xref: /aosp_15_r20/frameworks/native/libs/binder/tests/binderRpcTestService.cpp (revision 38e8c45f13ce32b0dcecb25141ffecaf386fa17f)
1 /*
2  * Copyright (C) 2022 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "binderRpcTestCommon.h"
18 
19 using namespace android;
20 using android::binder::ReadFdToString;
21 using android::binder::unique_fd;
22 
23 class MyBinderRpcTestAndroid : public MyBinderRpcTestBase {
24 public:
25     wp<RpcServer> server;
26 
countBinders(std::vector<int32_t> * out)27     Status countBinders(std::vector<int32_t>* out) override {
28         return countBindersImpl(server, out);
29     }
30 
die(bool cleanup)31     Status die(bool cleanup) override {
32         if (cleanup) {
33             exit(1);
34         } else {
35             _exit(1);
36         }
37     }
38 
scheduleShutdown()39     Status scheduleShutdown() override {
40         sp<RpcServer> strongServer = server.promote();
41         if (strongServer == nullptr) {
42             return Status::fromExceptionCode(Status::EX_NULL_POINTER);
43         }
44         RpcMaybeThread([=] {
45             LOG_ALWAYS_FATAL_IF(!strongServer->shutdown(), "Could not shutdown");
46         }).detach();
47         return Status::ok();
48     }
49 
useKernelBinderCallingId()50     Status useKernelBinderCallingId() override {
51         // this is WRONG! It does not make sense when using RPC binder, and
52         // because it is SO wrong, and so much code calls this, it should abort!
53 
54         if constexpr (kEnableKernelIpc) {
55             (void)IPCThreadState::self()->getCallingPid();
56         }
57         return Status::ok();
58     }
59 
echoAsFile(const std::string & content,android::os::ParcelFileDescriptor * out)60     Status echoAsFile(const std::string& content, android::os::ParcelFileDescriptor* out) override {
61         out->reset(mockFileDescriptor(content));
62         return Status::ok();
63     }
64 
concatFiles(const std::vector<android::os::ParcelFileDescriptor> & files,android::os::ParcelFileDescriptor * out)65     Status concatFiles(const std::vector<android::os::ParcelFileDescriptor>& files,
66                        android::os::ParcelFileDescriptor* out) override {
67         std::string acc;
68         for (const auto& file : files) {
69             std::string result;
70             LOG_ALWAYS_FATAL_IF(!ReadFdToString(file.get(), &result));
71             acc.append(result);
72         }
73         out->reset(mockFileDescriptor(acc));
74         return Status::ok();
75     }
76 
77     HandoffChannel<unique_fd> mFdChannel;
78 
blockingSendFdOneway(const android::os::ParcelFileDescriptor & fd)79     Status blockingSendFdOneway(const android::os::ParcelFileDescriptor& fd) override {
80         mFdChannel.write(unique_fd(fcntl(fd.get(), F_DUPFD_CLOEXEC, 0)));
81         return Status::ok();
82     }
83 
blockingRecvFd(android::os::ParcelFileDescriptor * fd)84     Status blockingRecvFd(android::os::ParcelFileDescriptor* fd) override {
85         fd->reset(mFdChannel.read());
86         return Status::ok();
87     }
88 
89     HandoffChannel<int> mIntChannel;
90 
blockingSendIntOneway(int n)91     Status blockingSendIntOneway(int n) override {
92         mIntChannel.write(n);
93         return Status::ok();
94     }
95 
blockingRecvInt(int * n)96     Status blockingRecvInt(int* n) override {
97         *n = mIntChannel.read();
98         return Status::ok();
99     }
100 };
101 
main(int argc,char * argv[])102 int main(int argc, char* argv[]) {
103     __android_log_set_logger(__android_log_stderr_logger);
104 
105     LOG_ALWAYS_FATAL_IF(argc != 3, "Invalid number of arguments: %d", argc);
106     unique_fd writeEnd(atoi(argv[1]));
107     unique_fd readEnd(atoi(argv[2]));
108 
109     auto serverConfig = readFromFd<BinderRpcTestServerConfig>(readEnd);
110     auto socketType = static_cast<SocketType>(serverConfig.socketType);
111     auto rpcSecurity = static_cast<RpcSecurity>(serverConfig.rpcSecurity);
112 
113     std::vector<RpcSession::FileDescriptorTransportMode>
114             serverSupportedFileDescriptorTransportModes;
115     for (auto mode : serverConfig.serverSupportedFileDescriptorTransportModes) {
116         serverSupportedFileDescriptorTransportModes.push_back(
117                 static_cast<RpcSession::FileDescriptorTransportMode>(mode));
118     }
119 
