Em Thu, Oct 03, 2013 at 01:58:11PM +0530, Ramkumar Ramachandra escreveu: > Currently, execution of 'perf trace' reports the following cryptic > message to the user: > > $ perf trace > Couldn't read the raw_syscalls tracepoints information! > > Now, it prints a detailed message:
What about the one attached instead? It [acme@zoo ~]$ mount | grep debugfs [acme@zoo ~]$ [acme@zoo ~]$ perf trace usleep 1 Is debugfs mounted? Try 'sudo mount -t debugfs nodev /sys/kernel/debug' [acme@zoo ~]$ sudo mkdir /d [acme@zoo ~]$ sudo mount -t debugfs nodev /d [acme@zoo ~]$ mount | grep debugfs nodev on /d type debugfs (rw,relatime) [acme@zoo ~]$ [acme@zoo ~]$ perf trace usleep 1 Couldn't access debugfs. Try 'sudo mount -o remount,mode=755 /d' [acme@zoo ~]$ sudo mount -o remount,mode=755 /d [acme@zoo ~]$ perf trace -e mmap usleep 1 0.956 ( 0.004 ms): mmap(len: 4096, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS, fd: 4294967295) = 0x46dfc000 0.995 ( 0.004 ms): mmap(len: 125871, prot: READ, flags: PRIVATE, fd: 3 ) = 0x46ddd000 1.045 ( 0.005 ms): mmap(addr: 0x3da4800000, len: 2135088, prot: EXEC|READ, flags: PRIVATE|DENYWRITE, fd: 3) = 0xa4800000 1.068 ( 0.005 ms): mmap(addr: 0x3da4a08000, len: 8192, prot: READ|WRITE, flags: PRIVATE|DENYWRITE|FIXED, fd: 3, off: 32768) = 0xa4a08000 1.109 ( 0.005 ms): mmap(addr: 0x3d93400000, len: 3896312, prot: EXEC|READ, flags: PRIVATE|DENYWRITE, fd: 3) = 0x93400000 1.125 ( 0.006 ms): mmap(addr: 0x3d937ad000, len: 24576, prot: READ|WRITE, flags: PRIVATE|DENYWRITE|FIXED, fd: 3, off: 1757184) = 0x937ad000 1.134 ( 0.004 ms): mmap(addr: 0x3d937b3000, len: 17400, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS|FIXED, fd: 4294967295) = 0x937b3000 1.147 ( 0.003 ms): mmap(len: 4096, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS, fd: 4294967295) = 0x46ddc000 1.160 ( 0.003 ms): mmap(len: 8192, prot: READ|WRITE, flags: PRIVATE|ANONYMOUS, fd: 4294967295) = 0x46dda000 [acme@zoo ~]$
diff --git a/tools/perf/builtin-trace.c b/tools/perf/builtin-trace.c index 1bb8f15..8a35943 100644 --- a/tools/perf/builtin-trace.c +++ b/tools/perf/builtin-trace.c @@ -1501,17 +1501,13 @@ static int trace__run(struct trace *trace, int argc, const char **argv) } if (perf_evlist__add_newtp(evlist, "raw_syscalls", "sys_enter", trace__sys_enter) || - perf_evlist__add_newtp(evlist, "raw_syscalls", "sys_exit", trace__sys_exit)) { - fprintf(trace->output, "Couldn't read the raw_syscalls tracepoints information!\n"); - goto out_delete_evlist; - } + perf_evlist__add_newtp(evlist, "raw_syscalls", "sys_exit", trace__sys_exit)) + goto out_error_tp; if (trace->sched && perf_evlist__add_newtp(evlist, "sched", "sched_stat_runtime", - trace__sched_stat_runtime)) { - fprintf(trace->output, "Couldn't read the sched_stat_runtime tracepoint information!\n"); - goto out_delete_evlist; - } + trace__sched_stat_runtime)) + goto out_error_tp; err = perf_evlist__create_maps(evlist, &trace->opts.target); if (err < 0) { @@ -1628,6 +1624,23 @@ out_delete_evlist: out: trace->live = false; return err; +out_error_tp: + switch (errno) { + case ENOENT: + fputs("Is debugfs mounted? Try 'sudo mount -t debugfs nodev /sys/kernel/debug'\n", trace->output); + break; + case EACCES: + fprintf(trace->output, + "Couldn't access debugfs. Try 'sudo mount -o remount,mode=755 %s'\n", + debugfs_mountpoint); + break; + default: + fprintf(trace->output, "Can't trace: %s!\n", sys_errlist[errno]); + break; + + } + + goto out_unmap_evlist; } static int trace__replay(struct trace *trace)