Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4075872imu; Mon, 28 Jan 2019 16:51:05 -0800 (PST) X-Google-Smtp-Source: ALg8bN404wvEQD2cUJSl+sMoWAjk5mK8gKlkupiUO5bHZzRuTuwVRSX6SVNvfuEJA9b/wn47aoCL X-Received: by 2002:a62:64d7:: with SMTP id y206mr24134783pfb.84.1548723065191; Mon, 28 Jan 2019 16:51:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548723065; cv=none; d=google.com; s=arc-20160816; b=e/GhQpd7t3iXLHC+1RBr+9ho6zgzgC2KX7WwUSBO2r6EzBAeUY5aeIWwWiin/qm1jI S/gXig66s1oV+QdEvkuXe/ISNb+eSdQUWVIbYpUiDGK1B3LCxNS0yC1r/RjbS2NMA7t4 yq77dnBLhuKFWbKYYCospPjOEwYFiW4sspm7MEqHgYfm83AxyFr0OW5QrrcjpvLFxQtW 1sY8eWGlKOUpkkr/Rm6WX3vV+WEHc+5z2+hurqNy/JzlfA0lD30Gz9+ZS+8aS0Mqx0eO pf/g9tFautqc2WxZniY76jp1WRv7zUshW1GJyb5uZGNu2mVPj4XUyMgGywEL87RbcdYb kI+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=aGdfXcww/HVwdIRZ1yuYr1ejtMN4j5b+CdL0gOen6bI=; b=xNj3poEXJWZAhKkzr3CoOdrRXmA9JEMHl45FWtE/eJ3ILfXrzo1cFC7gZ1Uj3+tYpW 9Dl3Sva7Ro/RHbUgSmHpkVg56iVCPnqE6NM/YeQ8NWs4Lp9OQuYnOh2+zSrV5yVHWKcG pIsTZq48ySO2zte2FTXxUsJfyzoPI2z9VU7XtKeM5qpCKQgC4XEInTwQE5Vgrh99pNwx WcQ8nMOpXWkmf0fkcY94vcxFPwALf1NHzHOnsgUZRJI1palKSmZw9lqNsgR8Bd39lS4e vLs5FhOwvn1DPAv8lG+w0TCD2RXPVFJHdb9C+J85PIqXy9TYyptp8wk1JW8FN8767WMb qamA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=VrPGWxA7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=android.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a13si24683277pgb.412.2019.01.28.16.50.49; Mon, 28 Jan 2019 16:51:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@android.com header.s=20161025 header.b=VrPGWxA7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=android.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728016AbfA2AuZ (ORCPT + 99 others); Mon, 28 Jan 2019 19:50:25 -0500 Received: from mail-pf1-f196.google.com ([209.85.210.196]:41434 "EHLO mail-pf1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727857AbfA2AuQ (ORCPT ); Mon, 28 Jan 2019 19:50:16 -0500 Received: by mail-pf1-f196.google.com with SMTP id b7so8812787pfi.8 for ; Mon, 28 Jan 2019 16:50:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=android.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=aGdfXcww/HVwdIRZ1yuYr1ejtMN4j5b+CdL0gOen6bI=; b=VrPGWxA7Lxj5PMbUyPB4F51dBZ1oev+cDEJ7t2vXh+oqTrmr0cy1w+3atE7PJeSSeV CVa67oBz7OTBIi+nYEIZZ0muGRT5seI4MgBnehOHJTh0yl8//nCPVjJnXQr7eXxT93dA iwgeBB5zf603Q/wCaNjcG8R1rIwVKZrVmAjLOgWfWOISyppk443qHg7zovdPpcxVG43z 0Sdjw8rwdyFHBoVNrb+B73ThcoKNiStgZq1S0cJdn6db7BzLzGEh/7YADfuTPy9A5YJl FCq3ht7VOoVgVBsBubtQkmqdedhK4g34izrwLdSQd6fx8nz5SzCbIzqJ/tJG/5bRGaQy 67Kg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=aGdfXcww/HVwdIRZ1yuYr1ejtMN4j5b+CdL0gOen6bI=; b=XMaapThUAsgNPhX/jpWV9k1BaHgNtF7IkuuJzmt48Kdg7XX/Zhh5t9+ojwIC7JJ8vW b/DqSra3pE0X6z2bMPHJSfCHsUpT8pBlkyihh1lUEpDYrNtz14+MCU2icMf4YkMrz2kX mG0zXOVTB3wFIAWssSyl26Ioz/rExEDdTP8vMYcEgII4Nr1GQUXLHs1+zOZGUqhNMCr7 7ZjFGV+z8ipH6xfwaWE+4YV/wpQQcE3OnVa7qUA8w0FpI8YtMPJ6/Fa4OSrpHocpzMtu awa6QgtyUX8o8CIByoh4/k1xx+QpcQ6Hdwr+ANmoR97ETQSNfuYogGZ46Z2vv2z2XFzV nYrg== X-Gm-Message-State: AJcUukeXe9Lov7HKYi8IPOneZ2kvMnIZnaM8RNtSJgM7fUcx7rKcPjBj 5ASbBznHnVI0Klf336hX2IWTpw== X-Received: by 2002:a62:9419:: with SMTP id m25mr25074710pfe.147.1548723015276; Mon, 28 Jan 2019 16:50:15 -0800 (PST) Received: from ava-linux2.mtv.corp.google.com ([2620:0:1000:1601:6cc0:d41d:b970:fd7]) by smtp.googlemail.com with ESMTPSA id g3sm52090792pfe.37.2019.01.28.16.50.13 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 28 Jan 2019 16:50:14 -0800 (PST) From: Todd Kjos X-Google-Original-From: Todd Kjos To: tkjos@google.com, gregkh@linuxfoundation.org, arve@android.com, devel@driverdev.osuosl.org, linux-kernel@vger.kernel.org, maco@google.com Cc: joel@joelfernandes.org, kernel-team@android.com Subject: [PATCH 6/7] binder: remove user_buffer_offset Date: Mon, 28 Jan 2019 16:49:33 -0800 Message-Id: <20190129004934.85885-7-tkjos@google.com> X-Mailer: git-send-email 2.20.1.495.gaa96b0ce6b-goog In-Reply-To: <20190129004934.85885-1-tkjos@google.com> References: <20190129004934.85885-1-tkjos@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Remove user_buffer_offset since there is no kernel buffer pointer anymore. Signed-off-by: Todd Kjos --- drivers/android/binder.c | 38 +++++++--------------------------- drivers/android/binder_alloc.c | 16 ++++++-------- drivers/android/binder_alloc.h | 23 -------------------- 3 files changed, 13 insertions(+), 64 deletions(-) diff --git a/drivers/android/binder.c b/drivers/android/binder.c index 197b7bdc38eef..07b92bbb7360e 100644 --- a/drivers/android/binder.c +++ b/drivers/android/binder.c @@ -2380,7 +2380,6 @@ static void binder_transaction_buffer_release(struct binder_proc *proc, struct binder_fd_array_object *fda; struct binder_buffer_object *parent; struct binder_object ptr_object; - uintptr_t parent_buffer; u32 *fd_array; size_t fd_index; binder_size_t fd_buf_size; @@ -2405,14 +2404,6 @@ static void binder_transaction_buffer_release(struct binder_proc *proc, debug_id); continue; } - /* - * Since the parent was already fixed up, convert it - * back to kernel address space to access it - */ - parent_buffer = parent->buffer - - binder_alloc_get_user_buffer_offset( - &proc->alloc); - fd_buf_size = sizeof(u32) * fda->num_fds; if (fda->num_fds >= SIZE_MAX / sizeof(u32)) { pr_err("transaction release %d invalid number of fds (%lld)\n", @@ -2426,7 +2417,8 @@ static void binder_transaction_buffer_release(struct binder_proc *proc, debug_id, (u64)fda->num_fds); continue; } - fd_array = (u32 *)(parent_buffer + (uintptr_t)fda->parent_offset); + fd_array = (u32 *)(uintptr_t) + (parent->buffer + fda->parent_offset); for (fd_index = 0; fd_index < fda->num_fds; fd_index++) { u32 fd; @@ -2646,7 +2638,6 @@ static int binder_translate_fd_array(struct binder_fd_array_object *fda, struct binder_transaction *in_reply_to) { binder_size_t fdi, fd_buf_size; - uintptr_t parent_buffer; u32 *fd_array; struct binder_proc *proc = thread->proc; struct binder_proc *target_proc = t->to_proc; @@ -2664,13 +2655,7 @@ static int binder_translate_fd_array(struct binder_fd_array_object *fda, proc->pid, thread->pid, (u64)fda->num_fds); return -EINVAL; } - /* - * Since the parent was already fixed up, convert it - * back to the kernel address space to access it - */ - parent_buffer = parent->buffer - - binder_alloc_get_user_buffer_offset(&target_proc->alloc); - fd_array = (u32 *)(parent_buffer + (uintptr_t)fda->parent_offset); + fd_array = (u32 *)(uintptr_t)(parent->buffer + fda->parent_offset); if (!IS_ALIGNED((unsigned long)fd_array, sizeof(u32))) { binder_user_error("%d:%d parent offset not aligned correctly.\n", proc->pid, thread->pid); @@ -2703,7 +2688,6 @@ static int binder_fixup_parent(struct binder_transaction *t, binder_size_t last_fixup_min_off) { struct binder_buffer_object *parent; - u8 *parent_buffer; struct binder_buffer *b = t->buffer; struct binder_proc *proc = thread->proc; struct binder_proc *target_proc = t->to_proc; @@ -2739,11 +2723,8 @@ static int binder_fixup_parent(struct binder_transaction *t, proc->pid, thread->pid); return -EINVAL; } - parent_buffer = (u8 *)((uintptr_t)parent->buffer - - binder_alloc_get_user_buffer_offset( - &target_proc->alloc)); buffer_offset = bp->parent_offset + - (uintptr_t)parent_buffer - (uintptr_t)b->data; + (uintptr_t)parent->buffer - (uintptr_t)b->data; binder_alloc_copy_to_buffer(&target_proc->alloc, b, buffer_offset, &bp->buffer, sizeof(bp->buffer)); @@ -3159,10 +3140,8 @@ static void binder_transaction(struct binder_proc *proc, ALIGN(tr->offsets_size, sizeof(void *)) + ALIGN(extra_buffers_size, sizeof(void *)) - ALIGN(secctx_sz, sizeof(u64)); - char *kptr = t->buffer->data + buf_offset; - t->security_ctx = (uintptr_t)kptr + - binder_alloc_get_user_buffer_offset(&target_proc->alloc); + t->security_ctx = (uintptr_t)t->buffer->data + buf_offset; binder_alloc_copy_to_buffer(&target_proc->alloc, t->buffer, buf_offset, secctx, secctx_sz); @@ -3380,9 +3359,7 @@ static void binder_transaction(struct binder_proc *proc, goto err_copy_data_failed; } /* Fixup buffer pointer to target proc address space */ - bp->buffer = (uintptr_t)sg_bufp + - binder_alloc_get_user_buffer_offset( - &target_proc->alloc); + bp->buffer = (uintptr_t)sg_bufp; sg_bufp += ALIGN(bp->length, sizeof(u64)); ret = binder_fixup_parent(t, thread, bp, @@ -4475,8 +4452,7 @@ static int binder_thread_read(struct binder_proc *proc, trd->data_size = t->buffer->data_size; trd->offsets_size = t->buffer->offsets_size; trd->data.ptr.buffer = (binder_uintptr_t) - ((uintptr_t)t->buffer->data + - binder_alloc_get_user_buffer_offset(&proc->alloc)); + (uintptr_t)t->buffer->data; trd->data.ptr.offsets = trd->data.ptr.buffer + ALIGN(t->buffer->data_size, sizeof(void *)); diff --git a/drivers/android/binder_alloc.c b/drivers/android/binder_alloc.c index dde8977c49ea0..ea199fe2137dd 100644 --- a/drivers/android/binder_alloc.c +++ b/drivers/android/binder_alloc.c @@ -138,17 +138,17 @@ static struct binder_buffer *binder_alloc_prepare_to_free_locked( { struct rb_node *n = alloc->allocated_buffers.rb_node; struct binder_buffer *buffer; - void *kern_ptr; + void *uptr; - kern_ptr = (void *)(user_ptr - alloc->user_buffer_offset); + uptr = (void *)user_ptr; while (n) { buffer = rb_entry(n, struct binder_buffer, rb_node); BUG_ON(buffer->free); - if (kern_ptr < buffer->data) + if (uptr < buffer->data) n = n->rb_left; - else if (kern_ptr > buffer->data) + else if (uptr > buffer->data) n = n->rb_right; else { /* @@ -265,8 +265,7 @@ static int binder_update_page_range(struct binder_alloc *alloc, int allocate, page->alloc = alloc; INIT_LIST_HEAD(&page->lru); - user_page_addr = - (uintptr_t)page_addr + alloc->user_buffer_offset; + user_page_addr = (uintptr_t)page_addr; ret = vm_insert_page(vma, user_page_addr, page[0].page_ptr); if (ret) { pr_err("%d: binder_alloc_buf failed to map page at %lx in userspace\n", @@ -694,7 +693,6 @@ int binder_alloc_mmap_handler(struct binder_alloc *alloc, } alloc->buffer = (void *)vma->vm_start; - alloc->user_buffer_offset = 0; mutex_unlock(&binder_alloc_mmap_lock); alloc->pages = kcalloc((vma->vm_end - vma->vm_start) / PAGE_SIZE, @@ -941,9 +939,7 @@ enum lru_status binder_alloc_free_page(struct list_head *item, if (vma) { trace_binder_unmap_user_start(alloc, index); - zap_page_range(vma, - page_addr + alloc->user_buffer_offset, - PAGE_SIZE); + zap_page_range(vma, page_addr, PAGE_SIZE); trace_binder_unmap_user_end(alloc, index); diff --git a/drivers/android/binder_alloc.h b/drivers/android/binder_alloc.h index 9d682b9d6c241..1026e9fb20db1 100644 --- a/drivers/android/binder_alloc.h +++ b/drivers/android/binder_alloc.h @@ -82,7 +82,6 @@ struct binder_lru_page { * (invariant after init) * @vma_vm_mm: copy of vma->vm_mm (invarient after mmap) * @buffer: base of per-proc address space mapped via mmap - * @user_buffer_offset: offset between user and kernel VAs for buffer * @buffers: list of all buffers for this proc * @free_buffers: rb tree of buffers available for allocation * sorted by size @@ -104,7 +103,6 @@ struct binder_alloc { struct vm_area_struct *vma; struct mm_struct *vma_vm_mm; void *buffer; - ptrdiff_t user_buffer_offset; struct list_head buffers; struct rb_root free_buffers; struct rb_root allocated_buffers; @@ -163,27 +161,6 @@ binder_alloc_get_free_async_space(struct binder_alloc *alloc) return free_async_space; } -/** - * binder_alloc_get_user_buffer_offset() - get offset between kernel/user addrs - * @alloc: binder_alloc for this proc - * - * Return: the offset between kernel and user-space addresses to use for - * virtual address conversion - */ -static inline ptrdiff_t -binder_alloc_get_user_buffer_offset(struct binder_alloc *alloc) -{ - /* - * user_buffer_offset is constant if vma is set and - * undefined if vma is not set. It is possible to - * get here with !alloc->vma if the target process - * is dying while a transaction is being initiated. - * Returning the old value is ok in this case and - * the transaction will fail. - */ - return alloc->user_buffer_offset; -} - unsigned long binder_alloc_copy_user_to_buffer(struct binder_alloc *alloc, struct binder_buffer *buffer, -- 2.20.1.495.gaa96b0ce6b-goog