On Thu, Apr 04, 2019 at 05:08:55PM +, Song Liu wrote:
>
>
> > On Apr 4, 2019, at 5:25 AM, Jiri Olsa wrote:
> >
> > On Thu, Apr 04, 2019 at 11:14:38AM +0200, Jiri Olsa wrote:
> >
> > SNIP
> >
> >> Program received signal SIGABRT, Aborted.
> >> 0x775e60f5 in raise () from /lib64/lib
> On Apr 4, 2019, at 5:25 AM, Jiri Olsa wrote:
>
> On Thu, Apr 04, 2019 at 11:14:38AM +0200, Jiri Olsa wrote:
>
> SNIP
>
>> Program received signal SIGABRT, Aborted.
>> 0x775e60f5 in raise () from /lib64/libc.so.6
>> Missing separate debuginfos, use: dnf debuginfo-install
>> bzip2-l
On Thu, Apr 04, 2019 at 11:14:38AM +0200, Jiri Olsa wrote:
SNIP
> Program received signal SIGABRT, Aborted.
> 0x775e60f5 in raise () from /lib64/libc.so.6
> Missing separate debuginfos, use: dnf debuginfo-install
> bzip2-libs-1.0.6-29.fc30.x86_64 elfutils-libelf-0.176-1.fc30.x86_64
> el
which can be useful, for
> >>>>> instance, if there are still bugs in that code, which seems to be the
> >>>>> case as reported by Jiri Olsa in:
> >>>>>
> >>>>> "[BUG] perf: intel_pt won't display kernel function"
> >>>
t; bool map__has_symbols(const struct map *map)
> {
>return dso__has_symbols(map->dso);
> diff --git i/tools/perf/util/map.h w/tools/perf/util/map.h
> index 0e20749f2c55..01079f1f4375 100644
> --- i/tools/perf/util/map.h
> +++ w/tools/perf/util/map.h
> @@ -159,10 +15
t_kallsyms_ref_reloc_sym(struct map *map,
const char *symbol_name,
bool __map__is_kernel(const struct map *map);
bool __map__is_extra_kernel_map(const struct map *map);
+bool __map__is_bpf_prog(const struct map *map);
static inline bool __map__is_kmodule(const struct map *map)
{
-
p;& !__map__is_extra_kernel_map(map);
+ return !__map__is_kernel(map) && !__map__is_extra_kernel_map(map) &&
+ !__map__is_bpf_prog(map);
}
bool map__has_symbols(const struct map *map);
Thanks,
Song
>
>> Acked-by: Song Liu
>>
>> T
; > Date: Wed Apr 3 12:05:15 2019 -0300
> >
> > perf record: Do not synthesize BPF records when --no-bpf-event is used
> >
> >By default we synthesize and ask the kernel for BPF events, having a
> >--no-bpf-event option to disable that, which can be usef
On Wed, Apr 03, 2019 at 05:05:02PM +, Song Liu wrote:
>
>
> > On Apr 3, 2019, at 7:37 AM, Jiri Olsa wrote:
> >
> > hi,
> > perf script --call-trace stop working for me recently,
> > and displays only user space functions
> >
> > I bisected that to:
> > 7b612e291a5a perf tools: Synthesize
> On Apr 3, 2019, at 7:37 AM, Jiri Olsa wrote:
>
> hi,
> perf script --call-trace stop working for me recently,
> and displays only user space functions
>
> I bisected that to:
> 7b612e291a5a perf tools: Synthesize PERF_RECORD_* for loaded BPF programs
>
> data from following comands will d
8ccc2024ba03e96c32a06f74ca5d6ab5503
> Author: Arnaldo Carvalho de Melo
> Date: Wed Apr 3 12:05:15 2019 -0300
>
>perf record: Do not synthesize BPF records when --no-bpf-event is used
>
>By default we synthesize and ask the kernel for BPF events, having a
> --no-bpf-eve
By default we synthesize and ask the kernel for BPF events, having a
--no-bpf-event option to disable that, which can be useful, for
instance, if there are still bugs in that code, which seems to be the
case as reported by Jiri Olsa in:
"[BUG] perf: intel_pt won't displa
Em Wed, Apr 03, 2019 at 04:37:38PM +0200, Jiri Olsa escreveu:
> hi,
> perf script --call-trace stop working for me recently,
> and displays only user space functions
>
> I bisected that to:
> 7b612e291a5a perf tools: Synthesize PERF_RECORD_* for loaded BPF programs
>
> data from following coman
hi,
perf script --call-trace stop working for me recently,
and displays only user space functions
I bisected that to:
7b612e291a5a perf tools: Synthesize PERF_RECORD_* for loaded BPF programs
data from following comands will display user space functions only:
# perf-with-kcore record pt -e in
14 matches
Mail list logo