Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp282835pxa; Fri, 31 Jul 2020 11:52:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwV7UgqJ/LhglGjpSSTRC8OjKRZPjhBo1PM+qT3s5zzaYFMQ/5NMmRIsYsfnshYfy784kNi X-Received: by 2002:aa7:d6c2:: with SMTP id x2mr1745738edr.332.1596221557327; Fri, 31 Jul 2020 11:52:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596221557; cv=none; d=google.com; s=arc-20160816; b=y45cw/lX7oaMMU1VGas6Eucd6kU08hzScQjhispQp6snozBkxrH5GjYQzQJBCdPlOf j+CbrixZHRgqo4km8ogzKwUuK547Aky7YqswSQz7HzlB0TT8/mXIGIUttEQNXVSL1t7C jUGhKRTsruPhswYn2FB6LPZBdBQy0w7UIK6gToWRh3j7Y+RI9HXzYVrpzdDjyA+VyFT4 0RIO4h3bW6mncfmfQ0f4jZig2j7wl/LjpdmBQicFb8HUipc/q+VTtI4LhUPi/cOmBvu6 KQKyvzGe4yDUzw4+ZGR6NOaevFaYvqmgCo42TnZqIIiXRCGGMKn0i7AJPeUZ2+4rUGj1 zPYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=H1yxWveFbgcxmN3Okh0JmdDmTWWm3AmW1DCmR+UkLwo=; b=XGp5o3U+qbFM64nRh51K9lUUbrYzO+YgzHKzLVdc+SyIhrvDqicrU5nqV+QqTMj/Gc g0OP/MMO4RM5xj/lXW2fQub58tRemO+9zgdXz+PXk0rI+9HGXB/hSBXmOQZYdaSF+wN9 QH6dxagnv1JTP3KRr2XpI61qhpAPiROiy4RRiAWyicQLgkPhMSVWrUed8hA7KYa6yquk 9pzqDK/iCgOz2kKS6Vmayl6uaMSDdgR2OdPcg9qnepJYpHRGe/CPmpVJTzv4W8Ic9nM6 YiayaYVo9pECP/TBSSMqylvCQJR9E0K0ecOUeUpvgyfwBo/MNkwN3pC+8ASojJChQjEZ qBbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=UT4URF6J; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b16si1932354eju.452.2020.07.31.11.52.14; Fri, 31 Jul 2020 11:52:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=UT4URF6J; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727108AbgGaSvH (ORCPT + 99 others); Fri, 31 Jul 2020 14:51:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34452 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726726AbgGaSvG (ORCPT ); Fri, 31 Jul 2020 14:51:06 -0400 Received: from mail-ed1-x543.google.com (mail-ed1-x543.google.com [IPv6:2a00:1450:4864:20::543]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 22B30C061574 for ; Fri, 31 Jul 2020 11:51:06 -0700 (PDT) Received: by mail-ed1-x543.google.com with SMTP id di22so15857772edb.12 for ; Fri, 31 Jul 2020 11:51:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=H1yxWveFbgcxmN3Okh0JmdDmTWWm3AmW1DCmR+UkLwo=; b=UT4URF6JuAnuqhvuR1gZqQzyWvjRB35xaMTPR5ptKWuVhPr2VM17Z5Z9y1p9gbgvRL tzD9iAvHKBTmrkB7ywOk2RT6OdGIRdy0zlfySBYlgl/FaHYOtM2w24QZ5X4choHHVPoF UYSjc9w5LWrqi/APIzwueY9q3/+XZBoPQqn/9EIyvfg6kett4gni4HrgUYYrp2P0zfsO KbVs8XykCCLwIEpMS4PHMcEmgdjCH8Bvpih4FG3owg+NKMPvbgytKK37qGg2i0f9cyzc heWKZZ2gbYy3b+ihcmy9JzMyGARQ2g5LGrcPdgntIq5ITSxp1MgzJ3TQyljcMPWBMQQ3 LxEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=H1yxWveFbgcxmN3Okh0JmdDmTWWm3AmW1DCmR+UkLwo=; b=Cnsc+pss18nYn3kosI4k0Iv/j3CLOBvLCP7fk0BHcfh08f1I4fCimDFVc1BmSrhWSu 4yjrS2O0CcuRDILhCRs5726ebPsNJFLnxxuEpyzNz0kYSY7gmN5Qx/zUCOg0/SH88gWq eBGnkBFa7bukN+o71p0bLnTqXUlbc94UXKOcjhjRgFtPag0dbPh/ovPcbsIj51D/OT+X SlmcfBu16Ho9RlJyic/bHl9v5lp4kwBwLKnMy5kGY0eEx++xQttiiM5agz+1TQf9s/se LkiFKD5SkI1UnXXRYzTjUSRFCfcry++OuGRH/BHLlJwWCm5prtuvCKnQahTN8p5hN2s4 WcFw== X-Gm-Message-State: AOAM532280toxMbbMVIDdEGCoM/duu9Kea9aLolUkTuLt0uZfwb6dwJ+ 6or/urHmL5lJh0MAi3Q8uqEo9q0cFKvj3UicYOsQLg8w X-Received: by 2002:aa7:d455:: with SMTP id q21mr5075852edr.164.1596221464460; Fri, 31 Jul 2020 11:51:04 -0700 (PDT) MIME-Version: 1.0 References: <1595252430.5899.6.camel@mtkswgap22> <1595906401-11985-1-git-send-email-Frankie.Chang@mediatek.com> <1595906401-11985-3-git-send-email-Frankie.Chang@mediatek.com> In-Reply-To: <1595906401-11985-3-git-send-email-Frankie.Chang@mediatek.com> From: Todd Kjos Date: Fri, 31 Jul 2020 11:50:52 -0700 Message-ID: Subject: Re: [PATCH v6 2/3] binder: add trace at free transaction. To: Frankie Chang Cc: Greg Kroah-Hartman , Joel Fernandes , Martijn Coenen , =?UTF-8?B?QXJ2ZSBIasO4bm5ldsOlZw==?= , Christian Brauner , LKML , linux-mediatek@lists.infradead.org, wsd_upstream , Jian-Min Liu Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 27, 2020 at 8:28 PM Frankie Chang wrote: > > From: "Frankie.Chang" > > Since the original trace_binder_transaction_received cannot > precisely present the real finished time of transaction, adding a > trace_binder_txn_latency_free at the point of free transaction > may be more close to it. > > Signed-off-by: Frankie.Chang > --- > drivers/android/binder.c | 6 ++++++ > drivers/android/binder_trace.h | 27 +++++++++++++++++++++++++++ > 2 files changed, 33 insertions(+) > > diff --git a/drivers/android/binder.c b/drivers/android/binder.c > index 2df146f..1e6fc40 100644 > --- a/drivers/android/binder.c > +++ b/drivers/android/binder.c > @@ -1522,6 +1522,9 @@ static void binder_free_transaction(struct binder_transaction *t) > * If the transaction has no target_proc, then > * t->buffer->transaction has already been cleared. > */ > + spin_lock(&t->lock); > + trace_binder_txn_latency_free(t); > + spin_unlock(&t->lock); Hmm. I don't prefer taking the lock just to call a trace. It doesn't make clear why the lock has to be taken. I'd prefer something like: if (trace_binder_txn_latency_free_enabled()) { int to_proc, to_thread; spin_lock(&t->lock); to_proc = t->to_proc ? t->to_proc->pid : 0; to_thread = t->to_thread ? t->to_thread->pid : 0; spin_unlock(&t->lock); trace_binder_txn_latency_free(t, to_proc, to_pid); } And then the trace would use the passed-in values instead of accessing via t->to_proc/to_thread. > binder_free_txn_fixups(t); > kfree(t); > binder_stats_deleted(BINDER_STAT_TRANSACTION); > @@ -3093,6 +3096,9 @@ static void binder_transaction(struct binder_proc *proc, > kfree(tcomplete); > binder_stats_deleted(BINDER_STAT_TRANSACTION_COMPLETE); > err_alloc_tcomplete_failed: > + spin_lock(&t->lock); > + trace_binder_txn_latency_free(t); > + spin_unlock(&t->lock); > kfree(t); > binder_stats_deleted(BINDER_STAT_TRANSACTION); > err_alloc_t_failed: > diff --git a/drivers/android/binder_trace.h b/drivers/android/binder_trace.h > index 6731c3c..8ac87d1 100644 > --- a/drivers/android/binder_trace.h > +++ b/drivers/android/binder_trace.h > @@ -95,6 +95,33 @@ > __entry->thread_todo) > ); > > +TRACE_EVENT(binder_txn_latency_free, > + TP_PROTO(struct binder_transaction *t), > + TP_ARGS(t), > + TP_STRUCT__entry( > + __field(int, debug_id) > + __field(int, from_proc) > + __field(int, from_thread) > + __field(int, to_proc) > + __field(int, to_thread) > + __field(unsigned int, code) > + __field(unsigned int, flags) > + ), > + TP_fast_assign( > + __entry->debug_id = t->debug_id; > + __entry->from_proc = t->from ? t->from->proc->pid : 0; > + __entry->from_thread = t->from ? t->from->pid : 0; > + __entry->to_proc = t->to_proc ? t->to_proc->pid : 0; > + __entry->to_thread = t->to_thread ? t->to_thread->pid : 0; > + __entry->code = t->code; > + __entry->flags = t->flags; > + ), > + TP_printk("transaction=%d from %d:%d to %d:%d flags=0x%x code=0x%x", > + __entry->debug_id, __entry->from_proc, __entry->from_thread, > + __entry->to_proc, __entry->to_thread, __entry->code, > + __entry->flags) > +); > + > TRACE_EVENT(binder_transaction, > TP_PROTO(bool reply, struct binder_transaction *t, > struct binder_node *target_node), > -- > 1.7.9.5