2 * Copyright (C) 2005 The Android Open Source Project
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #define LOG_TAG "IPCThreadState"
19 #include <binder/IPCThreadState.h>
21 #include <binder/Binder.h>
22 #include <binder/BpBinder.h>
23 #include <cutils/sched_policy.h>
24 #include <utils/Debug.h>
25 #include <utils/Log.h>
26 #include <utils/TextOutput.h>
27 #include <utils/threads.h>
29 #include <private/binder/binder_module.h>
30 #include <private/binder/Static.h>
32 #include <sys/ioctl.h>
41 #include <sys/resource.h>
43 #ifdef HAVE_WIN32_THREADS
50 #define IF_LOG_TRANSACTIONS() if (false)
51 #define IF_LOG_COMMANDS() if (false)
52 #define LOG_REMOTEREFS(...)
53 #define IF_LOG_REMOTEREFS() if (false)
54 #define LOG_THREADPOOL(...)
55 #define LOG_ONEWAY(...)
59 #define IF_LOG_TRANSACTIONS() IF_ALOG(LOG_VERBOSE, "transact")
60 #define IF_LOG_COMMANDS() IF_ALOG(LOG_VERBOSE, "ipc")
61 #define LOG_REMOTEREFS(...) ALOG(LOG_DEBUG, "remoterefs", __VA_ARGS__)
62 #define IF_LOG_REMOTEREFS() IF_ALOG(LOG_DEBUG, "remoterefs")
63 #define LOG_THREADPOOL(...) ALOG(LOG_DEBUG, "threadpool", __VA_ARGS__)
64 #define LOG_ONEWAY(...) ALOG(LOG_DEBUG, "ipc", __VA_ARGS__)
68 // ---------------------------------------------------------------------------
72 static const char* getReturnString(size_t idx);
73 static const char* getCommandString(size_t idx);
74 static const void* printReturnCommand(TextOutput& out, const void* _cmd);
75 static const void* printCommand(TextOutput& out, const void* _cmd);
77 // This will result in a missing symbol failure if the IF_LOG_COMMANDS()
78 // conditionals don't get stripped... but that is probably what we want.
80 static const char *kReturnStrings[] = {
87 "BR_TRANSACTION_COMPLETE",
97 "BR_CLEAR_DEATH_NOTIFICATION_DONE",
101 static const char *kCommandStrings[] = {
112 "BC_ATTEMPT_ACQUIRE",
113 "BC_REGISTER_LOOPER",
116 "BC_REQUEST_DEATH_NOTIFICATION",
117 "BC_CLEAR_DEATH_NOTIFICATION",
118 "BC_DEAD_BINDER_DONE"
121 static const char* getReturnString(size_t idx)
123 if (idx < sizeof(kReturnStrings) / sizeof(kReturnStrings[0]))
124 return kReturnStrings[idx];
129 static const char* getCommandString(size_t idx)
131 if (idx < sizeof(kCommandStrings) / sizeof(kCommandStrings[0]))
132 return kCommandStrings[idx];
137 static const void* printBinderTransactionData(TextOutput& out, const void* data)
139 const binder_transaction_data* btd =
140 (const binder_transaction_data*)data;
141 if (btd->target.handle < 1024) {
142 /* want to print descriptors in decimal; guess based on value */
143 out << "target.desc=" << btd->target.handle;
145 out << "target.ptr=" << btd->target.ptr;
147 out << " (cookie " << btd->cookie << ")" << endl
148 << "code=" << TypeCode(btd->code) << ", flags=" << (void*)btd->flags << endl
149 << "data=" << btd->data.ptr.buffer << " (" << (void*)btd->data_size
151 << "offsets=" << btd->data.ptr.offsets << " (" << (void*)btd->offsets_size
156 static const void* printReturnCommand(TextOutput& out, const void* _cmd)
158 static const size_t N = sizeof(kReturnStrings)/sizeof(kReturnStrings[0]);
159 const int32_t* cmd = (const int32_t*)_cmd;
160 int32_t code = *cmd++;
161 size_t cmdIndex = code & 0xff;
162 if (code == (int32_t) BR_ERROR) {
163 out << "BR_ERROR: " << (void*)(*cmd++) << endl;
165 } else if (cmdIndex >= N) {
166 out << "Unknown reply: " << code << endl;
169 out << kReturnStrings[cmdIndex];
174 out << ": " << indent;
175 cmd = (const int32_t *)printBinderTransactionData(out, cmd);
179 case BR_ACQUIRE_RESULT: {
180 const int32_t res = *cmd++;
181 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
188 const int32_t b = *cmd++;
189 const int32_t c = *cmd++;
190 out << ": target=" << (void*)b << " (cookie " << (void*)c << ")";
193 case BR_ATTEMPT_ACQUIRE: {
194 const int32_t p = *cmd++;
195 const int32_t b = *cmd++;
196 const int32_t c = *cmd++;
197 out << ": target=" << (void*)b << " (cookie " << (void*)c
202 case BR_CLEAR_DEATH_NOTIFICATION_DONE: {
203 const int32_t c = *cmd++;
204 out << ": death cookie " << (void*)c;
208 // no details to show for: BR_OK, BR_DEAD_REPLY,
209 // BR_TRANSACTION_COMPLETE, BR_FINISHED
217 static const void* printCommand(TextOutput& out, const void* _cmd)
219 static const size_t N = sizeof(kCommandStrings)/sizeof(kCommandStrings[0]);
220 const int32_t* cmd = (const int32_t*)_cmd;
221 int32_t code = *cmd++;
222 size_t cmdIndex = code & 0xff;
225 out << "Unknown command: " << code << endl;
228 out << kCommandStrings[cmdIndex];
233 out << ": " << indent;
234 cmd = (const int32_t *)printBinderTransactionData(out, cmd);
238 case BC_ACQUIRE_RESULT: {
239 const int32_t res = *cmd++;
240 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
243 case BC_FREE_BUFFER: {
244 const int32_t buf = *cmd++;
245 out << ": buffer=" << (void*)buf;
252 const int32_t d = *cmd++;
253 out << ": desc=" << d;
256 case BC_INCREFS_DONE:
257 case BC_ACQUIRE_DONE: {
258 const int32_t b = *cmd++;
259 const int32_t c = *cmd++;
260 out << ": target=" << (void*)b << " (cookie " << (void*)c << ")";
263 case BC_ATTEMPT_ACQUIRE: {
264 const int32_t p = *cmd++;
265 const int32_t d = *cmd++;
266 out << ": desc=" << d << ", pri=" << p;
269 case BC_REQUEST_DEATH_NOTIFICATION:
270 case BC_CLEAR_DEATH_NOTIFICATION: {
271 const int32_t h = *cmd++;
272 const int32_t c = *cmd++;
273 out << ": handle=" << h << " (death cookie " << (void*)c << ")";
276 case BC_DEAD_BINDER_DONE: {
277 const int32_t c = *cmd++;
278 out << ": death cookie " << (void*)c;
282 // no details to show for: BC_REGISTER_LOOPER, BC_ENTER_LOOPER,
292 static pthread_mutex_t gTLSMutex = PTHREAD_MUTEX_INITIALIZER;
293 static bool gHaveTLS = false;
294 static pthread_key_t gTLS = 0;
295 static bool gShutdown = false;
296 static bool gDisableBackgroundScheduling = false;
298 IPCThreadState* IPCThreadState::self()
302 const pthread_key_t k = gTLS;
303 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
305 return new IPCThreadState;
308 if (gShutdown) return NULL;
310 pthread_mutex_lock(&gTLSMutex);
312 if (pthread_key_create(&gTLS, threadDestructor) != 0) {
313 pthread_mutex_unlock(&gTLSMutex);
318 pthread_mutex_unlock(&gTLSMutex);
322 IPCThreadState* IPCThreadState::selfOrNull()
325 const pthread_key_t k = gTLS;
326 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(k);
332 void IPCThreadState::shutdown()
337 // XXX Need to wait for all thread pool threads to exit!
