1 /*
2 * Copyright (C) 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #define LOG_TAG "hwservicemanager"
18
19 #include "ServiceManager.h"
20 #include "Vintf.h"
21
22 #include <android-base/logging.h>
23 #include <android-base/properties.h>
24 #include <hwbinder/IPCThreadState.h>
25 #include <hidl/HidlSupport.h>
26 #include <hidl/HidlTransportSupport.h>
27 #include <regex>
28 #include <sstream>
29 #include <thread>
30
31 using android::hardware::IPCThreadState;
32 using ::android::hardware::interfacesEqual;
33
34 namespace android {
35 namespace hidl {
36 namespace manager {
37 namespace implementation {
38
getBinderCallingContext()39 AccessControl::CallingContext getBinderCallingContext() {
40 const auto& self = IPCThreadState::self();
41
42 pid_t pid = self->getCallingPid();
43 const char* sid = self->getCallingSid();
44
45 if (sid == nullptr) {
46 if (pid != getpid()) {
47 android_errorWriteLog(0x534e4554, "121035042");
48 }
49
50 return AccessControl::getCallingContext(pid);
51 } else {
52 return { true, sid, pid };
53 }
54 }
55
56 static constexpr uint64_t kServiceDiedCookie = 0;
57 static constexpr uint64_t kPackageListenerDiedCookie = 1;
58 static constexpr uint64_t kServiceListenerDiedCookie = 2;
59 static constexpr uint64_t kClientCallbackDiedCookie = 3;
60
countExistingService() const61 size_t ServiceManager::countExistingService() const {
62 size_t total = 0;
63 forEachExistingService([&] (const HidlService *) {
64 ++total;
65 return true; // continue
66 });
67 return total;
68 }
69
forEachExistingService(std::function<bool (const HidlService *)> f) const70 void ServiceManager::forEachExistingService(std::function<bool(const HidlService *)> f) const {
71 forEachServiceEntry([&] (const HidlService *service) {
72 if (service->getService() == nullptr) {
73 return true; // continue
74 }
75 return f(service);
76 });
77 }
78
forEachExistingService(std::function<bool (HidlService *)> f)79 void ServiceManager::forEachExistingService(std::function<bool(HidlService *)> f) {
80 forEachServiceEntry([&] (HidlService *service) {
81 if (service->getService() == nullptr) {
82 return true; // continue
83 }
84 return f(service);
85 });
86 }
87
forEachServiceEntry(std::function<bool (const HidlService *)> f) const88 void ServiceManager::forEachServiceEntry(std::function<bool(const HidlService *)> f) const {
89 for (const auto& interfaceMapping : mServiceMap) {
90 const auto& instanceMap = interfaceMapping.second.getInstanceMap();
91
92 for (const auto& instanceMapping : instanceMap) {
93 if (!f(instanceMapping.second.get())) {
94 return;
95 }
96 }
97 }
98 }
99
forEachServiceEntry(std::function<bool (HidlService *)> f)100 void ServiceManager::forEachServiceEntry(std::function<bool(HidlService *)> f) {
101 for (auto& interfaceMapping : mServiceMap) {
102 auto& instanceMap = interfaceMapping.second.getInstanceMap();
103
104 for (auto& instanceMapping : instanceMap) {
105 if (!f(instanceMapping.second.get())) {
106 return;
107 }
108 }
109 }
110 }
111
lookup(const std::string & fqName,const std::string & name)112 HidlService* ServiceManager::lookup(const std::string& fqName, const std::string& name) {
113 auto ifaceIt = mServiceMap.find(fqName);
114 if (ifaceIt == mServiceMap.end()) {
115 return nullptr;
116 }
117
118 PackageInterfaceMap &ifaceMap = ifaceIt->second;
119
120 HidlService *hidlService = ifaceMap.lookup(name);
121
122 return hidlService;
123 }
124
serviceDied(uint64_t cookie,const wp<IBase> & who)125 void ServiceManager::serviceDied(uint64_t cookie, const wp<IBase>& who) {
126 bool serviceRemoved = false;
127 switch (cookie) {
128 case kServiceDiedCookie:
129 serviceRemoved = removeService(who, nullptr /* restrictToInstanceName */);
130 break;
131 case kPackageListenerDiedCookie:
132 serviceRemoved = removePackageListener(who);
133 break;
134 case kServiceListenerDiedCookie:
135 serviceRemoved = removeServiceListener(who);
136 break;
137 case kClientCallbackDiedCookie: {
138 sp<IBase> base = who.promote();
139 IClientCallback* callback = static_cast<IClientCallback*>(base.get());
140 serviceRemoved = unregisterClientCallback(nullptr /*service*/,
141 sp<IClientCallback>(callback));
142 } break;
143 }
144
145 if (!serviceRemoved) {
146 LOG(ERROR) << "Received death notification but interface instance not removed. Cookie: "
147 << cookie << " Service pointer: " << who.promote().get();
148 }
149 }
150
getInstanceMap()151 ServiceManager::InstanceMap &ServiceManager::PackageInterfaceMap::getInstanceMap() {
152 return mInstanceMap;
153 }
154
getInstanceMap() const155 const ServiceManager::InstanceMap &ServiceManager::PackageInterfaceMap::getInstanceMap() const {
156 return mInstanceMap;
157 }
158
lookup(const std::string & name) const159 const HidlService *ServiceManager::PackageInterfaceMap::lookup(
160 const std::string &name) const {
161 auto it = mInstanceMap.find(name);
162
163 if (it == mInstanceMap.end()) {
164 return nullptr;
165 }
166
167 return it->second.get();
168 }
169
lookup(const std::string & name)170 HidlService *ServiceManager::PackageInterfaceMap::lookup(
171 const std::string &name) {
172
173 return const_cast<HidlService*>(
174 const_cast<const PackageInterfaceMap*>(this)->lookup(name));
175 }
176
insertService(std::unique_ptr<HidlService> && service)177 void ServiceManager::PackageInterfaceMap::insertService(
178 std::unique_ptr<HidlService> &&service) {
179 mInstanceMap.insert({service->getInstanceName(), std::move(service)});
180 }
181
sendPackageRegistrationNotification(const hidl_string & fqName,const hidl_string & instanceName)182 void ServiceManager::PackageInterfaceMap::sendPackageRegistrationNotification(
183 const hidl_string &fqName,
184 const hidl_string &instanceName) {
185
186 for (auto it = mPackageListeners.begin(); it != mPackageListeners.end();) {
187 auto ret = (*it)->onRegistration(fqName, instanceName, false /* preexisting */);
188 if (ret.isOk()) {
189 ++it;
190 } else {
191 LOG(ERROR) << "Dropping registration callback for " << fqName << "/" << instanceName
192 << ": transport error.";
193 it = mPackageListeners.erase(it);
194 }
195 }
196 }
197
addPackageListener(sp<IServiceNotification> listener)198 void ServiceManager::PackageInterfaceMap::addPackageListener(sp<IServiceNotification> listener) {
199 for (const auto &instanceMapping : mInstanceMap) {
200 const std::unique_ptr<HidlService> &service = instanceMapping.second;
201
202 if (service->getService() == nullptr) {
203 continue;
204 }
205
206 auto ret = listener->onRegistration(
207 service->getInterfaceName(),
208 service->getInstanceName(),
209 true /* preexisting */);
210 if (!ret.isOk()) {
211 LOG(ERROR) << "Not adding package listener for " << service->getInterfaceName()
212 << "/" << service->getInstanceName() << ": transport error "
213 << "when sending notification for already registered instance.";
214 return;
215 }
216 }
217 mPackageListeners.push_back(listener);
218 }
219
removePackageListener(const wp<IBase> & who)220 bool ServiceManager::PackageInterfaceMap::removePackageListener(const wp<IBase>& who) {
221 bool found = false;
222
223 for (auto it = mPackageListeners.begin(); it != mPackageListeners.end();) {
224 if (interfacesEqual(*it, who.promote())) {
225 it = mPackageListeners.erase(it);
226 found = true;
227 } else {
228 ++it;
229 }
230 }
231
232 return found;
233 }
234
removeServiceListener(const wp<IBase> & who)235 bool ServiceManager::PackageInterfaceMap::removeServiceListener(const wp<IBase>& who) {
236 bool found = false;
237
238 for (auto &servicePair : getInstanceMap()) {
239 const std::unique_ptr<HidlService> &service = servicePair.second;
240 found |= service->removeListener(who);
241 }
242
243 return found;
244 }
245
tryStartService(const std::string & fqName,const std::string & name)246 static void tryStartService(const std::string& fqName, const std::string& name) {
247 using ::android::base::SetProperty;
248
249 // The "happy path" here is starting up a service that is configured as a
250 // lazy HAL, but we aren't sure that is the case. If the service doesn't
251 // have an 'interface' entry in its .rc file OR if the service is already
252 // running, then this will be a no-op. So, for instance, if a service is
253 // deadlocked during startup, you will see this message repeatedly.
254 LOG(INFO) << "Since " << fqName << "/" << name
255 << " is not registered, trying to start it as a lazy HAL.";
256
257 std::thread([=] {
258 if (!SetProperty("ctl.interface_start", fqName + "/" + name)) {
259 LOG(INFO) << "Tried to start " << fqName << "/" << name
260 << " as a lazy service, but was unable to. Usually this happens when a "
261 "service is not installed, but if the service is intended to be used as a "
262 "lazy service, then it may be configured incorrectly.";
263 }
264 }).detach();
265 }
266
267 // Methods from ::android::hidl::manager::V1_0::IServiceManager follow.
get(const hidl_string & hidlFqName,const hidl_string & hidlName)268 Return<sp<IBase>> ServiceManager::get(const hidl_string& hidlFqName,
269 const hidl_string& hidlName) {
270 const std::string fqName = hidlFqName;
271 const std::string name = hidlName;
272
273 if (!mAcl.canGet(fqName, getBinderCallingContext())) {
274 return nullptr;
275 }
276
277 HidlService* hidlService = lookup(fqName, name);
278 if (hidlService == nullptr) {
279 tryStartService(fqName, name);
280 return nullptr;
281 }
282
283 sp<IBase> service = hidlService->getService();
284 if (service == nullptr) {
285 tryStartService(fqName, name);
286 return nullptr;
287 }
288
289 // Let HidlService know that we handed out a client. If the client drops the service before the
290 // next time handleClientCallbacks is called, it will still know that the service had been handed out.
291 hidlService->guaranteeClient();
292 forEachExistingService([&] (HidlService *otherService) {
293 if (otherService != hidlService && interfacesEqual(service, otherService->getService())) {
294 otherService->guaranteeClient();
295 }
296 return true;
297 });
298
299 // This is executed immediately after the binder driver confirms the transaction. The driver
300 // will update the appropriate data structures to reflect the fact that the client now has the
301 // service this function is returning. Nothing else can update the HidlService at the same
302 // time. This will run before anything else can modify the HidlService which is owned by this
303 // object, so it will be in the same state that it was when this function returns.
