1 /*
2 * Copyright (C) 2021 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include <sysexits.h>
18 #include <unistd.h>
19
20 #include <filesystem>
21 #include <iostream>
22
23 #include <android-base/logging.h>
24 #include <android-base/properties.h>
25 #include <android/debug/BnAdbCallback.h>
26 #include <android/debug/IAdbManager.h>
27 #include <android/os/BnServiceManager.h>
28 #include <android/os/IServiceManager.h>
29 #include <binder/IServiceManager.h>
30 #include <binder/ProcessState.h>
31 #include <binder/RpcServer.h>
32
33 #include "file.h"
34
35 using android::BBinder;
36 using android::defaultServiceManager;
37 using android::OK;
38 using android::RpcServer;
39 using android::sp;
40 using android::status_t;
41 using android::statusToString;
42 using android::String16;
43 using android::base::GetBoolProperty;
44 using android::base::InitLogging;
45 using android::base::LogdLogger;
46 using android::base::LogId;
47 using android::base::LogSeverity;
48 using android::base::StdioLogger;
49 using std::string_view_literals::operator""sv;
50
51 namespace {
52
53 const char* kLocalInetAddress = "127.0.0.1";
54 using ServiceRetriever = decltype(&android::IServiceManager::checkService);
55 using android::debug::IAdbManager;
56
Usage(std::filesystem::path program)57 int Usage(std::filesystem::path program) {
58 auto basename = program.filename();
59 // clang-format off
60 LOG(ERROR) << R"(dispatch calls to RPC service.
61 Usage:
62 )" << basename << R"( [-g] [-i <ip_address>] <service_name>
63 <service_name>: the service to connect to.
64 )" << basename << R"( [-g] manager
65 Runs an RPC-friendly service that redirects calls to servicemanager.
66
67 -g: use getService() instead of checkService().
68 -i: use ip_address when setting up the server instead of '127.0.0.1'
69
70 If successful, writes port number and a new line character to stdout, and
71 blocks until killed.
72 Otherwise, writes error message to stderr and exits with non-zero code.
73 )";
74 // clang-format on
75 return EX_USAGE;
76 }
77
Dispatch(const char * name,const ServiceRetriever & serviceRetriever,const char * ip_address=kLocalInetAddress)78 int Dispatch(const char* name, const ServiceRetriever& serviceRetriever,
79 const char* ip_address = kLocalInetAddress) {
80 auto sm = defaultServiceManager();
81 if (nullptr == sm) {
82 LOG(ERROR) << "No servicemanager";
83 return EX_SOFTWARE;
84 }
85 auto binder = std::invoke(serviceRetriever, defaultServiceManager(), String16(name));
86 if (nullptr == binder) {
87 LOG(ERROR) << "No service \"" << name << "\"";
88 return EX_SOFTWARE;
89 }
90 auto rpcServer = RpcServer::make();
91 if (nullptr == rpcServer) {
92 LOG(ERROR) << "Cannot create RpcServer";
93 return EX_SOFTWARE;
94 }
95 unsigned int port;
96 if (status_t status = rpcServer->setupInetServer(ip_address, 0, &port); status != OK) {
97 LOG(ERROR) << "setupInetServer failed: " << statusToString(status);
98 return EX_SOFTWARE;
99 }
100 auto socket = rpcServer->releaseServer();
101 auto keepAliveBinder = sp<BBinder>::make();
102 auto status = binder->setRpcClientDebug(std::move(socket), keepAliveBinder);
103 if (status != OK) {
104 LOG(ERROR) << "setRpcClientDebug failed with " << statusToString(status);
105 return EX_SOFTWARE;
106 }
107 LOG(INFO) << "Finish setting up RPC on service " << name << " on port " << port;
108
109 std::cout << port << std::endl;
110
111 TEMP_FAILURE_RETRY(pause());
112
113 PLOG(FATAL) << "TEMP_FAILURE_RETRY(pause()) exits; this should not happen!";
114 __builtin_unreachable();
115 }
116
117 // Wrapper that wraps a BpServiceManager as a BnServiceManager.
118 class ServiceManagerProxyToNative : public android::os::BnServiceManager {
119 public:
ServiceManagerProxyToNative(const sp<android::os::IServiceManager> & impl)120 ServiceManagerProxyToNative(const sp<android::os::IServiceManager>& impl) : mImpl(impl) {}
getService(const std::string &,android::sp<android::IBinder> *)121 android::binder::Status getService(const std::string&,
122 android::sp<android::IBinder>*) override {
123 // We can't send BpBinder for regular binder over RPC.
124 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
125 }
getService2(const std::string &,android::os::Service *)126 android::binder::Status getService2(const std::string&, android::os::Service*) override {
127 // We can't send BpBinder for regular binder over RPC.
128 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
129 }
checkService(const std::string &,android::sp<android::IBinder> *)130 android::binder::Status checkService(const std::string&,
131 android::sp<android::IBinder>*) override {
132 // We can't send BpBinder for regular binder over RPC.
133 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
134 }
checkService2(const std::string &,android::os::Service *)135 android::binder::Status checkService2(const std::string&, android::os::Service*) override {
136 // We can't send BpBinder for regular binder over RPC.
137 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
138 }
addService(const std::string &,const android::sp<android::IBinder> &,bool,int32_t)139 android::binder::Status addService(const std::string&, const android::sp<android::IBinder>&,
140 bool, int32_t) override {
141 // We can't send BpBinder for RPC over regular binder.
142 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
143 }
listServices(int32_t dumpPriority,std::vector<std::string> * _aidl_return)144 android::binder::Status listServices(int32_t dumpPriority,
145 std::vector<std::string>* _aidl_return) override {
146 return mImpl->listServices(dumpPriority, _aidl_return);
147 }
registerForNotifications(const std::string &,const android::sp<android::os::IServiceCallback> &)148 android::binder::Status registerForNotifications(
149 const std::string&, const android::sp<android::os::IServiceCallback>&) override {
150 // We can't send BpBinder for RPC over regular binder.
151 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
152 }
unregisterForNotifications(const std::string &,const android::sp<android::os::IServiceCallback> &)153 android::binder::Status unregisterForNotifications(
154 const std::string&, const android::sp<android::os::IServiceCallback>&) override {
155 // We can't send BpBinder for RPC over regular binder.
156 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
157 }
isDeclared(const std::string & name,bool * _aidl_return)158 android::binder::Status isDeclared(const std::string& name, bool* _aidl_return) override {
159 return mImpl->isDeclared(name, _aidl_return);
160 }
getDeclaredInstances(const std::string & iface,std::vector<std::string> * _aidl_return)161 android::binder::Status getDeclaredInstances(const std::string& iface,
162 std::vector<std::string>* _aidl_return) override {
163 return mImpl->getDeclaredInstances(iface, _aidl_return);
164 }
updatableViaApex(const std::string & name,std::optional<std::string> * _aidl_return)165 android::binder::Status updatableViaApex(const std::string& name,
166 std::optional<std::string>* _aidl_return) override {
167 return mImpl->updatableViaApex(name, _aidl_return);
168 }
getUpdatableNames(const std::string & apexName,std::vector<std::string> * _aidl_return)169 android::binder::Status getUpdatableNames(const std::string& apexName,
170 std::vector<std::string>* _aidl_return) override {
171 return mImpl->getUpdatableNames(apexName, _aidl_return);
172 }
getConnectionInfo(const std::string & name,std::optional<android::os::ConnectionInfo> * _aidl_return)173 android::binder::Status getConnectionInfo(
174 const std::string& name,
175 std::optional<android::os::ConnectionInfo>* _aidl_return) override {
176 return mImpl->getConnectionInfo(name, _aidl_return);
177 }
registerClientCallback(const std::string &,const android::sp<android::IBinder> &,const android::sp<android::os::IClientCallback> &)178 android::binder::Status registerClientCallback(
179 const std::string&, const android::sp<android::IBinder>&,
180 const android::sp<android::os::IClientCallback>&) override {
181 // We can't send BpBinder for RPC over regular binder.
182 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
183 }
tryUnregisterService(const std::string &,const android::sp<android::IBinder> &)184 android::binder::Status tryUnregisterService(const std::string&,
185 const android::sp<android::IBinder>&) override {
186 // We can't send BpBinder for RPC over regular binder.
187 return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
188 }
getServiceDebugInfo(std::vector<android::os::ServiceDebugInfo> * _aidl_return)189 android::binder::Status getServiceDebugInfo(
190 std::vector<android::os::ServiceDebugInfo>* _aidl_return) override {
191 return mImpl->getServiceDebugInfo(_aidl_return);
192 }
193
194 private:
195 sp<android::os::IServiceManager> mImpl;
196 };
197
198 // Workaround for b/191059588.
199 // TODO(b/191059588): Once we can run RpcServer on single-threaded services,
200 // `servicedispatcher manager` should call Dispatch("manager") directly.
wrapServiceManager(const ServiceRetriever & serviceRetriever,const char * ip_address=kLocalInetAddress)201 int wrapServiceManager(const ServiceRetriever& serviceRetriever,
202 const char* ip_address = kLocalInetAddress) {
203 auto sm = defaultServiceManager();
204 if (nullptr == sm) {
205 LOG(ERROR) << "No servicemanager";
206 return EX_SOFTWARE;
207 }
208 auto service = std::invoke(serviceRetriever, defaultServiceManager(), String16("manager"));
209 if (nullptr == service) {
210 LOG(ERROR) << "No service called `manager`";
211 return EX_SOFTWARE;
212 }
213 auto interface = android::os::IServiceManager::asInterface(service);
214 if (nullptr == interface) {
215 LOG(ERROR) << "Cannot cast service called `manager` to IServiceManager";
216 return EX_SOFTWARE;
217 }
218
219 // Work around restriction that doesn't allow us to send proxy over RPC.
220 interface = sp<ServiceManagerProxyToNative>::make(interface);
221 service = ServiceManagerProxyToNative::asBinder(interface);
222
223 auto rpcServer = RpcServer::make();
224 rpcServer->setRootObject(service);
225 unsigned int port;
226 if (status_t status = rpcServer->setupInetServer(ip_address, 0, &port); status != OK) {
227 LOG(ERROR) << "Unable to set up inet server: " << statusToString(status);
228 return EX_SOFTWARE;
229 }
230 LOG(INFO) << "Finish wrapping servicemanager with RPC on port " << port;
231 std::cout << port << std::endl;
232 rpcServer->join();
233
234 LOG(FATAL) << "Wrapped servicemanager exits; this should not happen!";
235 __builtin_unreachable();
236 }
237
238 class AdbCallback : public android::debug::BnAdbCallback {
239 public:
onDebuggingChanged(bool enabled,android::debug::AdbTransportType)240 android::binder::Status onDebuggingChanged(bool enabled,
241 android::debug::AdbTransportType) override {
242 if (!enabled) {
243 LOG(ERROR) << "ADB debugging disabled, exiting.";
244 exit(EX_SOFTWARE);
245 }
246 return android::binder::Status::ok();
247 }
248 };
249
exitOnAdbDebuggingDisabled()250 void exitOnAdbDebuggingDisabled() {
251 auto adb = android::waitForService<IAdbManager>(String16("adb"));
252 CHECK(adb != nullptr) << "Unable to retrieve service adb";
253 auto status = adb->registerCallback(sp<AdbCallback>::make());
254 CHECK(status.isOk()) << "Unable to call IAdbManager::registerCallback: " << status;
255 }
256
257 // Log to logd. For warning and more severe messages, also log to stderr.
258 class ServiceDispatcherLogger {
259 public:
operator ()(LogId id,LogSeverity severity,const char * tag,const char * file,unsigned int line,const char * message)260 void operator()(LogId id, LogSeverity severity, const char* tag, const char* file,
261 unsigned int line, const char* message) {
262 mLogdLogger(id, severity, tag, file, line, message);
263 if (severity >= LogSeverity::WARNING) {
264 std::cout << std::flush;
265 auto progname = std::filesystem::path(getprogname()).filename();
266 std::cerr << progname << ": " << message << std::endl;
267 }
268 }
269
270 private:
271 LogdLogger mLogdLogger{};
272 };
273
274 } // namespace
275
main(int argc,char * argv[])276 int main(int argc, char* argv[]) {
277 InitLogging(argv, ServiceDispatcherLogger());
278
279 if (!GetBoolProperty("ro.debuggable", false)) {
280 LOG(ERROR) << "servicedispatcher is only allowed on debuggable builds.";
281 return EX_NOPERM;
282 }
283 LOG(WARNING) << "WARNING: servicedispatcher is debug only. Use with caution.";
284
285 int opt;
286 ServiceRetriever serviceRetriever = &android::IServiceManager::checkService;
287 char* ip_address = nullptr;
288 while (-1 != (opt = getopt(argc, argv, "gi:"))) {
289 switch (opt) {
290 case 'g': {
291 #pragma clang diagnostic push
292 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
293 serviceRetriever = &android::IServiceManager::getService;
294 #pragma clang diagnostic pop
295 } break;
296 case 'i': {
297 ip_address = optarg;
298 } break;
299 default: {
300 return Usage(argv[0]);
301 }
302 }
303 }
304
305 android::ProcessState::self()->setThreadPoolMaxThreadCount(1);
306 android::ProcessState::self()->startThreadPool();
307 exitOnAdbDebuggingDisabled();
308
309 if (optind + 1 != argc) return Usage(argv[0]);
310 auto name = argv[optind];
311
312 if (name == "manager"sv) {
313 if (ip_address) {
314 return wrapServiceManager(serviceRetriever, ip_address);
315 } else {
316 return wrapServiceManager(serviceRetriever);
317 }
318 }
319 if (ip_address) {
320 return Dispatch(name, serviceRetriever, ip_address);
321 } else {
322 return Dispatch(name, serviceRetriever);
323 }
324 }
325