Received: by 2002:a05:7412:f690:b0:e2:908c:2ebd with SMTP id ej16csp1275223rdb; Fri, 20 Oct 2023 13:39:46 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHexfbTka/PB7T9xp60ltcLzImyP/QXzbT8BKpB2LyO5P4dU6s8x2odnmy2m5NpRl1Zz6FX X-Received: by 2002:a05:6358:988d:b0:143:e3a:de5f with SMTP id q13-20020a056358988d00b001430e3ade5fmr2655555rwa.26.1697834386314; Fri, 20 Oct 2023 13:39:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697834386; cv=none; d=google.com; s=arc-20160816; b=qt2gubLKnnUecOnkelS4/7yATo8GaTOFmLsDgZv56EgH32RlfW+5SLcY5plu/xmPKx xGXsEvR5sYvS49lLf8tf7uCZtygtLO6JxzD98czLYb0mzRhLsinNbjD5DrY5sDOTfUyM bQgOYlXUggerCBJiUeLFFfUQNPrw9RRXTtfn2mvaZfQcuFI1dpd87YPElhMlxHacpnH4 vvlgUrsP4UNvpvq9wlDjYfbRoa4Nh/ortYQJ6K4UcvIY+dUIrzOA3qO2R7OoIcwDguAx NSFiWJygGqASB3plhxfyHzcUHpOxWasZ4MrCyNG6EEWSS+U+4gWpD7pyavRivbGEgcxE NmLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=maNhhr3UtC8a/15j+QESNdV/RUSa7Ro5cojAEqx1Ab8=; fh=Hay7INyl2bzQVS30gEYVnTWGEa+NuS6rK/CSsP1FzCc=; b=sKUjQTgeXK2JlrKbcwXXEYIAu9xioeNvBKzK+AOiayaEoncK/bIp6gm7qVz+jHenC+ aWJha8my8L4FBbGB7nB7mWCg7lcCTAcU9WpnhpH1lLQZyhDpU9p9g1jguodwHq5kg/EM x/DMA3LYd2V6H3/YHhLgN6wAIKsFgs7zeAaOkmz+Ivwgn5kxOKcBJNOo/cwMdSWZwA+G K6MmSaIUKn3tr/S9UQEz8IgGD4rSJ7oeW61CvhOC9CcHav6SWTPq+nVwqH5RykyE3HZa Oz8lhzvH+aNNL2FvjSrjNKAKQO0EbOQT6oCnATRTIy8aOKhSCkcmnAWBIT3RCcVH1cGL gz9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GQAL7fTF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id bq20-20020a056a02045400b0057823b96685si2806749pgb.681.2023.10.20.13.39.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 20 Oct 2023 13:39:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GQAL7fTF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id EEF5483B2E4D; Fri, 20 Oct 2023 13:39:37 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230212AbjJTUja (ORCPT + 99 others); Fri, 20 Oct 2023 16:39:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43626 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229836AbjJTUj3 (ORCPT ); Fri, 20 Oct 2023 16:39:29 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D6E08C0 for ; Fri, 20 Oct 2023 13:39:27 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 43957C433C8; Fri, 20 Oct 2023 20:39:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1697834367; bh=ZKOUkKpmzLJ4Oe8gj86+MBT/cFfPWTMJrQMWrCMlLRA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=GQAL7fTFj73N9mM17vO7a1XNixX0srzkwvr30qZUA8sPcIXo6f6GD3XCMHBwpvnii +sCJehoG1dQw/quOQxyee96FL6M2Sfzu2A2SNIE5YBMtxC8cVUXjKdMUp2BfLsKycz NPbSxvES6U+nuY//yvUzhucrHcqX0tWP+czV7T39Ra6JuvC2UH9tnGOpPAWOH777JA EoDEsYhfcoq/tdDTk3y8swxIe9nVX7YbJUoS+UpyMVfMsFIdpT4cbjYPks+ZHU/eDv Wwui7oB22qAf88qYV9N6z62ZcvQBdtaV9SfSYGfbDArlDgd5QsOxzbV/wdV8i6sYMw vn6PxhkmQj5jg== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 24B354035D; Fri, 20 Oct 2023 17:39:25 -0300 (-03) Date: Fri, 20 Oct 2023 17:39:25 -0300 From: Arnaldo Carvalho de Melo To: Manu Bretelle Cc: Ian Rogers , Peter Zijlstra , Ingo Molnar , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Adrian Hunter , Nathan Chancellor , Nick Desaulniers , Tom Rix , Fangrui Song , Anshuman Khandual , Andi Kleen , Leo Yan , Madhavan Srinivasan , Carsten Haitzler , Ravi Bangoria , "Naveen N. Rao" , Athira Rajeev , Kan Liang , Yang Jihong , James Clark , Tiezhu Yang , Eduard Zingerman , Andrii Nakryiko , Yonghong Song , Rob Herring , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, bpf@vger.kernel.org, llvm@lists.linux.dev, Wang Nan , Wang ShaoBo , YueHaibing , He Kuang , Brendan Gregg , Quentin Monnet Subject: Re: [PATCH v1 1/4] perf parse-events: Remove BPF event support Message-ID: References: <20230810184853.2860737-1-irogers@google.com> <20230810184853.2860737-2-irogers@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Url: http://acmel.wordpress.com X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Fri, 20 Oct 2023 13:39:38 -0700 (PDT) Em Thu, Oct 19, 2023 at 03:48:56PM -0700, Manu Bretelle escreveu: > On Thu, Oct 19, 2023 at 06:08:33PM -0300, Arnaldo Carvalho de Melo wrote: > > I wonder how to improve the current situation to detect these kinds of > > problems in the future, i.e. how to notice that some file needed by some > > Makefile, etc got removed or that some feature test fails because some > > change in the test .c files makes them fail and thus activates fallbacks > > like the one above :-\ > I think it is tricky. Specifically to this situation, some CI could try to build > the different combinaison of bpftool and check the features through the build > `bpftool --version`. Right, if the right packages are installed, we expect to get some bpftool build output, if that changes after some patch, flag it. Does bpftool have something like: ⬢[acme@toolbox perf-tools-next]$ perf version --build-options perf version 6.6.rc1.ga8dd62d05e56 dwarf: [ on ] # HAVE_DWARF_SUPPORT dwarf_getlocations: [ on ] # HAVE_DWARF_GETLOCATIONS_SUPPORT syscall_table: [ on ] # HAVE_SYSCALL_TABLE_SUPPORT libbfd: [ OFF ] # HAVE_LIBBFD_SUPPORT debuginfod: [ on ] # HAVE_DEBUGINFOD_SUPPORT libelf: [ on ] # HAVE_LIBELF_SUPPORT libnuma: [ on ] # HAVE_LIBNUMA_SUPPORT numa_num_possible_cpus: [ on ] # HAVE_LIBNUMA_SUPPORT libperl: [ on ] # HAVE_LIBPERL_SUPPORT libpython: [ on ] # HAVE_LIBPYTHON_SUPPORT libslang: [ on ] # HAVE_SLANG_SUPPORT libcrypto: [ on ] # HAVE_LIBCRYPTO_SUPPORT libunwind: [ on ] # HAVE_LIBUNWIND_SUPPORT libdw-dwarf-unwind: [ on ] # HAVE_DWARF_SUPPORT zlib: [ on ] # HAVE_ZLIB_SUPPORT lzma: [ on ] # HAVE_LZMA_SUPPORT get_cpuid: [ on ] # HAVE_AUXTRACE_SUPPORT bpf: [ on ] # HAVE_LIBBPF_SUPPORT aio: [ on ] # HAVE_AIO_SUPPORT zstd: [ on ] # HAVE_ZSTD_SUPPORT libpfm4: [ on ] # HAVE_LIBPFM libtraceevent: [ on ] # HAVE_LIBTRACEEVENT bpf_skeletons: [ on ] # HAVE_BPF_SKEL ⬢[acme@toolbox perf-tools-next]$ ? > This is actually a test that I run internally to make sure our build has some > feature enabled. > This is actually tested by bpftool in the GH CI: > https://github.com/libbpf/bpftool/blob/main/.github/workflows/build.yaml#L62 > As a matter of fact, it would not have been detected because that CI uses a > different Makefile.feature. > Quentin and I were talking offline how we could improve bpftool CI at diff time. > This is an example where it would have helped :) > > > I'll get this merged in my perf-tools-fixes-for-v6.6 that I'll submit > > tomorrow to Linus, thanks for reporting! > > > > I'll add your: > > > > Reported-by: Manu Bretelle > > > > And: > > > > Fixes: 56b11a2126bf2f42 ("perf bpf: Remove support for embedding clang for compiling BPF events (-e foo.c)") > > > > Ok? > SGTM. Thanks for the quick turnaround. > Reviewed-by: Manu Bretelle You're welcome, thanks for the detailed report, the patch was just sent to Linus. - Arnaldo