lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 15 Sep 2014 18:18:37 +0100 From: Pawel Moll <pawel.moll@....com> To: David Ahern <dsahern@...il.com> Cc: Arnaldo Carvalho de Melo <acme@...stprotocols.net>, Richard Cochran <richardcochran@...il.com>, Steven Rostedt <rostedt@...dmis.org>, Ingo Molnar <mingo@...hat.com>, Peter Zijlstra <peterz@...radead.org>, Paul Mackerras <paulus@...ba.org>, John Stultz <john.stultz@...aro.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "linux-api@...r.kernel.org" <linux-api@...r.kernel.org> Subject: Re: [RFC 2/2] perf: Marker software event and ioctl On Sun, 2014-09-14 at 16:43 +0100, David Ahern wrote: > >> Seems really similar to what I proposed in the past: Yeah, it wasn't really hard to come with similar conclusions :-) > >> https://lkml.org/lkml/2011/2/27/159 > >> > >> Which was rejected. > > > > I took a look at that thread, but just barely, emphasis on that. > > > > Injecting something from userspace, a la ftrace, seems to be something, > > as tglx mentioned, "buried" in that patchset. > > Thomas object to an ioctl buried deep in a patch -- newbie mistake. > > Peter objected to the ioctl https://lkml.org/lkml/2011/3/1/229 > > It was not userspace injecting random data into the stream but rather > forcing the sample to be generated and added to the stream. I would like to hear from Peter and others. If not here, I'll get them to talk next month on Linux Plumbers :-) Pawel -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists