Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757432AbdLPVpd (ORCPT ); Sat, 16 Dec 2017 16:45:33 -0500 Received: from mail-pl0-f68.google.com ([209.85.160.68]:35184 "EHLO mail-pl0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757293AbdLPViJ (ORCPT ); Sat, 16 Dec 2017 16:38:09 -0500 X-Google-Smtp-Source: ACJfBovUimO0U9E+WzZ0oszlY4fE5ZOqRsdAsaIHV0Ss/QoPt0MQbk07SqN+/sNbQ74zGGdvkivxZQ== From: Harsh Shandilya To: devel@driverdev.osuosl.org Cc: Harsh Shandilya , Greg Kroah-Hartman , Todd Kjos , Martijn Coenen , linux-kernel@vger.kernel.org Subject: [PATCH 1/1] drivers: android: Cleanup warnings Date: Sun, 17 Dec 2017 03:07:55 +0530 Message-Id: <20171216213755.4612-1-msfjarvis@gmail.com> X-Mailer: git-send-email 2.15.0.631.g7ddcec0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6686 Lines: 179 Ran checkpatch across the entire drivers/android directory and fixed all relevant warnings. Summary of changes done: -> Convert all symbolic permissions into their octal equivalents. -> Use "%s", __func__ in logging macros where the function name was previously hard-coded. -> Add a blank line to separate declarations from statements according to the kernel coding style guidelines. -> Fix linelength issues wherever possible. -> Fix-up a commented out statement to use // in place of /* */ to silence checkpatch. Most line-length warnings were ignored in favor of code readability. Cc: Greg Kroah-Hartman Cc: Todd Kjos Cc: Martijn Coenen Cc: devel@driverdev.osuosl.org Cc: linux-kernel@vger.kernel.org Signed-off-by: Harsh Shandilya --- drivers/android/binder.c | 39 ++++++++++++++++++++++----------------- drivers/android/binder_alloc.c | 1 + 2 files changed, 23 insertions(+), 17 deletions(-) diff --git a/drivers/android/binder.c b/drivers/android/binder.c index bccec9de0533..2c06a42a6d9a 100644 --- a/drivers/android/binder.c +++ b/drivers/android/binder.c @@ -141,7 +141,7 @@ enum { }; static uint32_t binder_debug_mask = BINDER_DEBUG_USER_ERROR | BINDER_DEBUG_FAILED_TRANSACTION | BINDER_DEBUG_DEAD_TRANSACTION; -module_param_named(debug_mask, binder_debug_mask, uint, S_IWUSR | S_IRUGO); +module_param_named(debug_mask, binder_debug_mask, uint, 0644); static char *binder_devices_param = CONFIG_ANDROID_BINDER_DEVICES; module_param_named(devices, binder_devices_param, charp, 0444); @@ -160,7 +160,7 @@ static int binder_set_stop_on_user_error(const char *val, return ret; } module_param_call(stop_on_user_error, binder_set_stop_on_user_error, - param_get_int, &binder_stop_on_user_error, S_IWUSR | S_IRUGO); + param_get_int, &binder_stop_on_user_error, 0644); #define binder_debug(mask, x...) \ do { \ @@ -3250,6 +3250,7 @@ static int binder_thread_write(struct binder_proc *proc, ret = -1; if (increment && !target) { struct binder_node *ctx_mgr_node; + mutex_lock(&context->context_mgr_node_lock); ctx_mgr_node = context->binder_context_mgr_node; if (ctx_mgr_node) @@ -3356,7 +3357,8 @@ static int binder_thread_write(struct binder_proc *proc, binder_debug(BINDER_DEBUG_USER_REFS, "%d:%d %s node %d ls %d lw %d tr %d\n", proc->pid, thread->pid, - cmd == BC_INCREFS_DONE ? "BC_INCREFS_DONE" : "BC_ACQUIRE_DONE", + cmd == BC_INCREFS_DONE ? "BC_INCREFS_DONE" : + "BC_ACQUIRE_DONE", node->debug_id, node->local_strong_refs, node->local_weak_refs, node->tmp_refs); binder_node_inner_unlock(node); @@ -3394,7 +3396,8 @@ static int binder_thread_write(struct binder_proc *proc, "%d:%d BC_FREE_BUFFER u%016llx found buffer %d for %s transaction\n", proc->pid, thread->pid, (u64)data_ptr, buffer->debug_id, - buffer->transaction ? "active" : "finished"); + buffer->transaction ? "active" : + "finished"); if (buffer->transaction) { buffer->transaction->buffer = NULL; @@ -3858,7 +3861,8 @@ static int binder_thread_read(struct binder_proc *proc, binder_stats_deleted(BINDER_STAT_TRANSACTION_COMPLETE); } break; case BINDER_WORK_NODE: { - struct binder_node *node = container_of(w, struct binder_node, work); + struct binder_node *node = + container_of(w, struct binder_node, work); int strong, weak; binder_uintptr_t node_ptr = node->ptr; binder_uintptr_t node_cookie = node->cookie; @@ -4467,8 +4471,8 @@ static long binder_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) unsigned int size = _IOC_SIZE(cmd); void __user *ubuf = (void __user *)arg; - /*pr_info("binder_ioctl: %d:%d %x %lx\n", - proc->pid, current->pid, cmd, arg);*/ + // pr_info("%s: %d:%d %x %lx\n", + // __func__, proc->pid, current->pid, cmd, arg); binder_selftest_alloc(&proc->alloc); @@ -4631,8 +4635,9 @@ static int binder_mmap(struct file *filp, struct vm_area_struct *vma) return 0; err_bad_arg: - pr_err("binder_mmap: %d %lx-%lx %s failed %d\n", - proc->pid, vma->vm_start, vma->vm_end, failure_string, ret); + pr_err("%s: %d %lx-%lx %s failed %d\n", + __func__, proc->pid, vma->vm_start, vma->vm_end, + failure_string, ret); return ret; } @@ -4641,8 +4646,8 @@ static int binder_open(struct inode *nodp, struct file *filp) struct binder_proc *proc; struct binder_device *binder_dev; - binder_debug(BINDER_DEBUG_OPEN_CLOSE, "binder_open: %d:%d\n", - current->group_leader->pid, current->pid); + binder_debug(BINDER_DEBUG_OPEN_CLOSE, "%s: %d:%d\n", + __func__, current->group_leader->pid, current->pid); proc = kzalloc(sizeof(*proc), GFP_KERNEL); if (proc == NULL) @@ -4679,7 +4684,7 @@ static int binder_open(struct inode *nodp, struct file *filp) * anyway print all contexts that a given PID has, so this * is not a problem. */ - proc->debugfs_entry = debugfs_create_file(strbuf, S_IRUGO, + proc->debugfs_entry = debugfs_create_file(strbuf, 0444, binder_debugfs_dir_entry_proc, (void *)(unsigned long)proc->pid, &binder_proc_fops); @@ -5518,27 +5523,27 @@ static int __init binder_init(void) if (binder_debugfs_dir_entry_root) { debugfs_create_file("state", - S_IRUGO, + 0444, binder_debugfs_dir_entry_root, NULL, &binder_state_fops); debugfs_create_file("stats", - S_IRUGO, + 0444, binder_debugfs_dir_entry_root, NULL, &binder_stats_fops); debugfs_create_file("transactions", - S_IRUGO, + 0444, binder_debugfs_dir_entry_root, NULL, &binder_transactions_fops); debugfs_create_file("transaction_log", - S_IRUGO, + 0444, binder_debugfs_dir_entry_root, &binder_transaction_log, &binder_transaction_log_fops); debugfs_create_file("failed_transaction_log", - S_IRUGO, + 0444, binder_debugfs_dir_entry_root, &binder_transaction_log_failed, &binder_transaction_log_fops); diff --git a/drivers/android/binder_alloc.c b/drivers/android/binder_alloc.c index 6f6f745605af..36b3d4d1730b 100644 --- a/drivers/android/binder_alloc.c +++ b/drivers/android/binder_alloc.c @@ -527,6 +527,7 @@ static void binder_delete_free_buffer(struct binder_alloc *alloc, { struct binder_buffer *prev, *next = NULL; bool to_free = true; + BUG_ON(alloc->buffers.next == &buffer->entry); prev = binder_buffer_prev(buffer); BUG_ON(!prev->free); -- 2.15.0.631.g7ddcec0