1 /*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #define LOG_TAG "hw-IPCThreadState"
18
19 #include <hwbinder/IPCThreadState.h>
20
21 #include <hwbinder/Binder.h>
22 #include <hwbinder/BpHwBinder.h>
23
24 #include <android-base/macros.h>
25 #include <utils/CallStack.h>
26 #include <utils/Log.h>
27 #include <utils/SystemClock.h>
28 #include <utils/threads.h>
29
30 #include "binder_kernel.h"
31 #include <hwbinder/Static.h>
32 #include "TextOutput.h"
33
34 #include <atomic>
35 #include <errno.h>
36 #include <inttypes.h>
37 #include <linux/sched.h>
38 #include <pthread.h>
39 #include <signal.h>
40 #include <stdio.h>
41 #include <sys/ioctl.h>
42 #include <sys/resource.h>
43 #include <unistd.h>
44
45 #if LOG_NDEBUG
46
47 #define IF_LOG_TRANSACTIONS() if (false)
48 #define IF_LOG_COMMANDS() if (false)
49 #define LOG_REMOTEREFS(...)
50 #define IF_LOG_REMOTEREFS() if (false)
51 #define LOG_THREADPOOL(...)
52 #define LOG_ONEWAY(...)
53
54 #else
55
56 #define IF_LOG_TRANSACTIONS() IF_ALOG(LOG_VERBOSE, "transact")
57 #define IF_LOG_COMMANDS() IF_ALOG(LOG_VERBOSE, "ipc")
58 #define LOG_REMOTEREFS(...) ALOG(LOG_DEBUG, "remoterefs", __VA_ARGS__)
59 #define IF_LOG_REMOTEREFS() IF_ALOG(LOG_DEBUG, "remoterefs")
60 #define LOG_THREADPOOL(...) ALOG(LOG_DEBUG, "threadpool", __VA_ARGS__)
61 #define LOG_ONEWAY(...) ALOG(LOG_DEBUG, "ipc", __VA_ARGS__)
62
63 #endif
64
65 // ---------------------------------------------------------------------------
66
67 namespace android {
68 namespace hardware {
69
70 // Static const and functions will be optimized out if not used,
71 // when LOG_NDEBUG and references in IF_LOG_COMMANDS() are optimized out.
72 static const char *kReturnStrings[] = {
73 "BR_ERROR",
74 "BR_OK",
75 "BR_TRANSACTION",
76 "BR_REPLY",
77 "BR_ACQUIRE_RESULT",
78 "BR_DEAD_REPLY",
79 "BR_TRANSACTION_COMPLETE",
80 "BR_INCREFS",
81 "BR_ACQUIRE",
82 "BR_RELEASE",
83 "BR_DECREFS",
84 "BR_ATTEMPT_ACQUIRE",
85 "BR_NOOP",
86 "BR_SPAWN_LOOPER",
87 "BR_FINISHED",
88 "BR_DEAD_BINDER",
89 "BR_CLEAR_DEATH_NOTIFICATION_DONE",
90 "BR_FAILED_REPLY",
91 "BR_FROZEN_REPLY",
92 "BR_ONEWAY_SPAM_SUSPECT",
93 "BR_TRANSACTION_SEC_CTX",
94 };
95
96 static const char *kCommandStrings[] = {
97 "BC_TRANSACTION",
98 "BC_REPLY",
99 "BC_ACQUIRE_RESULT",
100 "BC_FREE_BUFFER",
101 "BC_INCREFS",
102 "BC_ACQUIRE",
103 "BC_RELEASE",
104 "BC_DECREFS",
105 "BC_INCREFS_DONE",
106 "BC_ACQUIRE_DONE",
107 "BC_ATTEMPT_ACQUIRE",
108 "BC_REGISTER_LOOPER",
109 "BC_ENTER_LOOPER",
110 "BC_EXIT_LOOPER",
111 "BC_REQUEST_DEATH_NOTIFICATION",
112 "BC_CLEAR_DEATH_NOTIFICATION",
113 "BC_DEAD_BINDER_DONE"
114 };
115
getReturnString(uint32_t cmd)116 static const char* getReturnString(uint32_t cmd)
117 {
118 size_t idx = cmd & _IOC_NRMASK;
119 if (idx < sizeof(kReturnStrings) / sizeof(kReturnStrings[0]))
120 return kReturnStrings[idx];
121 else
122 return "unknown";
123 }
124
printBinderTransactionData(TextOutput & out,const void * data)125 static const void* printBinderTransactionData(TextOutput& out, const void* data)
126 {
127 const binder_transaction_data* btd =
128 (const binder_transaction_data*)data;
129 if (btd->target.handle < 1024) {
130 /* want to print descriptors in decimal; guess based on value */
131 out << "target.desc=" << btd->target.handle;
132 } else {
133 out << "target.ptr=" << btd->target.ptr;
134 }
135 out << " (cookie " << btd->cookie << ")" << endl
136 << "code=" << TypeCode(btd->code) << ", flags=" << (void*)(long)btd->flags << endl
137 << "data=" << btd->data.ptr.buffer << " (" << (void*)btd->data_size
138 << " bytes)" << endl
139 << "offsets=" << btd->data.ptr.offsets << " (" << (void*)btd->offsets_size
140 << " bytes)";
141 return btd+1;
142 }
143
printReturnCommand(TextOutput & out,const void * _cmd)144 static const void* printReturnCommand(TextOutput& out, const void* _cmd)
145 {
146 static const size_t N = sizeof(kReturnStrings)/sizeof(kReturnStrings[0]);
147 const int32_t* cmd = (const int32_t*)_cmd;
148 uint32_t code = (uint32_t)*cmd++;
149 size_t cmdIndex = code & 0xff;
150 if (code == BR_ERROR) {
151 out << "BR_ERROR: " << (void*)(long)(*cmd++) << endl;
152 return cmd;
153 } else if (cmdIndex >= N) {
154 out << "Unknown reply: " << code << endl;
155 return cmd;
156 }
157 out << kReturnStrings[cmdIndex];
158
159 switch (code) {
160 case BR_TRANSACTION:
161 case BR_REPLY: {
162 out << ": " << indent;
163 cmd = (const int32_t *)printBinderTransactionData(out, cmd);
164 out << dedent;
165 } break;
166
167 case BR_ACQUIRE_RESULT: {
168 const int32_t res = *cmd++;
169 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
170 } break;
171
172 case BR_INCREFS:
173 case BR_ACQUIRE:
174 case BR_RELEASE:
175 case BR_DECREFS: {
176 const int32_t b = *cmd++;
177 const int32_t c = *cmd++;
178 out << ": target=" << (void*)(long)b << " (cookie " << (void*)(long)c << ")";
179 } break;
180
181 case BR_ATTEMPT_ACQUIRE: {
182 const int32_t p = *cmd++;
183 const int32_t b = *cmd++;
184 const int32_t c = *cmd++;
185 out << ": target=" << (void*)(long)b << " (cookie " << (void*)(long)c
186 << "), pri=" << p;
187 } break;
188
189 case BR_DEAD_BINDER:
190 case BR_CLEAR_DEATH_NOTIFICATION_DONE: {
191 const int32_t c = *cmd++;
192 out << ": death cookie " << (void*)(long)c;
193 } break;
194
195 default:
196 // no details to show for: BR_OK, BR_DEAD_REPLY,
197 // BR_TRANSACTION_COMPLETE, BR_FINISHED
198 break;
199 }
200
201 out << endl;
202 return cmd;
203 }
204
printCommand(TextOutput & out,const void * _cmd)205 static const void* printCommand(TextOutput& out, const void* _cmd)
206 {
207 static const size_t N = sizeof(kCommandStrings)/sizeof(kCommandStrings[0]);
208 const int32_t* cmd = (const int32_t*)_cmd;
209 uint32_t code = (uint32_t)*cmd++;
210 size_t cmdIndex = code & 0xff;
211
212 if (cmdIndex >= N) {
213 out << "Unknown command: " << code << endl;
214 return cmd;
215 }
216 out << kCommandStrings[cmdIndex];
217
218 switch (code) {
219 case BC_TRANSACTION:
220 case BC_REPLY: {
221 out << ": " << indent;
222 cmd = (const int32_t *)printBinderTransactionData(out, cmd);
223 out << dedent;
224 } break;
225
226 case BC_ACQUIRE_RESULT: {
227 const int32_t res = *cmd++;
228 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
229 } break;
230
231 case BC_FREE_BUFFER: {
232 const int32_t buf = *cmd++;
233 out << ": buffer=" << (void*)(long)buf;
234 } break;
235
236 case BC_INCREFS:
237 case BC_ACQUIRE:
238 case BC_RELEASE:
239 case BC_DECREFS: {
240 const int32_t d = *cmd++;
241 out << ": desc=" << d;
242 } break;
243
244 case BC_INCREFS_DONE:
245 case BC_ACQUIRE_DONE: {
246 const int32_t b = *cmd++;
247 const int32_t c = *cmd++;
248 out << ": target=" << (void*)(long)b << " (cookie " << (void*)(long)c << ")";
249 } break;
250
251 case BC_ATTEMPT_ACQUIRE: {
252 const int32_t p = *cmd++;
253 const int32_t d = *cmd++;
254 out << ": desc=" << d << ", pri=" << p;
255 } break;
256
257 case BC_REQUEST_DEATH_NOTIFICATION:
258 case BC_CLEAR_DEATH_NOTIFICATION: {
259 const int32_t h = *cmd++;
260 const int32_t c = *cmd++;
261 out << ": handle=" << h << " (death cookie " << (void*)(long)c << ")";
262 } break;
263
264 case BC_DEAD_BINDER_DONE: {
265 const int32_t c = *cmd++;
266 out << ": death cookie " << (void*)(long)c;
267 } break;
268
269 default:
270 // no details to show for: BC_REGISTER_LOOPER, BC_ENTER_LOOPER,
271 // BC_EXIT_LOOPER
272 break;
273 }
274
275 out << endl;
276 return cmd;
277 }
278
279 static pthread_mutex_t gTLSMutex = PTHREAD_MUTEX_INITIALIZER;
280 static std::atomic<bool> gHaveTLS = false;
281 static pthread_key_t gTLS = 0;
282 static std::atomic<bool> gShutdown = false;
283
self()284 IPCThreadState* IPCThreadState::self()
285 {
286 if (gHaveTLS.load(std::memory_order_acquire)) {
287 restart:
288 const pthread_key_t k = gTLS;
289 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
290 if (st) return st;
291 return new IPCThreadState;
292 }
293
294 // Racey, heuristic test for simultaneous shutdown.
295 if (gShutdown.load(std::memory_order_relaxed)) {
296 ALOGW("Calling IPCThreadState::self() during shutdown is dangerous, expect a crash.\n");
297 return nullptr;
298 }
299
300 pthread_mutex_lock(&gTLSMutex);
301 if (!gHaveTLS.load(std::memory_order_relaxed)) {
302 int key_create_value = pthread_key_create(&gTLS, threadDestructor);
303 if (key_create_value != 0) {
304 pthread_mutex_unlock(&gTLSMutex);
305 ALOGW("IPCThreadState::self() unable to create TLS key, expect a crash: %s\n",
306 strerror(key_create_value));
307 return nullptr;
308 }
309 gHaveTLS.store(true, std::memory_order_release);
310 }
311 pthread_mutex_unlock(&gTLSMutex);
312 goto restart;
313 }
314
selfOrNull()315 IPCThreadState* IPCThreadState::selfOrNull()
316 {
317 if (gHaveTLS.load(std::memory_order_acquire)) {
318 const pthread_key_t k = gTLS;
319 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
320 return st;
321 }
322 return nullptr;
323 }
324
shutdown()325 void IPCThreadState::shutdown()
326 {
327 gShutdown.store(true, std::memory_order_relaxed);
328
329 if (gHaveTLS.load(std::memory_order_acquire)) {
330 // XXX Need to wait for all thread pool threads to exit!
331 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(gTLS);
332 if (st) {
333 delete st;
334 pthread_setspecific(gTLS, nullptr);
335 }
336 pthread_key_delete(gTLS);
337 gHaveTLS.store(false, std::memory_order_release);
338 }
339 }
340
process()341 sp<ProcessState> IPCThreadState::process()
342 {
343 return mProcess;
344 }
345
clearLastError()346 status_t IPCThreadState::clearLastError()
347 {
348 const status_t err = mLastError;
349 mLastError = NO_ERROR;
350 return err;
351 }
352
getCallingPid() const353 pid_t IPCThreadState::getCallingPid() const
354 {
355 return mCallingPid;
356 }
357
getCallingSid() const358 const char* IPCThreadState::getCallingSid() const
359 {
360 return mCallingSid;
361 }
362
getCallingUid() const363 uid_t IPCThreadState::getCallingUid() const
364 {
365 return mCallingUid;
366 }
367
clearCallingIdentity()368 int64_t IPCThreadState::clearCallingIdentity()
369 {
370 // ignore mCallingSid for legacy reasons
371 int64_t token = ((int64_t)mCallingUid<<32) | mCallingPid;
372 clearCaller();
373 return token;
374 }
375
setStrictModePolicy(int32_t policy)376 void IPCThreadState::setStrictModePolicy(int32_t policy)
377 {
378 mStrictModePolicy = policy;
379 }
380
getStrictModePolicy() const381 int32_t IPCThreadState::getStrictModePolicy() const
382 {
383 return mStrictModePolicy;
384 }
385
setLastTransactionBinderFlags(int32_t flags)386 void IPCThreadState::setLastTransactionBinderFlags(int32_t flags)
387 {
388 mLastTransactionBinderFlags = flags;
389 }
390
getLastTransactionBinderFlags() const391 int32_t IPCThreadState::getLastTransactionBinderFlags() const
392 {
393 return mLastTransactionBinderFlags;
394 }
395
restoreCallingIdentity(int64_t token)396 void IPCThreadState::restoreCallingIdentity(int64_t token)
397 {
398 mCallingUid = (int)(token>>32);
399 mCallingSid = nullptr; // not enough data to restore
400 mCallingPid = (int)token;
401 }
402
clearCaller()403 void IPCThreadState::clearCaller()
404 {
405 mCallingPid = getpid();
406 mCallingSid = nullptr; // expensive to lookup
407 mCallingUid = getuid();
408 }
409
flushCommands()410 void IPCThreadState::flushCommands()
411 {
412 if (mProcess->mDriverFD < 0)
413 return;
414 talkWithDriver(false);
415 // The flush could have caused post-write refcount decrements to have
416 // been executed, which in turn could result in BC_RELEASE/BC_DECREFS
417 // being queued in mOut. So flush again, if we need to.
418 if (mOut.dataSize() > 0) {
419 talkWithDriver(false);
420 }
421 if (mOut.dataSize() > 0) {
422 ALOGW("mOut.dataSize() > 0 after flushCommands()");
423 }
424 }
425
getAndExecuteCommand()426 status_t IPCThreadState::getAndExecuteCommand()
427 {
428 status_t result;
429 int32_t cmd;
430
431 result = talkWithDriver();
432 if (result >= NO_ERROR) {
433 size_t IN = mIn.dataAvail();
434 if (IN < sizeof(int32_t)) return result;
435 cmd = mIn.readInt32();
436 IF_LOG_COMMANDS() {
437 alog << "Processing top-level Command: "
438 << getReturnString(cmd) << endl;
439 }
440
441 pthread_mutex_lock(&mProcess->mThreadCountLock);
442 mProcess->mExecutingThreadsCount++;
443 if (mProcess->mExecutingThreadsCount >= mProcess->mMaxThreads &&
444 mProcess->mMaxThreads > 1 && mProcess->mStarvationStartTimeMs == 0) {
445 mProcess->mStarvationStartTimeMs = uptimeMillis();
446 }
447 pthread_mutex_unlock(&mProcess->mThreadCountLock);
448
449 result = executeCommand(cmd);
450
451 pthread_mutex_lock(&mProcess->mThreadCountLock);
452 mProcess->mExecutingThreadsCount--;
453 if (mProcess->mExecutingThreadsCount < mProcess->mMaxThreads &&
454 mProcess->mStarvationStartTimeMs != 0) {
455 int64_t starvationTimeMs = uptimeMillis() - mProcess->mStarvationStartTimeMs;
456 if (starvationTimeMs > 100) {
457 // If there is only a single-threaded client, nobody would be blocked
458 // on this, and it's not really starvation. (see b/37647467)
459 ALOGW("All binder threads in pool (%zu threads) busy for %" PRId64 " ms%s",
460 mProcess->mMaxThreads, starvationTimeMs,
461 mProcess->mMaxThreads > 1 ? "" : " (may be a false alarm)");
462 }
463 mProcess->mStarvationStartTimeMs = 0;
464 }
465 pthread_mutex_unlock(&mProcess->mThreadCountLock);
466 }
467
468 if (UNLIKELY(!mPostCommandTasks.empty())) {
469 // make a copy in case the post transaction task makes a binder
470 // call and that other process calls back into us
471 std::vector<std::function<void(void)>> tasks = mPostCommandTasks;
472 mPostCommandTasks.clear();
473 for (const auto& func : tasks) {
474 func();
475 }
476 }
477
478 return result;
479 }
480
481 // When we've cleared the incoming command queue, process any pending derefs
processPendingDerefs()482 void IPCThreadState::processPendingDerefs()
483 {
484 if (mIn.dataPosition() >= mIn.dataSize()) {
485 /*
486 * The decWeak()/decStrong() calls may cause a destructor to run,
487 * which in turn could have initiated an outgoing transaction,
488 * which in turn could cause us to add to the pending refs
489 * vectors; so instead of simply iterating, loop until they're empty.
490 *
491 * We do this in an outer loop, because calling decStrong()
492 * may result in something being added to mPendingWeakDerefs,
493 * which could be delayed until the next incoming command
494 * from the driver if we don't process it now.
495 */
496 while (mPendingWeakDerefs.size() > 0 || mPendingStrongDerefs.size() > 0) {
497 while (mPendingWeakDerefs.size() > 0) {
498 RefBase::weakref_type* refs = mPendingWeakDerefs[0];
499 mPendingWeakDerefs.removeAt(0);
500 refs->decWeak(mProcess.get());
501 }
502
503 if (mPendingStrongDerefs.size() > 0) {
504 // We don't use while() here because we don't want to re-order
505 // strong and weak decs at all; if this decStrong() causes both a
506 // decWeak() and a decStrong() to be queued, we want to process
507 // the decWeak() first.
508 BHwBinder* obj = mPendingStrongDerefs[0];
509 mPendingStrongDerefs.removeAt(0);
510 obj->decStrong(mProcess.get());
511 }
512 }
513 }
514 }
515
processPostWriteDerefs()516 void IPCThreadState::processPostWriteDerefs()
517 {
518 /*
519 * libhwbinder has a flushCommands() in the BpHwBinder destructor,
520 * which makes this function (potentially) reentrant.
521 * New entries shouldn't be added though, so just iterating until empty
522 * should be safe.
