Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp1861877iog; Tue, 14 Jun 2022 15:17:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzy31LhB9Yym1ZltjU5j1oYdysH0WzNRA7qj3f/B4CERVNom1NYWsiuoYwf7OjBGsaPtTyb X-Received: by 2002:a17:906:e097:b0:70a:6e59:4c85 with SMTP id gh23-20020a170906e09700b0070a6e594c85mr6505899ejb.323.1655245078632; Tue, 14 Jun 2022 15:17:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655245078; cv=none; d=google.com; s=arc-20160816; b=tS2q8Ak92k4ToULrXmkyN9UryLWz0YH2QamNKniNUPZpsVeLR7kWFQdTf7hqBiXPYH hlCa+GNqhrkdSyFxBuXVZWToFKj8oTPMuOyyoMLcXuVhrBVEn3d5Tdeu9spN83a8A6WN yWpBCKkIirm5D1AmO8Uz4swA/h8lPTrgIiD0gAoNL+yeyiJ+bD/r9JDySrcFISywD0jL QwOujooHR5+bITlhROltA8K3jKHHbpjYk49yLW6kqN5lxaHcKbQdxRbviECbVrlHOkCA o6zJja56+FZn5ZnssYp+79P3HbD54bhJl0GHuk/o6/qOVqx3opz0ugV5bnP+zHX5bvxe 0MOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version; bh=8QMsUtIyEnI6GxBkF9iHYVsdk25z9ZpByq01YYX9ysg=; b=ArteVAPWeROODXF3nvz656C4E32Kz/5+bZIMC9zQOf62NgqHcy59VO97FY7VG4dVPg XKMtAhrkPfoaJL7epcg/7TiLzst4IV+kGym3Fm+/4VtripBfuNzBukrTk7VVo44wU8T0 Z1zzP6fogkeaj0BeH8/4SBZWVdGI6p9uRtjeOYI3pc4Y42QR1pZR1AwL+DawwnFmStDJ /GWOorlTgCzqkoAhBUUDdK5ew+FEjn4nkQIeK11blEAxdVsBoFwY26A3gkX8KVX9mbov F6MGJywYtwGVwrzXl6cvzcR2nTilT5JYjgLf99DSjsuXmQx8NiVOLjJqPVg3ATqNkqgV 6FxA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ho30-20020a1709070e9e00b00706f6756863si13640164ejc.114.2022.06.14.15.17.32; Tue, 14 Jun 2022 15:17:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239710AbiFNVoJ (ORCPT + 99 others); Tue, 14 Jun 2022 17:44:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40530 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231695AbiFNVoI (ORCPT ); Tue, 14 Jun 2022 17:44:08 -0400 Received: from mail-oi1-f178.google.com (mail-oi1-f178.google.com [209.85.167.178]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DCBD275C7; Tue, 14 Jun 2022 14:44:07 -0700 (PDT) Received: by mail-oi1-f178.google.com with SMTP id bf7so12050989oib.11; Tue, 14 Jun 2022 14:44:07 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8QMsUtIyEnI6GxBkF9iHYVsdk25z9ZpByq01YYX9ysg=; b=U+9FTiDgexv7UAmKgVfX/D1ndon1vQ/6UaK4lhGUbH5N+80R5YVsLk6qVNe/YD5ci5 hU4o9FU2+bfhKIv3GUGmAhSOQsag25FCGlaLz18Og3d4PMMB0Osx74pXwgm7NBUujcYl wvPYFX0qsSzNfkp/FX/BOhPGVhIkmuHMNVi+I1zsmhkUqdzzFYN7Jm1zFn/uW9qa7rhs vMZO81RyxpaWVv4d7UKkQN9hTblpk2tXaTvAyO4uCkWKzgCA2yhf4kFTEbQqX5z6nQtP 7Kd5+PC5QqYVpFdsL0lAtPtU8ZfS3zD9FIsrWgKMxNrxWanVoD1r8256iQVf43NUuGsj A4XQ== X-Gm-Message-State: AOAM533V8tcvC77iNlxmAoE/lSnS7zsWz9FyUYzr59FpdUWL3u/kPP78 6TF47u/+tz3m8F/V8Q2v3yjL7clBvD/mrnQLG5o= X-Received: by 2002:aca:bb56:0:b0:32f:2160:bfd8 with SMTP id l83-20020acabb56000000b0032f2160bfd8mr3158871oif.92.1655243046655; Tue, 14 Jun 2022 14:44:06 -0700 (PDT) MIME-Version: 1.0 References: <20220613094605.208401-1-yangjihong1@huawei.com> <20220613094605.208401-2-yangjihong1@huawei.com> In-Reply-To: <20220613094605.208401-2-yangjihong1@huawei.com> From: Namhyung Kim Date: Tue, 14 Jun 2022 14:43:55 -0700 Message-ID: Subject: Re: [RFC 01/13] perf kwork: New tool To: Yang Jihong Cc: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Mark Rutland , Alexander Shishkin , Jiri Olsa , linux-kernel , linux-perf-users Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.4 required=5.0 tests=BAYES_00, FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, On Mon, Jun 13, 2022 at 2:48 AM Yang Jihong wrote: > > The perf-kwork tool is used to trace time properties of kernel work > (such as irq, softirq, and workqueue), including runtime, latency, > and timehist, using the infrastructure in the perf tools to allow > tracing extra targets: > > # perf kwork -h > > Usage: perf kwork [] {record|report|latency|timehist} > > -D, --dump-raw-trace dump raw trace in ASCII > -f, --force don't complain, do it > -k, --kwork list of kwork to profile (irq, softirq, workqueue etc) > -v, --verbose be more verbose (show symbol address, etc) > > # perf kwork record -- sleep 1 > [ perf record: Woken up 0 times to write data ] > [ perf record: Captured and wrote 1.696 MB perf.data ] > > # perf kwork report -h > > Usage: perf kwork report [] > > -C, --cpu list of cpus to profile > -i, --input input file name > -n, --name event name to profile > -s, --sort > sort by key(s): runtime, max, freq > -S, --with-summary Show summary with statistics > --time Time span for analysis (start,stop) > > # perf kwork latency -h > > Usage: perf kwork latency [] > > -C, --cpu list of cpus to profile > -i, --input input file name > -n, --name event name to profile > -s, --sort > sort by key(s): avg, max, freq > --time Time span for analysis (start,stop) > > # perf kwork timehist -h > > Usage: perf kwork timehist [] > > -C, --cpu list of cpus to profile > -g, --call-graph Display call chains if present > -i, --input input file name > -k, --vmlinux vmlinux pathname > -n, --name event name to profile > --kallsyms > kallsyms pathname > --max-stack Maximum number of functions to display backtrace. > --symfs > Look for files with symbols relative to this directory > --time Time span for analysis (start,stop) I think you can add this and the documentation when you actually add the functionality later. Thanks, Namhyung