blob: f7e0915f15c862313b6db8493ce4a8ead9398bc3 [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Jason Parksdcd39582009-11-03 12:14:38 -080017#define LOG_TAG "IPCThreadState"
18
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070019#include <binder/IPCThreadState.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080020
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070021#include <binder/Binder.h>
22#include <binder/BpBinder.h>
Mathias Agopian002e1e52013-05-06 20:20:50 -070023#include <binder/TextOutput.h>
24
Steven Moreland7732a092019-01-02 17:54:16 -080025#include <utils/CallStack.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080026
Hans Boehma997b232019-04-12 16:59:00 -070027#include <atomic>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080028#include <errno.h>
Colin Cross96e83222016-04-15 14:29:55 -070029#include <inttypes.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080030#include <pthread.h>
31#include <sched.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080032#include <signal.h>
33#include <stdio.h>
34#include <sys/ioctl.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080035#include <sys/resource.h>
Yabin Cui8fb2d252015-01-26 19:45:47 -080036#include <unistd.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080037
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -070038#include "Utils.h"
Steven Moreland6ba5a252021-05-04 22:49:00 +000039#include "binder_module.h"
Steven Morelanda4853cd2019-07-12 15:44:37 -070040
Kevin Lindkviste8e12432022-11-23 13:23:42 +010041#if (defined(__ANDROID__) || defined(__Fuchsia__)) && !defined(BINDER_WITH_KERNEL_IPC)
42#error Android and Fuchsia are expected to have BINDER_WITH_KERNEL_IPC
43#endif
44
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080045#if LOG_NDEBUG
46
47#define IF_LOG_TRANSACTIONS() if (false)
48#define IF_LOG_COMMANDS() if (false)
mattgilbride85897672022-10-22 17:42:44 +000049#define LOG_REMOTEREFS(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080050#define IF_LOG_REMOTEREFS() if (false)
Tim Murrayd429f4a2017-03-07 09:31:09 -080051
mattgilbride85897672022-10-22 17:42:44 +000052#define LOG_THREADPOOL(...)
53#define LOG_ONEWAY(...)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080054
55#else
56
Steve Block9f760152011-10-12 17:27:03 +010057#define IF_LOG_TRANSACTIONS() IF_ALOG(LOG_VERBOSE, "transact")
58#define IF_LOG_COMMANDS() IF_ALOG(LOG_VERBOSE, "ipc")
59#define LOG_REMOTEREFS(...) ALOG(LOG_DEBUG, "remoterefs", __VA_ARGS__)
60#define IF_LOG_REMOTEREFS() IF_ALOG(LOG_DEBUG, "remoterefs")
61#define LOG_THREADPOOL(...) ALOG(LOG_DEBUG, "threadpool", __VA_ARGS__)
62#define LOG_ONEWAY(...) ALOG(LOG_DEBUG, "ipc", __VA_ARGS__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080063
64#endif
65
66// ---------------------------------------------------------------------------
67
68namespace android {
69
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -070070using namespace std::chrono_literals;
71
Chih-Hung Hsieh8e5337d2014-10-24 14:10:09 -070072// Static const and functions will be optimized out if not used,
73// when LOG_NDEBUG and references in IF_LOG_COMMANDS() are optimized out.
Devin Moorea7499132023-12-15 18:48:39 +000074static const char* kReturnStrings[] = {
75 "BR_ERROR",
76 "BR_OK",
Devin Moore58029202023-12-15 18:58:48 +000077 "BR_TRANSACTION/BR_TRANSACTION_SEC_CTX",
Devin Moorea7499132023-12-15 18:48:39 +000078 "BR_REPLY",
79 "BR_ACQUIRE_RESULT",
80 "BR_DEAD_REPLY",
81 "BR_TRANSACTION_COMPLETE",
82 "BR_INCREFS",
83 "BR_ACQUIRE",
84 "BR_RELEASE",
85 "BR_DECREFS",
86 "BR_ATTEMPT_ACQUIRE",
87 "BR_NOOP",
88 "BR_SPAWN_LOOPER",
89 "BR_FINISHED",
90 "BR_DEAD_BINDER",
91 "BR_CLEAR_DEATH_NOTIFICATION_DONE",
92 "BR_FAILED_REPLY",
93 "BR_FROZEN_REPLY",
94 "BR_ONEWAY_SPAM_SUSPECT",
95 "BR_TRANSACTION_PENDING_FROZEN",
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -070096 "BR_FROZEN_BINDER",
97 "BR_CLEAR_FREEZE_NOTIFICATION_DONE",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080098};
99
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700100static const char* kCommandStrings[] = {
101 "BC_TRANSACTION",
102 "BC_REPLY",
103 "BC_ACQUIRE_RESULT",
104 "BC_FREE_BUFFER",
105 "BC_INCREFS",
106 "BC_ACQUIRE",
107 "BC_RELEASE",
108 "BC_DECREFS",
109 "BC_INCREFS_DONE",
110 "BC_ACQUIRE_DONE",
111 "BC_ATTEMPT_ACQUIRE",
112 "BC_REGISTER_LOOPER",
113 "BC_ENTER_LOOPER",
114 "BC_EXIT_LOOPER",
115 "BC_REQUEST_DEATH_NOTIFICATION",
116 "BC_CLEAR_DEATH_NOTIFICATION",
117 "BC_DEAD_BINDER_DONE",
118 "BC_TRANSACTION_SG",
119 "BC_REPLY_SG",
120 "BC_REQUEST_FREEZE_NOTIFICATION",
121 "BC_CLEAR_FREEZE_NOTIFICATION",
122 "BC_FREEZE_NOTIFICATION_DONE",
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800123};
124
Olivier Gaillard91a04802018-11-14 17:32:41 +0000125static const int64_t kWorkSourcePropagatedBitIndex = 32;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100126
songjinshi73a7dde2016-10-18 21:05:56 +0800127static const char* getReturnString(uint32_t cmd)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800128{
songjinshi8e486c62019-04-04 11:22:52 +0800129 size_t idx = cmd & _IOC_NRMASK;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800130 if (idx < sizeof(kReturnStrings) / sizeof(kReturnStrings[0]))
131 return kReturnStrings[idx];
132 else
133 return "unknown";
134}
135
Pawan Wagh7063b522022-09-28 18:52:26 +0000136static const void* printBinderTransactionData(std::ostream& out, const void* data) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800137 const binder_transaction_data* btd =
138 (const binder_transaction_data*)data;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700139 if (btd->target.handle < 1024) {
140 /* want to print descriptors in decimal; guess based on value */
Pawan Wagh7063b522022-09-28 18:52:26 +0000141 out << "\ttarget.desc=" << btd->target.handle;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700142 } else {
Pawan Wagh7063b522022-09-28 18:52:26 +0000143 out << "\ttarget.ptr=" << btd->target.ptr;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700144 }
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000145 out << "\t (cookie " << btd->cookie << ")\n"
Pawan Wagh7063b522022-09-28 18:52:26 +0000146 << "\tcode=" << TypeCode(btd->code) << ", flags=" << (void*)(uint64_t)btd->flags << "\n"
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000147 << "\tdata=" << btd->data.ptr.buffer << " (" << (void*)btd->data_size << " bytes)\n"
148 << "\toffsets=" << btd->data.ptr.offsets << " (" << (void*)btd->offsets_size << " bytes)\n";
149 return btd + 1;
150}
151
152static const void* printBinderTransactionDataSecCtx(std::ostream& out, const void* data) {
153 const binder_transaction_data_secctx* btd = (const binder_transaction_data_secctx*)data;
154
155 printBinderTransactionData(out, &btd->transaction_data);
156
157 char* secctx = (char*)btd->secctx;
158 out << "\tsecctx=" << secctx << "\n";
159
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800160 return btd+1;
161}
162
Pawan Wagh7063b522022-09-28 18:52:26 +0000163static const void* printReturnCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700164 static const size_t N = sizeof(kReturnStrings)/sizeof(kReturnStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800165 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100166 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700167 size_t cmdIndex = code & 0xff;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100168 if (code == BR_ERROR) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000169 out << "\tBR_ERROR: " << (void*)(uint64_t)(*cmd++) << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800170 return cmd;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700171 } else if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000172 out << "\tUnknown reply: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800173 return cmd;
174 }
Pawan Wagh7063b522022-09-28 18:52:26 +0000175 out << "\t" << kReturnStrings[cmdIndex];
Tim Murrayd429f4a2017-03-07 09:31:09 -0800176
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800177 switch (code) {
Alice Ryhlc268ccb2022-11-17 10:18:38 +0000178 case BR_TRANSACTION_SEC_CTX: {
179 out << ": ";
180 cmd = (const int32_t*)printBinderTransactionDataSecCtx(out, cmd);
181 } break;
182
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800183 case BR_TRANSACTION:
184 case BR_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000185 out << ": ";
186 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800187 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800188
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800189 case BR_ACQUIRE_RESULT: {
190 const int32_t res = *cmd++;
191 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
192 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800193
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800194 case BR_INCREFS:
195 case BR_ACQUIRE:
196 case BR_RELEASE:
197 case BR_DECREFS: {
198 const int32_t b = *cmd++;
199 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900200 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800201 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800202
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800203 case BR_ATTEMPT_ACQUIRE: {
204 const int32_t p = *cmd++;
205 const int32_t b = *cmd++;
206 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900207 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800208 << "), pri=" << p;
209 } break;
210
211 case BR_DEAD_BINDER:
212 case BR_CLEAR_DEATH_NOTIFICATION_DONE: {
213 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900214 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800215 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700216
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700217 case BR_FROZEN_BINDER: {
218 const int32_t c = *cmd++;
219 const int32_t h = *cmd++;
220 const int32_t isFrozen = *cmd++;
221 out << ": freeze cookie " << (void*)(uint64_t)c << " isFrozen: " << isFrozen;
222 } break;
223
224 case BR_CLEAR_FREEZE_NOTIFICATION_DONE: {
225 const int32_t c = *cmd++;
226 out << ": freeze cookie " << (void*)(uint64_t)c;
227 } break;
228
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700229 default:
230 // no details to show for: BR_OK, BR_DEAD_REPLY,
231 // BR_TRANSACTION_COMPLETE, BR_FINISHED
232 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800233 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800234
Pawan Wagh7063b522022-09-28 18:52:26 +0000235 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800236 return cmd;
237}
238
Devin Moore0272a5d2024-09-17 22:23:50 +0000239static void printReturnCommandParcel(std::ostream& out, const Parcel& parcel) {
240 const void* cmds = parcel.data();
241 out << "\t" << HexDump(cmds, parcel.dataSize()) << "\n";
242 IF_LOG_COMMANDS() {
243 const void* end = parcel.data() + parcel.dataSize();
244 while (cmds < end) cmds = printReturnCommand(out, cmds);
245 }
246}
247
Pawan Wagh7063b522022-09-28 18:52:26 +0000248static const void* printCommand(std::ostream& out, const void* _cmd) {
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700249 static const size_t N = sizeof(kCommandStrings)/sizeof(kCommandStrings[0]);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800250 const int32_t* cmd = (const int32_t*)_cmd;
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +0100251 uint32_t code = (uint32_t)*cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700252 size_t cmdIndex = code & 0xff;
253
254 if (cmdIndex >= N) {
Pawan Wagh7063b522022-09-28 18:52:26 +0000255 out << "Unknown command: " << code << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800256 return cmd;
257 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700258 out << kCommandStrings[cmdIndex];
259
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800260 switch (code) {
261 case BC_TRANSACTION:
262 case BC_REPLY: {
Pawan Wagh7063b522022-09-28 18:52:26 +0000263 out << ": ";
264 cmd = (const int32_t*)printBinderTransactionData(out, cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800265 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800266
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800267 case BC_ACQUIRE_RESULT: {
268 const int32_t res = *cmd++;
269 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
270 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800271
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800272 case BC_FREE_BUFFER: {
273 const int32_t buf = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900274 out << ": buffer=" << (void*)(uint64_t)buf;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800275 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800276
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800277 case BC_INCREFS:
278 case BC_ACQUIRE:
279 case BC_RELEASE:
280 case BC_DECREFS: {
281 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700282 out << ": desc=" << d;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800283 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800284
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800285 case BC_INCREFS_DONE:
286 case BC_ACQUIRE_DONE: {
287 const int32_t b = *cmd++;
288 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900289 out << ": target=" << (void*)(uint64_t)b << " (cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800290 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800291
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800292 case BC_ATTEMPT_ACQUIRE: {
293 const int32_t p = *cmd++;
294 const int32_t d = *cmd++;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700295 out << ": desc=" << d << ", pri=" << p;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800296 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -0800297
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800298 case BC_REQUEST_DEATH_NOTIFICATION:
299 case BC_CLEAR_DEATH_NOTIFICATION: {
300 const int32_t h = *cmd++;
301 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900302 out << ": handle=" << h << " (death cookie " << (void*)(uint64_t)c << ")";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800303 } break;
304
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700305 case BC_REQUEST_FREEZE_NOTIFICATION:
306 case BC_CLEAR_FREEZE_NOTIFICATION: {
307 const int32_t h = *cmd++;
308 const int32_t c = *cmd++;
309 out << ": handle=" << h << " (freeze cookie " << (void*)(uint64_t)c << ")";
310 } break;
311
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800312 case BC_DEAD_BINDER_DONE: {
313 const int32_t c = *cmd++;
Jiyong Park16c6e702020-11-13 20:53:12 +0900314 out << ": death cookie " << (void*)(uint64_t)c;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800315 } break;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700316
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -0700317 case BC_FREEZE_NOTIFICATION_DONE: {
318 const int32_t c = *cmd++;
319 out << ": freeze cookie " << (void*)(uint64_t)c;
320 } break;
321
Andy McFaddenaefc9cd2011-08-31 07:43:40 -0700322 default:
323 // no details to show for: BC_REGISTER_LOOPER, BC_ENTER_LOOPER,
324 // BC_EXIT_LOOPER
325 break;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800326 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800327
Pawan Wagh7063b522022-09-28 18:52:26 +0000328 out << "\n";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800329 return cmd;
330}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800331
Tomasz Wasilczyk370408e2024-06-21 15:45:26 -0700332LIBBINDER_IGNORE("-Wzero-as-null-pointer-constant")
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800333static pthread_mutex_t gTLSMutex = PTHREAD_MUTEX_INITIALIZER;
Tomasz Wasilczyk370408e2024-06-21 15:45:26 -0700334LIBBINDER_IGNORE_END()
Hans Boehma997b232019-04-12 16:59:00 -0700335static std::atomic<bool> gHaveTLS(false);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800336static pthread_key_t gTLS = 0;
Hans Boehma997b232019-04-12 16:59:00 -0700337static std::atomic<bool> gShutdown = false;
338static std::atomic<bool> gDisableBackgroundScheduling = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800339
340IPCThreadState* IPCThreadState::self()
341{
Hans Boehma997b232019-04-12 16:59:00 -0700342 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800343restart:
344 const pthread_key_t k = gTLS;
345 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
346 if (st) return st;
347 return new IPCThreadState;
348 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800349
Hans Boehma997b232019-04-12 16:59:00 -0700350 // Racey, heuristic test for simultaneous shutdown.
351 if (gShutdown.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800352 ALOGW("Calling IPCThreadState::self() during shutdown is dangerous, expect a crash.\n");
Yi Kongfdd8da92018-06-07 17:52:27 -0700353 return nullptr;
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800354 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800355
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800356 pthread_mutex_lock(&gTLSMutex);
Hans Boehma997b232019-04-12 16:59:00 -0700357 if (!gHaveTLS.load(std::memory_order_relaxed)) {
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800358 int key_create_value = pthread_key_create(&gTLS, threadDestructor);
359 if (key_create_value != 0) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800360 pthread_mutex_unlock(&gTLSMutex);
Andreas Gampef31a3eb2016-02-01 13:21:56 -0800361 ALOGW("IPCThreadState::self() unable to create TLS key, expect a crash: %s\n",
362 strerror(key_create_value));
Yi Kongfdd8da92018-06-07 17:52:27 -0700363 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800364 }
Hans Boehma997b232019-04-12 16:59:00 -0700365 gHaveTLS.store(true, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800366 }
367 pthread_mutex_unlock(&gTLSMutex);
368 goto restart;
369}
370
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800371IPCThreadState* IPCThreadState::selfOrNull()
372{
Hans Boehma997b232019-04-12 16:59:00 -0700373 if (gHaveTLS.load(std::memory_order_acquire)) {
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800374 const pthread_key_t k = gTLS;
375 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
376 return st;
377 }
Yi Kongfdd8da92018-06-07 17:52:27 -0700378 return nullptr;
Brad Fitzpatrick1b608432010-12-13 16:52:35 -0800379}
380
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800381void IPCThreadState::shutdown()
382{
Hans Boehma997b232019-04-12 16:59:00 -0700383 gShutdown.store(true, std::memory_order_relaxed);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800384
Hans Boehma997b232019-04-12 16:59:00 -0700385 if (gHaveTLS.load(std::memory_order_acquire)) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800386 // XXX Need to wait for all thread pool threads to exit!
387 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(gTLS);
388 if (st) {
389 delete st;
Yi Kongfdd8da92018-06-07 17:52:27 -0700390 pthread_setspecific(gTLS, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800391 }
zhongjieff405782016-03-09 15:05:04 +0800392 pthread_key_delete(gTLS);
Hans Boehma997b232019-04-12 16:59:00 -0700393 gHaveTLS.store(false, std::memory_order_release);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800394 }
395}
396
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800397void IPCThreadState::disableBackgroundScheduling(bool disable)
398{
Hans Boehma997b232019-04-12 16:59:00 -0700399 gDisableBackgroundScheduling.store(disable, std::memory_order_relaxed);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -0800400}
401
Martijn Coenen2b631742017-05-05 11:16:59 -0700402bool IPCThreadState::backgroundSchedulingDisabled()
403{
Hans Boehma997b232019-04-12 16:59:00 -0700404 return gDisableBackgroundScheduling.load(std::memory_order_relaxed);
Martijn Coenen2b631742017-05-05 11:16:59 -0700405}
406
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800407status_t IPCThreadState::clearLastError()
408{
409 const status_t err = mLastError;
410 mLastError = NO_ERROR;
411 return err;
412}
413
Dan Stoza9c634fd2014-11-26 12:23:23 -0800414pid_t IPCThreadState::getCallingPid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800415{
Steven Moreland35626652021-05-15 01:32:04 +0000416 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800417 return mCallingPid;
418}
419
Steven Morelandf0212002018-12-26 13:59:23 -0800420const char* IPCThreadState::getCallingSid() const
421{
Steven Moreland35626652021-05-15 01:32:04 +0000422 checkContextIsBinderForUse(__func__);
Steven Morelandf0212002018-12-26 13:59:23 -0800423 return mCallingSid;
424}
425
Dan Stoza9c634fd2014-11-26 12:23:23 -0800426uid_t IPCThreadState::getCallingUid() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800427{
Steven Moreland35626652021-05-15 01:32:04 +0000428 checkContextIsBinderForUse(__func__);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800429 return mCallingUid;
430}
431
Steven Moreland35626652021-05-15 01:32:04 +0000432const IPCThreadState::SpGuard* IPCThreadState::pushGetCallingSpGuard(const SpGuard* guard) {
433 const SpGuard* orig = mServingStackPointerGuard;
434 mServingStackPointerGuard = guard;
435 return orig;
436}
437
438void IPCThreadState::restoreGetCallingSpGuard(const SpGuard* guard) {
439 mServingStackPointerGuard = guard;
440}
441
442void IPCThreadState::checkContextIsBinderForUse(const char* use) const {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700443 if (mServingStackPointerGuard == nullptr) [[likely]] {
444 return;
445 }
Steven Moreland35626652021-05-15 01:32:04 +0000446
447 if (!mServingStackPointer || mServingStackPointerGuard->address < mServingStackPointer) {
448 LOG_ALWAYS_FATAL("In context %s, %s does not make sense (binder sp: %p, guard: %p).",
449 mServingStackPointerGuard->context, use, mServingStackPointer,
450 mServingStackPointerGuard->address);
451 }
452
453 // in the case mServingStackPointer is deeper in the stack than the guard,
454 // we must be serving a binder transaction (maybe nested). This is a binder
455 // context, so we don't abort
456}
457
mattgilbride85897672022-10-22 17:42:44 +0000458constexpr uint32_t encodeExplicitIdentity(bool hasExplicitIdentity, pid_t callingPid) {
459 uint32_t as_unsigned = static_cast<uint32_t>(callingPid);
460 if (hasExplicitIdentity) {
461 return as_unsigned | (1 << 30);
462 } else {
463 return as_unsigned & ~(1 << 30);
464 }
465}
466
467constexpr int64_t packCallingIdentity(bool hasExplicitIdentity, uid_t callingUid,
468 pid_t callingPid) {
469 // Calling PID is a 32-bit signed integer, but doesn't consume the entire 32 bit space.
