lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140906184631.GA6059@krava.brq.redhat.com>
Date:	Sat, 6 Sep 2014 20:46:31 +0200
From:	Jiri Olsa <jolsa@...hat.com>
To:	Avi Kivity <avi@...udius-systems.com>
Cc:	Arnaldo Carvalho de Melo <acme@...nel.org>,
	linux-kernel@...r.kernel.org, David Ahern <dsahern@...il.com>,
	Frederic Weisbecker <fweisbec@...il.com>,
	Namhyung Kim <namhyung@...nel.org>,
	Paul Mackerras <paulus@...ba.org>,
	Peter Zijlstra <peterz@...radead.org>,
	Stephane Eranian <eranian@...gle.com>,
	Jan Stancek <jstancek@...hat.com>
Subject: [BUG] perf tools: Demangle kernel and kernel module symbols too

hi,
Jan Stancek found test 1 breakage, probably caused by following patch:
  950b8354716e perf tools: Demangle kernel and kernel module symbols too

it seems to break test 1:
---
[jolsa@...va perf]$ ./perf test -v 1
 1: vmlinux symtab matches kallsyms                        :
--- start ---
test child forked, pid 6288
Looking at the vmlinux_path (6 entries long)

SNIP

0xffffffff8142dba0: diff name v: event_queue virtual table k: __vt_event_queue
0xffffffff8142dc00: diff name v: event_dequeue virtual table k: __vt_event_dequeue
0xffffffff8142dd90: diff name v: event_wait::isra::::part:: virtual table k: __vt_event_wait.isra.0.part.1
---

Avi,
could you please update the tests/vmlinux-kallsyms.c to reflect
the demangle change?

thanks,
jirka
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