Re: [RFC PATCH 0/5] Generic IPI sending tracepoint
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
- To: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Subject: Re: [RFC PATCH 0/5] Generic IPI sending tracepoint
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Date: Sat, 8 Oct 2022 15:40:16 -0400
- Cc: Valentin Schneider <vschneid@xxxxxxxxxx>, linux-alpha@xxxxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, linux-snps-arc@xxxxxxxxxxxxxxxxxxx, linux-arm-kernel@xxxxxxxxxxxxxxxxxxx, linux-csky@xxxxxxxxxxxxxxx, linux-hexagon@xxxxxxxxxxxxxxx, linux-ia64@xxxxxxxxxxxxxxx, loongarch@xxxxxxxxxxxxxxx, linux-mips@xxxxxxxxxxxxxxx, openrisc@xxxxxxxxxxxxxxxxxxxx, linux-parisc@xxxxxxxxxxxxxxx, linuxppc-dev@xxxxxxxxxxxxxxxx, linux-riscv@xxxxxxxxxxxxxxxxxxx, linux-s390@xxxxxxxxxxxxxxx, linux-sh@xxxxxxxxxxxxxxx, sparclinux@xxxxxxxxxxxxxxx, linux-xtensa@xxxxxxxxxxxxxxxx, x86@xxxxxxxxxx, "Paul E. McKenney" <paulmck@xxxxxxxxxx>, Peter Zijlstra <peterz@xxxxxxxxxxxxx>, Thomas Gleixner <tglx@xxxxxxxxxxxxx>, Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>, Juri Lelli <juri.lelli@xxxxxxxxxx>, Daniel Bristot de Oliveira <bristot@xxxxxxxxxx>, Frederic Weisbecker <frederic@xxxxxxxxxx>, Ingo Molnar <mingo@xxxxxxxxxx>, Borislav Petkov <bp@xxxxxxxxx>, Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>, "H. Peter Anvin" <hpa@xxxxxxxxx>, Marc Zyngier <maz@xxxxxxxxxx>, Mark Rutland <mark.rutland@xxxxxxx>, Russell King <linux@xxxxxxxxxxxxxxx>, Nicholas Piggin <npiggin@xxxxxxxxx>, Guo Ren <guoren@xxxxxxxxxx>, "David S. Miller" <davem@xxxxxxxxxxxxx>
- In-reply-to: <Y0CFnWDpMNGajIRD@fuller.cnet>
- References: <20221007154145.1877054-1-vschneid@redhat.com> <Y0CFnWDpMNGajIRD@fuller.cnet>
On Fri, 7 Oct 2022 17:01:33 -0300
Marcelo Tosatti <mtosatti@xxxxxxxxxx> wrote:
> > As for the targeted CPUs, the existing tracepoint does export them, albeit in
> > cpumask form, which is quite inconvenient from a tooling perspective. For
> > instance, as far as I'm aware, it's not possible to do event filtering on a
> > cpumask via trace-cmd.
>
> https://man7.org/linux/man-pages/man1/trace-cmd-set.1.html
>
> -f filter
> Specify a filter for the previous event. This must come after
> a -e. This will filter what events get recorded based on the
> content of the event. Filtering is passed to the kernel
> directly so what filtering is allowed may depend on what
> version of the kernel you have. Basically, it will let you
> use C notation to check if an event should be processed or
> not.
>
> ==, >=, <=, >, <, &, |, && and ||
>
> The above are usually safe to use to compare fields.
We could always add an "isset(x)" filter ;-)
-- Steve
[Index of Archives]
[Linux Kernel]
[Sparc Linux]
[DCCP]
[Linux ARM]
[Yosemite News]
[Linux SCSI]
[Linux x86_64]
[Linux for Ham Radio]