lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 26 Nov 2015 08:48:17 -0700 From: David Ahern <dsahern@...il.com> To: Namhyung Kim <namhyung@...nel.org> Cc: Arnaldo Carvalho de Melo <acme@...nel.org>, Ingo Molnar <mingo@...nel.org>, Peter Zijlstra <a.p.zijlstra@...llo.nl>, Jiri Olsa <jolsa@...hat.com>, LKML <linux-kernel@...r.kernel.org>, Kan Liang <kan.liang@...el.com>, Frederic Weisbecker <fweisbec@...il.com>, Andi Kleen <andi@...stfloor.org>, Wang Nan <wangnan0@...wei.com> Subject: Re: [PATCH 2/3] perf callchain: Stop resolving callchains after invalid address On 11/26/15 8:00 AM, Namhyung Kim wrote: > Hi David, > > On Thu, Nov 26, 2015 at 06:14:57AM -0700, David Ahern wrote: >> On 11/26/15 12:08 AM, Namhyung Kim wrote: >>> @@ -528,11 +529,16 @@ int main(int argc, const char **argv) >>> { >>> const char *cmd; >>> char sbuf[STRERR_BUFSIZE]; >>> + int min_addr; >>> >>> /* The page_size is placed in util object. */ >>> page_size = sysconf(_SC_PAGE_SIZE); >>> cacheline_size = sysconf(_SC_LEVEL1_DCACHE_LINESIZE); >>> >>> + if (sysctl__read_int("vm/mmap_min_addr", &min_addr) < 0) >> >> This assumes the record and analysis are done on the same system. > > Right. Maybe we can just use minimal size (or page size?) or save and > pass it through somewhere in the feature bit? no preference, but it should work with cross arch analysis as well (e.g., record on arm/ppc and analysis on x86) -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists