blob: cb09a7fbab7633b5f1e1a38e60997aeb75a25175 [file] [log] [blame]
Andrei Homescu2a298012022-06-15 01:08:54 +00001/*
2 * Copyright (C) 2022 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "binderRpcTestCommon.h"
18
19using namespace android;
20
Andrei Homescu9d8adb12022-08-02 04:38:30 +000021class MyBinderRpcTestAndroid : public MyBinderRpcTestBase {
22public:
23 wp<RpcServer> server;
24
25 Status countBinders(std::vector<int32_t>* out) override {
26 return countBindersImpl(server, out);
27 }
28
29 Status die(bool cleanup) override {
30 if (cleanup) {
31 exit(1);
32 } else {
33 _exit(1);
34 }
35 }
36
37 Status scheduleShutdown() override {
38 sp<RpcServer> strongServer = server.promote();
39 if (strongServer == nullptr) {
40 return Status::fromExceptionCode(Status::EX_NULL_POINTER);
41 }
42 RpcMaybeThread([=] {
43 LOG_ALWAYS_FATAL_IF(!strongServer->shutdown(), "Could not shutdown");
44 }).detach();
45 return Status::ok();
46 }
47
48 Status useKernelBinderCallingId() override {
49 // this is WRONG! It does not make sense when using RPC binder, and
50 // because it is SO wrong, and so much code calls this, it should abort!
51
52 if constexpr (kEnableKernelIpc) {
53 (void)IPCThreadState::self()->getCallingPid();
54 }
55 return Status::ok();
56 }
57
58 Status echoAsFile(const std::string& content, android::os::ParcelFileDescriptor* out) override {
59 out->reset(mockFileDescriptor(content));
60 return Status::ok();
61 }
62
63 Status concatFiles(const std::vector<android::os::ParcelFileDescriptor>& files,
64 android::os::ParcelFileDescriptor* out) override {
65 std::string acc;
66 for (const auto& file : files) {
67 std::string result;
68 CHECK(android::base::ReadFdToString(file.get(), &result));
69 acc.append(result);
70 }
71 out->reset(mockFileDescriptor(acc));
72 return Status::ok();
73 }
74
75 HandoffChannel<android::base::unique_fd> mFdChannel;
76
77 Status blockingSendFdOneway(const android::os::ParcelFileDescriptor& fd) override {
78 mFdChannel.write(android::base::unique_fd(fcntl(fd.get(), F_DUPFD_CLOEXEC, 0)));
79 return Status::ok();
80 }
81
82 Status blockingRecvFd(android::os::ParcelFileDescriptor* fd) override {
83 fd->reset(mFdChannel.read());
84 return Status::ok();
85 }
Frederick Mayle96872592023-03-07 14:56:15 -080086
87 HandoffChannel<int> mIntChannel;
88
89 Status blockingSendIntOneway(int n) override {
90 mIntChannel.write(n);
91 return Status::ok();
92 }
93
94 Status blockingRecvInt(int* n) override {
95 *n = mIntChannel.read();
96 return Status::ok();
97 }
Andrei Homescu9d8adb12022-08-02 04:38:30 +000098};
99
Andrei Homescue89feb52023-02-24 06:54:35 +0000100int main(int argc, char* argv[]) {
101 android::base::InitLogging(argv, android::base::StderrLogger, android::base::DefaultAborter);
102
Andrei Homescu2a298012022-06-15 01:08:54 +0000103 LOG_ALWAYS_FATAL_IF(argc != 3, "Invalid number of arguments: %d", argc);
104 base::unique_fd writeEnd(atoi(argv[1]));
105 base::unique_fd readEnd(atoi(argv[2]));
106
107 auto serverConfig = readFromFd<BinderRpcTestServerConfig>(readEnd);
108 auto socketType = static_cast<SocketType>(serverConfig.socketType);
109 auto rpcSecurity = static_cast<RpcSecurity>(serverConfig.rpcSecurity);
110
111 std::vector<RpcSession::FileDescriptorTransportMode>
112 serverSupportedFileDescriptorTransportModes;
113 for (auto mode : serverConfig.serverSupportedFileDescriptorTransportModes) {
114 serverSupportedFileDescriptorTransportModes.push_back(
115 static_cast<RpcSession::FileDescriptorTransportMode>(mode));
116 }
117
118 auto certVerifier = std::make_shared<RpcCertificateVerifierSimple>();
Andrei Homescuf30148c2023-03-10 00:31:45 +0000119 sp<RpcServer> server = RpcServer::make(newTlsFactory(rpcSecurity, certVerifier));
