blob: a30df14bd655969bfef0e6d5f96f66289405619a [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define LOG_TAG "ServiceManager"
18
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070019#include <binder/IServiceManager.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080020
Steven Moreland1c47b582019-08-27 18:05:27 -070021#include <android/os/BnServiceCallback.h>
Steven Moreland80e1e6d2019-06-21 12:35:59 -070022#include <android/os/IServiceManager.h>
Mathias Agopian375f5632009-06-15 18:24:59 -070023#include <binder/IPCThreadState.h>
Steven Moreland28723ae2019-04-01 18:52:30 -070024#include <binder/Parcel.h>
25#include <utils/Log.h>
26#include <utils/String8.h>
27#include <utils/SystemClock.h>
28
Jiyong Park47f876b2018-04-17 13:56:46 +090029#ifndef __ANDROID_VNDK__
30#include <binder/IPermissionController.h>
31#endif
Steven Moreland28723ae2019-04-01 18:52:30 -070032
Steven Morelanded3b5632019-09-20 11:24:28 -070033#ifdef __ANDROID__
Yunfan Chen788e1c42018-03-29 16:52:09 +090034#include <cutils/properties.h>
Steven Moreland28723ae2019-04-01 18:52:30 -070035#endif
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080036
Steven Morelanda4853cd2019-07-12 15:44:37 -070037#include "Static.h"
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080038
39#include <unistd.h>
40
41namespace android {
42
Steven Moreland80e1e6d2019-06-21 12:35:59 -070043using AidlServiceManager = android::os::IServiceManager;
44using android::binder::Status;
45
Steven Moreland635a2912019-10-02 15:50:10 -070046// libbinder's IServiceManager.h can't rely on the values generated by AIDL
47// because many places use its headers via include_dirs (meaning, without
48// declaring the dependency in the build system). So, for now, we can just check
49// the values here.
50static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_CRITICAL == IServiceManager::DUMP_FLAG_PRIORITY_CRITICAL);
51static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_HIGH == IServiceManager::DUMP_FLAG_PRIORITY_HIGH);
52static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_NORMAL == IServiceManager::DUMP_FLAG_PRIORITY_NORMAL);
53static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_DEFAULT == IServiceManager::DUMP_FLAG_PRIORITY_DEFAULT);
54static_assert(AidlServiceManager::DUMP_FLAG_PRIORITY_ALL == IServiceManager::DUMP_FLAG_PRIORITY_ALL);
55static_assert(AidlServiceManager::DUMP_FLAG_PROTO == IServiceManager::DUMP_FLAG_PROTO);
56
Steven Moreland583685e2019-10-02 16:45:11 -070057const String16& IServiceManager::getInterfaceDescriptor() const {
58 return AidlServiceManager::descriptor;
59}
60IServiceManager::IServiceManager() {}
61IServiceManager::~IServiceManager() {}
62
63// From the old libbinder IServiceManager interface to IServiceManager.
