|
Message-ID: <20160803133610.GF6879@twins.programming.kicks-ass.net> Date: Wed, 3 Aug 2016 15:36:10 +0200 From: Peter Zijlstra <peterz@...radead.org> To: Daniel Micay <danielmicay@...il.com> Cc: kernel-hardening@...ts.openwall.com, Kees Cook <keescook@...omium.org>, Jeff Vander Stoep <jeffv@...gle.com>, Ingo Molnar <mingo@...hat.com>, Arnaldo Carvalho de Melo <acme@...nel.org>, Alexander Shishkin <alexander.shishkin@...ux.intel.com>, "linux-doc@...r.kernel.org" <linux-doc@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, Jonathan Corbet <corbet@....net>, "Eric W. Biederman" <ebiederm@...ssion.com> Subject: Re: Re: [PATCH 1/2] security, perf: allow further restriction of perf_event_open On Wed, Aug 03, 2016 at 08:28:10AM -0400, Daniel Micay wrote: > I don't think there are runtimes using this for JIT tracing. Perhaps it > doesn't actually suit their needs. It's a theoretical use case. I know there are compiler teams using perf for FDO, see for example: https://gcc.gnu.org/wiki/AutoFDO/Tutorial LLVM also has AutoFDO support AFAIU. There is no reason JITs could not also do this, and IIRC there's JITs build on top of LLVM, so it shouldn't be too hard to imagine an AutoFDO enabled JIT.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.