Received: by 10.223.148.5 with SMTP id 5csp7481176wrq; Thu, 18 Jan 2018 06:06:26 -0800 (PST) X-Google-Smtp-Source: ACJfBovoSFUnEyTwxpYyXGn0TJoV0sfmpQhfWSX+rqElez6d8REUNylBP/2ny4BxIKMVHkGcaMw+ X-Received: by 10.98.200.78 with SMTP id z75mr1043373pff.114.1516284386872; Thu, 18 Jan 2018 06:06:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516284386; cv=none; d=google.com; s=arc-20160816; b=iqJau8N2HVJIflt/PCpNAAmdqxzaxB+lYxQgT6Qj7li/aIBFW8AjdcANZngSznBR4T 4KWhmQvxZZzlCxq+w9MDgwRR0cEei9DD6fZCGJIHsBFP1IE9fxvHjT1pSbK58UF5RIrQ lLqUOecj+dfgqJX8EVQesc1rSJn6rp8ML0utHqyuIxFN8CkZwXoVhku7rxSYzN6r+QtV zApdkDcrUvY4wlNdtI2aWeEDHwh0dayqZfKclXenfEdILLU2QLZVpkL1ZuntfNMMg4qE KDXCqQo9+spxd05vXBOG3RsQBsMavTmn93NJtEq9kGXByQ2fEeLjPeQcbZWPxWkSL0/0 UBeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=GLliDtUm92e8/rESkYnlUQXz29gRAnNpEnH6XYGesN0=; b=s8IvNyLxK25BELHQCSGn0NlZl2Hbb9VPtXuSu/0n4bl0Szk0SaHVQ2QnWUVD3h+LDA GcfyOeHls/zWHOdEUmVUJ/QFyDeKId1LhRJK/Al5xYvQ5GEmV0c0Pib1MCvZ0lJhFLOS +ECVYeh+kEaYzWdNtGi1jCAjnOu9FHW+WRdO602RmNgA8EFS1zSOSGmiV186efMq5CcQ xrV7IPgnBQRuCsBjEz40oQ2DlDtrIrnIi5NXRH7M5rG4Xe8Hz8hGnNlpLqhpH1EyBlKV DDIJRidXZKmV7wLS0DwFcNuU4w8FPMuocFpoM8Oq7XWPmfzjG33VjdasKRrSnQGC4gL3 xBWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y190si6047715pgb.728.2018.01.18.06.06.12; Thu, 18 Jan 2018 06:06:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756433AbeAROFe (ORCPT + 99 others); Thu, 18 Jan 2018 09:05:34 -0500 Received: from mx1.redhat.com ([209.132.183.28]:60406 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756412AbeAROFb (ORCPT ); Thu, 18 Jan 2018 09:05:31 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C1C598B10B; Thu, 18 Jan 2018 14:05:31 +0000 (UTC) Received: from krava (unknown [10.43.17.243]) by smtp.corp.redhat.com (Postfix) with SMTP id 3E05617DC2; Thu, 18 Jan 2018 14:05:24 +0000 (UTC) Date: Thu, 18 Jan 2018 15:05:23 +0100 From: Jiri Olsa To: "Liang, Kan" Cc: peterz@infradead.org, mingo@redhat.com, acme@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, eranian@google.com, ak@linux.intel.com Subject: Re: [RESEND PATCH V2 3/4] perf/x86/intel: drain PEBS buffer in event read Message-ID: <20180118140523.GB2940@krava> References: <1515424516-143728-1-git-send-email-kan.liang@intel.com> <1515424516-143728-4-git-send-email-kan.liang@intel.com> <20180110103929.GB18942@krava> <6bb19af0-24e5-d711-cb6f-139eb99253c1@linux.intel.com> <20180111111001.GC31767@krava> <20180111154522.GA3955@krava> <662a138a-ba53-246f-9b6f-60c7dcbb3f5c@linux.intel.com> <20180118094948.GD5947@krava> <3db9cbe0-2ca2-c24f-1330-23aa8f13dc09@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3db9cbe0-2ca2-c24f-1330-23aa8f13dc09@linux.intel.com> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.28]); Thu, 18 Jan 2018 14:05:31 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 18, 2018 at 08:30:30AM -0500, Liang, Kan wrote: > > > On 1/18/2018 4:49 AM, Jiri Olsa wrote: > > On Tue, Jan 16, 2018 at 01:49:13PM -0500, Liang, Kan wrote: > > > > > > > > > On 1/11/2018 10:45 AM, Jiri Olsa wrote: > > > > On Thu, Jan 11, 2018 at 10:21:25AM -0500, Liang, Kan wrote: > > > > > > > > SNIP > > > > > > > > > > > > > > > > hum, but the PEBS drain is specific just for > > > > > > PERF_X86_EVENT_AUTO_RELOAD events, right? > > > > > > > > > > Accurately, PEBS drain is specific for PERF_X86_EVENT_FREERUNNING here. > > > > > PERF_X86_EVENT_FREERUNNING event must be _AUTO_RELOAD event. > > > > > But in some cases, _AUTO_RELOAD event cannot be _FREERUNNING event. > > > > > > > > > > Only the event which is both _FREERUNNING and _AUTO_RELOAD need to do PEBS > > > > > drain in _read(). > > > > > > > > > > So it does the check in intel_pmu_pebs_read() > > > > > + if (pebs_needs_sched_cb(cpuc)) > > > > > + return intel_pmu_drain_pebs_buffer(); > > > > > > > > > > > > > > > > > wrt readability maybe you could add function like: > > > > > > > > > > The existing function pebs_needs_sched_cb() can do the check. > > > > > We just need to expose it, and also the intel_pmu_drain_pebs_buffer(). > > > > > > > > > > But to be honest, I still cannot see a reason for that. > > > > > It could save a call to intel_pmu_pebs_read(), but _read() is not critical > > > > > path. It doesn't save much. > > > > > > > > hum, pmu->read is also called for PERF_SAMPLE_READ for sample, > > > > check perf_output_read > > > > > > > > for non sampling event you shouldn't be able to create PEBS > > > > event, there's check in x86_pmu_hw_config > > > > > > > > I agree it does not save much, it just confused me while > > > > I was reading the code, like why is this needed for all > > > > events with precise_ip > > > > > > > > > > > > > Sorry for the late response. > > > > > > How about the patch as below? > > > The patch will be split into two patches in V3. One is to introduce > > > intel_pmu_large_pebs_read, the other is to introduce intel_pmu_read_event. > > > > > > Thanks, > > > Kan > > > > > > diff --git a/arch/x86/events/intel/core.c b/arch/x86/events/intel/core.c > > > index 731153a..1610a9d 100644 > > > --- a/arch/x86/events/intel/core.c > > > +++ b/arch/x86/events/intel/core.c > > > @@ -2060,6 +2060,14 @@ static void intel_pmu_del_event(struct perf_event > > > *event) > > > intel_pmu_pebs_del(event); > > > } > > > > > > +static void intel_pmu_read_event(struct perf_event *event) > > > +{ > > > + if (intel_pmu_large_pebs_read(event)) > > > + return; > > > > should this be 'if (!intel_pmu_large_pebs_read(event))' > > > > NO. For large pebs, the event->count has been updated in drain_pebs(). So it > doesn't need to do x86_perf_event_update() again. > ok, thanks jirka