304 hardware::addPostCommandTask([hidlService] {
305 hidlService->handleClientCallbacks(false /* isCalledOnInterval */, 1 /*knownClientCount*/);
306 });
307
308 return service;
309 }
310
add(const hidl_string & name,const sp<IBase> & service)311 Return<bool> ServiceManager::add(const hidl_string& name, const sp<IBase>& service) {
312 bool addSuccess = false;
313
314 if (service == nullptr) {
315 return false;
316 }
317
318 auto pidcon = getBinderCallingContext();
319
320 if (!mAcl.canAdd(IBase::descriptor, pidcon)) {
321 LOG(ERROR) << "Missing permissions to add IBase";
322 return false;
323 }
324
325 auto ret = service->interfaceChain([&](const auto &interfaceChain) {
326 addSuccess = addImpl(name, service, interfaceChain, pidcon);
327 });
328
329 if (!ret.isOk()) {
330 LOG(ERROR) << "Failed to retrieve interface chain: " << ret.description();
331 return false;
332 }
333
334 return addSuccess;
335 }
336
addImpl(const std::string & name,const sp<IBase> & service,const hidl_vec<hidl_string> & interfaceChain,const AccessControl::CallingContext & callingContext)337 bool ServiceManager::addImpl(const std::string& name,
338 const sp<IBase>& service,
339 const hidl_vec<hidl_string>& interfaceChain,
340 const AccessControl::CallingContext& callingContext) {
341 if (interfaceChain.size() == 0) {
342 LOG(WARNING) << "Empty interface chain for " << name;
343 return false;
344 }
345
346 // First, verify you're allowed to add() the whole interface hierarchy
347 for(size_t i = 0; i < interfaceChain.size(); i++) {
348 const std::string fqName = interfaceChain[i];
349
350 if (!mAcl.canAdd(fqName, callingContext)) {
351 return false;
352 }
353 }
354
355 const std::string childFqName = interfaceChain[0];
356
357 // Detect duplicate registration
358 if (interfaceChain.size() > 1) {
359 // second to last entry should be the highest base class other than IBase.
360 const std::string baseFqName = interfaceChain[interfaceChain.size() - 2];
361 const HidlService *hidlService = lookup(baseFqName, name);
362 if (hidlService != nullptr && hidlService->getService() != nullptr) {
363 // This shouldn't occur during normal operation. Here are some cases where
364 // it might get hit:
365 // - bad configuration (service installed on device multiple times)
366 // - race between death notification and a new service being registered
367 // (previous logs should indicate a separate problem)
368 pid_t newServicePid = IPCThreadState::self()->getCallingPid();
369 pid_t oldServicePid = hidlService->getDebugPid();
370 LOG(WARNING) << "Detected instance of " << childFqName << " (pid: " << newServicePid
371 << ") registering over instance of or with base of " << baseFqName << " (pid: "
372 << oldServicePid << ").";
373 }
374 }
375
376 // Unregister superclass if subclass is registered over it
377 {
378 // For IBar extends IFoo if IFoo/default is being registered, remove
379 // IBar/default. This makes sure the following two things are equivalent
380 // 1). IBar::castFrom(IFoo::getService(X))
381 // 2). IBar::getService(X)
382 // assuming that IBar is declared in the device manifest and there
383 // is also not an IBaz extends IFoo and there is no race.
384 const HidlService *hidlService = lookup(childFqName, name);
385 if (hidlService != nullptr) {
386 const sp<IBase> remove = hidlService->getService();
387
388 if (remove != nullptr) {
389 const std::string instanceName = name;
390 removeService(remove, &instanceName /* restrictToInstanceName */);
391 }
392 }
393 }
394
395 // Detect missing manifest entries of superclass, when subclass in manifest.
396 {
397 // Ideally we could require all HALs registered with hwservicemanager to
398 // be in the VINTF manifest. However, this would prevent tests from
399 // running, and we would need another method of registering them (AIDL
400 // servicemanager gets around this because only certain objects are
401 // VINTF objects). So, for HIDL, we rely on VTS.
402 //
403 // When registering a HAL, in the client process, it checks to make sure
404 // that the last (leaf) class in the chain is in the VINTF manifest and
405 // fails. However, this fails to take into account parent classes. If
406 // parent classes are associated with certain VTS tests, then those VTS
407 // tests will not run until vts_treble_vintf_vendor_test fails and the
408 // failures are fixed (namely adding this into a manifest).
409 //
410 // So, here we make sure that if something is in the manifest, all of
411 // its parent classes are.
412 using ::android::hardware::getTransport;
413 if (vintf::Transport::EMPTY != getTransport(childFqName, name)) {
414 bool parentsInManifest = true;
415
416 // skip over latest, and check over all interfaces except the base
417 // interface (android.hidl.base is never in the manifest)
418 for (size_t i = 1; i + 1 < interfaceChain.size(); i++) {
419 if (vintf::Transport::EMPTY == getTransport(interfaceChain[i], name)) {
420 LOG(ERROR) << childFqName << "/" << name
421 << " is in the VINTF manifest, but its superclass "
422 << interfaceChain[i] << " is not. Refusing to register.";
423 parentsInManifest = false;
424 }
425 }
426 if (!parentsInManifest) {
427 return false;
428 }
429 }
430 }
431
432 for(size_t i = 0; i < interfaceChain.size(); i++) {
433 const std::string fqName = interfaceChain[i];
434
435 PackageInterfaceMap &ifaceMap = mServiceMap[fqName];
436 HidlService *hidlService = ifaceMap.lookup(name);
437
438 if (hidlService == nullptr) {
439 ifaceMap.insertService(
440 std::make_unique<HidlService>(fqName, name, service, callingContext.pid));
441 } else {
442 hidlService->setService(service, callingContext.pid);
443 }
444
445 ifaceMap.sendPackageRegistrationNotification(fqName, name);
446 }
447
448 bool linkRet = service->linkToDeath(this, kServiceDiedCookie).withDefault(false);
449 if (!linkRet) {
450 LOG(ERROR) << "Could not link to death for " << interfaceChain[0] << "/" << name;
451 }
452
453 return true;
454 }
455
getTransport(const hidl_string & fqName,const hidl_string & name)456 Return<ServiceManager::Transport> ServiceManager::getTransport(const hidl_string& fqName,
457 const hidl_string& name) {
458 using ::android::hardware::getTransport;
459
460 if (!mAcl.canGet(fqName, getBinderCallingContext())) {
461 return Transport::EMPTY;
462 }
463
464 switch (getTransport(fqName, name)) {
465 case vintf::Transport::HWBINDER:
466 return Transport::HWBINDER;
467 case vintf::Transport::PASSTHROUGH:
468 return Transport::PASSTHROUGH;
469 case vintf::Transport::EMPTY:
470 default:
471 return Transport::EMPTY;
472 }
473 }
474
list(list_cb _hidl_cb)475 Return<void> ServiceManager::list(list_cb _hidl_cb) {
476 if (!mAcl.canList(getBinderCallingContext())) {
477 _hidl_cb({});
478 return Void();
479 }
480
481 hidl_vec<hidl_string> list;
482
483 list.resize(countExistingService());
484
485 size_t idx = 0;
486 forEachExistingService([&] (const HidlService *service) {
487 list[idx++] = service->string();
488 return true; // continue
489 });
490
491 _hidl_cb(list);
492 return Void();
493 }
494
listByInterface(const hidl_string & fqName,listByInterface_cb _hidl_cb)495 Return<void> ServiceManager::listByInterface(const hidl_string& fqName,
496 listByInterface_cb _hidl_cb) {
497 if (!mAcl.canGet(fqName, getBinderCallingContext())) {
498 _hidl_cb({});
499 return Void();
500 }
501
502 auto ifaceIt = mServiceMap.find(fqName);
503 if (ifaceIt == mServiceMap.end()) {
504 _hidl_cb(hidl_vec<hidl_string>());
505 return Void();
506 }
507
508 const auto &instanceMap = ifaceIt->second.getInstanceMap();
509
510 hidl_vec<hidl_string> list;
511
512 size_t total = 0;
513 for (const auto &serviceMapping : instanceMap) {
514 const std::unique_ptr<HidlService> &service = serviceMapping.second;
515 if (service->getService() == nullptr) continue;
516
517 ++total;
518 }
519 list.resize(total);
520
521 size_t idx = 0;
522 for (const auto &serviceMapping : instanceMap) {
523 const std::unique_ptr<HidlService> &service = serviceMapping.second;
524 if (service->getService() == nullptr) continue;
525
526 list[idx++] = service->getInstanceName();
527 }
528
529 _hidl_cb(list);
530 return Void();
531 }
532
registerForNotifications(const hidl_string & fqName,const hidl_string & name,const sp<IServiceNotification> & callback)533 Return<bool> ServiceManager::registerForNotifications(const hidl_string& fqName,
534 const hidl_string& name,
535 const sp<IServiceNotification>& callback) {
536 if (callback == nullptr) {
537 return false;
538 }
539
540 if (!mAcl.canGet(fqName, getBinderCallingContext())) {
541 return false;
542 }
543
544 PackageInterfaceMap &ifaceMap = mServiceMap[fqName];
545
546 if (name.empty()) {
547 bool ret = callback->linkToDeath(this, kPackageListenerDiedCookie).withDefault(false);
548 if (!ret) {
