blob: c57c9cdd62d734265661aec87eb662bdc544722c [file] [log] [blame]
/*
* Copyright (C) 2005 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <binder/Binder.h>
#include <atomic>
#include <set>
#include <binder/BpBinder.h>
#include <binder/IInterface.h>
#include <binder/IPCThreadState.h>
#include <binder/IResultReceiver.h>
#include <binder/IShellCallback.h>
#include <binder/Parcel.h>
#include <binder/RecordedTransaction.h>
#include <binder/RpcServer.h>
#include <binder/unique_fd.h>
#include <pthread.h>
#include <inttypes.h>
#include <stdio.h>
#ifdef __linux__
#include <linux/sched.h>
#endif
#include "BuildFlags.h"
#include "OS.h"
#include "RpcState.h"
namespace android {
using android::binder::unique_fd;
constexpr uid_t kUidRoot = 0;
// Service implementations inherit from BBinder and IBinder, and this is frozen
// in prebuilts.
#ifdef __LP64__
static_assert(sizeof(IBinder) == 24);
static_assert(sizeof(BBinder) == 40);
#else
static_assert(sizeof(IBinder) == 12);
static_assert(sizeof(BBinder) == 20);
#endif
// global b/c b/230079120 - consistent symbol table
#ifdef BINDER_RPC_DEV_SERVERS
constexpr bool kEnableRpcDevServers = true;
#else
constexpr bool kEnableRpcDevServers = false;
#endif
#ifdef BINDER_ENABLE_RECORDING
constexpr bool kEnableRecording = true;
#else
constexpr bool kEnableRecording = false;
#endif
// Log any reply transactions for which the data exceeds this size
#define LOG_REPLIES_OVER_SIZE (300 * 1024)
// ---------------------------------------------------------------------------
IBinder::IBinder()
: RefBase()
{
}
IBinder::~IBinder()
{
}
// ---------------------------------------------------------------------------
sp<IInterface> IBinder::queryLocalInterface(const String16& /*descriptor*/)
{
return nullptr;
}
BBinder* IBinder::localBinder()
{
return nullptr;
}
BpBinder* IBinder::remoteBinder()
{
return nullptr;
}
bool IBinder::checkSubclass(const void* /*subclassID*/) const
{
return false;
}
status_t IBinder::shellCommand(const sp<IBinder>& target, int in, int out, int err,
Vector<String16>& args, const sp<IShellCallback>& callback,
const sp<IResultReceiver>& resultReceiver)
{
Parcel send;
Parcel reply;
send.writeFileDescriptor(in);
send.writeFileDescriptor(out);
send.writeFileDescriptor(err);
const size_t numArgs = args.size();
send.writeInt32(numArgs);
for (size_t i = 0; i < numArgs; i++) {
send.writeString16(args[i]);
}
send.writeStrongBinder(callback != nullptr ? IInterface::asBinder(callback) : nullptr);
send.writeStrongBinder(resultReceiver != nullptr ? IInterface::asBinder(resultReceiver) : nullptr);
return target->transact(SHELL_COMMAND_TRANSACTION, send, &reply);
}
status_t IBinder::getExtension(sp<IBinder>* out) {
BBinder* local = this->localBinder();
if (local != nullptr) {
*out = local->getExtension();
return OK;
}
BpBinder* proxy = this->remoteBinder();
LOG_ALWAYS_FATAL_IF(proxy == nullptr);
Parcel data;
Parcel reply;
status_t status = transact(EXTENSION_TRANSACTION, data, &reply);
if (status != OK) return status;
return reply.readNullableStrongBinder(out);
}
status_t IBinder::getDebugPid(pid_t* out) {
BBinder* local = this->localBinder();
if (local != nullptr) {
*out = local->getDebugPid();
return OK;
}
BpBinder* proxy = this->remoteBinder();
LOG_ALWAYS_FATAL_IF(proxy == nullptr);
Parcel data;
Parcel reply;
status_t status = transact(DEBUG_PID_TRANSACTION, data, &reply);
if (status != OK) return status;
int32_t pid;
status = reply.readInt32(&pid);
if (status != OK) return status;
if (pid < 0 || pid > std::numeric_limits<pid_t>::max()) {
return BAD_VALUE;
}
*out = pid;
return OK;
}
status_t IBinder::setRpcClientDebug(unique_fd socketFd, const sp<IBinder>& keepAliveBinder) {
if (!kEnableRpcDevServers) {
ALOGW("setRpcClientDebug disallowed because RPC is not enabled");
return INVALID_OPERATION;
}
if (!kEnableKernelIpc) {
ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled");
return INVALID_OPERATION;
}
BBinder* local = this->localBinder();
if (local != nullptr) {
return local->BBinder::setRpcClientDebug(std::move(socketFd), keepAliveBinder);
}
BpBinder* proxy = this->remoteBinder();
LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote");
Parcel data;
Parcel reply;
status_t status;
if (status = data.writeBool(socketFd.ok()); status != OK) return status;
if (socketFd.ok()) {
// writeUniqueFileDescriptor currently makes an unnecessary dup().
status = data.writeFileDescriptor(socketFd.release(), true /* own */);
if (status != OK) return status;
}
if (status = data.writeStrongBinder(keepAliveBinder); status != OK) return status;
return transact(SET_RPC_CLIENT_TRANSACTION, data, &reply);
}
void IBinder::withLock(const std::function<void()>& doWithLock) {
BBinder* local = localBinder();
if (local) {
local->withLock(doWithLock);
return;
}
BpBinder* proxy = this->remoteBinder();
LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote");
proxy->withLock(doWithLock);
}
sp<IBinder> IBinder::lookupOrCreateWeak(const void* objectID, object_make_func make,
const void* makeArgs) {
BBinder* local = localBinder();
if (local) {
return local->lookupOrCreateWeak(objectID, make, makeArgs);
}
BpBinder* proxy = this->remoteBinder();
LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote");
return proxy->lookupOrCreateWeak(objectID, make, makeArgs);
}
// ---------------------------------------------------------------------------
class BBinder::RpcServerLink : public IBinder::DeathRecipient {
public:
// On binder died, calls RpcServer::shutdown on @a rpcServer, and removes itself from @a binder.
RpcServerLink(const sp<RpcServer>& rpcServer, const sp<IBinder>& keepAliveBinder,
const wp<BBinder>& binder)
: mRpcServer(rpcServer), mKeepAliveBinder(keepAliveBinder), mBinder(binder) {}
virtual ~RpcServerLink();
void binderDied(const wp<IBinder>&) override {
auto promoted = mBinder.promote();
ALOGI("RpcBinder: binder died, shutting down RpcServer for %s",
promoted ? String8(promoted->getInterfaceDescriptor()).c_str() : "<NULL>");
if (mRpcServer == nullptr) {
ALOGW("RpcServerLink: Unable to shut down RpcServer because it does not exist.");
} else {
ALOGW_IF(!mRpcServer->shutdown(),
"RpcServerLink: RpcServer did not shut down properly. Not started?");
}
mRpcServer.clear();
if (promoted) {
promoted->removeRpcServerLink(sp<RpcServerLink>::fromExisting(this));
}
mBinder.clear();
}
private:
sp<RpcServer> mRpcServer;
sp<IBinder> mKeepAliveBinder; // hold to avoid automatically unlinking
wp<BBinder> mBinder;
};
BBinder::RpcServerLink::~RpcServerLink() {}
class BBinder::Extras
{
public:
// unlocked objects
sp<IBinder> mExtension;
#ifdef __linux__
int mPolicy = SCHED_NORMAL;
int mPriority = 0;
#endif
bool mRequestingSid = false;
bool mInheritRt = false;
// for below objects
RpcMutex mLock;
std::set<sp<RpcServerLink>> mRpcServerLinks;
BpBinder::ObjectManager mObjects;
unique_fd mRecordingFd;
};
// ---------------------------------------------------------------------------
BBinder::BBinder() : mExtras(nullptr), mStability(0), mParceled(false), mRecordingOn(false) {}
bool BBinder::isBinderAlive() const
{
return true;
}
status_t BBinder::pingBinder()
{
return NO_ERROR;
}
status_t BBinder::startRecordingTransactions(const Parcel& data) {
if (!kEnableRecording) {
ALOGW("Binder recording disallowed because recording is not enabled");
return INVALID_OPERATION;
}
if (!kEnableKernelIpc) {
ALOGW("Binder recording disallowed because kernel binder is not enabled");
return INVALID_OPERATION;
}
uid_t uid = IPCThreadState::self()->getCallingUid();
if (uid != kUidRoot) {
ALOGE("Binder recording not allowed because client %" PRIu32 " is not root", uid);
return PERMISSION_DENIED;
}
Extras* e = getOrCreateExtras();
RpcMutexUniqueLock lock(e->mLock);
if (mRecordingOn) {
ALOGI("Could not start Binder recording. Another is already in progress.");
return INVALID_OPERATION;
} else {
status_t readStatus = data.readUniqueFileDescriptor(&(e->mRecordingFd));
if (readStatus != OK) {
return readStatus;
}
mRecordingOn = true;
ALOGI("Started Binder recording.");
return NO_ERROR;
}
}
status_t BBinder::stopRecordingTransactions() {
if (!kEnableRecording) {
ALOGW("Binder recording disallowed because recording is not enabled");
return INVALID_OPERATION;
}
if (!kEnableKernelIpc) {
ALOGW("Binder recording disallowed because kernel binder is not enabled");
return INVALID_OPERATION;
}
uid_t uid = IPCThreadState::self()->getCallingUid();
if (uid != kUidRoot) {
ALOGE("Binder recording not allowed because client %" PRIu32 " is not root", uid);
return PERMISSION_DENIED;
}
Extras* e = getOrCreateExtras();
RpcMutexUniqueLock lock(e->mLock);
if (mRecordingOn) {
e->mRecordingFd.reset();
mRecordingOn = false;
ALOGI("Stopped Binder recording.");
return NO_ERROR;
} else {
ALOGI("Could not stop Binder recording. One is not in progress.");
return INVALID_OPERATION;
}
}
const String16& BBinder::getInterfaceDescriptor() const
{
static StaticString16 sBBinder(u"BBinder");
ALOGW("Reached BBinder::getInterfaceDescriptor (this=%p). Override?", this);
return sBBinder;
}
// NOLINTNEXTLINE(google-default-arguments)
status_t BBinder::transact(
uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags)
{
data.setDataPosition(0);
if (reply != nullptr && (flags & FLAG_CLEAR_BUF)) {
reply->markSensitive();
}
status_t err = NO_ERROR;
switch (code) {
case PING_TRANSACTION:
err = pingBinder();
break;
case START_RECORDING_TRANSACTION:
err = startRecordingTransactions(data);
break;
case STOP_RECORDING_TRANSACTION:
err = stopRecordingTransactions();
break;
case EXTENSION_TRANSACTION:
LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr");
err = reply->writeStrongBinder(getExtension());
break;
case DEBUG_PID_TRANSACTION:
LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr");
err = reply->writeInt32(getDebugPid());
break;
case SET_RPC_CLIENT_TRANSACTION: {
err = setRpcClientDebug(data);
break;
}
default:
err = onTransact(code, data, reply, flags);
break;
}
// In case this is being transacted on in the same process.
if (reply != nullptr) {
reply->setDataPosition(0);
if (reply->dataSize() > LOG_REPLIES_OVER_SIZE) {
ALOGW("Large reply transaction of %zu bytes, interface descriptor %s, code %d",
reply->dataSize(), String8(getInterfaceDescriptor()).c_str(), code);
}
}
if (kEnableKernelIpc && mRecordingOn && code != START_RECORDING_TRANSACTION) [[unlikely]] {
Extras* e = mExtras.load(std::memory_order_acquire);
RpcMutexUniqueLock lock(e->mLock);
if (mRecordingOn) {
Parcel emptyReply;
timespec ts;
timespec_get(&ts, TIME_UTC);
auto transaction = android::binder::debug::RecordedTransaction::
fromDetails(getInterfaceDescriptor(), code, flags, ts, data,
reply ? *reply : emptyReply, err);
if (transaction) {
if (status_t err = transaction->dumpToFile(e->mRecordingFd); err != NO_ERROR) {
ALOGI("Failed to dump RecordedTransaction to file with error %d", err);
}
} else {
ALOGI("Failed to create RecordedTransaction object.");
}
}
}
return err;
}
// NOLINTNEXTLINE(google-default-arguments)
status_t BBinder::linkToDeath(
const sp<DeathRecipient>& /*recipient*/, void* /*cookie*/,
uint32_t /*flags*/)
{
return INVALID_OPERATION;
}
// NOLINTNEXTLINE(google-default-arguments)
status_t BBinder::unlinkToDeath(
const wp<DeathRecipient>& /*recipient*/, void* /*cookie*/,
uint32_t /*flags*/, wp<DeathRecipient>* /*outRecipient*/)
{
return INVALID_OPERATION;
}
status_t BBinder::dump(int /*fd*/, const Vector<String16>& /*args*/)
{
return NO_ERROR;
}
void* BBinder::attachObject(const void* objectID, void* object, void* cleanupCookie,
object_cleanup_func func) {
Extras* e = getOrCreateExtras();
LOG_ALWAYS_FATAL_IF(!e, "no memory");
RpcMutexUniqueLock _l(e->mLock);
return e->mObjects.attach(objectID, object, cleanupCookie, func);
}
void* BBinder::findObject(const void* objectID) const
{
Extras* e = mExtras.load(std::memory_order_acquire);
if (!e) return nullptr;
RpcMutexUniqueLock _l(e->mLock);
return e->mObjects.find(objectID);
}
void* BBinder::detachObject(const void* objectID) {
Extras* e = mExtras.load(std::memory_order_acquire);
if (!e) return nullptr;
RpcMutexUniqueLock _l(e->mLock);
return e->mObjects.detach(objectID);
}
void BBinder::withLock(const std::function<void()>& doWithLock) {
Extras* e = getOrCreateExtras();
LOG_ALWAYS_FATAL_IF(!e, "no memory");
RpcMutexUniqueLock _l(e->mLock);
doWithLock();
}
sp<IBinder> BBinder::lookupOrCreateWeak(const void* objectID, object_make_func make,
const void* makeArgs) {
Extras* e = getOrCreateExtras();
LOG_ALWAYS_FATAL_IF(!e, "no memory");
RpcMutexUniqueLock _l(e->mLock);
return e->mObjects.lookupOrCreateWeak(objectID, make, makeArgs);
}
BBinder* BBinder::localBinder()
{
return this;
}
bool BBinder::isRequestingSid()
{
Extras* e = mExtras.load(std::memory_order_acquire);
return e && e->mRequestingSid;
}
void BBinder::setRequestingSid(bool requestingSid)
{
LOG_ALWAYS_FATAL_IF(mParceled,
"setRequestingSid() should not be called after a binder object "
"is parceled/sent to another process");
Extras* e = mExtras.load(std::memory_order_acquire);
if (!e) {
// default is false. Most things don't need sids, so avoiding allocations when possible.
if (!requestingSid) {
return;
}
e = getOrCreateExtras();
if (!e) return; // out of memory
}
e->mRequestingSid = requestingSid;
}
sp<IBinder> BBinder::getExtension() {
Extras* e = mExtras.load(std::memory_order_acquire);
if (e == nullptr) return nullptr;
return e->mExtension;
}
#ifdef __linux__
void BBinder::setMinSchedulerPolicy(int policy, int priority) {
LOG_ALWAYS_FATAL_IF(mParceled,
"setMinSchedulerPolicy() should not be called after a binder object "
"is parceled/sent to another process");
switch (policy) {
case SCHED_NORMAL:
LOG_ALWAYS_FATAL_IF(priority < -20 || priority > 19, "Invalid priority for SCHED_NORMAL: %d", priority);
break;
case SCHED_RR:
case SCHED_FIFO:
LOG_ALWAYS_FATAL_IF(priority < 1 || priority > 99, "Invalid priority for sched %d: %d", policy, priority);
break;
default:
LOG_ALWAYS_FATAL("Unrecognized scheduling policy: %d", policy);
}
Extras* e = mExtras.load(std::memory_order_acquire);
if (e == nullptr) {
// Avoid allocations if called with default.
if (policy == SCHED_NORMAL && priority == 0) {
return;
}
e = getOrCreateExtras();
if (!e) return; // out of memory
}
e->mPolicy = policy;
e->mPriority = priority;
}
int BBinder::getMinSchedulerPolicy() {
Extras* e = mExtras.load(std::memory_order_acquire);
if (e == nullptr) return SCHED_NORMAL;
return e->mPolicy;
}
int BBinder::getMinSchedulerPriority() {
Extras* e = mExtras.load(std::memory_order_acquire);
if (e == nullptr) return 0;
return e->mPriority;
}
#endif // __linux__
bool BBinder::isInheritRt() {
Extras* e = mExtras.load(std::memory_order_acquire);
return e && e->mInheritRt;
}
void BBinder::setInheritRt(bool inheritRt) {
LOG_ALWAYS_FATAL_IF(mParceled,
"setInheritRt() should not be called after a binder object "
"is parceled/sent to another process");
Extras* e = mExtras.load(std::memory_order_acquire);
if (!e) {
if (!inheritRt) {
return;
}
e = getOrCreateExtras();
if (!e) return; // out of memory
}
e->mInheritRt = inheritRt;
}
pid_t BBinder::getDebugPid() {
#ifdef __linux__
return getpid();
#else
// TODO: handle other OSes
return 0;
#endif // __linux__
}
void BBinder::setExtension(const sp<IBinder>& extension) {
LOG_ALWAYS_FATAL_IF(mParceled,
"setExtension() should not be called after a binder object "
"is parceled/sent to another process");
Extras* e = getOrCreateExtras();
e->mExtension = extension;
}
bool BBinder::wasParceled() {
return mParceled;
}
void BBinder::setParceled() {
mParceled = true;
}
status_t BBinder::setRpcClientDebug(const Parcel& data) {
if (!kEnableRpcDevServers) {
ALOGW("%s: disallowed because RPC is not enabled", __PRETTY_FUNCTION__);
return INVALID_OPERATION;
}
if (!kEnableKernelIpc) {
ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled");
return INVALID_OPERATION;
}
uid_t uid = IPCThreadState::self()->getCallingUid();
if (uid != kUidRoot) {
ALOGE("%s: not allowed because client %" PRIu32 " is not root", __PRETTY_FUNCTION__, uid);
return PERMISSION_DENIED;
}
status_t status;
bool hasSocketFd;
unique_fd clientFd;
if (status = data.readBool(&hasSocketFd); status != OK) return status;
if (hasSocketFd) {
if (status = data.readUniqueFileDescriptor(&clientFd); status != OK) return status;
}
sp<IBinder> keepAliveBinder;
if (status = data.readNullableStrongBinder(&keepAliveBinder); status != OK) return status;
return setRpcClientDebug(std::move(clientFd), keepAliveBinder);
}
status_t BBinder::setRpcClientDebug(unique_fd socketFd, const sp<IBinder>& keepAliveBinder) {
if (!kEnableRpcDevServers) {
ALOGW("%s: disallowed because RPC is not enabled", __PRETTY_FUNCTION__);
return INVALID_OPERATION;
}
if (!kEnableKernelIpc) {
ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled");
return INVALID_OPERATION;
}
const int socketFdForPrint = socketFd.get();
LOG_RPC_DETAIL("%s(fd=%d)", __PRETTY_FUNCTION__, socketFdForPrint);
if (!socketFd.ok()) {
ALOGE("%s: No socket FD provided.", __PRETTY_FUNCTION__);
return BAD_VALUE;
}
if (keepAliveBinder == nullptr) {
ALOGE("%s: No keepAliveBinder provided.", __PRETTY_FUNCTION__);
return UNEXPECTED_NULL;
}
size_t binderThreadPoolMaxCount = ProcessState::self()->getThreadPoolMaxTotalThreadCount();
if (binderThreadPoolMaxCount <= 1) {
ALOGE("%s: ProcessState thread pool max count is %zu. RPC is disabled for this service "
"because RPC requires the service to support multithreading.",
__PRETTY_FUNCTION__, binderThreadPoolMaxCount);
return INVALID_OPERATION;
}
// Weak ref to avoid circular dependency:
// BBinder -> RpcServerLink ----> RpcServer -X-> BBinder
// `-X-> BBinder
auto weakThis = wp<BBinder>::fromExisting(this);
Extras* e = getOrCreateExtras();
RpcMutexUniqueLock _l(e->mLock);
auto rpcServer = RpcServer::make();
LOG_ALWAYS_FATAL_IF(rpcServer == nullptr, "RpcServer::make returns null");
auto link = sp<RpcServerLink>::make(rpcServer, keepAliveBinder, weakThis);
if (auto status = keepAliveBinder->linkToDeath(link, nullptr, 0); status != OK) {
ALOGE("%s: keepAliveBinder->linkToDeath returns %s", __PRETTY_FUNCTION__,
statusToString(status).c_str());
return status;
}
rpcServer->setRootObjectWeak(weakThis);
if (auto status = rpcServer->setupExternalServer(std::move(socketFd)); status != OK) {
return status;
}
rpcServer->setMaxThreads(binderThreadPoolMaxCount);
ALOGI("RpcBinder: Started Binder debug on %s", String8(getInterfaceDescriptor()).c_str());
rpcServer->start();
e->mRpcServerLinks.emplace(link);
LOG_RPC_DETAIL("%s(fd=%d) successful", __PRETTY_FUNCTION__, socketFdForPrint);
return OK;
}
void BBinder::removeRpcServerLink(const sp<RpcServerLink>& link) {
Extras* e = mExtras.load(std::memory_order_acquire);
if (!e) return;
RpcMutexUniqueLock _l(e->mLock);
(void)e->mRpcServerLinks.erase(link);
}
BBinder::~BBinder()
{
if (!wasParceled()) {
if (getExtension()) {
ALOGW("Binder %p destroyed with extension attached before being parceled.", this);
}
if (isRequestingSid()) {
ALOGW("Binder %p destroyed when requesting SID before being parceled.", this);
}
if (isInheritRt()) {
ALOGW("Binder %p destroyed after setInheritRt before being parceled.", this);
}
#ifdef __linux__
if (getMinSchedulerPolicy() != SCHED_NORMAL) {
ALOGW("Binder %p destroyed after setMinSchedulerPolicy before being parceled.", this);
}
if (getMinSchedulerPriority() != 0) {
ALOGW("Binder %p destroyed after setMinSchedulerPolicy before being parceled.", this);
}
#endif // __linux__
}
Extras* e = mExtras.load(std::memory_order_relaxed);
if (e) delete e;
}
// NOLINTNEXTLINE(google-default-arguments)
status_t BBinder::onTransact(
uint32_t code, const Parcel& data, Parcel* reply, uint32_t /*flags*/)
{
switch (code) {
case INTERFACE_TRANSACTION:
LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr");
reply->writeString16(getInterfaceDescriptor());
return NO_ERROR;
case DUMP_TRANSACTION: {
int fd = data.readFileDescriptor();
int argc = data.readInt32();
Vector<String16> args;
for (int i = 0; i < argc && data.dataAvail() > 0; i++) {
args.add(data.readString16());
}
return dump(fd, args);
}
case SHELL_COMMAND_TRANSACTION: {
int in = data.readFileDescriptor();
int out = data.readFileDescriptor();
int err = data.readFileDescriptor();
int argc = data.readInt32();
Vector<String16> args;
for (int i = 0; i < argc && data.dataAvail() > 0; i++) {
args.add(data.readString16());
}
sp<IBinder> shellCallbackBinder = data.readStrongBinder();
sp<IResultReceiver> resultReceiver = IResultReceiver::asInterface(
data.readStrongBinder());
// XXX can't add virtuals until binaries are updated.
// sp<IShellCallback> shellCallback = IShellCallback::asInterface(
// shellCallbackBinder);
// return shellCommand(in, out, err, args, resultReceiver);
(void)in;
(void)out;
(void)err;
if (resultReceiver != nullptr) {
resultReceiver->send(INVALID_OPERATION);
}
return NO_ERROR;
}
case SYSPROPS_TRANSACTION: {
if (!binder::os::report_sysprop_change()) return INVALID_OPERATION;
return NO_ERROR;
}
default:
return UNKNOWN_TRANSACTION;
}
}
BBinder::Extras* BBinder::getOrCreateExtras()
{
Extras* e = mExtras.load(std::memory_order_acquire);
if (!e) {
e = new Extras;
Extras* expected = nullptr;
if (!mExtras.compare_exchange_strong(expected, e,
std::memory_order_release,
std::memory_order_acquire)) {
delete e;
e = expected; // Filled in by CAS
}
if (e == nullptr) return nullptr; // out of memory
}
return e;
}
// ---------------------------------------------------------------------------
enum {
// This is used to transfer ownership of the remote binder from
// the BpRefBase object holding it (when it is constructed), to the
// owner of the BpRefBase object when it first acquires that BpRefBase.
kRemoteAcquired = 0x00000001
};
BpRefBase::BpRefBase(const sp<IBinder>& o)
: mRemote(o.get()), mRefs(nullptr), mState(0)
{
extendObjectLifetime(OBJECT_LIFETIME_WEAK);
if (mRemote) {
mRemote->incStrong(this); // Removed on first IncStrong().
mRefs = mRemote->createWeak(this); // Held for our entire lifetime.
}
}
BpRefBase::~BpRefBase()
{
if (mRemote) {
if (!(mState.load(std::memory_order_relaxed)&kRemoteAcquired)) {
mRemote->decStrong(this);
}
mRefs->decWeak(this);
}
}
void BpRefBase::onFirstRef()
{
mState.fetch_or(kRemoteAcquired, std::memory_order_relaxed);
}
void BpRefBase::onLastStrongRef(const void* /*id*/)
{
if (mRemote) {
mRemote->decStrong(this);
}
}
bool BpRefBase::onIncStrongAttempted(uint32_t /*flags*/, const void* /*id*/)
{
return mRemote ? mRefs->attemptIncStrong(this) : false;
}
// ---------------------------------------------------------------------------
} // namespace android