523 */
524 while (mPostWriteWeakDerefs.size() > 0) {
525 RefBase::weakref_type* refs = mPostWriteWeakDerefs[0];
526 mPostWriteWeakDerefs.removeAt(0);
527 refs->decWeak(mProcess.get());
528 }
529
530 while (mPostWriteStrongDerefs.size() > 0) {
531 RefBase* obj = mPostWriteStrongDerefs[0];
532 mPostWriteStrongDerefs.removeAt(0);
533 obj->decStrong(mProcess.get());
534 }
535 }
536
joinThreadPool(bool isMain)537 void IPCThreadState::joinThreadPool(bool isMain)
538 {
539 LOG_THREADPOOL("**** THREAD %p (PID %d) IS JOINING THE THREAD POOL\n", (void*)pthread_self(), getpid());
540
541 mOut.writeInt32(isMain ? BC_ENTER_LOOPER : BC_REGISTER_LOOPER);
542
543 status_t result;
544 mIsLooper = true;
545 do {
546 processPendingDerefs();
547 // now get the next command to be processed, waiting if necessary
548 result = getAndExecuteCommand();
549
550 if (result < NO_ERROR && result != TIMED_OUT && result != -ECONNREFUSED && result != -EBADF) {
551 LOG_ALWAYS_FATAL("getAndExecuteCommand(fd=%d) returned unexpected error %d, aborting",
552 mProcess->mDriverFD, result);
553 }
554
555 // Let this thread exit the thread pool if it is no longer
556 // needed and it is not the main process thread.
557 if(result == TIMED_OUT && !isMain) {
558 break;
559 }
560 } while (result != -ECONNREFUSED && result != -EBADF);
561
562 LOG_THREADPOOL("**** THREAD %p (PID %d) IS LEAVING THE THREAD POOL err=%d\n",
563 (void*)pthread_self(), getpid(), result);
564
565 mOut.writeInt32(BC_EXIT_LOOPER);
566 mIsLooper = false;
567 talkWithDriver(false);
568 }
569
setupPolling(int * fd)570 int IPCThreadState::setupPolling(int* fd)
571 {
572 if (mProcess->mDriverFD < 0) {
573 return -EBADF;
574 }
575
576 // Tells the kernel to not spawn any additional binder threads,
577 // as that won't work with polling. Also, the caller is responsible
578 // for subsequently calling handlePolledCommands()
579 mProcess->setThreadPoolConfiguration(1, true /* callerWillJoin */);
580 mIsPollingThread = true;
581
582 mOut.writeInt32(BC_ENTER_LOOPER);
583 *fd = mProcess->mDriverFD;
584 return 0;
585 }
586
handlePolledCommands()587 status_t IPCThreadState::handlePolledCommands()
588 {
589 status_t result;
590
591 do {
592 result = getAndExecuteCommand();
593 } while (mIn.dataPosition() < mIn.dataSize());
594
595 processPendingDerefs();
596 flushCommands();
597 return result;
598 }
599
stopProcess(bool)600 void IPCThreadState::stopProcess(bool /*immediate*/)
601 {
602 //ALOGI("**** STOPPING PROCESS");
603 flushCommands();
604 int fd = mProcess->mDriverFD;
605 mProcess->mDriverFD = -1;
606 close(fd);
607 //kill(getpid(), SIGKILL);
608 }
609
transact(int32_t handle,uint32_t code,const Parcel & data,Parcel * reply,uint32_t flags)610 status_t IPCThreadState::transact(int32_t handle,
611 uint32_t code, const Parcel& data,
612 Parcel* reply, uint32_t flags)
613 {
614 status_t err;
615
616 flags |= TF_ACCEPT_FDS;
617
618 IF_LOG_TRANSACTIONS() {
619 alog << "BC_TRANSACTION thr " << (void*)pthread_self() << " / hand "
620 << handle << " / code " << TypeCode(code) << ": "
621 << indent << data << dedent << endl;
622 }
623
624 LOG_ONEWAY(">>>> SEND from pid %d uid %d %s", getpid(), getuid(),
625 (flags & TF_ONE_WAY) == 0 ? "READ REPLY" : "ONE WAY");
626 err = writeTransactionData(BC_TRANSACTION_SG, flags, handle, code, data, nullptr);
627
628 if (err != NO_ERROR) {
629 if (reply) reply->setError(err);
630 return (mLastError = err);
631 }
632
633 if ((flags & TF_ONE_WAY) == 0) {
634 if (UNLIKELY(mCallRestriction != ProcessState::CallRestriction::NONE)) {
635 if (mCallRestriction == ProcessState::CallRestriction::ERROR_IF_NOT_ONEWAY) {
636 ALOGE("Process making non-oneway call (code: %u) but is restricted.", code);
637 CallStack::logStack("non-oneway call", CallStack::getCurrent(10).get(),
638 ANDROID_LOG_ERROR);
639 } else /* FATAL_IF_NOT_ONEWAY */ {
640 LOG_ALWAYS_FATAL("Process may not make oneway calls (code: %u).", code);
641 }
642 }
643
644 #if 0
645 if (code == 4) { // relayout
646 ALOGI(">>>>>> CALLING transaction 4");
647 } else {
648 ALOGI(">>>>>> CALLING transaction %d", code);
649 }
650 #endif
651 if (reply) {
652 err = waitForResponse(reply);
653 } else {
654 Parcel fakeReply;
655 err = waitForResponse(&fakeReply);
656 }
657 #if 0
658 if (code == 4) { // relayout
659 ALOGI("<<<<<< RETURNING transaction 4");
660 } else {
661 ALOGI("<<<<<< RETURNING transaction %d", code);
662 }
663 #endif
664
665 IF_LOG_TRANSACTIONS() {
666 alog << "BR_REPLY thr " << (void*)pthread_self() << " / hand "
667 << handle << ": ";
668 if (reply) alog << indent << *reply << dedent << endl;
669 else alog << "(none requested)" << endl;
670 }
671 } else {
672 err = waitForResponse(nullptr, nullptr);
673 }
674
675 return err;
676 }
677
incStrongHandle(int32_t handle,BpHwBinder * proxy)678 void IPCThreadState::incStrongHandle(int32_t handle, BpHwBinder *proxy)
679 {
680 LOG_REMOTEREFS("IPCThreadState::incStrongHandle(%d)\n", handle);
681 mOut.writeInt32(BC_ACQUIRE);
682 mOut.writeInt32(handle);
683 // Create a temp reference until the driver has handled this command.
