blob: 28125f169ca94ee277801f45b871e561a85e8a92 [file] [log] [blame]
/*
* Copyright (C) 2022 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "binderRpcTestCommon.h"
using namespace android;
using android::binder::ReadFdToString;
using android::binder::unique_fd;
class MyBinderRpcTestAndroid : public MyBinderRpcTestBase {
public:
wp<RpcServer> server;
Status countBinders(std::vector<int32_t>* out) override {
return countBindersImpl(server, out);
}
Status die(bool cleanup) override {
if (cleanup) {
exit(1);
} else {
_exit(1);
}
}
Status scheduleShutdown() override {
sp<RpcServer> strongServer = server.promote();
if (strongServer == nullptr) {
return Status::fromExceptionCode(Status::EX_NULL_POINTER);
}
RpcMaybeThread([=] {
LOG_ALWAYS_FATAL_IF(!strongServer->shutdown(), "Could not shutdown");
}).detach();
return Status::ok();
}
Status useKernelBinderCallingId() override {
// this is WRONG! It does not make sense when using RPC binder, and
// because it is SO wrong, and so much code calls this, it should abort!
if constexpr (kEnableKernelIpc) {
(void)IPCThreadState::self()->getCallingPid();
}
return Status::ok();
}
Status echoAsFile(const std::string& content, android::os::ParcelFileDescriptor* out) override {
out->reset(mockFileDescriptor(content));
return Status::ok();
}
Status concatFiles(const std::vector<android::os::ParcelFileDescriptor>& files,
android::os::ParcelFileDescriptor* out) override {
std::string acc;
for (const auto& file : files) {
std::string result;
LOG_ALWAYS_FATAL_IF(!ReadFdToString(file.get(), &result));
acc.append(result);
}
out->reset(mockFileDescriptor(acc));
return Status::ok();
}
HandoffChannel<unique_fd> mFdChannel;
Status blockingSendFdOneway(const android::os::ParcelFileDescriptor& fd) override {
mFdChannel.write(unique_fd(fcntl(fd.get(), F_DUPFD_CLOEXEC, 0)));
return Status::ok();
}
Status blockingRecvFd(android::os::ParcelFileDescriptor* fd) override {
fd->reset(mFdChannel.read());
return Status::ok();
}
HandoffChannel<int> mIntChannel;
Status blockingSendIntOneway(int n) override {
mIntChannel.write(n);
return Status::ok();
}
Status blockingRecvInt(int* n) override {
*n = mIntChannel.read();
return Status::ok();
}
};
int main(int argc, char* argv[]) {
__android_log_set_logger(__android_log_stderr_logger);
LOG_ALWAYS_FATAL_IF(argc != 3, "Invalid number of arguments: %d", argc);
unique_fd writeEnd(atoi(argv[1]));
unique_fd readEnd(atoi(argv[2]));
auto serverConfig = readFromFd<BinderRpcTestServerConfig>(readEnd);
auto socketType = static_cast<SocketType>(serverConfig.socketType);
auto rpcSecurity = static_cast<RpcSecurity>(serverConfig.rpcSecurity);
std::vector<RpcSession::FileDescriptorTransportMode>
serverSupportedFileDescriptorTransportModes;
for (auto mode : serverConfig.serverSupportedFileDescriptorTransportModes) {
serverSupportedFileDescriptorTransportModes.push_back(
static_cast<RpcSession::FileDescriptorTransportMode>(mode));
}
auto certVerifier = std::make_shared<RpcCertificateVerifierSimple>();
sp<RpcServer> server = RpcServer::make(newTlsFactory(rpcSecurity, certVerifier));
LOG_ALWAYS_FATAL_IF(!server->setProtocolVersion(serverConfig.serverVersion));
server->setMaxThreads(serverConfig.numThreads);
server->setSupportedFileDescriptorTransportModes(serverSupportedFileDescriptorTransportModes);
unsigned int outPort = 0;
unique_fd socketFd(serverConfig.socketFd);
switch (socketType) {
case SocketType::PRECONNECTED:
[[fallthrough]];
case SocketType::UNIX:
LOG_ALWAYS_FATAL_IF(OK != server->setupUnixDomainServer(serverConfig.addr.c_str()),
"%s", serverConfig.addr.c_str());
break;
case SocketType::UNIX_BOOTSTRAP:
LOG_ALWAYS_FATAL_IF(OK !=
server->setupUnixDomainSocketBootstrapServer(std::move(socketFd)));
break;
case SocketType::UNIX_RAW:
LOG_ALWAYS_FATAL_IF(OK != server->setupRawSocketServer(std::move(socketFd)));
break;
case SocketType::VSOCK:
LOG_ALWAYS_FATAL_IF(OK !=
server->setupVsockServer(VMADDR_CID_LOCAL,
serverConfig.vsockPort),
"Need `sudo modprobe vsock_loopback`?");
break;
case SocketType::INET: {
LOG_ALWAYS_FATAL_IF(OK != server->setupInetServer(kLocalInetAddress, 0, &outPort));
LOG_ALWAYS_FATAL_IF(0 == outPort);
break;
}
default:
LOG_ALWAYS_FATAL("Unknown socket type");
}
BinderRpcTestServerInfo serverInfo;
serverInfo.port = static_cast<int64_t>(outPort);
serverInfo.cert.data = server->getCertificate(RpcCertificateFormat::PEM);
writeToFd(writeEnd, serverInfo);
auto clientInfo = readFromFd<BinderRpcTestClientInfo>(readEnd);
if (rpcSecurity == RpcSecurity::TLS) {
for (const auto& clientCert : clientInfo.certs) {
LOG_ALWAYS_FATAL_IF(OK !=
certVerifier->addTrustedPeerCertificate(RpcCertificateFormat::PEM,
clientCert.data));
}
}
server->setPerSessionRootObject([&](wp<RpcSession> session, const void* addrPtr, size_t len) {
{
sp<RpcSession> spSession = session.promote();
LOG_ALWAYS_FATAL_IF(nullptr == spSession.get());
}
// UNIX sockets with abstract addresses return
// sizeof(sa_family_t)==2 in addrlen
LOG_ALWAYS_FATAL_IF(len < sizeof(sa_family_t));
const sockaddr* addr = reinterpret_cast<const sockaddr*>(addrPtr);
sp<MyBinderRpcTestAndroid> service = sp<MyBinderRpcTestAndroid>::make();
switch (addr->sa_family) {
case AF_UNIX:
// nothing to save
break;
case AF_VSOCK:
LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_vm));
service->port = reinterpret_cast<const sockaddr_vm*>(addr)->svm_port;
break;
case AF_INET:
LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_in));
service->port = ntohs(reinterpret_cast<const sockaddr_in*>(addr)->sin_port);
break;
case AF_INET6:
LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_in));
service->port = ntohs(reinterpret_cast<const sockaddr_in6*>(addr)->sin6_port);
break;
default:
LOG_ALWAYS_FATAL("Unrecognized address family %d", addr->sa_family);
}
service->server = server;
return service;
});
server->join();
// Another thread calls shutdown. Wait for it to complete.
(void)server->shutdown();
return 0;
}