Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp1012207ima; Sun, 21 Oct 2018 02:43:35 -0700 (PDT) X-Google-Smtp-Source: ACcGV624/fmd0Lw8epxSqaI6OUrbyrqmHvwz6Q2m9ZAXE6rFNtlBo2tdFcGXaveTgQH+Qo6Ng7lp X-Received: by 2002:a62:9f11:: with SMTP id g17-v6mr41083735pfe.144.1540115014947; Sun, 21 Oct 2018 02:43:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540115014; cv=none; d=google.com; s=arc-20160816; b=GHoPTRGM/PKUy7W9ble4N0lVQ/UhFfsqhwKOTfCM7VBU3ysmMfaFgE4Hb0o7dtd3OH UTitn7eOCndlzsmDXCZIcaZPWHJ5kaRA0Yg1c5ErnYr+U1HdvymnjLtu6c/ntAHbxg8D Yh7cEJMZ4BpxuvZNN76jKdx1Gu8sqsSkT9tjunR4gMcG+a1SxeOGHr7MdauqrFiyDFsH q1JmQjgG2J6yN5SBV4ub0qD7HNvLORqcPH6nHBqkvgQqD6R0RvCE6h4MB6dnUHxxVeI3 QjmoUFEhV0kPc/xEvvQTqVQ9UGaUAYFNkCkEwKRmxKG3mB/m+/bXl5rt+R6sGqSuJMYg MK3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=uRufOCE+pftevn3uLFK9idebaMvzlms8KYnZA8I5qT0=; b=V6y+mxLkzFbqZAZU28P+jjQyNMhptm+ixU6rNjDFe5lQKYk/ALM1VscHNqACFnDhzU 4lRJ40YKUoNoao0L6VF+dtEHay4NdpNpEAe8NUgg4N9ApTtquaxv/MX5otNC/+zKc0/1 jH+K378DcaohwQU2o178O74Gqbi4YWR3bhNP4CAjJ2/0G0YACAurTmHO4+ULfgMUf0sg 2jVYuKACfSqGOIZRpCHKfcjNvbLYIHPB9TQTwrJj+vqZGPscSBVc7XCR8c28vOFoXivN 9n5SCurUr1R7RI96V+pb41b4KeVo+IXmrdDk8KfafC8ZGWwmf1h8xX13lF5F7lA9y0gH oODA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s64-v6si31110445pfi.134.2018.10.21.02.43.19; Sun, 21 Oct 2018 02:43:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727573AbeJURzW (ORCPT + 99 others); Sun, 21 Oct 2018 13:55:22 -0400 Received: from mx1.mailbox.org ([80.241.60.212]:31008 "EHLO mx1.mailbox.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727388AbeJURzW (ORCPT ); Sun, 21 Oct 2018 13:55:22 -0400 Received: from smtp2.mailbox.org (unknown [IPv6:2001:67c:2050:105:465:1:2:0]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mx1.mailbox.org (Postfix) with ESMTPS id 79E2E4B84D; Sun, 21 Oct 2018 11:41:38 +0200 (CEST) X-Virus-Scanned: amavisd-new at heinlein-support.de Received: from smtp2.mailbox.org ([80.241.60.241]) by spamfilter03.heinlein-hosting.de (spamfilter03.heinlein-hosting.de [80.241.56.117]) (amavisd-new, port 10030) with ESMTP id Dec6Eflflgx6; Sun, 21 Oct 2018 11:41:37 +0200 (CEST) Date: Sun, 21 Oct 2018 20:41:33 +1100 From: Aleksa Sarai To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Steven Rostedt , Robert Richter , Brendan Gregg Cc: linux-kernel@vger.kernel.org, oprofile-list@lists.sf.net Subject: Re: [RFC] Merging ftrace_stack, perf_callchain, oprofile->backtrace and stack_trace Message-ID: <20181021094133.nvqhs73khwx2xe4a@ryuk> References: <20181021093106.mhjpb2rnx6kstjki@ryuk> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="ustoeia7qk475mn7" Content-Disposition: inline In-Reply-To: <20181021093106.mhjpb2rnx6kstjki@ryuk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --ustoeia7qk475mn7 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2018-10-21, Aleksa Sarai wrote: > However, in working on this patch, I've noticed that there appear to be > several different implementations of "get the stack trace from this > pt_regs" which all appear quite similar. Namely: >=20 > * struct ftrace_stack; Sorry, I made a mistake here. ftrace_stack *does* use stack_trace under the hood, and so it can be easily modified to use the saved kretprobe stack. The only issue is with perf_callchain_entry (which affects bpf_get_stack). --=20 Aleksa Sarai Senior Software Engineer (Containers) SUSE Linux GmbH --ustoeia7qk475mn7 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEXzbGxhtUYBJKdfWmnhiqJn3bjbQFAlvMSc0ACgkQnhiqJn3b jbTuphAAkiKfKR9J5ssmyXI+RCDaxUD/54cJIy8sN2E45o2FnQZ7MOzLS8dNk4OK ZNsYcOM8/TkA/rsrDfFqdqk6dfzFRbRwu3kAxDqDwmGVEmMWaRUZ/tpvijpEXYYI KJ+U1hT8rd6yRL+QaGqswi0PylEMm8yo/PnGGyb7cVj8Exc7GKeg2dast5DE3kTE X82Az5h5SHDHGrE/o59WW7vhpHETeDdf1Qb7acVPa5X+4S/nE/ss5mvlBWiSa9Xx Sw/32ZCwKpflcXsM+KLrj7nGuJXA9T2pir5Q60dwihwjFMzOx+AR4+zGF9Co/AB8 jcr8aYHNuUnbDrzh1ZHeKLFXzwoq4kMQq7YmkIq6JDuj3f+X8qpLY0BLnnO2PMmd DyRkGDQja7EWGQP2yUfBZYILe1HkE8EH0LF0bpWcS38DcpXTjG8hGxMPqgxVIiBa 0ejPKwT3yJNON9ngg7ja5XebDLC5Y8IXFNm2lcq1miglJSt8zC1MZCCgBw/Mx6y8 cO9joIIoUlKc+2pRWRJ5tVeYu4jM3G7S+PRg5Voh/yxs1+InlMw7QskuSZwBg9lM ivtySt6Uih43/JfYd0NP4ICYUPVcc4/CBugGbXu+rqHXRJZli8zaVpRAXn6T/r+A rgO8FclHNE9aDd8dACHXxUaoZ8yKweaKQfAVeSWbu/Hg8EbyJzs= =+R3e -----END PGP SIGNATURE----- --ustoeia7qk475mn7--