470 // To future-proof this and because we have extra capacity, we decided to also support -1,
471 // since this constant is used to represent invalid UID in other places of the system.
472 // Thus, we pack hasExplicitIdentity into the 2nd bit from the left. This allows us to
473 // preserve the (left-most) bit for the sign while also encoding the value of
474 // hasExplicitIdentity.
475 // 32b | 1b | 1b | 30b
476 // token = [ calling uid | calling pid(sign) | has explicit identity | calling pid(rest) ]
477 uint64_t token = (static_cast<uint64_t>(callingUid) << 32) |
478 encodeExplicitIdentity(hasExplicitIdentity, callingPid);
479 return static_cast<int64_t>(token);
480}
481
482constexpr bool unpackHasExplicitIdentity(int64_t token) {
483 return static_cast<int32_t>(token) & (1 << 30);
484}
485
486constexpr uid_t unpackCallingUid(int64_t token) {
487 return static_cast<uid_t>(token >> 32);
488}
489
490constexpr pid_t unpackCallingPid(int64_t token) {
491 int32_t encodedPid = static_cast<int32_t>(token);
492 if (encodedPid & (1 << 31)) {
493 return encodedPid | (1 << 30);
494 } else {
495 return encodedPid & ~(1 << 30);
496 }
497}
498
499static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, 9999)) == true,
500 "pack true hasExplicit");
501
502static_assert(unpackCallingUid(packCallingIdentity(true, 1000, 9999)) == 1000, "pack true uid");
503
504static_assert(unpackCallingPid(packCallingIdentity(true, 1000, 9999)) == 9999, "pack true pid");
505
506static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, 9999)) == false,
507 "pack false hasExplicit");
508
509static_assert(unpackCallingUid(packCallingIdentity(false, 1000, 9999)) == 1000, "pack false uid");
510
511static_assert(unpackCallingPid(packCallingIdentity(false, 1000, 9999)) == 9999, "pack false pid");
512
513static_assert(unpackHasExplicitIdentity(packCallingIdentity(true, 1000, -1)) == true,
514 "pack true (negative) hasExplicit");
515
516static_assert(unpackCallingUid(packCallingIdentity(true, 1000, -1)) == 1000,
517 "pack true (negative) uid");
518
519static_assert(unpackCallingPid(packCallingIdentity(true, 1000, -1)) == -1,
520 "pack true (negative) pid");
521
522static_assert(unpackHasExplicitIdentity(packCallingIdentity(false, 1000, -1)) == false,
523 "pack false (negative) hasExplicit");
524
525static_assert(unpackCallingUid(packCallingIdentity(false, 1000, -1)) == 1000,
526 "pack false (negative) uid");
527
528static_assert(unpackCallingPid(packCallingIdentity(false, 1000, -1)) == -1,
529 "pack false (negative) pid");
530
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800531int64_t IPCThreadState::clearCallingIdentity()
532{
Steven Morelandf0212002018-12-26 13:59:23 -0800533 // ignore mCallingSid for legacy reasons
mattgilbride85897672022-10-22 17:42:44 +0000534 int64_t token = packCallingIdentity(mHasExplicitIdentity, mCallingUid, mCallingPid);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800535 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +0000536 mHasExplicitIdentity = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800537 return token;
538}
539
mattgilbride85897672022-10-22 17:42:44 +0000540bool IPCThreadState::hasExplicitIdentity() {
541 return mHasExplicitIdentity;
542}
543
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700544void IPCThreadState::setStrictModePolicy(int32_t policy)
545{
546 mStrictModePolicy = policy;
547}
548
Brad Fitzpatricka877cd82010-07-07 16:06:39 -0700549int32_t IPCThreadState::getStrictModePolicy() const
550{
Brad Fitzpatrick702ea9d2010-06-18 13:07:53 -0700551 return mStrictModePolicy;
552}
553
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000554int64_t IPCThreadState::setCallingWorkSourceUid(uid_t uid)
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100555{
Olivier Gaillard91a04802018-11-14 17:32:41 +0000556 int64_t token = setCallingWorkSourceUidWithoutPropagation(uid);
557 mPropagateWorkSource = true;
558 return token;
559}
560
561int64_t IPCThreadState::setCallingWorkSourceUidWithoutPropagation(uid_t uid)
562{
563 const int64_t propagatedBit = ((int64_t)mPropagateWorkSource) << kWorkSourcePropagatedBitIndex;
564 int64_t token = propagatedBit | mWorkSource;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100565 mWorkSource = uid;
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000566 return token;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100567}
568
Olivier Gaillard91a04802018-11-14 17:32:41 +0000569void IPCThreadState::clearPropagateWorkSource()
570{
571 mPropagateWorkSource = false;
572}
573
574bool IPCThreadState::shouldPropagateWorkSource() const
575{
576 return mPropagateWorkSource;
577}
578
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000579uid_t IPCThreadState::getCallingWorkSourceUid() const
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100580{
581 return mWorkSource;
582}
583
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000584int64_t IPCThreadState::clearCallingWorkSource()
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100585{
Olivier Gaillarda8e7bf22018-11-14 15:35:50 +0000586 return setCallingWorkSourceUid(kUnsetWorkSource);
587}
588
589void IPCThreadState::restoreCallingWorkSource(int64_t token)
590{
591 uid_t uid = (int)token;
Olivier Gaillard91a04802018-11-14 17:32:41 +0000592 setCallingWorkSourceUidWithoutPropagation(uid);
593 mPropagateWorkSource = ((token >> kWorkSourcePropagatedBitIndex) & 1) == 1;
Olivier Gaillard0e0f1de2018-08-16 14:04:09 +0100594}
595
Brad Fitzpatrick52736032010-08-30 16:01:16 -0700596void IPCThreadState::setLastTransactionBinderFlags(int32_t flags)
597{
598 mLastTransactionBinderFlags = flags;
599}
600
601int32_t IPCThreadState::getLastTransactionBinderFlags() const
602{
603 return mLastTransactionBinderFlags;
604}
605
Steven Moreland9514b202020-09-21 18:03:27 +0000606void IPCThreadState::setCallRestriction(ProcessState::CallRestriction restriction) {
607 mCallRestriction = restriction;
608}
609
610ProcessState::CallRestriction IPCThreadState::getCallRestriction() const {
611 return mCallRestriction;
612}
613
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800614void IPCThreadState::restoreCallingIdentity(int64_t token)
615{
mattgilbride85897672022-10-22 17:42:44 +0000616 mCallingUid = unpackCallingUid(token);
Steven Morelandf0212002018-12-26 13:59:23 -0800617 mCallingSid = nullptr; // not enough data to restore
mattgilbride85897672022-10-22 17:42:44 +0000618 mCallingPid = unpackCallingPid(token);
619 mHasExplicitIdentity = unpackHasExplicitIdentity(token);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800620}
621
622void IPCThreadState::clearCaller()
623{
Marco Nelissend43b1942009-07-17 07:59:17 -0700624 mCallingPid = getpid();
Steven Morelandf0212002018-12-26 13:59:23 -0800625 mCallingSid = nullptr; // expensive to lookup
Marco Nelissend43b1942009-07-17 07:59:17 -0700626 mCallingUid = getuid();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800627}
628
629void IPCThreadState::flushCommands()
630{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200631 if (mProcess->mDriverFD < 0)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800632 return;
633 talkWithDriver(false);
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700634 // The flush could have caused post-write refcount decrements to have
635 // been executed, which in turn could result in BC_RELEASE/BC_DECREFS
636 // being queued in mOut. So flush again, if we need to.
637 if (mOut.dataSize() > 0) {
638 talkWithDriver(false);
639 }
640 if (mOut.dataSize() > 0) {
641 ALOGW("mOut.dataSize() > 0 after flushCommands()");
642 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800643}
644
Martijn Coenen0442a862017-11-17 10:46:32 +0100645bool IPCThreadState::flushIfNeeded()
646{
Frankie Changf4c81372021-05-18 13:08:05 +0800647 if (mIsLooper || mServingStackPointer != nullptr || mIsFlushing) {
Martijn Coenen0442a862017-11-17 10:46:32 +0100648 return false;
649 }
Frankie Changf4c81372021-05-18 13:08:05 +0800650 mIsFlushing = true;
Martijn Coenen0442a862017-11-17 10:46:32 +0100651 // In case this thread is not a looper and is not currently serving a binder transaction,
652 // there's no guarantee that this thread will call back into the kernel driver any time
653 // soon. Therefore, flush pending commands such as BC_FREE_BUFFER, to prevent them from getting
654 // stuck in this thread's out buffer.
655 flushCommands();
Frankie Changf4c81372021-05-18 13:08:05 +0800656 mIsFlushing = false;
Martijn Coenen0442a862017-11-17 10:46:32 +0100657 return true;
658}
659
Wale Ogunwale376b8222015-04-13 16:16:10 -0700660void IPCThreadState::blockUntilThreadAvailable()
661{
Frederick Mayle263507f2024-05-30 14:54:27 -0700662 std::unique_lock lock_guard_(mProcess->mOnThreadAvailableLock);
663 mProcess->mOnThreadAvailableWaiting++;
664 mProcess->mOnThreadAvailableCondVar.wait(lock_guard_, [&] {
665 size_t max = mProcess->mMaxThreads;
666 size_t cur = mProcess->mExecutingThreadsCount;
667 if (cur < max) {
668 return true;
669 }
Frederick Mayle99490ac2024-06-18 12:21:18 -0700670 ALOGW("Waiting for thread to be free. mExecutingThreadsCount=%zu mMaxThreads=%zu\n", cur,
671 max);
Frederick Mayle263507f2024-05-30 14:54:27 -0700672 return false;
673 });
674 mProcess->mOnThreadAvailableWaiting--;
Wale Ogunwale376b8222015-04-13 16:16:10 -0700675}
676
Todd Poynor8d96cab2013-06-25 19:12:18 -0700677status_t IPCThreadState::getAndExecuteCommand()
678{
679 status_t result;
680 int32_t cmd;
681
682 result = talkWithDriver();
683 if (result >= NO_ERROR) {
684 size_t IN = mIn.dataAvail();
685 if (IN < sizeof(int32_t)) return result;
686 cmd = mIn.readInt32();
687 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000688 std::ostringstream logStream;
689 logStream << "Processing top-level Command: " << getReturnString(cmd) << "\n";
690 std::string message = logStream.str();
691 ALOGI("%s", message.c_str());
Todd Poynor8d96cab2013-06-25 19:12:18 -0700692 }
693
Frederick Mayle263507f2024-05-30 14:54:27 -0700694 size_t newThreadsCount = mProcess->mExecutingThreadsCount.fetch_add(1) + 1;
695 if (newThreadsCount >= mProcess->mMaxThreads) {
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700696 auto expected = ProcessState::never();
697 mProcess->mStarvationStartTime
698 .compare_exchange_strong(expected, std::chrono::steady_clock::now());
Colin Cross96e83222016-04-15 14:29:55 -0700699 }
Wale Ogunwale376b8222015-04-13 16:16:10 -0700700
Todd Poynor8d96cab2013-06-25 19:12:18 -0700701 result = executeCommand(cmd);
702
Frederick Mayle263507f2024-05-30 14:54:27 -0700703 size_t maxThreads = mProcess->mMaxThreads;
704 newThreadsCount = mProcess->mExecutingThreadsCount.fetch_sub(1) - 1;
705 if (newThreadsCount < maxThreads) {
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700706 auto starvationStartTime =
707 mProcess->mStarvationStartTime.exchange(ProcessState::never());
708 if (starvationStartTime != ProcessState::never()) {
709 auto starvationTime = std::chrono::steady_clock::now() - starvationStartTime;
710 if (starvationTime > 100ms) {
Frederick Mayle263507f2024-05-30 14:54:27 -0700711 ALOGE("binder thread pool (%zu threads) starved for %" PRId64 " ms", maxThreads,
Tomasz Wasilczyk1d46f582024-05-21 15:06:29 -0700712 to_ms(starvationTime));
Frederick Mayle263507f2024-05-30 14:54:27 -0700713 }
Colin Cross96e83222016-04-15 14:29:55 -0700714 }
Colin Cross96e83222016-04-15 14:29:55 -0700715 }
Steven Morelandc648a762021-01-16 02:39:45 +0000716
717 // Cond broadcast can be expensive, so don't send it every time a binder
718 // call is processed. b/168806193
Frederick Mayle263507f2024-05-30 14:54:27 -0700719 if (mProcess->mOnThreadAvailableWaiting > 0) {
720 std::lock_guard lock_guard_(mProcess->mOnThreadAvailableLock);
721 mProcess->mOnThreadAvailableCondVar.notify_all();
Steven Morelandc648a762021-01-16 02:39:45 +0000722 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700723 }
724
725 return result;
726}
727
728// When we've cleared the incoming command queue, process any pending derefs
729void IPCThreadState::processPendingDerefs()
730{
731 if (mIn.dataPosition() >= mIn.dataSize()) {
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200732 /*
733 * The decWeak()/decStrong() calls may cause a destructor to run,
734 * which in turn could have initiated an outgoing transaction,
735 * which in turn could cause us to add to the pending refs
736 * vectors; so instead of simply iterating, loop until they're empty.
737 *
738 * We do this in an outer loop, because calling decStrong()
739 * may result in something being added to mPendingWeakDerefs,
740 * which could be delayed until the next incoming command
741 * from the driver if we don't process it now.
742 */
743 while (mPendingWeakDerefs.size() > 0 || mPendingStrongDerefs.size() > 0) {
744 while (mPendingWeakDerefs.size() > 0) {
745 RefBase::weakref_type* refs = mPendingWeakDerefs[0];
746 mPendingWeakDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700747 refs->decWeak(mProcess.get());
748 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700749
Martijn Coenen0791fbf2017-08-08 15:36:16 +0200750 if (mPendingStrongDerefs.size() > 0) {
751 // We don't use while() here because we don't want to re-order
752 // strong and weak decs at all; if this decStrong() causes both a
753 // decWeak() and a decStrong() to be queued, we want to process
754 // the decWeak() first.
755 BBinder* obj = mPendingStrongDerefs[0];
756 mPendingStrongDerefs.removeAt(0);
Todd Poynor8d96cab2013-06-25 19:12:18 -0700757 obj->decStrong(mProcess.get());
758 }
Todd Poynor8d96cab2013-06-25 19:12:18 -0700759 }
760 }
761}
762
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700763void IPCThreadState::processPostWriteDerefs()
764{
765 for (size_t i = 0; i < mPostWriteWeakDerefs.size(); i++) {
766 RefBase::weakref_type* refs = mPostWriteWeakDerefs[i];
767 refs->decWeak(mProcess.get());
768 }
769 mPostWriteWeakDerefs.clear();
770
771 for (size_t i = 0; i < mPostWriteStrongDerefs.size(); i++) {
772 RefBase* obj = mPostWriteStrongDerefs[i];
773 obj->decStrong(mProcess.get());
774 }
775 mPostWriteStrongDerefs.clear();
776}
777
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800778void IPCThreadState::joinThreadPool(bool isMain)
779{
Frederick Mayle263507f2024-05-30 14:54:27 -0700780 LOG_THREADPOOL("**** THREAD %p (PID %d) IS JOINING THE THREAD POOL\n", (void*)pthread_self(),
781 getpid());
Steven Morelandc86333d2024-12-13 20:03:37 +0000782 mProcess->checkExpectingThreadPoolStart();
Elie Kheirallah47431c12022-04-21 23:46:17 +0000783 mProcess->mCurrentThreads++;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800784 mOut.writeInt32(isMain ? BC_ENTER_LOOPER : BC_REGISTER_LOOPER);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800785
Martijn Coenen0442a862017-11-17 10:46:32 +0100786 mIsLooper = true;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800787 status_t result;
788 do {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700789 processPendingDerefs();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800790 // now get the next command to be processed, waiting if necessary
Todd Poynor8d96cab2013-06-25 19:12:18 -0700791 result = getAndExecuteCommand();
Jason Parksdcd39582009-11-03 12:14:38 -0800792
Todd Poynor8d96cab2013-06-25 19:12:18 -0700793 if (result < NO_ERROR && result != TIMED_OUT && result != -ECONNREFUSED && result != -EBADF) {
Steven Moreland6adf33c2019-09-25 13:18:09 -0700794 LOG_ALWAYS_FATAL("getAndExecuteCommand(fd=%d) returned unexpected error %d, aborting",
Jeff Tinkeref073862013-06-11 11:30:21 -0700795 mProcess->mDriverFD, result);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800796 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800797
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800798 // Let this thread exit the thread pool if it is no longer
799 // needed and it is not the main process thread.
