lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Fri, 6 Nov 2020 10:09:57 +0800
From:   Leo Yan <leo.yan@...aro.org>
To:     Stephen Boyd <swboyd@...omium.org>
Cc:     Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
        Arnaldo Carvalho de Melo <acme@...nel.org>,
        Coresight ML <coresight@...ts.linaro.org>,
        Ingo Molnar <mingo@...hat.com>, Jiri Olsa <jolsa@...hat.com>,
        Mark Rutland <mark.rutland@....com>,
        Mathieu Poirier <mathieu.poirier@...aro.org>,
        Mike Leach <mike.leach@...aro.org>,
        Namhyung Kim <namhyung@...nel.org>,
        Peter Zijlstra <peterz@...radead.org>,
        Robert Walker <robert.walker@....com>,
        Suzuki K Poulose <suzuki.poulose@....com>,
        linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v5 0/9] perf cs-etm: Support thread stack and callchain

Hi Stephen,

On Thu, Nov 05, 2020 at 02:50:56PM -0800, Stephen Boyd wrote:
> Quoting Leo Yan (2020-02-19 21:26:52)
> > This patch series adds support for thread stack and callchain; this patch
> > set depends on the instruction sample fix patch set [1].
> > 
> > This patch set get more complex, so before divide into small groups, I'd
> > like to use this patch set version to include all relevant patches, hope
> > this can give whole context for related code change.
> 
> Was this split up into small groups and sent again? I didn't see
> anything when searching lkml.

No, this patch series is the last one for upstreaming; since I worked
on other stuffs, so didn't continue to upstream to the mainline kernel.

IIRC, there have a concern for a pontential breakage for perf cs-etm
testing, so falls to backlog.  Let me check with Mathieu/Mike offline
for how to proceed for this patch set.  Thanks for bringing up.

Leo

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