Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1356697pxj; Fri, 18 Jun 2021 05:32:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxJPPLQovW9KcqLcr6mTtudvW1FkHTfHqYXDgHpeyg50NoLmMOCYxkOXbdeDq5ndYyifJDG X-Received: by 2002:a05:6402:111a:: with SMTP id u26mr4526578edv.260.1624019545141; Fri, 18 Jun 2021 05:32:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624019545; cv=none; d=google.com; s=arc-20160816; b=vmB+jlilwxE+L9o+hEqzi9wtvA1DrAFKqEzIA6LY/scMTI6B14EXdsw5bpLklU+YQ/ OyCfSOOpnePNyQ73KHoUDd6RWu1KYNtheBUGu30l4bwZyx5JZPzXAqzVoN7t/zR/Wcq2 gRz6pWxELX49KY9TWSHeyntkPsWuOejkEbXe/WpHYLhdk8mUY0pTJdavjxUYPxxQItqE hhSZobyNp8bUvoIqnpagHEb4kqh+0suJtIi4QiXnxjNdu0XVVApLyK2k4RtxPO2VKNdu 4jmIa/sC5tQD1Tkdt8YUgLN6hrExaAoDghCzNd5kRapYa8iA9M1+TNJU2LwroHEjnDeS GjIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=QvIQ/189BE8H+DzpKdzdTASFyEDefC9hQKztqsrIPfs=; b=OWttUirTQxaneIE2PWbhQshdauEkNnBloARfHnMIu/+jSLNteCcrkoQ6JzuxaZ0a4S DQ68TR8sSGs7fjJ5XTm1rheWazmmtvhlcg/4N/cFr5Y4T1A6/TOgYJCd37T+FYaaKZ5Z DFH0oa01yhthKC1l6VEvGDsy2NvhnF4GqbTQN5ZpkE5wOgJog3GK/0MYX6qy1vdoT7c4 PxPOWYUMMZo3ozWCHP2AVT+w1zuNTbwYARjV0MFwpGjtpStY5Ho1CjWoBvvWf0CDidOg SX+TWpkbMjmiqF9zeLqSuzDgVFa1OrVRrv9hWcrfF3T/IfREOftpvqoPmbXDkPBrHP26 puKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1W6vyZoS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ce4si2349300ejc.739.2021.06.18.05.32.01; Fri, 18 Jun 2021 05:32:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1W6vyZoS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232682AbhFRKZe (ORCPT + 99 others); Fri, 18 Jun 2021 06:25:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:45860 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230329AbhFRKZc (ORCPT ); Fri, 18 Jun 2021 06:25:32 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 05E3361159; Fri, 18 Jun 2021 10:23:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1624011802; bh=1ZxM0FCMwZiZghnpuKtTVnbmtQtc1YYDd9NZGwlFpFs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=1W6vyZoSBAzSTkWS0wOYbBIg/Im0WwpOf6bKl5rB8OP6GFC9KMgPkw/eeMzF/ciJb fF46LcniH39Hh22MSaVob/xpHsnZrUeph+8WYIeIys6v9Gju4c69MzPCJHLIyLy9JL UgHb0ADE67tnbQGdyKbMb6FKLCojIH4s9i1BNaxw= Date: Fri, 18 Jun 2021 12:23:20 +0200 From: Greg KH To: liuhailong Cc: arve@android.com, tkjos@android.com, maco@android.com, joel@joelfernandes.org, christian@brauner.io, hridya@google.com, surenb@google.com, linux-kernel@vger.kernel.org, linux-staging@lists.linux.dev Subject: Re: [PATCH] staging: android: ashmem: add size field in procfs fdinfo Message-ID: References: <20210618095035.32410-1-liuhailong@oppo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210618095035.32410-1-liuhailong@oppo.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 18, 2021 at 05:50:35PM +0800, liuhailong wrote: > add this information to help user to find ashmem problem. > > ashmem leak scenario: > -000|fd = ashmem_create_region > -001|mmap and pagefault > -002|munmap > -003|forget close(fd) <---- which lead to ashmem leak > > Signed-off-by: liuhailong > --- > drivers/staging/android/ashmem.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/drivers/staging/android/ashmem.c b/drivers/staging/android/ashmem.c > index d66a64e42273..ee2fd75111d8 100644 > --- a/drivers/staging/android/ashmem.c > +++ b/drivers/staging/android/ashmem.c > @@ -894,6 +894,8 @@ static void ashmem_show_fdinfo(struct seq_file *m, struct file *file) > seq_printf(m, "name:\t%s\n", > asma->name + ASHMEM_NAME_PREFIX_LEN); > > + seq_printf(m, "size:\t%zu\n", asma->size); > + > mutex_unlock(&ashmem_mutex); > } > #endif > -- > 2.30.2 > > As you are changing a user-facing proc file, what tools will break now that you have added a new line? What tools do you use to look at this file and what has been modified to handle the change? thanks, greg k-h