338 IPCThreadState* st = (IPCThreadState*)pthread_getspecific(gTLS);
341 pthread_setspecific(gTLS, NULL);
347 void IPCThreadState::disableBackgroundScheduling(bool disable)
349 gDisableBackgroundScheduling = disable;
352 sp<ProcessState> IPCThreadState::process()
357 status_t IPCThreadState::clearLastError()
359 const status_t err = mLastError;
360 mLastError = NO_ERROR;
364 int IPCThreadState::getCallingPid()
369 int IPCThreadState::getCallingUid()
374 int IPCThreadState::getOrigCallingUid()
376 return mOrigCallingUid;
379 int64_t IPCThreadState::clearCallingIdentity()
381 int64_t token = ((int64_t)mCallingUid<<32) | mCallingPid;
386 void IPCThreadState::setStrictModePolicy(int32_t policy)
388 mStrictModePolicy = policy;
391 int32_t IPCThreadState::getStrictModePolicy() const
393 return mStrictModePolicy;
396 void IPCThreadState::setLastTransactionBinderFlags(int32_t flags)
398 mLastTransactionBinderFlags = flags;
401 int32_t IPCThreadState::getLastTransactionBinderFlags() const
403 return mLastTransactionBinderFlags;
406 void IPCThreadState::restoreCallingIdentity(int64_t token)
408 mCallingUid = (int)(token>>32);
409 mCallingPid = (int)token;
412 void IPCThreadState::clearCaller()
414 mCallingPid = getpid();
415 mCallingUid = getuid();
418 void IPCThreadState::flushCommands()
420 if (mProcess->mDriverFD <= 0)
422 talkWithDriver(false);
425 void IPCThreadState::joinThreadPool(bool isMain)
427 LOG_THREADPOOL("**** THREAD %p (PID %d) IS JOINING THE THREAD POOL\n", (void*)pthread_self(), getpid());
429 mOut.writeInt32(isMain ? BC_ENTER_LOOPER : BC_REGISTER_LOOPER);
431 // This thread may have been spawned by a thread that was in the background
432 // scheduling group, so first we will make sure it is in the foreground
433 // one to avoid performing an initial transaction in the background.
434 set_sched_policy(mMyThreadId, SP_FOREGROUND);
440 // When we've cleared the incoming command queue, process any pending derefs
441 if (mIn.dataPosition() >= mIn.dataSize()) {
442 size_t numPending = mPendingWeakDerefs.size();
443 if (numPending > 0) {
444 for (size_t i = 0; i < numPending; i++) {
445 RefBase::weakref_type* refs = mPendingWeakDerefs[i];
446 refs->decWeak(mProcess.get());
448 mPendingWeakDerefs.clear();
451 numPending = mPendingStrongDerefs.size();
452 if (numPending > 0) {
453 for (size_t i = 0; i < numPending; i++) {
454 BBinder* obj = mPendingStrongDerefs[i];
455 obj->decStrong(mProcess.get());
457 mPendingStrongDerefs.clear();
461 // now get the next command to be processed, waiting if necessary
462 result = talkWithDriver();
463 if (result >= NO_ERROR) {
464 size_t IN = mIn.dataAvail();
465 if (IN < sizeof(int32_t)) continue;
466 cmd = mIn.readInt32();
468 alog << "Processing top-level Command: "
469 << getReturnString(cmd) << endl;
473 result = executeCommand(cmd);
476 // After executing the command, ensure that the thread is returned to the
477 // foreground cgroup before rejoining the pool. The driver takes care of
478 // restoring the priority, but doesn't do anything with cgroups so we
479 // need to take care of that here in userspace. Note that we do make
480 // sure to go in the foreground after executing a transaction, but
481 // there are other callbacks into user code that could have changed
482 // our group so we want to make absolutely sure it is put back.
483 set_sched_policy(mMyThreadId, SP_FOREGROUND);
485 // Let this thread exit the thread pool if it is no longer
486 // needed and it is not the main process thread.
487 if(result == TIMED_OUT && !isMain) {
490 } while (result != -ECONNREFUSED && result != -EBADF);
492 LOG_THREADPOOL("**** THREAD %p (PID %d) IS LEAVING THE THREAD POOL err=%p\n",
493 (void*)pthread_self(), getpid(), (void*)result);
495 mOut.writeInt32(BC_EXIT_LOOPER);
496 talkWithDriver(false);
499 void IPCThreadState::stopProcess(bool immediate)
501 //ALOGI("**** STOPPING PROCESS");
503 int fd = mProcess->mDriverFD;
504 mProcess->mDriverFD = -1;
506 //kill(getpid(), SIGKILL);
509 status_t IPCThreadState::transact(int32_t handle,
510 uint32_t code, const Parcel& data,
511 Parcel* reply, uint32_t flags)
513 status_t err = data.errorCheck();
515 flags |= TF_ACCEPT_FDS;
517 IF_LOG_TRANSACTIONS() {
518 TextOutput::Bundle _b(alog);
519 alog << "BC_TRANSACTION thr " << (void*)pthread_self() << " / hand "
520 << handle << " / code " << TypeCode(code) << ": "
521 << indent << data << dedent << endl;
524 if (err == NO_ERROR) {
525 LOG_ONEWAY(">>>> SEND from pid %d uid %d %s", getpid(), getuid(),
526 (flags & TF_ONE_WAY) == 0 ? "READ REPLY" : "ONE WAY");
527 err = writeTransactionData(BC_TRANSACTION, flags, handle, code, data, NULL);
530 if (err != NO_ERROR) {
531 if (reply) reply->setError(err);
532 return (mLastError = err);
535 if ((flags & TF_ONE_WAY) == 0) {
537 if (code == 4) { // relayout
538 ALOGI(">>>>>> CALLING transaction 4");
540 ALOGI(">>>>>> CALLING transaction %d", code);
544 err = waitForResponse(reply);
547 err = waitForResponse(&fakeReply);
550 if (code == 4) { // relayout
551 ALOGI("<<<<<< RETURNING transaction 4");
553 ALOGI("<<<<<< RETURNING transaction %d", code);
557 IF_LOG_TRANSACTIONS() {
558 TextOutput::Bundle _b(alog);
559 alog << "BR_REPLY thr " << (void*)pthread_self() << " / hand "
561 if (reply) alog << indent << *reply << dedent << endl;
562 else alog << "(none requested)" << endl;
565 err = waitForResponse(NULL, NULL);
571 void IPCThreadState::incStrongHandle(int32_t handle)
573 LOG_REMOTEREFS("IPCThreadState::incStrongHandle(%d)\n", handle);
574 mOut.writeInt32(BC_ACQUIRE);
575 mOut.writeInt32(handle);
578 void IPCThreadState::decStrongHandle(int32_t handle)
580 LOG_REMOTEREFS("IPCThreadState::decStrongHandle(%d)\n", handle);
581 mOut.writeInt32(BC_RELEASE);
582 mOut.writeInt32(handle);
585 void IPCThreadState::incWeakHandle(int32_t handle)
587 LOG_REMOTEREFS("IPCThreadState::incWeakHandle(%d)\n", handle);
588 mOut.writeInt32(BC_INCREFS);
589 mOut.writeInt32(handle);
592 void IPCThreadState::decWeakHandle(int32_t handle)
594 LOG_REMOTEREFS("IPCThreadState::decWeakHandle(%d)\n", handle);
595 mOut.writeInt32(BC_DECREFS);
596 mOut.writeInt32(handle);
599 status_t IPCThreadState::attemptIncStrongHandle(int32_t handle)
601 LOG_REMOTEREFS("IPCThreadState::attemptIncStrongHandle(%d)\n", handle);
602 mOut.writeInt32(BC_ATTEMPT_ACQUIRE);
603 mOut.writeInt32(0); // xxx was thread priority
604 mOut.writeInt32(handle);
605 status_t result = UNKNOWN_ERROR;
607 waitForResponse(NULL, &result);
610 printf("IPCThreadState::attemptIncStrongHandle(%ld) = %s\n",
611 handle, result == NO_ERROR ? "SUCCESS" : "FAILURE");
617 void IPCThreadState::expungeHandle(int32_t handle, IBinder* binder)
620 printf("IPCThreadState::expungeHandle(%ld)\n", handle);
622 self()->mProcess->expungeHandle(handle, binder);
625 status_t IPCThreadState::requestDeathNotification(int32_t handle, BpBinder* proxy)
627 mOut.writeInt32(BC_REQUEST_DEATH_NOTIFICATION);
628 mOut.writeInt32((int32_t)handle);
629 mOut.writeInt32((int32_t)proxy);
633 status_t IPCThreadState::clearDeathNotification(int32_t handle, BpBinder* proxy)
635 mOut.writeInt32(BC_CLEAR_DEATH_NOTIFICATION);
636 mOut.writeInt32((int32_t)handle);
637 mOut.writeInt32((int32_t)proxy);
641 IPCThreadState::IPCThreadState()
642 : mProcess(ProcessState::self()),
643 mMyThreadId(androidGetTid()),
644 mStrictModePolicy(0),
645 mLastTransactionBinderFlags(0)
647 pthread_setspecific(gTLS, this);
649 mOrigCallingUid = mCallingUid;
650 mIn.setDataCapacity(256);
651 mOut.setDataCapacity(256);
654 IPCThreadState::~IPCThreadState()
658 status_t IPCThreadState::sendReply(const Parcel& reply, uint32_t flags)
661 status_t statusBuffer;
662 err = writeTransactionData(BC_REPLY, flags, -1, 0, reply, &statusBuffer);
663 if (err < NO_ERROR) return err;
665 return waitForResponse(NULL, NULL);
668 status_t IPCThreadState::waitForResponse(Parcel *reply, status_t *acquireResult)
674 if ((err=talkWithDriver()) < NO_ERROR) break;
675 err = mIn.errorCheck();
676 if (err < NO_ERROR) break;
677 if (mIn.dataAvail() == 0) continue;
679 cmd = mIn.readInt32();
682 alog << "Processing waitForResponse Command: "
683 << getReturnString(cmd) << endl;
687 case BR_TRANSACTION_COMPLETE:
688 if (!reply && !acquireResult) goto finish;
695 case BR_FAILED_REPLY:
696 err = FAILED_TRANSACTION;
699 case BR_ACQUIRE_RESULT:
701 ALOG_ASSERT(acquireResult != NULL, "Unexpected brACQUIRE_RESULT");
702 const int32_t result = mIn.readInt32();
703 if (!acquireResult) continue;
704 *acquireResult = result ? NO_ERROR : INVALID_OPERATION;
710 binder_transaction_data tr;
711 err = mIn.read(&tr, sizeof(tr));
712 ALOG_ASSERT(err == NO_ERROR, "Not enough command data for brREPLY");
713 if (err != NO_ERROR) goto finish;
716 if ((tr.flags & TF_STATUS_CODE) == 0) {
717 reply->ipcSetDataReference(
718 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
720 reinterpret_cast<const size_t*>(tr.data.ptr.offsets),
721 tr.offsets_size/sizeof(size_t),
724 err = *static_cast<const status_t*>(tr.data.ptr.buffer);
726 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
728 reinterpret_cast<const size_t*>(tr.data.ptr.offsets),
729 tr.offsets_size/sizeof(size_t), this);
733 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
735 reinterpret_cast<const size_t*>(tr.data.ptr.offsets),
736 tr.offsets_size/sizeof(size_t), this);
743 err = executeCommand(cmd);
744 if (err != NO_ERROR) goto finish;
750 if (err != NO_ERROR) {
751 if (acquireResult) *acquireResult = err;
752 if (reply) reply->setError(err);
759 status_t IPCThreadState::talkWithDriver(bool doReceive)
761 ALOG_ASSERT(mProcess->mDriverFD >= 0, "Binder driver is not opened");
763 binder_write_read bwr;
765 // Is the read buffer empty?
766 const bool needRead = mIn.dataPosition() >= mIn.dataSize();
768 // We don't want to write anything if we are still reading
769 // from data left in the input buffer and the caller
770 // has requested to read the next data.
771 const size_t outAvail = (!doReceive || needRead) ? mOut.dataSize() : 0;
773 bwr.write_size = outAvail;
774 bwr.write_buffer = (long unsigned int)mOut.data();
776 // This is what we'll read.
777 if (doReceive && needRead) {
778 bwr.read_size = mIn.dataCapacity();
779 bwr.read_buffer = (long unsigned int)mIn.data();
786 TextOutput::Bundle _b(alog);
788 alog << "Sending commands to driver: " << indent;
789 const void* cmds = (const void*)bwr.write_buffer;
790 const void* end = ((const uint8_t*)cmds)+bwr.write_size;
791 alog << HexDump(cmds, bwr.write_size) << endl;
792 while (cmds < end) cmds = printCommand(alog, cmds);
795 alog << "Size of receive buffer: " << bwr.read_size
796 << ", needRead: " << needRead << ", doReceive: " << doReceive << endl;
799 // Return immediately if there is nothing to do.
800 if ((bwr.write_size == 0) && (bwr.read_size == 0)) return NO_ERROR;
802 bwr.write_consumed = 0;
803 bwr.read_consumed = 0;
807 alog << "About to read/write, write size = " << mOut.dataSize() << endl;
809 #if defined(HAVE_ANDROID_OS)
810 if (ioctl(mProcess->mDriverFD, BINDER_WRITE_READ, &bwr) >= 0)
815 err = INVALID_OPERATION;
818 alog << "Finished read/write, write size = " << mOut.dataSize() << endl;
820 } while (err == -EINTR);
823 alog << "Our err: " << (void*)err << ", write consumed: "
824 << bwr.write_consumed << " (of " << mOut.dataSize()
825 << "), read consumed: " << bwr.read_consumed << endl;
828 if (err >= NO_ERROR) {
829 if (bwr.write_consumed > 0) {
830 if (bwr.write_consumed < (ssize_t)mOut.dataSize())
831 mOut.remove(0, bwr.write_consumed);
835 if (bwr.read_consumed > 0) {
836 mIn.setDataSize(bwr.read_consumed);
837 mIn.setDataPosition(0);
840 TextOutput::Bundle _b(alog);
841 alog << "Remaining data size: " << mOut.dataSize() << endl;
842 alog << "Received commands from driver: " << indent;
843 const void* cmds = mIn.data();
844 const void* end = mIn.data() + mIn.dataSize();
845 alog << HexDump(cmds, mIn.dataSize()) << endl;
846 while (cmds < end) cmds = printReturnCommand(alog, cmds);
855 status_t IPCThreadState::writeTransactionData(int32_t cmd, uint32_t binderFlags,
856 int32_t handle, uint32_t code, const Parcel& data, status_t* statusBuffer)
858 binder_transaction_data tr;
860 tr.target.handle = handle;
862 tr.flags = binderFlags;
867 const status_t err = data.errorCheck();
868 if (err == NO_ERROR) {
869 tr.data_size = data.ipcDataSize();
870 tr.data.ptr.buffer = data.ipcData();
871 tr.offsets_size = data.ipcObjectsCount()*sizeof(size_t);
872 tr.data.ptr.offsets = data.ipcObjects();
873 } else if (statusBuffer) {
874 tr.flags |= TF_STATUS_CODE;
876 tr.data_size = sizeof(status_t);
877 tr.data.ptr.buffer = statusBuffer;
879 tr.data.ptr.offsets = NULL;
881 return (mLastError = err);
884 mOut.writeInt32(cmd);
885 mOut.write(&tr, sizeof(tr));
890 sp<BBinder> the_context_object;
892 void setTheContextObject(sp<BBinder> obj)
894 the_context_object = obj;
897 status_t IPCThreadState::executeCommand(int32_t cmd)
900 RefBase::weakref_type* refs;
901 status_t result = NO_ERROR;
905 result = mIn.readInt32();
912 refs = (RefBase::weakref_type*)mIn.readInt32();
913 obj = (BBinder*)mIn.readInt32();
914 ALOG_ASSERT(refs->refBase() == obj,
915 "BR_ACQUIRE: object %p does not match cookie %p (expected %p)",
916 refs, obj, refs->refBase());
917 obj->incStrong(mProcess.get());
918 IF_LOG_REMOTEREFS() {
919 LOG_REMOTEREFS("BR_ACQUIRE from driver on %p", obj);
922 mOut.writeInt32(BC_ACQUIRE_DONE);
923 mOut.writeInt32((int32_t)refs);
924 mOut.writeInt32((int32_t)obj);
928 refs = (RefBase::weakref_type*)mIn.readInt32();
929 obj = (BBinder*)mIn.readInt32();
930 ALOG_ASSERT(refs->refBase() == obj,
931 "BR_RELEASE: object %p does not match cookie %p (expected %p)",
932 refs, obj, refs->refBase());
933 IF_LOG_REMOTEREFS() {
934 LOG_REMOTEREFS("BR_RELEASE from driver on %p", obj);
937 mPendingStrongDerefs.push(obj);
941 refs = (RefBase::weakref_type*)mIn.readInt32();
942 obj = (BBinder*)mIn.readInt32();
943 refs->incWeak(mProcess.get());
944 mOut.writeInt32(BC_INCREFS_DONE);
945 mOut.writeInt32((int32_t)refs);
946 mOut.writeInt32((int32_t)obj);
950 refs = (RefBase::weakref_type*)mIn.readInt32();
951 obj = (BBinder*)mIn.readInt32();
952 // NOTE: This assertion is not valid, because the object may no
953 // longer exist (thus the (BBinder*)cast above resulting in a different
955 //ALOG_ASSERT(refs->refBase() == obj,
956 // "BR_DECREFS: object %p does not match cookie %p (expected %p)",
957 // refs, obj, refs->refBase());
958 mPendingWeakDerefs.push(refs);
961 case BR_ATTEMPT_ACQUIRE:
962 refs = (RefBase::weakref_type*)mIn.readInt32();
963 obj = (BBinder*)mIn.readInt32();
966 const bool success = refs->attemptIncStrong(mProcess.get());
967 ALOG_ASSERT(success && refs->refBase() == obj,
968 "BR_ATTEMPT_ACQUIRE: object %p does not match cookie %p (expected %p)",
969 refs, obj, refs->refBase());
971 mOut.writeInt32(BC_ACQUIRE_RESULT);
972 mOut.writeInt32((int32_t)success);
978 binder_transaction_data tr;
979 result = mIn.read(&tr, sizeof(tr));
980 ALOG_ASSERT(result == NO_ERROR,
981 "Not enough command data for brTRANSACTION");
982 if (result != NO_ERROR) break;
985 buffer.ipcSetDataReference(
986 reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer),
988 reinterpret_cast<const size_t*>(tr.data.ptr.offsets),
989 tr.offsets_size/sizeof(size_t), freeBuffer, this);
991 const pid_t origPid = mCallingPid;
992 const uid_t origUid = mCallingUid;
994 mCallingPid = tr.sender_pid;
995 mCallingUid = tr.sender_euid;
996 mOrigCallingUid = tr.sender_euid;
998 int curPrio = getpriority(PRIO_PROCESS, mMyThreadId);
999 if (gDisableBackgroundScheduling) {
1000 if (curPrio > ANDROID_PRIORITY_NORMAL) {
1001 // We have inherited a reduced priority from the caller, but do not
1002 // want to run in that state in this process. The driver set our
1003 // priority already (though not our scheduling class), so bounce
1004 // it back to the default before invoking the transaction.
1005 setpriority(PRIO_PROCESS, mMyThreadId, ANDROID_PRIORITY_NORMAL);
1008 if (curPrio >= ANDROID_PRIORITY_BACKGROUND) {
1009 // We want to use the inherited priority from the caller.
1010 // Ensure this thread is in the background scheduling class,
1011 // since the driver won't modify scheduling classes for us.
1012 // The scheduling group is reset to default by the caller
1013 // once this method returns after the transaction is complete.
1014 set_sched_policy(mMyThreadId, SP_BACKGROUND);
1018 //ALOGI(">>>> TRANSACT from pid %d uid %d\n", mCallingPid, mCallingUid);
1021 IF_LOG_TRANSACTIONS() {
1022 TextOutput::Bundle _b(alog);
1023 alog << "BR_TRANSACTION thr " << (void*)pthread_self()
1024 << " / obj " << tr.target.ptr << " / code "
1025 << TypeCode(tr.code) << ": " << indent << buffer
1028 << reinterpret_cast<const uint8_t*>(tr.data.ptr.buffer)
1029 << ", offsets addr="
1030 << reinterpret_cast<const size_t*>(tr.data.ptr.offsets) << endl;
1032 if (tr.target.ptr) {
1033 sp<BBinder> b((BBinder*)tr.cookie);
1034 const status_t error = b->transact(tr.code, buffer, &reply, tr.flags);
1035 if (error < NO_ERROR) reply.setError(error);
1038 const status_t error = the_context_object->transact(tr.code, buffer, &reply, tr.flags);
1039 if (error < NO_ERROR) reply.setError(error);
1042 //ALOGI("<<<< TRANSACT from pid %d restore pid %d uid %d\n",
1043 // mCallingPid, origPid, origUid);
1045 if ((tr.flags & TF_ONE_WAY) == 0) {
1046 LOG_ONEWAY("Sending reply to %d!", mCallingPid);
1047 sendReply(reply, 0);
1049 LOG_ONEWAY("NOT sending reply to %d!", mCallingPid);
1052 mCallingPid = origPid;
1053 mCallingUid = origUid;
1054 mOrigCallingUid = origUid;
1056 IF_LOG_TRANSACTIONS() {
1057 TextOutput::Bundle _b(alog);
1058 alog << "BC_REPLY thr " << (void*)pthread_self() << " / obj "
1059 << tr.target.ptr << ": " << indent << reply << dedent << endl;
1065 case BR_DEAD_BINDER:
1067 BpBinder *proxy = (BpBinder*)mIn.readInt32();
1068 proxy->sendObituary();
1069 mOut.writeInt32(BC_DEAD_BINDER_DONE);
1070 mOut.writeInt32((int32_t)proxy);
1073 case BR_CLEAR_DEATH_NOTIFICATION_DONE:
1075 BpBinder *proxy = (BpBinder*)mIn.readInt32();
1076 proxy->getWeakRefs()->decWeak(proxy);
1086 case BR_SPAWN_LOOPER:
1087 mProcess->spawnPooledThread(false);
1091 printf("*** BAD COMMAND %d received from Binder driver\n", cmd);
1092 result = UNKNOWN_ERROR;
1096 if (result != NO_ERROR) {
1097 mLastError = result;
1103 void IPCThreadState::threadDestructor(void *st)
1105 IPCThreadState* const self = static_cast<IPCThreadState*>(st);
1107 self->flushCommands();
1108 #if defined(HAVE_ANDROID_OS)
1109 ioctl(self->mProcess->mDriverFD, BINDER_THREAD_EXIT, 0);
1116 void IPCThreadState::freeBuffer(Parcel* parcel, const uint8_t* data, size_t dataSize,
1117 const size_t* objects, size_t objectsSize,
1120 //ALOGI("Freeing parcel %p", &parcel);
1122 alog << "Writing BC_FREE_BUFFER for " << data << endl;
1124 ALOG_ASSERT(data != NULL, "Called with NULL data");
1125 if (parcel != NULL) parcel->closeFileDescriptors();
1126 IPCThreadState* state = self();
1127 state->mOut.writeInt32(BC_FREE_BUFFER);
1128 state->mOut.writeInt32((int32_t)data);
1131 }; // namespace android