Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp202740pxf; Wed, 31 Mar 2021 00:48:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzjv4Zjr5vuuct2loP8HH6VWuv8eZiZ/UoCQWzLhLhY0ZvK7RZnB6+wIPszKFoqnoHckR6J X-Received: by 2002:aa7:cc98:: with SMTP id p24mr2034886edt.187.1617176880546; Wed, 31 Mar 2021 00:48:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617176880; cv=none; d=google.com; s=arc-20160816; b=yeHHzqXcUL9aa/QUWZESqghUQXvpY1oQhoIO6xKiLH17yZdHVk4ttms8C/Q6VvSl/Q xqghtSrc2wboTHKKowTvYPBJ+Sfpxg3emR0/IqGp8WGrv1yGudlrK7G9nydir+cIdHHp Y/8C3hG59xpyv8lf06rIxDzBx/6g5wKiiYUsXfnmB3/yZ+TYZfMrlth5ZsKqj/qRu13v IQiH5umL3pii8LwfeLhMK3RNOoviQ4wYeOSB6lGcppXwixfCX9L0m2I/fJFm5Zab5aya fkznOb+M4Zu2dSQqszqx2RlpM3wlfxJ6eLEEf/QPgPsmG81DAQ7TxLU67iRTLTYGrieh qt2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=4+mBh7r4fUnHVeTgDRClxyczCEYcrI2x7Oj9PiidusM=; b=b4pCQu0TqgGT30K54BYoq5sFZVtj6uMZmxOeD+tDYgOIWtohWZKgfulKaVuZCUwEnF ftSNjju7wwxbpgrXIzoUeUbBD3S2vHw8MjlAtr1vtwKna4PyYAtYm9zYo07y3JcqA+n+ ogiT9wknJulw5WkcgQr1NTR+n0iK3oTz7iW16U+4mzYh1aI0zdauCogwHaoFRfCwVjN8 wkbjyggjzEQ+vCoYpVZchw0bnRJhxdMSyZyMji21DQbAbJzyHJXwZZXfrX84F7eCu+mF WocRBsOmsbCa7LZUKSW5aRNV6RWSswoFeQFJ1FM+weFo+N3dgrBe9y5MPJEJ0U1rSMlQ fevg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CjHS+2vo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i15si958048eje.718.2021.03.31.00.47.37; Wed, 31 Mar 2021 00:48:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CjHS+2vo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234126AbhCaHoj (ORCPT + 99 others); Wed, 31 Mar 2021 03:44:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:49774 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234211AbhCaHoP (ORCPT ); Wed, 31 Mar 2021 03:44:15 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9209A619B1; Wed, 31 Mar 2021 07:44:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617176655; bh=QLhMVNo2EWVnmQgedHdlIv6jKMUqEuJktTqjCz2h9ow=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=CjHS+2vo9NLN/Ktr+PSGIJDvqVDBlowfN3j/jo+88M0uHmN2/3pVpyF9kwW8DKlyq MphZspuI8hLxHTNOibPoWhl8IMcWU/Q44mZcNPLGR42XZt219sv5Sfm5nqI+PCnawq 1uVlUGH3rUzTAFt+5RSyiR6Akw0tdA6k+VP7Uy8s= Date: Wed, 31 Mar 2021 09:44:12 +0200 From: Greg KH To: Hang Lu Cc: tkjos@android.com, maco@android.com, arve@android.com, joel@joelfernandes.org, christian@brauner.io, hridya@google.com, surenb@google.com, rdunlap@infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] binder: tell userspace to dump current backtrace when detecting oneway spamming Message-ID: References: <1617176056-1440-1-git-send-email-hangl@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1617176056-1440-1-git-send-email-hangl@codeaurora.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 31, 2021 at 03:34:16PM +0800, Hang Lu wrote: > When async binder buffer got exhausted, some normal oneway transaction > will also be discarded and finally caused system/app stop. By that time, > the binder debug information we dump may not relevant to the root cause. > And this issue is difficult to debug if without the backtrace of thread > sending spam. > > This change will send BR_ONEWAY_SPAM_SUSPECT to userspace when detecting > oneway spamming, request to dump current backtrace. The detection will > happened only once when exceeding the threshold (target process dips > below 80% of its oneway space, and current process is responsible for > either more than 50 transactions, or more than 50% of the oneway space). > And the detection will restart when the async buffer has returned to a > healthy state. > > Signed-off-by: Hang Lu > --- > drivers/android/binder.c | 25 ++++++++++++++++++++++--- > drivers/android/binder_alloc.c | 15 ++++++++++++--- > drivers/android/binder_alloc.h | 8 +++++++- > drivers/android/binder_internal.h | 1 + > include/uapi/linux/android/binder.h | 8 ++++++++ > 5 files changed, 50 insertions(+), 7 deletions(-) > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c > index c119736..28ceaf9 100644 > --- a/drivers/android/binder.c > +++ b/drivers/android/binder.c > @@ -87,6 +87,7 @@ static DEFINE_SPINLOCK(binder_dead_nodes_lock); > static struct dentry *binder_debugfs_dir_entry_root; > static struct dentry *binder_debugfs_dir_entry_proc; > static atomic_t binder_last_id; > +static bool oneway_spam_detection_enabled; Why is this a "whole system" value and not a "per binder instance" value? You just allowed one binder instance to affect another one, which does not seem like a good idea to me :( thanks, greg k-h