lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Sun, 15 Jun 2014 08:54:23 +0200
From:	Ingo Molnar <>
To:	Vince Weaver <>
	Peter Zijlstra <>,
	Ingo Molnar <>,
	Vineet Gupta <>,
	Steven Miao <>,
	James Hogan <>,
	Benjamin Herrenschmidt <>,
	Paul Mackerras <>,
	Cody P Schafer <>,,
	Hendrik Brueckner <>,
	Martin Schwidefsky <>,
	Heiko Carstens <>
Subject: Re: [PATCH 0/6] perf: Use common PMU interrupt disabled code on all

* Vince Weaver <> wrote:

> Now that "perf/x86: Use common PMU interrupt disabled code"
> (c184c980de30dc) was merged, I went and audited all of the
> architectures.  The following patchset attempts to move
> all of the ones that have code disabling sampled events
> due to lack of overflow interrupt to the new common code.
> ARM and x86 were already updated with the original changeset.
> Note that this is an ABI change in some cases, as many
> architectures returned EINVAL previously rather than
> Unfortunately these patches are not tested at all, as I don't have
> access to the hardware.

Looks good to me, for v3.17. Peter, what do you think?

Reviewed-by: Ingo Molnar <>


To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists