blob: 6594aa63090f12a68584acde8e0d149b81de2309 [file] [log] [blame]
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2005 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define LOG_TAG "BpBinder"
18//#define LOG_NDEBUG 0
19
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070020#include <binder/BpBinder.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080021
Mathias Agopianc5b2c0b2009-05-19 19:08:10 -070022#include <binder/IPCThreadState.h>
Dianne Hackborn23eb1e22015-10-07 17:35:27 -070023#include <binder/IResultReceiver.h>
Steven Morelandbdb53ab2021-05-05 17:57:41 +000024#include <binder/RpcSession.h>
Steven Moreland6e5a7752019-08-05 20:30:14 -070025#include <binder/Stability.h>
Tomasz Wasilczyka9e451a2024-05-22 12:18:42 -070026#include <binder/Trace.h>
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080027
28#include <stdio.h>
29
Steven Moreland32150282021-11-12 22:54:53 +000030#include "BuildFlags.h"
Tomasz Wasilczyk26db5e42023-11-02 11:45:11 -070031#include "file.h"
Sahil Somani2522b072022-08-08 14:07:47 -070032
Steve Block6807e592011-10-20 11:56:00 +010033//#undef ALOGV
34//#define ALOGV(...) fprintf(stderr, __VA_ARGS__)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080035
36namespace android {
37
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -070038using android::binder::unique_fd;
39
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080040// ---------------------------------------------------------------------------
41
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -070042RpcMutex BpBinder::sTrackingLock;
Martijn Coenena8d509d2021-09-03 18:06:24 +020043std::unordered_map<int32_t, uint32_t> BpBinder::sTrackingMap;
44std::unordered_map<int32_t, uint32_t> BpBinder::sLastLimitCallbackMap;
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -070045int BpBinder::sNumTrackedUids = 0;
46std::atomic_bool BpBinder::sCountByUidEnabled(false);
47binder_proxy_limit_callback BpBinder::sLimitCallback;
Jing Jibdbe29a2023-10-03 00:03:28 -070048binder_proxy_warning_callback BpBinder::sWarningCallback;
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -070049bool BpBinder::sBinderProxyThrottleCreate = false;
50
Steven Moreland847d8c52023-05-02 23:56:58 +000051static StaticString16 kDescriptorUninit(u"");
Steven Morelandf2830fe2022-12-21 00:45:34 +000052
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -070053// Arbitrarily high value that probably distinguishes a bad behaving app
54uint32_t BpBinder::sBinderProxyCountHighWatermark = 2500;
55// Another arbitrary value a binder count needs to drop below before another callback will be called
56uint32_t BpBinder::sBinderProxyCountLowWatermark = 2000;
Jing Jibdbe29a2023-10-03 00:03:28 -070057// Arbitrary value between low and high watermark on a bad behaving app to
58// trigger a warning callback.
59uint32_t BpBinder::sBinderProxyCountWarningWatermark = 2250;
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -070060
Jing Ji4c4ac062023-10-07 15:20:23 -070061std::atomic<uint32_t> BpBinder::sBinderProxyCount(0);
62std::atomic<uint32_t> BpBinder::sBinderProxyCountWarned(0);
63
64static constexpr uint32_t kBinderProxyCountWarnInterval = 5000;
65
Martijn Coenen1cad19c2021-10-04 09:19:01 +020066// Log any transactions for which the data exceeds this size
67#define LOG_TRANSACTIONS_OVER_SIZE (300 * 1024)
68
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -070069enum {
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -070070 LIMIT_REACHED_MASK = 0x80000000, // A flag denoting that the limit has been reached
Jing Jibdbe29a2023-10-03 00:03:28 -070071 WARNING_REACHED_MASK = 0x40000000, // A flag denoting that the warning has been reached
72 COUNTING_VALUE_MASK = 0x3FFFFFFF, // A mask of the remaining bits for the count value
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -070073};
74
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080075BpBinder::ObjectManager::ObjectManager()
76{
77}
78
79BpBinder::ObjectManager::~ObjectManager()
80{
81 kill();
82}
83
Steven Moreland63a2d512021-06-25 01:10:15 +000084void* BpBinder::ObjectManager::attach(const void* objectID, void* object, void* cleanupCookie,
85 IBinder::object_cleanup_func func) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080086 entry_t e;
87 e.object = object;
88 e.cleanupCookie = cleanupCookie;
89 e.func = func;
90
Jiyong Park5970d0a2022-03-08 16:56:13 +090091 if (mObjects.find(objectID) != mObjects.end()) {
Steven Moreland63a2d512021-06-25 01:10:15 +000092 ALOGI("Trying to attach object ID %p to binder ObjectManager %p with object %p, but object "
93 "ID already in use",
94 objectID, this, object);
Jiyong Park5970d0a2022-03-08 16:56:13 +090095 return mObjects[objectID].object;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -080096 }
97
Jiyong Park5970d0a2022-03-08 16:56:13 +090098 mObjects.insert({objectID, e});
Steven Moreland63a2d512021-06-25 01:10:15 +000099 return nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800100}
101
102void* BpBinder::ObjectManager::find(const void* objectID) const
103{
Jiyong Park5970d0a2022-03-08 16:56:13 +0900104 auto i = mObjects.find(objectID);
105 if (i == mObjects.end()) return nullptr;
106 return i->second.object;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800107}
108
Steven Moreland63a2d512021-06-25 01:10:15 +0000109void* BpBinder::ObjectManager::detach(const void* objectID) {
Jiyong Park5970d0a2022-03-08 16:56:13 +0900110 auto i = mObjects.find(objectID);
111 if (i == mObjects.end()) return nullptr;
112 void* value = i->second.object;
113 mObjects.erase(i);
Steven Moreland63a2d512021-06-25 01:10:15 +0000114 return value;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800115}
116
Devin Moore3faaa002022-07-27 15:54:06 +0000117namespace {
118struct Tag {
119 wp<IBinder> binder;
120};
121} // namespace
122
123static void cleanWeak(const void* /* id */, void* obj, void* /* cookie */) {
124 delete static_cast<Tag*>(obj);
125}
126
127sp<IBinder> BpBinder::ObjectManager::lookupOrCreateWeak(const void* objectID, object_make_func make,
128 const void* makeArgs) {
129 entry_t& e = mObjects[objectID];
130 if (e.object != nullptr) {
131 if (auto attached = static_cast<Tag*>(e.object)->binder.promote()) {
132 return attached;
133 }
134 } else {
135 e.object = new Tag;
136 LOG_ALWAYS_FATAL_IF(!e.object, "no more memory");
137 }
138 sp<IBinder> newObj = make(makeArgs);
139
140 static_cast<Tag*>(e.object)->binder = newObj;
141 e.cleanupCookie = nullptr;
142 e.func = cleanWeak;
143
144 return newObj;
145}
146
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800147void BpBinder::ObjectManager::kill()
148{
149 const size_t N = mObjects.size();
Mark Salyzynd4ecccf2014-05-30 16:35:57 -0700150 ALOGV("Killing %zu objects in manager %p", N, this);
Jiyong Park5970d0a2022-03-08 16:56:13 +0900151 for (auto i : mObjects) {
152 const entry_t& e = i.second;
Yi Kongfdd8da92018-06-07 17:52:27 -0700153 if (e.func != nullptr) {
Jiyong Park5970d0a2022-03-08 16:56:13 +0900154 e.func(i.first, e.object, e.cleanupCookie);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800155 }
156 }
157
158 mObjects.clear();
159}
160
161// ---------------------------------------------------------------------------
162
Steven Moreland1a3a8ef2021-04-02 02:52:46 +0000163sp<BpBinder> BpBinder::create(int32_t handle) {
Steven Moreland32150282021-11-12 22:54:53 +0000164 if constexpr (!kEnableKernelIpc) {
165 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
166 return nullptr;
167 }
168
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700169 int32_t trackedUid = -1;
170 if (sCountByUidEnabled) {
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700171 trackedUid = IPCThreadState::self()->getCallingUid();
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700172 RpcMutexUniqueLock _l(sTrackingLock);
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -0700173 uint32_t trackedValue = sTrackingMap[trackedUid];
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000174 if (trackedValue & LIMIT_REACHED_MASK) [[unlikely]] {
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700175 if (sBinderProxyThrottleCreate) {
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -0700176 return nullptr;
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700177 }
Martijn Coenena8d509d2021-09-03 18:06:24 +0200178 trackedValue = trackedValue & COUNTING_VALUE_MASK;
179 uint32_t lastLimitCallbackAt = sLastLimitCallbackMap[trackedUid];
180
181 if (trackedValue > lastLimitCallbackAt &&
Martijn Coenen6711b6d2021-09-23 09:44:29 +0200182 (trackedValue - lastLimitCallbackAt > sBinderProxyCountHighWatermark)) {
Martijn Coenena8d509d2021-09-03 18:06:24 +0200183 ALOGE("Still too many binder proxy objects sent to uid %d from uid %d (%d proxies "
184 "held)",
185 getuid(), trackedUid, trackedValue);
186 if (sLimitCallback) sLimitCallback(trackedUid);
187 sLastLimitCallbackMap[trackedUid] = trackedValue;
188 }
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700189 } else {
Jing Jibdbe29a2023-10-03 00:03:28 -0700190 uint32_t currentValue = trackedValue & COUNTING_VALUE_MASK;
191 if (currentValue >= sBinderProxyCountWarningWatermark
192 && currentValue < sBinderProxyCountHighWatermark
193 && ((trackedValue & WARNING_REACHED_MASK) == 0)) [[unlikely]] {
194 sTrackingMap[trackedUid] |= WARNING_REACHED_MASK;
195 if (sWarningCallback) sWarningCallback(trackedUid);
196 } else if (currentValue >= sBinderProxyCountHighWatermark) {
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -0700197 ALOGE("Too many binder proxy objects sent to uid %d from uid %d (%d proxies held)",
198 getuid(), trackedUid, trackedValue);
199 sTrackingMap[trackedUid] |= LIMIT_REACHED_MASK;
200 if (sLimitCallback) sLimitCallback(trackedUid);
Martijn Coenena8d509d2021-09-03 18:06:24 +0200201 sLastLimitCallbackMap[trackedUid] = trackedValue & COUNTING_VALUE_MASK;
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -0700202 if (sBinderProxyThrottleCreate) {
203 ALOGI("Throttling binder proxy creates from uid %d in uid %d until binder proxy"
204 " count drops below %d",
205 trackedUid, getuid(), sBinderProxyCountLowWatermark);
206 return nullptr;
207 }
208 }
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700209 }
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -0700210 sTrackingMap[trackedUid]++;
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700211 }
Jing Ji4c4ac062023-10-07 15:20:23 -0700212 uint32_t numProxies = sBinderProxyCount.fetch_add(1, std::memory_order_relaxed);
Tomasz Wasilczyka9e451a2024-05-22 12:18:42 -0700213 binder::os::trace_int(ATRACE_TAG_AIDL, "binder_proxies", numProxies);
Jing Ji4c4ac062023-10-07 15:20:23 -0700214 uint32_t numLastWarned = sBinderProxyCountWarned.load(std::memory_order_relaxed);
215 uint32_t numNextWarn = numLastWarned + kBinderProxyCountWarnInterval;
216 if (numProxies >= numNextWarn) {
217 // Multiple threads can get here, make sure only one of them gets to
218 // update the warn counter.
