13ad20fe3SChristian Brauner /* SPDX-License-Identifier: GPL-2.0 */ 23ad20fe3SChristian Brauner 33ad20fe3SChristian Brauner #ifndef _LINUX_BINDER_INTERNAL_H 43ad20fe3SChristian Brauner #define _LINUX_BINDER_INTERNAL_H 53ad20fe3SChristian Brauner 63ad20fe3SChristian Brauner #include <linux/export.h> 73ad20fe3SChristian Brauner #include <linux/fs.h> 83ad20fe3SChristian Brauner #include <linux/list.h> 93ad20fe3SChristian Brauner #include <linux/miscdevice.h> 103ad20fe3SChristian Brauner #include <linux/mutex.h> 11f0fe2c0fSChristian Brauner #include <linux/refcount.h> 123ad20fe3SChristian Brauner #include <linux/stddef.h> 133ad20fe3SChristian Brauner #include <linux/types.h> 143ad20fe3SChristian Brauner #include <linux/uidgid.h> 15421518a2SFrankie.Chang #include <uapi/linux/android/binderfs.h> 16421518a2SFrankie.Chang #include "binder_alloc.h" 173ad20fe3SChristian Brauner 183ad20fe3SChristian Brauner struct binder_context { 193ad20fe3SChristian Brauner struct binder_node *binder_context_mgr_node; 203ad20fe3SChristian Brauner struct mutex context_mgr_node_lock; 213ad20fe3SChristian Brauner kuid_t binder_context_mgr_uid; 223ad20fe3SChristian Brauner const char *name; 233ad20fe3SChristian Brauner }; 243ad20fe3SChristian Brauner 253ad20fe3SChristian Brauner /** 263ad20fe3SChristian Brauner * struct binder_device - information about a binder device node 273ad20fe3SChristian Brauner * @hlist: list of binder devices (only used for devices requested via 283ad20fe3SChristian Brauner * CONFIG_ANDROID_BINDER_DEVICES) 293ad20fe3SChristian Brauner * @miscdev: information about a binder character device node 303ad20fe3SChristian Brauner * @context: binder context information 313ad20fe3SChristian Brauner * @binderfs_inode: This is the inode of the root dentry of the super block 323ad20fe3SChristian Brauner * belonging to a binderfs mount. 333ad20fe3SChristian Brauner */ 343ad20fe3SChristian Brauner struct binder_device { 353ad20fe3SChristian Brauner struct hlist_node hlist; 363ad20fe3SChristian Brauner struct miscdevice miscdev; 373ad20fe3SChristian Brauner struct binder_context context; 383ad20fe3SChristian Brauner struct inode *binderfs_inode; 39f0fe2c0fSChristian Brauner refcount_t ref; 403ad20fe3SChristian Brauner }; 413ad20fe3SChristian Brauner 424feb80faSHridya Valsaraju /** 434feb80faSHridya Valsaraju * binderfs_mount_opts - mount options for binderfs 444feb80faSHridya Valsaraju * @max: maximum number of allocatable binderfs binder devices 454feb80faSHridya Valsaraju * @stats_mode: enable binder stats in binderfs. 464feb80faSHridya Valsaraju */ 474feb80faSHridya Valsaraju struct binderfs_mount_opts { 484feb80faSHridya Valsaraju int max; 494feb80faSHridya Valsaraju int stats_mode; 504feb80faSHridya Valsaraju }; 514feb80faSHridya Valsaraju 524feb80faSHridya Valsaraju /** 534feb80faSHridya Valsaraju * binderfs_info - information about a binderfs mount 544feb80faSHridya Valsaraju * @ipc_ns: The ipc namespace the binderfs mount belongs to. 554feb80faSHridya Valsaraju * @control_dentry: This records the dentry of this binderfs mount 564feb80faSHridya Valsaraju * binder-control device. 574feb80faSHridya Valsaraju * @root_uid: uid that needs to be used when a new binder device is 584feb80faSHridya Valsaraju * created. 594feb80faSHridya Valsaraju * @root_gid: gid that needs to be used when a new binder device is 604feb80faSHridya Valsaraju * created. 614feb80faSHridya Valsaraju * @mount_opts: The mount options in use. 624feb80faSHridya Valsaraju * @device_count: The current number of allocated binder devices. 634feb80faSHridya Valsaraju * @proc_log_dir: Pointer to the directory dentry containing process-specific 644feb80faSHridya Valsaraju * logs. 654feb80faSHridya Valsaraju */ 664feb80faSHridya Valsaraju struct binderfs_info { 674feb80faSHridya Valsaraju struct ipc_namespace *ipc_ns; 684feb80faSHridya Valsaraju struct dentry *control_dentry; 694feb80faSHridya Valsaraju kuid_t root_uid; 704feb80faSHridya Valsaraju kgid_t root_gid; 714feb80faSHridya Valsaraju struct binderfs_mount_opts mount_opts; 724feb80faSHridya Valsaraju int device_count; 734feb80faSHridya Valsaraju struct dentry *proc_log_dir; 744feb80faSHridya Valsaraju }; 754feb80faSHridya Valsaraju 763ad20fe3SChristian Brauner extern const struct file_operations binder_fops; 773ad20fe3SChristian Brauner 78ca2864c6SHridya Valsaraju extern char *binder_devices_param; 79ca2864c6SHridya Valsaraju 803ad20fe3SChristian Brauner #ifdef CONFIG_ANDROID_BINDERFS 813ad20fe3SChristian Brauner extern bool is_binderfs_device(const struct inode *inode); 824feb80faSHridya Valsaraju extern struct dentry *binderfs_create_file(struct dentry *dir, const char *name, 834feb80faSHridya Valsaraju const struct file_operations *fops, 844feb80faSHridya Valsaraju void *data); 854feb80faSHridya Valsaraju extern void binderfs_remove_file(struct dentry *dentry); 863ad20fe3SChristian Brauner #else 873ad20fe3SChristian Brauner static inline bool is_binderfs_device(const struct inode *inode) 883ad20fe3SChristian Brauner { 893ad20fe3SChristian Brauner return false; 903ad20fe3SChristian Brauner } 914feb80faSHridya Valsaraju static inline struct dentry *binderfs_create_file(struct dentry *dir, 924feb80faSHridya Valsaraju const char *name, 934feb80faSHridya Valsaraju const struct file_operations *fops, 944feb80faSHridya Valsaraju void *data) 954feb80faSHridya Valsaraju { 964feb80faSHridya Valsaraju return NULL; 974feb80faSHridya Valsaraju } 984feb80faSHridya Valsaraju static inline void binderfs_remove_file(struct dentry *dentry) {} 993ad20fe3SChristian Brauner #endif 1003ad20fe3SChristian Brauner 1015b9633afSChristian Brauner #ifdef CONFIG_ANDROID_BINDERFS 1025b9633afSChristian Brauner extern int __init init_binderfs(void); 1035b9633afSChristian Brauner #else 1045b9633afSChristian Brauner static inline int __init init_binderfs(void) 1055b9633afSChristian Brauner { 1065b9633afSChristian Brauner return 0; 1075b9633afSChristian Brauner } 1085b9633afSChristian Brauner #endif 1095b9633afSChristian Brauner 1100e13e452SHridya Valsaraju int binder_stats_show(struct seq_file *m, void *unused); 1110e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_stats); 1120e13e452SHridya Valsaraju 1130e13e452SHridya Valsaraju int binder_state_show(struct seq_file *m, void *unused); 1140e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_state); 1150e13e452SHridya Valsaraju 1160e13e452SHridya Valsaraju int binder_transactions_show(struct seq_file *m, void *unused); 1170e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_transactions); 11803e2e07eSHridya Valsaraju 11903e2e07eSHridya Valsaraju int binder_transaction_log_show(struct seq_file *m, void *unused); 12003e2e07eSHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_transaction_log); 12103e2e07eSHridya Valsaraju 12203e2e07eSHridya Valsaraju struct binder_transaction_log_entry { 12303e2e07eSHridya Valsaraju int debug_id; 12403e2e07eSHridya Valsaraju int debug_id_done; 12503e2e07eSHridya Valsaraju int call_type; 12603e2e07eSHridya Valsaraju int from_proc; 12703e2e07eSHridya Valsaraju int from_thread; 12803e2e07eSHridya Valsaraju int target_handle; 12903e2e07eSHridya Valsaraju int to_proc; 13003e2e07eSHridya Valsaraju int to_thread; 13103e2e07eSHridya Valsaraju int to_node; 13203e2e07eSHridya Valsaraju int data_size; 13303e2e07eSHridya Valsaraju int offsets_size; 13403e2e07eSHridya Valsaraju int return_error_line; 13503e2e07eSHridya Valsaraju uint32_t return_error; 13603e2e07eSHridya Valsaraju uint32_t return_error_param; 13751d8a7ecSChristian Brauner char context_name[BINDERFS_MAX_NAME + 1]; 13803e2e07eSHridya Valsaraju }; 13903e2e07eSHridya Valsaraju 14003e2e07eSHridya Valsaraju struct binder_transaction_log { 14103e2e07eSHridya Valsaraju atomic_t cur; 14203e2e07eSHridya Valsaraju bool full; 14303e2e07eSHridya Valsaraju struct binder_transaction_log_entry entry[32]; 14403e2e07eSHridya Valsaraju }; 14503e2e07eSHridya Valsaraju 146421518a2SFrankie.Chang enum binder_stat_types { 147421518a2SFrankie.Chang BINDER_STAT_PROC, 148421518a2SFrankie.Chang BINDER_STAT_THREAD, 149421518a2SFrankie.Chang BINDER_STAT_NODE, 150421518a2SFrankie.Chang BINDER_STAT_REF, 151421518a2SFrankie.Chang BINDER_STAT_DEATH, 152421518a2SFrankie.Chang BINDER_STAT_TRANSACTION, 153421518a2SFrankie.Chang BINDER_STAT_TRANSACTION_COMPLETE, 154421518a2SFrankie.Chang BINDER_STAT_COUNT 155421518a2SFrankie.Chang }; 156421518a2SFrankie.Chang 157421518a2SFrankie.Chang struct binder_stats { 158a7dc1e6fSHang Lu atomic_t br[_IOC_NR(BR_ONEWAY_SPAM_SUSPECT) + 1]; 159421518a2SFrankie.Chang atomic_t bc[_IOC_NR(BC_REPLY_SG) + 1]; 160421518a2SFrankie.Chang atomic_t obj_created[BINDER_STAT_COUNT]; 161421518a2SFrankie.Chang atomic_t obj_deleted[BINDER_STAT_COUNT]; 162421518a2SFrankie.Chang }; 163421518a2SFrankie.Chang 164421518a2SFrankie.Chang /** 165421518a2SFrankie.Chang * struct binder_work - work enqueued on a worklist 166421518a2SFrankie.Chang * @entry: node enqueued on list 167421518a2SFrankie.Chang * @type: type of work to be performed 168421518a2SFrankie.Chang * 169421518a2SFrankie.Chang * There are separate work lists for proc, thread, and node (async). 170421518a2SFrankie.Chang */ 171421518a2SFrankie.Chang struct binder_work { 172421518a2SFrankie.Chang struct list_head entry; 173421518a2SFrankie.Chang 174421518a2SFrankie.Chang enum binder_work_type { 175421518a2SFrankie.Chang BINDER_WORK_TRANSACTION = 1, 176421518a2SFrankie.Chang BINDER_WORK_TRANSACTION_COMPLETE, 177a7dc1e6fSHang Lu BINDER_WORK_TRANSACTION_ONEWAY_SPAM_SUSPECT, 178421518a2SFrankie.Chang BINDER_WORK_RETURN_ERROR, 179421518a2SFrankie.Chang BINDER_WORK_NODE, 180421518a2SFrankie.Chang BINDER_WORK_DEAD_BINDER, 181421518a2SFrankie.Chang BINDER_WORK_DEAD_BINDER_AND_CLEAR, 182421518a2SFrankie.Chang BINDER_WORK_CLEAR_DEATH_NOTIFICATION, 183421518a2SFrankie.Chang } type; 184421518a2SFrankie.Chang }; 185421518a2SFrankie.Chang 186421518a2SFrankie.Chang struct binder_error { 187421518a2SFrankie.Chang struct binder_work work; 188421518a2SFrankie.Chang uint32_t cmd; 189421518a2SFrankie.Chang }; 190421518a2SFrankie.Chang 191421518a2SFrankie.Chang /** 192421518a2SFrankie.Chang * struct binder_node - binder node bookkeeping 193421518a2SFrankie.Chang * @debug_id: unique ID for debugging 194421518a2SFrankie.Chang * (invariant after initialized) 195421518a2SFrankie.Chang * @lock: lock for node fields 196421518a2SFrankie.Chang * @work: worklist element for node work 197421518a2SFrankie.Chang * (protected by @proc->inner_lock) 198421518a2SFrankie.Chang * @rb_node: element for proc->nodes tree 199421518a2SFrankie.Chang * (protected by @proc->inner_lock) 200421518a2SFrankie.Chang * @dead_node: element for binder_dead_nodes list 201421518a2SFrankie.Chang * (protected by binder_dead_nodes_lock) 202421518a2SFrankie.Chang * @proc: binder_proc that owns this node 203421518a2SFrankie.Chang * (invariant after initialized) 204421518a2SFrankie.Chang * @refs: list of references on this node 205421518a2SFrankie.Chang * (protected by @lock) 206421518a2SFrankie.Chang * @internal_strong_refs: used to take strong references when 207421518a2SFrankie.Chang * initiating a transaction 208421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 209421518a2SFrankie.Chang * and by @lock) 210421518a2SFrankie.Chang * @local_weak_refs: weak user refs from local process 211421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 212421518a2SFrankie.Chang * and by @lock) 213421518a2SFrankie.Chang * @local_strong_refs: strong user refs from local process 214421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 215421518a2SFrankie.Chang * and by @lock) 216421518a2SFrankie.Chang * @tmp_refs: temporary kernel refs 217421518a2SFrankie.Chang * (protected by @proc->inner_lock while @proc 218421518a2SFrankie.Chang * is valid, and by binder_dead_nodes_lock 219421518a2SFrankie.Chang * if @proc is NULL. During inc/dec and node release 220421518a2SFrankie.Chang * it is also protected by @lock to provide safety 221421518a2SFrankie.Chang * as the node dies and @proc becomes NULL) 222421518a2SFrankie.Chang * @ptr: userspace pointer for node 223421518a2SFrankie.Chang * (invariant, no lock needed) 224421518a2SFrankie.Chang * @cookie: userspace cookie for node 225421518a2SFrankie.Chang * (invariant, no lock needed) 226421518a2SFrankie.Chang * @has_strong_ref: userspace notified of strong ref 227421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 228421518a2SFrankie.Chang * and by @lock) 229421518a2SFrankie.Chang * @pending_strong_ref: userspace has acked notification of strong ref 230421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 231421518a2SFrankie.Chang * and by @lock) 232421518a2SFrankie.Chang * @has_weak_ref: userspace notified of weak ref 233421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 234421518a2SFrankie.Chang * and by @lock) 235421518a2SFrankie.Chang * @pending_weak_ref: userspace has acked notification of weak ref 236421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 237421518a2SFrankie.Chang * and by @lock) 238421518a2SFrankie.Chang * @has_async_transaction: async transaction to node in progress 239421518a2SFrankie.Chang * (protected by @lock) 240421518a2SFrankie.Chang * @accept_fds: file descriptor operations supported for node 241421518a2SFrankie.Chang * (invariant after initialized) 242421518a2SFrankie.Chang * @min_priority: minimum scheduling priority 243421518a2SFrankie.Chang * (invariant after initialized) 244421518a2SFrankie.Chang * @txn_security_ctx: require sender's security context 245421518a2SFrankie.Chang * (invariant after initialized) 246421518a2SFrankie.Chang * @async_todo: list of async work items 247421518a2SFrankie.Chang * (protected by @proc->inner_lock) 248421518a2SFrankie.Chang * 249421518a2SFrankie.Chang * Bookkeeping structure for binder nodes. 250421518a2SFrankie.Chang */ 251421518a2SFrankie.Chang struct binder_node { 252421518a2SFrankie.Chang int debug_id; 253421518a2SFrankie.Chang spinlock_t lock; 254421518a2SFrankie.Chang struct binder_work work; 255421518a2SFrankie.Chang union { 256421518a2SFrankie.Chang struct rb_node rb_node; 257421518a2SFrankie.Chang struct hlist_node dead_node; 258421518a2SFrankie.Chang }; 259421518a2SFrankie.Chang struct binder_proc *proc; 260421518a2SFrankie.Chang struct hlist_head refs; 261421518a2SFrankie.Chang int internal_strong_refs; 262421518a2SFrankie.Chang int local_weak_refs; 263421518a2SFrankie.Chang int local_strong_refs; 264421518a2SFrankie.Chang int tmp_refs; 265421518a2SFrankie.Chang binder_uintptr_t ptr; 266421518a2SFrankie.Chang binder_uintptr_t cookie; 267421518a2SFrankie.Chang struct { 268421518a2SFrankie.Chang /* 269421518a2SFrankie.Chang * bitfield elements protected by 270421518a2SFrankie.Chang * proc inner_lock 271421518a2SFrankie.Chang */ 272421518a2SFrankie.Chang u8 has_strong_ref:1; 273421518a2SFrankie.Chang u8 pending_strong_ref:1; 274421518a2SFrankie.Chang u8 has_weak_ref:1; 275421518a2SFrankie.Chang u8 pending_weak_ref:1; 276421518a2SFrankie.Chang }; 277421518a2SFrankie.Chang struct { 278421518a2SFrankie.Chang /* 279421518a2SFrankie.Chang * invariant after initialization 280421518a2SFrankie.Chang */ 281421518a2SFrankie.Chang u8 accept_fds:1; 282421518a2SFrankie.Chang u8 txn_security_ctx:1; 283421518a2SFrankie.Chang u8 min_priority; 284421518a2SFrankie.Chang }; 285421518a2SFrankie.Chang bool has_async_transaction; 286421518a2SFrankie.Chang struct list_head async_todo; 287421518a2SFrankie.Chang }; 288421518a2SFrankie.Chang 289421518a2SFrankie.Chang struct binder_ref_death { 290421518a2SFrankie.Chang /** 291421518a2SFrankie.Chang * @work: worklist element for death notifications 292421518a2SFrankie.Chang * (protected by inner_lock of the proc that 293421518a2SFrankie.Chang * this ref belongs to) 294421518a2SFrankie.Chang */ 295421518a2SFrankie.Chang struct binder_work work; 296421518a2SFrankie.Chang binder_uintptr_t cookie; 297421518a2SFrankie.Chang }; 298421518a2SFrankie.Chang 299421518a2SFrankie.Chang /** 300421518a2SFrankie.Chang * struct binder_ref_data - binder_ref counts and id 301421518a2SFrankie.Chang * @debug_id: unique ID for the ref 302421518a2SFrankie.Chang * @desc: unique userspace handle for ref 303421518a2SFrankie.Chang * @strong: strong ref count (debugging only if not locked) 304421518a2SFrankie.Chang * @weak: weak ref count (debugging only if not locked) 305421518a2SFrankie.Chang * 306421518a2SFrankie.Chang * Structure to hold ref count and ref id information. Since 307421518a2SFrankie.Chang * the actual ref can only be accessed with a lock, this structure 308421518a2SFrankie.Chang * is used to return information about the ref to callers of 309421518a2SFrankie.Chang * ref inc/dec functions. 310421518a2SFrankie.Chang */ 311421518a2SFrankie.Chang struct binder_ref_data { 312421518a2SFrankie.Chang int debug_id; 313421518a2SFrankie.Chang uint32_t desc; 314421518a2SFrankie.Chang int strong; 315421518a2SFrankie.Chang int weak; 316421518a2SFrankie.Chang }; 317421518a2SFrankie.Chang 318421518a2SFrankie.Chang /** 319421518a2SFrankie.Chang * struct binder_ref - struct to track references on nodes 320421518a2SFrankie.Chang * @data: binder_ref_data containing id, handle, and current refcounts 321421518a2SFrankie.Chang * @rb_node_desc: node for lookup by @data.desc in proc's rb_tree 322421518a2SFrankie.Chang * @rb_node_node: node for lookup by @node in proc's rb_tree 323421518a2SFrankie.Chang * @node_entry: list entry for node->refs list in target node 324421518a2SFrankie.Chang * (protected by @node->lock) 325421518a2SFrankie.Chang * @proc: binder_proc containing ref 326421518a2SFrankie.Chang * @node: binder_node of target node. When cleaning up a 327421518a2SFrankie.Chang * ref for deletion in binder_cleanup_ref, a non-NULL 328421518a2SFrankie.Chang * @node indicates the node must be freed 329421518a2SFrankie.Chang * @death: pointer to death notification (ref_death) if requested 330421518a2SFrankie.Chang * (protected by @node->lock) 331421518a2SFrankie.Chang * 332421518a2SFrankie.Chang * Structure to track references from procA to target node (on procB). This 333421518a2SFrankie.Chang * structure is unsafe to access without holding @proc->outer_lock. 334421518a2SFrankie.Chang */ 335421518a2SFrankie.Chang struct binder_ref { 336421518a2SFrankie.Chang /* Lookups needed: */ 337421518a2SFrankie.Chang /* node + proc => ref (transaction) */ 338421518a2SFrankie.Chang /* desc + proc => ref (transaction, inc/dec ref) */ 339421518a2SFrankie.Chang /* node => refs + procs (proc exit) */ 340421518a2SFrankie.Chang struct binder_ref_data data; 341421518a2SFrankie.Chang struct rb_node rb_node_desc; 342421518a2SFrankie.Chang struct rb_node rb_node_node; 343421518a2SFrankie.Chang struct hlist_node node_entry; 344421518a2SFrankie.Chang struct binder_proc *proc; 345421518a2SFrankie.Chang struct binder_node *node; 346421518a2SFrankie.Chang struct binder_ref_death *death; 347421518a2SFrankie.Chang }; 348421518a2SFrankie.Chang 349421518a2SFrankie.Chang /** 350421518a2SFrankie.Chang * struct binder_proc - binder process bookkeeping 351421518a2SFrankie.Chang * @proc_node: element for binder_procs list 352421518a2SFrankie.Chang * @threads: rbtree of binder_threads in this proc 353421518a2SFrankie.Chang * (protected by @inner_lock) 354421518a2SFrankie.Chang * @nodes: rbtree of binder nodes associated with 355421518a2SFrankie.Chang * this proc ordered by node->ptr 356421518a2SFrankie.Chang * (protected by @inner_lock) 357421518a2SFrankie.Chang * @refs_by_desc: rbtree of refs ordered by ref->desc 358421518a2SFrankie.Chang * (protected by @outer_lock) 359421518a2SFrankie.Chang * @refs_by_node: rbtree of refs ordered by ref->node 360421518a2SFrankie.Chang * (protected by @outer_lock) 361421518a2SFrankie.Chang * @waiting_threads: threads currently waiting for proc work 362421518a2SFrankie.Chang * (protected by @inner_lock) 363421518a2SFrankie.Chang * @pid PID of group_leader of process 364421518a2SFrankie.Chang * (invariant after initialized) 365421518a2SFrankie.Chang * @tsk task_struct for group_leader of process 366421518a2SFrankie.Chang * (invariant after initialized) 367*29bc22acSTodd Kjos * @cred struct cred associated with the `struct file` 368*29bc22acSTodd Kjos * in binder_open() 369*29bc22acSTodd Kjos * (invariant after initialized) 370421518a2SFrankie.Chang * @deferred_work_node: element for binder_deferred_list 371421518a2SFrankie.Chang * (protected by binder_deferred_lock) 372421518a2SFrankie.Chang * @deferred_work: bitmap of deferred work to perform 373421518a2SFrankie.Chang * (protected by binder_deferred_lock) 374432ff1e9SMarco Ballesio * @outstanding_txns: number of transactions to be transmitted before 375432ff1e9SMarco Ballesio * processes in freeze_wait are woken up 376432ff1e9SMarco Ballesio * (protected by @inner_lock) 377421518a2SFrankie.Chang * @is_dead: process is dead and awaiting free 378421518a2SFrankie.Chang * when outstanding transactions are cleaned up 379421518a2SFrankie.Chang * (protected by @inner_lock) 380432ff1e9SMarco Ballesio * @is_frozen: process is frozen and unable to service 381432ff1e9SMarco Ballesio * binder transactions 382432ff1e9SMarco Ballesio * (protected by @inner_lock) 383ae28c1beSMarco Ballesio * @sync_recv: process received sync transactions since last frozen 384ae28c1beSMarco Ballesio * (protected by @inner_lock) 385ae28c1beSMarco Ballesio * @async_recv: process received async transactions since last frozen 386ae28c1beSMarco Ballesio * (protected by @inner_lock) 387432ff1e9SMarco Ballesio * @freeze_wait: waitqueue of processes waiting for all outstanding 388432ff1e9SMarco Ballesio * transactions to be processed 389432ff1e9SMarco Ballesio * (protected by @inner_lock) 390421518a2SFrankie.Chang * @todo: list of work for this process 391421518a2SFrankie.Chang * (protected by @inner_lock) 392421518a2SFrankie.Chang * @stats: per-process binder statistics 393421518a2SFrankie.Chang * (atomics, no lock needed) 394421518a2SFrankie.Chang * @delivered_death: list of delivered death notification 395421518a2SFrankie.Chang * (protected by @inner_lock) 396421518a2SFrankie.Chang * @max_threads: cap on number of binder threads 397421518a2SFrankie.Chang * (protected by @inner_lock) 398421518a2SFrankie.Chang * @requested_threads: number of binder threads requested but not 399421518a2SFrankie.Chang * yet started. In current implementation, can 400421518a2SFrankie.Chang * only be 0 or 1. 401421518a2SFrankie.Chang * (protected by @inner_lock) 402421518a2SFrankie.Chang * @requested_threads_started: number binder threads started 403421518a2SFrankie.Chang * (protected by @inner_lock) 404421518a2SFrankie.Chang * @tmp_ref: temporary reference to indicate proc is in use 405421518a2SFrankie.Chang * (protected by @inner_lock) 406421518a2SFrankie.Chang * @default_priority: default scheduler priority 407421518a2SFrankie.Chang * (invariant after initialized) 408421518a2SFrankie.Chang * @debugfs_entry: debugfs node 409421518a2SFrankie.Chang * @alloc: binder allocator bookkeeping 410421518a2SFrankie.Chang * @context: binder_context for this proc 411421518a2SFrankie.Chang * (invariant after initialized) 412421518a2SFrankie.Chang * @inner_lock: can nest under outer_lock and/or node lock 413421518a2SFrankie.Chang * @outer_lock: no nesting under innor or node lock 414421518a2SFrankie.Chang * Lock order: 1) outer, 2) node, 3) inner 415421518a2SFrankie.Chang * @binderfs_entry: process-specific binderfs log file 416a7dc1e6fSHang Lu * @oneway_spam_detection_enabled: process enabled oneway spam detection 417a7dc1e6fSHang Lu * or not 418421518a2SFrankie.Chang * 419421518a2SFrankie.Chang * Bookkeeping structure for binder processes 420421518a2SFrankie.Chang */ 421421518a2SFrankie.Chang struct binder_proc { 422421518a2SFrankie.Chang struct hlist_node proc_node; 423421518a2SFrankie.Chang struct rb_root threads; 424421518a2SFrankie.Chang struct rb_root nodes; 425421518a2SFrankie.Chang struct rb_root refs_by_desc; 426421518a2SFrankie.Chang struct rb_root refs_by_node; 427421518a2SFrankie.Chang struct list_head waiting_threads; 428421518a2SFrankie.Chang int pid; 429421518a2SFrankie.Chang struct task_struct *tsk; 430*29bc22acSTodd Kjos const struct cred *cred; 431421518a2SFrankie.Chang struct hlist_node deferred_work_node; 432421518a2SFrankie.Chang int deferred_work; 433432ff1e9SMarco Ballesio int outstanding_txns; 434421518a2SFrankie.Chang bool is_dead; 435432ff1e9SMarco Ballesio bool is_frozen; 436ae28c1beSMarco Ballesio bool sync_recv; 437ae28c1beSMarco Ballesio bool async_recv; 438432ff1e9SMarco Ballesio wait_queue_head_t freeze_wait; 439421518a2SFrankie.Chang 440421518a2SFrankie.Chang struct list_head todo; 441421518a2SFrankie.Chang struct binder_stats stats; 442421518a2SFrankie.Chang struct list_head delivered_death; 443421518a2SFrankie.Chang int max_threads; 444421518a2SFrankie.Chang int requested_threads; 445421518a2SFrankie.Chang int requested_threads_started; 446421518a2SFrankie.Chang int tmp_ref; 447421518a2SFrankie.Chang long default_priority; 448421518a2SFrankie.Chang struct dentry *debugfs_entry; 449421518a2SFrankie.Chang struct binder_alloc alloc; 450421518a2SFrankie.Chang struct binder_context *context; 451421518a2SFrankie.Chang spinlock_t inner_lock; 452421518a2SFrankie.Chang spinlock_t outer_lock; 453421518a2SFrankie.Chang struct dentry *binderfs_entry; 454a7dc1e6fSHang Lu bool oneway_spam_detection_enabled; 455421518a2SFrankie.Chang }; 456421518a2SFrankie.Chang 457421518a2SFrankie.Chang /** 458421518a2SFrankie.Chang * struct binder_thread - binder thread bookkeeping 459421518a2SFrankie.Chang * @proc: binder process for this thread 460421518a2SFrankie.Chang * (invariant after initialization) 461421518a2SFrankie.Chang * @rb_node: element for proc->threads rbtree 462421518a2SFrankie.Chang * (protected by @proc->inner_lock) 463421518a2SFrankie.Chang * @waiting_thread_node: element for @proc->waiting_threads list 464421518a2SFrankie.Chang * (protected by @proc->inner_lock) 465421518a2SFrankie.Chang * @pid: PID for this thread 466421518a2SFrankie.Chang * (invariant after initialization) 467421518a2SFrankie.Chang * @looper: bitmap of looping state 468421518a2SFrankie.Chang * (only accessed by this thread) 469421518a2SFrankie.Chang * @looper_needs_return: looping thread needs to exit driver 470421518a2SFrankie.Chang * (no lock needed) 471421518a2SFrankie.Chang * @transaction_stack: stack of in-progress transactions for this thread 472421518a2SFrankie.Chang * (protected by @proc->inner_lock) 473421518a2SFrankie.Chang * @todo: list of work to do for this thread 474421518a2SFrankie.Chang * (protected by @proc->inner_lock) 475421518a2SFrankie.Chang * @process_todo: whether work in @todo should be processed 476421518a2SFrankie.Chang * (protected by @proc->inner_lock) 477421518a2SFrankie.Chang * @return_error: transaction errors reported by this thread 478421518a2SFrankie.Chang * (only accessed by this thread) 479421518a2SFrankie.Chang * @reply_error: transaction errors reported by target thread 480421518a2SFrankie.Chang * (protected by @proc->inner_lock) 481421518a2SFrankie.Chang * @wait: wait queue for thread work 482421518a2SFrankie.Chang * @stats: per-thread statistics 483421518a2SFrankie.Chang * (atomics, no lock needed) 484421518a2SFrankie.Chang * @tmp_ref: temporary reference to indicate thread is in use 485421518a2SFrankie.Chang * (atomic since @proc->inner_lock cannot 486421518a2SFrankie.Chang * always be acquired) 487421518a2SFrankie.Chang * @is_dead: thread is dead and awaiting free 488421518a2SFrankie.Chang * when outstanding transactions are cleaned up 489421518a2SFrankie.Chang * (protected by @proc->inner_lock) 490421518a2SFrankie.Chang * 491421518a2SFrankie.Chang * Bookkeeping structure for binder threads. 