• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2021 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include <sysexits.h>
18 #include <unistd.h>
19 
20 #include <filesystem>
21 #include <iostream>
22 
23 #include <android-base/logging.h>
24 #include <android-base/properties.h>
25 #include <android/debug/BnAdbCallback.h>
26 #include <android/debug/IAdbManager.h>
27 #include <android/os/BnServiceManager.h>
28 #include <android/os/IServiceManager.h>
29 #include <binder/IServiceManager.h>
30 #include <binder/ProcessState.h>
31 #include <binder/RpcServer.h>
32 
33 #include "file.h"
34 
35 using android::BBinder;
36 using android::defaultServiceManager;
37 using android::OK;
38 using android::RpcServer;
39 using android::sp;
40 using android::status_t;
41 using android::statusToString;
42 using android::String16;
43 using android::base::GetBoolProperty;
44 using android::base::InitLogging;
45 using android::base::LogdLogger;
46 using android::base::LogId;
47 using android::base::LogSeverity;
48 using android::base::StdioLogger;
49 using std::string_view_literals::operator""sv;
50 
51 namespace {
52 
53 const char* kLocalInetAddress = "127.0.0.1";
54 using ServiceRetriever = decltype(&android::IServiceManager::checkService);
55 using android::debug::IAdbManager;
56 
Usage(std::filesystem::path program)57 int Usage(std::filesystem::path program) {
58     auto basename = program.filename();
59     // clang-format off
60     LOG(ERROR) << R"(dispatch calls to RPC service.
61 Usage:
62   )" << basename << R"( [-g] [-i <ip_address>] <service_name>
63     <service_name>: the service to connect to.
64   )" << basename << R"( [-g] manager
65     Runs an RPC-friendly service that redirects calls to servicemanager.
66 
67   -g: use getService() instead of checkService().
68   -i: use ip_address when setting up the server instead of '127.0.0.1'
69 
70   If successful, writes port number and a new line character to stdout, and
71   blocks until killed.
72   Otherwise, writes error message to stderr and exits with non-zero code.
73 )";
74     // clang-format on
75     return EX_USAGE;
76 }
77 
Dispatch(const char * name,const ServiceRetriever & serviceRetriever,const char * ip_address=kLocalInetAddress)78 int Dispatch(const char* name, const ServiceRetriever& serviceRetriever,
79              const char* ip_address = kLocalInetAddress) {
80     auto sm = defaultServiceManager();
81     if (nullptr == sm) {
82         LOG(ERROR) << "No servicemanager";
83         return EX_SOFTWARE;
84     }
85     auto binder = std::invoke(serviceRetriever, defaultServiceManager(), String16(name));
86     if (nullptr == binder) {
87         LOG(ERROR) << "No service \"" << name << "\"";
88         return EX_SOFTWARE;
89     }
90     auto rpcServer = RpcServer::make();
91     if (nullptr == rpcServer) {
92         LOG(ERROR) << "Cannot create RpcServer";
93         return EX_SOFTWARE;
94     }
95     unsigned int port;
96     if (status_t status = rpcServer->setupInetServer(ip_address, 0, &port); status != OK) {
97         LOG(ERROR) << "setupInetServer failed: " << statusToString(status);
98         return EX_SOFTWARE;
99     }
100     auto socket = rpcServer->releaseServer();
101     auto keepAliveBinder = sp<BBinder>::make();
102     auto status = binder->setRpcClientDebug(std::move(socket), keepAliveBinder);
103     if (status != OK) {
104         LOG(ERROR) << "setRpcClientDebug failed with " << statusToString(status);
105         return EX_SOFTWARE;
106     }
107     LOG(INFO) << "Finish setting up RPC on service " << name << " on port " << port;
108 
109     std::cout << port << std::endl;
110 
111     TEMP_FAILURE_RETRY(pause());
112 
113     PLOG(FATAL) << "TEMP_FAILURE_RETRY(pause()) exits; this should not happen!";
114     __builtin_unreachable();
115 }
116 
117 // Wrapper that wraps a BpServiceManager as a BnServiceManager.
118 class ServiceManagerProxyToNative : public android::os::BnServiceManager {
119 public:
ServiceManagerProxyToNative(const sp<android::os::IServiceManager> & impl)120     ServiceManagerProxyToNative(const sp<android::os::IServiceManager>& impl) : mImpl(impl) {}
getService(const std::string &,android::sp<android::IBinder> *)121     android::binder::Status getService(const std::string&,
122                                        android::sp<android::IBinder>*) override {
123         // We can't send BpBinder for regular binder over RPC.
124         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
125     }
getService2(const std::string &,android::os::Service *)126     android::binder::Status getService2(const std::string&, android::os::Service*) override {
127         // We can't send BpBinder for regular binder over RPC.
128         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
129     }
checkService(const std::string &,android::sp<android::IBinder> *)130     android::binder::Status checkService(const std::string&,
131                                          android::sp<android::IBinder>*) override {
132         // We can't send BpBinder for regular binder over RPC.
133         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
134     }
checkService2(const std::string &,android::os::Service *)135     android::binder::Status checkService2(const std::string&, android::os::Service*) override {
136         // We can't send BpBinder for regular binder over RPC.
137         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
138     }
addService(const std::string &,const android::sp<android::IBinder> &,bool,int32_t)139     android::binder::Status addService(const std::string&, const android::sp<android::IBinder>&,
140                                        bool, int32_t) override {
141         // We can't send BpBinder for RPC over regular binder.
142         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
143     }
listServices(int32_t dumpPriority,std::vector<std::string> * _aidl_return)144     android::binder::Status listServices(int32_t dumpPriority,
145                                          std::vector<std::string>* _aidl_return) override {
146         return mImpl->listServices(dumpPriority, _aidl_return);
147     }
registerForNotifications(const std::string &,const android::sp<android::os::IServiceCallback> &)148     android::binder::Status registerForNotifications(
149             const std::string&, const android::sp<android::os::IServiceCallback>&) override {
150         // We can't send BpBinder for RPC over regular binder.
151         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
152     }
unregisterForNotifications(const std::string &,const android::sp<android::os::IServiceCallback> &)153     android::binder::Status unregisterForNotifications(
154             const std::string&, const android::sp<android::os::IServiceCallback>&) override {
155         // We can't send BpBinder for RPC over regular binder.
156         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
157     }
isDeclared(const std::string & name,bool * _aidl_return)158     android::binder::Status isDeclared(const std::string& name, bool* _aidl_return) override {
159         return mImpl->isDeclared(name, _aidl_return);
160     }
getDeclaredInstances(const std::string & iface,std::vector<std::string> * _aidl_return)161     android::binder::Status getDeclaredInstances(const std::string& iface,
162                                                  std::vector<std::string>* _aidl_return) override {
163         return mImpl->getDeclaredInstances(iface, _aidl_return);
164     }
updatableViaApex(const std::string & name,std::optional<std::string> * _aidl_return)165     android::binder::Status updatableViaApex(const std::string& name,
166                                              std::optional<std::string>* _aidl_return) override {
167         return mImpl->updatableViaApex(name, _aidl_return);
168     }
getUpdatableNames(const std::string & apexName,std::vector<std::string> * _aidl_return)169     android::binder::Status getUpdatableNames(const std::string& apexName,
170                                               std::vector<std::string>* _aidl_return) override {
171         return mImpl->getUpdatableNames(apexName, _aidl_return);
172     }
getConnectionInfo(const std::string & name,std::optional<android::os::ConnectionInfo> * _aidl_return)173     android::binder::Status getConnectionInfo(
174             const std::string& name,
175             std::optional<android::os::ConnectionInfo>* _aidl_return) override {
176         return mImpl->getConnectionInfo(name, _aidl_return);
177     }
registerClientCallback(const std::string &,const android::sp<android::IBinder> &,const android::sp<android::os::IClientCallback> &)178     android::binder::Status registerClientCallback(
179             const std::string&, const android::sp<android::IBinder>&,
180             const android::sp<android::os::IClientCallback>&) override {
181         // We can't send BpBinder for RPC over regular binder.
182         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
183     }
tryUnregisterService(const std::string &,const android::sp<android::IBinder> &)184     android::binder::Status tryUnregisterService(const std::string&,
185                                                  const android::sp<android::IBinder>&) override {
186         // We can't send BpBinder for RPC over regular binder.
187         return android::binder::Status::fromStatusT(android::INVALID_OPERATION);
188     }
getServiceDebugInfo(std::vector<android::os::ServiceDebugInfo> * _aidl_return)189     android::binder::Status getServiceDebugInfo(
190             std::vector<android::os::ServiceDebugInfo>* _aidl_return) override {
191         return mImpl->getServiceDebugInfo(_aidl_return);
192     }
193 
194 private:
195     sp<android::os::IServiceManager> mImpl;
196 };
197 
198 // Workaround for b/191059588.
199 // TODO(b/191059588): Once we can run RpcServer on single-threaded services,
200 //   `servicedispatcher manager` should call Dispatch("manager") directly.
wrapServiceManager(const ServiceRetriever & serviceRetriever,const char * ip_address=kLocalInetAddress)201 int wrapServiceManager(const ServiceRetriever& serviceRetriever,
202                        const char* ip_address = kLocalInetAddress) {
203     auto sm = defaultServiceManager();
204     if (nullptr == sm) {
205         LOG(ERROR) << "No servicemanager";
206         return EX_SOFTWARE;
207     }
208     auto service = std::invoke(serviceRetriever, defaultServiceManager(), String16("manager"));
209     if (nullptr == service) {
210         LOG(ERROR) << "No service called `manager`";
211         return EX_SOFTWARE;
212     }
213     auto interface = android::os::IServiceManager::asInterface(service);
214     if (nullptr == interface) {
215         LOG(ERROR) << "Cannot cast service called `manager` to IServiceManager";
216         return EX_SOFTWARE;
217     }
218 
219     // Work around restriction that doesn't allow us to send proxy over RPC.
220     interface = sp<ServiceManagerProxyToNative>::make(interface);
221     service = ServiceManagerProxyToNative::asBinder(interface);
222 
223     auto rpcServer = RpcServer::make();
224     rpcServer->setRootObject(service);
225     unsigned int port;
226     if (status_t status = rpcServer->setupInetServer(ip_address, 0, &port); status != OK) {
227         LOG(ERROR) << "Unable to set up inet server: " << statusToString(status);
228         return EX_SOFTWARE;
229     }
230     LOG(INFO) << "Finish wrapping servicemanager with RPC on port " << port;
231     std::cout << port << std::endl;
232     rpcServer->join();
233 
234     LOG(FATAL) << "Wrapped servicemanager exits; this should not happen!";
235     __builtin_unreachable();
236 }
237 
238 class AdbCallback : public android::debug::BnAdbCallback {
239 public:
onDebuggingChanged(bool enabled,android::debug::AdbTransportType)240     android::binder::Status onDebuggingChanged(bool enabled,
241                                                android::debug::AdbTransportType) override {
242         if (!enabled) {
243             LOG(ERROR) << "ADB debugging disabled, exiting.";
244             exit(EX_SOFTWARE);
245         }
246         return android::binder::Status::ok();
247     }
248 };
249 
exitOnAdbDebuggingDisabled()250 void exitOnAdbDebuggingDisabled() {
251     auto adb = android::waitForService<IAdbManager>(String16("adb"));
252     CHECK(adb != nullptr) << "Unable to retrieve service adb";
253     auto status = adb->registerCallback(sp<AdbCallback>::make());
254     CHECK(status.isOk()) << "Unable to call IAdbManager::registerCallback: " << status;
255 }
256 
257 // Log to logd. For warning and more severe messages, also log to stderr.
258 class ServiceDispatcherLogger {
259 public:
operator ()(LogId id,LogSeverity severity,const char * tag,const char * file,unsigned int line,const char * message)260     void operator()(LogId id, LogSeverity severity, const char* tag, const char* file,
261                     unsigned int line, const char* message) {
262         mLogdLogger(id, severity, tag, file, line, message);
263         if (severity >= LogSeverity::WARNING) {
264             std::cout << std::flush;
265             auto progname = std::filesystem::path(getprogname()).filename();
266             std::cerr << progname << ": " << message << std::endl;
267         }
268     }
269 
270 private:
271     LogdLogger mLogdLogger{};
272 };
273 
274 } // namespace
275 
main(int argc,char * argv[])276 int main(int argc, char* argv[]) {
277     InitLogging(argv, ServiceDispatcherLogger());
278 
279     if (!GetBoolProperty("ro.debuggable", false)) {
280         LOG(ERROR) << "servicedispatcher is only allowed on debuggable builds.";
281         return EX_NOPERM;
282     }
283     LOG(WARNING) << "WARNING: servicedispatcher is debug only. Use with caution.";
284 
285     int opt;
286     ServiceRetriever serviceRetriever = &android::IServiceManager::checkService;
287     char* ip_address = nullptr;
288     while (-1 != (opt = getopt(argc, argv, "gi:"))) {
289         switch (opt) {
290             case 'g': {
291 #pragma clang diagnostic push
292 #pragma clang diagnostic ignored "-Wdeprecated-declarations"
293                 serviceRetriever = &android::IServiceManager::getService;
294 #pragma clang diagnostic pop
295             } break;
296             case 'i': {
297                 ip_address = optarg;
298             } break;
299             default: {
300                 return Usage(argv[0]);
301             }
302         }
303     }
304 
305     android::ProcessState::self()->setThreadPoolMaxThreadCount(1);
306     android::ProcessState::self()->startThreadPool();
307     exitOnAdbDebuggingDisabled();
308 
309     if (optind + 1 != argc) return Usage(argv[0]);
310     auto name = argv[optind];
311 
312     if (name == "manager"sv) {
313         if (ip_address) {
314             return wrapServiceManager(serviceRetriever, ip_address);
315         } else {
316             return wrapServiceManager(serviceRetriever);
317         }
318     }
319     if (ip_address) {
320         return Dispatch(name, serviceRetriever, ip_address);
321     } else {
322         return Dispatch(name, serviceRetriever);
323     }
324 }
325