Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp5775619ioo; Wed, 1 Jun 2022 12:19:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz+owAWut6bv3kpQcZbcaGYbqq7K5PPKYcA4WGnOVeLGegBg8mj07dkwp6478ZPuJKR5UcX X-Received: by 2002:a17:90b:4a83:b0:1e6:4b34:b760 with SMTP id lp3-20020a17090b4a8300b001e64b34b760mr3755497pjb.114.1654111160702; Wed, 01 Jun 2022 12:19:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654111160; cv=none; d=google.com; s=arc-20160816; b=FSApCBycmB0uZxc6mDWNXFBvAZ3OI3AKuMgi8Pu+MK/Z8czCHiI/RdRIwTagFsOYDs Jtrl+3Buzwxub33Wo1vSdon2FLtkGC4Rt9hbZF1WBZYHHDUAtxQ8W+X52lYCf9UJUYl1 VwQ7uVEGMqXykHQvYIP6puDEeiSTeD086OQR+oYHT7labLvTjRN7JTdaqpAUwEUPfln1 lLlhffOcIBXUG1zgSMvDgTF0r69SM8ts9IAGNhXr0mtVyXnjDLkqL7Pk61wTvpJLtEpW 6liogJcO1vx3hf1FqGPudSqT9R4/PZZ6qDzr8TOMbY+rDaEQ6kPX3Wqh94hbEUNAGwmC IeWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=NTLfADh8lSfx6tLN8KBP3kdlF2/kw53HzSdkGJeezGo=; b=ZnxKDsFLF+6fbeVnfi5wqy+A1E6bfrTS6b8Kv6b0K337LANmfZRiTMlCJyhpTmmGmV JE/UNTqJSLi3Xi3bmseZqVoC8dDe4iQsAMyGsZ+F8OzIy61MRUawiCGSzvTitT6TkoOx l57dWQ2CV1w21Z2GfBRv6D1UPDZ2DXEUItA7ADqLMwuhlQHBNJur4x6Qy4Xj7zzZ5Thd BCpc9IzhM5ohBzSV/dv07zY9LF+9fN9qzoFmoQm3RdfcW+tI64v0D+q251HYrhliGozn sbiWDGYwrSgmJMNEg2GasH8/Hy/Hqk7aG+Sh2VSmKJLd4XmUK9Hug8CJcIpsOdIwpkQ5 Grdg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=X4a0J2xd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id z15-20020a056a00240f00b0051b90c123basi3236888pfh.127.2022.06.01.12.19.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Jun 2022 12:19:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=X4a0J2xd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id DDEAF157EA6; Wed, 1 Jun 2022 11:55:30 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1353140AbiFARfd (ORCPT + 99 others); Wed, 1 Jun 2022 13:35:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41436 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1352260AbiFARfa (ORCPT ); Wed, 1 Jun 2022 13:35:30 -0400 Received: from mail-lj1-x22a.google.com (mail-lj1-x22a.google.com [IPv6:2a00:1450:4864:20::22a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 964A4A5014 for ; Wed, 1 Jun 2022 10:35:29 -0700 (PDT) Received: by mail-lj1-x22a.google.com with SMTP id v9so2754852lja.12 for ; Wed, 01 Jun 2022 10:35:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=NTLfADh8lSfx6tLN8KBP3kdlF2/kw53HzSdkGJeezGo=; b=X4a0J2xdOaYaLyoglRcy+IjmYCqytQ1InubXGIgs1o/lCAUt07elZ+wctYLphPcvrg m57WjaEYd1NRbsT5XAACUuansZuvtzQzj/z/CBmPrAQ9DtjwA5RRoLtxxak8M3HiBUY6 TfMw0Z1S25638qgsrTmJ4/gmNs9i7WFK5I0ZPlcCX7tBcgCmDFhh2/zry8jQPUp+J91D H8BKtNGeBrHp95UTfZ130N6x7KPm8c1fTHLmJ6TGckZip9+2OlhAOAble8kdvPVLUEAj LMvt4V9gAa53NlQMBy28aWrisBQFIFmRxchIhRyKLTqagmCxuyHTe4PNpW/UwhX8saJe 1yBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=NTLfADh8lSfx6tLN8KBP3kdlF2/kw53HzSdkGJeezGo=; b=WWylPbFOLn9sZOzw//oANGbluOiPy49K4++O21/E1INMsoQCmPD2OJI1Jf0QsUXyKR Zx0Wr3Jj/WOsNONsWZ3zZA9wW+Tx6kViegCUbXSLVwjJdQyTg2RDGHbC96cigZAUVO+d 6rufQk4HmaZBIrEpxJ9P3kzHaPPhOxLzo1laYHU0HA2QdpNIZxIxL/XzfA/A88gXqdQM LEIeiyydmoPk8ASzsEH0Ni+UIUOTXgefFMwn/3Y7xwtIJ533SFhVvTeMIFWqXFwofVg4 +Sq1X26mbhhTenBoL3xWVCymMT0CcGpcnwqJ5h8vsCSNUivTZ/IfIaHfXDc/p1yUQkdA 3dmw== X-Gm-Message-State: AOAM531JTSsveGAlBp7I7D/JFXw8vVA+ZkXKKrCqxP3F8PXMqm7rfNFl AvMnyGdOwCyBSzxjswYF2avEcUYVlZ/mZA6uHXqD+w== X-Received: by 2002:a05:651c:179a:b0:247:d37b:6ec5 with SMTP id bn26-20020a05651c179a00b00247d37b6ec5mr37984487ljb.112.1654104927772; Wed, 01 Jun 2022 10:35:27 -0700 (PDT) MIME-Version: 1.0 References: <20220601010017.2639048-1-cmllamas@google.com> In-Reply-To: From: Todd Kjos Date: Wed, 1 Jun 2022 10:35:16 -0700 Message-ID: Subject: Re: [PATCH] binder: fix sender_euid type in uapi header To: Masahiro Yamada Cc: Carlos Llamas , Arnd Bergmann , Greg Kroah-Hartman , Todd Kjos , "Cc: Android Kernel" , Linux Kernel Mailing List , Christopher Ferris Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.5 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 1, 2022 at 9:53 AM Masahiro Yamada wrote: > > On Wed, Jun 1, 2022 at 10:00 AM Carlos Llamas wrote: > > > > The {pid,uid}_t fields of struct binder_transaction were recently > > replaced to use kernel types in commit 169adc2b6b3c ("android/binder.h: > > add linux/android/binder(fs).h to UAPI compile-test coverage"). > > > > However, using __kernel_uid_t here breaks backwards compatibility in > > architectures using 16-bits for this type, since glibc and some others > > still expect a 32-bit uid_t. Instead, let's use __kernel_uid32_t which > > avoids this compatibility problem. > > > > Fixes: 169adc2b6b3c ("android/binder.h: add linux/android/binder(fs).h to UAPI compile-test coverage") > > Reported-by: Christopher Ferris > > Signed-off-by: Carlos Llamas > > --- > > Ahhh, good catch. > > Thank you for fixing this! > > Reviewed-by: Masahiro Yamada Acked-by: Todd Kjos > > > > include/uapi/linux/android/binder.h | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/include/uapi/linux/android/binder.h b/include/uapi/linux/android/binder.h > > index 11157fae8a8e..688bcdaeed53 100644 > > --- a/include/uapi/linux/android/binder.h > > +++ b/include/uapi/linux/android/binder.h > > @@ -289,7 +289,7 @@ struct binder_transaction_data { > > /* General information about the transaction. */ > > __u32 flags; > > __kernel_pid_t sender_pid; > > - __kernel_uid_t sender_euid; > > + __kernel_uid32_t sender_euid; > > binder_size_t data_size; /* number of bytes of data */ > > binder_size_t offsets_size; /* number of bytes of offsets */ > > > > -- > > 2.36.1.255.ge46751e96f-goog > > > > > -- > Best Regards > Masahiro Yamada