13ad20fe3SChristian Brauner /* SPDX-License-Identifier: GPL-2.0 */ 23ad20fe3SChristian Brauner 33ad20fe3SChristian Brauner #ifndef _LINUX_BINDER_INTERNAL_H 43ad20fe3SChristian Brauner #define _LINUX_BINDER_INTERNAL_H 53ad20fe3SChristian Brauner 63ad20fe3SChristian Brauner #include <linux/export.h> 73ad20fe3SChristian Brauner #include <linux/fs.h> 83ad20fe3SChristian Brauner #include <linux/list.h> 93ad20fe3SChristian Brauner #include <linux/miscdevice.h> 103ad20fe3SChristian Brauner #include <linux/mutex.h> 11f0fe2c0fSChristian Brauner #include <linux/refcount.h> 123ad20fe3SChristian Brauner #include <linux/stddef.h> 133ad20fe3SChristian Brauner #include <linux/types.h> 143ad20fe3SChristian Brauner #include <linux/uidgid.h> 15*421518a2SFrankie.Chang #include <uapi/linux/android/binderfs.h> 16*421518a2SFrankie.Chang #include "binder_alloc.h" 173ad20fe3SChristian Brauner 183ad20fe3SChristian Brauner struct binder_context { 193ad20fe3SChristian Brauner struct binder_node *binder_context_mgr_node; 203ad20fe3SChristian Brauner struct mutex context_mgr_node_lock; 213ad20fe3SChristian Brauner kuid_t binder_context_mgr_uid; 223ad20fe3SChristian Brauner const char *name; 233ad20fe3SChristian Brauner }; 243ad20fe3SChristian Brauner 253ad20fe3SChristian Brauner /** 263ad20fe3SChristian Brauner * struct binder_device - information about a binder device node 273ad20fe3SChristian Brauner * @hlist: list of binder devices (only used for devices requested via 283ad20fe3SChristian Brauner * CONFIG_ANDROID_BINDER_DEVICES) 293ad20fe3SChristian Brauner * @miscdev: information about a binder character device node 303ad20fe3SChristian Brauner * @context: binder context information 313ad20fe3SChristian Brauner * @binderfs_inode: This is the inode of the root dentry of the super block 323ad20fe3SChristian Brauner * belonging to a binderfs mount. 333ad20fe3SChristian Brauner */ 343ad20fe3SChristian Brauner struct binder_device { 353ad20fe3SChristian Brauner struct hlist_node hlist; 363ad20fe3SChristian Brauner struct miscdevice miscdev; 373ad20fe3SChristian Brauner struct binder_context context; 383ad20fe3SChristian Brauner struct inode *binderfs_inode; 39f0fe2c0fSChristian Brauner refcount_t ref; 403ad20fe3SChristian Brauner }; 413ad20fe3SChristian Brauner 424feb80faSHridya Valsaraju /** 434feb80faSHridya Valsaraju * binderfs_mount_opts - mount options for binderfs 444feb80faSHridya Valsaraju * @max: maximum number of allocatable binderfs binder devices 454feb80faSHridya Valsaraju * @stats_mode: enable binder stats in binderfs. 464feb80faSHridya Valsaraju */ 474feb80faSHridya Valsaraju struct binderfs_mount_opts { 484feb80faSHridya Valsaraju int max; 494feb80faSHridya Valsaraju int stats_mode; 504feb80faSHridya Valsaraju }; 514feb80faSHridya Valsaraju 524feb80faSHridya Valsaraju /** 534feb80faSHridya Valsaraju * binderfs_info - information about a binderfs mount 544feb80faSHridya Valsaraju * @ipc_ns: The ipc namespace the binderfs mount belongs to. 554feb80faSHridya Valsaraju * @control_dentry: This records the dentry of this binderfs mount 564feb80faSHridya Valsaraju * binder-control device. 574feb80faSHridya Valsaraju * @root_uid: uid that needs to be used when a new binder device is 584feb80faSHridya Valsaraju * created. 594feb80faSHridya Valsaraju * @root_gid: gid that needs to be used when a new binder device is 604feb80faSHridya Valsaraju * created. 614feb80faSHridya Valsaraju * @mount_opts: The mount options in use. 624feb80faSHridya Valsaraju * @device_count: The current number of allocated binder devices. 