lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <d9b6a2c0-2387-2c2e-eedb-9de8a36a2eb5@intel.com>
Date:   Tue, 17 May 2022 16:13:14 +0300
From:   Adrian Hunter <adrian.hunter@...el.com>
To:     Arnaldo Carvalho de Melo <acme@...nel.org>
Cc:     Jiri Olsa <jolsa@...nel.org>, linux-kernel@...r.kernel.org,
        Andi Kleen <ak@...ux.intel.com>
Subject: Re: [PATCH 0/3] perf intel-pt: Add support for emulated ptwrite

On 9/05/22 18:23, Adrian Hunter wrote:
> Hi
> 
> Here are 3 patches (on top of "perf intel-pt: Add link to the perf wiki's
> Intel PT page") to add support for decoding emulated ptwrite i.e. for
> hardware that does not have the ptwrite instruction.

Is this OK?

> 
> 
> Adrian Hunter (3):
>       perf intel-pt: Add support for emulated ptwrite
>       perf script: Print Intel ptwrite value as a string if it is ASCII
>       perf scripts python: intel-pt-events.py: Print ptwrite value as a string if it is ASCII
> 
>  tools/perf/Documentation/perf-intel-pt.txt         | 88 +++++++++++++++++++
>  tools/perf/builtin-script.c                        | 32 ++++++-
>  tools/perf/scripts/python/intel-pt-events.py       |  8 +-
>  .../perf/util/intel-pt-decoder/intel-pt-decoder.c  | 99 +++++++++++++++++++++-
>  .../perf/util/intel-pt-decoder/intel-pt-decoder.h  |  1 +
>  .../util/intel-pt-decoder/intel-pt-insn-decoder.c  |  1 +
>  .../util/intel-pt-decoder/intel-pt-insn-decoder.h  |  1 +
>  tools/perf/util/intel-pt.c                         | 37 +++++++-
>  8 files changed, 261 insertions(+), 6 deletions(-)
> 
> 
> Regards
> Adrian

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