Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp680407ybi; Thu, 30 May 2019 05:10:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqx33zzvMIJHnzC85ujmgcahskxTW6qo7tQcCSkyl6brl5tAnbbPlJgj87E/7u3wKbnsA0Lc X-Received: by 2002:a63:f710:: with SMTP id x16mr3455096pgh.216.1559218229618; Thu, 30 May 2019 05:10:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559218229; cv=none; d=google.com; s=arc-20160816; b=fUv07xVPrTBh2XQGObJlbY5PMvN9PoHMYjcnOgsH5a7eB0i4ztaV0IhMFIjmgMgxFg tqHJW3oUSPGws+GKo5hMvK6ktO4lXTaQrt3f2VszHmZ4lhdO289fws9Errv8im3rsdrj kYR1Ofx1u6brzfOvowKMDgCtG9zHuv7w3ZqjsoA/0dX7z6O0Z9YkQA3zbJnLcef+HN7E 0NNI6Kxla8Azlu2mLCV9DAD+ym+0sO+jLOWA9Z4Kaah05Ky5KHL3h5FXgMzJesz8v0gs cB0aVHIkmq271+Nrq42loePCPe3zRyGkhb9TW/h2/j6ko67q0EfOZ1shjdrkwu6TFukH rbmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=qqeNSbRuCd3hxOnVcWiuKg53fJ5y0mtRqpqPrNgKlKs=; b=BizSDQQBUaiCoa2K643S2S4fSVj9TacsMYxhUeFAAIR9+qGFyRrANVnUtgsL8onwWW LGRJq9vIE94R1FV6F6RtPAq2uqUsJ+pT2gr2BnvBF6SNpVmtJjVA7R+XTntzvvWZo6+Y QzlUzrpQf+pOvIv6vs615fctXlDZYlGAvc3gL9uVP23pYrLC2NsXjSLH+WWNPcgBLDut 6Fi20gn3u3MjoC6GmNKx+UbtQ93VCRSBuTDcRQgT+XYUgH7conqXeJQqWlI1O8dGCd08 iHFl0upxNE0g+K3vVBiOchYnWajXlEnGALmOntECH3cmemFaHAZXVm/WasobhoXxDg97 mqrw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u133si3403518pfc.72.2019.05.30.05.10.12; Thu, 30 May 2019 05:10:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727278AbfE3MHZ (ORCPT + 99 others); Thu, 30 May 2019 08:07:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:45148 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726935AbfE3MHW (ORCPT ); Thu, 30 May 2019 08:07:22 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 4A62730C1AFE; Thu, 30 May 2019 12:07:16 +0000 (UTC) Received: from krava (unknown [10.43.17.136]) by smtp.corp.redhat.com (Postfix) with SMTP id B6CC064026; Thu, 30 May 2019 12:07:10 +0000 (UTC) Date: Thu, 30 May 2019 14:07:10 +0200 From: Jiri Olsa To: Leo Yan Cc: Jiri Olsa , Arnaldo Carvalho de Melo , Jesper Dangaard Brouer , Alexei Starovoitov , Daniel Borkmann , lkml , Ingo Molnar , Namhyung Kim , Alexander Shishkin , Peter Zijlstra , Stanislav Fomichev , Song Liu , Adrian Hunter , Andi Kleen Subject: Re: [PATCHv3 00/12] perf tools: Display eBPF code in intel_pt trace Message-ID: <20190530120709.GA3669@krava> References: <20190508132010.14512-1-jolsa@kernel.org> <20190530105439.GA5927@leoy-ThinkPad-X240s> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190530105439.GA5927@leoy-ThinkPad-X240s> User-Agent: Mutt/1.11.4 (2019-03-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Thu, 30 May 2019 12:07:22 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 30, 2019 at 06:54:39PM +0800, Leo Yan wrote: > Hi Jiri, > > On Wed, May 08, 2019 at 03:19:58PM +0200, Jiri Olsa wrote: > > hi, > > this patchset adds dso support to read and display > > bpf code in intel_pt trace output. I had to change > > some of the kernel maps processing code, so hopefully > > I did not break too many things ;-) > > > > It's now possible to see bpf code flow via: > > > > # perf-with-kcore record pt -e intel_pt//ku -- sleep 1 > > # perf-with-kcore script pt --insn-trace --xed > > This is very interesting work for me! > > I want to verify this feature with Arm CoreSight trace, I have one > question so that I have more direction for the tesing: > > What's the bpf program you are suing for the testing? e.g. some > testing program under the kernel's folder $kernel/samples/bpf? > Or you uses perf command to launch bpf program? for this I was using tools/testing/selftests/bpf/test_verifier I isolated some tests and ran the perf on top of them, like: # perf-with-kcore record pt -e intel_pt//ku -- ./test_verifier ... I had to add some small sleep before the test_verifier exit, so the perf bpf thread could catch up and download the program details before test_verifier exited. jirka > > [...] > > Thanks > Leo Yan