634feb80faSHridya Valsaraju * @proc_log_dir: Pointer to the directory dentry containing process-specific 644feb80faSHridya Valsaraju * logs. 654feb80faSHridya Valsaraju */ 664feb80faSHridya Valsaraju struct binderfs_info { 674feb80faSHridya Valsaraju struct ipc_namespace *ipc_ns; 684feb80faSHridya Valsaraju struct dentry *control_dentry; 694feb80faSHridya Valsaraju kuid_t root_uid; 704feb80faSHridya Valsaraju kgid_t root_gid; 714feb80faSHridya Valsaraju struct binderfs_mount_opts mount_opts; 724feb80faSHridya Valsaraju int device_count; 734feb80faSHridya Valsaraju struct dentry *proc_log_dir; 744feb80faSHridya Valsaraju }; 754feb80faSHridya Valsaraju 763ad20fe3SChristian Brauner extern const struct file_operations binder_fops; 773ad20fe3SChristian Brauner 78ca2864c6SHridya Valsaraju extern char *binder_devices_param; 79ca2864c6SHridya Valsaraju 803ad20fe3SChristian Brauner #ifdef CONFIG_ANDROID_BINDERFS 813ad20fe3SChristian Brauner extern bool is_binderfs_device(const struct inode *inode); 824feb80faSHridya Valsaraju extern struct dentry *binderfs_create_file(struct dentry *dir, const char *name, 834feb80faSHridya Valsaraju const struct file_operations *fops, 844feb80faSHridya Valsaraju void *data); 854feb80faSHridya Valsaraju extern void binderfs_remove_file(struct dentry *dentry); 863ad20fe3SChristian Brauner #else 873ad20fe3SChristian Brauner static inline bool is_binderfs_device(const struct inode *inode) 883ad20fe3SChristian Brauner { 893ad20fe3SChristian Brauner return false; 903ad20fe3SChristian Brauner } 914feb80faSHridya Valsaraju static inline struct dentry *binderfs_create_file(struct dentry *dir, 924feb80faSHridya Valsaraju const char *name, 934feb80faSHridya Valsaraju const struct file_operations *fops, 944feb80faSHridya Valsaraju void *data) 954feb80faSHridya Valsaraju { 964feb80faSHridya Valsaraju return NULL; 974feb80faSHridya Valsaraju } 984feb80faSHridya Valsaraju static inline void binderfs_remove_file(struct dentry *dentry) {} 993ad20fe3SChristian Brauner #endif 1003ad20fe3SChristian Brauner 1015b9633afSChristian Brauner #ifdef CONFIG_ANDROID_BINDERFS 1025b9633afSChristian Brauner extern int __init init_binderfs(void); 1035b9633afSChristian Brauner #else 1045b9633afSChristian Brauner static inline int __init init_binderfs(void) 1055b9633afSChristian Brauner { 1065b9633afSChristian Brauner return 0; 1075b9633afSChristian Brauner } 1085b9633afSChristian Brauner #endif 1095b9633afSChristian Brauner 1100e13e452SHridya Valsaraju int binder_stats_show(struct seq_file *m, void *unused); 1110e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_stats); 1120e13e452SHridya Valsaraju 1130e13e452SHridya Valsaraju int binder_state_show(struct seq_file *m, void *unused); 1140e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_state); 1150e13e452SHridya Valsaraju 1160e13e452SHridya Valsaraju int binder_transactions_show(struct seq_file *m, void *unused); 1170e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_transactions); 11803e2e07eSHridya Valsaraju 11903e2e07eSHridya Valsaraju int binder_transaction_log_show(struct seq_file *m, void *unused); 12003e2e07eSHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_transaction_log); 12103e2e07eSHridya Valsaraju 12203e2e07eSHridya Valsaraju struct binder_transaction_log_entry { 12303e2e07eSHridya Valsaraju int debug_id; 12403e2e07eSHridya Valsaraju int debug_id_done; 12503e2e07eSHridya Valsaraju int call_type; 12603e2e07eSHridya Valsaraju int from_proc; 12703e2e07eSHridya Valsaraju int from_thread; 12803e2e07eSHridya Valsaraju int target_handle; 12903e2e07eSHridya Valsaraju int to_proc; 13003e2e07eSHridya Valsaraju int to_thread; 13103e2e07eSHridya Valsaraju int to_node; 13203e2e07eSHridya Valsaraju int data_size; 13303e2e07eSHridya Valsaraju int offsets_size; 13403e2e07eSHridya Valsaraju int return_error_line; 13503e2e07eSHridya Valsaraju uint32_t return_error; 13603e2e07eSHridya Valsaraju uint32_t return_error_param; 13751d8a7ecSChristian Brauner char context_name[BINDERFS_MAX_NAME + 1]; 13803e2e07eSHridya Valsaraju }; 13903e2e07eSHridya Valsaraju 14003e2e07eSHridya Valsaraju struct binder_transaction_log { 14103e2e07eSHridya Valsaraju atomic_t cur; 14203e2e07eSHridya Valsaraju bool full; 14303e2e07eSHridya Valsaraju struct binder_transaction_log_entry entry[32]; 14403e2e07eSHridya Valsaraju }; 14503e2e07eSHridya Valsaraju 146*421518a2SFrankie.Chang enum binder_stat_types { 147*421518a2SFrankie.Chang BINDER_STAT_PROC, 148*421518a2SFrankie.Chang BINDER_STAT_THREAD, 149*421518a2SFrankie.Chang BINDER_STAT_NODE, 150*421518a2SFrankie.Chang BINDER_STAT_REF, 151*421518a2SFrankie.Chang BINDER_STAT_DEATH, 152*421518a2SFrankie.Chang BINDER_STAT_TRANSACTION, 153*421518a2SFrankie.Chang BINDER_STAT_TRANSACTION_COMPLETE, 154*421518a2SFrankie.Chang BINDER_STAT_COUNT 155*421518a2SFrankie.Chang }; 156*421518a2SFrankie.Chang 157*421518a2SFrankie.Chang struct binder_stats { 158*421518a2SFrankie.Chang atomic_t br[_IOC_NR(BR_FAILED_REPLY) + 1]; 159*421518a2SFrankie.Chang atomic_t bc[_IOC_NR(BC_REPLY_SG) + 1]; 160*421518a2SFrankie.Chang atomic_t obj_created[BINDER_STAT_COUNT]; 161*421518a2SFrankie.Chang atomic_t obj_deleted[BINDER_STAT_COUNT]; 162*421518a2SFrankie.Chang }; 163*421518a2SFrankie.Chang 164*421518a2SFrankie.Chang /** 165*421518a2SFrankie.Chang * struct binder_work - work enqueued on a worklist 166*421518a2SFrankie.Chang * @entry: node enqueued on list 167*421518a2SFrankie.Chang * @type: type of work to be performed 168*421518a2SFrankie.Chang * 169*421518a2SFrankie.Chang * There are separate work lists for proc, thread, and node (async). 170*421518a2SFrankie.Chang */ 171*421518a2SFrankie.Chang struct binder_work { 172*421518a2SFrankie.Chang struct list_head entry; 173*421518a2SFrankie.Chang 174*421518a2SFrankie.Chang enum binder_work_type { 175*421518a2SFrankie.Chang BINDER_WORK_TRANSACTION = 1, 176*421518a2SFrankie.Chang BINDER_WORK_TRANSACTION_COMPLETE, 177*421518a2SFrankie.Chang BINDER_WORK_RETURN_ERROR, 178*421518a2SFrankie.Chang BINDER_WORK_NODE, 179*421518a2SFrankie.Chang BINDER_WORK_DEAD_BINDER, 180*421518a2SFrankie.Chang BINDER_WORK_DEAD_BINDER_AND_CLEAR, 181*421518a2SFrankie.Chang BINDER_WORK_CLEAR_DEATH_NOTIFICATION, 182*421518a2SFrankie.Chang } type; 183*421518a2SFrankie.Chang }; 184*421518a2SFrankie.Chang 185*421518a2SFrankie.Chang struct binder_error { 186*421518a2SFrankie.Chang struct binder_work work; 187*421518a2SFrankie.Chang uint32_t cmd; 188*421518a2SFrankie.Chang }; 189*421518a2SFrankie.Chang 190*421518a2SFrankie.Chang /** 191*421518a2SFrankie.Chang * struct binder_node - binder node bookkeeping 192*421518a2SFrankie.Chang * @debug_id: unique ID for debugging 193*421518a2SFrankie.Chang * (invariant after initialized) 194*421518a2SFrankie.Chang * @lock: lock for node fields 195*421518a2SFrankie.Chang * @work: worklist element for node work 196*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 197*421518a2SFrankie.Chang * @rb_node: element for proc->nodes tree 198*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 199*421518a2SFrankie.Chang * @dead_node: element for binder_dead_nodes list 200*421518a2SFrankie.Chang * (protected by binder_dead_nodes_lock) 201*421518a2SFrankie.Chang * @proc: binder_proc that owns this node 202*421518a2SFrankie.Chang * (invariant after initialized) 203*421518a2SFrankie.Chang * @refs: list of references on this node 204*421518a2SFrankie.Chang * (protected by @lock) 205*421518a2SFrankie.Chang * @internal_strong_refs: used to take strong references when 206*421518a2SFrankie.Chang * initiating a transaction 207*421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 208*421518a2SFrankie.Chang * and by @lock) 209*421518a2SFrankie.Chang * @local_weak_refs: weak user refs from local process 210*421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 211*421518a2SFrankie.Chang * and by @lock) 212*421518a2SFrankie.Chang * @local_strong_refs: strong user refs from local process 213*421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 214*421518a2SFrankie.Chang * and by @lock) 215*421518a2SFrankie.Chang * @tmp_refs: temporary kernel refs 216*421518a2SFrankie.Chang * (protected by @proc->inner_lock while @proc 217*421518a2SFrankie.Chang * is valid, and by binder_dead_nodes_lock 218*421518a2SFrankie.Chang * if @proc is NULL. During inc/dec and node release 219*421518a2SFrankie.Chang * it is also protected by @lock to provide safety 220*421518a2SFrankie.Chang * as the node dies and @proc becomes NULL) 221*421518a2SFrankie.Chang * @ptr: userspace pointer for node 222*421518a2SFrankie.Chang * (invariant, no lock needed) 223*421518a2SFrankie.Chang * @cookie: userspace cookie for node 224*421518a2SFrankie.Chang * (invariant, no lock needed) 225*421518a2SFrankie.Chang * @has_strong_ref: userspace notified of strong ref 226*421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 227*421518a2SFrankie.Chang * and by @lock) 228*421518a2SFrankie.Chang * @pending_strong_ref: userspace has acked notification of strong ref 229*421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 230*421518a2SFrankie.Chang * and by @lock) 231*421518a2SFrankie.Chang * @has_weak_ref: userspace notified of weak ref 232*421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 233*421518a2SFrankie.Chang * and by @lock) 234*421518a2SFrankie.Chang * @pending_weak_ref: userspace has acked notification of weak ref 235*421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 236*421518a2SFrankie.Chang * and by @lock) 237*421518a2SFrankie.Chang * @has_async_transaction: async transaction to node in progress 238*421518a2SFrankie.Chang * (protected by @lock) 239*421518a2SFrankie.Chang * @accept_fds: file descriptor operations supported for node 240*421518a2SFrankie.Chang * (invariant after initialized) 241*421518a2SFrankie.Chang * @min_priority: minimum scheduling priority 242*421518a2SFrankie.Chang * (invariant after initialized) 243*421518a2SFrankie.Chang * @txn_security_ctx: require sender's security context 244*421518a2SFrankie.Chang * (invariant after initialized) 245*421518a2SFrankie.Chang * @async_todo: list of async work items 246*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 247*421518a2SFrankie.Chang * 248*421518a2SFrankie.Chang * Bookkeeping structure for binder nodes. 249*421518a2SFrankie.Chang */ 250*421518a2SFrankie.Chang struct binder_node { 251*421518a2SFrankie.Chang int debug_id; 252*421518a2SFrankie.Chang spinlock_t lock; 253*421518a2SFrankie.Chang struct binder_work work; 254*421518a2SFrankie.Chang union { 255*421518a2SFrankie.Chang struct rb_node rb_node; 256*421518a2SFrankie.Chang struct hlist_node dead_node; 257*421518a2SFrankie.Chang }; 258*421518a2SFrankie.Chang struct binder_proc *proc; 259*421518a2SFrankie.Chang struct hlist_head refs; 260*421518a2SFrankie.Chang int internal_strong_refs; 261*421518a2SFrankie.Chang int local_weak_refs; 262*421518a2SFrankie.Chang int local_strong_refs; 263*421518a2SFrankie.Chang int tmp_refs; 264*421518a2SFrankie.Chang binder_uintptr_t ptr; 265*421518a2SFrankie.Chang binder_uintptr_t cookie; 266*421518a2SFrankie.Chang struct { 267*421518a2SFrankie.Chang /* 268*421518a2SFrankie.Chang * bitfield elements protected by 269*421518a2SFrankie.Chang * proc inner_lock 270*421518a2SFrankie.Chang */ 271*421518a2SFrankie.Chang u8 has_strong_ref:1; 272*421518a2SFrankie.Chang u8 pending_strong_ref:1; 273*421518a2SFrankie.Chang u8 has_weak_ref:1; 274*421518a2SFrankie.Chang u8 pending_weak_ref:1; 275*421518a2SFrankie.Chang }; 276*421518a2SFrankie.Chang struct { 277*421518a2SFrankie.Chang /* 278*421518a2SFrankie.Chang * invariant after initialization 279*421518a2SFrankie.Chang */ 280*421518a2SFrankie.Chang u8 accept_fds:1; 281*421518a2SFrankie.Chang u8 txn_security_ctx:1; 282*421518a2SFrankie.Chang u8 min_priority; 283*421518a2SFrankie.Chang }; 284*421518a2SFrankie.Chang bool has_async_transaction; 285*421518a2SFrankie.Chang struct list_head async_todo; 286*421518a2SFrankie.Chang }; 287*421518a2SFrankie.Chang 288*421518a2SFrankie.Chang struct binder_ref_death { 289*421518a2SFrankie.Chang /** 290*421518a2SFrankie.Chang * @work: worklist element for death notifications 291*421518a2SFrankie.Chang * (protected by inner_lock of the proc that 292*421518a2SFrankie.Chang * this ref belongs to) 293*421518a2SFrankie.Chang */ 294*421518a2SFrankie.Chang struct binder_work work; 295*421518a2SFrankie.Chang binder_uintptr_t cookie; 296*421518a2SFrankie.Chang }; 297*421518a2SFrankie.Chang 298*421518a2SFrankie.Chang /** 299*421518a2SFrankie.Chang * struct binder_ref_data - binder_ref counts and id 300*421518a2SFrankie.Chang * @debug_id: unique ID for the ref 301*421518a2SFrankie.Chang * @desc: unique userspace handle for ref 302*421518a2SFrankie.Chang * @strong: strong ref count (debugging only if not locked) 303*421518a2SFrankie.Chang * @weak: weak ref count (debugging only if not locked) 304*421518a2SFrankie.Chang * 305*421518a2SFrankie.Chang * Structure to hold ref count and ref id information. Since 306*421518a2SFrankie.Chang * the actual ref can only be accessed with a lock, this structure 307*421518a2SFrankie.Chang * is used to return information about the ref to callers of 308*421518a2SFrankie.Chang * ref inc/dec functions. 309*421518a2SFrankie.Chang */ 310*421518a2SFrankie.Chang struct binder_ref_data { 311*421518a2SFrankie.Chang int debug_id; 312*421518a2SFrankie.Chang uint32_t desc; 313*421518a2SFrankie.Chang int strong; 314*421518a2SFrankie.Chang int weak; 315*421518a2SFrankie.Chang }; 316*421518a2SFrankie.Chang 317*421518a2SFrankie.Chang /** 318*421518a2SFrankie.Chang * struct binder_ref - struct to track references on nodes 319*421518a2SFrankie.Chang * @data: binder_ref_data containing id, handle, and current refcounts 320*421518a2SFrankie.Chang * @rb_node_desc: node for lookup by @data.desc in proc's rb_tree 321*421518a2SFrankie.Chang * @rb_node_node: node for lookup by @node in proc's rb_tree 322*421518a2SFrankie.Chang * @node_entry: list entry for node->refs list in target node 323*421518a2SFrankie.Chang * (protected by @node->lock) 324*421518a2SFrankie.Chang * @proc: binder_proc containing ref 325*421518a2SFrankie.Chang * @node: binder_node of target node. When cleaning up a 326*421518a2SFrankie.Chang * ref for deletion in binder_cleanup_ref, a non-NULL 327*421518a2SFrankie.Chang * @node indicates the node must be freed 328*421518a2SFrankie.Chang * @death: pointer to death notification (ref_death) if requested 329*421518a2SFrankie.Chang * (protected by @node->lock) 330*421518a2SFrankie.Chang * 331*421518a2SFrankie.Chang * Structure to track references from procA to target node (on procB). This 332*421518a2SFrankie.Chang * structure is unsafe to access without holding @proc->outer_lock. 333*421518a2SFrankie.Chang */ 334*421518a2SFrankie.Chang struct binder_ref { 335*421518a2SFrankie.Chang /* Lookups needed: */ 336*421518a2SFrankie.Chang /* node + proc => ref (transaction) */ 337*421518a2SFrankie.Chang /* desc + proc => ref (transaction, inc/dec ref) */ 338*421518a2SFrankie.Chang /* node => refs + procs (proc exit) */ 339*421518a2SFrankie.Chang struct binder_ref_data data; 340*421518a2SFrankie.Chang struct rb_node rb_node_desc; 341*421518a2SFrankie.Chang struct rb_node rb_node_node; 342*421518a2SFrankie.Chang struct hlist_node node_entry; 343*421518a2SFrankie.Chang struct binder_proc *proc; 344*421518a2SFrankie.Chang struct binder_node *node; 345*421518a2SFrankie.Chang struct binder_ref_death *death; 346*421518a2SFrankie.Chang }; 347*421518a2SFrankie.Chang 348*421518a2SFrankie.Chang /** 349*421518a2SFrankie.Chang * struct binder_proc - binder process bookkeeping 350*421518a2SFrankie.Chang * @proc_node: element for binder_procs list 351*421518a2SFrankie.Chang * @threads: rbtree of binder_threads in this proc 352*421518a2SFrankie.Chang * (protected by @inner_lock) 