libperf tests: Avoid uninitialized variable warning
The variable 'bf' is read (for a write call) without being initialized triggering a memory sanitizer warning. Use 'bf' in the read and switch the write to reading from a string. Signed-off-by: Ian Rogers <irogers@google.com> Acked-by: Jiri Olsa <jolsa@redhat.com> Acked-by: Namhyung Kim <namhyung@kernel.org> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> Cc: Mark Rutland <mark.rutland@arm.com> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Stephane Eranian <eranian@google.com> Link: http://lore.kernel.org/lkml/20210114212304.4018119-1-irogers@google.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
This commit is contained in:
Родитель
a042a82ddb
Коммит
be82fddca8
|
@ -208,7 +208,6 @@ static int test_mmap_thread(void)
|
||||||
char path[PATH_MAX];
|
char path[PATH_MAX];
|
||||||
int id, err, pid, go_pipe[2];
|
int id, err, pid, go_pipe[2];
|
||||||
union perf_event *event;
|
union perf_event *event;
|
||||||
char bf;
|
|
||||||
int count = 0;
|
int count = 0;
|
||||||
|
|
||||||
snprintf(path, PATH_MAX, "%s/kernel/debug/tracing/events/syscalls/sys_enter_prctl/id",
|
snprintf(path, PATH_MAX, "%s/kernel/debug/tracing/events/syscalls/sys_enter_prctl/id",
|
||||||
|
@ -229,6 +228,7 @@ static int test_mmap_thread(void)
|
||||||
pid = fork();
|
pid = fork();
|
||||||
if (!pid) {
|
if (!pid) {
|
||||||
int i;
|
int i;
|
||||||
|
char bf;
|
||||||
|
|
||||||
read(go_pipe[0], &bf, 1);
|
read(go_pipe[0], &bf, 1);
|
||||||
|
|
||||||
|
@ -266,7 +266,7 @@ static int test_mmap_thread(void)
|
||||||
perf_evlist__enable(evlist);
|
perf_evlist__enable(evlist);
|
||||||
|
|
||||||
/* kick the child and wait for it to finish */
|
/* kick the child and wait for it to finish */
|
||||||
write(go_pipe[1], &bf, 1);
|
write(go_pipe[1], "A", 1);
|
||||||
waitpid(pid, NULL, 0);
|
waitpid(pid, NULL, 0);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
|
Загрузка…
Ссылка в новой задаче