Andrei Homescu2a298012022-06-15 01:08:54 +0000120
Steven Morelandca3f6382023-05-11 23:23:26 +0000121 CHECK(server->setProtocolVersion(serverConfig.serverVersion));
Andrei Homescu2a298012022-06-15 01:08:54 +0000122 server->setMaxThreads(serverConfig.numThreads);
123 server->setSupportedFileDescriptorTransportModes(serverSupportedFileDescriptorTransportModes);
124
125 unsigned int outPort = 0;
Alice Wang1ef010b2022-11-14 09:09:25 +0000126 base::unique_fd socketFd(serverConfig.socketFd);
Andrei Homescu2a298012022-06-15 01:08:54 +0000127
128 switch (socketType) {
129 case SocketType::PRECONNECTED:
130 [[fallthrough]];
131 case SocketType::UNIX:
132 CHECK_EQ(OK, server->setupUnixDomainServer(serverConfig.addr.c_str()))
133 << serverConfig.addr;
134 break;
David Brazdil21c887c2022-09-23 12:25:18 +0100135 case SocketType::UNIX_BOOTSTRAP:
Alice Wang1ef010b2022-11-14 09:09:25 +0000136 CHECK_EQ(OK, server->setupUnixDomainSocketBootstrapServer(std::move(socketFd)));
David Brazdil21c887c2022-09-23 12:25:18 +0100137 break;
Alice Wang893a9912022-10-24 10:44:09 +0000138 case SocketType::UNIX_RAW:
Alice Wang1ef010b2022-11-14 09:09:25 +0000139 CHECK_EQ(OK, server->setupRawSocketServer(std::move(socketFd)));
Alice Wang893a9912022-10-24 10:44:09 +0000140 break;
Andrei Homescu2a298012022-06-15 01:08:54 +0000141 case SocketType::VSOCK:
David Brazdila47dfda2022-11-22 22:52:19 +0000142 CHECK_EQ(OK, server->setupVsockServer(VMADDR_CID_LOCAL, serverConfig.vsockPort));
Andrei Homescu2a298012022-06-15 01:08:54 +0000143 break;
144 case SocketType::INET: {
145 CHECK_EQ(OK, server->setupInetServer(kLocalInetAddress, 0, &outPort));
146 CHECK_NE(0, outPort);
147 break;
148 }
149 default:
150 LOG_ALWAYS_FATAL("Unknown socket type");
151 }
152
153 BinderRpcTestServerInfo serverInfo;
154 serverInfo.port = static_cast<int64_t>(outPort);
155 serverInfo.cert.data = server->getCertificate(RpcCertificateFormat::PEM);
156 writeToFd(writeEnd, serverInfo);
157 auto clientInfo = readFromFd<BinderRpcTestClientInfo>(readEnd);
158
159 if (rpcSecurity == RpcSecurity::TLS) {
160 for (const auto& clientCert : clientInfo.certs) {
161 CHECK_EQ(OK,
162 certVerifier->addTrustedPeerCertificate(RpcCertificateFormat::PEM,
163 clientCert.data));
164 }
165 }
166
Steven Morelanddfb92182023-05-24 17:48:59 +0000167 server->setPerSessionRootObject([&](wp<RpcSession> session, const void* addrPtr, size_t len) {
168 {
169 sp<RpcSession> spSession = session.promote();
170 CHECK_NE(nullptr, spSession.get());
171 }
172
Andrei Homescu2a298012022-06-15 01:08:54 +0000173 // UNIX sockets with abstract addresses return
174 // sizeof(sa_family_t)==2 in addrlen
175 CHECK_GE(len, sizeof(sa_family_t));
176 const sockaddr* addr = reinterpret_cast<const sockaddr*>(addrPtr);
Andrei Homescu9d8adb12022-08-02 04:38:30 +0000177 sp<MyBinderRpcTestAndroid> service = sp<MyBinderRpcTestAndroid>::make();
Andrei Homescu2a298012022-06-15 01:08:54 +0000178 switch (addr->sa_family) {
179 case AF_UNIX:
180 // nothing to save
181 break;
182 case AF_VSOCK:
183 CHECK_EQ(len, sizeof(sockaddr_vm));
184 service->port = reinterpret_cast<const sockaddr_vm*>(addr)->svm_port;
185 break;
186 case AF_INET:
187 CHECK_EQ(len, sizeof(sockaddr_in));
188 service->port = ntohs(reinterpret_cast<const sockaddr_in*>(addr)->sin_port);
189 break;
190 case AF_INET6:
191 CHECK_EQ(len, sizeof(sockaddr_in));
192 service->port = ntohs(reinterpret_cast<const sockaddr_in6*>(addr)->sin6_port);
193 break;
194 default:
195 LOG_ALWAYS_FATAL("Unrecognized address family %d", addr->sa_family);
196 }
197 service->server = server;
198 return service;
199 });
200
201 server->join();
202
203 // Another thread calls shutdown. Wait for it to complete.
204 (void)server->shutdown();
205
206 return 0;
207}