353*421518a2SFrankie.Chang * @nodes: rbtree of binder nodes associated with 354*421518a2SFrankie.Chang * this proc ordered by node->ptr 355*421518a2SFrankie.Chang * (protected by @inner_lock) 356*421518a2SFrankie.Chang * @refs_by_desc: rbtree of refs ordered by ref->desc 357*421518a2SFrankie.Chang * (protected by @outer_lock) 358*421518a2SFrankie.Chang * @refs_by_node: rbtree of refs ordered by ref->node 359*421518a2SFrankie.Chang * (protected by @outer_lock) 360*421518a2SFrankie.Chang * @waiting_threads: threads currently waiting for proc work 361*421518a2SFrankie.Chang * (protected by @inner_lock) 362*421518a2SFrankie.Chang * @pid PID of group_leader of process 363*421518a2SFrankie.Chang * (invariant after initialized) 364*421518a2SFrankie.Chang * @tsk task_struct for group_leader of process 365*421518a2SFrankie.Chang * (invariant after initialized) 366*421518a2SFrankie.Chang * @deferred_work_node: element for binder_deferred_list 367*421518a2SFrankie.Chang * (protected by binder_deferred_lock) 368*421518a2SFrankie.Chang * @deferred_work: bitmap of deferred work to perform 369*421518a2SFrankie.Chang * (protected by binder_deferred_lock) 370*421518a2SFrankie.Chang * @is_dead: process is dead and awaiting free 371*421518a2SFrankie.Chang * when outstanding transactions are cleaned up 372*421518a2SFrankie.Chang * (protected by @inner_lock) 373*421518a2SFrankie.Chang * @todo: list of work for this process 374*421518a2SFrankie.Chang * (protected by @inner_lock) 375*421518a2SFrankie.Chang * @stats: per-process binder statistics 376*421518a2SFrankie.Chang * (atomics, no lock needed) 377*421518a2SFrankie.Chang * @delivered_death: list of delivered death notification 378*421518a2SFrankie.Chang * (protected by @inner_lock) 379*421518a2SFrankie.Chang * @max_threads: cap on number of binder threads 380*421518a2SFrankie.Chang * (protected by @inner_lock) 381*421518a2SFrankie.Chang * @requested_threads: number of binder threads requested but not 382*421518a2SFrankie.Chang * yet started. In current implementation, can 383*421518a2SFrankie.Chang * only be 0 or 1. 384*421518a2SFrankie.Chang * (protected by @inner_lock) 385*421518a2SFrankie.Chang * @requested_threads_started: number binder threads started 386*421518a2SFrankie.Chang * (protected by @inner_lock) 387*421518a2SFrankie.Chang * @tmp_ref: temporary reference to indicate proc is in use 388*421518a2SFrankie.Chang * (protected by @inner_lock) 389*421518a2SFrankie.Chang * @default_priority: default scheduler priority 390*421518a2SFrankie.Chang * (invariant after initialized) 391*421518a2SFrankie.Chang * @debugfs_entry: debugfs node 392*421518a2SFrankie.Chang * @alloc: binder allocator bookkeeping 393*421518a2SFrankie.Chang * @context: binder_context for this proc 394*421518a2SFrankie.Chang * (invariant after initialized) 395*421518a2SFrankie.Chang * @inner_lock: can nest under outer_lock and/or node lock 396*421518a2SFrankie.Chang * @outer_lock: no nesting under innor or node lock 397*421518a2SFrankie.Chang * Lock order: 1) outer, 2) node, 3) inner 398*421518a2SFrankie.Chang * @binderfs_entry: process-specific binderfs log file 399*421518a2SFrankie.Chang * 400*421518a2SFrankie.Chang * Bookkeeping structure for binder processes 401*421518a2SFrankie.Chang */ 402*421518a2SFrankie.Chang struct binder_proc { 403*421518a2SFrankie.Chang struct hlist_node proc_node; 404*421518a2SFrankie.Chang struct rb_root threads; 405*421518a2SFrankie.Chang struct rb_root nodes; 406*421518a2SFrankie.Chang struct rb_root refs_by_desc; 407*421518a2SFrankie.Chang struct rb_root refs_by_node; 408*421518a2SFrankie.Chang struct list_head waiting_threads; 409*421518a2SFrankie.Chang int pid; 410*421518a2SFrankie.Chang struct task_struct *tsk; 411*421518a2SFrankie.Chang struct hlist_node deferred_work_node; 412*421518a2SFrankie.Chang int deferred_work; 413*421518a2SFrankie.Chang bool is_dead; 414*421518a2SFrankie.Chang 415*421518a2SFrankie.Chang struct list_head todo; 416*421518a2SFrankie.Chang struct binder_stats stats; 417*421518a2SFrankie.Chang struct list_head delivered_death; 418*421518a2SFrankie.Chang int max_threads; 419*421518a2SFrankie.Chang int requested_threads; 420*421518a2SFrankie.Chang int requested_threads_started; 421*421518a2SFrankie.Chang int tmp_ref; 422*421518a2SFrankie.Chang long default_priority; 423*421518a2SFrankie.Chang struct dentry *debugfs_entry; 424*421518a2SFrankie.Chang struct binder_alloc alloc; 425*421518a2SFrankie.Chang struct binder_context *context; 426*421518a2SFrankie.Chang spinlock_t inner_lock; 427*421518a2SFrankie.Chang spinlock_t outer_lock; 428*421518a2SFrankie.Chang struct dentry *binderfs_entry; 429*421518a2SFrankie.Chang }; 430*421518a2SFrankie.Chang 431*421518a2SFrankie.Chang /** 432*421518a2SFrankie.Chang * struct binder_thread - binder thread bookkeeping 433*421518a2SFrankie.Chang * @proc: binder process for this thread 434*421518a2SFrankie.Chang * (invariant after initialization) 435*421518a2SFrankie.Chang * @rb_node: element for proc->threads rbtree 436*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 437*421518a2SFrankie.Chang * @waiting_thread_node: element for @proc->waiting_threads list 438*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 439*421518a2SFrankie.Chang * @pid: PID for this thread 440*421518a2SFrankie.Chang * (invariant after initialization) 441*421518a2SFrankie.Chang * @looper: bitmap of looping state 442*421518a2SFrankie.Chang * (only accessed by this thread) 443*421518a2SFrankie.Chang * @looper_needs_return: looping thread needs to exit driver 444*421518a2SFrankie.Chang * (no lock needed) 445*421518a2SFrankie.Chang * @transaction_stack: stack of in-progress transactions for this thread 446*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 447*421518a2SFrankie.Chang * @todo: list of work to do for this thread 448*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 449*421518a2SFrankie.Chang * @process_todo: whether work in @todo should be processed 450*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 451*421518a2SFrankie.Chang * @return_error: transaction errors reported by this thread 452*421518a2SFrankie.Chang * (only accessed by this thread) 453*421518a2SFrankie.Chang * @reply_error: transaction errors reported by target thread 454*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 455*421518a2SFrankie.Chang * @wait: wait queue for thread work 456*421518a2SFrankie.Chang * @stats: per-thread statistics 457*421518a2SFrankie.Chang * (atomics, no lock needed) 458*421518a2SFrankie.Chang * @tmp_ref: temporary reference to indicate thread is in use 459*421518a2SFrankie.Chang * (atomic since @proc->inner_lock cannot 460*421518a2SFrankie.Chang * always be acquired) 461*421518a2SFrankie.Chang * @is_dead: thread is dead and awaiting free 462*421518a2SFrankie.Chang * when outstanding transactions are cleaned up 463*421518a2SFrankie.Chang * (protected by @proc->inner_lock) 464*421518a2SFrankie.Chang * 465*421518a2SFrankie.Chang * Bookkeeping structure for binder threads. 466*421518a2SFrankie.Chang */ 467*421518a2SFrankie.Chang struct binder_thread { 468*421518a2SFrankie.Chang struct binder_proc *proc; 469*421518a2SFrankie.Chang struct rb_node rb_node; 470*421518a2SFrankie.Chang struct list_head waiting_thread_node; 471*421518a2SFrankie.Chang int pid; 472*421518a2SFrankie.Chang int looper; /* only modified by this thread */ 473*421518a2SFrankie.Chang bool looper_need_return; /* can be written by other thread */ 474*421518a2SFrankie.Chang struct binder_transaction *transaction_stack; 475*421518a2SFrankie.Chang struct list_head todo; 476*421518a2SFrankie.Chang bool process_todo; 477*421518a2SFrankie.Chang struct binder_error return_error; 478*421518a2SFrankie.Chang struct binder_error reply_error; 479*421518a2SFrankie.Chang wait_queue_head_t wait; 480*421518a2SFrankie.Chang struct binder_stats stats; 481*421518a2SFrankie.Chang atomic_t tmp_ref; 482*421518a2SFrankie.Chang bool is_dead; 483*421518a2SFrankie.Chang }; 484*421518a2SFrankie.Chang 485*421518a2SFrankie.Chang /** 486*421518a2SFrankie.Chang * struct binder_txn_fd_fixup - transaction fd fixup list element 487*421518a2SFrankie.Chang * @fixup_entry: list entry 488*421518a2SFrankie.Chang * @file: struct file to be associated with new fd 489*421518a2SFrankie.Chang * @offset: offset in buffer data to this fixup 490*421518a2SFrankie.Chang * 491*421518a2SFrankie.Chang * List element for fd fixups in a transaction. Since file 492*421518a2SFrankie.Chang * descriptors need to be allocated in the context of the 493*421518a2SFrankie.Chang * target process, we pass each fd to be processed in this 494*421518a2SFrankie.Chang * struct. 495*421518a2SFrankie.Chang */ 496*421518a2SFrankie.Chang struct binder_txn_fd_fixup { 497*421518a2SFrankie.Chang struct list_head fixup_entry; 498*421518a2SFrankie.Chang struct file *file; 499*421518a2SFrankie.Chang size_t offset; 500*421518a2SFrankie.Chang }; 501*421518a2SFrankie.Chang 502*421518a2SFrankie.Chang struct binder_transaction { 503*421518a2SFrankie.Chang int debug_id; 504*421518a2SFrankie.Chang struct binder_work work; 505*421518a2SFrankie.Chang struct binder_thread *from; 506*421518a2SFrankie.Chang struct binder_transaction *from_parent; 507*421518a2SFrankie.Chang struct binder_proc *to_proc; 508*421518a2SFrankie.Chang struct binder_thread *to_thread; 509*421518a2SFrankie.Chang struct binder_transaction *to_parent; 510*421518a2SFrankie.Chang unsigned need_reply:1; 511*421518a2SFrankie.Chang /* unsigned is_dead:1; */ /* not used at the moment */ 512*421518a2SFrankie.Chang 513*421518a2SFrankie.Chang struct binder_buffer *buffer; 514*421518a2SFrankie.Chang unsigned int code; 515*421518a2SFrankie.Chang unsigned int flags; 516*421518a2SFrankie.Chang long priority; 517*421518a2SFrankie.Chang long saved_priority; 518*421518a2SFrankie.Chang kuid_t sender_euid; 519*421518a2SFrankie.Chang struct list_head fd_fixups; 520*421518a2SFrankie.Chang binder_uintptr_t security_ctx; 521*421518a2SFrankie.Chang /** 522*421518a2SFrankie.Chang * @lock: protects @from, @to_proc, and @to_thread 523*421518a2SFrankie.Chang * 524*421518a2SFrankie.Chang * @from, @to_proc, and @to_thread can be set to NULL 525*421518a2SFrankie.Chang * during thread teardown 526*421518a2SFrankie.Chang */ 527*421518a2SFrankie.Chang spinlock_t lock; 528*421518a2SFrankie.Chang }; 529*421518a2SFrankie.Chang 530*421518a2SFrankie.Chang /** 531*421518a2SFrankie.Chang * struct binder_object - union of flat binder object types 532*421518a2SFrankie.Chang * @hdr: generic object header 533*421518a2SFrankie.Chang * @fbo: binder object (nodes and refs) 534*421518a2SFrankie.Chang * @fdo: file descriptor object 535*421518a2SFrankie.Chang * @bbo: binder buffer pointer 536*421518a2SFrankie.Chang * @fdao: file descriptor array 537*421518a2SFrankie.Chang * 538*421518a2SFrankie.Chang * Used for type-independent object copies 539*421518a2SFrankie.Chang */ 540*421518a2SFrankie.Chang struct binder_object { 541*421518a2SFrankie.Chang union { 542*421518a2SFrankie.Chang struct binder_object_header hdr; 543*421518a2SFrankie.Chang struct flat_binder_object fbo; 544*421518a2SFrankie.Chang struct binder_fd_object fdo; 545*421518a2SFrankie.Chang struct binder_buffer_object bbo; 546*421518a2SFrankie.Chang struct binder_fd_array_object fdao; 547*421518a2SFrankie.Chang }; 548*421518a2SFrankie.Chang }; 549*421518a2SFrankie.Chang 55003e2e07eSHridya Valsaraju extern struct binder_transaction_log binder_transaction_log; 55103e2e07eSHridya Valsaraju extern struct binder_transaction_log binder_transaction_log_failed; 5523ad20fe3SChristian Brauner #endif /* _LINUX_BINDER_INTERNAL_H */ 553