13ad20fe3SChristian Brauner /* SPDX-License-Identifier: GPL-2.0 */ 23ad20fe3SChristian Brauner 33ad20fe3SChristian Brauner #ifndef _LINUX_BINDER_INTERNAL_H 43ad20fe3SChristian Brauner #define _LINUX_BINDER_INTERNAL_H 53ad20fe3SChristian Brauner 63ad20fe3SChristian Brauner #include <linux/export.h> 73ad20fe3SChristian Brauner #include <linux/fs.h> 83ad20fe3SChristian Brauner #include <linux/list.h> 93ad20fe3SChristian Brauner #include <linux/miscdevice.h> 103ad20fe3SChristian Brauner #include <linux/mutex.h> 11f0fe2c0fSChristian Brauner #include <linux/refcount.h> 123ad20fe3SChristian Brauner #include <linux/stddef.h> 133ad20fe3SChristian Brauner #include <linux/types.h> 143ad20fe3SChristian Brauner #include <linux/uidgid.h> 15421518a2SFrankie.Chang #include <uapi/linux/android/binderfs.h> 16421518a2SFrankie.Chang #include "binder_alloc.h" 173ad20fe3SChristian Brauner 183ad20fe3SChristian Brauner struct binder_context { 193ad20fe3SChristian Brauner struct binder_node *binder_context_mgr_node; 203ad20fe3SChristian Brauner struct mutex context_mgr_node_lock; 213ad20fe3SChristian Brauner kuid_t binder_context_mgr_uid; 223ad20fe3SChristian Brauner const char *name; 233ad20fe3SChristian Brauner }; 243ad20fe3SChristian Brauner 253ad20fe3SChristian Brauner /** 263ad20fe3SChristian Brauner * struct binder_device - information about a binder device node 273ad20fe3SChristian Brauner * @hlist: list of binder devices (only used for devices requested via 283ad20fe3SChristian Brauner * CONFIG_ANDROID_BINDER_DEVICES) 293ad20fe3SChristian Brauner * @miscdev: information about a binder character device node 303ad20fe3SChristian Brauner * @context: binder context information 313ad20fe3SChristian Brauner * @binderfs_inode: This is the inode of the root dentry of the super block 323ad20fe3SChristian Brauner * belonging to a binderfs mount. 333ad20fe3SChristian Brauner */ 343ad20fe3SChristian Brauner struct binder_device { 353ad20fe3SChristian Brauner struct hlist_node hlist; 363ad20fe3SChristian Brauner struct miscdevice miscdev; 373ad20fe3SChristian Brauner struct binder_context context; 383ad20fe3SChristian Brauner struct inode *binderfs_inode; 39f0fe2c0fSChristian Brauner refcount_t ref; 403ad20fe3SChristian Brauner }; 413ad20fe3SChristian Brauner 424feb80faSHridya Valsaraju /** 434feb80faSHridya Valsaraju * binderfs_mount_opts - mount options for binderfs 444feb80faSHridya Valsaraju * @max: maximum number of allocatable binderfs binder devices 454feb80faSHridya Valsaraju * @stats_mode: enable binder stats in binderfs. 464feb80faSHridya Valsaraju */ 474feb80faSHridya Valsaraju struct binderfs_mount_opts { 484feb80faSHridya Valsaraju int max; 494feb80faSHridya Valsaraju int stats_mode; 504feb80faSHridya Valsaraju }; 514feb80faSHridya Valsaraju 524feb80faSHridya Valsaraju /** 534feb80faSHridya Valsaraju * binderfs_info - information about a binderfs mount 544feb80faSHridya Valsaraju * @ipc_ns: The ipc namespace the binderfs mount belongs to. 554feb80faSHridya Valsaraju * @control_dentry: This records the dentry of this binderfs mount 564feb80faSHridya Valsaraju * binder-control device. 574feb80faSHridya Valsaraju * @root_uid: uid that needs to be used when a new binder device is 584feb80faSHridya Valsaraju * created. 594feb80faSHridya Valsaraju * @root_gid: gid that needs to be used when a new binder device is 604feb80faSHridya Valsaraju * created. 614feb80faSHridya Valsaraju * @mount_opts: The mount options in use. 624feb80faSHridya Valsaraju * @device_count: The current number of allocated binder devices. 634feb80faSHridya Valsaraju * @proc_log_dir: Pointer to the directory dentry containing process-specific 644feb80faSHridya Valsaraju * logs. 654feb80faSHridya Valsaraju */ 664feb80faSHridya Valsaraju struct binderfs_info { 674feb80faSHridya Valsaraju struct ipc_namespace *ipc_ns; 684feb80faSHridya Valsaraju struct dentry *control_dentry; 694feb80faSHridya Valsaraju kuid_t root_uid; 704feb80faSHridya Valsaraju kgid_t root_gid; 714feb80faSHridya Valsaraju struct binderfs_mount_opts mount_opts; 724feb80faSHridya Valsaraju int device_count; 734feb80faSHridya Valsaraju struct dentry *proc_log_dir; 744feb80faSHridya Valsaraju }; 754feb80faSHridya Valsaraju 763ad20fe3SChristian Brauner extern const struct file_operations binder_fops; 773ad20fe3SChristian Brauner 78ca2864c6SHridya Valsaraju extern char *binder_devices_param; 79ca2864c6SHridya Valsaraju 803ad20fe3SChristian Brauner #ifdef CONFIG_ANDROID_BINDERFS 813ad20fe3SChristian Brauner extern bool is_binderfs_device(const struct inode *inode); 824feb80faSHridya Valsaraju extern struct dentry *binderfs_create_file(struct dentry *dir, const char *name, 834feb80faSHridya Valsaraju const struct file_operations *fops, 844feb80faSHridya Valsaraju void *data); 854feb80faSHridya Valsaraju extern void binderfs_remove_file(struct dentry *dentry); 863ad20fe3SChristian Brauner #else 873ad20fe3SChristian Brauner static inline bool is_binderfs_device(const struct inode *inode) 883ad20fe3SChristian Brauner { 893ad20fe3SChristian Brauner return false; 903ad20fe3SChristian Brauner } 914feb80faSHridya Valsaraju static inline struct dentry *binderfs_create_file(struct dentry *dir, 924feb80faSHridya Valsaraju const char *name, 934feb80faSHridya Valsaraju const struct file_operations *fops, 944feb80faSHridya Valsaraju void *data) 954feb80faSHridya Valsaraju { 964feb80faSHridya Valsaraju return NULL; 974feb80faSHridya Valsaraju } 984feb80faSHridya Valsaraju static inline void binderfs_remove_file(struct dentry *dentry) {} 993ad20fe3SChristian Brauner #endif 1003ad20fe3SChristian Brauner 1015b9633afSChristian Brauner #ifdef CONFIG_ANDROID_BINDERFS 1025b9633afSChristian Brauner extern int __init init_binderfs(void); 1035b9633afSChristian Brauner #else 1045b9633afSChristian Brauner static inline int __init init_binderfs(void) 1055b9633afSChristian Brauner { 1065b9633afSChristian Brauner return 0; 1075b9633afSChristian Brauner } 1085b9633afSChristian Brauner #endif 1095b9633afSChristian Brauner 1100e13e452SHridya Valsaraju int binder_stats_show(struct seq_file *m, void *unused); 1110e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_stats); 1120e13e452SHridya Valsaraju 1130e13e452SHridya Valsaraju int binder_state_show(struct seq_file *m, void *unused); 1140e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_state); 1150e13e452SHridya Valsaraju 1160e13e452SHridya Valsaraju int binder_transactions_show(struct seq_file *m, void *unused); 1170e13e452SHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_transactions); 11803e2e07eSHridya Valsaraju 11903e2e07eSHridya Valsaraju int binder_transaction_log_show(struct seq_file *m, void *unused); 12003e2e07eSHridya Valsaraju DEFINE_SHOW_ATTRIBUTE(binder_transaction_log); 12103e2e07eSHridya Valsaraju 12203e2e07eSHridya Valsaraju struct binder_transaction_log_entry { 12303e2e07eSHridya Valsaraju int debug_id; 12403e2e07eSHridya Valsaraju int debug_id_done; 12503e2e07eSHridya Valsaraju int call_type; 12603e2e07eSHridya Valsaraju int from_proc; 12703e2e07eSHridya Valsaraju int from_thread; 12803e2e07eSHridya Valsaraju int target_handle; 12903e2e07eSHridya Valsaraju int to_proc; 13003e2e07eSHridya Valsaraju int to_thread; 13103e2e07eSHridya Valsaraju int to_node; 13203e2e07eSHridya Valsaraju int data_size; 13303e2e07eSHridya Valsaraju int offsets_size; 13403e2e07eSHridya Valsaraju int return_error_line; 13503e2e07eSHridya Valsaraju uint32_t return_error; 13603e2e07eSHridya Valsaraju uint32_t return_error_param; 13751d8a7ecSChristian Brauner char context_name[BINDERFS_MAX_NAME + 1]; 13803e2e07eSHridya Valsaraju }; 13903e2e07eSHridya Valsaraju 14003e2e07eSHridya Valsaraju struct binder_transaction_log { 14103e2e07eSHridya Valsaraju atomic_t cur; 14203e2e07eSHridya Valsaraju bool full; 14303e2e07eSHridya Valsaraju struct binder_transaction_log_entry entry[32]; 14403e2e07eSHridya Valsaraju }; 14503e2e07eSHridya Valsaraju 146421518a2SFrankie.Chang enum binder_stat_types { 147421518a2SFrankie.Chang BINDER_STAT_PROC, 148421518a2SFrankie.Chang BINDER_STAT_THREAD, 149421518a2SFrankie.Chang BINDER_STAT_NODE, 150421518a2SFrankie.Chang BINDER_STAT_REF, 151421518a2SFrankie.Chang BINDER_STAT_DEATH, 152421518a2SFrankie.Chang BINDER_STAT_TRANSACTION, 153421518a2SFrankie.Chang BINDER_STAT_TRANSACTION_COMPLETE, 154421518a2SFrankie.Chang BINDER_STAT_COUNT 155421518a2SFrankie.Chang }; 156421518a2SFrankie.Chang 157421518a2SFrankie.Chang struct binder_stats { 158421518a2SFrankie.Chang atomic_t br[_IOC_NR(BR_FAILED_REPLY) + 1]; 159421518a2SFrankie.Chang atomic_t bc[_IOC_NR(BC_REPLY_SG) + 1]; 160421518a2SFrankie.Chang atomic_t obj_created[BINDER_STAT_COUNT]; 161421518a2SFrankie.Chang atomic_t obj_deleted[BINDER_STAT_COUNT]; 162421518a2SFrankie.Chang }; 163421518a2SFrankie.Chang 164421518a2SFrankie.Chang /** 165421518a2SFrankie.Chang * struct binder_work - work enqueued on a worklist 166421518a2SFrankie.Chang * @entry: node enqueued on list 167421518a2SFrankie.Chang * @type: type of work to be performed 168421518a2SFrankie.Chang * 169421518a2SFrankie.Chang * There are separate work lists for proc, thread, and node (async). 170421518a2SFrankie.Chang */ 171421518a2SFrankie.Chang struct binder_work { 172421518a2SFrankie.Chang struct list_head entry; 173421518a2SFrankie.Chang 174421518a2SFrankie.Chang enum binder_work_type { 175421518a2SFrankie.Chang BINDER_WORK_TRANSACTION = 1, 176421518a2SFrankie.Chang BINDER_WORK_TRANSACTION_COMPLETE, 177421518a2SFrankie.Chang BINDER_WORK_RETURN_ERROR, 178421518a2SFrankie.Chang BINDER_WORK_NODE, 179421518a2SFrankie.Chang BINDER_WORK_DEAD_BINDER, 180421518a2SFrankie.Chang BINDER_WORK_DEAD_BINDER_AND_CLEAR, 181421518a2SFrankie.Chang BINDER_WORK_CLEAR_DEATH_NOTIFICATION, 182421518a2SFrankie.Chang } type; 183421518a2SFrankie.Chang }; 184421518a2SFrankie.Chang 185421518a2SFrankie.Chang struct binder_error { 186421518a2SFrankie.Chang struct binder_work work; 187421518a2SFrankie.Chang uint32_t cmd; 188421518a2SFrankie.Chang }; 189421518a2SFrankie.Chang 190421518a2SFrankie.Chang /** 191421518a2SFrankie.Chang * struct binder_node - binder node bookkeeping 192421518a2SFrankie.Chang * @debug_id: unique ID for debugging 193421518a2SFrankie.Chang * (invariant after initialized) 194421518a2SFrankie.Chang * @lock: lock for node fields 195421518a2SFrankie.Chang * @work: worklist element for node work 196421518a2SFrankie.Chang * (protected by @proc->inner_lock) 197421518a2SFrankie.Chang * @rb_node: element for proc->nodes tree 198421518a2SFrankie.Chang * (protected by @proc->inner_lock) 199421518a2SFrankie.Chang * @dead_node: element for binder_dead_nodes list 200421518a2SFrankie.Chang * (protected by binder_dead_nodes_lock) 201421518a2SFrankie.Chang * @proc: binder_proc that owns this node 202421518a2SFrankie.Chang * (invariant after initialized) 203421518a2SFrankie.Chang * @refs: list of references on this node 204421518a2SFrankie.Chang * (protected by @lock) 205421518a2SFrankie.Chang * @internal_strong_refs: used to take strong references when 206421518a2SFrankie.Chang * initiating a transaction 207421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 208421518a2SFrankie.Chang * and by @lock) 209421518a2SFrankie.Chang * @local_weak_refs: weak user refs from local process 210421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 211421518a2SFrankie.Chang * and by @lock) 212421518a2SFrankie.Chang * @local_strong_refs: strong user refs from local process 213421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 214421518a2SFrankie.Chang * and by @lock) 215421518a2SFrankie.Chang * @tmp_refs: temporary kernel refs 216421518a2SFrankie.Chang * (protected by @proc->inner_lock while @proc 217421518a2SFrankie.Chang * is valid, and by binder_dead_nodes_lock 218421518a2SFrankie.Chang * if @proc is NULL. During inc/dec and node release 219421518a2SFrankie.Chang * it is also protected by @lock to provide safety 220421518a2SFrankie.Chang * as the node dies and @proc becomes NULL) 221421518a2SFrankie.Chang * @ptr: userspace pointer for node 222421518a2SFrankie.Chang * (invariant, no lock needed) 223421518a2SFrankie.Chang * @cookie: userspace cookie for node 224421518a2SFrankie.Chang * (invariant, no lock needed) 225421518a2SFrankie.Chang * @has_strong_ref: userspace notified of strong ref 226421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 227421518a2SFrankie.Chang * and by @lock) 228421518a2SFrankie.Chang * @pending_strong_ref: userspace has acked notification of strong ref 229421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 230421518a2SFrankie.Chang * and by @lock) 231421518a2SFrankie.Chang * @has_weak_ref: userspace notified of weak ref 232421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 233421518a2SFrankie.Chang * and by @lock) 234421518a2SFrankie.Chang * @pending_weak_ref: userspace has acked notification of weak ref 235421518a2SFrankie.Chang * (protected by @proc->inner_lock if @proc 236421518a2SFrankie.Chang * and by @lock) 237421518a2SFrankie.Chang * @has_async_transaction: async transaction to node in progress 238421518a2SFrankie.Chang * (protected by @lock) 239421518a2SFrankie.Chang * @accept_fds: file descriptor operations supported for node 240421518a2SFrankie.Chang * (invariant after initialized) 241421518a2SFrankie.Chang * @min_priority: minimum scheduling priority 242421518a2SFrankie.Chang * (invariant after initialized) 243421518a2SFrankie.Chang * @txn_security_ctx: require sender's security context 244421518a2SFrankie.Chang * (invariant after initialized) 245421518a2SFrankie.Chang * @async_todo: list of async work items 246421518a2SFrankie.Chang * (protected by @proc->inner_lock) 247421518a2SFrankie.Chang * 248421518a2SFrankie.Chang * Bookkeeping structure for binder nodes. 249421518a2SFrankie.Chang */ 250421518a2SFrankie.Chang struct binder_node { 251421518a2SFrankie.Chang int debug_id; 252421518a2SFrankie.Chang spinlock_t lock; 253421518a2SFrankie.Chang struct binder_work work; 254421518a2SFrankie.Chang union { 255421518a2SFrankie.Chang struct rb_node rb_node; 256421518a2SFrankie.Chang struct hlist_node dead_node; 257421518a2SFrankie.Chang }; 258421518a2SFrankie.Chang struct binder_proc *proc; 259421518a2SFrankie.Chang struct hlist_head refs; 260421518a2SFrankie.Chang int internal_strong_refs; 261421518a2SFrankie.Chang int local_weak_refs; 262421518a2SFrankie.Chang int local_strong_refs; 263421518a2SFrankie.Chang int tmp_refs; 264421518a2SFrankie.Chang binder_uintptr_t ptr; 265421518a2SFrankie.Chang binder_uintptr_t cookie; 266421518a2SFrankie.Chang struct { 267421518a2SFrankie.Chang /* 268421518a2SFrankie.Chang * bitfield elements protected by 269421518a2SFrankie.Chang * proc inner_lock 270421518a2SFrankie.Chang */ 271421518a2SFrankie.Chang u8 has_strong_ref:1; 272421518a2SFrankie.Chang u8 pending_strong_ref:1; 273421518a2SFrankie.Chang u8 has_weak_ref:1; 274421518a2SFrankie.Chang u8 pending_weak_ref:1; 275421518a2SFrankie.Chang }; 276421518a2SFrankie.Chang struct { 277421518a2SFrankie.Chang /* 278421518a2SFrankie.Chang * invariant after initialization 279421518a2SFrankie.Chang */ 280421518a2SFrankie.Chang u8 accept_fds:1; 281421518a2SFrankie.Chang u8 txn_security_ctx:1; 282421518a2SFrankie.Chang u8 min_priority; 283421518a2SFrankie.Chang }; 284421518a2SFrankie.Chang bool has_async_transaction; 285421518a2SFrankie.Chang struct list_head async_todo; 286421518a2SFrankie.Chang }; 287421518a2SFrankie.Chang 288421518a2SFrankie.Chang struct binder_ref_death { 289421518a2SFrankie.Chang /** 290421518a2SFrankie.Chang * @work: worklist element for death notifications 291421518a2SFrankie.Chang * (protected by inner_lock of the proc that 292421518a2SFrankie.Chang * this ref belongs to) 293421518a2SFrankie.Chang */ 294421518a2SFrankie.Chang struct binder_work work; 295421518a2SFrankie.Chang binder_uintptr_t cookie; 296421518a2SFrankie.Chang }; 297421518a2SFrankie.Chang 298421518a2SFrankie.Chang /** 299421518a2SFrankie.Chang * struct binder_ref_data - binder_ref counts and id 300421518a2SFrankie.Chang * @debug_id: unique ID for the ref 301421518a2SFrankie.Chang * @desc: unique userspace handle for ref 302421518a2SFrankie.Chang * @strong: strong ref count (debugging only if not locked) 303421518a2SFrankie.Chang * @weak: weak ref count (debugging only if not locked) 304421518a2SFrankie.Chang * 305421518a2SFrankie.Chang * Structure to hold ref count and ref id information. Since 306421518a2SFrankie.Chang * the actual ref can only be accessed with a lock, this structure 307421518a2SFrankie.Chang * is used to return information about the ref to callers of 308421518a2SFrankie.Chang * ref inc/dec functions. 309421518a2SFrankie.Chang */ 310421518a2SFrankie.Chang struct binder_ref_data { 311421518a2SFrankie.Chang int debug_id; 312421518a2SFrankie.Chang uint32_t desc; 313421518a2SFrankie.Chang int strong; 314421518a2SFrankie.Chang int weak; 315421518a2SFrankie.Chang }; 316421518a2SFrankie.Chang 317421518a2SFrankie.Chang /** 318421518a2SFrankie.Chang * struct binder_ref - struct to track references on nodes 319421518a2SFrankie.Chang * @data: binder_ref_data containing id, handle, and current refcounts 320421518a2SFrankie.Chang * @rb_node_desc: node for lookup by @data.desc in proc's rb_tree 321421518a2SFrankie.Chang * @rb_node_node: node for lookup by @node in proc's rb_tree 322421518a2SFrankie.Chang * @node_entry: list entry for node->refs list in target node 323421518a2SFrankie.Chang * (protected by @node->lock) 324421518a2SFrankie.Chang * @proc: binder_proc containing ref 325421518a2SFrankie.Chang * @node: binder_node of target node. When cleaning up a 326421518a2SFrankie.Chang * ref for deletion in binder_cleanup_ref, a non-NULL 327421518a2SFrankie.Chang * @node indicates the node must be freed 328421518a2SFrankie.Chang * @death: pointer to death notification (ref_death) if requested 329421518a2SFrankie.Chang * (protected by @node->lock) 330421518a2SFrankie.Chang * 331421518a2SFrankie.Chang * Structure to track references from procA to target node (on procB). This 332421518a2SFrankie.Chang * structure is unsafe to access without holding @proc->outer_lock. 333421518a2SFrankie.Chang */ 334421518a2SFrankie.Chang struct binder_ref { 335421518a2SFrankie.Chang /* Lookups needed: */ 336421518a2SFrankie.Chang /* node + proc => ref (transaction) */ 337421518a2SFrankie.Chang /* desc + proc => ref (transaction, inc/dec ref) */ 338421518a2SFrankie.Chang /* node => refs + procs (proc exit) */ 339421518a2SFrankie.Chang struct binder_ref_data data; 340421518a2SFrankie.Chang struct rb_node rb_node_desc; 341421518a2SFrankie.Chang struct rb_node rb_node_node; 342421518a2SFrankie.Chang struct hlist_node node_entry; 343421518a2SFrankie.Chang struct binder_proc *proc; 344421518a2SFrankie.Chang struct binder_node *node; 345421518a2SFrankie.Chang struct binder_ref_death *death; 346421518a2SFrankie.Chang }; 347421518a2SFrankie.Chang 348421518a2SFrankie.Chang /** 349421518a2SFrankie.Chang * struct binder_proc - binder process bookkeeping 350421518a2SFrankie.Chang * @proc_node: element for binder_procs list 351421518a2SFrankie.Chang * @threads: rbtree of binder_threads in this proc 352421518a2SFrankie.Chang * (protected by @inner_lock) 353421518a2SFrankie.Chang * @nodes: rbtree of binder nodes associated with 354421518a2SFrankie.Chang * this proc ordered by node->ptr 355421518a2SFrankie.Chang * (protected by @inner_lock) 356421518a2SFrankie.Chang * @refs_by_desc: rbtree of refs ordered by ref->desc 357421518a2SFrankie.Chang * (protected by @outer_lock) 358421518a2SFrankie.Chang * @refs_by_node: rbtree of refs ordered by ref->node 359421518a2SFrankie.Chang * (protected by @outer_lock) 360421518a2SFrankie.Chang * @waiting_threads: threads currently waiting for proc work 361421518a2SFrankie.Chang * (protected by @inner_lock) 362421518a2SFrankie.Chang * @pid PID of group_leader of process 363421518a2SFrankie.Chang * (invariant after initialized) 364421518a2SFrankie.Chang * @tsk task_struct for group_leader of process 365421518a2SFrankie.Chang * (invariant after initialized) 366421518a2SFrankie.Chang * @deferred_work_node: element for binder_deferred_list 367421518a2SFrankie.Chang * (protected by binder_deferred_lock) 368421518a2SFrankie.Chang * @deferred_work: bitmap of deferred work to perform 369421518a2SFrankie.Chang * (protected by binder_deferred_lock) 370432ff1e9SMarco Ballesio * @outstanding_txns: number of transactions to be transmitted before 371432ff1e9SMarco Ballesio * processes in freeze_wait are woken up 372432ff1e9SMarco Ballesio * (protected by @inner_lock) 373421518a2SFrankie.Chang * @is_dead: process is dead and awaiting free 374421518a2SFrankie.Chang * when outstanding transactions are cleaned up 375421518a2SFrankie.Chang * (protected by @inner_lock) 376432ff1e9SMarco Ballesio * @is_frozen: process is frozen and unable to service 377432ff1e9SMarco Ballesio * binder transactions 378432ff1e9SMarco Ballesio * (protected by @inner_lock) 379*ae28c1beSMarco Ballesio * @sync_recv: process received sync transactions since last frozen 380*ae28c1beSMarco Ballesio * (protected by @inner_lock) 381*ae28c1beSMarco Ballesio * @async_recv: process received async transactions since last frozen 382*ae28c1beSMarco Ballesio * (protected by @inner_lock) 383432ff1e9SMarco Ballesio * @freeze_wait: waitqueue of processes waiting for all outstanding 384432ff1e9SMarco Ballesio * transactions to be processed 385432ff1e9SMarco Ballesio * (protected by @inner_lock) 386421518a2SFrankie.Chang * @todo: list of work for this process 387421518a2SFrankie.Chang * (protected by @inner_lock) 388421518a2SFrankie.Chang * @stats: per-process binder statistics 389421518a2SFrankie.Chang * (atomics, no lock needed) 390421518a2SFrankie.Chang * @delivered_death: list of delivered death notification 391421518a2SFrankie.Chang * (protected by @inner_lock) 392421518a2SFrankie.Chang * @max_threads: cap on number of binder threads 393421518a2SFrankie.Chang * (protected by @inner_lock) 394421518a2SFrankie.Chang * @requested_threads: number of binder threads requested but not 395421518a2SFrankie.Chang * yet started. In current implementation, can 396421518a2SFrankie.Chang * only be 0 or 1. 397421518a2SFrankie.Chang * (protected by @inner_lock) 398421518a2SFrankie.Chang * @requested_threads_started: number binder threads started 399421518a2SFrankie.Chang * (protected by @inner_lock) 400421518a2SFrankie.Chang * @tmp_ref: temporary reference to indicate proc is in use 401421518a2SFrankie.Chang * (protected by @inner_lock) 402421518a2SFrankie.Chang * @default_priority: default scheduler priority 403421518a2SFrankie.Chang * (invariant after initialized) 404421518a2SFrankie.Chang * @debugfs_entry: debugfs node 405421518a2SFrankie.Chang * @alloc: binder allocator bookkeeping 406421518a2SFrankie.Chang * @context: binder_context for this proc 407421518a2SFrankie.Chang * (invariant after initialized) 408421518a2SFrankie.Chang * @inner_lock: can nest under outer_lock and/or node lock 409421518a2SFrankie.Chang * @outer_lock: no nesting under innor or node lock 410421518a2SFrankie.Chang * Lock order: 1) outer, 2) node, 3) inner 411421518a2SFrankie.Chang * @binderfs_entry: process-specific binderfs log file 412421518a2SFrankie.Chang * 413421518a2SFrankie.Chang * Bookkeeping structure for binder processes 414421518a2SFrankie.Chang */ 415421518a2SFrankie.Chang struct binder_proc { 416421518a2SFrankie.Chang struct hlist_node proc_node; 417421518a2SFrankie.Chang struct rb_root threads; 418421518a2SFrankie.Chang struct rb_root nodes; 419421518a2SFrankie.Chang struct rb_root refs_by_desc; 420421518a2SFrankie.Chang struct rb_root refs_by_node; 421421518a2SFrankie.Chang struct list_head waiting_threads; 422421518a2SFrankie.Chang int pid; 423421518a2SFrankie.Chang struct task_struct *tsk; 424421518a2SFrankie.Chang struct hlist_node deferred_work_node; 425421518a2SFrankie.Chang int deferred_work; 426432ff1e9SMarco Ballesio int outstanding_txns; 427421518a2SFrankie.Chang bool is_dead; 428432ff1e9SMarco Ballesio bool is_frozen; 429*ae28c1beSMarco Ballesio bool sync_recv; 430*ae28c1beSMarco Ballesio bool async_recv; 431432ff1e9SMarco Ballesio wait_queue_head_t freeze_wait; 432421518a2SFrankie.Chang 433421518a2SFrankie.Chang struct list_head todo; 434421518a2SFrankie.Chang struct binder_stats stats; 435421518a2SFrankie.Chang struct list_head delivered_death; 436421518a2SFrankie.Chang int max_threads; 437421518a2SFrankie.Chang int requested_threads; 438421518a2SFrankie.Chang int requested_threads_started; 439421518a2SFrankie.Chang int tmp_ref; 440421518a2SFrankie.Chang long default_priority; 441421518a2SFrankie.Chang struct dentry *debugfs_entry; 442421518a2SFrankie.Chang struct binder_alloc alloc; 443421518a2SFrankie.Chang struct binder_context *context; 444421518a2SFrankie.Chang spinlock_t inner_lock; 445421518a2SFrankie.Chang spinlock_t outer_lock; 446421518a2SFrankie.Chang struct dentry *binderfs_entry; 447421518a2SFrankie.Chang }; 448421518a2SFrankie.Chang 449421518a2SFrankie.Chang /** 450421518a2SFrankie.Chang * struct binder_thread - binder thread bookkeeping 451421518a2SFrankie.Chang * @proc: binder process for this thread 452421518a2SFrankie.Chang * (invariant after initialization) 453421518a2SFrankie.Chang * @rb_node: element for proc->threads rbtree 454421518a2SFrankie.Chang * (protected by @proc->inner_lock) 455421518a2SFrankie.Chang * @waiting_thread_node: element for @proc->waiting_threads list 456421518a2SFrankie.Chang * (protected by @proc->inner_lock) 457421518a2SFrankie.Chang * @pid: PID for this thread 458421518a2SFrankie.Chang * (invariant after initialization) 459421518a2SFrankie.Chang * @looper: bitmap of looping state 460421518a2SFrankie.Chang * (only accessed by this thread) 461421518a2SFrankie.Chang * @looper_needs_return: looping thread needs to exit driver 462421518a2SFrankie.Chang * (no lock needed) 463421518a2SFrankie.Chang * @transaction_stack: stack of in-progress transactions for this thread 464421518a2SFrankie.Chang * (protected by @proc->inner_lock) 465421518a2SFrankie.Chang * @todo: list of work to do for this thread 466421518a2SFrankie.Chang * (protected by @proc->inner_lock) 467421518a2SFrankie.Chang * @process_todo: whether work in @todo should be processed 468421518a2SFrankie.Chang * (protected by @proc->inner_lock) 469421518a2SFrankie.Chang * @return_error: transaction errors reported by this thread 470421518a2SFrankie.Chang * (only accessed by this thread) 471421518a2SFrankie.Chang * @reply_error: transaction errors reported by target thread 472421518a2SFrankie.Chang * (protected by @proc->inner_lock) 473421518a2SFrankie.Chang * @wait: wait queue for thread work 474421518a2SFrankie.Chang * @stats: per-thread statistics 475421518a2SFrankie.Chang * (atomics, no lock needed) 476421518a2SFrankie.Chang * @tmp_ref: temporary reference to indicate thread is in use 477421518a2SFrankie.Chang * (atomic since @proc->inner_lock cannot 478421518a2SFrankie.Chang * always be acquired) 479421518a2SFrankie.Chang * @is_dead: thread is dead and awaiting free 480421518a2SFrankie.Chang * when outstanding transactions are cleaned up 481421518a2SFrankie.Chang * (protected by @proc->inner_lock) 482421518a2SFrankie.Chang * 483421518a2SFrankie.Chang * Bookkeeping structure for binder threads. 484421518a2SFrankie.Chang */ 485421518a2SFrankie.Chang struct binder_thread { 486421518a2SFrankie.Chang struct binder_proc *proc; 487421518a2SFrankie.Chang struct rb_node rb_node; 488421518a2SFrankie.Chang struct list_head waiting_thread_node; 489421518a2SFrankie.Chang int pid; 490421518a2SFrankie.Chang int looper; /* only modified by this thread */ 491421518a2SFrankie.Chang bool looper_need_return; /* can be written by other thread */ 492421518a2SFrankie.Chang struct binder_transaction *transaction_stack; 493421518a2SFrankie.Chang struct list_head todo; 494421518a2SFrankie.Chang bool process_todo; 495421518a2SFrankie.Chang struct binder_error return_error; 496421518a2SFrankie.Chang struct binder_error reply_error; 497421518a2SFrankie.Chang wait_queue_head_t wait; 498421518a2SFrankie.Chang struct binder_stats stats; 499421518a2SFrankie.Chang atomic_t tmp_ref; 500421518a2SFrankie.Chang bool is_dead; 501421518a2SFrankie.Chang }; 502421518a2SFrankie.Chang 503421518a2SFrankie.Chang /** 504421518a2SFrankie.Chang * struct binder_txn_fd_fixup - transaction fd fixup list element 505421518a2SFrankie.Chang * @fixup_entry: list entry 506421518a2SFrankie.Chang * @file: struct file to be associated with new fd 507421518a2SFrankie.Chang * @offset: offset in buffer data to this fixup 508421518a2SFrankie.Chang * 509421518a2SFrankie.Chang * List element for fd fixups in a transaction. Since file 510421518a2SFrankie.Chang * descriptors need to be allocated in the context of the 511421518a2SFrankie.Chang * target process, we pass each fd to be processed in this 512421518a2SFrankie.Chang * struct. 513421518a2SFrankie.Chang */ 514421518a2SFrankie.Chang struct binder_txn_fd_fixup { 515421518a2SFrankie.Chang struct list_head fixup_entry; 516421518a2SFrankie.Chang struct file *file; 517421518a2SFrankie.Chang size_t offset; 518421518a2SFrankie.Chang }; 519421518a2SFrankie.Chang 520421518a2SFrankie.Chang struct binder_transaction { 521421518a2SFrankie.Chang int debug_id; 522421518a2SFrankie.Chang struct binder_work work; 523421518a2SFrankie.Chang struct binder_thread *from; 524421518a2SFrankie.Chang struct binder_transaction *from_parent; 525421518a2SFrankie.Chang struct binder_proc *to_proc; 526421518a2SFrankie.Chang struct binder_thread *to_thread; 527421518a2SFrankie.Chang struct binder_transaction *to_parent; 528421518a2SFrankie.Chang unsigned need_reply:1; 529421518a2SFrankie.Chang /* unsigned is_dead:1; */ /* not used at the moment */ 530421518a2SFrankie.Chang 531421518a2SFrankie.Chang struct binder_buffer *buffer; 532421518a2SFrankie.Chang unsigned int code; 533421518a2SFrankie.Chang unsigned int flags; 534421518a2SFrankie.Chang long priority; 535421518a2SFrankie.Chang long saved_priority; 536421518a2SFrankie.Chang kuid_t sender_euid; 537421518a2SFrankie.Chang struct list_head fd_fixups; 538421518a2SFrankie.Chang binder_uintptr_t security_ctx; 539421518a2SFrankie.Chang /** 540421518a2SFrankie.Chang * @lock: protects @from, @to_proc, and @to_thread 541421518a2SFrankie.Chang * 542421518a2SFrankie.Chang * @from, @to_proc, and @to_thread can be set to NULL 543421518a2SFrankie.Chang * during thread teardown 544421518a2SFrankie.Chang */ 545421518a2SFrankie.Chang spinlock_t lock; 546421518a2SFrankie.Chang }; 547421518a2SFrankie.Chang 548421518a2SFrankie.Chang /** 549421518a2SFrankie.Chang * struct binder_object - union of flat binder object types 550421518a2SFrankie.Chang * @hdr: generic object header 551421518a2SFrankie.Chang * @fbo: binder object (nodes and refs) 552421518a2SFrankie.Chang * @fdo: file descriptor object 553421518a2SFrankie.Chang * @bbo: binder buffer pointer 554421518a2SFrankie.Chang * @fdao: file descriptor array 555421518a2SFrankie.Chang * 556421518a2SFrankie.Chang * Used for type-independent object copies 557421518a2SFrankie.Chang */ 558421518a2SFrankie.Chang struct binder_object { 559421518a2SFrankie.Chang union { 560421518a2SFrankie.Chang struct binder_object_header hdr; 561421518a2SFrankie.Chang struct flat_binder_object fbo; 562421518a2SFrankie.Chang struct binder_fd_object fdo; 563421518a2SFrankie.Chang struct binder_buffer_object bbo; 564421518a2SFrankie.Chang struct binder_fd_array_object fdao; 565421518a2SFrankie.Chang }; 566421518a2SFrankie.Chang }; 567421518a2SFrankie.Chang 56803e2e07eSHridya Valsaraju extern struct binder_transaction_log binder_transaction_log; 56903e2e07eSHridya Valsaraju extern struct binder_transaction_log binder_transaction_log_failed; 5703ad20fe3SChristian Brauner #endif /* _LINUX_BINDER_INTERNAL_H */ 571