
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
kerncraft
.. image:: https://github.com/RRZE-HPC/kerncraft/blob/master/doc/logo/logo-lightbg.svg
Loop Kernel Analysis and Performance Modeling Toolkit
This tool allows automatic analysis of loop kernels using the Execution Cache Memory (ECM) model <https://hpc.fau.de/research/ecm/>_,
the Roofline model and actual benchmarks. kerncraft provides a framework to investigate the
data reuse and cache requirements by static code analysis. In combination with the Intel IACA tool
kerncraft can give a good overview of both in-core and memory bottlenecks and use that data to
apply performance models.
For a detailed documentation see publications in <doc/>_.
.. image:: https://github.com/RRZE-HPC/kerncraft/actions/workflows/test-n-publish.yml/badge.svg :target: https://github.com/RRZE-HPC/kerncraft/actions/workflows/test-n-publish.yml
.. image:: https://codecov.io/github/RRZE-HPC/kerncraft/coverage.svg?branch=master :target: https://codecov.io/github/RRZE-HPC/kerncraft?branch=master
On most systems with python pip and setuputils installed, just run:
pip install --user kerncraft
for the latest release. In order to get the Intel Achitecture Code Analyzer (IACA) <https://software.intel.com/en-us/articles/intel-architecture-code-analyzer>, required by the ECM, ECMCPU and RooflineASM performance models, read this <https://software.intel.com/protected-download/267266/157552> and run:
iaca_get --I-accept-the-Intel-What-If-Pre-Release-License-Agreement-and-please-take-my-soul
.. warning::
As for 2023, Intel removed the download link for any IACA version. If you have any IACA version existing on your system, you can still use it with kerncraft by putting it in ~/.kerncraft/iaca/vX.Y in your home directory.
Additional requirements are:
likwid <https://github.com/RRZE-HPC/likwid>_ (used in Benchmark model and by likwid_bench_auto)wget https://raw.githubusercontent.com/RRZE-HPC/kerncraft/master/examples/machine-files/SandyBridgeEP_E5-2680.yml
wget https://raw.githubusercontent.com/RRZE-HPC/kerncraft/master/examples/kernels/2d-5pt.c
Have a look at the machine file and change it to match your targeted machine (above we downloaded a file for a Sandy Bridge EP machine)
Run kerncraft
kerncraft -p ECM -m SandyBridgeEP_E5-2680.yml 2d-5pt.c -D N 10000 -D M 10000
add -vv for more information on the kernel and ECM model analysis.
When using Kerncraft for your work, please consider citing the following publication:
Kerncraft: A Tool for Analytic Performance Modeling of Loop Kernels <https://dx.doi.org/10.1007/978-3-319-56702-0_1>_ (preprint <https://arxiv.org/abs/1702.04653>_)
::
J. Hammer, J. Eitzinger, G. Hager, and G. Wellein: Kerncraft: A Tool for Analytic Performance Modeling of Loop Kernels. In: Tools for High Performance Computing 2016, ISBN 978-3-319-56702-0, 1-22 (2017). Proceedings of IPTW 2016, the 10th International Parallel Tools Workshop, October 4-5, 2016, Stuttgart, Germany. Springer, Cham. DOI: 10.1007/978-3-319-56702-0_1, Preprint: arXiv:1702.04653``
| Implementation: Julian Hammer; | ECM Model (theory): Georg Hager, Holger Stengel, Jan Treibig; | LC generalization: Julian Hammer
AGPLv3
FAQs
Loop Kernel Analysis and Performance Modeling Toolkit
We found that kerncraft demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.