From: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com> To: Srikar Dronamraju <srikar@linux.vnet.ibm.com> Cc: Peter Zijlstra <peterz@infradead.org>, Ingo Molnar <mingo@elte.hu>, Steven Rostedt <rostedt@goodmis.org>, Linux-mm <linux-mm@kvack.org>, Arnaldo Carvalho de Melo <acme@infradead.org>, Linus Torvalds <torvalds@linux-foundation.org>, Ananth N Mavinakayanahalli <ananth@in.ibm.com>, Christoph Hellwig <hch@infradead.org>, Andi Kleen <andi@firstfloor.org>, Thomas Gleixner <tglx@linutronix.de>, Jonathan Corbet <corbet@lwn.net>, Oleg Nesterov <oleg@redhat.com>, LKML <linux-kernel@vger.kernel.org>, Jim Keniston <jkenisto@linux.vnet.ibm.com>, Roland McGrath <roland@hack.frob.com>, SystemTap <systemtap@sources.redhat.com>, Andrew Morton <akpm@linux-foundation.org> Subject: Re: [PATCH v3 2.6.39-rc1-tip 23/26] 23: perf: show possible probes in a given executable file or library. Date: Mon, 04 Apr 2011 19:15:11 +0900 [thread overview] Message-ID: <4D999A2F.4020204@hitachi.com> (raw) In-Reply-To: <20110401143707.15455.66114.sendpatchset@localhost6.localdomain6> (2011/04/01 23:37), Srikar Dronamraju wrote: > Enhances -F/--funcs option of "perf probe" to list possible probe points in > an executable file or library. A new option -e/--exe specifies the path of > the executable or library. I think you'd better use -x for abbr. of --exe, since -e is used for --event for other subcommands. And also, it seems this kind of patch should be placed after perf-probe uprobe support patch, because without uprobe support, user binary analysis is meaningless. (In the result, this introduces -u/--uprobe option without uprobe support) > Show last 10 functions in /bin/zsh. > > # perf probe -F -u -e /bin/zsh | tail I also can't understand why -u is required even if we have -x for user binaries and -m for kernel modules. Thanks, > zstrtol > ztrcmp > ztrdup > ztrduppfx > ztrftime > ztrlen > ztrncpy > ztrsub > zwarn > zwarnnam > > Show first 10 functions in /lib/libc.so.6 > > # perf probe -u -F -e /lib/libc.so.6 | head > _IO_adjust_column > _IO_adjust_wcolumn > _IO_default_doallocate > _IO_default_finish > _IO_default_pbackfail > _IO_default_uflow > _IO_default_xsgetn > _IO_default_xsputn > _IO_do_write@@GLIBC_2.2.5 > _IO_doallocbuf > > Signed-off-by: Srikar Dronamraju <srikar@linux.vnet.ibm.com> > --- > tools/perf/builtin-probe.c | 9 +++++-- > tools/perf/util/probe-event.c | 56 +++++++++++++++++++++++++++++++---------- > tools/perf/util/probe-event.h | 4 +-- > tools/perf/util/symbol.c | 8 ++++++ > tools/perf/util/symbol.h | 1 + > 5 files changed, 61 insertions(+), 17 deletions(-) > > diff --git a/tools/perf/builtin-probe.c b/tools/perf/builtin-probe.c > index 98db08f..6ceebea 100644 > --- a/tools/perf/builtin-probe.c > +++ b/tools/perf/builtin-probe.c > @@ -57,6 +57,7 @@ static struct { > bool show_ext_vars; > bool show_funcs; > bool mod_events; > + bool uprobes; > int nevents; > struct perf_probe_event events[MAX_PROBES]; > struct strlist *dellist; > @@ -249,6 +250,10 @@ static const struct option options[] = { > "Set how many probe points can be found for a probe."), > OPT_BOOLEAN('F', "funcs", ¶ms.show_funcs, > "Show potential probe-able