Em Thu, Jan 04, 2018 at 09:37:35AM +0800, Wangnan (F) escreveu:
>
>
> On 2018/1/4 4:13, Arnaldo Carvalho de Melo wrote:
> > Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
> > > Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo
> > > escreveu:
> > >
Em Thu, Jan 04, 2018 at 09:37:35AM +0800, Wangnan (F) escreveu:
>
>
> On 2018/1/4 4:13, Arnaldo Carvalho de Melo wrote:
> > Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
> > > Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo
> > > escreveu:
> > >
On 2018/1/4 4:13, Arnaldo Carvalho de Melo wrote:
Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
Continuing investigation...
After applying the fallback patch to allow new tools to
On 2018/1/4 4:13, Arnaldo Carvalho de Melo wrote:
Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
Continuing investigation...
After applying the fallback patch to allow new tools to
Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
> > > Continuing investigation...
> >
> > After applying the fallback patch to allow new tools to work with older
> > kernels:
> >
> >
Em Wed, Jan 03, 2018 at 03:33:07PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
> > > Continuing investigation...
> >
> > After applying the fallback patch to allow new tools to work with older
> > kernels:
> >
> >
Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
> > Continuing investigation...
>
> After applying the fallback patch to allow new tools to work with older
> kernels:
>
> [root@felicio ~]# perf test bpf
> 39: BPF filter:
>
Em Wed, Jan 03, 2018 at 03:27:01PM -0300, Arnaldo Carvalho de Melo escreveu:
> > Continuing investigation...
>
> After applying the fallback patch to allow new tools to work with older
> kernels:
>
> [root@felicio ~]# perf test bpf
> 39: BPF filter:
>
Em Wed, Jan 03, 2018 at 01:58:44PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Wed, Jan 03, 2018 at 12:58:26PM +0800, Wangnan (F) escreveu:
> > And please check if the kprobe created by
> >
> > $ perf probe -v SyS_epoll_wait
>
> [root@seventh ~]# perf probe -v SyS_epoll_wait
>
Em Wed, Jan 03, 2018 at 01:58:44PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Wed, Jan 03, 2018 at 12:58:26PM +0800, Wangnan (F) escreveu:
> > And please check if the kprobe created by
> >
> > $ perf probe -v SyS_epoll_wait
>
> [root@seventh ~]# perf probe -v SyS_epoll_wait
>
Em Wed, Jan 03, 2018 at 12:58:26PM +0800, Wangnan (F) escreveu:
> And please check if the kprobe created by
>
> $ perf probe -v SyS_epoll_wait
[root@seventh ~]# perf probe -v SyS_epoll_wait
probe-definition(0): SyS_epoll_wait
symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0
Em Wed, Jan 03, 2018 at 12:58:26PM +0800, Wangnan (F) escreveu:
> And please check if the kprobe created by
>
> $ perf probe -v SyS_epoll_wait
[root@seventh ~]# perf probe -v SyS_epoll_wait
probe-definition(0): SyS_epoll_wait
symbol:SyS_epoll_wait file:(null) line:0 offset:0 return:0
And please check if the kprobe created by
$ perf probe -v SyS_epoll_wait
works for the test program used by this testcase:
#include
#include
#define NR_ITERS 100
static int epoll_wait_loop(void)
{
int i;
/* Should fail NR_ITERS times */
for (i = 0; i < NR_ITERS;
And please check if the kprobe created by
$ perf probe -v SyS_epoll_wait
works for the test program used by this testcase:
#include
#include
#define NR_ITERS 100
static int epoll_wait_loop(void)
{
int i;
/* Should fail NR_ITERS times */
for (i = 0; i < NR_ITERS;
Unable to reproduce. In my kernel configuration, SyS_epoll_wait is not
inlined at all.
From the log you sent, it seems that all 3 instances are attached. This
testcase should work if the last one (SyS_epoll_wait) get probed correctly.
Could you please have a look if the 3rd kprobe event
Unable to reproduce. In my kernel configuration, SyS_epoll_wait is not
inlined at all.
From the log you sent, it seems that all 3 instances are attached. This
testcase should work if the last one (SyS_epoll_wait) get probed correctly.
Could you please have a look if the 3rd kprobe event
Hi Wang,
I just updated my machine to Fedora 27 and 4.15.0-rc6 and the
only test failing for me is:
[root@jouet linux]# perf test bpf
39: BPF filter:
39.1: Basic BPF filtering : FAILED!
39.2: BPF pinning
Hi Wang,
I just updated my machine to Fedora 27 and 4.15.0-rc6 and the
only test failing for me is:
[root@jouet linux]# perf test bpf
39: BPF filter:
39.1: Basic BPF filtering : FAILED!
39.2: BPF pinning
18 matches
Mail list logo