• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2019 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "ServiceManager.h"
18 
19 #include <android-base/logging.h>
20 #include <android-base/properties.h>
21 #include <binder/BpBinder.h>
22 #include <binder/IPCThreadState.h>
23 #include <binder/ProcessState.h>
24 #include <binder/Stability.h>
25 #include <cutils/android_filesystem_config.h>
26 #include <cutils/multiuser.h>
27 #include <thread>
28 
29 #ifndef VENDORSERVICEMANAGER
30 #include <vintf/VintfObject.h>
31 #include <vintf/constants.h>
32 #endif  // !VENDORSERVICEMANAGER
33 
34 using ::android::binder::Status;
35 using ::android::internal::Stability;
36 
37 namespace android {
38 
39 #ifndef VENDORSERVICEMANAGER
isVintfDeclared(const std::string & name)40 static bool isVintfDeclared(const std::string& name) {
41     size_t firstSlash = name.find('/');
42     size_t lastDot = name.rfind('.', firstSlash);
43     if (firstSlash == std::string::npos || lastDot == std::string::npos) {
44         LOG(ERROR) << "VINTF HALs require names in the format type/instance (e.g. "
45                    << "some.package.foo.IFoo/default) but got: " << name;
46         return false;
47     }
48     const std::string package = name.substr(0, lastDot);
49     const std::string iface = name.substr(lastDot+1, firstSlash-lastDot-1);
50     const std::string instance = name.substr(firstSlash+1);
51 
52     struct ManifestWithDescription {
53         std::shared_ptr<const vintf::HalManifest> manifest;
54         const char* description;
55     };
56     for (const ManifestWithDescription& mwd : {
57             ManifestWithDescription{ vintf::VintfObject::GetDeviceHalManifest(), "device" },
58             ManifestWithDescription{ vintf::VintfObject::GetFrameworkHalManifest(), "framework" },
59         }) {
60         if (mwd.manifest == nullptr) {
61           LOG(ERROR) << "NULL VINTF MANIFEST!: " << mwd.description;
62           // note, we explicitly do not retry here, so that we can detect VINTF
63           // or other bugs (b/151696835)
64           continue;
65         }
66         if (mwd.manifest->hasAidlInstance(package, iface, instance)) {
67             LOG(INFO) << "Found " << name << " in " << mwd.description << " VINTF manifest.";
68             return true;
69         }
70     }
71 
72     // Although it is tested, explicitly rebuilding qualified name, in case it
73     // becomes something unexpected.
74     LOG(ERROR) << "Could not find " << package << "." << iface << "/" << instance
75                << " in the VINTF manifest.";
76     return false;
77 }
78 
meetsDeclarationRequirements(const sp<IBinder> & binder,const std::string & name)79 static bool meetsDeclarationRequirements(const sp<IBinder>& binder, const std::string& name) {
80     if (!Stability::requiresVintfDeclaration(binder)) {
81         return true;
82     }
83 
84     return isVintfDeclared(name);
85 }
86 #endif  // !VENDORSERVICEMANAGER
87 
ServiceManager(std::unique_ptr<Access> && access)88 ServiceManager::ServiceManager(std::unique_ptr<Access>&& access) : mAccess(std::move(access)) {
89 // TODO(b/151696835): reenable performance hack when we solve bug, since with
90 //     this hack and other fixes, it is unlikely we will see even an ephemeral
91 //     failure when the manifest parse fails. The goal is that the manifest will
92 //     be read incorrectly and cause the process trying to register a HAL to
93 //     fail. If this is in fact an early boot kernel contention issue, then we
94 //     will get no failure, and by its absence, be signalled to invest more
95 //     effort in re-adding this performance hack.