functions."), > + OPT_BOOLEAN('u', "uprobe", ¶ms.uprobes, > + "user space probe events"), > + OPT_STRING('e', "exe", ¶ms.target, > + "executable", "userspace executable or library"), > OPT_CALLBACK('\0', "filter", NULL, > "[!]FILTER", "Set a filter (with --vars/funcs only)\n" > "\t\t\t(default: \"" DEFAULT_VAR_FILTER "\" for --vars,\n" > @@ -327,8 +332,8 @@ int cmd_probe(int argc, const char **argv, const char *prefix __used) > if (!params.filter) > params.filter = strfilter__new(DEFAULT_FUNC_FILTER, > NULL); > - ret = show_available_funcs(params.target, > - params.filter); > + ret = show_available_funcs(params.target, params.filter, > + params.uprobes); > strfilter__delete(params.filter); > if (ret < 0) > pr_err(" Error: Failed to show functions." > diff --git a/tools/perf/util/probe-event.c b/tools/perf/util/probe-event.c > index 09c53c1..cf77feb 100644 > --- a/tools/perf/util/probe-event.c > +++ b/tools/perf/util/probe-event.c > @@ -47,6 +47,7 @@ > #include "trace-event.h" /* For __unused */ > #include "probe-event.h" > #include "probe-finder.h" > +#include "session.h" > > #define MAX_CMDLEN 256 > #define MAX_PROBE_ARGS 128 > @@ -1963,6 +1964,7 @@ int del_perf_probe_events(struct strlist *dellist) > > return ret; > } > + > /* TODO: don't use a global variable for filter ... */ > static struct strfilter *available_func_filter; > > @@ -1979,30 +1981,58 @@ static int filter_available_functions(struct map *map __unused, > return 1; > } > > -int show_available_funcs(const char *elfobject, struct strfilter *_filter) > +static int __show_available_funcs(struct map *map) > +{ > + if (map__load(map, filter_available_functions)) { > + pr_err("Failed to load map.\n"); > + return -EINVAL; > + } > + if (!dso__sorted_by_name(map->dso, map->type)) > + dso__sort_by_name(map->dso, map->type); > + > + dso__fprintf_symbols_by_name(map->dso, map->type, stdout); > + return 0; > +} > + > +static int available_kernel_funcs(const char *module) > { > struct map *map; > int ret; > > - setup_pager(); > - > ret = init_vmlinux(); > if (ret < 0) > return ret; > > - map = kernel_get_module_map(elfobject); > + map = kernel_get_module_map(module); > if (!map) { > - pr_err("Failed to find %s map.\n", (elfobject) ? : "kernel"); > + pr_err("Failed to find %s map.\n", (module) ? : "kernel"); > return -EINVAL; > } > + return __show_available_funcs(map); > +} > + > +int show_available_funcs(const char *elfobject, struct strfilter *_filter, > + bool user) > +{ > + struct map *map; > + int ret; > + > + setup_pager(); > available_func_filter = _filter; > - if (map__load(map, filter_available_functions)) { > - pr_err("Failed to load map.\n"); > - return -EINVAL; > - } > - if (!dso__sorted_by_name(map->dso, map->type)) > - dso__sort_by_name(map->dso, map->type); > > - dso__fprintf_symbols_by_name(map->dso, map->type, stdout); > - return 0; > + if (!user) > + return available_kernel_funcs(elfobject); > + > + symbol_conf.try_vmlinux_path = false; > + symbol_conf.sort_by_name = true; > + ret = symbol__init(); > + if (ret < 0) { > + pr_err("Failed to init symbol map.\n"); > + return ret; > + } > + map = dso__new_map(elfobject); > + ret = __show_available_funcs(map); > + dso__delete(map->dso); > + map__delete(map); > + return ret; > } > diff --git a/tools/perf/util/probe-event.h b/tools/perf/util/probe-event.h > index 3434fc9..4c24a85 100644 > --- a/tools/perf/util/probe-event.h > +++ b/tools/perf/util/probe-event.h > @@ -128,8 +128,8 @@ extern int show_line_range(struct line_range *lr, const char *module); > extern int show_available_vars(struct perf_probe_event *pevs, int npevs, > int max_probe_points, const char *module, > struct strfilter *filter, bool externs); > -extern int show_available_funcs(const char *module, struct strfilter *filter); > - > +extern int show_available_funcs(const char *module, struct strfilter *filter, > + bool user); > > /* Maximum index number of event-name postfix */ > #define MAX_EVENT_INDEX 1024 > diff --git a/tools/perf/util/symbol.c b/tools/perf/util/symbol.c > index f06c10f..eefeab4 100644 > --- a/tools/perf/util/symbol.c > +++ b/tools/perf/util/symbol.c > @@ -2606,3 +2606,11 @@ int machine__load_vmlinux_path(struct machine *self, enum map_type type, > > return ret; > } > + > +struct map *dso__new_map(const char *name) > +{ > + struct dso *dso = dso__new(name); > + struct map *map = map__new2(0, dso, MAP__FUNCTION); > + > + return map; > +} > diff --git a/tools/perf/util/symbol.h b/tools/perf/util/symbol.h > index 713b0b4..3838909 100644 > --- a/tools/perf/util/symbol.h > +++ b/tools/perf/util/symbol.h > @@ -211,6 +211,7 @@ char dso__symtab_origin(const struct dso *self); > void dso__set_long_name(struct dso *self, char *name); > void dso__set_build_id(struct dso *self, void *build_id); > void dso__read_running_kernel_build_id(struct dso *self, struct machine *machine); > +struct map *dso__new_map(const char *name); > struct symbol *dso__find_symbol(struct dso *self, enum map_type type, u64 addr); > struct symbol *dso__find_symbol_by_name(struct dso *self, enum map_type type, > const char *name); > -- > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/ -- Masami HIRAMATSU Software Platform Research Dept. Linux Technology Center Hitachi, Ltd., Yokohama Research Laboratory E-mail: masami.hiramatsu.pt@hitachi.com
WARNING: multiple messages have this Message-ID (diff)
From: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com> To: Srikar Dronamraju <srikar@linux.vnet.ibm.com> Cc: Peter Zijlstra <peterz@infradead.org>, Ingo Molnar <mingo@elte.hu>, Steven Rostedt <rostedt@goodmis.org>, Linux-mm <linux-mm@kvack.org>, Arnaldo Carvalho de Melo <acme@infradead.org>, Linus Torvalds <torvalds@linux-foundation.org>, Ananth N Mavinakayanahalli <ananth@in.ibm.com>, Christoph Hellwig <hch@infradead.org>, Andi Kleen <andi@firstfloor.org>, Thomas Gleixner <tglx@linutronix.de>, Jonathan Corbet <corbet@lwn.net>, Oleg Nesterov <oleg@redhat.com>, LKML <linux-kernel@vger.kernel.org>, Jim Keniston <jkenisto@linux.vnet.ibm.com>, Roland McGrath <roland@hack.frob.com>, SystemTap <systemtap@sources.redhat.com>, Andrew Morton <akpm@linux-foundation.org> Subject: Re: [PATCH v3 2.6.39-rc1-tip 23/26] 23: perf: show possible probes in a given executable file or library. Date: Mon, 04 Apr 2011 19:15:11 +0900 [thread overview] Message-ID: <4D999A2F.4020204@hitachi.com> (raw) In-Reply-To: <20110401143707.15455.66114.sendpatchset@localhost6.localdomain6> (2011/04/01 23:37), Srikar Dronamraju wrote: > Enhances -F/--funcs option of "perf probe" to list possible probe points in > an executable file or library. A new option -e/--exe specifies the path of > the executable or library. I think you'd better use -x for abbr. of --exe, since -e is used for --event for other subcommands. And also, it seems this kind of patch should be placed after perf-probe uprobe support patch, because without uprobe support, user binary analysis is meaningless. (In the result, this introduces -u/--uprobe option without uprobe support) > Show last 10 functions in /bin/zsh. > > # perf probe -F -u -e /bin/zsh | tail I also can't understand why -u is required even if we have -x for user binaries and -m for kernel modules. Thanks, > zstrtol > ztrcmp > ztrdup > ztrduppfx > ztrftime > ztrlen > ztrncpy > ztrsub > zwarn > zwarnnam > > Show first 10 functions in /lib/libc.so.6 > > # perf probe -u -F -e /lib/libc.so.6 | head > _IO_adjust_column > _IO_adjust_wcolumn > _IO_default_doallocate > _IO_default_finish > _IO_default_pbackfail > _IO_default_uflow > _IO_default_xsgetn > _IO_default_xsputn > _IO_do_write@@GLIBC_2.2.5 > _IO_doallocbuf > > Signed-off-by: Srikar Dronamraju <srikar@linux.vnet.ibm.com> > --- > tools/perf/builtin-probe.c | 9 +++++-- > tools/perf/util/probe-event.c | 56 +++++++++++++++++++++++++++++++---------- > tools/perf/util/probe-event.h | 4 +-- > tools/perf/util/symbol.c | 8 ++++++ > tools/perf/util/symbol.h | 1 + > 5 files changed, 61 insertions(+), 17 deletions(-) > > diff --git a/tools/perf/builtin-probe.c b/tools/perf/builtin-probe.c > index 98db08f..6ceebea 100644 > --- a/tools/perf/builtin-probe.c > +++ b/tools/perf/builtin-probe.c > @@ -57,6 +57,7 @@ static struct { > bool show_ext_vars; > bool show_funcs; > bool mod_events; > + bool uprobes; > int nevents; > struct perf_probe_event events[MAX_PROBES]; > struct strlist *dellist; > @@ -249,6 +250,10 @@ static const struct option options[] = { > "Set how many probe points can be found for a probe."), > OPT_BOOLEAN('F', "funcs", ¶ms.show_funcs, > "Show potential probe-able functions."), > + OPT_BOOLEAN('u', "uprobe", ¶ms.uprobes, > + "user space probe events"), > + OPT_STRING('e', "exe", ¶ms.target, > + "executable", "userspace executable or library"), > OPT_CALLBACK('\0', "filter", NULL, > "[!]FILTER", "Set a filter (with --vars/funcs only)\n" > "\t\t\t(default: \"" DEFAULT_VAR_FILTER "\" for --vars,\n" > @@ -327,8 +332,8 @@ int cmd_probe(int argc, const char **argv, const char *prefix __used) > if (!params.filter) > params.filter = strfilter__new(DEFAULT_FUNC_FILTER, > NULL); > - ret = show_available_funcs(params.target, > - params.filter); > + ret = show_available_funcs(params.target, params.filter, > + params.uprobes); > strfilter__delete(params.filter); > if (ret < 0) > pr_err(" Error: Failed to show functions." > diff --git a/tools/perf/util/probe-event.c b/tools/perf/util/probe-event.c > index 09c53c1..cf77feb 100644 > --- a/tools/perf/util/probe-event.c > +++ b/tools/perf/util/probe-event.c > @@ -47,6 +47,7 @@ > #include "trace-event.h" /* For __unused */ > #include "probe-event.h" > #include "probe-finder.h" > +#include "session.h" > > #define MAX_CMDLEN 256 > #define MAX_PROBE_ARGS 128 > @@ -1963,6 +1964,7 @@ int del_perf_probe_events(struct strlist *dellist) > > return ret; > } > + > /* TODO: don't use a global variable for filter ... */ > static struct strfilter *available_func_filter; > > @@ -1979,30 +1981,58 @@ static int filter_available_functions(struct map *map __unused, > return 1; > } > > -int show_available_funcs(const char *elfobject, struct strfilter *_filter) > +static int __show_available_funcs(struct map *map) > +{ > + if (map__load(map, filter_available_functions)) { > + pr_err("Failed to load map.\n"); > + return -EINVAL; > + } > + if (!dso__sorted_by_name(map->dso, map->type)) > + dso__sort_by_name(map->dso, map->type); > + > + dso__fprintf_symbols_by_name(map->dso, map->type, stdout); > + return 0; > +} > + > +static int available_kernel_funcs(const char *module) > { > struct map *map; > int ret; > > - setup_pager(); > - > ret = init_vmlinux(); > if (ret < 0) > return ret; > > - map = kernel_get_module_map(elfobject); > + map = kernel_get_module_map(module); > if (!map) { > - pr_err("Failed to find %s map.\n", (elfobject) ? : "kernel"); > + pr_err("Failed to find %s map.\n", (module) ? : "kernel"); > return -EINVAL; > } > + return __show_available_funcs(map); > +} > + > +int show_available_funcs(const char *elfobject, struct strfilter *_filter, > + bool user) > +{ > + struct map *map; > + int ret; > + > + setup_pager(); > available_func_filter = _filter; > - if (map__load(map, filter_available_functions)) { > - pr_err("Failed to load map.\n"); > - return -EINVAL; > - } > - if (!dso__sorted_by_name(map->dso, map->type)) > - dso__sort_by_name(map->dso, map->type); > > - dso__fprintf_symbols_by_name(map->dso, map->type, stdout); > - return 0; > + if (!user) > + return available_kernel_funcs(elfobject); > + > + symbol_conf.try_vmlinux_path = false; > + symbol_conf.sort_by_name = true; > + ret = symbol__init(); > + if (ret < 0) { > + pr_err("Failed to init symbol map.\n"); > + return ret; > + } > + map = dso__new_map(elfobject); > + ret = __show_available_funcs(map); > + dso__delete(map->dso); > + map__delete(map); > + return ret; > } > diff --git a/tools/perf/util/probe-event.h b/tools/perf/util/probe-event.h > index 3434fc9..4c24a85 100644 > --- a/tools/perf/util/probe-event.h > +++ b/tools/perf/util/probe-event.h > @@ -128,8 +128,8 @@ extern int show_line_range(struct line_range *lr, const char *module); > extern int show_available_vars(struct perf_probe_event *pevs, int npevs, > int max_probe_points, const char *module, > struct strfilter *filter, bool externs); > -extern int show_available_funcs(const char *module, struct strfilter *filter); > - > +extern int show_available_funcs(const char *module, struct strfilter *filter, > + bool user); > > /* Maximum index number of event-name postfix */ > #define MAX_EVENT_INDEX 1024 > diff --git a/tools/perf/util/symbol.c b/tools/perf/util/symbol.c > index f06c10f..eefeab4 100644 > --- a/tools/perf/util/symbol.c > +++ b/tools/perf/util/symbol.c > @@ -2606,3 +2606,11 @@ int