lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CACV3sbLJ=ueYj+p_FKeNLB9Tbu33UJXPW12n1ZKVU+bgMLA1Zw@mail.gmail.com>
Date:	Fri, 2 Nov 2012 17:25:59 +0800
From:	Jovi Zhang <bookjovi@...il.com>
To:	LKML <linux-kernel@...r.kernel.org>
Subject: [BUG] arm: perf probe can not get __copy_to_user callchain symbol

Hi

In ARM, It seems that we cannot get __copy_to_user callchain symbol,
like below output,

I guess it due to function __copy_to_user don't compile with unwind
info, is this right?(not sure)

If the problem is relate with unwind info, is there anybody can make a
patch on this? I'm not familiar with unwind stuff very much.
thanks very much.


#perf record -e probe:__copy_to_user* -g -a ls

# Events: 677  probe:__copy_to_user
#
# Overhead  Command      Shared Object          Symbol
# ........  .......  .................  ..............
#
    93.50%     perf  [kernel.kallsyms]  [k] __copy_to_user
               |
               --- __copy_to_user
                  |
                  |--29.38%-- 0xffffffff
                  |          0xc0b00604
                  |
                  |--21.80%-- (nil)
                  |          |
                  |          |--92.03%-- 0xc0b00604
                  |          |
                  |          |--5.07%-- 0xc0af1bcc
                  |          |
                  |          |--1.45%-- 0xc0ab83b4
                  |          |
                  |          |--0.72%-- 0xc0af5a20
                  |          |
                  |           --0.72%-- 0xc0b0c8b0
                  |
                  |--19.91%-- 0xc0b0c8b0
                  |
                  |--19.91%-- 0xc0af5a20
                  |
                  |--8.53%-- 0xc0b0c658
                   --0.47%-- [...]
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