120     auto certVerifier = std::make_shared<RpcCertificateVerifierSimple>();
121     sp<RpcServer> server = RpcServer::make(newTlsFactory(rpcSecurity, certVerifier));
122 
123     LOG_ALWAYS_FATAL_IF(!server->setProtocolVersion(serverConfig.serverVersion));
124     server->setMaxThreads(serverConfig.numThreads);
125     server->setSupportedFileDescriptorTransportModes(serverSupportedFileDescriptorTransportModes);
126 
127     unsigned int outPort = 0;
128     unique_fd socketFd(serverConfig.socketFd);
129 
130     switch (socketType) {
131         case SocketType::PRECONNECTED:
132             [[fallthrough]];
133         case SocketType::UNIX:
134             LOG_ALWAYS_FATAL_IF(OK != server->setupUnixDomainServer(serverConfig.addr.c_str()),
135                                 "%s", serverConfig.addr.c_str());
136             break;
137         case SocketType::UNIX_BOOTSTRAP:
138             LOG_ALWAYS_FATAL_IF(OK !=
139                                 server->setupUnixDomainSocketBootstrapServer(std::move(socketFd)));
140             break;
141         case SocketType::UNIX_RAW:
142             LOG_ALWAYS_FATAL_IF(OK != server->setupRawSocketServer(std::move(socketFd)));
143             break;
144         case SocketType::VSOCK:
145             LOG_ALWAYS_FATAL_IF(OK !=
146                                         server->setupVsockServer(VMADDR_CID_LOCAL, VMADDR_PORT_ANY,
147                                                                  &outPort),
148                                 "Need `sudo modprobe vsock_loopback`?");
149             break;
150         case SocketType::INET: {
151             LOG_ALWAYS_FATAL_IF(OK != server->setupInetServer(kLocalInetAddress, 0, &outPort));
152             LOG_ALWAYS_FATAL_IF(0 == outPort);
153             break;
154         }
155         default:
156             LOG_ALWAYS_FATAL("Unknown socket type");
157     }
158 
159     BinderRpcTestServerInfo serverInfo;
160     serverInfo.port = static_cast<int64_t>(outPort);
161     serverInfo.cert.data = server->getCertificate(RpcCertificateFormat::PEM);
162     writeToFd(writeEnd, serverInfo);
163     auto clientInfo = readFromFd<BinderRpcTestClientInfo>(readEnd);
164 
165     if (rpcSecurity == RpcSecurity::TLS) {
166         for (const auto& clientCert : clientInfo.certs) {
167             LOG_ALWAYS_FATAL_IF(OK !=
168                                 certVerifier->addTrustedPeerCertificate(RpcCertificateFormat::PEM,
169                                                                         clientCert.data));
170         }
171     }
172 
173     server->setPerSessionRootObject([&](wp<RpcSession> session, const void* addrPtr, size_t len) {
174         {
175             sp<RpcSession> spSession = session.promote();
176             LOG_ALWAYS_FATAL_IF(nullptr == spSession.get());
177         }
178 
179         // UNIX sockets with abstract addresses return
180         // sizeof(sa_family_t)==2 in addrlen
181         LOG_ALWAYS_FATAL_IF(len < sizeof(sa_family_t));
182         const sockaddr* addr = reinterpret_cast<const sockaddr*>(addrPtr);
183         sp<MyBinderRpcTestAndroid> service = sp<MyBinderRpcTestAndroid>::make();
184         switch (addr->sa_family) {
185             case AF_UNIX:
186                 // nothing to save
187                 break;
188             case AF_VSOCK:
189                 LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_vm));
190                 service->port = reinterpret_cast<const sockaddr_vm*>(addr)->svm_port;
191                 break;
192             case AF_INET:
193                 LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_in));
194                 service->port = ntohs(reinterpret_cast<const sockaddr_in*>(addr)->sin_port);
195                 break;
196             case AF_INET6:
197                 LOG_ALWAYS_FATAL_IF(len != sizeof(sockaddr_in));
198                 service->port = ntohs(reinterpret_cast<const sockaddr_in6*>(addr)->sin6_port);
199                 break;
200             default:
201                 LOG_ALWAYS_FATAL("Unrecognized address family %d", addr->sa_family);
202         }
203         service->server = server;
204         return service;
205     });
206 
207     server->join();
208 
209     // Another thread calls shutdown. Wait for it to complete.
210     (void)server->shutdown();
211 
212     return 0;
213 }
214