64class ServiceManagerShim : public IServiceManager
65{
66public:
67 explicit ServiceManagerShim (const sp<AidlServiceManager>& impl);
68
69 sp<IBinder> getService(const String16& name) const override;
70 sp<IBinder> checkService(const String16& name) const override;
71 status_t addService(const String16& name, const sp<IBinder>& service,
72 bool allowIsolated, int dumpsysPriority) override;
73 Vector<String16> listServices(int dumpsysPriority) override;
74 sp<IBinder> waitForService(const String16& name16) override;
75
76 // for legacy ABI
77 const String16& getInterfaceDescriptor() const override {
78 return mTheRealServiceManager->getInterfaceDescriptor();
79 }
80 IBinder* onAsBinder() override {
81 return IInterface::asBinder(mTheRealServiceManager).get();
82 }
83private:
84 sp<AidlServiceManager> mTheRealServiceManager;
85};
86
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080087sp<IServiceManager> defaultServiceManager()
88{
Steven Moreland92b17c62019-04-02 15:46:24 -070089 static Mutex gDefaultServiceManagerLock;
90 static sp<IServiceManager> gDefaultServiceManager;
91
Yi Kongfdd8da92018-06-07 17:52:27 -070092 if (gDefaultServiceManager != nullptr) return gDefaultServiceManager;
Daniel Eratc2832702015-10-13 15:29:32 -060093
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080094 {
95 AutoMutex _l(gDefaultServiceManagerLock);
Yi Kongfdd8da92018-06-07 17:52:27 -070096 while (gDefaultServiceManager == nullptr) {
Steven Moreland583685e2019-10-02 16:45:11 -070097 gDefaultServiceManager = new ServiceManagerShim(
98 interface_cast<AidlServiceManager>(
99 ProcessState::self()->getContextObject(nullptr)));
Yi Kongfdd8da92018-06-07 17:52:27 -0700100 if (gDefaultServiceManager == nullptr)
Todd Poynora7b0f042013-06-18 17:25:37 -0700101 sleep(1);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800102 }
103 }
Daniel Eratc2832702015-10-13 15:29:32 -0600104
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800105 return gDefaultServiceManager;
106}
107
Steven Morelanded3b5632019-09-20 11:24:28 -0700108#if !defined(__ANDROID_VNDK__) && defined(__ANDROID__)
Jiyong Park47f876b2018-04-17 13:56:46 +0900109// IPermissionController is not accessible to vendors
110
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800111bool checkCallingPermission(const String16& permission)
112{
Yi Kongfdd8da92018-06-07 17:52:27 -0700113 return checkCallingPermission(permission, nullptr, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800114}
115
116static String16 _permission("permission");
117
Mathias Agopian375f5632009-06-15 18:24:59 -0700118
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800119bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid)
120{
121 IPCThreadState* ipcState = IPCThreadState::self();
Mathias Agopian375f5632009-06-15 18:24:59 -0700122 pid_t pid = ipcState->getCallingPid();
123 uid_t uid = ipcState->getCallingUid();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800124 if (outPid) *outPid = pid;
Mathias Agopian375f5632009-06-15 18:24:59 -0700125 if (outUid) *outUid = uid;
126 return checkPermission(permission, pid, uid);
127}
128
129bool checkPermission(const String16& permission, pid_t pid, uid_t uid)
130{
Steven Moreland92b17c62019-04-02 15:46:24 -0700131 static Mutex gPermissionControllerLock;
132 static sp<IPermissionController> gPermissionController;
133
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800134 sp<IPermissionController> pc;
Steven Moreland92b17c62019-04-02 15:46:24 -0700135 gPermissionControllerLock.lock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800136 pc = gPermissionController;
Steven Moreland92b17c62019-04-02 15:46:24 -0700137 gPermissionControllerLock.unlock();
Daniel Eratc2832702015-10-13 15:29:32 -0600138
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800139 int64_t startTime = 0;
140
141 while (true) {
Yi Kongfdd8da92018-06-07 17:52:27 -0700142 if (pc != nullptr) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800143 bool res = pc->checkPermission(permission, pid, uid);
144 if (res) {
145 if (startTime != 0) {
Steve Blocka19954a2012-01-04 20:05:49 +0000146 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800147 (int)((uptimeMillis()-startTime)/1000),
148 String8(permission).string(), uid, pid);
149 }
150 return res;
151 }
Daniel Eratc2832702015-10-13 15:29:32 -0600152
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800153 // Is this a permission failure, or did the controller go away?
Marco Nelissen097ca272014-11-14 08:01:01 -0800154 if (IInterface::asBinder(pc)->isBinderAlive()) {
Steve Block32397c12012-01-05 23:22:43 +0000155 ALOGW("Permission failure: %s from uid=%d pid=%d",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800156 String8(permission).string(), uid, pid);
157 return false;
158 }
Daniel Eratc2832702015-10-13 15:29:32 -0600159
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800160 // Object is dead!
Steven Moreland92b17c62019-04-02 15:46:24 -0700161 gPermissionControllerLock.lock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800162 if (gPermissionController == pc) {
Yi Kongfdd8da92018-06-07 17:52:27 -0700163 gPermissionController = nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800164 }
Steven Moreland92b17c62019-04-02 15:46:24 -0700165 gPermissionControllerLock.unlock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800166 }
Daniel Eratc2832702015-10-13 15:29:32 -0600167
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800168 // Need to retrieve the permission controller.
169 sp<IBinder> binder = defaultServiceManager()->checkService(_permission);
Yi Kongfdd8da92018-06-07 17:52:27 -0700170 if (binder == nullptr) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800171 // Wait for the permission controller to come back...
172 if (startTime == 0) {
173 startTime = uptimeMillis();
Steve Blocka19954a2012-01-04 20:05:49 +0000174 ALOGI("Waiting to check permission %s from uid=%d pid=%d",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800175 String8(permission).string(), uid, pid);
176 }
177 sleep(1);
178 } else {
179 pc = interface_cast<IPermissionController>(binder);
Daniel Eratc2832702015-10-13 15:29:32 -0600180 // Install the new permission controller, and try again.
Steven Moreland92b17c62019-04-02 15:46:24 -0700181 gPermissionControllerLock.lock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800182 gPermissionController = pc;
Steven Moreland92b17c62019-04-02 15:46:24 -0700183 gPermissionControllerLock.unlock();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800184 }
185 }
186}
187
Jiyong Park47f876b2018-04-17 13:56:46 +0900188#endif //__ANDROID_VNDK__
189
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800190// ----------------------------------------------------------------------
191
Steven Moreland583685e2019-10-02 16:45:11 -0700192ServiceManagerShim::ServiceManagerShim(const sp<AidlServiceManager>& impl)
193 : mTheRealServiceManager(impl)
194{}
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700195
Steven Moreland583685e2019-10-02 16:45:11 -0700196sp<IBinder> ServiceManagerShim::getService(const String16& name) const
197{
198 static bool gSystemBootCompleted = false;
199
200 sp<IBinder> svc = checkService(name);
201 if (svc != nullptr) return svc;
202
203 const bool isVendorService =
204 strcmp(ProcessState::self()->getDriverName().c_str(), "/dev/vndbinder") == 0;
205 const long timeout = uptimeMillis() + 5000;
206 // Vendor code can't access system properties
207 if (!gSystemBootCompleted && !isVendorService) {
208#ifdef __ANDROID__
209 char bootCompleted[PROPERTY_VALUE_MAX];
210 property_get("sys.boot_completed", bootCompleted, "0");
211 gSystemBootCompleted = strcmp(bootCompleted, "1") == 0 ? true : false;
212#else
213 gSystemBootCompleted = true;
214#endif
215 }
216 // retry interval in millisecond; note that vendor services stay at 100ms
217 const long sleepTime = gSystemBootCompleted ? 1000 : 100;
218
219 int n = 0;
220 while (uptimeMillis() < timeout) {
221 n++;
222 ALOGI("Waiting for service '%s' on '%s'...", String8(name).string(),
223 ProcessState::self()->getDriverName().c_str());
224 usleep(1000*sleepTime);
Steven Moreland92b17c62019-04-02 15:46:24 -0700225
Yunfan Chen788e1c42018-03-29 16:52:09 +0900226 sp<IBinder> svc = checkService(name);
Xin Lif11e2bd2018-06-08 15:11:57 -0700227 if (svc != nullptr) return svc;
Steven Moreland583685e2019-10-02 16:45:11 -0700228 }
229 ALOGW("Service %s didn't start. Returning NULL", String8(name).string());
230 return nullptr;
231}
Yunfan Chen788e1c42018-03-29 16:52:09 +0900232
Steven Moreland583685e2019-10-02 16:45:11 -0700233sp<IBinder> ServiceManagerShim::checkService(const String16& name) const
234{
235 sp<IBinder> ret;
236 if (!mTheRealServiceManager->checkService(String8(name).c_str(), &ret).isOk()) {
237 return nullptr;
238 }
239 return ret;
240}
241
242status_t ServiceManagerShim::addService(const String16& name, const sp<IBinder>& service,
243 bool allowIsolated, int dumpsysPriority)
244{
245 Status status = mTheRealServiceManager->addService(
246 String8(name).c_str(), service, allowIsolated, dumpsysPriority);
247 return status.exceptionCode();
248}
249
250Vector<String16> ServiceManagerShim::listServices(int dumpsysPriority)
251{
252 std::vector<std::string> ret;
253 if (!mTheRealServiceManager->listServices(dumpsysPriority, &ret).isOk()) {
254 return {};
255 }
256
257 Vector<String16> res;
258 res.setCapacity(ret.size());
259 for (const std::string& name : ret) {
260 res.push(String16(name.c_str()));
261 }
262 return res;
263}
264
265sp<IBinder> ServiceManagerShim::waitForService(const String16& name16)
266{
267 class Waiter : public android::os::BnServiceCallback {
268 Status onRegistration(const std::string& /*name*/,
269 const sp<IBinder>& binder) override {
270 std::unique_lock<std::mutex> lock(mMutex);
271 mBinder = binder;
272 lock.unlock();
273 mCv.notify_one();
274 return Status::ok();
Yunfan Chen788e1c42018-03-29 16:52:09 +0900275 }
Steven Moreland583685e2019-10-02 16:45:11 -0700276 public:
277 sp<IBinder> mBinder;
278 std::mutex mMutex;
279 std::condition_variable mCv;
280 };
Yunfan Chen788e1c42018-03-29 16:52:09 +0900281
Steven Moreland583685e2019-10-02 16:45:11 -0700282 const std::string name = String8(name16).c_str();
Yunfan Chen788e1c42018-03-29 16:52:09 +0900283
Steven Moreland583685e2019-10-02 16:45:11 -0700284 sp<IBinder> out;
285 if (!mTheRealServiceManager->getService(name, &out).isOk()) {
286 return nullptr;
287 }
288 if(out != nullptr) return out;
289
290 sp<Waiter> waiter = new Waiter;
291 if (!mTheRealServiceManager->registerForNotifications(
292 name, waiter).isOk()) {
Yi Kongfdd8da92018-06-07 17:52:27 -0700293 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800294 }
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700295
Steven Moreland583685e2019-10-02 16:45:11 -0700296 while(true) {
297 {
298 std::unique_lock<std::mutex> lock(waiter->mMutex);
299 using std::literals::chrono_literals::operator""s;
300 waiter->mCv.wait_for(lock, 1s, [&] {
301 return waiter->mBinder != nullptr;
302 });
303 if (waiter->mBinder != nullptr) return waiter->mBinder;
Steven Moreland80e1e6d2019-06-21 12:35:59 -0700304 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800305
Steven Moreland583685e2019-10-02 16:45:11 -0700306 // Handle race condition for lazy services. Here is what can happen:
307 // - the service dies (not processed by init yet).
308 // - sm processes death notification.
309 // - sm gets getService and calls init to start service.
310 // - init gets the start signal, but the service already appears
311 // started, so it does nothing.
312 // - init gets death signal, but doesn't know it needs to restart
313 // the service
314 // - we need to request service again to get it to start
Jon Spivack0d844302019-07-22 18:40:34 -0700315 if (!mTheRealServiceManager->getService(name, &out).isOk()) {
Steven Moreland1c47b582019-08-27 18:05:27 -0700316 return nullptr;
317 }
318 if(out != nullptr) return out;
319
Steven Moreland583685e2019-10-02 16:45:11 -0700320 ALOGW("Waited one second for %s", name.c_str());
Steven Moreland1c47b582019-08-27 18:05:27 -0700321 }
Steven Moreland583685e2019-10-02 16:45:11 -0700322}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800323
Steven Moreland61ff8492019-09-26 16:05:45 -0700324} // namespace android