreateExtras();
596 if (!e) return; // out of memory
597 }
598
599 e->mInheritRt = inheritRt;
600}
601
Steven Moreland86080b82019-09-23 15:41:18 -0700602pid_t BBinder::getDebugPid() {
Andrei Homescuf55d6882022-04-30 00:50:20 +0000603#ifdef __linux__
Steven Moreland86080b82019-09-23 15:41:18 -0700604 return getpid();
Andrei Homescuf55d6882022-04-30 00:50:20 +0000605#else
606 // TODO: handle other OSes
607 return 0;
608#endif // __linux__
Steven Moreland86080b82019-09-23 15:41:18 -0700609}
610
Steven Morelandb8ad08d2019-08-09 14:42:56 -0700611void BBinder::setExtension(const sp<IBinder>& extension) {
Steven Morelandd37e6dd2021-06-16 22:07:51 +0000612 LOG_ALWAYS_FATAL_IF(mParceled,
613 "setExtension() should not be called after a binder object "
614 "is parceled/sent to another process");
Kalesh Singhd67c8e82020-12-29 15:46:25 -0500615
Steven Morelandb8ad08d2019-08-09 14:42:56 -0700616 Extras* e = getOrCreateExtras();
617 e->mExtension = extension;
618}
619
Kalesh Singhd67c8e82020-12-29 15:46:25 -0500620bool BBinder::wasParceled() {
621 return mParceled;
622}
623
624void BBinder::setParceled() {
625 mParceled = true;
626}
627
Yifan Hong84bedeb2021-04-21 21:37:17 -0700628status_t BBinder::setRpcClientDebug(const Parcel& data) {
Steven Morelandd9a74002022-06-02 00:03:18 +0000629 if (!kEnableRpcDevServers) {
Yifan Hong84bedeb2021-04-21 21:37:17 -0700630 ALOGW("%s: disallowed because RPC is not enabled", __PRETTY_FUNCTION__);
631 return INVALID_OPERATION;
632 }
Steven Moreland32150282021-11-12 22:54:53 +0000633 if (!kEnableKernelIpc) {
634 ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled");
635 return INVALID_OPERATION;
636 }
Yifan Hong84bedeb2021-04-21 21:37:17 -0700637 uid_t uid = IPCThreadState::self()->getCallingUid();
Tomasz Wasilczykb8ebcca2023-10-09 19:54:20 +0000638 if (uid != kUidRoot) {
Yifan Hong84bedeb2021-04-21 21:37:17 -0700639 ALOGE("%s: not allowed because client %" PRIu32 " is not root", __PRETTY_FUNCTION__, uid);
640 return PERMISSION_DENIED;
641 }
642 status_t status;
643 bool hasSocketFd;
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -0700644 unique_fd clientFd;
Yifan Hong84bedeb2021-04-21 21:37:17 -0700645
646 if (status = data.readBool(&hasSocketFd); status != OK) return status;
647 if (hasSocketFd) {
648 if (status = data.readUniqueFileDescriptor(&clientFd); status != OK) return status;
649 }
Yifan Hong02530ec2021-06-10 13:38:38 -0700650 sp<IBinder> keepAliveBinder;
651 if (status = data.readNullableStrongBinder(&keepAliveBinder); status != OK) return status;
Yifan Hong84bedeb2021-04-21 21:37:17 -0700652
Yifan Hong02530ec2021-06-10 13:38:38 -0700653 return setRpcClientDebug(std::move(clientFd), keepAliveBinder);
Yifan Hong84bedeb2021-04-21 21:37:17 -0700654}
655
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -0700656status_t BBinder::setRpcClientDebug(unique_fd socketFd, const sp<IBinder>& keepAliveBinder) {
Steven Morelandd9a74002022-06-02 00:03:18 +0000657 if (!kEnableRpcDevServers) {
Yifan Hong84bedeb2021-04-21 21:37:17 -0700658 ALOGW("%s: disallowed because RPC is not enabled", __PRETTY_FUNCTION__);
659 return INVALID_OPERATION;
660 }
Steven Moreland32150282021-11-12 22:54:53 +0000661 if (!kEnableKernelIpc) {
662 ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled");
663 return INVALID_OPERATION;
664 }
