Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp945145ybh; Wed, 18 Mar 2020 12:01:49 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtoz4zoClB7wFArE8jcGEf+wgs8gKccPBp16UKEd3+YFo90HF1NGZ0BwrybjOhvdpv5+l+A X-Received: by 2002:a9d:5181:: with SMTP id y1mr5193248otg.199.1584558109103; Wed, 18 Mar 2020 12:01:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584558109; cv=none; d=google.com; s=arc-20160816; b=xk4e/YFdyoZIZXJ8tJj8+LwilV+vvBPFuaovf9Hs/u3wPvDYyEQ7Zi9Z833iPcX6TW sDyVrUGmqExXbRsGMmyPX3pNrpfa289SL2BbkOaHTJ29g8y35HgQfSEUPYXRVbPoJpuX Gk7U4F0/DqFgBndJ53Tqj2WbUQVo9hYuWERg5TfmbeMNBM2MbNRizj+WhkRRxipkW5pa tSCk4yeSH5wFfiNJ7akdM/9ZQdzVqILLw3y0gRLMoaV6OplJ5xGlLSHCTBPVlRZ34Qcq xnIsMbIMRITlVsKtd4mqExJ0x64yt3qCQWVj9d4XVl7QjaPLjTrbwPysU45KvkQp9fcn sbxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Wx3SLcGZbU7wK702DkuJhWDsfT3JOl+X/0ZhHZWG+9Q=; b=WZSoCsc3qRRgdLX93MYV8eemloR932L/f4ShFc7UXIG8fzu5jfhbpSJJfC5r71s9K9 ScCToWbB/B9nCgMme+RjBpTu8Q/nPAebZeh8hgAHPaijeZaMsWc78fil//wB6fLo73Jr afGCoGrTaIa8na1ha9dwyavj0NPFgs63wNSf5XDQ3WWw44p3Po5x4L1qerFP494LKA03 IJdXOdX1pI5ViNUBxC2nSkcwLMDym31b7p2wMCXb8un5jX3GregssWTuybNRH3zypwpT rszKQr9c5QWMXTKW62UHukb7IjOqHs7AC4zaUfYvuU65ymw7OYNkPUG5UrgPwRoZs05V CGLQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@me.com header.s=1a1hai header.b=yJbuHbEf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=me.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w128si3997817oib.247.2020.03.18.12.01.36; Wed, 18 Mar 2020 12:01:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@me.com header.s=1a1hai header.b=yJbuHbEf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=me.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726796AbgCRTAM (ORCPT + 99 others); Wed, 18 Mar 2020 15:00:12 -0400 Received: from ms11p00im-qufo17291701.me.com ([17.58.38.46]:43380 "EHLO ms11p00im-qufo17291701.me.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726506AbgCRTAM (ORCPT ); Wed, 18 Mar 2020 15:00:12 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=me.com; s=1a1hai; t=1584558008; bh=Wx3SLcGZbU7wK702DkuJhWDsfT3JOl+X/0ZhHZWG+9Q=; h=From:To:Subject:Date:Message-Id:Content-Type; b=yJbuHbEfX2NujboAIQTVDGAu5WfhdMVC/lg/2pNrzNDVdh5Q3mFVLpfTHvct6++Q3 BDDDNIGdA4p2MJ13xwDmAdXYWPiVP0EcGu4Fsh54SQPSQsKBJl4qRX7ptPW12wJlBb URnD/kCq/Sa1U74/Bp1QJwVK2k+p3mJm+LhtFvT9hMBKk2DYtHUmHm245XkcmZmx/9 jrmvt9aPPjIu3TF7IWTrLvZC49QfKI36k8D/NHCmX5/lTUBygrfpuN3dIaDDnSJ3zg 7M8rQGoDwOvDxAl7H5MoXmesVyg/FiCznFhW0IB8vWDKHVWrCN40wJ2HY3eQixumPI sahhNy1XEcftw== Received: from shwetrath.localdomain (unknown [66.199.8.131]) by ms11p00im-qufo17291701.me.com (Postfix) with ESMTPSA id C6BE76409A4; Wed, 18 Mar 2020 19:00:07 +0000 (UTC) From: Vijay Thakkar To: Arnaldo Carvalho de Melo Cc: Vijay Thakkar , Peter Zijlstra , Ingo Molnar , Kim Phillips , Alexander Shishkin , Jiri Olsa , Namhyung Kim , =?UTF-8?q?Martin=20Li=C5=A1ka?= , Jon Grimm , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org Subject: [PATCH v6 0/3] perf vendor events amd: latest PMU events for zen1/zen2 Date: Wed, 18 Mar 2020 14:59:59 -0400 Message-Id: <20200318190002.307290-1-vijaythakkar@me.com> X-Mailer: git-send-email 2.25.2 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2020-03-18_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-2003180085 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series of patches brings the PMU events for AMD family 17h series of processors up to date with the latest versions of the AMD processor programming reference manuals. The first patch changes the pmu events mapfile to be more selective for the model number rather than blanket detecting all f17h processors to have the same events directory. This is required for the later patch where we add events for zen2 based processors. The second patch adds the PMU events for zen2. Finally the third patch updates the zen1 PMU events to be in accordance with the latest PPR version and bumps up the events version to v2. Vijay Thakkar (3): perf vendor events amd: restrict model detection for zen1 based processors perf vendor events amd: add Zen2 events perf vendor events amd: update Zen1 events to V2 .../pmu-events/arch/x86/amdfam17h/branch.json | 12 - .../pmu-events/arch/x86/amdfam17h/cache.json | 329 ----------------- .../pmu-events/arch/x86/amdfam17h/other.json | 65 ---- .../pmu-events/arch/x86/amdzen1/branch.json | 23 ++ .../pmu-events/arch/x86/amdzen1/cache.json | 294 +++++++++++++++ .../arch/x86/{amdfam17h => amdzen1}/core.json | 15 +- .../floating-point.json | 64 +++- .../x86/{amdfam17h => amdzen1}/memory.json | 82 +++-- .../pmu-events/arch/x86/amdzen1/other.json | 56 +++ .../pmu-events/arch/x86/amdzen2/branch.json | 52 +++ .../pmu-events/arch/x86/amdzen2/cache.json | 338 +++++++++++++++++ .../pmu-events/arch/x86/amdzen2/core.json | 130 +++++++ .../arch/x86/amdzen2/floating-point.json | 140 +++++++ .../pmu-events/arch/x86/amdzen2/memory.json | 341 ++++++++++++++++++ .../pmu-events/arch/x86/amdzen2/other.json | 115 ++++++ tools/perf/pmu-events/arch/x86/mapfile.csv | 3 +- 16 files changed, 1606 insertions(+), 453 deletions(-) delete mode 100644 tools/perf/pmu-events/arch/x86/amdfam17h/branch.json delete mode 100644 tools/perf/pmu-events/arch/x86/amdfam17h/cache.json delete mode 100644 tools/perf/pmu-events/arch/x86/amdfam17h/other.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen1/branch.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen1/cache.json rename tools/perf/pmu-events/arch/x86/{amdfam17h => amdzen1}/core.json (87%) rename tools/perf/pmu-events/arch/x86/{amdfam17h => amdzen1}/floating-point.json (61%) rename tools/perf/pmu-events/arch/x86/{amdfam17h => amdzen1}/memory.json (63%) create mode 100644 tools/perf/pmu-events/arch/x86/amdzen1/other.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen2/branch.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen2/cache.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen2/core.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen2/floating-point.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen2/memory.json create mode 100644 tools/perf/pmu-events/arch/x86/amdzen2/other.json -- 2.25.2