Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp826250ybl; Wed, 28 Aug 2019 06:01:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqzGNsfJllpIoi5/BBbkgQfj2BnJDb0/kblY6A3y6Zims2CzFHMgXi+tyysVZytReLWTnA5r X-Received: by 2002:a17:90a:30ad:: with SMTP id h42mr4065540pjb.31.1566997291768; Wed, 28 Aug 2019 06:01:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566997291; cv=none; d=google.com; s=arc-20160816; b=LttPjrfw3Gan4bLznbWKYBMAOu6ahyzgze3D2gguQDyNIG95Hnvvlw/ExDRy2WbiZC TRZJEMaFnc6fET99C7alXtc0A2xVd01sEsQ3GM7z+B6VHYx+n9dMIeDC5c3KmeMGfKDm ZltCxTOu+xeqGKjG6gyGjOu8HT11z/4c1X4o663NtQarBigQ9646+mJtMYTiRmIvzIWE xFeoaazSjc1TcdwU5jhMHdmubVG4SmZsJr4/YFi4wvEj8Djcz66sU8s3FkH/GkCALM2D mkIeqtNN5AJfMGVAn9p9s5TODO4Gg2mhtq1mgQlF+gO2qaRlg2dtj3YXWDSzVBfaf/3R 2w7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=gzD6v3gDgiLNuIp8o6MdB6TrviepT6nUcsRXixU1XNY=; b=V+Pg0KgWQSn2EQHTPwsFZ5Dm9TNBuI7Jf+VxRMK/83k5AykQkiNkp5o048mZh+TnN3 ZWOzx+GOz9qpe45s7M27263HHme4AUxFcn43X2MynJOe394P8MLFWzMwX1gpm4020y+d 08DP+orxoRJNxt18glJEOkwE2N9xpUPlCdWWYmwIxDei34qqARRalhDy8tClIcVGyMs+ moY9BzOS8+a49wWyL3pws/t0U1dKNiuAn7UY45o6td25Am7YqWBjhNLMlSRGNex/vp3W ZqzTXBNdQyXputZ1/0suA3BoaJWYlXmIU6JIyc2x5e2439GW8AZ9dWQw/juVe1ZO4cjd +XqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h4si2388243pfo.131.2019.08.28.06.01.15; Wed, 28 Aug 2019 06:01:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726658AbfH1NAB (ORCPT + 99 others); Wed, 28 Aug 2019 09:00:01 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:42037 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726554AbfH1NAA (ORCPT ); Wed, 28 Aug 2019 09:00:00 -0400 Received: from [213.220.153.21] (helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.76) (envelope-from ) id 1i2xYI-0003uK-85; Wed, 28 Aug 2019 12:59:54 +0000 Date: Wed, 28 Aug 2019 14:59:53 +0200 From: Christian Brauner To: Hridya Valsaraju Cc: Greg Kroah-Hartman , Arve =?utf-8?B?SGrDuG5uZXbDpWc=?= , Todd Kjos , Martijn Coenen , Joel Fernandes , Christian Brauner , devel@driverdev.osuosl.org, linux-kernel@vger.kernel.org, kernel-team@android.com Subject: Re: [PATCH 3/4] binder: Make transaction_log available in binderfs Message-ID: <20190828125952.ivvlxybw35kj67rj@wittgenstein> References: <20190827204152.114609-1-hridya@google.com> <20190827204152.114609-4-hridya@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20190827204152.114609-4-hridya@google.com> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 27, 2019 at 01:41:51PM -0700, Hridya Valsaraju wrote: > Currently, the binder transaction log files 'transaction_log' > and 'failed_transaction_log' live in debugfs at the following locations: > > /sys/kernel/debug/binder/failed_transaction_log > /sys/kernel/debug/binder/transaction_log > > This patch makes these files also available in a binderfs instance > mounted with the mount option "stats=global". > It does not affect the presence of these files in debugfs. > If a binderfs instance is mounted at path /dev/binderfs, the location of > these files will be as follows: > > /dev/binderfs/binder_logs/failed_transaction_log > /dev/binderfs/binder_logs/transaction_log > > This change provides an alternate option to access these files when > debugfs is not mounted. > > Signed-off-by: Hridya Valsaraju Acked-by: Christian Brauner > --- > drivers/android/binder.c | 34 +++++-------------------------- > drivers/android/binder_internal.h | 30 +++++++++++++++++++++++++++ > drivers/android/binderfs.c | 19 +++++++++++++++++ > 3 files changed, 54 insertions(+), 29 deletions(-) > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c > index de795bd229c4..bed217310197 100644 > --- a/drivers/android/binder.c > +++ b/drivers/android/binder.c > @@ -197,30 +197,8 @@ static inline void binder_stats_created(enum binder_stat_types type) > atomic_inc(&binder_stats.obj_created[type]); > } > > -struct binder_transaction_log_entry { > - int debug_id; > - int debug_id_done; > - int call_type; > - int from_proc; > - int from_thread; > - int target_handle; > - int to_proc; > - int to_thread; > - int to_node; > - int data_size; > - int offsets_size; > - int return_error_line; > - uint32_t return_error; > - uint32_t return_error_param; > - const char *context_name; > -}; > -struct binder_transaction_log { > - atomic_t cur; > - bool full; > - struct binder_transaction_log_entry entry[32]; > -}; > -static struct binder_transaction_log binder_transaction_log; > -static struct binder_transaction_log binder_transaction_log_failed; > +struct binder_transaction_log binder_transaction_log; > +struct binder_transaction_log binder_transaction_log_failed; > > static struct binder_transaction_log_entry *binder_transaction_log_add( > struct binder_transaction_log *log) > @@ -6166,7 +6144,7 @@ static void print_binder_transaction_log_entry(struct seq_file *m, > "\n" : " (incomplete)\n"); > } > > -static int transaction_log_show(struct seq_file *m, void *unused) > +int binder_transaction_log_show(struct seq_file *m, void *unused) > { > struct binder_transaction_log *log = m->private; > unsigned int log_cur = atomic_read(&log->cur); > @@ -6198,8 +6176,6 @@ const struct file_operations binder_fops = { > .release = binder_release, > }; > > -DEFINE_SHOW_ATTRIBUTE(transaction_log); > - > static int __init init_binder_device(const char *name) > { > int ret; > @@ -6268,12 +6244,12 @@ static int __init binder_init(void) > 0444, > binder_debugfs_dir_entry_root, > &binder_transaction_log, > - &transaction_log_fops); > + &binder_transaction_log_fops); > debugfs_create_file("failed_transaction_log", > 0444, > binder_debugfs_dir_entry_root, > &binder_transaction_log_failed, > - &transaction_log_fops); > + &binder_transaction_log_fops); > } > > if (!IS_ENABLED(CONFIG_ANDROID_BINDERFS) && > diff --git a/drivers/android/binder_internal.h b/drivers/android/binder_internal.h > index 12ef96f256c6..b9be42d9464c 100644 > --- a/drivers/android/binder_internal.h > +++ b/drivers/android/binder_internal.h > @@ -65,4 +65,34 @@ DEFINE_SHOW_ATTRIBUTE(binder_state); > > int binder_transactions_show(struct seq_file *m, void *unused); > DEFINE_SHOW_ATTRIBUTE(binder_transactions); > + > +int binder_transaction_log_show(struct seq_file *m, void *unused); > +DEFINE_SHOW_ATTRIBUTE(binder_transaction_log); > + > +struct binder_transaction_log_entry { > + int debug_id; > + int debug_id_done; > + int call_type; > + int from_proc; > + int from_thread; > + int target_handle; > + int to_proc; > + int to_thread; > + int to_node; > + int data_size; > + int offsets_size; > + int return_error_line; > + uint32_t return_error; > + uint32_t return_error_param; > + const char *context_name; > +}; > + > +struct binder_transaction_log { > + atomic_t cur; > + bool full; > + struct binder_transaction_log_entry entry[32]; > +}; > + > +extern struct binder_transaction_log binder_transaction_log; > +extern struct binder_transaction_log binder_transaction_log_failed; > #endif /* _LINUX_BINDER_INTERNAL_H */ > diff --git a/drivers/android/binderfs.c b/drivers/android/binderfs.c > index d542f9b8d8ab..dc25a7d759c9 100644 > --- a/drivers/android/binderfs.c > +++ b/drivers/android/binderfs.c > @@ -630,8 +630,27 @@ static int init_binder_logs(struct super_block *sb) > > file_dentry = binderfs_create_file(binder_logs_root_dir, "transactions", > &binder_transactions_fops, NULL); > + if (IS_ERR(file_dentry)) { > + ret = PTR_ERR(file_dentry); > + goto out; > + } > + > + file_dentry = binderfs_create_file(binder_logs_root_dir, > + "transaction_log", > + &binder_transaction_log_fops, > + &binder_transaction_log); > + if (IS_ERR(file_dentry)) { > + ret = PTR_ERR(file_dentry); > + goto out; > + } > + > + file_dentry = binderfs_create_file(binder_logs_root_dir, > + "failed_transaction_log", > + &binder_transaction_log_fops, > + &binder_transaction_log_failed); > if (IS_ERR(file_dentry)) > ret = PTR_ERR(file_dentry); > + > out: > return ret; > } > -- > 2.23.0.187.g17f5b7556c-goog >