[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130415232252.GA1385@krava.redhat.com>
Date: Tue, 16 Apr 2013 01:22:52 +0200
From: Jiri Olsa <jolsa@...hat.com>
To: Jacob Shin <jacob.shin@....com>
Cc: Ingo Molnar <mingo@...hat.com>,
Peter Zijlstra <a.p.zijlstra@...llo.nl>,
Arnaldo Carvalho de Melo <acme@...stprotocols.net>,
"H. Peter Anvin" <hpa@...or.com>,
Thomas Gleixner <tglx@...utronix.de>, x86@...nel.org,
Stephane Eranian <eranian@...gle.com>,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/5] perf: Add support for hardware breakpoint address
masks
On Tue, Apr 09, 2013 at 12:21:48PM -0500, Jacob Shin wrote:
> The following patchset adds address masks to existing perf hardware
> breakpoint mechanism to allow trapping on an address range (currently
> only single address) on supported architectures.
>
> perf uapi is updated, x86 AMD implementation (for AMD Family 16h and
> beyond) is provided, and perf tool has been extended to do:
>
> $ perf stat -e mem:0x1000:w:0xf a.out
> ^^^
> "don't care" bit mask
>
> which will count writes to [0x1000 ~ 0x1010)
>
> Jacob Shin (2):
> perf: Add hardware breakpoint address mask
> perf, x86: AMD implementation for hardware breakpoint address mask
>
> Suravee Suthikulpanit (3):
> perf tools: Add breakpoint address mask to the mem event parser
> perf tools: Add breakpoint address mask syntax to perf list and
> documentation
> perf tools: Add breakpoint address mask test case to
> tests/parse-events
hi,
the perf tool patches look ok.. thanks for tests! ;)
jirka
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists