Sponsored Content
The Lounge What is on Your Mind? Meltdown and Spectre CPU bugs Post 303017952 by retattr on Friday 25th of May 2018 11:50:54 AM
Old 05-25-2018
I really hope that Intel will still fix these invulnerabilities in the new processors
 

5 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

hard disk meltdown

I had an issue with a second hard disk in my machine. I have a sparc station running solaris 7. It was working fine but now it wont mount on boot up and when you try to mount it manually it gives an I/O error. I tried a different disk as a control which was fine. What I want to know is if my... (3 Replies)
Discussion started by: Henrik
3 Replies

2. Solaris

Bugs with clock()

Hi there!!! Need your help in solving some tricky problems. Since clock() as such is buggy on SUN OS 5 we have started using gettimeofday() in our RTOS applications based on Solaris 9. The problems we actually encountered previously were - the applications kind of freeze/hang eternally on... (1 Reply)
Discussion started by: smanu
1 Replies

3. UNIX for Beginners Questions & Answers

Bugs in my new Ubuntu installation

I recently bought a new HP Spectre x360 laptop and installed Linux (Ubuntu 16.04 LTS 64 bit) for the first time. I am seeing various bugs. I don't know if the problems are due to: (a) Hardware problems with the new laptop. (b) Software issues, i.e. Ubuntu not working with the other... (7 Replies)
Discussion started by: twelth_hour
7 Replies

4. War Stories

Linus Torvalds reply about Meltdown and Spectre.

Apologies if this is the wrong forum but... ...This is hard hitting stuff. LKML: Linus Torvalds: Re: x86/enter: Create macros to restrict/unrestrict Indirect Branch Speculation (5 Replies)
Discussion started by: wisecracker
5 Replies

5. AIX

AIX 6.1, POWER5 and Spectre/Meltdown

Apologies for this newbie question. We have inherited an IBM p5 520 (9111-520) running AIX 6.1.0.0 which seems to be the base install and no further patches installed. Is this vulnerable to the Spectre/Meltdown threat? Are patches available? Looks like AIX 6.1.0.0 went 'end of support' in... (8 Replies)
Discussion started by: the_garbage
8 Replies
LIBPFM(3)						     Linux Programmer's Manual							 LIBPFM(3)

NAME
libpfm_intel_nhm - support for Intel Nehalem core PMU SYNOPSIS
#include <perfmon/pfmlib.h> PMU name: nhm PMU desc: Intel Nehalem PMU name: nhm_ex PMU desc: Intel Nehalem EX DESCRIPTION
The library supports the Intel Nehalem core PMU. It should be noted that this PMU model only covers the each core's PMU and not the socket level PMU. It is provided separately. Support is provided for the Intel Core i7 and Core i5 processors. MODIFIERS
The following modifiers are supported on Intel Nehalem processors: u Measure at user level which includes privilege levels 1, 2, 3. This corresponds to PFM_PLM3. This is a boolean modifier. k Measure at kernel level which includes privilege level 0. This corresponds to PFM_PLM0. This is a boolean modifier. i Invert the meaning of the event. The counter will now count cycles in which the event is not occurring. This is a boolean modifier e Enable edge detection, i.e., count only when there is a state transition from no occurrence of the event to at least one occurrence. This modifier must be combined with a counter mask modifier (m) with a value greater or equal to one. This is a boolean modifier. c Set the counter mask value. The mask acts as a threshold. The counter will count the number of cycles in which the number of occur- rences of the event is greater or equal to the threshold. This is an integer modifier with values in the range [0:255]. t Measure on both threads at the same time assuming hyper-threading is enabled. This is a boolean modifier. ldlat Pass a latency threshold to the MEM_INST_RETIRED:LATENCY_ABOVE_THRESHOLD event. This is an integer attribute that must be in the range [3:65535]. It is required for this event. Note that the event must be used with precise sampling (PEBS). OFFCORE_RESPONSE event The library is able to encode the OFFCORE_RESPONSE_0 event. This is a special event because it needs a second MSR (0x1a6) to be programmed for the event to count properly. Thus two values are necessary. The first value can be programmed on any of the generic counters. The sec- ond value goes into the dedicated MSR (0x1a6). The OFFCORE_RESPONSE event is exposed as a normal event with several umasks which are divided in two groups: request and response. The user must provide at least one umask from each group. For instance, OFFCORE_RESPONSE_0:ANY_DATA:LOCAL_DRAM. When using pfm_get_event_encoding(), two 64-bit values are returned. The first value corresponds to what needs to be programmed into any of the generic counters. The second value must be programmed into the dedicated MSR (0x1a6). When using an OS-specific encoding routine, the way the event is encoded is OS specific. Refer to the corresponding man page for more information. AUTHORS
Stephane Eranian <eranian@gmail.com> September, 2009 LIBPFM(3)
All times are GMT -4. The time now is 04:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy