[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Y1wyIsOqDt4iU134@kernel.org>
Date: Fri, 28 Oct 2022 16:48:50 -0300
From: Arnaldo Carvalho de Melo <acme@...nel.org>
To: Namhyung Kim <namhyung@...nel.org>
Cc: Jiri Olsa <jolsa@...nel.org>, Ingo Molnar <mingo@...nel.org>,
Peter Zijlstra <peterz@...radead.org>,
LKML <linux-kernel@...r.kernel.org>,
Ian Rogers <irogers@...gle.com>,
Adrian Hunter <adrian.hunter@...el.com>,
linux-perf-users@...r.kernel.org
Subject: Re: [PATCH 0/4] perf lock contention: Small random fixes
Em Fri, Oct 28, 2022 at 11:01:24AM -0700, Namhyung Kim escreveu:
> Hello,
>
> This is a small update for the perf lock contention command.
>
> The first issue is from msan (memory sanitizer) related to uninitialized
> memory access and use of variable length array.
>
> The other is to increase the default stack skip count to find appropriate
> callers in most cases.
>
> You can get it from 'perf/lock-con-fix-v1' branch in
>
> git://git.kernel.org/pub/scm/linux/kernel/git/namhyung/linux-perf.git
Thanks, applied.
- Arnaldo
> Thanks,
> Namhyung
>
>
> Namhyung Kim (4):
> perf lock contention: Fix memory sanitizer issue
> perf lock contention: Check --max-stack option
> perf lock contention: Avoid variable length arrays
> perf lock contention: Increase default stack skip to 4
>
> tools/perf/builtin-lock.c | 30 +++++++++++++++++--
> tools/perf/util/bpf_lock_contention.c | 43 ++++++++++++++++++---------
> tools/perf/util/lock-contention.h | 2 +-
> 3 files changed, 57 insertions(+), 18 deletions(-)
>
>
> base-commit: a3a365655a28f12f07eddf4f3fd596987b175e1d
> --
> 2.38.1.273.g43a17bfeac-goog
--
- Arnaldo
Powered by blists - more mailing lists