219 if (sBinderProxyCountWarned.compare_exchange_strong(numLastWarned,
220 numNextWarn,
221 std::memory_order_relaxed)) {
222 ALOGW("Unexpectedly many live BinderProxies: %d\n", numProxies);
223 }
224 }
Steven Moreland1a3a8ef2021-04-02 02:52:46 +0000225 return sp<BpBinder>::make(BinderHandle{handle}, trackedUid);
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700226}
227
Steven Moreland5623d1a2021-09-10 15:45:34 -0700228sp<BpBinder> BpBinder::create(const sp<RpcSession>& session, uint64_t address) {
Steven Morelandbdb53ab2021-05-05 17:57:41 +0000229 LOG_ALWAYS_FATAL_IF(session == nullptr, "BpBinder::create null session");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800230
Steven Moreland5553ac42020-11-11 02:14:45 +0000231 // These are not currently tracked, since there is no UID or other
232 // identifier to track them with. However, if similar functionality is
Steven Morelandbdb53ab2021-05-05 17:57:41 +0000233 // needed, session objects keep track of all BpBinder objects on a
234 // per-session basis.
Steven Moreland5553ac42020-11-11 02:14:45 +0000235
Steven Morelandbdb53ab2021-05-05 17:57:41 +0000236 return sp<BpBinder>::make(RpcHandle{session, address});
Steven Moreland5553ac42020-11-11 02:14:45 +0000237}
238
239BpBinder::BpBinder(Handle&& handle)
240 : mStability(0),
241 mHandle(handle),
242 mAlive(true),
243 mObitsSent(false),
244 mObituaries(nullptr),
Steven Morelandf2830fe2022-12-21 00:45:34 +0000245 mDescriptorCache(kDescriptorUninit),
Steven Moreland5553ac42020-11-11 02:14:45 +0000246 mTrackedUid(-1) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800247 extendObjectLifetime(OBJECT_LIFETIME_WEAK);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800248}
249
Steven Moreland5553ac42020-11-11 02:14:45 +0000250BpBinder::BpBinder(BinderHandle&& handle, int32_t trackedUid) : BpBinder(Handle(handle)) {
Steven Moreland32150282021-11-12 22:54:53 +0000251 if constexpr (!kEnableKernelIpc) {
252 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
253 return;
254 }
255
Steven Moreland5553ac42020-11-11 02:14:45 +0000256 mTrackedUid = trackedUid;
257
258 ALOGV("Creating BpBinder %p handle %d\n", this, this->binderHandle());
259
260 IPCThreadState::self()->incWeakHandle(this->binderHandle(), this);
261}
262
Steven Morelandbdb53ab2021-05-05 17:57:41 +0000263BpBinder::BpBinder(RpcHandle&& handle) : BpBinder(Handle(handle)) {
264 LOG_ALWAYS_FATAL_IF(rpcSession() == nullptr, "BpBinder created w/o session object");
Steven Moreland5553ac42020-11-11 02:14:45 +0000265}
266
267bool BpBinder::isRpcBinder() const {
Steven Morelandbdb53ab2021-05-05 17:57:41 +0000268 return std::holds_alternative<RpcHandle>(mHandle);
Steven Moreland5553ac42020-11-11 02:14:45 +0000269}
270
Steven Moreland5623d1a2021-09-10 15:45:34 -0700271uint64_t BpBinder::rpcAddress() const {
Steven Morelandbdb53ab2021-05-05 17:57:41 +0000272 return std::get<RpcHandle>(mHandle).address;
Steven Moreland5553ac42020-11-11 02:14:45 +0000273}
274
Steven Morelandbdb53ab2021-05-05 17:57:41 +0000275const sp<RpcSession>& BpBinder::rpcSession() const {
276 return std::get<RpcHandle>(mHandle).session;
Steven Moreland5553ac42020-11-11 02:14:45 +0000277}
278
279int32_t BpBinder::binderHandle() const {
280 return std::get<BinderHandle>(mHandle).handle;
Steven Moreland85180c02019-07-16 14:24:20 -0700281}
282
Devin Mooref6f2e642021-08-05 19:03:47 +0000283std::optional<int32_t> BpBinder::getDebugBinderHandle() const {
284 if (!isRpcBinder()) {
285 return binderHandle();
286 } else {
287 return std::nullopt;
288 }
289}
290
Mathias Agopian83c04462009-05-22 19:00:22 -0700291bool BpBinder::isDescriptorCached() const {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700292 RpcMutexUniqueLock _l(mLock);
Tomasz Wasilczyk0bfea2d2023-08-11 00:06:51 +0000293 return mDescriptorCache.c_str() != kDescriptorUninit.c_str();
Mathias Agopian83c04462009-05-22 19:00:22 -0700294}
295
296const String16& BpBinder::getInterfaceDescriptor() const
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800297{
Steven Morelandf2830fe2022-12-21 00:45:34 +0000298 if (!isDescriptorCached()) {
Steven Moreland1a3a8ef2021-04-02 02:52:46 +0000299 sp<BpBinder> thiz = sp<BpBinder>::fromExisting(const_cast<BpBinder*>(this));
Steven Moreland4cf688f2021-03-31 01:48:58 +0000300
301 Parcel data;
302 data.markForBinder(thiz);
303 Parcel reply;
Mathias Agopian83c04462009-05-22 19:00:22 -0700304 // do the IPC without a lock held.
Steven Moreland4cf688f2021-03-31 01:48:58 +0000305 status_t err = thiz->transact(INTERFACE_TRANSACTION, data, &reply);
Mathias Agopian83c04462009-05-22 19:00:22 -0700306 if (err == NO_ERROR) {
307 String16 res(reply.readString16());
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700308 RpcMutexUniqueLock _l(mLock);
Mathias Agopian83c04462009-05-22 19:00:22 -0700309 // mDescriptorCache could have been assigned while the lock was
310 // released.
Tomasz Wasilczyk0bfea2d2023-08-11 00:06:51 +0000311 if (mDescriptorCache.c_str() == kDescriptorUninit.c_str()) mDescriptorCache = res;
Mathias Agopian83c04462009-05-22 19:00:22 -0700312 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800313 }
Mark Salyzynd4ecccf2014-05-30 16:35:57 -0700314
Mathias Agopian83c04462009-05-22 19:00:22 -0700315 // we're returning a reference to a non-static object here. Usually this
Mark Salyzynd4ecccf2014-05-30 16:35:57 -0700316 // is not something smart to do, however, with binder objects it is
Mathias Agopian83c04462009-05-22 19:00:22 -0700317 // (usually) safe because they are reference-counted.
Mark Salyzynd4ecccf2014-05-30 16:35:57 -0700318
Mathias Agopian83c04462009-05-22 19:00:22 -0700319 return mDescriptorCache;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800320}
321
322bool BpBinder::isBinderAlive() const
323{
Steven Moreland06074d82020-03-05 23:16:51 +0000324 return mAlive != 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800325}
326
327status_t BpBinder::pingBinder()
328{
Steven Moreland5553ac42020-11-11 02:14:45 +0000329 Parcel data;
Steven Moreland1a3a8ef2021-04-02 02:52:46 +0000330 data.markForBinder(sp<BpBinder>::fromExisting(this));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800331 Parcel reply;
Steven Moreland5553ac42020-11-11 02:14:45 +0000332 return transact(PING_TRANSACTION, data, &reply);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800333}
334
Tomasz Wasilczyk639490b2023-11-01 13:49:41 -0700335status_t BpBinder::startRecordingBinder(const unique_fd& fd) {
Sahil Somani2522b072022-08-08 14:07:47 -0700336 Parcel send, reply;
337 send.writeUniqueFileDescriptor(fd);
338 return transact(START_RECORDING_TRANSACTION, send, &reply);
339}
340
341status_t BpBinder::stopRecordingBinder() {
342 Parcel data, reply;
343 data.markForBinder(sp<BpBinder>::fromExisting(this));
344 return transact(STOP_RECORDING_TRANSACTION, data, &reply);
345}
346
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800347status_t BpBinder::dump(int fd, const Vector<String16>& args)
348{
349 Parcel send;
350 Parcel reply;
351 send.writeFileDescriptor(fd);
352 const size_t numArgs = args.size();
353 send.writeInt32(numArgs);
354 for (size_t i = 0; i < numArgs; i++) {
355 send.writeString16(args[i]);
356 }
357 status_t err = transact(DUMP_TRANSACTION, send, &reply);
358 return err;
359}
360
Jiyong Parkb86c8662018-10-29 23:01:57 +0900361// NOLINTNEXTLINE(google-default-arguments)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800362status_t BpBinder::transact(
363 uint32_t code, const Parcel& data, Parcel* reply, uint32_t flags)
364{
365 // Once a binder has died, it will never come back to life.
366 if (mAlive) {
Steven Moreland46b5fea2019-10-15 11:22:18 -0700367 bool privateVendor = flags & FLAG_PRIVATE_VENDOR;
368 // don't send userspace flags to the kernel
Andrei Homescu7cdf5c22022-04-30 03:41:16 +0000369 flags = flags & ~static_cast<uint32_t>(FLAG_PRIVATE_VENDOR);
Steven Moreland46b5fea2019-10-15 11:22:18 -0700370
Steven Moreland6e5a7752019-08-05 20:30:14 -0700371 // user transactions require a given stability level
372 if (code >= FIRST_CALL_TRANSACTION && code <= LAST_CALL_TRANSACTION) {
373 using android::internal::Stability;
374
Steven Moreland16a41062021-07-23 13:35:25 -0700375 int16_t stability = Stability::getRepr(this);
Steven Moreland89ddfc52020-11-13 02:39:26 +0000376 Stability::Level required = privateVendor ? Stability::VENDOR
377 : Stability::getLocalLevel();
Steven Moreland6e5a7752019-08-05 20:30:14 -0700378
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000379 if (!Stability::check(stability, required)) [[unlikely]] {
Steven Morelandb269b582021-02-10 17:09:11 +0000380 ALOGE("Cannot do a user transaction on a %s binder (%s) in a %s context.",
Steven Moreland16a41062021-07-23 13:35:25 -0700381 Stability::levelString(stability).c_str(),
382 String8(getInterfaceDescriptor()).c_str(),
383 Stability::levelString(required).c_str());
Steven Moreland6e5a7752019-08-05 20:30:14 -0700384 return BAD_TYPE;
385 }
386 }
387
Steven Moreland5553ac42020-11-11 02:14:45 +0000388 status_t status;
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000389 if (isRpcBinder()) [[unlikely]] {
Steven Morelandf5174272021-05-25 00:39:28 +0000390 status = rpcSession()->transact(sp<IBinder>::fromExisting(this), code, data, reply,
391 flags);
Steven Moreland5553ac42020-11-11 02:14:45 +0000392 } else {
Steven Moreland32150282021-11-12 22:54:53 +0000393 if constexpr (!kEnableKernelIpc) {
394 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
395 return INVALID_OPERATION;
396 }
397
Steven Moreland5553ac42020-11-11 02:14:45 +0000398 status = IPCThreadState::self()->transact(binderHandle(), code, data, reply, flags);
399 }
Martijn Coenen1cad19c2021-10-04 09:19:01 +0200400 if (data.dataSize() > LOG_TRANSACTIONS_OVER_SIZE) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700401 RpcMutexUniqueLock _l(mLock);
Martijn Coenen1cad19c2021-10-04 09:19:01 +0200402 ALOGW("Large outgoing transaction of %zu bytes, interface descriptor %s, code %d",
Steven Morelandf2830fe2022-12-21 00:45:34 +0000403 data.dataSize(), String8(mDescriptorCache).c_str(), code);
Martijn Coenen1cad19c2021-10-04 09:19:01 +0200404 }
Steven Moreland5553ac42020-11-11 02:14:45 +0000405
Steven Moreland06074d82020-03-05 23:16:51 +0000406 if (status == DEAD_OBJECT) mAlive = 0;
Steven Morelanda86a3562019-08-01 23:28:34 +0000407
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800408 return status;
409 }
410
411 return DEAD_OBJECT;
412}
413
Jiyong Parkb86c8662018-10-29 23:01:57 +0900414// NOLINTNEXTLINE(google-default-arguments)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800415status_t BpBinder::linkToDeath(
416 const sp<DeathRecipient>& recipient, void* cookie, uint32_t flags)
417{
Devin Moore66d5b7a2022-07-07 21:42:10 +0000418 if (isRpcBinder()) {
419 if (rpcSession()->getMaxIncomingThreads() < 1) {
Devin Moorebd41dc12023-02-08 17:06:22 +0000420 ALOGE("Cannot register a DeathRecipient without any incoming threads. Need to set max "
421 "incoming threads to a value greater than 0 before calling linkToDeath.");
Devin Moore66d5b7a2022-07-07 21:42:10 +0000422 return INVALID_OPERATION;
423 }
424 } else if constexpr (!kEnableKernelIpc) {
Steven Moreland32150282021-11-12 22:54:53 +0000425 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
426 return INVALID_OPERATION;
Devin Moore66d5b7a2022-07-07 21:42:10 +0000427 } else {
428 if (ProcessState::self()->getThreadPoolMaxTotalThreadCount() == 0) {
429 ALOGW("Linking to death on %s but there are no threads (yet?) listening to incoming "
430 "transactions. See ProcessState::startThreadPool and "
431 "ProcessState::setThreadPoolMaxThreadCount. Generally you should setup the "
432 "binder "
433 "threadpool before other initialization steps.",
434 String8(getInterfaceDescriptor()).c_str());
435 }
Steven Moreland32150282021-11-12 22:54:53 +0000436 }
437
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800438 Obituary ob;
439 ob.recipient = recipient;
440 ob.cookie = cookie;
441 ob.flags = flags;
442
Yi Kongfdd8da92018-06-07 17:52:27 -0700443 LOG_ALWAYS_FATAL_IF(recipient == nullptr,
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800444 "linkToDeath(): recipient must be non-NULL");
445
446 {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700447 RpcMutexUniqueLock _l(mLock);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800448
449 if (!mObitsSent) {
450 if (!mObituaries) {
451 mObituaries = new Vector<Obituary>;
452 if (!mObituaries) {
453 return NO_MEMORY;
454 }
Steven Moreland5553ac42020-11-11 02:14:45 +0000455 ALOGV("Requesting death notification: %p handle %d\n", this, binderHandle());
Devin Moore66d5b7a2022-07-07 21:42:10 +0000456 if (!isRpcBinder()) {
457 if constexpr (kEnableKernelIpc) {
458 getWeakRefs()->incWeak(this);
459 IPCThreadState* self = IPCThreadState::self();
460 self->requestDeathNotification(binderHandle(), this);
461 self->flushCommands();
462 }
463 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800464 }
465 ssize_t res = mObituaries->add(ob);
466 return res >= (ssize_t)NO_ERROR ? (status_t)NO_ERROR : res;
467 }
468 }
469
470 return DEAD_OBJECT;
471}
472
Jiyong Parkb86c8662018-10-29 23:01:57 +0900473// NOLINTNEXTLINE(google-default-arguments)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800474status_t BpBinder::unlinkToDeath(
475 const wp<DeathRecipient>& recipient, void* cookie, uint32_t flags,
476 wp<DeathRecipient>* outRecipient)
477{
Devin Moore66d5b7a2022-07-07 21:42:10 +0000478 if (!kEnableKernelIpc && !isRpcBinder()) {
Steven Moreland32150282021-11-12 22:54:53 +0000479 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
480 return INVALID_OPERATION;
481 }
482
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700483 RpcMutexUniqueLock _l(mLock);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800484
485 if (mObitsSent) {
486 return DEAD_OBJECT;
487 }
488
489 const size_t N = mObituaries ? mObituaries->size() : 0;
490 for (size_t i=0; i<N; i++) {
491 const Obituary& obit = mObituaries->itemAt(i);
492 if ((obit.recipient == recipient
Yi Kongfdd8da92018-06-07 17:52:27 -0700493 || (recipient == nullptr && obit.cookie == cookie))
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800494 && obit.flags == flags) {
Yi Kongfdd8da92018-06-07 17:52:27 -0700495 if (outRecipient != nullptr) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800496 *outRecipient = mObituaries->itemAt(i).recipient;
497 }
498 mObituaries->removeAt(i);
499 if (mObituaries->size() == 0) {
Steven Moreland5553ac42020-11-11 02:14:45 +0000500 ALOGV("Clearing death notification: %p handle %d\n", this, binderHandle());
Devin Moore66d5b7a2022-07-07 21:42:10 +0000501 if (!isRpcBinder()) {
502 if constexpr (kEnableKernelIpc) {
503 IPCThreadState* self = IPCThreadState::self();
504 self->clearDeathNotification(binderHandle(), this);
505 self->flushCommands();
506 }
507 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800508 delete mObituaries;
Yi Kongfdd8da92018-06-07 17:52:27 -0700509 mObituaries = nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800510 }
511 return NO_ERROR;
512 }
513 }
514
515 return NAME_NOT_FOUND;
516}
517
518void BpBinder::sendObituary()
519{
Devin Moore66d5b7a2022-07-07 21:42:10 +0000520 if (!kEnableKernelIpc && !isRpcBinder()) {
Steven Moreland32150282021-11-12 22:54:53 +0000521 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
522 return;
523 }
524
Steven Moreland5553ac42020-11-11 02:14:45 +0000525 ALOGV("Sending obituary for proxy %p handle %d, mObitsSent=%s\n", this, binderHandle(),
526 mObitsSent ? "true" : "false");
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800527
Steven Moreland06074d82020-03-05 23:16:51 +0000528 mAlive = 0;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800529 if (mObitsSent) return;
530
531 mLock.lock();
532 Vector<Obituary>* obits = mObituaries;
Yi Kongfdd8da92018-06-07 17:52:27 -0700533 if(obits != nullptr) {
Steven Moreland5553ac42020-11-11 02:14:45 +0000534 ALOGV("Clearing sent death notification: %p handle %d\n", this, binderHandle());
Devin Moore66d5b7a2022-07-07 21:42:10 +0000535 if (!isRpcBinder()) {
536 if constexpr (kEnableKernelIpc) {
537 IPCThreadState* self = IPCThreadState::self();
538 self->clearDeathNotification(binderHandle(), this);
539 self->flushCommands();
540 }
541 }
Yi Kongfdd8da92018-06-07 17:52:27 -0700542 mObituaries = nullptr;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800543 }
Steven Moreland06074d82020-03-05 23:16:51 +0000544 mObitsSent = 1;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800545 mLock.unlock();
546
Mark Salyzynd4ecccf2014-05-30 16:35:57 -0700547 ALOGV("Reporting death of proxy %p for %zu recipients\n",
548 this, obits ? obits->size() : 0U);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800549
Yi Kongfdd8da92018-06-07 17:52:27 -0700550 if (obits != nullptr) {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800551 const size_t N = obits->size();
552 for (size_t i=0; i<N; i++) {
553 reportOneDeath(obits->itemAt(i));
554 }
555
556 delete obits;
557 }
558}
559
560void BpBinder::reportOneDeath(const Obituary& obit)
561{
562 sp<DeathRecipient> recipient = obit.recipient.promote();
Steve Block6807e592011-10-20 11:56:00 +0100563 ALOGV("Reporting death to recipient: %p\n", recipient.get());
Yi Kongfdd8da92018-06-07 17:52:27 -0700564 if (recipient == nullptr) return;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800565
Steven Moreland1a3a8ef2021-04-02 02:52:46 +0000566 recipient->binderDied(wp<BpBinder>::fromExisting(this));
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800567}
568
Steven Moreland63a2d512021-06-25 01:10:15 +0000569void* BpBinder::attachObject(const void* objectID, void* object, void* cleanupCookie,
570 object_cleanup_func func) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700571 RpcMutexUniqueLock _l(mLock);
Steve Block6807e592011-10-20 11:56:00 +0100572 ALOGV("Attaching object %p to binder %p (manager=%p)", object, this, &mObjects);
Steven Moreland63a2d512021-06-25 01:10:15 +0000573 return mObjects.attach(objectID, object, cleanupCookie, func);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800574}
575
576void* BpBinder::findObject(const void* objectID) const
577{
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700578 RpcMutexUniqueLock _l(mLock);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800579 return mObjects.find(objectID);
580}
581
Steven Moreland63a2d512021-06-25 01:10:15 +0000582void* BpBinder::detachObject(const void* objectID) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700583 RpcMutexUniqueLock _l(mLock);
Steven Moreland63a2d512021-06-25 01:10:15 +0000584 return mObjects.detach(objectID);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800585}
586
Steven Moreland9e759e82021-06-25 21:30:23 +0000587void BpBinder::withLock(const std::function<void()>& doWithLock) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700588 RpcMutexUniqueLock _l(mLock);
