lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 28 May 2014 10:45:45 -0700 From: Andi Kleen <ak@...ux.intel.com> To: Peter Zijlstra <peterz@...radead.org> Cc: Stephane Eranian <eranian@...gle.com>, "Yan, Zheng" <zheng.z.yan@...el.com>, LKML <linux-kernel@...r.kernel.org>, "mingo@...e.hu" <mingo@...e.hu> Subject: Re: [RFC PATCH 6/7] perf, x86: large PEBS interrupt threshold > So the window is fairly large for another to slip in, esp if you have a > fast (say inst-ret) and a slow (say br-misp) event. yes, but unless you have really small periods it's still very unlikely that they synchronize, so it will only happen very rarely. And the rare cases won't affect the statistics very much. Even with multi-pebs the min period is 1000, which is several orders of magnitude larger than the typical window. -Andi -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists