lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 4 Mar 2010 12:18:56 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	Tom Zanussi <tzanussi@...il.com>
Cc:	linux-kernel@...r.kernel.org, fweisbec@...il.com,
	rostedt@...dmis.org, k-keiichi@...jp.nec.com
Subject: Re: [RFC PATCH 0/7] perf: 'live mode'


* Tom Zanussi <tzanussi@...il.com> wrote:

> Currently, a perf session entails two steps: first 'perf record' or 'perf 
> trace record' records the perf data to disk, then 'perf report' or 'perf 
> trace report' reads the saved data from disk and reports the results.
> 
> This experimental patchset makes some changes to perf that instead allow the 
> perf data to be piped directly from the record step to the report step, 
> without ever touching the disk.

Very nice!

> Obviously, it would be better to have a real top-like display for these 
> rather than a continuously scrolling mode like this, and of course it will 
> be much more useful once we get the syscall name injection events going (the 
> column on the left shows syscall numbers only).

It's still useful for ad-hoc tracing!

Side-note, it might make sense to expose the 'clear' escape sequence somehow 
in an easy fashion:

.[H.[2J

to make it non-scrolling ;-) via a pre-provided method.

> There are some rough edges and inefficiencies, and I guess 'event injection' 
> may be a better way to do this in the end, but it seems to work pretty well 
> already, and I think it shows how useful such a capability can be.

I'm all for it. Frederic, Steve, what do you think?

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