lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240110025617.66646-1-tianruidong@linux.alibaba.com>
Date: Wed, 10 Jan 2024 10:56:16 +0800
From: Ruidong Tian <tianruidong@...ux.alibaba.com>
To: linux-kernel@...r.kernel.org
Cc: james.clark@....com,
	coresight@...ts.linaro.org,
	suzuki.poulose@....com,
	mike.leach@...aro.org,
	alexander.shishkin@...ux.intel.com,
	linux-arm-kernel@...ts.infradead.org,
	adrian.hunter@...el.com,
	linux-perf-users@...r.kernel.org,
	leo.yan@...aro.org,
	al.grant@....com,
	mathieu.poirier@...aro.org,
	tor@...com,
	acme@...hat.com,
	Ruidong Tian <tianruidong@...ux.alibaba.com>
Subject: [PATCH v2 0/1] perf scripts python: arm-cs-trace-disasm.py: print correct disasm info

Now the instruction flow disasmed by arm-cs-trace-disasm.py is
ambiguous and uncorrect, fix them in one patch set. Please refer to
each patch for details.

Changes since v1:

Applied all the suggestions from James and Leo of v1.

James: https://lore.kernel.org/lkml/912a39f4-025e-26a1-7786-091fa211f293@arm.com/
Leo: https://lore.kernel.org/lkml/20231224083332.GB13521@leoy-huanghe.lan/

Ruidong Tian (1):
  perf scripts python: arm-cs-trace-disasm.py: add option to print
    virtual address

 tools/perf/scripts/python/arm-cs-trace-disasm.py | 13 ++++++++++++-
 1 file changed, 12 insertions(+), 1 deletion(-)

-- 
2.33.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