Before patch:
$ uname -m
ppc64le
$ ./perf script -s ./scripts/python/syscall-counts.py
Install the audit-libs-python package to get syscall names.
For example:
# apt-get install python-audit (Ubuntu)
# yum install audit-libs-python (Fedora)
etc.
Press control+C to stop and show the summary
^CWarning:
4 out of order events recorded.
syscall events:
event count
---------------------------------------- -----------
4 504638
54 1206
221 42
55 21
3 12
167 10
11 8
6 7
125 6
5 6
108 5
162 4
90 4
45 3
33 3
311 1
246 1
238 1
93 1
91 1
After patch:
./perf script -s ./scripts/python/syscall-counts.py
Press control+C to stop and show the summary
^CWarning:
5 out of order events recorded.
syscall events:
event count
---------------------------------------- -----------
write 643411
ioctl 1206
futex 54
fcntl 27
poll 14
read 12
execve 8
close 7
mprotect 6
open 6
nanosleep 5
fstat 5
mmap 4
inotify_add_watch 3
brk 3
access 3
timerfd_settime 1
clock_gettime 1
epoll_wait 1
ftruncate 1
munmap 1
Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Acked-by: Paul Clarke <pc@us.ibm.com>
Cc: linuxppc-dev@lists.ozlabs.org
Link: http://lkml.kernel.org/n/tip-bnl67p1alkvx97pn9moxz3qp@git.kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
'ia64' : audit.MACH_IA64,
'ppc' : audit.MACH_PPC,
'ppc64' : audit.MACH_PPC64,
+ 'ppc64le' : audit.MACH_PPC64LE,
's390' : audit.MACH_S390,
's390x' : audit.MACH_S390X,
'i386' : audit.MACH_X86,