549 LOG(ERROR) << "Failed to register death recipient for " << fqName << "/" << name;
550 return false;
551 }
552 ifaceMap.addPackageListener(callback);
553 return true;
554 }
555
556 HidlService *service = ifaceMap.lookup(name);
557
558 bool ret = callback->linkToDeath(this, kServiceListenerDiedCookie).withDefault(false);
559 if (!ret) {
560 LOG(ERROR) << "Failed to register death recipient for " << fqName << "/" << name;
561 return false;
562 }
563
564 if (service == nullptr) {
565 auto adding = std::make_unique<HidlService>(fqName, name);
566 adding->addListener(callback);
567 ifaceMap.insertService(std::move(adding));
568 } else {
569 service->addListener(callback);
570 }
571
572 return true;
573 }
574
unregisterForNotifications(const hidl_string & fqName,const hidl_string & name,const sp<IServiceNotification> & callback)575 Return<bool> ServiceManager::unregisterForNotifications(const hidl_string& fqName,
576 const hidl_string& name,
577 const sp<IServiceNotification>& callback) {
578 if (callback == nullptr) {
579 LOG(ERROR) << "Cannot unregister null callback for " << fqName << "/" << name;
580 return false;
581 }
582
583 // NOTE: don't need ACL since callback is binder token, and if someone has gotten it,
584 // then they already have access to it.
585
586 if (fqName.empty()) {
587 bool success = false;
588 success |= removePackageListener(callback);
589 success |= removeServiceListener(callback);
590 return success;
591 }
592
593 PackageInterfaceMap &ifaceMap = mServiceMap[fqName];
594
595 if (name.empty()) {
596 bool success = false;
597 success |= ifaceMap.removePackageListener(callback);
598 success |= ifaceMap.removeServiceListener(callback);
599 return success;
600 }
601
602 HidlService *service = ifaceMap.lookup(name);
603
604 if (service == nullptr) {
605 return false;
606 }
607
608 return service->removeListener(callback);
609 }
610
registerClientCallback(const hidl_string & hidlFqName,const hidl_string & hidlName,const sp<IBase> & server,const sp<IClientCallback> & cb)611 Return<bool> ServiceManager::registerClientCallback(const hidl_string& hidlFqName,
612 const hidl_string& hidlName,
613 const sp<IBase>& server,
614 const sp<IClientCallback>& cb) {
615 if (server == nullptr || cb == nullptr) return false;
616
617 const std::string fqName = hidlFqName;
618 const std::string name = hidlName;
619
620 // only the server of the interface can register a client callback
621 pid_t pid = IPCThreadState::self()->getCallingPid();
622 if (!mAcl.canAdd(fqName, getBinderCallingContext())) {
623 return false;
624 }
625
626 HidlService* registered = lookup(fqName, name);
627
628 if (registered == nullptr) {
629 return false;
630 }
631
632 // sanity
633 if (registered->getDebugPid() != pid) {
634 LOG(WARNING) << "Only a server can register for client callbacks (for " << fqName
635 << "/" << name << ")";
636 return false;
637 }
638
639 sp<IBase> service = registered->getService();
640
641 if (!interfacesEqual(service, server)) {
642 LOG(WARNING) << "Tried to register client callback for " << fqName << "/" << name
643 << " but a different service is registered under this name.";
644 return false;
645 }
646
647 bool linkRet = cb->linkToDeath(this, kClientCallbackDiedCookie).withDefault(false);
648 if (!linkRet) {
649 LOG(ERROR) << "Could not link to death for registerClientCallback";
650 return false;
651 }
652
653 // knownClientCount
654 // - one from binder transaction (base here)
655 // - one from hwservicemanager
656 registered->addClientCallback(cb, 2 /*knownClientCount*/);
657
658 return true;
659 }
660
unregisterClientCallback(const sp<IBase> & server,const sp<IClientCallback> & cb)661 Return<bool> ServiceManager::unregisterClientCallback(const sp<IBase>& server,
662 const sp<IClientCallback>& cb) {
663 if (cb == nullptr) return false;
664
665 bool removed = false;
666
667 forEachExistingService([&] (HidlService *service) {
668 if (server == nullptr || interfacesEqual(service->getService(), server)) {
669 removed |= service->removeClientCallback(cb);
670 }
671 return true; // continue
672 });
673
674 return removed;
675 }
676
handleClientCallbacks()677 void ServiceManager::handleClientCallbacks() {
678 forEachServiceEntry([&] (HidlService *service) {
679 // hwservicemanager will hold one reference, so knownClientCount is 1.
680 service->handleClientCallbacks(true /* isCalledOnInterval */, 1 /*knownClientCount*/);
681 return true; // continue
682 });
683 }
684
addWithChain(const hidl_string & name,const sp<IBase> & service,const hidl_vec<hidl_string> & chain)685 Return<bool> ServiceManager::addWithChain(const hidl_string& name,
686 const sp<IBase>& service,
687 const hidl_vec<hidl_string>& chain) {
688 if (service == nullptr) {
689 return false;
690 }
691
692 auto callingContext = getBinderCallingContext();
693
694 return addImpl(name, service, chain, callingContext);
695 }
696
listManifestByInterface(const hidl_string & fqName,listManifestByInterface_cb _hidl_cb)697 Return<void> ServiceManager::listManifestByInterface(const hidl_string& fqName,
698 listManifestByInterface_cb _hidl_cb) {
699 if (!mAcl.canGet(fqName, getBinderCallingContext())) {
700 _hidl_cb({});
701 return Void();
702 }
703
704 std::set<std::string> instances = getInstances(fqName);
705 hidl_vec<hidl_string> ret(instances.begin(), instances.end());
706
707 _hidl_cb(ret);
708 return Void();
709 }
710
tryUnregister(const hidl_string & hidlFqName,const hidl_string & hidlName,const sp<IBase> & service)711 Return<bool> ServiceManager::tryUnregister(const hidl_string& hidlFqName,
712 const hidl_string& hidlName,
713 const sp<IBase>& service) {
714 const std::string fqName = hidlFqName;
715 const std::string name = hidlName;
716
717 if (service == nullptr) {
718 return false;
719 }
720
721 if (!mAcl.canAdd(fqName, getBinderCallingContext())) {
722 return false;
723 }
724
725 HidlService* registered = lookup(fqName, name);
726
727 // sanity
728 pid_t pid = IPCThreadState::self()->getCallingPid();
729 if (registered->getDebugPid() != pid) {
730 LOG(WARNING) << "Only a server can unregister itself (for " << fqName
731 << "/" << name << ")";
732 return false;
733 }
734
735 sp<IBase> server = registered->getService();
736
737 if (!interfacesEqual(service, server)) {
738 LOG(WARNING) << "Tried to unregister for " << fqName << "/" << name
739 << " but a different service is registered under this name.";
740 return false;
741 }
742
743 // knownClientCount
744 // - one from binder transaction (base here)
745 // - one from hwservicemanager
746 bool clients = registered->forceHandleClientCallbacks(false /*isCalledOnInterval*/, 2 /*knownClientCount*/);
747
748 if (clients) {
749 // client callbacks are either disabled or there are other clients
750 LOG(INFO) << "Tried to unregister for " << fqName << "/" << name
751 << " but there are clients: " << clients;
752 return false;
753 }
754
755 // will remove entire parent hierarchy
756 bool success = removeService(service, &name /*restrictToInstanceName*/);
757
758 if (registered->getService() != nullptr) {
759 LOG(ERROR) << "Bad state. Unregistration failed for " << fqName << "/" << name << ".";
760 return false;
761 }
762
763 return success;
764 }
765
debugDump(debugDump_cb _cb)766 Return<void> ServiceManager::debugDump(debugDump_cb _cb) {
767 if (!mAcl.canList(getBinderCallingContext())) {
768 _cb({});
769 return Void();
770 }
771
772 std::vector<IServiceManager::InstanceDebugInfo> list;
773 forEachServiceEntry([&] (const HidlService *service) {
774 hidl_vec<int32_t> clientPids;
775 clientPids.resize(service->getPassthroughClients().size());
776
777 size_t i = 0;
778 for (pid_t p : service->getPassthroughClients()) {
779 clientPids[i++] = p;
780 }
781
782 list.push_back({
783 .interfaceName = service->getInterfaceName(),
784 .instanceName = service->getInstanceName(),
785 .pid = service->getDebugPid(),
786 .clientPids = clientPids,
787 .arch = ::android::hidl::base::V1_0::DebugInfo::Architecture::UNKNOWN
788 });
789
790 return true; // continue
791 });
792
793 _cb(list);
794 return Void();
795 }
796
797
registerPassthroughClient(const hidl_string & fqName,const hidl_string & name)798 Return<void> ServiceManager::registerPassthroughClient(const hidl_string &fqName,
799 const hidl_string &name) {
800 auto callingContext = getBinderCallingContext();
801
802 if (!mAcl.canGet(fqName, callingContext)) {
803 /* We guard this function with "get", because it's typically used in
804 * the getService() path, albeit for a passthrough service in this
805 * case
806 */
807 return Void();
808 }
809
810 PackageInterfaceMap &ifaceMap = mServiceMap[fqName];
811
812 if (name.empty()) {
813 LOG(WARNING) << "registerPassthroughClient encounters empty instance name for "
814 << fqName.c_str();
815 return Void();
816 }
817
818 HidlService *service = ifaceMap.lookup(name);
819
820 if (service == nullptr) {
821 auto adding = std::make_unique<HidlService>(fqName, name);
822 adding->registerPassthroughClient(callingContext.pid);
823 ifaceMap.insertService(std::move(adding));
824 } else {
825 service->registerPassthroughClient(callingContext.pid);
826 }
827 return Void();
828 }
829
removeService(const wp<IBase> & who,const std::string * restrictToInstanceName)830 bool ServiceManager::removeService(const wp<IBase>& who, const std::string* restrictToInstanceName) {
831 bool keepInstance = false;
832 bool removed = false;
833 for (auto &interfaceMapping : mServiceMap) {
834 auto &instanceMap = interfaceMapping.second.getInstanceMap();
835
836 for (auto &servicePair : instanceMap) {
837 const std::string &instanceName = servicePair.first;
838 const std::unique_ptr<HidlService> &service = servicePair.second;
839
840 if (interfacesEqual(service->getService(), who.promote())) {
841 if (restrictToInstanceName != nullptr && *restrictToInstanceName != instanceName) {
842 // We cannot remove all instances of this service, so we don't return that it
843 // has been entirely removed.
844 keepInstance = true;
845 continue;
846 }
847
848 service->setService(nullptr, static_cast<pid_t>(IServiceManager::PidConstant::NO_PID));
849 removed = true;
850 }
851 }
852 }
853
854 return !keepInstance && removed;
855 }
856
removePackageListener(const wp<IBase> & who)857 bool ServiceManager::removePackageListener(const wp<IBase>& who) {
858 bool found = false;
859
860 for (auto &interfaceMapping : mServiceMap) {
861 found |= interfaceMapping.second.removePackageListener(who);
862 }
863
864 return found;
865 }
866
removeServiceListener(const wp<IBase> & who)867 bool ServiceManager::removeServiceListener(const wp<IBase>& who) {
868 bool found = false;
869 for (auto &interfaceMapping : mServiceMap) {
870 auto &packageInterfaceMap = interfaceMapping.second;
871
872 found |= packageInterfaceMap.removeServiceListener(who);
873 }
874 return found;
875 }
876 } // namespace implementation
877 } // namespace manager
878 } // namespace hidl
879 } // namespace android
880