Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2202450ybe; Tue, 3 Sep 2019 09:20:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqwgIIA/7rMNjv1ADQrM9dKPZ5Q7WRDAH9QdbORIaEuP/FzffK9geyq4PSrHytodcl67e6zV X-Received: by 2002:a63:205f:: with SMTP id r31mr31226995pgm.159.1567527622878; Tue, 03 Sep 2019 09:20:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567527622; cv=none; d=google.com; s=arc-20160816; b=kQVedpaoocsqWXn8TAF33ZS/8uD0TMFmanC5aIF0kwLZrh4YhxCMycZj7APtlFwnr9 4xuowq4cLC5H9k9PIxjqwclJMc4BuAoe6g8lztFZ3WbJafSiMSUDd4jvdaa3xTi3JiJZ c9LBuBuguyPVLRlEjRNSsdd7zlERo5ax8nCK0/O+z2oiiYUYrwk45qXVQNiyOcYXqwML cNZv5vMvgDEtrVNBQOSiDKywYNAqnVkFhAzqfaueC2wnc5hUH5TWhR7nA5zDGKL9Ga5H 1LOfByunGJ0FPxgHz+g1t0qb9V/XHE02R8fyJYWr6nuAo8YsgzlB9venKk+w98Xz0lTe 2sBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=dmiOATAqQyCo7lDcckxvNROZCBcaSq8xNO80WhRvGcQ=; b=NI/QinB4FRX4Blwp5682DgXKQ3ToYj9F/ohU++JP8sBMoS5nUGs9OL5ysbGGMuKGQy g2lvwfD/mFYImgLYxXRK76TtpT1/x3xDdDHCUtsxrRfStfmnjqcUnl51Zd6i4JjekNRq iOhjVMff/xgQPwp5ojStBkuinkK3hJ5yNuI3ZemqakMZ1qTQAHFYClKCC3TLSwFCLzR0 wQ+DD0WauABmRoQH6Q5usWjPOVXhh08LU/vZjikVapuWO1ETJLO8FsFkZ1r+Y9pMoRX0 m3gxPxujgQabvkCwklK9amtb77ZamJyZpCHf18O6Q4N703u2qay6sF3VmUBVdqdmF6hg GEbg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=TsI58MWS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t13si5587595pfe.247.2019.09.03.09.20.06; Tue, 03 Sep 2019 09:20:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=TsI58MWS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730056AbfICQRT (ORCPT + 99 others); Tue, 3 Sep 2019 12:17:19 -0400 Received: from mail-pf1-f202.google.com ([209.85.210.202]:38362 "EHLO mail-pf1-f202.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730032AbfICQRS (ORCPT ); Tue, 3 Sep 2019 12:17:18 -0400 Received: by mail-pf1-f202.google.com with SMTP id b8so14430229pfd.5 for ; Tue, 03 Sep 2019 09:17:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=dmiOATAqQyCo7lDcckxvNROZCBcaSq8xNO80WhRvGcQ=; b=TsI58MWS7f3U530lYsTZ6jA8H7TUbzJ2lAbG8FMV/MmP5L5tNdJN3ouegaSQiZCY6Y eYlSv5o/JvvUFo5sX+8NScDGK90div5hmZTLowMOGImoOqZs5wvu7AN+FCWoWJqKvzpi 1TlC84q0JN99nxyeW9VMuepXdkSwFxQjxeuSjZUqxNAPKrdP/ck0oPSc1U8FiohkTVBG 4pyyyLAu0+puqL3YX0Sy4iaq80cmxPr9J4iW1N25AXPGJAy/4qU0fkRWdV3dH164xnh0 OGWECsP4FIvmTEyIEwLtrrW6sNP+eHm8b+m0CBBpHi+dVT7EmRgO7trbiaioIABx8vIF s3bA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=dmiOATAqQyCo7lDcckxvNROZCBcaSq8xNO80WhRvGcQ=; b=UU5X94nTF1XlfLqTa03ejpBZDdhYmJfA/SMvrE9CCmvIUoX1mH3VqdI/jP9s8A8+IW NEYxbWkYFECmcPzMwsRg5eYdPzaKT52Ddm//cN+LRABNtnyOWi5OjfZWfQ+CkU8TD32S R41Hlms5j9pkSI0CPSRK9NUOasSgpE6QKELhEHbrq33wjPeXdaa431+cVp4Q4G2pN2Ma D3zWbO9Ar7WDHaWMlNLk3NDsYs3gJ62pM/sTJf6RzWwF8ur285NS7exlIKVFVu6W2Tmm aQZbunXEcl2IlvigX00ZPQxp+OITnFVi1M+D1dMnaq4o8yZA0OX0JwdM+lzkRpYMCU9m 4VUw== X-Gm-Message-State: APjAAAWsF4RWB+CZoiCCDg53UwahI6YU/IBCl8FmvmXUynVOIGQSBGDM 36Jsyb28bmQ1r9erFi7yL/JwTZ80soo= X-Received: by 2002:a63:58c:: with SMTP id 134mr3887883pgf.106.1567527437205; Tue, 03 Sep 2019 09:17:17 -0700 (PDT) Date: Tue, 3 Sep 2019 09:16:54 -0700 In-Reply-To: <20190903161655.107408-1-hridya@google.com> Message-Id: <20190903161655.107408-4-hridya@google.com> Mime-Version: 1.0 References: <20190903161655.107408-1-hridya@google.com> X-Mailer: git-send-email 2.23.0.187.g17f5b7556c-goog Subject: [PATCH v3 3/4] binder: Make transaction_log available in binderfs From: Hridya Valsaraju To: Greg Kroah-Hartman , "=?UTF-8?q?Arve=20Hj=C3=B8nnev=C3=A5g?=" , Todd Kjos , Martijn Coenen , Joel Fernandes , Christian Brauner , devel@driverdev.osuosl.org, linux-kernel@vger.kernel.org Cc: kernel-team@android.com, Hridya Valsaraju , Christian Brauner Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently, the binder transaction log files 'transaction_log' and 'failed_transaction_log' live in debugfs at the following locations: /sys/kernel/debug/binder/failed_transaction_log /sys/kernel/debug/binder/transaction_log This patch makes these files also available in a binderfs instance mounted with the mount option "stats=global". It does not affect the presence of these files in debugfs. If a binderfs instance is mounted at path /dev/binderfs, the location of these files will be as follows: /dev/binderfs/binder_logs/failed_transaction_log /dev/binderfs/binder_logs/transaction_log This change provides an alternate option to access these files when debugfs is not mounted. Acked-by: Christian Brauner Signed-off-by: Hridya Valsaraju --- Changes in v2: -Consistent variable naming accross functions as per Christian Brauner. drivers/android/binder.c | 34 +++++-------------------------- drivers/android/binder_internal.h | 30 +++++++++++++++++++++++++++ drivers/android/binderfs.c | 18 ++++++++++++++++ 3 files changed, 53 insertions(+), 29 deletions(-) diff --git a/drivers/android/binder.c b/drivers/android/binder.c index de795bd229c4..bed217310197 100644 --- a/drivers/android/binder.c +++ b/drivers/android/binder.c @@ -197,30 +197,8 @@ static inline void binder_stats_created(enum binder_stat_types type) atomic_inc(&binder_stats.obj_created[type]); } -struct binder_transaction_log_entry { - int debug_id; - int debug_id_done; - int call_type; - int from_proc; - int from_thread; - int target_handle; - int to_proc; - int to_thread; - int to_node; - int data_size; - int offsets_size; - int return_error_line; - uint32_t return_error; - uint32_t return_error_param; - const char *context_name; -}; -struct binder_transaction_log { - atomic_t cur; - bool full; - struct binder_transaction_log_entry entry[32]; -}; -static struct binder_transaction_log binder_transaction_log; -static struct binder_transaction_log binder_transaction_log_failed; +struct binder_transaction_log binder_transaction_log; +struct binder_transaction_log binder_transaction_log_failed; static struct binder_transaction_log_entry *binder_transaction_log_add( struct binder_transaction_log *log) @@ -6166,7 +6144,7 @@ static void print_binder_transaction_log_entry(struct seq_file *m, "\n" : " (incomplete)\n"); } -static int transaction_log_show(struct seq_file *m, void *unused) +int binder_transaction_log_show(struct seq_file *m, void *unused) { struct binder_transaction_log *log = m->private; unsigned int log_cur = atomic_read(&log->cur); @@ -6198,8 +6176,6 @@ const struct file_operations binder_fops = { .release = binder_release, }; -DEFINE_SHOW_ATTRIBUTE(transaction_log); - static int __init init_binder_device(const char *name) { int ret; @@ -6268,12 +6244,12 @@ static int __init binder_init(void) 0444, binder_debugfs_dir_entry_root, &binder_transaction_log, - &transaction_log_fops); + &binder_transaction_log_fops); debugfs_create_file("failed_transaction_log", 0444, binder_debugfs_dir_entry_root, &binder_transaction_log_failed, - &transaction_log_fops); + &binder_transaction_log_fops); } if (!IS_ENABLED(CONFIG_ANDROID_BINDERFS) && diff --git a/drivers/android/binder_internal.h b/drivers/android/binder_internal.h index 12ef96f256c6..b9be42d9464c 100644 --- a/drivers/android/binder_internal.h +++ b/drivers/android/binder_internal.h @@ -65,4 +65,34 @@ DEFINE_SHOW_ATTRIBUTE(binder_state); int binder_transactions_show(struct seq_file *m, void *unused); DEFINE_SHOW_ATTRIBUTE(binder_transactions); + +int binder_transaction_log_show(struct seq_file *m, void *unused); +DEFINE_SHOW_ATTRIBUTE(binder_transaction_log); + +struct binder_transaction_log_entry { + int debug_id; + int debug_id_done; + int call_type; + int from_proc; + int from_thread; + int target_handle; + int to_proc; + int to_thread; + int to_node; + int data_size; + int offsets_size; + int return_error_line; + uint32_t return_error; + uint32_t return_error_param; + const char *context_name; +}; + +struct binder_transaction_log { + atomic_t cur; + bool full; + struct binder_transaction_log_entry entry[32]; +}; + +extern struct binder_transaction_log binder_transaction_log; +extern struct binder_transaction_log binder_transaction_log_failed; #endif /* _LINUX_BINDER_INTERNAL_H */ diff --git a/drivers/android/binderfs.c b/drivers/android/binderfs.c index 01c1db463053..9bb54fd3a48a 100644 --- a/drivers/android/binderfs.c +++ b/drivers/android/binderfs.c @@ -630,6 +630,24 @@ static int init_binder_logs(struct super_block *sb) dentry = binderfs_create_file(binder_logs_root_dir, "transactions", &binder_transactions_fops, NULL); + if (IS_ERR(dentry)) { + ret = PTR_ERR(dentry); + goto out; + } + + dentry = binderfs_create_file(binder_logs_root_dir, + "transaction_log", + &binder_transaction_log_fops, + &binder_transaction_log); + if (IS_ERR(dentry)) { + ret = PTR_ERR(dentry); + goto out; + } + + dentry = binderfs_create_file(binder_logs_root_dir, + "failed_transaction_log", + &binder_transaction_log_fops, + &binder_transaction_log_failed); if (IS_ERR(dentry)) ret = PTR_ERR(dentry); -- 2.23.0.187.g17f5b7556c-goog