Yifan Hong84bedeb2021-04-21 21:37:17 -0700665
666 const int socketFdForPrint = socketFd.get();
Yifan Hong34823232021-06-07 17:23:00 -0700667 LOG_RPC_DETAIL("%s(fd=%d)", __PRETTY_FUNCTION__, socketFdForPrint);
Yifan Hong84bedeb2021-04-21 21:37:17 -0700668
669 if (!socketFd.ok()) {
670 ALOGE("%s: No socket FD provided.", __PRETTY_FUNCTION__);
671 return BAD_VALUE;
672 }
Yifan Hong84bedeb2021-04-21 21:37:17 -0700673
Yifan Hong02530ec2021-06-10 13:38:38 -0700674 if (keepAliveBinder == nullptr) {
675 ALOGE("%s: No keepAliveBinder provided.", __PRETTY_FUNCTION__);
676 return UNEXPECTED_NULL;
677 }
678
Elie Kheirallah47431c12022-04-21 23:46:17 +0000679 size_t binderThreadPoolMaxCount = ProcessState::self()->getThreadPoolMaxTotalThreadCount();
Yifan Hong84bedeb2021-04-21 21:37:17 -0700680 if (binderThreadPoolMaxCount <= 1) {
681 ALOGE("%s: ProcessState thread pool max count is %zu. RPC is disabled for this service "
682 "because RPC requires the service to support multithreading.",
683 __PRETTY_FUNCTION__, binderThreadPoolMaxCount);
684 return INVALID_OPERATION;
685 }
686
Yifan Hong8b890852021-06-10 13:44:09 -0700687 // Weak ref to avoid circular dependency:
688 // BBinder -> RpcServerLink ----> RpcServer -X-> BBinder
689 // `-X-> BBinder
690 auto weakThis = wp<BBinder>::fromExisting(this);
691
Yifan Hong84bedeb2021-04-21 21:37:17 -0700692 Extras* e = getOrCreateExtras();
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700693 RpcMutexUniqueLock _l(e->mLock);
Yifan Hong8b890852021-06-10 13:44:09 -0700694 auto rpcServer = RpcServer::make();
695 LOG_ALWAYS_FATAL_IF(rpcServer == nullptr, "RpcServer::make returns null");
Yifan Hong8b890852021-06-10 13:44:09 -0700696 auto link = sp<RpcServerLink>::make(rpcServer, keepAliveBinder, weakThis);
697 if (auto status = keepAliveBinder->linkToDeath(link, nullptr, 0); status != OK) {
698 ALOGE("%s: keepAliveBinder->linkToDeath returns %s", __PRETTY_FUNCTION__,
699 statusToString(status).c_str());
700 return status;
Yifan Hong84bedeb2021-04-21 21:37:17 -0700701 }
Yifan Hong8b890852021-06-10 13:44:09 -0700702 rpcServer->setRootObjectWeak(weakThis);
Steven Moreland2372f9d2021-08-05 15:42:01 -0700703 if (auto status = rpcServer->setupExternalServer(std::move(socketFd)); status != OK) {
704 return status;
705 }
Yifan Hong8b890852021-06-10 13:44:09 -0700706 rpcServer->setMaxThreads(binderThreadPoolMaxCount);
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700707 ALOGI("RpcBinder: Started Binder debug on %s", String8(getInterfaceDescriptor()).c_str());
Yifan Hong8b890852021-06-10 13:44:09 -0700708 rpcServer->start();
709 e->mRpcServerLinks.emplace(link);
Yifan Hong34823232021-06-07 17:23:00 -0700710 LOG_RPC_DETAIL("%s(fd=%d) successful", __PRETTY_FUNCTION__, socketFdForPrint);
Yifan Hong84bedeb2021-04-21 21:37:17 -0700711 return OK;
712}
713
Yifan Hong8b890852021-06-10 13:44:09 -0700714void BBinder::removeRpcServerLink(const sp<RpcServerLink>& link) {
715 Extras* e = mExtras.load(std::memory_order_acquire);
716 if (!e) return;
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700717 RpcMutexUniqueLock _l(e->mLock);
Yifan Hong8b890852021-06-10 13:44:09 -0700718 (void)e->mRpcServerLinks.erase(link);
719}
720
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800721BBinder::~BBinder()
722{
Steven Moreland1bd2bc72022-07-29 20:29:40 +0000723 if (!wasParceled()) {
724 if (getExtension()) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700725 ALOGW("Binder %p destroyed with extension attached before being parceled.", this);
Steven Moreland1bd2bc72022-07-29 20:29:40 +0000726 }
727 if (isRequestingSid()) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700728 ALOGW("Binder %p destroyed when requesting SID before being parceled.", this);
Steven Moreland1bd2bc72022-07-29 20:29:40 +0000729 }
730 if (isInheritRt()) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700731 ALOGW("Binder %p destroyed after setInheritRt before being parceled.", this);
Steven Moreland1bd2bc72022-07-29 20:29:40 +0000732 }
Andrei Homescu40525502022-08-02 01:23:22 +0000733#ifdef __linux__
Steven Moreland1bd2bc72022-07-29 20:29:40 +0000734 if (getMinSchedulerPolicy() != SCHED_NORMAL) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700735 ALOGW("Binder %p destroyed after setMinSchedulerPolicy before being parceled.", this);
Steven Moreland1bd2bc72022-07-29 20:29:40 +0000736 }
737 if (getMinSchedulerPriority() != 0) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700738 ALOGW("Binder %p destroyed after setMinSchedulerPolicy before being parceled.", this);
Steven Moreland1bd2bc72022-07-29 20:29:40 +0000739 }
Andrei Homescu40525502022-08-02 01:23:22 +0000740#endif // __linux__
Steven Moreland55a12542022-03-31 21:53:11 +0000741 }
742
Bailey Forrest6913c462015-08-18 17:15:10 -0700743 Extras* e = mExtras.load(std::memory_order_relaxed);
Hans Boehm3effaba2014-08-12 22:56:00 +0000744 if (e) delete e;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800745}
746
747
Jiyong Parkb86c8662018-10-29 23:01:57 +0900748// NOLINTNEXTLINE(google-default-arguments)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800749status_t BBinder::onTransact(
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800750 uint32_t code, const Parcel& data, Parcel* reply, uint32_t /*flags*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800751{
752 switch (code) {
753 case INTERFACE_TRANSACTION:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700754 LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800755 reply->writeString16(getInterfaceDescriptor());
756 return NO_ERROR;
757
758 case DUMP_TRANSACTION: {
759 int fd = data.readFileDescriptor();
760 int argc = data.readInt32();
761 Vector<String16> args;
762 for (int i = 0; i < argc && data.dataAvail() > 0; i++) {
763 args.add(data.readString16());
764 }
765 return dump(fd, args);
766 }
Dianne Hackborn555f89d2012-05-08 18:54:22 -0700767
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700768 case SHELL_COMMAND_TRANSACTION: {
769 int in = data.readFileDescriptor();
770 int out = data.readFileDescriptor();
771 int err = data.readFileDescriptor();
772 int argc = data.readInt32();
773 Vector<String16> args;
774 for (int i = 0; i < argc && data.dataAvail() > 0; i++) {
775 args.add(data.readString16());
776 }
Andrei Homescua543a842022-07-07 22:17:55 +0000777 sp<IBinder> shellCallbackBinder = data.readStrongBinder();
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700778 sp<IResultReceiver> resultReceiver = IResultReceiver::asInterface(
779 data.readStrongBinder());
780
Dianne Hackbornf2bf93b2015-10-14 15:13:02 -0700781 // XXX can't add virtuals until binaries are updated.