96 // #ifndef VENDORSERVICEMANAGER
97 //     // can process these at any times, don't want to delay first VINTF client
98 //     std::thread([] {
99 //         vintf::VintfObject::GetDeviceHalManifest();
100 //         vintf::VintfObject::GetFrameworkHalManifest();
101 //     }).detach();
102 // #endif  // !VENDORSERVICEMANAGER
103 }
~ServiceManager()104 ServiceManager::~ServiceManager() {
105     // this should only happen in tests
106 
107     for (const auto& [name, callbacks] : mNameToRegistrationCallback) {
108         CHECK(!callbacks.empty()) << name;
109         for (const auto& callback : callbacks) {
110             CHECK(callback != nullptr) << name;
111         }
112     }
113 
114     for (const auto& [name, service] : mNameToService) {
115         CHECK(service.binder != nullptr) << name;
116     }
117 }
118 
getService(const std::string & name,sp<IBinder> * outBinder)119 Status ServiceManager::getService(const std::string& name, sp<IBinder>* outBinder) {
120     *outBinder = tryGetService(name, true);
121     // returns ok regardless of result for legacy reasons
122     return Status::ok();
123 }
124 
checkService(const std::string & name,sp<IBinder> * outBinder)125 Status ServiceManager::checkService(const std::string& name, sp<IBinder>* outBinder) {
126     *outBinder = tryGetService(name, false);
127     // returns ok regardless of result for legacy reasons
128     return Status::ok();
129 }
130 
tryGetService(const std::string & name,bool startIfNotFound)131 sp<IBinder> ServiceManager::tryGetService(const std::string& name, bool startIfNotFound) {
132     auto ctx = mAccess->getCallingContext();
133 
134     sp<IBinder> out;
135     Service* service = nullptr;
136     if (auto it = mNameToService.find(name); it != mNameToService.end()) {
137         service = &(it->second);
138 
139         if (!service->allowIsolated) {
140             uid_t appid = multiuser_get_app_id(ctx.uid);
141             bool isIsolated = appid >= AID_ISOLATED_START && appid <= AID_ISOLATED_END;
142 
143             if (isIsolated) {
144                 return nullptr;
145             }
146         }
147         out = service->binder;
148     }
149 
150     if (!mAccess->canFind(ctx, name)) {
151         return nullptr;
152     }
153 
154     if (!out && startIfNotFound) {
155         tryStartService(name);
156     }
157 
158     if (out) {
159         // Setting this guarantee each time we hand out a binder ensures that the client-checking
160         // loop knows about the event even if the client immediately drops the service
161         service->guaranteeClient = true;
162     }
163 
164     return out;
165 }
166 
isValidServiceName(const std::string & name)167 bool isValidServiceName(const std::string& name) {
168     if (name.size() == 0) return false;
169     if (name.size() > 127) return false;
170 
171     for (char c : name) {
172         if (c == '_' || c == '-' || c == '.' || c == '/') continue;
173         if (c >= 'a' && c <= 'z') continue;
174         if (c >= 'A' && c <= 'Z') continue;
175         if (c >= '0' && c <= '9') continue;
176         return false;
177     }
178 
179     return true;
180 }
181 
addService(const std::string & name,const sp<IBinder> & binder,bool allowIsolated,int32_t dumpPriority)182 Status ServiceManager::addService(const std::string& name, const sp<IBinder>& binder, bool allowIsolated, int32_t dumpPriority) {
183     auto ctx = mAccess->getCallingContext();
184 
185     // apps cannot add services
186     if (multiuser_get_app_id(ctx.uid) >= AID_APP) {
187         return Status::fromExceptionCode(Status::EX_SECURITY);
188     }
189 
190     if (!mAccess->canAdd(ctx, name)) {
191         return Status::fromExceptionCode(Status::EX_SECURITY);
192     }
193 
194     if (binder == nullptr) {
195         return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
196     }
197 
198     if (!isValidServiceName(name)) {
199         LOG(ERROR) << "Invalid service name: " << name;
200         return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
201     }
202 
203 #ifndef VENDORSERVICEMANAGER
204     if (!meetsDeclarationRequirements(binder, name)) {
205         // already logged
206         return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
207     }
208 #endif  // !VENDORSERVICEMANAGER
209 
210     // implicitly unlinked when the binder is removed
211     if (binder->remoteBinder() != nullptr && binder->linkToDeath(this) != OK) {
212         LOG(ERROR) << "Could not linkToDeath when adding " << name;
213         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
214     }
215 
216     // Overwrite the old service if it exists
217     mNameToService[name] = Service {
218         .binder = binder,
219         .allowIsolated = allowIsolated,
220         .dumpPriority = dumpPriority,
221         .debugPid = ctx.debugPid,
222     };
223 
224     auto it = mNameToRegistrationCallback.find(name);
225     if (it != mNameToRegistrationCallback.end()) {
226         for (const sp<IServiceCallback>& cb : it->second) {
227             mNameToService[name].guaranteeClient = true;
228             // permission checked in registerForNotifications
229             cb->onRegistration(name, binder);
230         }
231     }
232 
233     return Status::ok();
234 }
235 
listServices(int32_t dumpPriority,std::vector<std::string> * outList)236 Status ServiceManager::listServices(int32_t dumpPriority, std::vector<std::string>* outList) {
237     if (!mAccess->canList(mAccess->getCallingContext())) {
238         return Status::fromExceptionCode(Status::EX_SECURITY);
239     }
240 
241     size_t toReserve = 0;
242     for (auto const& [name, service] : mNameToService) {
243         (void) name;
244 
245         if (service.dumpPriority & dumpPriority) ++toReserve;
246     }
247 
248     CHECK(outList->empty());
249 
250     outList->reserve(toReserve);
251     for (auto const& [name, service] : mNameToService) {
252         (void) service;
253 
254         if (service.dumpPriority & dumpPriority) {
255             outList->push_back(name);
256         }
257     }
258 
259     return Status::ok();
260 }
261 
registerForNotifications(const std::string & name,const sp<IServiceCallback> & callback)262 Status ServiceManager::registerForNotifications(
263         const std::string& name, const sp<IServiceCallback>& callback) {
264     auto ctx = mAccess->getCallingContext();
265 
266     if (!mAccess->canFind(ctx, name)) {
267         return Status::fromExceptionCode(Status::EX_SECURITY);
268     }
269 
270     if (!isValidServiceName(name)) {
271         LOG(ERROR) << "Invalid service name: " << name;
272         return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
273     }
274 
275     if (callback == nullptr) {
276         return Status::fromExceptionCode(Status::EX_NULL_POINTER);
277     }
278 
279     if (OK != IInterface::asBinder(callback)->linkToDeath(this)) {
280         LOG(ERROR) << "Could not linkToDeath when adding " << name;
281         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
282     }
283 
284     mNameToRegistrationCallback[name].push_back(callback);
285 
286     if (auto it = mNameToService.find(name); it != mNameToService.end()) {
287         const sp<IBinder>& binder = it->second.binder;
288 
289         // never null if an entry exists
290         CHECK(binder != nullptr) << name;
291         callback->onRegistration(name, binder);
292     }
293 
294     return Status::ok();
295 }
unregisterForNotifications(const std::string & name,const sp<IServiceCallback> & callback)296 Status ServiceManager::unregisterForNotifications(
297         const std::string& name, const sp<IServiceCallback>& callback) {
298     auto ctx = mAccess->getCallingContext();
299 
300     if (!mAccess->canFind(ctx, name)) {
301         return Status::fromExceptionCode(Status::EX_SECURITY);
302     }
303 
304     bool found = false;
305 
306     auto it = mNameToRegistrationCallback.find(name);
307     if (it != mNameToRegistrationCallback.end()) {
308         removeRegistrationCallback(IInterface::asBinder(callback), &it, &found);
309     }
310 
311     if (!found) {
312         LOG(ERROR) << "Trying to unregister callback, but none exists " << name;
313         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
314     }
315 
316     return Status::ok();
317 }
318 
isDeclared(const std::string & name,bool * outReturn)319 Status ServiceManager::isDeclared(const std::string& name, bool* outReturn) {
320     auto ctx = mAccess->getCallingContext();
321 
322     if (!mAccess->canFind(ctx, name)) {
323         return Status::fromExceptionCode(Status::EX_SECURITY);
324     }
325 
326     *outReturn = false;
327 
328 #ifndef VENDORSERVICEMANAGER
329     *outReturn = isVintfDeclared(name);
330 #endif
331     return Status::ok();
332 }
333 
removeRegistrationCallback(const wp<IBinder> & who,ServiceCallbackMap::iterator * it,bool * found)334 void ServiceManager::removeRegistrationCallback(const wp<IBinder>& who,
335                                     ServiceCallbackMap::iterator* it,
336                                     bool* found) {
337     std::vector<sp<IServiceCallback>>& listeners = (*it)->second;
338 
339     for (auto lit = listeners.begin(); lit != listeners.end();) {
340         if (IInterface::asBinder(*lit) == who) {
341             if(found) *found = true;
342             lit = listeners.erase(lit);
343         } else {
344             ++lit;
345         }
346     }
347 
348     if (listeners.empty()) {