684 proxy->incStrong(mProcess.get());
685 mPostWriteStrongDerefs.push(proxy);
686 }
687
decStrongHandle(int32_t handle)688 void IPCThreadState::decStrongHandle(int32_t handle)
689 {
690 LOG_REMOTEREFS("IPCThreadState::decStrongHandle(%d)\n", handle);
691 mOut.writeInt32(BC_RELEASE);
692 mOut.writeInt32(handle);
693 }
694
incWeakHandle(int32_t handle,BpHwBinder * proxy)695 void IPCThreadState::incWeakHandle(int32_t handle, BpHwBinder *proxy)
696 {
697 LOG_REMOTEREFS("IPCThreadState::incWeakHandle(%d)\n", handle);
698 mOut.writeInt32(BC_INCREFS);
699 mOut.writeInt32(handle);
700 // Create a temp reference until the driver has handled this command.
701 proxy->getWeakRefs()->incWeak(mProcess.get());
702 mPostWriteWeakDerefs.push(proxy->getWeakRefs());
703 }
704
decWeakHandle(int32_t handle)705 void IPCThreadState::decWeakHandle(int32_t handle)
706 {
707 LOG_REMOTEREFS("IPCThreadState::decWeakHandle(%d)\n", handle);
708 mOut.writeInt32(BC_DECREFS);
709 mOut.writeInt32(handle);
710 }
711
attemptIncStrongHandle(int32_t handle)712 status_t IPCThreadState::attemptIncStrongHandle(int32_t handle)
713 {
714 #if HAS_BC_ATTEMPT_ACQUIRE
715 LOG_REMOTEREFS("IPCThreadState::attemptIncStrongHandle(%d)\n", handle);
716 mOut.writeInt32(BC_ATTEMPT_ACQUIRE);
717 mOut.writeInt32(0); // xxx was thread priority
718 mOut.writeInt32(handle);
719 status_t result = UNKNOWN_ERROR;
720
721 waitForResponse(nullptr, &result);
722
723 #if LOG_REFCOUNTS
724 ALOGV("IPCThreadState::attemptIncStrongHandle(%ld) = %s\n",
725 handle, result == NO_ERROR ? "SUCCESS" : "FAILURE");
726 #endif
727
728 return result;
729 #else
730 (void)handle;
731 ALOGE("%s(%d): Not supported\n", __func__, handle);
732 return INVALID_OPERATION;
733 #endif
734 }
735
expungeHandle(int32_t handle,IBinder * binder)736 void IPCThreadState::expungeHandle(int32_t handle, IBinder* binder)
737 {
738 #if LOG_REFCOUNTS
739 ALOGV("IPCThreadState::expungeHandle(%ld)\n", handle);
740 #endif
741 self()->mProcess->expungeHandle(handle, binder); // NOLINT
742 }
743
requestDeathNotification(int32_t handle,BpHwBinder * proxy)744 status_t IPCThreadState::requestDeathNotification(int32_t handle, BpHwBinder* proxy)
745 {
746 mOut.writeInt32(BC_REQUEST_DEATH_NOTIFICATION);
747 mOut.writeInt32((int32_t)handle);
748 mOut.writePointer((uintptr_t)proxy);
749 return NO_ERROR;
750 }
751
clearDeathNotification(int32_t handle,BpHwBinder * proxy)752 status_t IPCThreadState::clearDeathNotification(int32_t handle, BpHwBinder* proxy)
753 {
754 mOut.writeInt32(BC_CLEAR_DEATH_NOTIFICATION);
755 mOut.writeInt32((int32_t)handle);
756 mOut.writePointer((uintptr_t)proxy);
757 return NO_ERROR;
758 }
759
IPCThreadState()760 IPCThreadState::IPCThreadState()
761 : mProcess(ProcessState::self()),
762 mServingStackPointer(nullptr),
763 mStrictModePolicy(0),
764 mLastTransactionBinderFlags(0),
765 mIsLooper(false),
766 mIsPollingThread(false),
767 mCallRestriction(mProcess->mCallRestriction) {
768 pthread_setspecific(gTLS, this);
769 clearCaller();
770 mIn.setDataCapacity(256);
771 mOut.setDataCapacity(256);
772 }
773
~IPCThreadState()774 IPCThreadState::~IPCThreadState()
775 {
776 }
777
sendReply(const Parcel & reply,uint32_t flags)778 status_t IPCThreadState::sendReply(const Parcel& reply, uint32_t flags)
779 {
780 status_t err;
781 status_t statusBuffer;
782 err = writeTransactionData(BC_REPLY_SG, flags, -1, 0, reply, &statusBuffer);
783 if (err < NO_ERROR) return err;
784
785 return waitForResponse(nullptr, nullptr);
786 }
787
waitForResponse(Parcel * reply,status_t * acquireResult)788 status_t IPCThreadState::waitForResponse(Parcel *reply, status_t *acquireResult)
789 {
790 uint32_t cmd;
791 int32_t err;
792
793 while (1) {
794 if ((err=talkWithDriver()) < NO_ERROR) break;
795 err = mIn.errorCheck();
796 if (err < NO_ERROR) break;
797 if (mIn.dataAvail() == 0) continue;
798
799 cmd = (uint32_t)mIn.readInt32();
800
801 IF_LOG_COMMANDS() {
802 alog << "Processing waitForResponse Command: "
803 << getReturnString(cmd) << endl;
804 }
805
806 switch (cmd) {
807 case BR_ONEWAY_SPAM_SUSPECT:
808 ALOGE("Process seems to be sending too many oneway calls.");
809 CallStack::logStack("oneway spamming", CallStack::getCurrent().get(),
810 ANDROID_LOG_ERROR);
811 [[fallthrough]];
812 case BR_TRANSACTION_COMPLETE:
813 if (!reply && !acquireResult) goto finish;
814 break;
815
816 case BR_DEAD_REPLY:
817 err = DEAD_OBJECT;
818 goto finish;
819
820 case BR_FAILED_REPLY:
821 err = FAILED_TRANSACTION;
822 goto finish;
823
824 case BR_ACQUIRE_RESULT:
825 {
826 ALOG_ASSERT(acquireResult != nullptr, "Unexpected brACQUIRE_RESULT");
827 const int32_t result = mIn.readInt32();
828 if (!acquireResult) continue;
829 *acquireResult = result ? NO_ERROR : INVALID_OPERATION;
830 }
831 goto finish;
832
833 case BR_REPLY:
834 {
835 binder_transaction_data tr;
836 err = mIn.read(&tr, sizeof(tr));
837 ALOG_ASSERT(err == NO_ERROR, "Not enough command data for brREPLY");
838 if (err != NO_ERROR) goto finish;
839
840 if (reply) {
841 if ((tr.flags & TF_STATUS_CODE) == 0) {
842 reply->ipcSetDataReference(
843 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
844 tr.data_size,
845 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
846 tr.offsets_size/sizeof(binder_size_t),
847 freeBuffer, this);
848 } else {
849 err = *reinterpret_cast<const status_t*>(tr.data.ptr.buffer);
850 freeBuffer(nullptr,
851 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
852 tr.data_size,
853 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
854 tr.offsets_size/sizeof(binder_size_t), this);
855 }
856 } else {
857 freeBuffer(nullptr,
858 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
859 tr.data_size,
860 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
861 tr.offsets_size/sizeof(binder_size_t), this);
862 continue;
863 }
864 }
865 goto finish;
866
867 default:
868 err = executeCommand(cmd);
869 if (err != NO_ERROR) goto finish;
870 break;
871 }
872 }
873
874 finish:
875 if (err != NO_ERROR) {
876 if (acquireResult) *acquireResult = err;
877 if (reply) reply->setError(err);
878 mLastError = err;
879 }
880
881 return err;
882 }
883
talkWithDriver(bool doReceive)884 status_t IPCThreadState::talkWithDriver(bool doReceive)
885 {
886 if (mProcess->mDriverFD < 0) {
887 return -EBADF;
888 }
889
890 binder_write_read bwr;
891
892 // Is the read buffer empty?
893 const bool needRead = mIn.dataPosition() >= mIn.dataSize();
894
895 // We don't want to write anything if we are still reading
896 // from data left in the input buffer and the caller
897 // has requested to read the next data.
898 const size_t outAvail = (!doReceive || needRead) ? mOut.dataSize() : 0;
899
900 bwr.write_size = outAvail;
901 bwr.write_buffer = (uintptr_t)mOut.data();
902
903 // This is what we'll read.
904 if (doReceive && needRead) {
905 bwr.read_size = mIn.dataCapacity();
906 bwr.read_buffer = (uintptr_t)mIn.data();
907 } else {
908 bwr.read_size = 0;
909 bwr.read_buffer = 0;
910 }
911
912 IF_LOG_COMMANDS() {
913 if (outAvail != 0) {
914 alog << "Sending commands to driver: " << indent;
915 const void* cmds = (const void*)bwr.write_buffer;
916 const void* end = ((const uint8_t*)cmds)+bwr.write_size;
917 alog << HexDump(cmds, bwr.write_size) << endl;
918 while (cmds < end) cmds = printCommand(alog, cmds);
919 alog << dedent;
920 }
921 alog << "Size of receive buffer: " << bwr.read_size
922 << ", needRead: " << needRead << ", doReceive: " << doReceive << endl;
923 }
924
925 // Return immediately if there is nothing to do.
926 if ((bwr.write_size == 0) && (bwr.read_size == 0)) return NO_ERROR;
927
928 bwr.write_consumed = 0;
929 bwr.read_consumed = 0;
930 status_t err;
931 do {
932 IF_LOG_COMMANDS() {
933 alog << "About to read/write, write size = " << mOut.dataSize() << endl;
934 }
935 #if defined(__ANDROID__)
936 if (ioctl(mProcess->mDriverFD, BINDER_WRITE_READ, &bwr) >= 0)
937 err = NO_ERROR;
938 else
939 err = -errno;
940 #else
941 err = INVALID_OPERATION;
942 #endif
943 if (mProcess->mDriverFD < 0) {
944 err = -EBADF;
945 }
946 IF_LOG_COMMANDS() {
947 alog << "Finished read/write, write size = " << mOut.dataSize() << endl;
948 }
949 } while (err == -EINTR);
950
951 IF_LOG_COMMANDS() {
952 alog << "Our err: " << (void*)(intptr_t)err << ", write consumed: "
953 << bwr.write_consumed << " (of " << mOut.dataSize()
954 << "), read consumed: " << bwr.read_consumed << endl;
955 }
956
957 if (err >= NO_ERROR) {
958 if (bwr.write_consumed > 0) {
959 if (bwr.write_consumed < mOut.dataSize())
960 LOG_ALWAYS_FATAL("Driver did not consume write buffer. "
961 "err: %s consumed: %zu of %zu",
962 statusToString(err).c_str(),
963 (size_t)bwr.write_consumed,
964 mOut.dataSize());
965 else {
966 mOut.setDataSize(0);
967 processPostWriteDerefs();
968 }
969 }
970 if (bwr.read_consumed > 0) {
971 mIn.setDataSize(bwr.read_consumed);
972 mIn.setDataPosition(0);
973 }
974 IF_LOG_COMMANDS() {
975 alog << "Remaining data size: " << mOut.dataSize() << endl;
976 alog << "Received commands from driver: " << indent;
977 const void* cmds = mIn.data();
978 const void* end = mIn.data() + mIn.dataSize();
979 alog << HexDump(cmds, mIn.dataSize()) << endl;
980 while (cmds < end) cmds = printReturnCommand(alog, cmds);
981 alog << dedent;
982 }
983 return NO_ERROR;
984 }
985
986 return err;
987 }
988
writeTransactionData(int32_t cmd,uint32_t binderFlags,int32_t handle,uint32_t code,const Parcel & data,status_t * statusBuffer)989 status_t IPCThreadState::writeTransactionData(int32_t cmd, uint32_t binderFlags,
990 int32_t handle, uint32_t code, const Parcel& data, status_t* statusBuffer)
991 {
992 binder_transaction_data_sg tr_sg;
993 /* Don't pass uninitialized stack data to a remote process */
994 tr_sg.transaction_data.target.ptr = 0;
995 tr_sg.transaction_data.target.handle = handle;
996 tr_sg.transaction_data.code = code;
997 tr_sg.transaction_data.flags = binderFlags;
998 tr_sg.transaction_data.cookie = 0;
999 tr_sg.transaction_data.sender_pid = 0;
1000 tr_sg.transaction_data.sender_euid = 0;
1001
1002 const status_t err = data.errorCheck();
1003 if (err == NO_ERROR) {
1004 tr_sg.transaction_data.data_size = data.ipcDataSize();
1005 tr_sg.transaction_data.data.ptr.buffer = data.ipcData();
1006 tr_sg.transaction_data.offsets_size = data.ipcObjectsCount()*sizeof(binder_size_t);
1007 tr_sg.transaction_data.data.ptr.offsets = data.ipcObjects();
1008 tr_sg.buffers_size = data.ipcBufferSize();
1009 } else if (statusBuffer) {
1010 tr_sg.transaction_data.flags |= TF_STATUS_CODE;
1011 *statusBuffer = err;
1012 tr_sg.transaction_data.data_size = sizeof(status_t);
1013 tr_sg.transaction_data.data.ptr.buffer = reinterpret_cast<uintptr_t>(statusBuffer);
1014 tr_sg.transaction_data.offsets_size = 0;
1015 tr_sg.transaction_data.data.ptr.offsets = 0;
1016 tr_sg.buffers_size = 0;
1017 } else {
1018 return (mLastError = err);
1019 }
1020
1021 mOut.writeInt32(cmd);
1022 mOut.write(&tr_sg, sizeof(tr_sg));
1023
1024 return NO_ERROR;
1025 }
1026
1027 sp<BHwBinder> the_context_object;
1028
setTheContextObject(sp<BHwBinder> obj)1029 void IPCThreadState::setTheContextObject(sp<BHwBinder> obj)
1030 {
1031 the_context_object = obj;
1032 }
1033
isLooperThread()1034 bool IPCThreadState::isLooperThread()
1035 {
1036 return mIsLooper;
1037 }
1038
isOnlyBinderThread()1039 bool IPCThreadState::isOnlyBinderThread() {
1040 return (mIsLooper && mProcess->mMaxThreads <= 1) || mIsPollingThread;
1041 }
1042
addPostCommandTask(const std::function<void (void)> & task)1043 void IPCThreadState::addPostCommandTask(const std::function<void(void)>& task) {
1044 mPostCommandTasks.push_back(task);
1045 }
1046
executeCommand(int32_t cmd)1047 status_t IPCThreadState::executeCommand(int32_t cmd)
1048 {
1049 BHwBinder* obj;
1050 RefBase::weakref_type* refs;
1051 status_t result = NO_ERROR;
1052 switch ((uint32_t)cmd) {
1053 case BR_ERROR:
1054 result = mIn.readInt32();
1055 break;
1056
1057 case BR_OK:
1058 break;
1059
1060 case BR_ACQUIRE:
1061 refs = (RefBase::weakref_type*)mIn.readPointer();
1062 obj = (BHwBinder*)mIn.readPointer();
1063 ALOG_ASSERT(refs->refBase() == obj,
1064 "BR_ACQUIRE: object %p does not match cookie %p (expected %p)",
1065 refs, obj, refs->refBase());
1066 obj->incStrong(mProcess.get());
1067 IF_LOG_REMOTEREFS() {
1068 LOG_REMOTEREFS("BR_ACQUIRE from driver on %p", obj);
1069 obj->printRefs();
1070 }
1071 mOut.writeInt32(BC_ACQUIRE_DONE);
1072 mOut.writePointer((uintptr_t)refs);
1073 mOut.writePointer((uintptr_t)obj);
1074 break;
1075
1076 case BR_RELEASE:
1077 refs = (RefBase::weakref_type*)mIn.readPointer();
1078 obj = (BHwBinder*)mIn.readPointer();
1079 ALOG_ASSERT(refs->refBase() == obj,
1080 "BR_RELEASE: object %p does not match cookie %p (expected %p)",
1081 refs, obj, refs->refBase());
1082 IF_LOG_REMOTEREFS() {
1083 LOG_REMOTEREFS("BR_RELEASE from driver on %p", obj);
1084 obj->printRefs();
1085 }
1086 mPendingStrongDerefs.push(obj);
1087 break;
1088
1089 case BR_INCREFS:
1090 refs = (RefBase::weakref_type*)mIn.readPointer();
1091 obj = (BHwBinder*)mIn.readPointer();
1092 refs->incWeak(mProcess.get());
1093 mOut.writeInt32(BC_INCREFS_DONE);
1094 mOut.writePointer((uintptr_t)refs);
1095 mOut.writePointer((uintptr_t)obj);
1096 break;
1097
1098 case BR_DECREFS:
1099 refs = (RefBase::weakref_type*)mIn.readPointer();
1100 obj = (BHwBinder*)mIn.readPointer();
1101 // NOTE: This assertion is not valid, because the object may no
1102 // longer exist (thus the (BHwBinder*)cast above resulting in a different
1103 // memory address).
1104 //ALOG_ASSERT(refs->refBase() == obj,
1105 // "BR_DECREFS: object %p does not match cookie %p (expected %p)",
1106 // refs, obj, refs->refBase());
1107 mPendingWeakDerefs.push(refs);
1108 break;
1109
1110 case BR_ATTEMPT_ACQUIRE:
1111 refs = (RefBase::weakref_type*)mIn.readPointer();
1112 obj = (BHwBinder*)mIn.readPointer();
1113
1114 {
1115 const bool success = refs->attemptIncStrong(mProcess.get());
1116 ALOG_ASSERT(success && refs->refBase() == obj,
1117 "BR_ATTEMPT_ACQUIRE: object %p does not match cookie %p (expected %p)",
1118 refs, obj, refs->refBase());
1119
1120 mOut.writeInt32(BC_ACQUIRE_RESULT);
1121 mOut.writeInt32((int32_t)success);
1122 }
1123 break;
1124
1125 case BR_TRANSACTION_SEC_CTX:
1126 case BR_TRANSACTION:
1127 {
1128 binder_transaction_data_secctx tr_secctx;
1129 binder_transaction_data& tr = tr_secctx.transaction_data;
1130
1131 if (cmd == BR_TRANSACTION_SEC_CTX) {
1132 result = mIn.read(&tr_secctx, sizeof(tr_secctx));
1133 } else {
1134 result = mIn.read(&tr, sizeof(tr));
1135 tr_secctx.secctx = 0;
1136 }
1137
1138 ALOG_ASSERT(result == NO_ERROR,
1139 "Not enough command data for brTRANSACTION");
1140 if (result != NO_ERROR) break;
1141
1142 Parcel buffer;
1143 buffer.ipcSetDataReference(
1144 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
1145 tr.data_size,
1146 reinterpret_cast<const binder_size_t*>(tr.data.ptr.offsets),
1147 tr.offsets_size/sizeof(binder_size_t), freeBuffer, this);
1148
1149 const void* origServingStackPointer = mServingStackPointer;
1150 mServingStackPointer = &origServingStackPointer; // anything on the stack
1151
1152 const pid_t origPid = mCallingPid;
1153 const char* origSid = mCallingSid;
1154 const uid_t origUid = mCallingUid;
1155 const int32_t origStrictModePolicy = mStrictModePolicy;
1156 const int32_t origTransactionBinderFlags = mLastTransactionBinderFlags;
1157
1158 mCallingPid = tr.sender_pid;
1159 mCallingSid = reinterpret_cast<const char*>(tr_secctx.secctx);
1160 mCallingUid = tr.sender_euid;
1161 mLastTransactionBinderFlags = tr.flags;
1162
1163 // ALOGI(">>>> TRANSACT from pid %d sid %s uid %d\n", mCallingPid,
1164 // (mCallingSid ? mCallingSid : "<N/A>"), mCallingUid);
1165
1166 Parcel reply;
1167 status_t error;
1168 bool reply_sent = false;
1169 IF_LOG_TRANSACTIONS() {
1170 alog << "BR_TRANSACTION thr " << (void*)pthread_self()
1171 << " / obj " << tr.target.ptr << " / code "
1172 << TypeCode(tr.code) << ": " << indent << buffer
1173 << dedent << endl
1174 << "Data addr = "
1175 << reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer)
1176 << ", offsets addr="
1177 << reinterpret_cast<const size_t*>(tr.data.ptr.offsets) << endl;
1178 }
1179
1180 constexpr size_t kForwardReplyFlags = TF_CLEAR_BUF;
1181
1182 auto reply_callback = [&] (auto &replyParcel) {
1183 if (reply_sent) {
1184 // Reply was sent earlier, ignore it.