800 if(result == TIMED_OUT && !isMain) {
801 break;
802 }
803 } while (result != -ECONNREFUSED && result != -EBADF);
804
Wei Wangc7341432016-10-19 10:23:59 -0700805 LOG_THREADPOOL("**** THREAD %p (PID %d) IS LEAVING THE THREAD POOL err=%d\n",
806 (void*)pthread_self(), getpid(), result);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800807
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800808 mOut.writeInt32(BC_EXIT_LOOPER);
Martijn Coenen0442a862017-11-17 10:46:32 +0100809 mIsLooper = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800810 talkWithDriver(false);
Frederick Mayle263507f2024-05-30 14:54:27 -0700811 size_t oldCount = mProcess->mCurrentThreads.fetch_sub(1);
812 LOG_ALWAYS_FATAL_IF(oldCount == 0,
813 "Threadpool thread count underflowed. Thread cannot exist and exit in "
814 "empty threadpool\n"
Elie Kheirallah47431c12022-04-21 23:46:17 +0000815 "Misconfiguration. Increase threadpool max threads configuration\n");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800816}
817
Steven Morelandd8c85672020-07-24 21:30:41 +0000818status_t IPCThreadState::setupPolling(int* fd)
Todd Poynor8d96cab2013-06-25 19:12:18 -0700819{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -0200820 if (mProcess->mDriverFD < 0) {
Todd Poynor8d96cab2013-06-25 19:12:18 -0700821 return -EBADF;
822 }
823
824 mOut.writeInt32(BC_ENTER_LOOPER);
Steven Morelandf210b502021-01-15 23:40:32 +0000825 flushCommands();
Todd Poynor8d96cab2013-06-25 19:12:18 -0700826 *fd = mProcess->mDriverFD;
Elie Kheirallah47431c12022-04-21 23:46:17 +0000827 mProcess->mCurrentThreads++;
Todd Poynor8d96cab2013-06-25 19:12:18 -0700828 return 0;
829}
830
831status_t IPCThreadState::handlePolledCommands()
832{
833 status_t result;
834
835 do {
836 result = getAndExecuteCommand();
837 } while (mIn.dataPosition() < mIn.dataSize());
838
839 processPendingDerefs();
840 flushCommands();
841 return result;
842}
843
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800844void IPCThreadState::stopProcess(bool /*immediate*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800845{
Steve Blocka19954a2012-01-04 20:05:49 +0000846 //ALOGI("**** STOPPING PROCESS");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800847 flushCommands();
848 int fd = mProcess->mDriverFD;
849 mProcess->mDriverFD = -1;
850 close(fd);
851 //kill(getpid(), SIGKILL);
852}
853
854status_t IPCThreadState::transact(int32_t handle,
855 uint32_t code, const Parcel& data,
856 Parcel* reply, uint32_t flags)
857{
Steven Moreland5553ac42020-11-11 02:14:45 +0000858 LOG_ALWAYS_FATAL_IF(data.isForRpc(), "Parcel constructed for RPC, but being used with binder.");
859
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800860 status_t err;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800861
862 flags |= TF_ACCEPT_FDS;
863
864 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000865 std::ostringstream logStream;
866 logStream << "BC_TRANSACTION thr " << (void*)pthread_self() << " / hand " << handle
867 << " / code " << TypeCode(code) << ": \t" << data << "\n";
868 std::string message = logStream.str();
869 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800870 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800871
Ganesh Mahendran58e5daa2017-10-11 18:05:13 +0800872 LOG_ONEWAY(">>>> SEND from pid %d uid %d %s", getpid(), getuid(),
873 (flags & TF_ONE_WAY) == 0 ? "READ REPLY" : "ONE WAY");
Yi Kongfdd8da92018-06-07 17:52:27 -0700874 err = writeTransactionData(BC_TRANSACTION, flags, handle, code, data, nullptr);
Tim Murrayd429f4a2017-03-07 09:31:09 -0800875
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800876 if (err != NO_ERROR) {
877 if (reply) reply->setError(err);
878 return (mLastError = err);
879 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800880
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800881 if ((flags & TF_ONE_WAY) == 0) {
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700882 if (mCallRestriction != ProcessState::CallRestriction::NONE) [[unlikely]] {
Steven Moreland7732a092019-01-02 17:54:16 -0800883 if (mCallRestriction == ProcessState::CallRestriction::ERROR_IF_NOT_ONEWAY) {
Steven Moreland8cb34fc2019-05-13 11:44:55 -0700884 ALOGE("Process making non-oneway call (code: %u) but is restricted.", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800885 CallStack::logStack("non-oneway call", CallStack::getCurrent(10).get(),
886 ANDROID_LOG_ERROR);
887 } else /* FATAL_IF_NOT_ONEWAY */ {
Steven Morelandfcc77f12020-09-01 01:16:11 +0000888 LOG_ALWAYS_FATAL("Process may not make non-oneway calls (code: %u).", code);
Steven Moreland7732a092019-01-02 17:54:16 -0800889 }
890 }
891
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700892#if 0
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700893 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000894 ALOGI(">>>>>> CALLING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700895 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000896 ALOGI(">>>>>> CALLING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700897 }
Tomasz Wasilczykdf07f942023-11-02 15:07:45 -0700898#endif
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800899 if (reply) {
900 err = waitForResponse(reply);
901 } else {
902 Parcel fakeReply;
903 err = waitForResponse(&fakeReply);
904 }
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700905 #if 0
906 if (code == 4) { // relayout
Steve Blocka19954a2012-01-04 20:05:49 +0000907 ALOGI("<<<<<< RETURNING transaction 4");
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700908 } else {
Steve Blocka19954a2012-01-04 20:05:49 +0000909 ALOGI("<<<<<< RETURNING transaction %d", code);
Dianne Hackborn67f78c42010-09-24 11:16:23 -0700910 }
911 #endif
Tim Murrayd429f4a2017-03-07 09:31:09 -0800912
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800913 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +0000914 std::ostringstream logStream;
915 logStream << "BR_REPLY thr " << (void*)pthread_self() << " / hand " << handle << ": ";
916 if (reply)
917 logStream << "\t" << *reply << "\n";
918 else
919 logStream << "(none requested)"
920 << "\n";
921 std::string message = logStream.str();
922 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800923 }
924 } else {
Yi Kongfdd8da92018-06-07 17:52:27 -0700925 err = waitForResponse(nullptr, nullptr);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800926 }
Tim Murrayd429f4a2017-03-07 09:31:09 -0800927
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800928 return err;
929}
930
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700931void IPCThreadState::incStrongHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800932{
933 LOG_REMOTEREFS("IPCThreadState::incStrongHandle(%d)\n", handle);
934 mOut.writeInt32(BC_ACQUIRE);
935 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100936 if (!flushIfNeeded()) {
937 // Create a temp reference until the driver has handled this command.
938 proxy->incStrong(mProcess.get());
939 mPostWriteStrongDerefs.push(proxy);
940 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800941}
942
943void IPCThreadState::decStrongHandle(int32_t handle)
944{
945 LOG_REMOTEREFS("IPCThreadState::decStrongHandle(%d)\n", handle);
946 mOut.writeInt32(BC_RELEASE);
947 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100948 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800949}
950
Martijn Coenen7c170bb2018-05-04 17:28:55 -0700951void IPCThreadState::incWeakHandle(int32_t handle, BpBinder *proxy)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800952{
953 LOG_REMOTEREFS("IPCThreadState::incWeakHandle(%d)\n", handle);
954 mOut.writeInt32(BC_INCREFS);
955 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100956 if (!flushIfNeeded()) {
957 // Create a temp reference until the driver has handled this command.
958 proxy->getWeakRefs()->incWeak(mProcess.get());
959 mPostWriteWeakDerefs.push(proxy->getWeakRefs());
960 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800961}
962
963void IPCThreadState::decWeakHandle(int32_t handle)
964{
965 LOG_REMOTEREFS("IPCThreadState::decWeakHandle(%d)\n", handle);
966 mOut.writeInt32(BC_DECREFS);
967 mOut.writeInt32(handle);
Martijn Coenen0442a862017-11-17 10:46:32 +0100968 flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800969}
970
Steven Moreland1bf42912024-02-16 22:29:42 +0000971status_t IPCThreadState::attemptIncStrongHandle(int32_t handle) {
Arve HjønnevÄg11cfdcc2014-02-14 20:14:02 -0800972 (void)handle;
973 ALOGE("%s(%d): Not supported\n", __func__, handle);
974 return INVALID_OPERATION;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800975}
976
977void IPCThreadState::expungeHandle(int32_t handle, IBinder* binder)
978{
979#if LOG_REFCOUNTS
liangweikanga43ee152016-10-25 16:37:54 +0800980 ALOGV("IPCThreadState::expungeHandle(%ld)\n", handle);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800981#endif
Manoj Gupta9cec85b2017-09-19 16:34:29 -0700982 self()->mProcess->expungeHandle(handle, binder); // NOLINT
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800983}
984
985status_t IPCThreadState::requestDeathNotification(int32_t handle, BpBinder* proxy)
986{
987 mOut.writeInt32(BC_REQUEST_DEATH_NOTIFICATION);
988 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000989 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800990 return NO_ERROR;
991}
992
993status_t IPCThreadState::clearDeathNotification(int32_t handle, BpBinder* proxy)
994{
995 mOut.writeInt32(BC_CLEAR_DEATH_NOTIFICATION);
996 mOut.writeInt32((int32_t)handle);
Serban Constantinescuf683e012013-11-05 16:53:55 +0000997 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800998 return NO_ERROR;
999}
1000
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -07001001status_t IPCThreadState::addFrozenStateChangeCallback(int32_t handle, BpBinder* proxy) {
1002 static bool isSupported =
1003 ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::FREEZE_NOTIFICATION);
1004 if (!isSupported) {
1005 return INVALID_OPERATION;
1006 }
1007 proxy->getWeakRefs()->incWeak(proxy);
1008 mOut.writeInt32(BC_REQUEST_FREEZE_NOTIFICATION);
1009 mOut.writeInt32((int32_t)handle);
1010 mOut.writePointer((uintptr_t)proxy);
1011 flushCommands();
1012 return NO_ERROR;
1013}
1014
1015status_t IPCThreadState::removeFrozenStateChangeCallback(int32_t handle, BpBinder* proxy) {
1016 static bool isSupported =
1017 ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::FREEZE_NOTIFICATION);
1018 if (!isSupported) {
1019 return INVALID_OPERATION;
1020 }
1021 mOut.writeInt32(BC_CLEAR_FREEZE_NOTIFICATION);
1022 mOut.writeInt32((int32_t)handle);
1023 mOut.writePointer((uintptr_t)proxy);
1024 flushCommands();
1025 return NO_ERROR;
1026}
1027
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001028IPCThreadState::IPCThreadState()
Steven Moreland35626652021-05-15 01:32:04 +00001029 : mProcess(ProcessState::self()),
1030 mServingStackPointer(nullptr),
1031 mServingStackPointerGuard(nullptr),
1032 mWorkSource(kUnsetWorkSource),
1033 mPropagateWorkSource(false),
1034 mIsLooper(false),
Frankie Changf4c81372021-05-18 13:08:05 +08001035 mIsFlushing(false),
Steven Moreland35626652021-05-15 01:32:04 +00001036 mStrictModePolicy(0),
1037 mLastTransactionBinderFlags(0),
1038 mCallRestriction(mProcess->mCallRestriction) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001039 pthread_setspecific(gTLS, this);
Dianne Hackborn8c6cedc2009-12-07 17:59:37 -08001040 clearCaller();
mattgilbride85897672022-10-22 17:42:44 +00001041 mHasExplicitIdentity = false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001042 mIn.setDataCapacity(256);
1043 mOut.setDataCapacity(256);
1044}
1045
1046IPCThreadState::~IPCThreadState()
1047{
1048}
1049
Martijn Coenenea0090a2017-11-02 18:54:40 +00001050status_t IPCThreadState::sendReply(const Parcel& reply, uint32_t flags)
1051{
1052 status_t err;
1053 status_t statusBuffer;
1054 err = writeTransactionData(BC_REPLY, flags, -1, 0, reply, &statusBuffer);
1055 if (err < NO_ERROR) return err;
1056
Yi Kongfdd8da92018-06-07 17:52:27 -07001057 return waitForResponse(nullptr, nullptr);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001058}
1059
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001060status_t IPCThreadState::waitForResponse(Parcel *reply, status_t *acquireResult)
1061{
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001062 uint32_t cmd;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001063 int32_t err;
1064
1065 while (1) {
1066 if ((err=talkWithDriver()) < NO_ERROR) break;
1067 err = mIn.errorCheck();
1068 if (err < NO_ERROR) break;
1069 if (mIn.dataAvail() == 0) continue;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001070
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001071 cmd = (uint32_t)mIn.readInt32();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001072
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001073 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001074 std::ostringstream logStream;
1075 logStream << "Processing waitForResponse Command: " << getReturnString(cmd) << "\n";
1076 std::string message = logStream.str();
1077 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001078 }
1079
1080 switch (cmd) {
Hang Lub185ac02021-03-24 13:17:22 +08001081 case BR_ONEWAY_SPAM_SUSPECT:
1082 ALOGE("Process seems to be sending too many oneway calls.");
1083 CallStack::logStack("oneway spamming", CallStack::getCurrent().get(),
1084 ANDROID_LOG_ERROR);
1085 [[fallthrough]];
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001086 case BR_TRANSACTION_COMPLETE:
1087 if (!reply && !acquireResult) goto finish;
1088 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001089
Li Li0e3443d2022-12-07 21:51:19 -08001090 case BR_TRANSACTION_PENDING_FROZEN:
1091 ALOGW("Sending oneway calls to frozen process.");
1092 goto finish;
1093
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001094 case BR_DEAD_REPLY:
1095 err = DEAD_OBJECT;
1096 goto finish;
1097
1098 case BR_FAILED_REPLY:
1099 err = FAILED_TRANSACTION;
1100 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001101
Marco Ballesio7ee17572020-09-08 10:30:03 -07001102 case BR_FROZEN_REPLY:
Steven Moreland389154e2024-05-28 22:22:38 +00001103 ALOGW("Transaction failed because process frozen.");
Marco Ballesio7ee17572020-09-08 10:30:03 -07001104 err = FAILED_TRANSACTION;
1105 goto finish;
1106
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001107 case BR_ACQUIRE_RESULT:
1108 {
Steve Block67263472012-01-09 18:35:44 +00001109 ALOG_ASSERT(acquireResult != NULL, "Unexpected brACQUIRE_RESULT");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001110 const int32_t result = mIn.readInt32();
1111 if (!acquireResult) continue;
1112 *acquireResult = result ? NO_ERROR : INVALID_OPERATION;
1113 }
1114 goto finish;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001115
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001116 case BR_REPLY:
1117 {
1118 binder_transaction_data tr;
1119 err = mIn.read(&tr, sizeof(tr));
Steve Block67263472012-01-09 18:35:44 +00001120 ALOG_ASSERT(err == NO_ERROR, "Not enough command data for brREPLY");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001121 if (err != NO_ERROR) goto finish;
1122
1123 if (reply) {
1124 if ((tr.flags & TF_STATUS_CODE) == 0) {
1125 reply->ipcSetDataReference(
1126 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1127 tr.data_size,
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001128 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1129 tr.offsets_size/sizeof(binder_size_t),
Steven Moreland161fe122020-11-12 23:16:47 +00001130 freeBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001131 } else {
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001132 err = *reinterpret_cast<const status_t*>(tr.data.ptr.buffer);
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001133 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1134 tr.data_size,
1135 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1136 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001137 }
1138 } else {
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001139 freeBuffer(reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer), tr.data_size,
1140 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1141 tr.offsets_size / sizeof(binder_size_t));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001142 continue;
1143 }
1144 }
1145 goto finish;
1146
1147 default:
1148 err = executeCommand(cmd);
1149 if (err != NO_ERROR) goto finish;
1150 break;
1151 }
1152 }
1153
1154finish:
1155 if (err != NO_ERROR) {
1156 if (acquireResult) *acquireResult = err;
1157 if (reply) reply->setError(err);
1158 mLastError = err;
Carlos Llamasb235b122021-12-20 06:38:44 -08001159 logExtendedError();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001160 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001161
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001162 return err;
1163}
1164
1165status_t IPCThreadState::talkWithDriver(bool doReceive)
1166{
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001167 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001168 return -EBADF;
1169 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001170
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001171 binder_write_read bwr;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001172
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001173 // Is the read buffer empty?
1174 const bool needRead = mIn.dataPosition() >= mIn.dataSize();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001175
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001176 // We don't want to write anything if we are still reading
1177 // from data left in the input buffer and the caller
1178 // has requested to read the next data.
1179 const size_t outAvail = (!doReceive || needRead) ? mOut.dataSize() : 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001180
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001181 bwr.write_size = outAvail;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001182 bwr.write_buffer = (uintptr_t)mOut.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001183
1184 // This is what we'll read.
1185 if (doReceive && needRead) {
1186 bwr.read_size = mIn.dataCapacity();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001187 bwr.read_buffer = (uintptr_t)mIn.data();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001188 } else {
1189 bwr.read_size = 0;
Ben Chengd640f892011-12-01 17:11:32 -08001190 bwr.read_buffer = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001191 }
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001192
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001193 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001194 std::ostringstream logStream;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001195 if (outAvail != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001196 logStream << "Sending commands to driver: ";
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001197 const void* cmds = (const void*)bwr.write_buffer;
Pawan Wagh7063b522022-09-28 18:52:26 +00001198 const void* end = ((const uint8_t*)cmds) + bwr.write_size;
1199 logStream << "\t" << HexDump(cmds, bwr.write_size) << "\n";
1200 while (cmds < end) cmds = printCommand(logStream, cmds);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001201 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001202 logStream << "Size of receive buffer: " << bwr.read_size << ", needRead: " << needRead
1203 << ", doReceive: " << doReceive << "\n";
1204
1205 std::string message = logStream.str();
1206 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001207 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001208
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001209 // Return immediately if there is nothing to do.
1210 if ((bwr.write_size == 0) && (bwr.read_size == 0)) return NO_ERROR;
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001211
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001212 bwr.write_consumed = 0;
1213 bwr.read_consumed = 0;
1214 status_t err;
1215 do {
1216 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001217 std::ostringstream logStream;
1218 logStream << "About to read/write, write size = " << mOut.dataSize() << "\n";
1219 std::string message = logStream.str();
1220 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001221 }
Kevin Lindkviste8e12432022-11-23 13:23:42 +01001222#if defined(BINDER_WITH_KERNEL_IPC)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001223 if (ioctl(mProcess->mDriverFD, BINDER_WRITE_READ, &bwr) >= 0)
1224 err = NO_ERROR;
1225 else
1226 err = -errno;
1227#else
1228 err = INVALID_OPERATION;
1229#endif
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001230 if (mProcess->mDriverFD < 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001231 err = -EBADF;
1232 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001233 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001234 std::ostringstream logStream;
1235 logStream << "Finished read/write, write size = " << mOut.dataSize() << "\n";
1236 std::string message = logStream.str();
1237 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001238 }
1239 } while (err == -EINTR);
Andy McFaddenaefc9cd2011-08-31 07:43:40 -07001240
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001241 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001242 std::ostringstream logStream;
1243 logStream << "Our err: " << (void*)(intptr_t)err
1244 << ", write consumed: " << bwr.write_consumed << " (of " << mOut.dataSize()
1245 << "), read consumed: " << bwr.read_consumed << "\n";
1246 std::string message = logStream.str();
1247 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001248 }
1249
1250 if (err >= NO_ERROR) {
1251 if (bwr.write_consumed > 0) {
Devin Moore0272a5d2024-09-17 22:23:50 +00001252 if (bwr.write_consumed < mOut.dataSize()) {
1253 std::ostringstream logStream;
1254 printReturnCommandParcel(logStream, mIn);
Steven Morelandb077deb2020-04-16 16:22:52 -07001255 LOG_ALWAYS_FATAL("Driver did not consume write buffer. "
Devin Moore0272a5d2024-09-17 22:23:50 +00001256 "err: %s consumed: %zu of %zu.\n"
1257 "Return command: %s",
1258 statusToString(err).c_str(), (size_t)bwr.write_consumed,
1259 mOut.dataSize(), logStream.str().c_str());
1260 } else {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001261 mOut.setDataSize(0);
Martijn Coenen7c170bb2018-05-04 17:28:55 -07001262 processPostWriteDerefs();
1263 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001264 }
1265 if (bwr.read_consumed > 0) {
1266 mIn.setDataSize(bwr.read_consumed);
1267 mIn.setDataPosition(0);
1268 }
1269 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001270 std::ostringstream logStream;
Devin Moore0272a5d2024-09-17 22:23:50 +00001271 printReturnCommandParcel(logStream, mIn);
1272 ALOGI("%s", logStream.str().c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001273 }
1274 return NO_ERROR;
1275 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001276
Theodore Duboisbf144632023-01-09 15:36:49 -08001277 ALOGE_IF(mProcess->mDriverFD >= 0,
1278 "Driver returned error (%s). This is a bug in either libbinder or the driver. This "
1279 "thread's connection to %s will no longer work.",
1280 statusToString(err).c_str(), mProcess->mDriverName.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001281 return err;
1282}
1283
1284status_t IPCThreadState::writeTransactionData(int32_t cmd, uint32_t binderFlags,
1285 int32_t handle, uint32_t code, const Parcel& data, status_t* statusBuffer)
1286{
1287 binder_transaction_data tr;
1288
Arve HjønnevÄg07fd0f12014-02-18 21:10:29 -08001289 tr.target.ptr = 0; /* Don't pass uninitialized stack data to a remote process */
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001290 tr.target.handle = handle;
1291 tr.code = code;
1292 tr.flags = binderFlags;
Evgeniy Stepanovd5474322011-04-21 14:15:00 +04001293 tr.cookie = 0;
1294 tr.sender_pid = 0;
1295 tr.sender_euid = 0;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001296
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001297 const status_t err = data.errorCheck();
1298 if (err == NO_ERROR) {
1299 tr.data_size = data.ipcDataSize();
1300 tr.data.ptr.buffer = data.ipcData();
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001301 tr.offsets_size = data.ipcObjectsCount()*sizeof(binder_size_t);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001302 tr.data.ptr.offsets = data.ipcObjects();
1303 } else if (statusBuffer) {
1304 tr.flags |= TF_STATUS_CODE;
1305 *statusBuffer = err;
1306 tr.data_size = sizeof(status_t);
Arve HjønnevÄg87b30d02014-02-18 21:04:31 -08001307 tr.data.ptr.buffer = reinterpret_cast<uintptr_t>(statusBuffer);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001308 tr.offsets_size = 0;
Arve HjønnevÄg84e625a2014-01-28 20:12:59 -08001309 tr.data.ptr.offsets = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001310 } else {
1311 return (mLastError = err);
1312 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001313
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001314 mOut.writeInt32(cmd);
1315 mOut.write(&tr, sizeof(tr));
Tim Murrayd429f4a2017-03-07 09:31:09 -08001316
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001317 return NO_ERROR;
1318}
1319
1320sp<BBinder> the_context_object;
1321
Jiyong Park384328e2020-11-13 17:16:48 +09001322void IPCThreadState::setTheContextObject(const sp<BBinder>& obj)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001323{
1324 the_context_object = obj;
1325}
1326
1327status_t IPCThreadState::executeCommand(int32_t cmd)
1328{
1329 BBinder* obj;
1330 RefBase::weakref_type* refs;
1331 status_t result = NO_ERROR;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001332
Bernhard RosenkrƤnzer74debb02014-11-25 21:55:33 +01001333 switch ((uint32_t)cmd) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001334 case BR_ERROR:
1335 result = mIn.readInt32();
1336 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001337
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001338 case BR_OK:
1339 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001340
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001341 case BR_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001342 refs = (RefBase::weakref_type*)mIn.readPointer();
1343 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001344 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001345 "BR_ACQUIRE: object %p does not match cookie %p (expected %p)",
1346 refs, obj, refs->refBase());
1347 obj->incStrong(mProcess.get());
1348 IF_LOG_REMOTEREFS() {
1349 LOG_REMOTEREFS("BR_ACQUIRE from driver on %p", obj);
1350 obj->printRefs();
1351 }
1352 mOut.writeInt32(BC_ACQUIRE_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001353 mOut.writePointer((uintptr_t)refs);
1354 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001355 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001356
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001357 case BR_RELEASE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001358 refs = (RefBase::weakref_type*)mIn.readPointer();
1359 obj = (BBinder*)mIn.readPointer();
Steve Block67263472012-01-09 18:35:44 +00001360 ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001361 "BR_RELEASE: object %p does not match cookie %p (expected %p)",
1362 refs, obj, refs->refBase());
1363 IF_LOG_REMOTEREFS() {
1364 LOG_REMOTEREFS("BR_RELEASE from driver on %p", obj);
1365 obj->printRefs();
1366 }
1367 mPendingStrongDerefs.push(obj);
1368 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001369
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001370 case BR_INCREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001371 refs = (RefBase::weakref_type*)mIn.readPointer();
1372 obj = (BBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001373 refs->incWeak(mProcess.get());
1374 mOut.writeInt32(BC_INCREFS_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001375 mOut.writePointer((uintptr_t)refs);
1376 mOut.writePointer((uintptr_t)obj);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001377 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001378
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001379 case BR_DECREFS:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001380 refs = (RefBase::weakref_type*)mIn.readPointer();
Jiyong Park5970d0a2022-03-08 16:56:13 +09001381 // NOLINTNEXTLINE(clang-analyzer-deadcode.DeadStores)
1382 obj = (BBinder*)mIn.readPointer(); // consume
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001383 // NOTE: This assertion is not valid, because the object may no
1384 // longer exist (thus the (BBinder*)cast above resulting in a different
1385 // memory address).
Steve Block67263472012-01-09 18:35:44 +00001386 //ALOG_ASSERT(refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001387 // "BR_DECREFS: object %p does not match cookie %p (expected %p)",
1388 // refs, obj, refs->refBase());
1389 mPendingWeakDerefs.push(refs);
1390 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001391
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001392 case BR_ATTEMPT_ACQUIRE:
Serban Constantinescuf683e012013-11-05 16:53:55 +00001393 refs = (RefBase::weakref_type*)mIn.readPointer();
1394 obj = (BBinder*)mIn.readPointer();
Tim Murrayd429f4a2017-03-07 09:31:09 -08001395
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001396 {
1397 const bool success = refs->attemptIncStrong(mProcess.get());
Steve Block67263472012-01-09 18:35:44 +00001398 ALOG_ASSERT(success && refs->refBase() == obj,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001399 "BR_ATTEMPT_ACQUIRE: object %p does not match cookie %p (expected %p)",
1400 refs, obj, refs->refBase());
Tim Murrayd429f4a2017-03-07 09:31:09 -08001401
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001402 mOut.writeInt32(BC_ACQUIRE_RESULT);
1403 mOut.writeInt32((int32_t)success);
1404 }
1405 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001406
Steven Morelandf0212002018-12-26 13:59:23 -08001407 case BR_TRANSACTION_SEC_CTX:
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001408 case BR_TRANSACTION:
1409 {
Steven Morelandf0212002018-12-26 13:59:23 -08001410 binder_transaction_data_secctx tr_secctx;
1411 binder_transaction_data& tr = tr_secctx.transaction_data;
1412
1413 if (cmd == (int) BR_TRANSACTION_SEC_CTX) {
1414 result = mIn.read(&tr_secctx, sizeof(tr_secctx));
1415 } else {
1416 result = mIn.read(&tr, sizeof(tr));
1417 tr_secctx.secctx = 0;
1418 }
1419
Steve Block67263472012-01-09 18:35:44 +00001420 ALOG_ASSERT(result == NO_ERROR,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001421 "Not enough command data for brTRANSACTION");
1422 if (result != NO_ERROR) break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001423
Martijn Coenenea0090a2017-11-02 18:54:40 +00001424 Parcel buffer;
1425 buffer.ipcSetDataReference(
1426 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1427 tr.data_size,
1428 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
Steven Moreland161fe122020-11-12 23:16:47 +00001429 tr.offsets_size/sizeof(binder_size_t), freeBuffer);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001430
Steven Moreland39d887d2020-01-31 14:56:45 -08001431 const void* origServingStackPointer = mServingStackPointer;
Steven Moreland35626652021-05-15 01:32:04 +00001432 mServingStackPointer = __builtin_frame_address(0);
Steven Moreland39d887d2020-01-31 14:56:45 -08001433
Martijn Coenenea0090a2017-11-02 18:54:40 +00001434 const pid_t origPid = mCallingPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001435 const char* origSid = mCallingSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001436 const uid_t origUid = mCallingUid;
mattgilbride85897672022-10-22 17:42:44 +00001437 const bool origHasExplicitIdentity = mHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001438 const int32_t origStrictModePolicy = mStrictModePolicy;
1439 const int32_t origTransactionBinderFlags = mLastTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001440 const int32_t origWorkSource = mWorkSource;
1441 const bool origPropagateWorkSet = mPropagateWorkSource;
1442 // Calling work source will be set by Parcel#enforceInterface. Parcel#enforceInterface
1443 // is only guaranteed to be called for AIDL-generated stubs so we reset the work source
1444 // here to never propagate it.
1445 clearCallingWorkSource();
1446 clearPropagateWorkSource();
Martijn Coenenea0090a2017-11-02 18:54:40 +00001447
1448 mCallingPid = tr.sender_pid;
Steven Morelandf0212002018-12-26 13:59:23 -08001449 mCallingSid = reinterpret_cast<const char*>(tr_secctx.secctx);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001450 mCallingUid = tr.sender_euid;
mattgilbride85897672022-10-22 17:42:44 +00001451 mHasExplicitIdentity = false;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001452 mLastTransactionBinderFlags = tr.flags;
1453
Steven Morelandf0212002018-12-26 13:59:23 -08001454 // ALOGI(">>>> TRANSACT from pid %d sid %s uid %d\n", mCallingPid,
1455 // (mCallingSid ? mCallingSid : "<N/A>"), mCallingUid);
Martijn Coenenea0090a2017-11-02 18:54:40 +00001456
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001457 Parcel reply;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001458 status_t error;
1459 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001460 std::ostringstream logStream;
1461 logStream << "BR_TRANSACTION thr " << (void*)pthread_self() << " / obj "
1462 << tr.target.ptr << " / code " << TypeCode(tr.code) << ": \t" << buffer
1463 << "\n"
1464 << "Data addr = " << reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer)
1465 << ", offsets addr="
1466 << reinterpret_cast<const size_t*>(tr.data.ptr.offsets) << "\n";
1467 std::string message = logStream.str();
1468 ALOGI("%s", message.c_str());
Martijn Coenenea0090a2017-11-02 18:54:40 +00001469 }
1470 if (tr.target.ptr) {
1471 // We only have a weak reference on the target object, so we must first try to
1472 // safely acquire a strong reference before doing anything else with it.
1473 if (reinterpret_cast<RefBase::weakref_type*>(
1474 tr.target.ptr)->attemptIncStrong(this)) {
1475 error = reinterpret_cast<BBinder*>(tr.cookie)->transact(tr.code, buffer,
1476 &reply, tr.flags);
1477 reinterpret_cast<BBinder*>(tr.cookie)->decStrong(this);
Dianne Hackbornc1114612016-03-21 10:36:54 -07001478 } else {
Martijn Coenenea0090a2017-11-02 18:54:40 +00001479 error = UNKNOWN_TRANSACTION;
Dianne Hackbornc1114612016-03-21 10:36:54 -07001480 }
Brad Fitzpatrick52736032010-08-30 16:01:16 -07001481
Martijn Coenenea0090a2017-11-02 18:54:40 +00001482 } else {
1483 error = the_context_object->transact(tr.code, buffer, &reply, tr.flags);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001484 }
Dianne Hackborn5ee2c9d2014-09-30 11:30:03 -07001485
Steven Morelandf0212002018-12-26 13:59:23 -08001486 //ALOGI("<<<< TRANSACT from pid %d restore pid %d sid %s uid %d\n",
1487 // mCallingPid, origPid, (origSid ? origSid : "<N/A>"), origUid);
Tim Murrayd429f4a2017-03-07 09:31:09 -08001488
Martijn Coenenea0090a2017-11-02 18:54:40 +00001489 if ((tr.flags & TF_ONE_WAY) == 0) {
1490 LOG_ONEWAY("Sending reply to %d!", mCallingPid);
1491 if (error < NO_ERROR) reply.setError(error);
Steven Morelandf183fdd2020-10-27 00:12:12 +00001492
Steven Morelandce15b9f2022-09-08 17:42:45 +00001493 // b/238777741: clear buffer before we send the reply.
1494 // Otherwise, there is a race where the client may
1495 // receive the reply and send another transaction
1496 // here and the space used by this transaction won't
1497 // be freed for the client.
1498 buffer.setDataSize(0);
1499
Steven Morelandf183fdd2020-10-27 00:12:12 +00001500 constexpr uint32_t kForwardReplyFlags = TF_CLEAR_BUF;
1501 sendReply(reply, (tr.flags & kForwardReplyFlags));
Martijn Coenenea0090a2017-11-02 18:54:40 +00001502 } else {
Steven Moreland80844f72020-12-12 02:06:08 +00001503 if (error != OK) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001504 std::ostringstream logStream;
1505 logStream << "oneway function results for code " << tr.code << " on binder at "
1506 << reinterpret_cast<void*>(tr.target.ptr)
1507 << " will be dropped but finished with status "
1508 << statusToString(error);
Steven Moreland80844f72020-12-12 02:06:08 +00001509
1510 // ideally we could log this even when error == OK, but it
1511 // causes too much logspam because some manually-written
1512 // interfaces have clients that call methods which always
1513 // write results, sometimes as oneway methods.
1514 if (reply.dataSize() != 0) {
Pawan Wagh7063b522022-09-28 18:52:26 +00001515 logStream << " and reply parcel size " << reply.dataSize();
Steven Moreland80844f72020-12-12 02:06:08 +00001516 }
Pawan Wagh7063b522022-09-28 18:52:26 +00001517 std::string message = logStream.str();
1518 ALOGI("%s", message.c_str());
Steven Morelandce66b8a2020-02-10 14:43:14 -08001519 }
Martijn Coenenea0090a2017-11-02 18:54:40 +00001520 LOG_ONEWAY("NOT sending reply to %d!", mCallingPid);
1521 }
1522
Steven Moreland39d887d2020-01-31 14:56:45 -08001523 mServingStackPointer = origServingStackPointer;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001524 mCallingPid = origPid;
Steven Morelandf0212002018-12-26 13:59:23 -08001525 mCallingSid = origSid;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001526 mCallingUid = origUid;
mattgilbride85897672022-10-22 17:42:44 +00001527 mHasExplicitIdentity = origHasExplicitIdentity;
Martijn Coenenea0090a2017-11-02 18:54:40 +00001528 mStrictModePolicy = origStrictModePolicy;
1529 mLastTransactionBinderFlags = origTransactionBinderFlags;
Olivier Gaillard91a04802018-11-14 17:32:41 +00001530 mWorkSource = origWorkSource;
1531 mPropagateWorkSource = origPropagateWorkSet;
Christopher Tate440fd872010-03-18 17:55:03 -07001532
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001533 IF_LOG_TRANSACTIONS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001534 std::ostringstream logStream;
1535 logStream << "BC_REPLY thr " << (void*)pthread_self() << " / obj " << tr.target.ptr
1536 << ": \t" << reply << "\n";
1537 std::string message = logStream.str();
1538 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001539 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001540
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001541 }
1542 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001543
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001544 case BR_DEAD_BINDER:
1545 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001546 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001547 proxy->sendObituary();
1548 mOut.writeInt32(BC_DEAD_BINDER_DONE);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001549 mOut.writePointer((uintptr_t)proxy);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001550 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001551
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001552 case BR_CLEAR_DEATH_NOTIFICATION_DONE:
1553 {
Serban Constantinescuf683e012013-11-05 16:53:55 +00001554 BpBinder *proxy = (BpBinder*)mIn.readPointer();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001555 proxy->getWeakRefs()->decWeak(proxy);
1556 } break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001557
Yu-Ting Tsengd5fc4462024-04-30 15:07:13 -07001558 case BR_FROZEN_BINDER: {
1559 const struct binder_frozen_state_info* data =
1560 reinterpret_cast<const struct binder_frozen_state_info*>(
1561 mIn.readInplace(sizeof(struct binder_frozen_state_info)));
1562 if (data == nullptr) {
1563 result = UNKNOWN_ERROR;
1564 break;
1565 }
1566 BpBinder* proxy = (BpBinder*)data->cookie;
1567 bool isFrozen = mIn.readInt32() > 0;
1568 proxy->getPrivateAccessor().onFrozenStateChanged(data->is_frozen);
1569 mOut.writeInt32(BC_FREEZE_NOTIFICATION_DONE);
1570 mOut.writePointer(data->cookie);
1571 } break;
1572
1573 case BR_CLEAR_FREEZE_NOTIFICATION_DONE: {
1574 BpBinder* proxy = (BpBinder*)mIn.readPointer();
1575 proxy->getWeakRefs()->decWeak(proxy);
1576 } break;
1577
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001578 case BR_FINISHED:
1579 result = TIMED_OUT;
1580 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001581
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001582 case BR_NOOP:
1583 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001584
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001585 case BR_SPAWN_LOOPER:
1586 mProcess->spawnPooledThread(false);
1587 break;
Tim Murrayd429f4a2017-03-07 09:31:09 -08001588
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001589 default:
liangweikanga43ee152016-10-25 16:37:54 +08001590 ALOGE("*** BAD COMMAND %d received from Binder driver\n", cmd);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001591 result = UNKNOWN_ERROR;
1592 break;
1593 }
1594
1595 if (result != NO_ERROR) {
1596 mLastError = result;
1597 }
Tim Murrayd429f4a2017-03-07 09:31:09 -08001598
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001599 return result;
1600}
1601
Steven Moreland39d887d2020-01-31 14:56:45 -08001602const void* IPCThreadState::getServingStackPointer() const {
1603 return mServingStackPointer;
Jayant Chowdharydac6dc82018-10-01 22:52:44 +00001604}
1605
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001606void IPCThreadState::threadDestructor(void *st)
1607{
Todd Poynor8d96cab2013-06-25 19:12:18 -07001608 IPCThreadState* const self = static_cast<IPCThreadState*>(st);
1609 if (self) {
1610 self->flushCommands();
Kevin Lindkviste8e12432022-11-23 13:23:42 +01001611#if defined(BINDER_WITH_KERNEL_IPC)
Alexandre Baiãoc60c4fc2019-07-31 12:29:31 -02001612 if (self->mProcess->mDriverFD >= 0) {
Johannes Carlssondb1597a2011-02-17 14:06:53 +01001613 ioctl(self->mProcess->mDriverFD, BINDER_THREAD_EXIT, 0);
1614 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001615#endif
Todd Poynor8d96cab2013-06-25 19:12:18 -07001616 delete self;
1617 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001618}
1619
Li Li6f059292021-09-10 09:59:30 -07001620status_t IPCThreadState::getProcessFreezeInfo(pid_t pid, uint32_t *sync_received,
1621 uint32_t *async_received)
1622{
1623 int ret = 0;
Jiyong Park5970d0a2022-03-08 16:56:13 +09001624 binder_frozen_status_info info = {};
Li Li6f059292021-09-10 09:59:30 -07001625 info.pid = pid;
1626
Kevin Lindkviste8e12432022-11-23 13:23:42 +01001627#if defined(BINDER_WITH_KERNEL_IPC)
Li Li6f059292021-09-10 09:59:30 -07001628 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_FROZEN_INFO, &info) < 0)
1629 ret = -errno;
1630#endif
1631 *sync_received = info.sync_recv;
1632 *async_received = info.async_recv;
1633
1634 return ret;
1635}
Li Li6f059292021-09-10 09:59:30 -07001636
Marco Ballesio7ee17572020-09-08 10:30:03 -07001637status_t IPCThreadState::freeze(pid_t pid, bool enable, uint32_t timeout_ms) {
1638 struct binder_freeze_info info;
1639 int ret = 0;
1640
1641 info.pid = pid;
1642 info.enable = enable;
1643 info.timeout_ms = timeout_ms;
1644
1645
Kevin Lindkviste8e12432022-11-23 13:23:42 +01001646#if defined(BINDER_WITH_KERNEL_IPC)
Marco Ballesio7ee17572020-09-08 10:30:03 -07001647 if (ioctl(self()->mProcess->mDriverFD, BINDER_FREEZE, &info) < 0)
1648 ret = -errno;
1649#endif
1650
1651 //
1652 // ret==-EAGAIN indicates that transactions have not drained.
1653 // Call again to poll for completion.
1654 //
1655 return ret;
1656}
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001657
Carlos Llamasb235b122021-12-20 06:38:44 -08001658void IPCThreadState::logExtendedError() {
1659 struct binder_extended_error ee = {.command = BR_OK};
1660
1661 if (!ProcessState::isDriverFeatureEnabled(ProcessState::DriverFeature::EXTENDED_ERROR))
1662 return;
1663
Kevin Lindkviste8e12432022-11-23 13:23:42 +01001664#if defined(BINDER_WITH_KERNEL_IPC)
Carlos Llamasb235b122021-12-20 06:38:44 -08001665 if (ioctl(self()->mProcess->mDriverFD, BINDER_GET_EXTENDED_ERROR, &ee) < 0) {
1666 ALOGE("Failed to get extended error: %s", strerror(errno));
1667 return;
1668 }
1669#endif
1670
Steven Morelandb6fe2422024-05-25 00:25:02 +00001671 ALOGE_IF(ee.command != BR_OK, "Binder transaction failure. id: %d, BR_*: %d, error: %d (%s)",
1672 ee.id, ee.command, ee.param, strerror(-ee.param));
Carlos Llamasb235b122021-12-20 06:38:44 -08001673}
1674
Frederick Mayle53b6ffe2022-07-15 20:14:01 +00001675void IPCThreadState::freeBuffer(const uint8_t* data, size_t /*dataSize*/,
1676 const binder_size_t* /*objects*/, size_t /*objectsSize*/) {
Steve Blocka19954a2012-01-04 20:05:49 +00001677 //ALOGI("Freeing parcel %p", &parcel);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001678 IF_LOG_COMMANDS() {
Pawan Wagh7063b522022-09-28 18:52:26 +00001679 std::ostringstream logStream;
1680 logStream << "Writing BC_FREE_BUFFER for " << data << "\n";
1681 std::string message = logStream.str();
1682 ALOGI("%s", message.c_str());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001683 }
Steve Block67263472012-01-09 18:35:44 +00001684 ALOG_ASSERT(data != NULL, "Called with NULL data");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001685 IPCThreadState* state = self();
1686 state->mOut.writeInt32(BC_FREE_BUFFER);
Serban Constantinescuf683e012013-11-05 16:53:55 +00001687 state->mOut.writePointer((uintptr_t)data);
Martijn Coenen0442a862017-11-17 10:46:32 +01001688 state->flushIfNeeded();
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001689}
1690
Steven Moreland61ff8492019-09-26 16:05:45 -07001691} // namespace android