lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 11 Jun 2008 09:29:29 -0400
From:	"Kasindorf, Barry" <Barry.Kasindorf@....com>
To:	"Andi Kleen" <andi@...stfloor.org>, "Pavel Machek" <pavel@...e.cz>
Cc:	<linux-kernel@...r.kernel.org>
Subject: RE: [PATCH 1/3] AMD Family10h+ IBS support for oProfile driver: Setup routines

Yes,
This is visible to userspace. The corresponding changes to the usermode
code have been sent to the oProfile list. The confusion is that it is
not AMD Family 10 but it is Family 16(10h). This can be confusing so we
changed it.
-Barry

-----Original Message-----
From: Andi Kleen [mailto:andi@...stfloor.org] 
Sent: Wednesday, June 11, 2008 8:08 AM
To: Pavel Machek
Cc: Kasindorf, Barry; linux-kernel@...r.kernel.org
Subject: Re: [PATCH 1/3] AMD Family10h+ IBS support for oProfile driver:
Setup routines

Pavel Machek <pavel@...e.cz> writes:

> Hi!
>
>> This patchset supports the new profiling hardware available in the
latest AMD CPUs in the oProfile driver.
>
>> @@ -419,9 +454,15 @@ int __init op_nmi_init(struct
oprofile_operations *ops)
>>  			break;
>>  		case 0x10:
>>  			model = &op_athlon_spec;
>> -			cpu_type = "x86-64/family10";
>> +			cpu_type = "x86-64/family10h";
>> +			break;
>
> Is this string visible to userspace?

Yes it is.

-Andi


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