blob: aef946481feb75dff38e85f945ce0b8ee664ab06 [file] [log] [blame]
Andrei Homescu2a298012022-06-15 01:08:54 +00001/*
2 * Copyright (C) 2022 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "binderRpcTestCommon.h"
18
19using namespace android;
Tomasz Wasilczyk26db5e42023-11-02 11:45:11 -070020using android::binder::ReadFdToString;
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070021using android::binder::unique_fd;
Andrei Homescu2a298012022-06-15 01:08:54 +000022
Andrei Homescu9d8adb12022-08-02 04:38:30 +000023class MyBinderRpcTestAndroid : public MyBinderRpcTestBase {
24public:
25 wp<RpcServer> server;
26
27 Status countBinders(std::vector<int32_t>* out) override {
28 return countBindersImpl(server, out);
29 }
30
31 Status die(bool cleanup) override {
32 if (cleanup) {
33 exit(1);
34 } else {
35 _exit(1);
36 }
37 }
38
39 Status scheduleShutdown() override {
40 sp<RpcServer> strongServer = server.promote();
41 if (strongServer == nullptr) {
42 return Status::fromExceptionCode(Status::EX_NULL_POINTER);
43 }
44 RpcMaybeThread([=] {
45 LOG_ALWAYS_FATAL_IF(!strongServer->shutdown(), "Could not shutdown");
46 }).detach();
47 return Status::ok();
48 }
49
50 Status useKernelBinderCallingId() override {
51 // this is WRONG! It does not make sense when using RPC binder, and
52 // because it is SO wrong, and so much code calls this, it should abort!
53
54 if constexpr (kEnableKernelIpc) {
55 (void)IPCThreadState::self()->getCallingPid();
56 }
57 return Status::ok();
58 }
59
60 Status echoAsFile(const std::string& content, android::os::ParcelFileDescriptor* out) override {
61 out->reset(mockFileDescriptor(content));
62 return Status::ok();
63 }
64
65 Status concatFiles(const std::vector<android::os::ParcelFileDescriptor>& files,
66 android::os::ParcelFileDescriptor* out) override {
67 std::string acc;
68 for (const auto& file : files) {
69 std::string result;
Tomasz Wasilczyk26db5e42023-11-02 11:45:11 -070070 LOG_ALWAYS_FATAL_IF(!ReadFdToString(file.get(), &result));
Andrei Homescu9d8adb12022-08-02 04:38:30 +000071 acc.append(result);
72 }
73 out->reset(mockFileDescriptor(acc));
74 return Status::ok();
75 }
76
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070077 HandoffChannel<unique_fd> mFdChannel;
Andrei Homescu9d8adb12022-08-02 04:38:30 +000078
79 Status blockingSendFdOneway(const android::os::ParcelFileDescriptor& fd) override {
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070080 mFdChannel.write(unique_fd(fcntl(fd.get(), F_DUPFD_CLOEXEC, 0)));
Andrei Homescu9d8adb12022-08-02 04:38:30 +000081 return Status::ok();
82 }
83
84 Status blockingRecvFd(android::os::ParcelFileDescriptor* fd) override {
85 fd->reset(mFdChannel.read());
86 return Status::ok();
87 }
Frederick Mayle96872592023-03-07 14:56:15 -080088
89 HandoffChannel<int> mIntChannel;
90
91 Status blockingSendIntOneway(int n) override {
92 mIntChannel.write(n);
93 return Status::ok();
94 }
95
96 Status blockingRecvInt(int* n) override {
97 *n = mIntChannel.read();
98 return Status::ok();
99 }
Andrei Homescu9d8adb12022-08-02 04:38:30 +0000100};
101
Andrei Homescue89feb52023-02-24 06:54:35 +0000102int main(int argc, char* argv[]) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700103 __android_log_set_logger(__android_log_stderr_logger);
Andrei Homescue89feb52023-02-24 06:54:35 +0000104
Andrei Homescu2a298012022-06-15 01:08:54 +0000105 LOG_ALWAYS_FATAL_IF(argc != 3, "Invalid number of arguments: %d", argc);
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -0700106 unique_fd writeEnd(atoi(argv[1]));
107 unique_fd readEnd(atoi(argv[2]));
Andrei Homescu2a298012022-06-15 01:08:54 +0000108
109 auto serverConfig = readFromFd<BinderRpcTestServerConfig>(readEnd);
110 auto socketType = static_cast<SocketType>(serverConfig.socketType);
111 auto rpcSecurity = static_cast<RpcSecurity>(serverConfig.rpcSecurity);
112
113 std::vector<RpcSession::FileDescriptorTransportMode>
114 serverSupportedFileDescriptorTransportModes;
115 for (auto mode : serverConfig.serverSupportedFileDescriptorTransportModes) {
116 serverSupportedFileDescriptorTransportModes.push_back(
117 static_cast<RpcSession::FileDescriptorTransportMode>(mode));
118 }
119
120 auto certVerifier = std::make_shared<RpcCertificateVerifierSimple>();
Andrei Homescuf30148c2023-03-10 00:31:45 +0000121 sp<RpcServer> server = RpcServer::make(newTlsFactory(rpcSecurity, certVerifier));
Andrei Homescu2a298012022-06-15 01:08:54 +0000122
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700123 LOG_ALWAYS_FATAL_IF(!server->setProtocolVersion(serverConfig.serverVersion));
Andrei Homescu2a298012022-06-15 01:08:54 +0000124 server->setMaxThreads(serverConfig.numThreads);