349         *it = mNameToRegistrationCallback.erase(*it);
350     } else {
351         (*it)++;
352     }
353 }
354 
binderDied(const wp<IBinder> & who)355 void ServiceManager::binderDied(const wp<IBinder>& who) {
356     for (auto it = mNameToService.begin(); it != mNameToService.end();) {
357         if (who == it->second.binder) {
358             it = mNameToService.erase(it);
359         } else {
360             ++it;
361         }
362     }
363 
364     for (auto it = mNameToRegistrationCallback.begin(); it != mNameToRegistrationCallback.end();) {
365         removeRegistrationCallback(who, &it, nullptr /*found*/);
366     }
367 
368     for (auto it = mNameToClientCallback.begin(); it != mNameToClientCallback.end();) {
369         removeClientCallback(who, &it);
370     }
371 }
372 
tryStartService(const std::string & name)373 void ServiceManager::tryStartService(const std::string& name) {
374     ALOGI("Since '%s' could not be found, trying to start it as a lazy AIDL service",
375           name.c_str());
376 
377     std::thread([=] {
378         (void)base::SetProperty("ctl.interface_start", "aidl/" + name);
379     }).detach();
380 }
381 
registerClientCallback(const std::string & name,const sp<IBinder> & service,const sp<IClientCallback> & cb)382 Status ServiceManager::registerClientCallback(const std::string& name, const sp<IBinder>& service,
383                                               const sp<IClientCallback>& cb) {
384     if (cb == nullptr) {
385         return Status::fromExceptionCode(Status::EX_NULL_POINTER);
386     }
387 
388     auto ctx = mAccess->getCallingContext();
389     if (!mAccess->canAdd(ctx, name)) {
390         return Status::fromExceptionCode(Status::EX_SECURITY);
391     }
392 
393     auto serviceIt = mNameToService.find(name);
394     if (serviceIt == mNameToService.end()) {
395         LOG(ERROR) << "Could not add callback for nonexistent service: " << name;
396         return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
397     }
398 
399     if (serviceIt->second.debugPid != IPCThreadState::self()->getCallingPid()) {
400         LOG(WARNING) << "Only a server can register for client callbacks (for " << name << ")";
401         return Status::fromExceptionCode(Status::EX_UNSUPPORTED_OPERATION);
402     }
403 
404     if (serviceIt->second.binder != service) {
405         LOG(WARNING) << "Tried to register client callback for " << name
406             << " but a different service is registered under this name.";
407         return Status::fromExceptionCode(Status::EX_ILLEGAL_ARGUMENT);
408     }
409 
410     if (OK != IInterface::asBinder(cb)->linkToDeath(this)) {
411         LOG(ERROR) << "Could not linkToDeath when adding client callback for " << name;
412         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
413     }
414 
415     mNameToClientCallback[name].push_back(cb);
416 
417     return Status::ok();
418 }
419 
removeClientCallback(const wp<IBinder> & who,ClientCallbackMap::iterator * it)420 void ServiceManager::removeClientCallback(const wp<IBinder>& who,
421                                           ClientCallbackMap::iterator* it) {
422     std::vector<sp<IClientCallback>>& listeners = (*it)->second;
423 
424     for (auto lit = listeners.begin(); lit != listeners.end();) {
425         if (IInterface::asBinder(*lit) == who) {
426             lit = listeners.erase(lit);
427         } else {
428             ++lit;
429         }
430     }
431 
432     if (listeners.empty()) {
433         *it = mNameToClientCallback.erase(*it);
434     } else {
435         (*it)++;
436     }
437 }
438 
getNodeStrongRefCount()439 ssize_t ServiceManager::Service::getNodeStrongRefCount() {
440     sp<BpBinder> bpBinder = binder->remoteBinder();
441     if (bpBinder == nullptr) return -1;
442 
443     return ProcessState::self()->getStrongRefCountForNodeByHandle(bpBinder->handle());
444 }
445 
handleClientCallbacks()446 void ServiceManager::handleClientCallbacks() {
447     for (const auto& [name, service] : mNameToService) {
448         handleServiceClientCallback(name, true);
449     }
450 }
451 
handleServiceClientCallback(const std::string & serviceName,bool isCalledOnInterval)452 ssize_t ServiceManager::handleServiceClientCallback(const std::string& serviceName,
453                                                     bool isCalledOnInterval) {
454     auto serviceIt = mNameToService.find(serviceName);
455     if (serviceIt == mNameToService.end() || mNameToClientCallback.count(serviceName) < 1) {
456         return -1;
457     }
458 
459     Service& service = serviceIt->second;
460     ssize_t count = service.getNodeStrongRefCount();
461 
462     // binder driver doesn't support this feature