1185 ALOGE("Dropping binder reply, it was sent already.");
1186 return;
1187 }
1188 reply_sent = true;
1189 if ((tr.flags & TF_ONE_WAY) == 0) {
1190 replyParcel.setError(NO_ERROR);
1191 sendReply(replyParcel, (tr.flags & kForwardReplyFlags));
1192 } else {
1193 ALOGE("Not sending reply in one-way transaction");
1194 }
1195 };
1196
1197 if (tr.target.ptr) {
1198 // We only have a weak reference on the target object, so we must first try to
1199 // safely acquire a strong reference before doing anything else with it.
1200 if (reinterpret_cast<RefBase::weakref_type*>(
1201 tr.target.ptr)->attemptIncStrong(this)) {
1202 error = reinterpret_cast<BHwBinder*>(tr.cookie)->transact(tr.code, buffer,
1203 &reply, tr.flags, reply_callback);
1204 reinterpret_cast<BHwBinder*>(tr.cookie)->decStrong(this);
1205 } else {
1206 error = UNKNOWN_TRANSACTION;
1207 }
1208
1209 } else {
1210 error = the_context_object->transact(tr.code, buffer, &reply, tr.flags, reply_callback);
1211 }
1212
1213 if ((tr.flags & TF_ONE_WAY) == 0) {
1214 if (!reply_sent) {
1215 // Should have been a reply but there wasn't, so there
1216 // must have been an error instead.
1217 reply.setError(error);
1218 sendReply(reply, (tr.flags & kForwardReplyFlags));
1219 } else {
1220 if (error != NO_ERROR) {
1221 ALOGE("transact() returned error after sending reply.");
1222 } else {
1223 // Ok, reply sent and transact didn't return an error.
1224 }
1225 }
1226 } else {
1227 // One-way transaction, don't care about return value or reply.
1228 }
1229
1230 //ALOGI("<<<< TRANSACT from pid %d restore pid %d sid %s uid %d\n",
1231 // mCallingPid, origPid, (origSid ? origSid : "<N/A>"), origUid);
1232
1233 mServingStackPointer = origServingStackPointer;
1234 mCallingPid = origPid;
1235 mCallingSid = origSid;
1236 mCallingUid = origUid;
1237 mStrictModePolicy = origStrictModePolicy;
1238 mLastTransactionBinderFlags = origTransactionBinderFlags;
1239
1240 IF_LOG_TRANSACTIONS() {
1241 alog << "BC_REPLY thr " << (void*)pthread_self() << " / obj "
1242 << tr.target.ptr << ": " << indent << reply << dedent << endl;
1243 }
1244
1245 }
1246 break;
1247
1248 case BR_DEAD_BINDER:
1249 {
1250 BpHwBinder *proxy = (BpHwBinder*)mIn.readPointer();
1251 proxy->sendObituary();
1252 mOut.writeInt32(BC_DEAD_BINDER_DONE);
1253 mOut.writePointer((uintptr_t)proxy);
1254 } break;
1255
1256 case BR_CLEAR_DEATH_NOTIFICATION_DONE:
1257 {
1258 BpHwBinder *proxy = (BpHwBinder*)mIn.readPointer();
1259 proxy->getWeakRefs()->decWeak(proxy);
1260 } break;
1261
1262 case BR_FINISHED:
1263 result = TIMED_OUT;
1264 break;
1265
1266 case BR_NOOP:
1267 break;
1268
1269 case BR_SPAWN_LOOPER:
1270 mProcess->spawnPooledThread(false);
1271 break;
1272
1273 default:
1274 ALOGE("*** BAD COMMAND %d received from Binder driver\n", cmd);
1275 result = UNKNOWN_ERROR;
1276 break;
1277 }
1278
1279 if (result != NO_ERROR) {
1280 mLastError = result;
1281 }
1282
1283 return result;
1284 }
1285
getServingStackPointer() const1286 const void* IPCThreadState::getServingStackPointer() const {
1287 return mServingStackPointer;
1288 }
1289
threadDestructor(void * st)1290 void IPCThreadState::threadDestructor(void *st)
1291 {
1292 IPCThreadState* const self = static_cast<IPCThreadState*>(st);
1293 if (self) {
1294 self->flushCommands();
1295 #if defined(__ANDROID__)
1296 if (self->mProcess->mDriverFD >= 0) {
1297 ioctl(self->mProcess->mDriverFD, BINDER_THREAD_EXIT, 0);
1298 }
1299 #endif
1300 delete self;
1301 }
1302 }
1303
1304
freeBuffer(Parcel * parcel,const uint8_t * data,size_t,const binder_size_t *,size_t,void *)1305 void IPCThreadState::freeBuffer(Parcel* parcel, const uint8_t* data,
1306 size_t /*dataSize*/,
1307 const binder_size_t* /*objects*/,
1308 size_t /*objectsSize*/, void* /*cookie*/)
1309 {
1310 //ALOGI("Freeing parcel %p", &parcel);
1311 IF_LOG_COMMANDS() {
1312 alog << "Writing BC_FREE_BUFFER for " << data << endl;
1313 }
1314 ALOG_ASSERT(data != nullptr, "Called with NULL data");
1315 if (parcel != nullptr) parcel->closeFileDescriptors();
1316 IPCThreadState* state = self();
1317 state->mOut.writeInt32(BC_FREE_BUFFER);
1318 state->mOut.writePointer((uintptr_t)data);
1319 }
1320
1321 } // namespace hardware
1322 } // namespace android
1323