Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752012Ab3IJNiu (ORCPT ); Tue, 10 Sep 2013 09:38:50 -0400 Received: from mail-bk0-f50.google.com ([209.85.214.50]:38427 "EHLO mail-bk0-f50.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751244Ab3IJNis (ORCPT ); Tue, 10 Sep 2013 09:38:48 -0400 Date: Tue, 10 Sep 2013 15:38:45 +0200 From: Ingo Molnar To: eranian@gmail.com Cc: Peter Zijlstra , Linus Torvalds , Linux Kernel Mailing List , Arnaldo Carvalho de Melo , Thomas Gleixner , Andi Kleen Subject: Re: PEBS bug on HSW: "Unexpected number of pebs records 10" (was: Re: [GIT PULL] perf changes for v3.12) Message-ID: <20130910133845.GB7537@gmail.com> References: <20130903132933.GA24955@gmail.com> <20130909100544.GI31370@twins.programming.kicks-ass.net> <20130910115306.GA6091@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3207 Lines: 81 * Stephane Eranian wrote: > Hi, > > Ok, so I am able to reproduce the problem using a simpler > test case with a simple multithreaded program where > #threads >> #CPUs. Does it go away if you use 'perf record --all-cpus'? > [ 2229.021934] WARNING: CPU: 6 PID: 17496 at > arch/x86/kernel/cpu/perf_event_intel_ds.c:1003 > intel_pmu_drain_pebs_hsw+0xa8/0xc0() > [ 2229.021936] Unexpected number of pebs records 21 > > [ 2229.021966] Call Trace: > [ 2229.021967] [] dump_stack+0x46/0x58 > [ 2229.021976] [] warn_slowpath_common+0x8c/0xc0 > [ 2229.021979] [] warn_slowpath_fmt+0x46/0x50 > [ 2229.021982] [] intel_pmu_drain_pebs_hsw+0xa8/0xc0 > [ 2229.021986] [] intel_pmu_handle_irq+0x220/0x380 > [ 2229.021991] [] ? sched_clock_cpu+0xc5/0x120 > [ 2229.021995] [] perf_event_nmi_handler+0x34/0x60 > [ 2229.021998] [] nmi_handle.isra.3+0x88/0x180 > [ 2229.022001] [] do_nmi+0xe0/0x330 > [ 2229.022004] [] end_repeat_nmi+0x1e/0x2e > [ 2229.022008] [] ? intel_pmu_pebs_enable_all+0x33/0x40 > [ 2229.022011] [] ? intel_pmu_pebs_enable_all+0x33/0x40 > [ 2229.022015] [] ? intel_pmu_pebs_enable_all+0x33/0x40 > [ 2229.022016] <> [] intel_pmu_enable_all+0x23/0xa0 > [ 2229.022021] [] x86_pmu_enable+0x274/0x310 > [ 2229.022025] [] perf_pmu_enable+0x27/0x30 > [ 2229.022029] [] perf_event_context_sched_in+0x79/0xc0 > > Could be a HW race whereby the PEBS of each HT threads get mixed up. Yes, that seems plausible and would explain why the overrun is usually a small integer. We set up the DS with PEBS_BUFFER_SIZE == 4096, so with a record size of 192 bytes on HSW we should get index values of 0-21. That fits within the indices range reported so far. > [...] I will add a couple more checks to verify that. The intr_thres > should not have changed. Yet looks like we have a sitation where the > index is way past the threshold. Btw., it would also be nice to add a check of ds->pebs_index against ds->pebs_absolute_maximum, to make sure the PEBS record index never goes outside the DS area. I.e. to protect against random corruption. Right now we do only half a check: n = top - at; if (n <= 0) return; this still allows an upwards overflow. We check x86_pmu.max_pebs_events but then let it continue: WARN_ONCE(n > x86_pmu.max_pebs_events, "Unexpected number of pebs records %d\n", n); return __intel_pmu_drain_pebs_nhm(iregs, at, top); Instead it should be something more robust, like: if (WARN_ONCE(n > max ...)) { /* Drain the PEBS buffer: */ ds->pebs_index = ds->pebs_buffer_base; return; } Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/