463     if (count == -1) return count;
464 
465     bool hasClients = count > 1; // this process holds a strong count
466 
467     if (service.guaranteeClient) {
468         // we have no record of this client
469         if (!service.hasClients && !hasClients) {
470             sendClientCallbackNotifications(serviceName, true);
471         }
472 
473         // guarantee is temporary
474         service.guaranteeClient = false;
475     }
476 
477     // only send notifications if this was called via the interval checking workflow
478     if (isCalledOnInterval) {
479         if (hasClients && !service.hasClients) {
480             // client was retrieved in some other way
481             sendClientCallbackNotifications(serviceName, true);
482         }
483 
484         // there are no more clients, but the callback has not been called yet
485         if (!hasClients && service.hasClients) {
486             sendClientCallbackNotifications(serviceName, false);
487         }
488     }
489 
490     return count;
491 }
492 
sendClientCallbackNotifications(const std::string & serviceName,bool hasClients)493 void ServiceManager::sendClientCallbackNotifications(const std::string& serviceName, bool hasClients) {
494     auto serviceIt = mNameToService.find(serviceName);
495     if (serviceIt == mNameToService.end()) {
496         LOG(WARNING) << "sendClientCallbackNotifications could not find service " << serviceName;
497         return;
498     }
499     Service& service = serviceIt->second;
500 
501     CHECK(hasClients != service.hasClients) << "Record shows: " << service.hasClients
502         << " so we can't tell clients again that we have client: " << hasClients;
503 
504     LOG(INFO) << "Notifying " << serviceName << " they have clients: " << hasClients;
505 
506     auto ccIt = mNameToClientCallback.find(serviceName);
507     CHECK(ccIt != mNameToClientCallback.end())
508         << "sendClientCallbackNotifications could not find callbacks for service ";
509 
510     for (const auto& callback : ccIt->second) {
511         callback->onClients(service.binder, hasClients);
512     }
513 
514     service.hasClients = hasClients;
515 }
516 
tryUnregisterService(const std::string & name,const sp<IBinder> & binder)517 Status ServiceManager::tryUnregisterService(const std::string& name, const sp<IBinder>& binder) {
518     if (binder == nullptr) {
519         return Status::fromExceptionCode(Status::EX_NULL_POINTER);
520     }
521 
522     auto ctx = mAccess->getCallingContext();
523     if (!mAccess->canAdd(ctx, name)) {
524         return Status::fromExceptionCode(Status::EX_SECURITY);
525     }
526 
527     auto serviceIt = mNameToService.find(name);
528     if (serviceIt == mNameToService.end()) {
529         LOG(WARNING) << "Tried to unregister " << name
530             << ", but that service wasn't registered to begin with.";
531         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
532     }
533 
534     if (serviceIt->second.debugPid != IPCThreadState::self()->getCallingPid()) {
535         LOG(WARNING) << "Only a server can unregister itself (for " << name << ")";
536         return Status::fromExceptionCode(Status::EX_UNSUPPORTED_OPERATION);
537     }
538 
539     sp<IBinder> storedBinder = serviceIt->second.binder;
540 
541     if (binder != storedBinder) {
542         LOG(WARNING) << "Tried to unregister " << name
543             << ", but a different service is registered under this name.";
544         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
545     }
546 
547     if (serviceIt->second.guaranteeClient) {
548         LOG(INFO) << "Tried to unregister " << name << ", but there is about to be a client.";
549         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
550     }
551 
552     int clients = handleServiceClientCallback(name, false);
553 
554     // clients < 0: feature not implemented or other error. Assume clients.
555     // Otherwise:
556     // - kernel driver will hold onto one refcount (during this transaction)
557     // - servicemanager has a refcount (guaranteed by this transaction)
558     // So, if clients > 2, then at least one other service on the system must hold a refcount.
559     if (clients < 0 || clients > 2) {
560         // client callbacks are either disabled or there are other clients
561         LOG(INFO) << "Tried to unregister " << name << ", but there are clients: " << clients;
562         // Set this flag to ensure the clients are acknowledged in the next callback
563         serviceIt->second.guaranteeClient = true;
564         return Status::fromExceptionCode(Status::EX_ILLEGAL_STATE);
565     }
566 
567     mNameToService.erase(name);
568 
569     return Status::ok();
570 }
571 
572 }  // namespace android
573