lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1440742821-44548-1-git-send-email-wangnan0@huawei.com>
Date:	Fri, 28 Aug 2015 06:20:17 +0000
From:	Wang Nan <wangnan0@...wei.com>
To:	<acme@...hat.com>
CC:	<linux-kernel@...r.kernel.org>, <ast@...mgrid.com>,
	<brendan.d.gregg@...il.com>, <daniel@...earbox.net>,
	<dsahern@...il.com>, <hekuang@...wei.com>, <jolsa@...nel.org>,
	<xiakaixu@...wei.com>, <masami.hiramatsu.pt@...achi.com>,
	<namhyung@...nel.org>, <a.p.zijlstra@...llo.nl>,
	<lizefan@...wei.com>, <pi3orama@....com>,
	Wang Nan <wangnan0@...wei.com>
Subject: [PATCH 0/4] perf tools: Allow adding --filter to BPF object

This 4 patches will be appended into my next perf BPF pull request.
Without them, current perf BPF implementation has a small problem that,
if passing '--filter' after '--event test_bpf.o' event selection, the
filter won't be correctly applied.

Patch 1/4 append a new function to libbpf which allow fetching
object name from bpf_object.

Patch 2/4 add a safety check to avoid access invalid memory if the list
is empty during event parsing.

Patch 3/4 introduces a dummy evsel mechanism.

Patch 4/4 utilizes dummy evsel mechanism, make BPF event collect filter
options by dummy evsel and sync with them after real evsel generated.

The 4th patch should be applied after patch 'perf tools: Add bpf_fd
field to evsel and config it'. Patch 'perf tools: Enable passing bpf
object file to --event' should also be modified to utilize dummy evsel.
Please see my following pull request.

Thank you.

-- 
1.8.3.4

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