From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752354AbdAXIWj (ORCPT ); Tue, 24 Jan 2017 03:22:39 -0500 Received: from mail-wm0-f66.google.com ([74.125.82.66]:36568 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750718AbdAXIW3 (ORCPT ); Tue, 24 Jan 2017 03:22:29 -0500 Date: Tue, 24 Jan 2017 09:22:25 +0100 From: Ingo Molnar To: Ravi Bangoria Cc: Alexis Berlemont , linux-kernel@vger.kernel.org, peterz@infradead.org, mingo@redhat.com, acme@kernel.org, alexander.shishkin@linux.intel.com, Jiri Olsa Subject: Re: [PATCH v5 0/2] perf probe: add sdt probes arguments into the uprobe cmd string Message-ID: <20170124082225.GC8667@gmail.com> References: <20161207122610.008da636793d38a39accf29b@kernel.org> <20161214000732.1710-1-alexis.berlemont@gmail.com> <20161214073656.GB1635@gmail.com> <5886FB0B.40901@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5886FB0B.40901@linux.vnet.ibm.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Ravi Bangoria wrote: > > > On Wednesday 14 December 2016 01:06 PM, Ingo Molnar wrote: > > * Alexis Berlemont wrote: > > > >> Hi Masami, > >> > >> Many thanks for your mail. > >> > >> Here is another patch set which tries to fix the points you mentioned: > >> > >> * Skip the arguments containing a constant ($123); > >> * Review the code in charge of the register renaming (search for '%' > >> and parse it); > >> * Minor changes (print the argument in case of error, skipping, check > >> the sdt arg type index); > >> > >> Many thanks, > >> > >> Alexis. > >> > >> Alexis Berlemont (2): > >> perf sdt: add scanning of sdt probles arguments > >> perf probe: add sdt probes arguments into the uprobe cmd string > > I'd like to hijack this thread to report an SDT oddity - one of my boxen reports > > lots of SDT tracepoints in 'perf list': > > > > mem:[/len][:access] [Hardware breakpoint] > > > > sdt_libc:lll_lock_wait_private [SDT event] > > sdt_libc:longjmp [SDT event] > > sdt_libc:longjmp_target [SDT event] > > sdt_libc:memory_arena_new [SDT event] > > sdt_libc:memory_arena_retry [SDT event] > > sdt_libc:memory_arena_reuse [SDT event] > > sdt_libc:memory_arena_reuse_free_list [SDT event] > > sdt_libc:memory_arena_reuse_wait [SDT event] > > sdt_libc:memory_calloc_retry [SDT event] > > sdt_libc:memory_heap_free [SDT event] > > ... > > > > But none of them work: > > > > Error: No permissions to read /sys/kernel/debug/tracing/events/sdt_libc/longjmp > > Hint: Try 'sudo mount -o remount,mode=755 /sys/kernel/debug/tracing' > > > > ... > > > > Error: File /sys/kernel/debug/tracing/events/sdt_libc/longjmp not found. > > Hint: Perhaps this kernel misses some CONFIG_ setting to enable this feature?. > > > > What kind of patches are required for SDT probes to work? > > Hi Ingo, > > I suppose you are trying to record SDT events without probing it. > In that case, first put a probe on an event and then try to record > it. For example, Well, I was mainly complaining about the misleading messages and flow of the tooling here. Could you please improve the messages so that if I use it like the way I reported it results in me trying the right approach? Thanks, Ingo