125 server->setSupportedFileDescriptorTransportModes(serverSupportedFileDescriptorTransportModes);
126
127 unsigned int outPort = 0;
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -0700128 unique_fd socketFd(serverConfig.socketFd);
Andrei Homescu2a298012022-06-15 01:08:54 +0000129
130 switch (socketType) {
131 case SocketType::PRECONNECTED:
132 [[fallthrough]];
133 case SocketType::UNIX:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700134 LOG_ALWAYS_FATAL_IF(OK != server->setupUnixDomainServer(serverConfig.addr.c_str()),
135 "%s", serverConfig.addr.c_str());
Andrei Homescu2a298012022-06-15 01:08:54 +0000136 break;
David Brazdil21c887c2022-09-23 12:25:18 +0100137 case SocketType::UNIX_BOOTSTRAP:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700138 LOG_ALWAYS_FATAL_IF(OK !=
139 server->setupUnixDomainSocketBootstrapServer(std::move(socketFd)));
David Brazdil21c887c2022-09-23 12:25:18 +0100140 break;
Alice Wang893a9912022-10-24 10:44:09 +0000141 case SocketType::UNIX_RAW:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700142 LOG_ALWAYS_FATAL_IF(OK != server->setupRawSocketServer(std::move(socketFd)));
Alice Wang893a9912022-10-24 10:44:09 +0000143 break;
Andrei Homescu2a298012022-06-15 01:08:54 +0000144 case SocketType::VSOCK:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700145 LOG_ALWAYS_FATAL_IF(OK !=
Tomasz Wasilczyk022db682024-06-17 13:55:51 -0700146 server->setupVsockServer(VMADDR_CID_LOCAL, VMADDR_PORT_ANY,
147 &outPort),
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700148 "Need `sudo modprobe vsock_loopback`?");
Andrei Homescu2a298012022-06-15 01:08:54 +0000149 break;
150 case SocketType::INET: {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700151 LOG_ALWAYS_FATAL_IF(OK != server->setupInetServer(kLocalInetAddress, 0, &outPort));
152 LOG_ALWAYS_FATAL_IF(0 == outPort);
Andrei Homescu2a298012022-06-15 01:08:54 +0000153 break;
154 }
155 default:
156 LOG_ALWAYS_FATAL("Unknown socket type");
157 }
158
159 BinderRpcTestServerInfo serverInfo;
160 serverInfo.port = static_cast<int64_t>(outPort);
161 serverInfo.cert.data = server->getCertificate(RpcCertificateFormat::PEM);
162 writeToFd(writeEnd, serverInfo);
163 auto clientInfo = readFromFd<BinderRpcTestClientInfo>(readEnd);
164
165 if (rpcSecurity == RpcSecurity::TLS) {
166 for (const auto& clientCert : clientInfo.certs) {
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700167 LOG_ALWAYS_FATAL_IF(OK !=
168 certVerifier->addTrustedPeerCertificate(RpcCertificateFormat::PEM,
169 clientCert.data));
Andrei Homescu2a298012022-06-15 01:08:54 +0000170 }
171 }
172
Steven Morelanddfb92182023-05-24 17:48:59 +0000173 server->setPerSessionRootObject([&](wp<RpcSession> session, const void* addrPtr, size_t len) {
174 {
175 sp<RpcSession> spSession = session.promote();
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700176 LOG_ALWAYS_FATAL_IF(nullptr == spSession.get());
Steven Morelanddfb92182023-05-24 17:48:59 +0000177 }
178
Andrei Homescu2a298012022-06-15 01:08:54 +0000179 // UNIX sockets with abstract addresses return
180 // sizeof(sa_family_t)==2 in addrlen
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700181 LOG_ALWAYS_FATAL_IF(len < sizeof(sa_family_t));
Andrei Homescu2a298012022-06-15 01:08:54 +0000182 const sockaddr* addr = reinterpret_cast<const sockaddr*>(addrPtr);
Andrei Homescu9d8adb12022-08-02 04:38:30 +0000183 sp<MyBinderRpcTestAndroid> service = sp<MyBinderRpcTestAndroid>::make();
Andrei Homescu2a298012022-06-15 01:08:54 +0000184 switch (addr->sa_family) {
185 case AF_UNIX:
186 // nothing to save
187 break;
188 case AF_VSOCK:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700189 LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_vm));
Andrei Homescu2a298012022-06-15 01:08:54 +0000190 service->port = reinterpret_cast<const sockaddr_vm*>(addr)->svm_port;
191 break;
192 case AF_INET:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700193 LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_in));
Andrei Homescu2a298012022-06-15 01:08:54 +0000194 service->port = ntohs(reinterpret_cast<const sockaddr_in*>(addr)->sin_port);
195 break;
196 case AF_INET6:
Tomasz Wasilczyke3de8802023-11-01 11:05:27 -0700197 LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_in));
Andrei Homescu2a298012022-06-15 01:08:54 +0000198 service->port = ntohs(reinterpret_cast<const sockaddr_in6*>(addr)->sin6_port);
199 break;
200 default:
201 LOG_ALWAYS_FATAL("Unrecognized address family %d", addr->sa_family);
202 }
203 service->server = server;
204 return service;
205 });
206
207 server->join();
208
209 // Another thread calls shutdown. Wait for it to complete.
210 (void)server->shutdown();
211
212 return 0;
213}