machine__load_vmlinux_path(struct machine *self, enum map_type type, > > return ret; > } > + > +struct map *dso__new_map(const char *name) > +{ > + struct dso *dso = dso__new(name); > + struct map *map = map__new2(0, dso, MAP__FUNCTION); > + > + return map; > +} > diff --git a/tools/perf/util/symbol.h b/tools/perf/util/symbol.h > index 713b0b4..3838909 100644 > --- a/tools/perf/util/symbol.h > +++ b/tools/perf/util/symbol.h > @@ -211,6 +211,7 @@ char dso__symtab_origin(const struct dso *self); > void dso__set_long_name(struct dso *self, char *name); > void dso__set_build_id(struct dso *self, void *build_id); > void dso__read_running_kernel_build_id(struct dso *self, struct machine *machine); > +struct map *dso__new_map(const char *name); > struct symbol *dso__find_symbol(struct dso *self, enum map_type type, u64 addr); > struct symbol *dso__find_symbol_by_name(struct dso *self, enum map_type type, > const char *name); > -- > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/ -- Masami HIRAMATSU Software Platform Research Dept. Linux Technology Center Hitachi, Ltd., Yokohama Research Laboratory E-mail: masami.hiramatsu.pt@hitachi.com -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/ Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2011-04-04 10:15 UTC|newest] Thread overview: 150+ messages / expand[flat|nested] mbox.gz Atom feed top 2011-04-01 14:32 [PATCH v3 2.6.39-rc1-tip 0/26] 0: Uprobes patchset with perf probe support Srikar Dronamraju 2011-04-01 14:32 ` Srikar Dronamraju 2011-04-01 14:32 ` [PATCH v3 2.6.39-rc1-tip 1/26] 1: mm: replace_page() loses static attribute Srikar Dronamraju 2011-04-01 14:32 ` Srikar Dronamraju 2011-04-01 14:32 ` [PATCH v3 2.6.39-rc1-tip 2/26] 2: mm: Move replace_page() to mm/memory.c Srikar Dronamraju 2011-04-01 14:32 ` Srikar Dronamraju 2011-04-01 14:33 ` [PATCH v3 2.6.39-rc1-tip 3/26] 3: X86 specific breakpoint definitions Srikar Dronamraju 2011-04-01 14:33 ` Srikar Dronamraju 2011-04-01 14:33 ` [PATCH v3 2.6.39-rc1-tip 4/26] 4: uprobes: Breakground page replacement Srikar Dronamraju 2011-04-01 14:33 ` Srikar Dronamraju 2011-04-18 12:20 ` Peter Zijlstra 2011-04-18 12:20 ` Peter Zijlstra 2011-04-01 14:33 ` [PATCH v3 2.6.39-rc1-tip 5/26] 5: uprobes: Adding and remove a uprobe in a rb tree Srikar Dronamraju 2011-04-01 14:33 ` Srikar Dronamraju 2011-04-18 12:20 ` Peter Zijlstra 2011-04-18 12:20 ` Peter Zijlstra 2011-04-01 14:33 ` [PATCH v3 2.6.39-rc1-tip 6/26] 6: Uprobes: register/unregister probes Srikar Dronamraju 2011-04-01 14:33 ` Srikar Dronamraju 2011-04-02 0:26 ` Stephen Wilson 2011-04-02 0:26 ` Stephen Wilson 2011-04-02 0:53 ` Srikar Dronamraju 2011-04-02 0:53 ` Srikar Dronamraju 2011-04-02 1:29 ` Stephen Wilson 2011-04-02 1:29 ` Stephen Wilson 2011-04-18 12:20 ` Peter Zijlstra 2011-04-18 12:20 ` Peter Zijlstra 2011-04-01 14:33 ` [PATCH v3 2.6.39-rc1-tip 7/26] 7: x86: analyze instruction and determine fixups Srikar Dronamraju 2011-04-01 14:33 ` Srikar Dronamraju 2011-04-19 13:29 ` Steven Rostedt 2011-04-19 13:29 ` Steven Rostedt 2011-04-21 17:31 ` Srikar Dronamraju 2011-04-21 17:31 ` Srikar Dronamraju 2011-04-21 17:52 ` Peter Zijlstra 2011-04-21 17:52 ` Peter Zijlstra 2011-04-01 14:33 ` [PATCH v3 2.6.39-rc1-tip 8/26] 8: uprobes: store/restore original instruction Srikar Dronamraju 2011-04-01 14:33 ` Srikar Dronamraju 2011-04-18 16:12 ` Peter Zijlstra 2011-04-18 16:12 ` Peter Zijlstra 2011-04-01 14:34 ` [PATCH v3 2.6.39-rc1-tip 9/26] 9: uprobes: mmap and fork hooks Srikar Dronamraju 2011-04-01 14:34 ` Srikar Dronamraju 2011-04-18 16:21 ` Peter Zijlstra 2011-04-18 16:21 ` Peter Zijlstra 2011-04-18 16:29 ` Peter Zijlstra 2011-04-18 16:29 ` Peter Zijlstra 2011-04-19 6:45 ` Srikar Dronamraju 2011-04-19 6:45 ` Srikar Dronamraju 2011-04-01 14:34 ` [PATCH v3 2.6.39-rc1-tip 10/26] 10: x86: architecture specific task information Srikar Dronamraju 2011-04-01 14:34 ` Srikar Dronamraju 2011-04-01 14:34 ` [PATCH v3 2.6.39-rc1-tip 11/26] 11: uprobes: task specific information Srikar Dronamraju 2011-04-01 14:34 ` Srikar Dronamraju 2011-04-01 14:34 ` [PATCH v3 2.6.39-rc1-tip 12/26] 12: uprobes: slot allocation for uprobes Srikar Dronamraju 2011-04-01 14:34 ` Srikar Dronamraju 2011-04-18 16:46 ` Peter Zijlstra 2011-04-18 16:46 ` Peter Zijlstra 2011-04-19 6:26 ` Srikar Dronamraju 2011-04-19 6:26 ` Srikar Dronamraju 2011-04-19 9:02 ` Peter Zijlstra 2011-04-19 9:02 ` Peter Zijlstra 2011-04-19 9:11 ` Peter Zijlstra 2011-04-19 9:11 ` Peter Zijlstra 2011-04-20 13:40 ` Eric Paris 2011-04-20 13:40 ` Eric Paris 2011-04-20 14:51 ` Frank Ch. Eigler 2011-04-20 14:51 ` Frank Ch. Eigler 2011-04-20 15:16 ` Stephen Smalley 2011-04-20 15:16 ` Stephen Smalley 2011-04-21 14:11 ` Srikar Dronamraju 2011-04-21 14:11 ` Srikar Dronamraju 2011-04-21 14:45 ` Eric Paris 2011-04-21 14:45 ` Eric Paris 2011-04-21 16:14 ` Roland McGrath 2011-04-21 16:14 ` Roland McGrath 2011-04-21 16:59 ` Srikar Dronamraju 2011-04-21 16:59 ` Srikar Dronamraju 2011-04-01 14:35 ` [PATCH v3 2.6.39-rc1-tip 13/26] 13: uprobes: get the breakpoint address Srikar Dronamraju 2011-04-01 14:35 ` Srikar Dronamraju 2011-04-18 16:47 ` Peter Zijlstra 2011-04-18 16:47 ` Peter Zijlstra 2011-04-01 14:35 ` [PATCH v3 2.6.39-rc1-tip 14/26] 14: x86: x86 specific probe handling Srikar Dronamraju 2011-04-01 14:35 ` Srikar Dronamraju 2011-04-18 16:55 ` Peter Zijlstra 2011-04-18 16:55 ` Peter Zijlstra 2011-04-19 5:43 ` Srikar Dronamraju 2011-04-19 5:43 ` Srikar Dronamraju 2011-04-18 16:57 ` Peter Zijlstra 2011-04-18 16:57 ` Peter Zijlstra 2011-04-01 14:35 ` [PATCH v3 2.6.39-rc1-tip 15/26] 15: uprobes: Handing int3 and singlestep exception Srikar Dronamraju 2011-04-01 14:35 ` Srikar Dronamraju 2011-04-19 13:03 ` Peter Zijlstra 2011-04-19 13:03 ` Peter Zijlstra 2011-04-19 13:12 ` Steven Rostedt 2011-04-19 13:12 ` Steven Rostedt 2011-04-21 17:10 ` Srikar Dronamraju 2011-04-21 17:10 ` Srikar Dronamraju 2011-04-21 17:41 ` Peter Zijlstra 2011-04-21 17:41 ` Peter Zijlstra 2011-04-19 13:39 ` Peter Zijlstra 2011-04-19 13:39 ` Peter Zijlstra 2011-04-21 17:03 ` Srikar Dronamraju 2011-04-21 17:03 ` Srikar Dronamraju 2011-04-01 14:35 ` [PATCH v3 2.6.39-rc1-tip 16/26] 16: x86: uprobes exception notifier for x86 Srikar Dronamraju 2011-04-01 14:35 ` Srikar Dronamraju 2011-04-01 14:35 ` [PATCH v3 2.6.39-rc1-tip 17/26] 17: uprobes: register a notifier for uprobes Srikar Dronamraju 2011-04-01 