Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp6311319imd; Wed, 31 Oct 2018 09:48:07 -0700 (PDT) X-Google-Smtp-Source: AJdET5d5mnTSUhet+N0vomlNX+2/uqo3t1gzViOCKa76/otzyZC17n7vLil7gPgjRWL/7SDfXDgf X-Received: by 2002:a17:902:7282:: with SMTP id d2-v6mr4031928pll.272.1541004487733; Wed, 31 Oct 2018 09:48:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541004487; cv=none; d=google.com; s=arc-20160816; b=XYlNuofzfCZQlIJP7Si/ch86ox9QY7dElrDxpaFDs/gdBOEs1FKrI7p+9N8Mjxq6q8 NEzmq3P3LzKn6gxj86j4nAbbyPNXSPS1/wTvZvU6A9WGguexUBAJRQKQdnHF3wysn7Qz 8LMV69TNBx3UFwagc8iUE4+reKEeYCKCIN/s1SKPU29pvvgKnAyNuin6z0l+K4eLaTEC YmLeYJmw/nl4lGEuapmCrkWPxjicr1FTUWANS8vZcEVC6b+ynkYn1mjiIBaI1CBvkUbz TqX1utuz/or11G9MrBmZnZ1o2E1zsn2RRorfLRbIU2ZFH7ZUcMtsIq50Jo7ywgFN1maC ++iQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=j5VLX+gN9nnvZvtrJRGu+wwYuaHh4/WHPGdWLy3SCoo=; b=H8NCN60yt/WMQxw0RiDqK6Ay1kTKOh0MIZisbUCftHcwKk8i9QoBr+PdNlN0ngnXbP jBEkNwRXfC4dU7ekgUaV4TBqiFxTqmTIN4THYt9LR8M80lIi0SeLSw+iOH5O8EBNOq6/ aPQvRBu91Kh3uIXRdBrPEERO+JpVpM3bJ988q6MuoL6UfYWAKD58qxPm/WmXTzufw41J g+5msFUAXqrqoJrBW6dNSjmJE3m7+bND0V7m4LKJtoMTY+eMUrsgzuuEwqwAVuWydW43 iXcTKwexydXU/Ha1yUIF+LkF283jPOaf4paUN8TDtRHRavHPHSZjLhvit9Eta4b0bt9h mgUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZGskDgxs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s11-v6si25372429pgh.511.2018.10.31.09.47.51; Wed, 31 Oct 2018 09:48:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZGskDgxs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730290AbeKABpk (ORCPT + 99 others); Wed, 31 Oct 2018 21:45:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:60618 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729775AbeKABpk (ORCPT ); Wed, 31 Oct 2018 21:45:40 -0400 Received: from jouet.infradead.org (unknown [179.97.41.186]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 46BF320843; Wed, 31 Oct 2018 16:46:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541004412; bh=bv+DPNI9HMAG5IY9lo5fDaK0UFtfUfxvpoxh6Se5VX4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZGskDgxsu4y7LUyqiYr4Vo4uTrcra3r5AGBoYQoQ/LXMWoUJl9BL3HFXwXUv+ymvz Pw9GyOo6l/iyKMCqQ/XN6lF98r7gezkNeZOd7YapCZMzmY8pcI+OGGscpGa2jeru+Z EgAju2n6p3NrFLFq8S9JuPH+ZLRKtz4CNx5YyXjI= From: Arnaldo Carvalho de Melo To: Ingo Molnar Cc: Clark Williams , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Adrian Hunter , Andi Kleen , "David S . Miller" , Leo Yan , Mathieu Poirier , stable@vger.kernel.org, Arnaldo Carvalho de Melo Subject: [PATCH 27/28] perf intel-pt: Insert callchain context into synthesized callchains Date: Wed, 31 Oct 2018 13:45:07 -0300 Message-Id: <20181031164508.4784-28-acme@kernel.org> X-Mailer: git-send-email 2.14.4 In-Reply-To: <20181031164508.4784-1-acme@kernel.org> References: <20181031164508.4784-1-acme@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Adrian Hunter In the absence of a fallback, callchains must encode also the callchain context. Do that now there is no fallback. Signed-off-by: Adrian Hunter Reviewed-by: Jiri Olsa Cc: Andi Kleen Cc: David S. Miller Cc: Leo Yan Cc: Mathieu Poirier Cc: stable@vger.kernel.org # 4.19 Link: http://lkml.kernel.org/r/100ea2ec-ed14-b56d-d810-e0a6d2f4b069@intel.com Signed-off-by: Arnaldo Carvalho de Melo --- tools/perf/util/intel-pt.c | 6 ++++-- tools/perf/util/thread-stack.c | 44 +++++++++++++++++++++++++++++++++--------- tools/perf/util/thread-stack.h | 2 +- 3 files changed, 40 insertions(+), 12 deletions(-) diff --git a/tools/perf/util/intel-pt.c b/tools/perf/util/intel-pt.c index ffa385a029b3..60732213d16a 100644 --- a/tools/perf/util/intel-pt.c +++ b/tools/perf/util/intel-pt.c @@ -759,7 +759,8 @@ static struct intel_pt_queue *intel_pt_alloc_queue(struct intel_pt *pt, if (pt->synth_opts.callchain) { size_t sz = sizeof(struct ip_callchain); - sz += pt->synth_opts.callchain_sz * sizeof(u64); + /* Add 1 to callchain_sz for callchain context */ + sz += (pt->synth_opts.callchain_sz + 1) * sizeof(u64); ptq->chain = zalloc(sz); if (!ptq->chain) goto out_free; @@ -1160,7 +1161,8 @@ static void intel_pt_prep_sample(struct intel_pt *pt, if (pt->synth_opts.callchain) { thread_stack__sample(ptq->thread, ptq->chain, - pt->synth_opts.callchain_sz, sample->ip); + pt->synth_opts.callchain_sz + 1, + sample->ip, pt->kernel_start); sample->callchain = ptq->chain; } diff --git a/tools/perf/util/thread-stack.c b/tools/perf/util/thread-stack.c index c091635bf7dc..61a4286a74dc 100644 --- a/tools/perf/util/thread-stack.c +++ b/tools/perf/util/thread-stack.c @@ -310,20 +310,46 @@ void thread_stack__free(struct thread *thread) } } +static inline u64 callchain_context(u64 ip, u64 kernel_start) +{ + return ip < kernel_start ? PERF_CONTEXT_USER : PERF_CONTEXT_KERNEL; +} + void thread_stack__sample(struct thread *thread, struct ip_callchain *chain, - size_t sz, u64 ip) + size_t sz, u64 ip, u64 kernel_start) { - size_t i; + u64 context = callchain_context(ip, kernel_start); + u64 last_context; + size_t i, j; - if (!thread || !thread->ts) - chain->nr = 1; - else - chain->nr = min(sz, thread->ts->cnt + 1); + if (sz < 2) { + chain->nr = 0; + return; + } - chain->ips[0] = ip; + chain->ips[0] = context; + chain->ips[1] = ip; + + if (!thread || !thread->ts) { + chain->nr = 2; + return; + } + + last_context = context; + + for (i = 2, j = 1; i < sz && j <= thread->ts->cnt; i++, j++) { + ip = thread->ts->stack[thread->ts->cnt - j].ret_addr; + context = callchain_context(ip, kernel_start); + if (context != last_context) { + if (i >= sz - 1) + break; + chain->ips[i++] = context; + last_context = context; + } + chain->ips[i] = ip; + } - for (i = 1; i < chain->nr; i++) - chain->ips[i] = thread->ts->stack[thread->ts->cnt - i].ret_addr; + chain->nr = i; } struct call_return_processor * diff --git a/tools/perf/util/thread-stack.h b/tools/perf/util/thread-stack.h index b7e41c4ebfdd..f97c00a8c251 100644 --- a/tools/perf/util/thread-stack.h +++ b/tools/perf/util/thread-stack.h @@ -84,7 +84,7 @@ int thread_stack__event(struct thread *thread, u32 flags, u64 from_ip, u64 to_ip, u16 insn_len, u64 trace_nr); void thread_stack__set_trace_nr(struct thread *thread, u64 trace_nr); void thread_stack__sample(struct thread *thread, struct ip_callchain *chain, - size_t sz, u64 ip); + size_t sz, u64 ip, u64 kernel_start); int thread_stack__flush(struct thread *thread); void thread_stack__free(struct thread *thread); size_t thread_stack__depth(struct thread *thread); -- 2.14.4