lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 24 May 2021 09:08:12 +0800
From:   "Jin, Yao" <yao.jin@...ux.intel.com>
To:     Arnaldo Carvalho de Melo <acme@...nel.org>,
        Ian Rogers <irogers@...gle.com>
Cc:     Jiri Olsa <jolsa@...nel.org>,
        Peter Zijlstra <peterz@...radead.org>,
        Ingo Molnar <mingo@...hat.com>,
        Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
        LKML <Linux-kernel@...r.kernel.org>,
        Andi Kleen <ak@...ux.intel.com>,
        Kan Liang <kan.liang@...el.com>, "Jin, Yao" <yao.jin@...el.com>
Subject: Re: [PATCH 1/4] perf vendor events: Add core event list for Icelake
 Server

Hi Arnaldo,

On 5/22/2021 3:41 AM, Arnaldo Carvalho de Melo wrote:
> Em Thu, May 20, 2021 at 09:08:37AM -0700, Ian Rogers escreveu:
>> On Sun, May 9, 2021 at 6:26 PM Jin Yao<yao.jin@...ux.intel.com>  wrote:
>>> Add JSON core events for Icelake Server to perf.
>>>
>>> Based on JSON list v1.04
>>> https://download.01.org/perfmon/ICX/
>>>
>>> Signed-off-by: Jin Yao<yao.jin@...ux.intel.com>
>>> Reviewed-by: Andi Kleen<ak@...ux.intel.com>
>> Acked-by: Ian Rogers<irogers@...gle.com>
> ⬢[acme@...lbox perf]$ am
> Applying: perf vendor events: Add core event list for Icelake Server
> error: corrupt patch at line 2771
> Patch failed at 0001 perf vendor events: Add core event list for Icelake Server
> hint: Use 'git am --show-current-patch=diff' to see the failed patch
> When you have resolved this problem, run "git am --continue".
> If you prefer to skip this patch, run "git am --skip" instead.
> To restore the original branch and stop patching, run "git am --abort".
> ⬢[acme@...lbox perf]$
> ⬢[acme@...lbox perf]$ git diff
> ⬢[acme@...lbox perf]$ git am --abort
> ⬢[acme@...lbox perf]$ patch -p1 < ~/wb/1.patch
> patching file tools/perf/pmu-events/arch/x86/icelakex/cache.json
> patching file tools/perf/pmu-events/arch/x86/icelakex/floating-point.json
> patching file tools/perf/pmu-events/arch/x86/icelakex/frontend.json
> patching file tools/perf/pmu-events/arch/x86/icelakex/memory.json
> patching file tools/perf/pmu-events/arch/x86/icelakex/other.json
> patching file tools/perf/pmu-events/arch/x86/icelakex/pipeline.json
> patch: **** malformed patch at line 1927:   less than MAX. The reset value to the counter is not clocked immediately so the overflow status bit will flip 'high (1)' and generate another PMI (if enabled) after which the reset value gets clocked into the counter. Therefore, software will get the interrupt, read the overflow status bit '1 for bit 34 while the counter value is less than MAX. Software should ignore this case.",
> 
> ⬢[acme@...lbox perf]$
> 
> Please check.
> 
> - Arnaldo
>   

Could you pull the top 4 patches from "https://github.com/yaoj/icx-events.git"?

perf vendor events: Update event list for Icelake Client
perf vendor events: Add metrics for Icelake Server
perf vendor events: Add uncore event list for Icelake Server
perf vendor events: Add core event list for Icelake Server

The patch is too big and it's possibly corrupted by mailing system.

Thanks
Jin Yao

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