lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <0a4fc425-40e6-feb0-8872-15d5c356c015@intel.com>
Date:   Wed, 6 Feb 2019 11:10:33 +0200
From:   Adrian Hunter <adrian.hunter@...el.com>
To:     Jiri Olsa <jolsa@...hat.com>
Cc:     Arnaldo Carvalho de Melo <acme@...nel.org>,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/6] perf thread-stack: x86 retpolines

On 10/01/19 11:55 AM, Jiri Olsa wrote:
> On Wed, Jan 09, 2019 at 11:18:29AM +0200, Adrian Hunter wrote:
>> Hi
>>
>> Here are some patches to improve the exported call graph, primarily to deal
>> with x86 retpolines.
>>
>>
>> Adrian Hunter (6):
>>       perf tools: Fix split_kallsyms_for_kcore for trampoline symbols
>>       perf thread-stack: Tidy thread_stack__push_cp() usage
>>       perf thread-stack: Tidy thread_stack__no_call_return() by adding more local variables
>>       perf thread-stack: Represent jmps to the start of a different symbol
>>       perf thread-stack: Improve thread_stack__no_call_return()
>>       perf thread-stack: Hide x86 retpolines
> 
> Acked-by: Jiri Olsa <jolsa@...nel.org>

Can these be applied?

> 
> thanks,
> jirka
> 
>>
>>  tools/perf/scripts/python/export-to-postgresql.py |   2 +-
>>  tools/perf/scripts/python/export-to-sqlite.py     |   2 +-
>>  tools/perf/util/symbol.c                          |   2 +
>>  tools/perf/util/thread-stack.c                    | 235 ++++++++++++++++++----
>>  tools/perf/util/thread-stack.h                    |   3 +
>>  5 files changed, 208 insertions(+), 36 deletions(-)
>>
>>
>> Regards
>> Adrian
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