14:35 ` Srikar Dronamraju 2011-04-19 13:54 ` Peter Zijlstra 2011-04-19 13:54 ` Peter Zijlstra 2011-04-01 14:36 ` [PATCH v3 2.6.39-rc1-tip 18/26] 18: uprobes: commonly used filters Srikar Dronamraju 2011-04-01 14:36 ` Srikar Dronamraju 2011-04-05 1:26 ` Masami Hiramatsu 2011-04-05 1:26 ` Masami Hiramatsu 2011-04-19 13:57 ` Peter Zijlstra 2011-04-19 13:57 ` Peter Zijlstra 2011-04-21 11:09 ` Srikar Dronamraju 2011-04-21 11:09 ` Srikar Dronamraju 2011-04-21 11:37 ` Peter Zijlstra 2011-04-21 11:37 ` Peter Zijlstra 2011-04-21 11:49 ` Srikar Dronamraju 2011-04-21 11:49 ` Srikar Dronamraju 2011-04-01 14:36 ` [PATCH v3 2.6.39-rc1-tip 19/26] 19: tracing: Extract out common code for kprobes/uprobes traceevents Srikar Dronamraju 2011-04-01 14:36 ` Srikar Dronamraju 2011-04-01 14:36 ` [PATCH v3 2.6.39-rc1-tip 20/26] 20: tracing: uprobes trace_event interface Srikar Dronamraju 2011-04-01 14:36 ` Srikar Dronamraju 2011-04-01 14:36 ` [PATCH v3 2.6.39-rc1-tip 21/26] 21: Signed-off-by: Srikar Dronamraju <srikar@linux.vnet.ibm.com> Srikar Dronamraju 2011-04-01 14:36 ` Srikar Dronamraju 2011-04-01 14:47 ` [RESEND] [PATCH v3 2.6.39-rc1-tip 21/26] 21: Uprobe tracer documentation " Srikar Dronamraju 2011-04-01 14:47 ` Srikar Dronamraju 2011-04-01 14:36 ` [PATCH v3 2.6.39-rc1-tip 22/26] 22: perf: rename target_module to target Srikar Dronamraju 2011-04-01 14:36 ` Srikar Dronamraju 2011-04-04 10:06 ` Masami Hiramatsu 2011-04-04 10:06 ` Masami Hiramatsu 2011-04-06 23:46 ` Srikar Dronamraju 2011-04-06 23:46 ` Srikar Dronamraju 2011-04-01 14:37 ` [PATCH v3 2.6.39-rc1-tip 23/26] 23: perf: show possible probes in a given executable file or library Srikar Dronamraju 2011-04-01 14:37 ` Srikar Dronamraju 2011-04-04 10:15 ` Masami Hiramatsu [this message] 2011-04-04 10:15 ` Masami Hiramatsu 2011-04-06 22:50 ` Srikar Dronamraju 2011-04-06 22:50 ` Srikar Dronamraju 2011-04-01 14:37 ` [PATCH v3 2.6.39-rc1-tip 24/26] 24: perf: perf interface for uprobes Srikar Dronamraju 2011-04-01 14:37 ` Srikar Dronamraju 2011-04-01 14:37 ` [PATCH v3 2.6.39-rc1-tip 25/26] 25: perf: Documentation for perf uprobes Srikar Dronamraju 2011-04-01 14:37 ` Srikar Dronamraju 2011-04-01 14:37 ` [PATCH v3 2.6.39-rc1-tip 26/26] 26: uprobes: filter chain Srikar Dronamraju 2011-04-01 14:37 ` Srikar Dronamraju 2011-04-05 1:27 ` Masami Hiramatsu 2011-04-05 1:27 ` Masami Hiramatsu 2011-04-06 22:41 ` Srikar Dronamraju 2011-04-06 22:41 ` Srikar Dronamraju 2011-04-07 3:19 ` Masami Hiramatsu 2011-04-07 3:19 ` Masami Hiramatsu
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=4D999A2F.4020204@hitachi.com \ --to=masami.hiramatsu.pt@hitachi.com \ --cc=acme@infradead.org \ --cc=akpm@linux-foundation.org \ --cc=ananth@in.ibm.com \ --cc=andi@firstfloor.org \ --cc=corbet@lwn.net \ --cc=hch@infradead.org \ --cc=jkenisto@linux.vnet.ibm.com \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=mingo@elte.hu \ --cc=oleg@redhat.com \ --cc=peterz@infradead.org \ --cc=roland@hack.frob.com \ --cc=rostedt@goodmis.org \ --cc=srikar@linux.vnet.ibm.com \ --cc=systemtap@sources.redhat.com \ --cc=tglx@linutronix.de \ --cc=torvalds@linux-foundation.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.