Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp105008ybh; Mon, 20 Jul 2020 11:27:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy3Ge9DFoP6Y9HdOGgGxHCDIsI0AVFZl14ofWeWu16hB+JirgEoBqFbgpEunLf1Do5nZ7z1 X-Received: by 2002:a17:906:a253:: with SMTP id bi19mr21117857ejb.338.1595269620621; Mon, 20 Jul 2020 11:27:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595269620; cv=none; d=google.com; s=arc-20160816; b=oLxGW8z9qpdoP8ktajDwy+TrD9on4XLg76+E5Apxmxcp7vH1BvMdc8xMJhMcRdxY5A FjmjnuIqf2m8ESKs44pIWVzhubP6tr5+o9lZmHIzEKxj6axbvLvxRjDECF7KkaLycuUQ Nso6i2nNtY0MzAAG5iVqzFMrZbjqSfUVvQ6NtlHkRnsbaSuBJegFmyGuOgVlRiyYKACb M3c6UahXbgImrMUBA09V6t0VkzS3AUHi5XtkPY2YFAZADyuCNkc68cBVJT3FBKdLpJfl VqbAErrBWuOyFYwRwzAOYJKta3Frdw2diVF2PyrnEPoCWlYk37Az48mlRBM8RfJFUhXR QKPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=mYtPOu3+6Et/kxltzHexe0n0N7DSpTjVRyHcPXRKmCw=; b=IAoVuQK4IwPA3/pyEOVQPL2Fs6DzqdX2y/ZU7BwHjFLxsyDsN/FM+LznWQP0oPGIml BaOn6+dAowxXnM5jDOx2Lvpuw57Ce1+JUoa5lBZpJzbyqlWVSpDyp9DFyYqaEnMiiWQl 3yioS0DgmCey/IdPyJygNfhTvbu1T+Yuzb3DDjs0SDG+2PkO7AyKjhMHk0CWY0ni0kQ6 skjU/k6tZRN+07bRdU2M/RLxjDe1k8TEEzIEKRwO9e3OXtjblxiZIQEqtUXTsxGdql5p TVDPgZcYgc7URSoGsYfyoCZUtRFDbN/PhGlibVaSrsW54OaHTBKk9fMH9tpuobLQuhLD IYKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="ui/WFmlo"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lg17si11217536ejb.440.2020.07.20.11.26.37; Mon, 20 Jul 2020 11:27:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="ui/WFmlo"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729582AbgGTSX6 (ORCPT + 99 others); Mon, 20 Jul 2020 14:23:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36088 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726381AbgGTSX5 (ORCPT ); Mon, 20 Jul 2020 14:23:57 -0400 Received: from mail-ej1-x643.google.com (mail-ej1-x643.google.com [IPv6:2a00:1450:4864:20::643]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 27A95C061794 for ; Mon, 20 Jul 2020 11:23:56 -0700 (PDT) Received: by mail-ej1-x643.google.com with SMTP id o18so19065696eje.7 for ; Mon, 20 Jul 2020 11:23:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=mYtPOu3+6Et/kxltzHexe0n0N7DSpTjVRyHcPXRKmCw=; b=ui/WFmlokRzdDA5JN1GR5fdBq/UdFuxXFmj7ASkGwvwdeQH5Cd+w3vTSFoF5gUlaiV CD10FNPrnEwqMrxIDzhDOwx/IwCPewbSoTDhySKiU6dVEW2iERwIbgt90LUUMOV5ygij Stq7qqJdjVdfpcdGrmY9qJGlH/NiV4hXKLOUEZhdc9Xo7tdC9mvggPOoyBx4+QPpNNCW hs7Dq+C+Ex5KscAQsqdKfPyjrq/1i1twgoKM+hNMYCu+1bsZ2HOcSCxVkkgt+giJ1g70 K5BcJkaB/SamNI6vcJEMYUq1b56zYYMsEbMi89iq6qcBnrdqMS4TUrVFwdR154adJR6q OShg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=mYtPOu3+6Et/kxltzHexe0n0N7DSpTjVRyHcPXRKmCw=; b=Dxoy30FStc1bJnPY0dqQlxMA4Kl3YAZQ9v3yF1ZEbFpIi71MAXPnS0iPEagHBNkVPu bZ9jH8/Zgau37EYTcQd0N8EP785JMxHt7S9D2zoHpPbsJWvuxx2Qwn39HFPSLB/VpSwA HLVtozv0fzYbVVtGP+7NAIMv7K/wV9+6/mn1iL64gOCENoBQIpJ/7p3xQqaQq144gnRq jOeQzBsY2ChjpuYfaCrr4omiXY4Mx9Ck6bxDT9CryzIfhIVqNXByQBb6QZW6d/ClTPxM Lk/RZC+PDCXp8L6gOjtfzIZGrnIPwMRrloMDOYClh98sjyOF2wPpvNEDiX7iVn/YdDLu 9Hog== X-Gm-Message-State: AOAM532aMKgtjVvgLUr73cyM9inAa6Dr6TVaWbiGyddjdaYY2aLn+XA8 D7jna8rtsXKl7LLAGX7GPXdlRJbXGhaZE9MJb9CXiA== X-Received: by 2002:a17:906:c007:: with SMTP id e7mr21842223ejz.481.1595269434577; Mon, 20 Jul 2020 11:23:54 -0700 (PDT) MIME-Version: 1.0 References: <20200507085544.GB1097552@kroah.com> <1591791827-23871-1-git-send-email-Frankie.Chang@mediatek.com> <1591791827-23871-3-git-send-email-Frankie.Chang@mediatek.com> In-Reply-To: <1591791827-23871-3-git-send-email-Frankie.Chang@mediatek.com> From: Todd Kjos Date: Mon, 20 Jul 2020 11:23:43 -0700 Message-ID: Subject: Re: [PATCH v5 2/3] binder: add trace at free transaction. To: Frankie Chang Cc: Greg Kroah-Hartman , Joel Fernandes , Martijn Coenen , =?UTF-8?B?QXJ2ZSBIasO4bm5ldsOlZw==?= , Christian Brauner , LKML , linux-mediatek@lists.infradead.org, wsd_upstream , Jian-Min Liu Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 10, 2020 at 5:24 AM Frankie Chang wrote: > > From: "Frankie.Chang" > > Since the original trace_binder_transaction_received cannot > precisely present the real finished time of transaction, adding a > trace_binder_txn_latency_free at the point of free transaction > may be more close to it. > > Signed-off-by: Frankie.Chang > --- > drivers/android/binder.c | 2 ++ > drivers/android/binder_trace.h | 27 +++++++++++++++++++++++++++ > 2 files changed, 29 insertions(+) > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c > index 1592396..5ec9af8 100644 > --- a/drivers/android/binder.c > +++ b/drivers/android/binder.c > @@ -1523,6 +1523,7 @@ static void binder_free_transaction(struct binder_transaction *t) > * If the transaction has no target_proc, then > * t->buffer->transaction has already been cleared. > */ > + trace_binder_txn_latency_free(t); > binder_free_txn_fixups(t); > kfree(t); > binder_stats_deleted(BINDER_STAT_TRANSACTION); > @@ -3094,6 +3095,7 @@ static void binder_transaction(struct binder_proc *proc, > kfree(tcomplete); > binder_stats_deleted(BINDER_STAT_TRANSACTION_COMPLETE); > err_alloc_tcomplete_failed: > + trace_binder_txn_latency_free(t); > kfree(t); > binder_stats_deleted(BINDER_STAT_TRANSACTION); > err_alloc_t_failed: > diff --git a/drivers/android/binder_trace.h b/drivers/android/binder_trace.h > index 6731c3c..8ac87d1 100644 > --- a/drivers/android/binder_trace.h > +++ b/drivers/android/binder_trace.h > @@ -95,6 +95,33 @@ > __entry->thread_todo) > ); > > +TRACE_EVENT(binder_txn_latency_free, > + TP_PROTO(struct binder_transaction *t), > + TP_ARGS(t), > + TP_STRUCT__entry( > + __field(int, debug_id) > + __field(int, from_proc) > + __field(int, from_thread) > + __field(int, to_proc) > + __field(int, to_thread) > + __field(unsigned int, code) > + __field(unsigned int, flags) > + ), > + TP_fast_assign( > + __entry->debug_id = t->debug_id; > + __entry->from_proc = t->from ? t->from->proc->pid : 0; > + __entry->from_thread = t->from ? t->from->pid : 0; > + __entry->to_proc = t->to_proc ? t->to_proc->pid : 0; > + __entry->to_thread = t->to_thread ? t->to_thread->pid : 0; t->to_proc and t->to_thread are not safe to dereference without holding t->lock. If the target process dies, these fields can be set to NULL > + __entry->code = t->code; > + __entry->flags = t->flags; > + ), > + TP_printk("transaction=%d from %d:%d to %d:%d flags=0x%x code=0x%x", > + __entry->debug_id, __entry->from_proc, __entry->from_thread, > + __entry->to_proc, __entry->to_thread, __entry->code, > + __entry->flags) > +); > + > TRACE_EVENT(binder_transaction, > TP_PROTO(bool reply, struct binder_transaction *t, > struct binder_node *target_node), > -- > 1.7.9.5