Steven Moreland9e759e82021-06-25 21:30:23 +0000589 doWithLock();
590}
591
Devin Moore3faaa002022-07-27 15:54:06 +0000592sp<IBinder> BpBinder::lookupOrCreateWeak(const void* objectID, object_make_func make,
593 const void* makeArgs) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700594 RpcMutexUniqueLock _l(mLock);
Devin Moore3faaa002022-07-27 15:54:06 +0000595 return mObjects.lookupOrCreateWeak(objectID, make, makeArgs);
596}
597
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800598BpBinder* BpBinder::remoteBinder()
599{
600 return this;
601}
602
Steven Moreland32150282021-11-12 22:54:53 +0000603BpBinder::~BpBinder() {
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000604 if (isRpcBinder()) [[unlikely]] {
605 return;
606 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800607
Steven Moreland32150282021-11-12 22:54:53 +0000608 if constexpr (!kEnableKernelIpc) {
609 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
610 return;
611 }
612
613 ALOGV("Destroying BpBinder %p handle %d\n", this, binderHandle());
614
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800615 IPCThreadState* ipc = IPCThreadState::self();
616
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700617 if (mTrackedUid >= 0) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700618 RpcMutexUniqueLock _l(sTrackingLock);
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -0700619 uint32_t trackedValue = sTrackingMap[mTrackedUid];
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000620 if ((trackedValue & COUNTING_VALUE_MASK) == 0) [[unlikely]] {
Steven Moreland5553ac42020-11-11 02:14:45 +0000621 ALOGE("Unexpected Binder Proxy tracking decrement in %p handle %d\n", this,
622 binderHandle());
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700623 } else {
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000624 auto countingValue = trackedValue & COUNTING_VALUE_MASK;
Jing Jibdbe29a2023-10-03 00:03:28 -0700625 if ((trackedValue & (LIMIT_REACHED_MASK | WARNING_REACHED_MASK)) &&
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000626 (countingValue <= sBinderProxyCountLowWatermark)) [[unlikely]] {
Michael Wachenschwanz74d967a2018-05-15 15:03:57 -0700627 ALOGI("Limit reached bit reset for uid %d (fewer than %d proxies from uid %d held)",
Martijn Coenena8d509d2021-09-03 18:06:24 +0200628 getuid(), sBinderProxyCountLowWatermark, mTrackedUid);
Jing Jibdbe29a2023-10-03 00:03:28 -0700629 sTrackingMap[mTrackedUid] &= ~(LIMIT_REACHED_MASK | WARNING_REACHED_MASK);
Martijn Coenena8d509d2021-09-03 18:06:24 +0200630 sLastLimitCallbackMap.erase(mTrackedUid);
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700631 }
632 if (--sTrackingMap[mTrackedUid] == 0) {
633 sTrackingMap.erase(mTrackedUid);
634 }
635 }
636 }
Tomasz Wasilczyka9e451a2024-05-22 12:18:42 -0700637 uint32_t numProxies = --sBinderProxyCount;
638 binder::os::trace_int(ATRACE_TAG_AIDL, "binder_proxies", numProxies);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800639 if (ipc) {
Steven Moreland5553ac42020-11-11 02:14:45 +0000640 ipc->expungeHandle(binderHandle(), this);
641 ipc->decWeakHandle(binderHandle());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800642 }
643}
644
Steven Moreland32150282021-11-12 22:54:53 +0000645void BpBinder::onFirstRef() {
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000646 if (isRpcBinder()) [[unlikely]] {
647 return;
648 }
Steven Moreland32150282021-11-12 22:54:53 +0000649
650 if constexpr (!kEnableKernelIpc) {
651 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
652 return;
653 }
654
655 ALOGV("onFirstRef BpBinder %p handle %d\n", this, binderHandle());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800656 IPCThreadState* ipc = IPCThreadState::self();
Steven Moreland5553ac42020-11-11 02:14:45 +0000657 if (ipc) ipc->incStrongHandle(binderHandle(), this);
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800658}
659
Steven Moreland32150282021-11-12 22:54:53 +0000660void BpBinder::onLastStrongRef(const void* /*id*/) {
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000661 if (isRpcBinder()) [[unlikely]] {
Steven Moreland4f622fe2021-09-13 17:38:09 -0700662 (void)rpcSession()->sendDecStrong(this);
Steven Moreland5553ac42020-11-11 02:14:45 +0000663 return;
664 }
Steven Moreland32150282021-11-12 22:54:53 +0000665
666 if constexpr (!kEnableKernelIpc) {
667 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
668 return;
669 }
670
671 ALOGV("onLastStrongRef BpBinder %p handle %d\n", this, binderHandle());
Steve Block6807e592011-10-20 11:56:00 +0100672 IF_ALOGV() {
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800673 printRefs();
674 }
675 IPCThreadState* ipc = IPCThreadState::self();
Steven Moreland5553ac42020-11-11 02:14:45 +0000676 if (ipc) ipc->decStrongHandle(binderHandle());
Steven Moreland80d23932019-06-07 12:43:27 -0700677
678 mLock.lock();
679 Vector<Obituary>* obits = mObituaries;
680 if(obits != nullptr) {
681 if (!obits->isEmpty()) {
Steven Moreland70fcb4e2019-12-13 17:28:58 -0800682 ALOGI("onLastStrongRef automatically unlinking death recipients: %s",
Steven Morelandf2830fe2022-12-21 00:45:34 +0000683 String8(mDescriptorCache).c_str());
Steven Moreland80d23932019-06-07 12:43:27 -0700684 }
685
Steven Moreland5553ac42020-11-11 02:14:45 +0000686 if (ipc) ipc->clearDeathNotification(binderHandle(), this);
Steven Moreland80d23932019-06-07 12:43:27 -0700687 mObituaries = nullptr;
688 }
689 mLock.unlock();
690
691 if (obits != nullptr) {
692 // XXX Should we tell any remaining DeathRecipient
693 // objects that the last strong ref has gone away, so they
694 // are no longer linked?
695 delete obits;
696 }
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800697}
698
Colin Cross6f4f3ab2014-02-05 17:42:44 -0800699bool BpBinder::onIncStrongAttempted(uint32_t /*flags*/, const void* /*id*/)
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800700{
Steven Moreland5553ac42020-11-11 02:14:45 +0000701 // RPC binder doesn't currently support inc from weak binders
Tomasz Wasilczyk32746ae2023-10-09 19:57:58 +0000702 if (isRpcBinder()) [[unlikely]] {
703 return false;
704 }
Steven Moreland5553ac42020-11-11 02:14:45 +0000705
Steven Moreland32150282021-11-12 22:54:53 +0000706 if constexpr (!kEnableKernelIpc) {
707 LOG_ALWAYS_FATAL("Binder kernel driver disabled at build time");
708 return false;
709 }
710
Steven Moreland5553ac42020-11-11 02:14:45 +0000711 ALOGV("onIncStrongAttempted BpBinder %p handle %d\n", this, binderHandle());
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800712 IPCThreadState* ipc = IPCThreadState::self();
Steven Moreland5553ac42020-11-11 02:14:45 +0000713 return ipc ? ipc->attemptIncStrongHandle(binderHandle()) == NO_ERROR : false;
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800714}
715
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700716uint32_t BpBinder::getBinderProxyCount(uint32_t uid)
717{
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700718 RpcMutexUniqueLock _l(sTrackingLock);
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700719 auto it = sTrackingMap.find(uid);
720 if (it != sTrackingMap.end()) {
721 return it->second & COUNTING_VALUE_MASK;
722 }
723 return 0;
724}
725
Jing Ji4c4ac062023-10-07 15:20:23 -0700726uint32_t BpBinder::getBinderProxyCount()
727{
728 return sBinderProxyCount.load();
729}
730
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700731void BpBinder::getCountByUid(Vector<uint32_t>& uids, Vector<uint32_t>& counts)
732{
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700733 RpcMutexUniqueLock _l(sTrackingLock);
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700734 uids.setCapacity(sTrackingMap.size());
735 counts.setCapacity(sTrackingMap.size());
736 for (const auto& it : sTrackingMap) {
737 uids.push_back(it.first);
738 counts.push_back(it.second & COUNTING_VALUE_MASK);
739 }
740}
741
742void BpBinder::enableCountByUid() { sCountByUidEnabled.store(true); }
743void BpBinder::disableCountByUid() { sCountByUidEnabled.store(false); }
744void BpBinder::setCountByUidEnabled(bool enable) { sCountByUidEnabled.store(enable); }
745
Jing Jibdbe29a2023-10-03 00:03:28 -0700746void BpBinder::setBinderProxyCountEventCallback(binder_proxy_limit_callback cbl,
747 binder_proxy_warning_callback cbw) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700748 RpcMutexUniqueLock _l(sTrackingLock);
Jing Jibdbe29a2023-10-03 00:03:28 -0700749 sLimitCallback = std::move(cbl);
750 sWarningCallback = std::move(cbw);
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700751}
752
Jing Jibdbe29a2023-10-03 00:03:28 -0700753void BpBinder::setBinderProxyCountWatermarks(int high, int low, int warning) {
Tomasz Wasilczyk66ee1922023-10-26 14:53:49 -0700754 RpcMutexUniqueLock _l(sTrackingLock);
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700755 sBinderProxyCountHighWatermark = high;
756 sBinderProxyCountLowWatermark = low;
Jing Jibdbe29a2023-10-03 00:03:28 -0700757 sBinderProxyCountWarningWatermark = warning;
Michael Wachenschwanzd296d0c2017-08-15 00:57:14 -0700758}
759
The Android Open Source Projectedbf3b62009-03-03 19:31:44 -0800760// ---------------------------------------------------------------------------
761
Steven Moreland61ff8492019-09-26 16:05:45 -0700762} // namespace android