/* * Copyright (C) 2022 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #if defined(TRUSTY_USERSPACE) #include #include #else #include #endif #include #include #include #include #include "../OS.h" #include "TrustyStatus.h" #include using android::binder::borrowed_fd; using android::binder::unique_fd; namespace android::binder::os { void trace_begin(uint64_t, const char*) {} void trace_end(uint64_t) {} void trace_int(uint64_t, const char*, int32_t) {} uint64_t get_trace_enabled_tags() { return 0; } uint64_t GetThreadId() { return 0; } bool report_sysprop_change() { return false; } status_t setNonBlocking(borrowed_fd /*fd*/) { // Trusty IPC syscalls are all non-blocking by default. return OK; } status_t getRandomBytes(uint8_t* data, size_t size) { #if defined(TRUSTY_USERSPACE) int res = RAND_bytes(data, size); return res == 1 ? OK : UNKNOWN_ERROR; #else int res = rand_get_bytes(data, size); return res == 0 ? OK : UNKNOWN_ERROR; #endif // TRUSTY_USERSPACE } status_t dupFileDescriptor(int oldFd, int* newFd) { int res = dup(oldFd); if (res < 0) { return statusFromTrusty(res); } *newFd = res; return OK; } std::unique_ptr makeDefaultRpcTransportCtxFactory() { return RpcTransportCtxFactoryTipcTrusty::make(); } ssize_t sendMessageOnSocket( const RpcTransportFd& /* socket */, iovec* /* iovs */, int /* niovs */, const std::vector>* /* ancillaryFds */) { errno = ENOTSUP; return -1; } ssize_t receiveMessageFromSocket( const RpcTransportFd& /* socket */, iovec* /* iovs */, int /* niovs */, std::vector>* /* ancillaryFds */) { errno = ENOTSUP; return -1; } } // namespace android::binder::os LIBBINDER_EXPORTED int __android_log_print(int prio [[maybe_unused]], const char* tag, const char* fmt, ...) { #ifdef TRUSTY_USERSPACE #define trusty_tlog _tlog #define trusty_vtlog _vtlog #else // mapping taken from kernel trusty_log.h (TLOGx) int kernelLogLevel; if (prio <= ANDROID_LOG_DEBUG) { kernelLogLevel = LK_DEBUGLEVEL_ALWAYS; } else if (prio == ANDROID_LOG_INFO) { kernelLogLevel = LK_DEBUGLEVEL_SPEW; } else if (prio == ANDROID_LOG_WARN) { kernelLogLevel = LK_DEBUGLEVEL_INFO; } else if (prio == ANDROID_LOG_ERROR) { kernelLogLevel = LK_DEBUGLEVEL_CRITICAL; } else { /* prio >= ANDROID_LOG_FATAL */ kernelLogLevel = LK_DEBUGLEVEL_CRITICAL; } #if LK_DEBUGLEVEL_NO_ALIASES auto LK_DEBUGLEVEL_kernelLogLevel = kernelLogLevel; #endif #define trusty_tlog(...) _tlog(kernelLogLevel, __VA_ARGS__) #define trusty_vtlog(...) _vtlog(kernelLogLevel, __VA_ARGS__) #endif va_list args; va_start(args, fmt); trusty_tlog((tag[0] == '\0') ? "libbinder" : "libbinder-"); trusty_vtlog(fmt, args); va_end(args); return 1; }