Andrei Homescua543a842022-07-07 22:17:55 +0000782 // sp<IShellCallback> shellCallback = IShellCallback::asInterface(
783 // shellCallbackBinder);
784 // return shellCommand(in, out, err, args, resultReceiver);
Christopher Wiley0a9a1c12016-07-20 08:28:14 -0700785 (void)in;
786 (void)out;
787 (void)err;
788
Yi Kongfdd8da92018-06-07 17:52:27 -0700789 if (resultReceiver != nullptr) {
Dianne Hackbornf2bf93b2015-10-14 15:13:02 -0700790 resultReceiver->send(INVALID_OPERATION);
791 }
Martijn Coenenaa6ee992017-08-17 15:38:08 +0200792
793 return NO_ERROR;
Dianne Hackborn23eb1e22015-10-07 17:35:27 -0700794 }
795
Dianne Hackborn555f89d2012-05-08 18:54:22 -0700796 case SYSPROPS_TRANSACTION: {
Tomasz Wasilczyk346f1042023-10-09 17:02:46 +0000797 if (!binder::os::report_sysprop_change()) return INVALID_OPERATION;
Dianne Hackborn555f89d2012-05-08 18:54:22 -0700798 return NO_ERROR;
799 }
800
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800801 default:
802 return UNKNOWN_TRANSACTION;
803 }
804}
805
Steven Morelandf0212002018-12-26 13:59:23 -0800806BBinder::Extras* BBinder::getOrCreateExtras()
807{
808 Extras* e = mExtras.load(std::memory_order_acquire);
809
810 if (!e) {
811 e = new Extras;
812 Extras* expected = nullptr;
813 if (!mExtras.compare_exchange_strong(expected, e,
814 std::memory_order_release,
815 std::memory_order_acquire)) {
816 delete e;
817 e = expected; // Filled in by CAS
818 }
819 if (e == nullptr) return nullptr; // out of memory
820 }
821
822 return e;
823}
824
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800825// ---------------------------------------------------------------------------
826
827enum {
828 // This is used to transfer ownership of the remote binder from
829 // the BpRefBase object holding it (when it is constructed), to the
830 // owner of the BpRefBase object when it first acquires that BpRefBase.
831 kRemoteAcquired = 0x00000001
832};
833
834BpRefBase::BpRefBase(const sp<IBinder>& o)
Yi Kongfdd8da92018-06-07 17:52:27 -0700835 : mRemote(o.get()), mRefs(nullptr), mState(0)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800836{
837 extendObjectLifetime(OBJECT_LIFETIME_WEAK);
838
839 if (mRemote) {
840 mRemote->incStrong(this); // Removed on first IncStrong().
841 mRefs = mRemote->createWeak(this); // Held for our entire lifetime.
842 }
843}
844
845BpRefBase::~BpRefBase()
846{
847 if (mRemote) {
Bailey Forrest6913c462015-08-18 17:15:10 -0700848 if (!(mState.load(std::memory_order_relaxed)&kRemoteAcquired)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800849 mRemote->decStrong(this);
850 }
851 mRefs->decWeak(this);
852 }
853}
854
855void BpRefBase::onFirstRef()
856{
Bailey Forrest6913c462015-08-18 17:15:10 -0700857 mState.fetch_or(kRemoteAcquired, std::memory_order_relaxed);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800858}
859
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800860void BpRefBase::onLastStrongRef(const void* /*id*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800861{
862 if (mRemote) {
863 mRemote->decStrong(this);
864 }
865}
866
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800867bool BpRefBase::onIncStrongAttempted(uint32_t /*flags*/, const void* /*id*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800868{
869 return mRemote ? mRefs->attemptIncStrong(this) : false;
870}
871
872// ---------------------------------------------------------------------------
873
Steven Moreland61ff8492019-09-26 16:05:45 -0700874} // namespace android