Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp3858439imj; Tue, 19 Feb 2019 10:39:08 -0800 (PST) X-Google-Smtp-Source: AHgI3IaxJFoYuD8JQFkzJHyK9uLrGVefY0njCkh32U7JxWqCjCwnjKVM/KHpCG3i9puM4GijuuaX X-Received: by 2002:a63:d342:: with SMTP id u2mr25205751pgi.41.1550601548192; Tue, 19 Feb 2019 10:39:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550601548; cv=none; d=google.com; s=arc-20160816; b=jY3hff7x/lH7upgTIikSEiGQLr4C87Vzfv+gD1yP+5AUeunG3ZWPFzE1aux5HuFKmv kUIb5tDa3SsEa0xuLRtZeA+VhGFwwTQVlp3Vm4XeiTPbYuO/ts+3z1pYOOohGig1SENd cU0Nr0X2mJpuN3YVoDMZf2OLOeCacCEXFOnjoH15HS/SHvYbiyHLDX3XW/F3l04bF4PX 383f7yqCL5LBsUCeNO3tVXx1ctXSNqGPD94M7CnZP13AG27KQ2v34/90gEpD61PyKPRb 62YWg6RuaPNxr9BDeXCPbiGZbMaTDTWd5njZDcTRkyAjfgnjwgrJp+us0isPk1p3AlX/ IIhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=WUjiDiedCATKa08gZ4n7fAAx5fFti1FNkW20lXaT6nc=; b=tYXA5xsqG3RKZLFuNzV4bfHzPBgMQAi5V742/zqFQyCxCqYLG2epM7bkCLbMsPIVu9 GS4KLSZSVKaOvK7rIQsZe1YsbWeiZ0cCioDgZRi/qbwRtSoFvqyTcx1OpH/JvEukVjk6 kqfsLU3k5+zoJ1J2FsSfdCL+lUbKxM1E3yMH3Fx5XkQqHdDhR8TfpyuRQ435cLb5N5ve UfWfMr7d47FMe2YKSch1Bw7B8v0ZB60S2vqv8qF5IQLP2RB51SlfKjl6c/W6qzrawyOU ELADP2eBh6usQlNKlRc48yUPU3+EOb5Jf4mNgId64nufeoQo4Yg+spVPb/614GC1TnPc iwfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t18si9349451pgh.89.2019.02.19.10.38.52; Tue, 19 Feb 2019 10:39:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727470AbfBSSib (ORCPT + 99 others); Tue, 19 Feb 2019 13:38:31 -0500 Received: from mx-rz-3.rrze.uni-erlangen.de ([131.188.11.22]:45091 "EHLO mx-rz-3.rrze.uni-erlangen.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726630AbfBSSib (ORCPT ); Tue, 19 Feb 2019 13:38:31 -0500 Received: from mx-rz-smart.rrze.uni-erlangen.de (mx-rz-smart.rrze.uni-erlangen.de [IPv6:2001:638:a000:1025::1e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx-rz-3.rrze.uni-erlangen.de (Postfix) with ESMTPS id 443qHm52dRz1yR3; Tue, 19 Feb 2019 19:38:28 +0100 (CET) Authentication-Results: mx-rz-3.rrze.uni-erlangen.de; dkim=none reason="no signature"; dkim-adsp=none (unprotected policy); dkim-atps=neutral X-Virus-Scanned: amavisd-new at boeck4.rrze.uni-erlangen.de (RRZE) X-RRZE-Flag: Not-Spam X-RRZE-Submit-IP: 10.21.0.253 Received: from fau.de (faustud-010-021-000-253.pool.uni-erlangen.de [10.21.0.253]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: U2FsdGVkX19wq74C0ZhIS+6Mq4C7vw+vXlrt+yZ+b6U=) by smtp-auth.uni-erlangen.de (Postfix) with ESMTPSA id 443qHk4cHGz1yK0; Tue, 19 Feb 2019 19:38:26 +0100 (CET) From: Jonas Rabenstein To: linux-perf-users@vger.kernel.org Cc: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Andi Kleen , Thomas Richter , Stephane Eranian , Jonas Rabenstein , linux-kernel@vger.kernel.org Subject: [PATCH 0/2] perf evsel: add support for inlined function in callchains Date: Tue, 19 Feb 2019 19:38:08 +0100 Message-Id: X-Mailer: git-send-email 2.19.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, sample__fprintf_callchain currently did not use the already available code to get the symbols of an inlined function if such information is available in a dso. This patchset adds the required logic to add appropriate lines. As I am quite new to the code base of perf I am not sure how to test that changeset in a correct way. At least the codes builds and the tools that make use of sample__fprintf_callchain (perf-script, perf-trace and perf-sched as far as I can see) did not fail to run - also I did not get into the details of perf-trace and perf-sched as I have never used them before. Another thing I am not sure how to deal with are some warnings of checkpatch.pl due to the 80 character line limit. Due to the long function names in use the current implementation already exceeded that limit in the same spots by even more characters as I have taken the inner loop and put it into a separate function. I hope to expand my work to perf-report but thought it might be usefull to get already early feedback on those patches. Thank you, Jonas Jonas Rabenstein (2): perf evsel: split sample__fprintf_callchain in output and iteration perf evsel: add inline functions to sample callchain output tools/perf/util/evsel_fprintf.c | 157 ++++++++++++++++++++++---------- 1 file changed, 109 insertions(+), 48 deletions(-) -- 2.19.2