492421518a2SFrankie.Chang */ 493421518a2SFrankie.Chang struct binder_thread { 494421518a2SFrankie.Chang struct binder_proc *proc; 495421518a2SFrankie.Chang struct rb_node rb_node; 496421518a2SFrankie.Chang struct list_head waiting_thread_node; 497421518a2SFrankie.Chang int pid; 498421518a2SFrankie.Chang int looper; /* only modified by this thread */ 499421518a2SFrankie.Chang bool looper_need_return; /* can be written by other thread */ 500421518a2SFrankie.Chang struct binder_transaction *transaction_stack; 501421518a2SFrankie.Chang struct list_head todo; 502421518a2SFrankie.Chang bool process_todo; 503421518a2SFrankie.Chang struct binder_error return_error; 504421518a2SFrankie.Chang struct binder_error reply_error; 505421518a2SFrankie.Chang wait_queue_head_t wait; 506421518a2SFrankie.Chang struct binder_stats stats; 507421518a2SFrankie.Chang atomic_t tmp_ref; 508421518a2SFrankie.Chang bool is_dead; 509421518a2SFrankie.Chang }; 510421518a2SFrankie.Chang 511421518a2SFrankie.Chang /** 512421518a2SFrankie.Chang * struct binder_txn_fd_fixup - transaction fd fixup list element 513421518a2SFrankie.Chang * @fixup_entry: list entry 514421518a2SFrankie.Chang * @file: struct file to be associated with new fd 515421518a2SFrankie.Chang * @offset: offset in buffer data to this fixup 516421518a2SFrankie.Chang * 517421518a2SFrankie.Chang * List element for fd fixups in a transaction. Since file 518421518a2SFrankie.Chang * descriptors need to be allocated in the context of the 519421518a2SFrankie.Chang * target process, we pass each fd to be processed in this 520421518a2SFrankie.Chang * struct. 521421518a2SFrankie.Chang */ 522421518a2SFrankie.Chang struct binder_txn_fd_fixup { 523421518a2SFrankie.Chang struct list_head fixup_entry; 524421518a2SFrankie.Chang struct file *file; 525421518a2SFrankie.Chang size_t offset; 526421518a2SFrankie.Chang }; 527421518a2SFrankie.Chang 528421518a2SFrankie.Chang struct binder_transaction { 529421518a2SFrankie.Chang int debug_id; 530421518a2SFrankie.Chang struct binder_work work; 531421518a2SFrankie.Chang struct binder_thread *from; 532421518a2SFrankie.Chang struct binder_transaction *from_parent; 533421518a2SFrankie.Chang struct binder_proc *to_proc; 534421518a2SFrankie.Chang struct binder_thread *to_thread; 535421518a2SFrankie.Chang struct binder_transaction *to_parent; 536421518a2SFrankie.Chang unsigned need_reply:1; 537421518a2SFrankie.Chang /* unsigned is_dead:1; */ /* not used at the moment */ 538421518a2SFrankie.Chang 539421518a2SFrankie.Chang struct binder_buffer *buffer; 540421518a2SFrankie.Chang unsigned int code; 541421518a2SFrankie.Chang unsigned int flags; 542421518a2SFrankie.Chang long priority; 543421518a2SFrankie.Chang long saved_priority; 544421518a2SFrankie.Chang kuid_t sender_euid; 545421518a2SFrankie.Chang struct list_head fd_fixups; 546421518a2SFrankie.Chang binder_uintptr_t security_ctx; 547421518a2SFrankie.Chang /** 548421518a2SFrankie.Chang * @lock: protects @from, @to_proc, and @to_thread 549421518a2SFrankie.Chang * 550421518a2SFrankie.Chang * @from, @to_proc, and @to_thread can be set to NULL 551421518a2SFrankie.Chang * during thread teardown 552421518a2SFrankie.Chang */ 553421518a2SFrankie.Chang spinlock_t lock; 554421518a2SFrankie.Chang }; 555421518a2SFrankie.Chang 556421518a2SFrankie.Chang /** 557421518a2SFrankie.Chang * struct binder_object - union of flat binder object types 558421518a2SFrankie.Chang * @hdr: generic object header 559421518a2SFrankie.Chang * @fbo: binder object (nodes and refs) 560421518a2SFrankie.Chang * @fdo: file descriptor object 561421518a2SFrankie.Chang * @bbo: binder buffer pointer 562421518a2SFrankie.Chang * @fdao: file descriptor array 563421518a2SFrankie.Chang * 564421518a2SFrankie.Chang * Used for type-independent object copies 565421518a2SFrankie.Chang */ 566421518a2SFrankie.Chang struct binder_object { 567421518a2SFrankie.Chang union { 568421518a2SFrankie.Chang struct binder_object_header hdr; 569421518a2SFrankie.Chang struct flat_binder_object fbo; 570421518a2SFrankie.Chang struct binder_fd_object fdo; 571421518a2SFrankie.Chang struct binder_buffer_object bbo; 572421518a2SFrankie.Chang struct binder_fd_array_object fdao; 573421518a2SFrankie.Chang }; 574421518a2SFrankie.Chang }; 575421518a2SFrankie.Chang 57603e2e07eSHridya Valsaraju extern struct binder_transaction_log binder_transaction_log; 57703e2e07eSHridya Valsaraju extern struct binder_transaction_log binder_transaction_log_failed; 5783ad20fe3SChristian Brauner #endif /* _LINUX_BINDER_INTERNAL_H */ 579