/* * Copyright (C) 2005 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef __linux__ #include #endif #include "BuildFlags.h" #include "OS.h" #include "RpcState.h" namespace android { using android::binder::unique_fd; constexpr uid_t kUidRoot = 0; // Service implementations inherit from BBinder and IBinder, and this is frozen // in prebuilts. #ifdef __LP64__ static_assert(sizeof(IBinder) == 24); static_assert(sizeof(BBinder) == 40); #else static_assert(sizeof(IBinder) == 12); static_assert(sizeof(BBinder) == 20); #endif // global b/c b/230079120 - consistent symbol table #ifdef BINDER_RPC_DEV_SERVERS constexpr bool kEnableRpcDevServers = true; #else constexpr bool kEnableRpcDevServers = false; #endif #ifdef BINDER_ENABLE_RECORDING constexpr bool kEnableRecording = true; #else constexpr bool kEnableRecording = false; #endif // Log any reply transactions for which the data exceeds this size #define LOG_REPLIES_OVER_SIZE (300 * 1024) // --------------------------------------------------------------------------- IBinder::IBinder() : RefBase() { } IBinder::~IBinder() { } // --------------------------------------------------------------------------- sp IBinder::queryLocalInterface(const String16& /*descriptor*/) { return nullptr; } BBinder* IBinder::localBinder() { return nullptr; } BpBinder* IBinder::remoteBinder() { return nullptr; } bool IBinder::checkSubclass(const void* /*subclassID*/) const { return false; } status_t IBinder::shellCommand(const sp& target, int in, int out, int err, Vector& args, const sp& callback, const sp& resultReceiver) { Parcel send; Parcel reply; send.writeFileDescriptor(in); send.writeFileDescriptor(out); send.writeFileDescriptor(err); const size_t numArgs = args.size(); send.writeInt32(numArgs); for (size_t i = 0; i < numArgs; i++) { send.writeString16(args[i]); } send.writeStrongBinder(callback != nullptr ? IInterface::asBinder(callback) : nullptr); send.writeStrongBinder(resultReceiver != nullptr ? IInterface::asBinder(resultReceiver) : nullptr); return target->transact(SHELL_COMMAND_TRANSACTION, send, &reply); } status_t IBinder::getExtension(sp* out) { BBinder* local = this->localBinder(); if (local != nullptr) { *out = local->getExtension(); return OK; } BpBinder* proxy = this->remoteBinder(); LOG_ALWAYS_FATAL_IF(proxy == nullptr); Parcel data; Parcel reply; status_t status = transact(EXTENSION_TRANSACTION, data, &reply); if (status != OK) return status; return reply.readNullableStrongBinder(out); } status_t IBinder::addFrozenStateChangeCallback(const wp& callback) { BpBinder* proxy = this->remoteBinder(); if (proxy != nullptr) { return proxy->addFrozenStateChangeCallback(callback); } return INVALID_OPERATION; } status_t IBinder::removeFrozenStateChangeCallback(const wp& callback) { BpBinder* proxy = this->remoteBinder(); if (proxy != nullptr) { return proxy->removeFrozenStateChangeCallback(callback); } return INVALID_OPERATION; } status_t IBinder::getDebugPid(pid_t* out) { BBinder* local = this->localBinder(); if (local != nullptr) { *out = local->getDebugPid(); return OK; } BpBinder* proxy = this->remoteBinder(); LOG_ALWAYS_FATAL_IF(proxy == nullptr); Parcel data; Parcel reply; status_t status = transact(DEBUG_PID_TRANSACTION, data, &reply); if (status != OK) return status; int32_t pid; status = reply.readInt32(&pid); if (status != OK) return status; if (pid < 0 || pid > std::numeric_limits::max()) { return BAD_VALUE; } *out = pid; return OK; } status_t IBinder::setRpcClientDebug(unique_fd socketFd, const sp& keepAliveBinder) { if (!kEnableRpcDevServers) { ALOGW("setRpcClientDebug disallowed because RPC is not enabled"); return INVALID_OPERATION; } if (!kEnableKernelIpc) { ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled"); return INVALID_OPERATION; } BBinder* local = this->localBinder(); if (local != nullptr) { return local->BBinder::setRpcClientDebug(std::move(socketFd), keepAliveBinder); } BpBinder* proxy = this->remoteBinder(); LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote"); Parcel data; Parcel reply; status_t status; if (status = data.writeBool(socketFd.ok()); status != OK) return status; if (socketFd.ok()) { // writeUniqueFileDescriptor currently makes an unnecessary dup(). status = data.writeFileDescriptor(socketFd.release(), true /* own */); if (status != OK) return status; } if (status = data.writeStrongBinder(keepAliveBinder); status != OK) return status; return transact(SET_RPC_CLIENT_TRANSACTION, data, &reply); } void IBinder::withLock(const std::function& doWithLock) { BBinder* local = localBinder(); if (local) { local->withLock(doWithLock); return; } BpBinder* proxy = this->remoteBinder(); LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote"); proxy->withLock(doWithLock); } sp IBinder::lookupOrCreateWeak(const void* objectID, object_make_func make, const void* makeArgs) { BBinder* local = localBinder(); if (local) { return local->lookupOrCreateWeak(objectID, make, makeArgs); } BpBinder* proxy = this->remoteBinder(); LOG_ALWAYS_FATAL_IF(proxy == nullptr, "binder object must be either local or remote"); return proxy->lookupOrCreateWeak(objectID, make, makeArgs); } // --------------------------------------------------------------------------- class BBinder::RpcServerLink : public IBinder::DeathRecipient { public: // On binder died, calls RpcServer::shutdown on @a rpcServer, and removes itself from @a binder. RpcServerLink(const sp& rpcServer, const sp& keepAliveBinder, const wp& binder) : mRpcServer(rpcServer), mKeepAliveBinder(keepAliveBinder), mBinder(binder) {} virtual ~RpcServerLink(); void binderDied(const wp&) override { auto promoted = mBinder.promote(); ALOGI("RpcBinder: binder died, shutting down RpcServer for %s", promoted ? String8(promoted->getInterfaceDescriptor()).c_str() : ""); if (mRpcServer == nullptr) { ALOGW("RpcServerLink: Unable to shut down RpcServer because it does not exist."); } else { ALOGW_IF(!mRpcServer->shutdown(), "RpcServerLink: RpcServer did not shut down properly. Not started?"); } mRpcServer.clear(); if (promoted) { promoted->removeRpcServerLink(sp::fromExisting(this)); } mBinder.clear(); } private: sp mRpcServer; sp mKeepAliveBinder; // hold to avoid automatically unlinking wp mBinder; }; BBinder::RpcServerLink::~RpcServerLink() {} class BBinder::Extras { public: // unlocked objects sp mExtension; #ifdef __linux__ int mPolicy = SCHED_NORMAL; int mPriority = 0; #endif bool mRequestingSid = false; bool mInheritRt = false; // for below objects RpcMutex mLock; std::set> mRpcServerLinks; BpBinder::ObjectManager mObjects; unique_fd mRecordingFd; }; // --------------------------------------------------------------------------- BBinder::BBinder() : mExtras(nullptr), mStability(0), mParceled(false), mRecordingOn(false) {} bool BBinder::isBinderAlive() const { return true; } status_t BBinder::pingBinder() { return NO_ERROR; } status_t BBinder::startRecordingTransactions(const Parcel& data) { if (!kEnableRecording) { ALOGW("Binder recording disallowed because recording is not enabled"); return INVALID_OPERATION; } if (!kEnableKernelIpc) { ALOGW("Binder recording disallowed because kernel binder is not enabled"); return INVALID_OPERATION; } uid_t uid = IPCThreadState::self()->getCallingUid(); if (uid != kUidRoot) { ALOGE("Binder recording not allowed because client %" PRIu32 " is not root", uid); return PERMISSION_DENIED; } Extras* e = getOrCreateExtras(); RpcMutexUniqueLock lock(e->mLock); if (mRecordingOn) { ALOGI("Could not start Binder recording. Another is already in progress."); return INVALID_OPERATION; } else { status_t readStatus = data.readUniqueFileDescriptor(&(e->mRecordingFd)); if (readStatus != OK) { return readStatus; } mRecordingOn = true; ALOGI("Started Binder recording."); return NO_ERROR; } } status_t BBinder::stopRecordingTransactions() { if (!kEnableRecording) { ALOGW("Binder recording disallowed because recording is not enabled"); return INVALID_OPERATION; } if (!kEnableKernelIpc) { ALOGW("Binder recording disallowed because kernel binder is not enabled"); return INVALID_OPERATION; } uid_t uid = IPCThreadState::self()->getCallingUid(); if (uid != kUidRoot) { ALOGE("Binder recording not allowed because client %" PRIu32 " is not root", uid); return PERMISSION_DENIED; } Extras* e = getOrCreateExtras(); RpcMutexUniqueLock lock(e->mLock); if (mRecordingOn) { e->mRecordingFd.reset(); mRecordingOn = false; ALOGI("Stopped Binder recording."); return NO_ERROR; } else { ALOGI("Could not stop Binder recording. One is not in progress."); return INVALID_OPERATION; } } const String16& BBinder::getInterfaceDescriptor() const { static StaticString16 sBBinder(u"BBinder"); ALOGW("Reached BBinder::getInterfaceDescriptor (this=%p). Override?", this); return sBBinder; } // NOLINTNEXTLINE(google-default-arguments) status_t BBinder::transact( uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags) { data.setDataPosition(0); if (reply != nullptr && (flags & FLAG_CLEAR_BUF)) { reply->markSensitive(); } status_t err = NO_ERROR; switch (code) { case PING_TRANSACTION: err = pingBinder(); break; case START_RECORDING_TRANSACTION: err = startRecordingTransactions(data); break; case STOP_RECORDING_TRANSACTION: err = stopRecordingTransactions(); break; case EXTENSION_TRANSACTION: LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr"); err = reply->writeStrongBinder(getExtension()); break; case DEBUG_PID_TRANSACTION: LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr"); err = reply->writeInt32(getDebugPid()); break; case SET_RPC_CLIENT_TRANSACTION: { err = setRpcClientDebug(data); break; } default: err = onTransact(code, data, reply, flags); break; } // In case this is being transacted on in the same process. if (reply != nullptr) { reply->setDataPosition(0); if (reply->dataSize() > LOG_REPLIES_OVER_SIZE) { ALOGW("Large reply transaction of %zu bytes, interface descriptor %s, code %d", reply->dataSize(), String8(getInterfaceDescriptor()).c_str(), code); } } if (kEnableKernelIpc && mRecordingOn && code != START_RECORDING_TRANSACTION) [[unlikely]] { Extras* e = mExtras.load(std::memory_order_acquire); RpcMutexUniqueLock lock(e->mLock); if (mRecordingOn) { Parcel emptyReply; timespec ts; timespec_get(&ts, TIME_UTC); auto transaction = android::binder::debug::RecordedTransaction:: fromDetails(getInterfaceDescriptor(), code, flags, ts, data, reply ? *reply : emptyReply, err); if (transaction) { if (status_t err = transaction->dumpToFile(e->mRecordingFd); err != NO_ERROR) { ALOGI("Failed to dump RecordedTransaction to file with error %d", err); } } else { ALOGI("Failed to create RecordedTransaction object."); } } } return err; } // NOLINTNEXTLINE(google-default-arguments) status_t BBinder::linkToDeath( const sp& /*recipient*/, void* /*cookie*/, uint32_t /*flags*/) { return INVALID_OPERATION; } // NOLINTNEXTLINE(google-default-arguments) status_t BBinder::unlinkToDeath( const wp& /*recipient*/, void* /*cookie*/, uint32_t /*flags*/, wp* /*outRecipient*/) { return INVALID_OPERATION; } status_t BBinder::dump(int /*fd*/, const Vector& /*args*/) { return NO_ERROR; } void* BBinder::attachObject(const void* objectID, void* object, void* cleanupCookie, object_cleanup_func func) { Extras* e = getOrCreateExtras(); LOG_ALWAYS_FATAL_IF(!e, "no memory"); RpcMutexUniqueLock _l(e->mLock); return e->mObjects.attach(objectID, object, cleanupCookie, func); } void* BBinder::findObject(const void* objectID) const { Extras* e = mExtras.load(std::memory_order_acquire); if (!e) return nullptr; RpcMutexUniqueLock _l(e->mLock); return e->mObjects.find(objectID); } void* BBinder::detachObject(const void* objectID) { Extras* e = mExtras.load(std::memory_order_acquire); if (!e) return nullptr; RpcMutexUniqueLock _l(e->mLock); return e->mObjects.detach(objectID); } void BBinder::withLock(const std::function& doWithLock) { Extras* e = getOrCreateExtras(); LOG_ALWAYS_FATAL_IF(!e, "no memory"); RpcMutexUniqueLock _l(e->mLock); doWithLock(); } sp BBinder::lookupOrCreateWeak(const void* objectID, object_make_func make, const void* makeArgs) { Extras* e = getOrCreateExtras(); LOG_ALWAYS_FATAL_IF(!e, "no memory"); RpcMutexUniqueLock _l(e->mLock); return e->mObjects.lookupOrCreateWeak(objectID, make, makeArgs); } BBinder* BBinder::localBinder() { return this; } bool BBinder::isRequestingSid() { Extras* e = mExtras.load(std::memory_order_acquire); return e && e->mRequestingSid; } void BBinder::setRequestingSid(bool requestingSid) { LOG_ALWAYS_FATAL_IF(mParceled, "setRequestingSid() should not be called after a binder object " "is parceled/sent to another process"); Extras* e = mExtras.load(std::memory_order_acquire); if (!e) { // default is false. Most things don't need sids, so avoiding allocations when possible. if (!requestingSid) { return; } e = getOrCreateExtras(); if (!e) return; // out of memory } e->mRequestingSid = requestingSid; } sp BBinder::getExtension() { Extras* e = mExtras.load(std::memory_order_acquire); if (e == nullptr) return nullptr; return e->mExtension; } #ifdef __linux__ void BBinder::setMinSchedulerPolicy(int policy, int priority) { LOG_ALWAYS_FATAL_IF(mParceled, "setMinSchedulerPolicy() should not be called after a binder object " "is parceled/sent to another process"); switch (policy) { case SCHED_NORMAL: LOG_ALWAYS_FATAL_IF(priority < -20 || priority > 19, "Invalid priority for SCHED_NORMAL: %d", priority); break; case SCHED_RR: case SCHED_FIFO: LOG_ALWAYS_FATAL_IF(priority < 1 || priority > 99, "Invalid priority for sched %d: %d", policy, priority); break; default: LOG_ALWAYS_FATAL("Unrecognized scheduling policy: %d", policy); } Extras* e = mExtras.load(std::memory_order_acquire); if (e == nullptr) { // Avoid allocations if called with default. if (policy == SCHED_NORMAL && priority == 0) { return; } e = getOrCreateExtras(); if (!e) return; // out of memory } e->mPolicy = policy; e->mPriority = priority; } int BBinder::getMinSchedulerPolicy() { Extras* e = mExtras.load(std::memory_order_acquire); if (e == nullptr) return SCHED_NORMAL; return e->mPolicy; } int BBinder::getMinSchedulerPriority() { Extras* e = mExtras.load(std::memory_order_acquire); if (e == nullptr) return 0; return e->mPriority; } #endif // __linux__ bool BBinder::isInheritRt() { Extras* e = mExtras.load(std::memory_order_acquire); return e && e->mInheritRt; } void BBinder::setInheritRt(bool inheritRt) { LOG_ALWAYS_FATAL_IF(mParceled, "setInheritRt() should not be called after a binder object " "is parceled/sent to another process"); Extras* e = mExtras.load(std::memory_order_acquire); if (!e) { if (!inheritRt) { return; } e = getOrCreateExtras(); if (!e) return; // out of memory } e->mInheritRt = inheritRt; } pid_t BBinder::getDebugPid() { #ifdef __linux__ return getpid(); #else // TODO: handle other OSes return 0; #endif // __linux__ } void BBinder::setExtension(const sp& extension) { LOG_ALWAYS_FATAL_IF(mParceled, "setExtension() should not be called after a binder object " "is parceled/sent to another process"); Extras* e = getOrCreateExtras(); e->mExtension = extension; } bool BBinder::wasParceled() { return mParceled; } void BBinder::setParceled() { mParceled = true; } status_t BBinder::setRpcClientDebug(const Parcel& data) { if (!kEnableRpcDevServers) { ALOGW("%s: disallowed because RPC is not enabled", __PRETTY_FUNCTION__); return INVALID_OPERATION; } if (!kEnableKernelIpc) { ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled"); return INVALID_OPERATION; } uid_t uid = IPCThreadState::self()->getCallingUid(); if (uid != kUidRoot) { ALOGE("%s: not allowed because client %" PRIu32 " is not root", __PRETTY_FUNCTION__, uid); return PERMISSION_DENIED; } status_t status; bool hasSocketFd; unique_fd clientFd; if (status = data.readBool(&hasSocketFd); status != OK) return status; if (hasSocketFd) { if (status = data.readUniqueFileDescriptor(&clientFd); status != OK) return status; } sp keepAliveBinder; if (status = data.readNullableStrongBinder(&keepAliveBinder); status != OK) return status; return setRpcClientDebug(std::move(clientFd), keepAliveBinder); } status_t BBinder::setRpcClientDebug(unique_fd socketFd, const sp& keepAliveBinder) { if (!kEnableRpcDevServers) { ALOGW("%s: disallowed because RPC is not enabled", __PRETTY_FUNCTION__); return INVALID_OPERATION; } if (!kEnableKernelIpc) { ALOGW("setRpcClientDebug disallowed because kernel binder is not enabled"); return INVALID_OPERATION; } const int socketFdForPrint = socketFd.get(); LOG_RPC_DETAIL("%s(fd=%d)", __PRETTY_FUNCTION__, socketFdForPrint); if (!socketFd.ok()) { ALOGE("%s: No socket FD provided.", __PRETTY_FUNCTION__); return BAD_VALUE; } if (keepAliveBinder == nullptr) { ALOGE("%s: No keepAliveBinder provided.", __PRETTY_FUNCTION__); return UNEXPECTED_NULL; } size_t binderThreadPoolMaxCount = ProcessState::self()->getThreadPoolMaxTotalThreadCount(); if (binderThreadPoolMaxCount <= 1) { ALOGE("%s: ProcessState thread pool max count is %zu. RPC is disabled for this service " "because RPC requires the service to support multithreading.", __PRETTY_FUNCTION__, binderThreadPoolMaxCount); return INVALID_OPERATION; } // Weak ref to avoid circular dependency: // BBinder -> RpcServerLink ----> RpcServer -X-> BBinder // `-X-> BBinder auto weakThis = wp::fromExisting(this); Extras* e = getOrCreateExtras(); RpcMutexUniqueLock _l(e->mLock); auto rpcServer = RpcServer::make(); LOG_ALWAYS_FATAL_IF(rpcServer == nullptr, "RpcServer::make returns null"); auto link = sp::make(rpcServer, keepAliveBinder, weakThis); if (auto status = keepAliveBinder->linkToDeath(link, nullptr, 0); status != OK) { ALOGE("%s: keepAliveBinder->linkToDeath returns %s", __PRETTY_FUNCTION__, statusToString(status).c_str()); return status; } rpcServer->setRootObjectWeak(weakThis); if (auto status = rpcServer->setupExternalServer(std::move(socketFd)); status != OK) { return status; } rpcServer->setMaxThreads(binderThreadPoolMaxCount); ALOGI("RpcBinder: Started Binder debug on %s", String8(getInterfaceDescriptor()).c_str()); rpcServer->start(); e->mRpcServerLinks.emplace(link); LOG_RPC_DETAIL("%s(fd=%d) successful", __PRETTY_FUNCTION__, socketFdForPrint); return OK; } void BBinder::removeRpcServerLink(const sp& link) { Extras* e = mExtras.load(std::memory_order_acquire); if (!e) return; RpcMutexUniqueLock _l(e->mLock); (void)e->mRpcServerLinks.erase(link); } BBinder::~BBinder() { if (!wasParceled()) { if (getExtension()) { ALOGW("Binder %p destroyed with extension attached before being parceled.", this); } if (isRequestingSid()) { ALOGW("Binder %p destroyed when requesting SID before being parceled.", this); } if (isInheritRt()) { ALOGW("Binder %p destroyed after setInheritRt before being parceled.", this); } #ifdef __linux__ if (getMinSchedulerPolicy() != SCHED_NORMAL) { ALOGW("Binder %p destroyed after setMinSchedulerPolicy before being parceled.", this); } if (getMinSchedulerPriority() != 0) { ALOGW("Binder %p destroyed after setMinSchedulerPolicy before being parceled.", this); } #endif // __linux__ } Extras* e = mExtras.load(std::memory_order_relaxed); if (e) delete e; } // NOLINTNEXTLINE(google-default-arguments) status_t BBinder::onTransact( uint32_t code, const Parcel& data, Parcel* reply, uint32_t /*flags*/) { switch (code) { case INTERFACE_TRANSACTION: LOG_ALWAYS_FATAL_IF(reply == nullptr, "reply == nullptr"); reply->writeString16(getInterfaceDescriptor()); return NO_ERROR; case DUMP_TRANSACTION: { int fd = data.readFileDescriptor(); int argc = data.readInt32(); Vector args; for (int i = 0; i < argc && data.dataAvail() > 0; i++) { args.add(data.readString16()); } return dump(fd, args); } case SHELL_COMMAND_TRANSACTION: { int in = data.readFileDescriptor(); int out = data.readFileDescriptor(); int err = data.readFileDescriptor(); int argc = data.readInt32(); Vector args; for (int i = 0; i < argc && data.dataAvail() > 0; i++) { args.add(data.readString16()); } sp shellCallbackBinder = data.readStrongBinder(); sp resultReceiver = IResultReceiver::asInterface( data.readStrongBinder()); // XXX can't add virtuals until binaries are updated. // sp shellCallback = IShellCallback::asInterface( // shellCallbackBinder); // return shellCommand(in, out, err, args, resultReceiver); (void)in; (void)out; (void)err; if (resultReceiver != nullptr) { resultReceiver->send(INVALID_OPERATION); } return NO_ERROR; } case SYSPROPS_TRANSACTION: { if (!binder::os::report_sysprop_change()) return INVALID_OPERATION; return NO_ERROR; } default: return UNKNOWN_TRANSACTION; } } BBinder::Extras* BBinder::getOrCreateExtras() { Extras* e = mExtras.load(std::memory_order_acquire); if (!e) { e = new Extras; Extras* expected = nullptr; if (!mExtras.compare_exchange_strong(expected, e, std::memory_order_release, std::memory_order_acquire)) { delete e; e = expected; // Filled in by CAS } if (e == nullptr) return nullptr; // out of memory } return e; } // --------------------------------------------------------------------------- enum { // This is used to transfer ownership of the remote binder from // the BpRefBase object holding it (when it is constructed), to the // owner of the BpRefBase object when it first acquires that BpRefBase. kRemoteAcquired = 0x00000001 }; BpRefBase::BpRefBase(const sp& o) : mRemote(o.get()), mRefs(nullptr), mState(0) { extendObjectLifetime(OBJECT_LIFETIME_WEAK); if (mRemote) { mRemote->incStrong(this); // Removed on first IncStrong(). mRefs = mRemote->createWeak(this); // Held for our entire lifetime. } } BpRefBase::~BpRefBase() { if (mRemote) { if (!(mState.load(std::memory_order_relaxed)&kRemoteAcquired)) { mRemote->decStrong(this); } mRefs->decWeak(this); } } void BpRefBase::onFirstRef() { mState.fetch_or(kRemoteAcquired, std::memory_order_relaxed); } void BpRefBase::onLastStrongRef(const void* /*id*/) { if (mRemote) { mRemote->decStrong(this); } } bool BpRefBase::onIncStrongAttempted(uint32_t /*flags*/, const void* /*id*/) { return mRemote ? mRefs->attemptIncStrong(this) : false; } // --------------------------------------------------------------------------- } // namespace android