diff options
author | Adrian Hunter <adrian.hunter@intel.com> | 2022-01-24 11:41:57 +0300 |
---|---|---|
committer | Arnaldo Carvalho de Melo <acme@redhat.com> | 2022-02-15 23:15:02 +0300 |
commit | 95f9bfcf84d808eb621088a376ba02bf77f5fec3 (patch) | |
tree | ac5cc3e8db89a9bc1a8e8bff4320941693ecda3c /security/bpf | |
parent | 2673859865e28d19f7b5e3f25fbe15382b8b6c47 (diff) | |
download | linux-95f9bfcf84d808eb621088a376ba02bf77f5fec3.tar.xz |
perf scripts python: intel-pt-events.py: Add Event Trace
Add Event Trace to the intel-pt-events.py script. This shows how to unpack
the raw data from the new sample events in a Python script.
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Link: https://lore.kernel.org/r/20220124084201.2699795-22-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'security/bpf')
0 files changed, 0 insertions, 0 deletions