Skip to content

Conversation

@ErickReyesR
Copy link

Hi Joel,

Fixed the easy ones first. Still figuring out the rest.

joelagnel and others added 4 commits June 8, 2018 12:40
This tool detects code sections in the kernel where IRQs or preemption
are disabled for a user-specified amount of time.

Requires a kernel built with CONFIG_DEBUG_PREEMPT and
CONFIG_PREEMPTIRQ_EVENTS.

Signed-off-by: Joel Fernandes <[email protected]>
Changed the type used for stack_id and removed a boundary check made
obsolete by the type change
When printing out the task name, event.comm.decode() was being called.
This was not only redundant, it was causing the script to fail when the
task name contained unicode characters
@joelagnel
Copy link
Owner

Thanks a lot for this. I am reviewing the commits now.

print("%s" % s)
else:
print("NO STACK FOUND DUE TO COLLISION")
kstack = stack_traces.walk(event.stack_id)
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is not right. We need to handle the case where a stack collision occurred. I will fix it up.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I thought that condition was handled at line 303

@joelagnel joelagnel force-pushed the criticalstat branch 2 times, most recently from 8afa064 to 5e0911b Compare June 19, 2018 20:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants