aboutsummaryrefslogtreecommitdiff
path: root/include/uapi/linux/android
Commit message (Collapse)AuthorAgeFilesLines
* Merge tag 'android-9.0.0_r0.66' of ↵Josh Chasky2019-03-041-0/+19
|\ | | | | | | | | | | | | | | https://android.googlesource.com/kernel/msm into p9x Android 9.0.0 Release 0.66 (PQ2A.190305.002,crosshatch/blueline) Change-Id: Ie8d8453404f96611de649cc10b11cb0ffec44d41
| * binder: create node flag to request sender's security contextTodd Kjos2019-01-101-0/+19
| | | | | | | | | | | | | | | | | | | | | | | | To allow servers to verify client identity, allow a node flag to be set that causes the sender's security context to be delivered with the transaction. The BR_TRANSACTION command is extended in BR_TRANSACTION_SEC_CTX to contain a pointer to the security context string. Bug: 25646100 Change-Id: I0ec053072d6337576680067e07f90dd054b1ecfb Signed-off-by: Todd Kjos <tkjos@google.com>
* | FROMLIST: ANDROID: binder: Add BINDER_GET_NODE_INFO_FOR_REF ioctl.Martijn Coenen2018-11-121-0/+10
|/ | | | | | | | | | | | | | | This allows the context manager to retrieve information about nodes that it holds a reference to, such as the current number of references to those nodes. Such information can for example be used to determine whether the servicemanager is the only process holding a reference to a node. This information can then be passed on to the process holding the node, which can in turn decide whether it wants to shut down to reduce resource usage. Signed-off-by: Martijn Coenen <maco@android.com> (cherry picked from commit 1c57ba4f543bdb8abbb79e618de98a1aa1dad96f)
* Add BINDER_GET_NODE_DEBUG_INFO ioctlColin Cross2017-07-191-0/+14
| | | | | | | | | | | | | The BINDER_GET_NODE_DEBUG_INFO ioctl will return debug info on a node. Each successive call reusing the previous return value will return the next node. The data will be used by libmemunreachable to mark the pointers with kernel references as reachable. Bug: 28275695 Change-Id: Idbbafa648a33822dc023862cd92b51a595cf7c1c Signed-off-by: Colin Cross <ccross@android.com> Signed-off-by: Martijn Coenen <maco@android.com>
* ANDROID: binder: add RT inheritance flag to node.Martijn Coenen2017-07-191-0/+8
| | | | | | | | Allows a binder node to specify whether it wants to inherit real-time scheduling policy from a caller. Change-Id: I375b6094bf441c19f19cba06d5a6be02cd07d714 Signed-off-by: Martijn Coenen <maco@android.com>
* ANDROID: binder: add min sched_policy to node.Martijn Coenen2017-07-191-1/+40
| | | | | | | | | | | | | | | | This change adds flags to flat_binder_object.flags to allow indicating a minimum scheduling policy for the node. It also clarifies the valid value range for the priority bits in the flags. Internally, we use the priority map that the kernel uses, e.g. [0..99] for real-time policies and [100..139] for the SCHED_NORMAL/SCHED_BATCH policies. Bug: 34461621 Bug: 37293077 Change-Id: I12438deecb53df432da18c6fc77460768ae726d2 Signed-off-by: Martijn Coenen <maco@google.com>
* ANDROID: binder: add padding to binder_fd_array_object.Martijn Coenen2017-03-211-0/+2
| | | | | | | | | | | | | | binder_fd_array_object starts with a 4-byte header, followed by a few fields that are 8 bytes when ANDROID_BINDER_IPC_32BIT=N. This can cause alignment issues in a 64-bit kernel with a 32-bit userspace, as on x86_32 an 8-byte primitive may be aligned to a 4-byte address. Pad with a __u32 to fix this. Change-Id: I4374ed2cc3ccd3c6a1474cb7209b53ebfd91077b Signed-off-by: Martijn Coenen <maco@android.com>
* ANDROID: binder: support for file-descriptor arrays.Martijn Coenen2017-01-271-0/+28
| | | | | | | | | This patch introduces a new binder_fd_array object, that allows us to support one or more file descriptors embedded in a buffer that is scatter-gathered. Change-Id: I647a53cf0d905c7be0dfd9333806982def68dd74 Signed-off-by: Martijn Coenen <maco@google.com>
* ANDROID: binder: support for scatter-gather.Martijn Coenen2017-01-271-0/+45
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously all data passed over binder needed to be serialized, with the exception of Binder objects and file descriptors. This patchs adds support for scatter-gathering raw memory buffers into a binder transaction, avoiding the need to first serialize them into a Parcel. To remain backwards compatibile with existing binder clients, it introduces two new command ioctls for this purpose - BC_TRANSACTION_SG and BC_REPLY_SG. These commands may only be used with the new binder_transaction_data_sg structure, which adds a field for the total size of the buffers we are scatter-gathering. Because memory buffers may contain pointers to other buffers, we allow callers to specify a parent buffer and an offset into it, to indicate this is a location pointing to the buffer that we are fixing up. The kernel will then take care of fixing up the pointer to that buffer as well. Change-Id: I02417f28cff14688f2e1d6fcb959438fd96566cc Signed-off-by: Martijn Coenen <maco@google.com>
* ANDROID: binder: split flat_binder_object.Martijn Coenen2017-01-271-3/+28
| | | | | | | | | | | | | | | flat_binder_object is used for both handling binder objects and file descriptors, even though the two are mostly independent. Since we'll have more fixup objects in binder in the future, instead of extending flat_binder_object again, split out file descriptors to their own object while retaining backwards compatibility to existing user-space clients. All binder objects just share a header. Change-Id: If3c55f27a2aa8f21815383e0e807be47895e4786 Signed-off-by: Martijn Coenen <maco@google.com>
* android: uapi: binder.hGreg Kroah-Hartman2014-10-201-0/+1
| | | | | | | add types.h to .h file to pass the checker scripts, and provide a proper uapi .h file. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
* staging: android: binder: move to the "real" part of the kernelGreg Kroah-Hartman2014-10-202-0/+353
The Android binder code has been "stable" for many years now. No matter what comes in the future, we are going to have to support this API, so might as well move it to the "real" part of the kernel as there's no real work that needs to be done to the existing code. Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>