Received: by 10.223.176.5 with SMTP id f5csp3085073wra; Mon, 29 Jan 2018 08:32:39 -0800 (PST) X-Google-Smtp-Source: AH8x225JywIVBmIUTBKAl+XLDRn3aFWlS3WZumfk0sZF5hmk7GpGW/qXwdoDks7/2Um7p4bxhjIH X-Received: by 10.98.64.208 with SMTP id f77mr27065621pfd.157.1517243559345; Mon, 29 Jan 2018 08:32:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517243559; cv=none; d=google.com; s=arc-20160816; b=TbZUEWKoqGjsr4ZZMg/e8kQWHDvHBN1jWNUJwY7Adw96LF/28m8oYtxNdJMledVRw9 4ANX/h+i3bj0aHV+TSTstNVBATAoqSSaFrMo3YAWyuGNpEo07cIWvIJoiSKM4FPKLz/f gCXDvlLvrTn0yNpiPsMtq7lGPCd8YbrRSY+4BIGEZqLVuVFu3Sx2CieA4jsCTA/wwhNS e3GnzKP7wJo0USCJby0yQOcKKDS4tXJWwGBBEoyA/ukIPVoxoYcCWpPB17JsEc/MRHzK PXEbgGptpHYRKLZwIqGHYjxLb50uO3caefKlgBYi7mGebN4QrBklu6blcHu8ht3dQ5yg EFfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=EMM3dHG3kj8oCcKnUd+ePkQSLwfIhKQ1gJIVh1KW5UA=; b=PldUG+FVNLvvKKInsH5RycdwdUxueyGFBi2nFOCjqvsmCBTUOVgBqd7PYCiJPRAAJn 4/7rN8qXtkcOApPpfpwdyAGPxZFvteJBbZwnah8Qqb2n60w66c3z00RXhFHVKqQ3mT35 mtDWhHYnYlJvxoE8+U1+aowvHG98/V4Xl5GivGC8J+84y1sUg0hgNi6CjN2j2DKLNrje 20S5ngmPmXzvvrEbVDasM9HvLBgy7wCmwmQ8yTrwMUcLmJOCk/AROOU5TZ5m0J/nvqdb YremFuUet1ibOS3jARoxuGlGi/nGEUH+NWxGANKHfHbkkUaiXlNpkr8qwM4XBvUjACpg qvHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e3si1465446pfi.191.2018.01.29.08.32.24; Mon, 29 Jan 2018 08:32:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751391AbeA2Qal (ORCPT + 99 others); Mon, 29 Jan 2018 11:30:41 -0500 Received: from mga09.intel.com ([134.134.136.24]:11472 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751101AbeA2Qaj (ORCPT ); Mon, 29 Jan 2018 11:30:39 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Jan 2018 08:30:38 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.46,431,1511856000"; d="scan'208";a="25629340" Received: from otc-lr-04.jf.intel.com ([10.54.39.128]) by fmsmga004.fm.intel.com with ESMTP; 29 Jan 2018 08:30:38 -0800 From: kan.liang@linux.intel.com To: peterz@infradead.org, mingo@redhat.com, linux-kernel@vger.kernel.org Cc: acme@kernel.org, tglx@linutronix.de, jolsa@redhat.com, eranian@google.com, ak@linux.intel.com, Kan Liang Subject: [PATCH V3 0/5] bugs fix for large PEBS mmap read and rdpmc read Date: Mon, 29 Jan 2018 08:29:28 -0800 Message-Id: <1517243373-355481-1-git-send-email-kan.liang@linux.intel.com> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kan Liang ------ Changes since V2: - Refined the changelog - Introduced specific read function for large PEBS. The previous generic PEBS read function is confusing. Disabled PMU in pmu::read() path for large PEBS. Handled the corner case when reload_times == 0. - Modified the parameter of intel_pmu_save_and_restart_reload() Discarded local64_cmpxchg - Added fixes tag - Added WARN to handle reload_times == 0 || reload_val == 0 Changes since V1: - Check PERF_X86_EVENT_AUTO_RELOAD before call intel_pmu_save_and_restore() - Introduce a special purpose intel_pmu_save_and_restart() just for AUTO_RELOAD. - New patch to disable userspace RDPMC usage if large PEBS is enabled. ------ There is a bug when mmap read event->count with large PEBS enabled. Here is an example. #./read_count 0x71f0 0x122c0 0x1000000001c54 0x100000001257d 0x200000000bdc5 The bug is caused by two issues. - In x86_perf_event_update, the calculation of event->count does not take the auto-reload values into account. - In x86_pmu_read, it doesn't count the undrained values in large PEBS buffers. The first issue was introduced with the auto-reload mechanism enabled since commit 851559e35fd5 ("perf/x86/intel: Use the PEBS auto reload mechanism when possible") Patch 1 fixed the issue in x86_perf_event_update. The second issue was introduced since commit b8241d20699e ("perf/x86/intel: Implement batched PEBS interrupt handling (large PEBS interrupt threshold)") Patch 2-4 fixed the issue in x86_pmu_read. Besides the two issues, the userspace RDPMC usage is broken for large PEBS as well. The RDPMC issue was also introduced since commit b8241d20699e ("perf/x86/intel: Implement batched PEBS interrupt handling (large PEBS interrupt threshold)") Patch 5 fixed the RDPMC issue. The source code of read_count is as below. struct cpu { int fd; struct perf_event_mmap_page *buf; }; int perf_open(struct cpu *ctx, int cpu) { struct perf_event_attr attr = { .type = PERF_TYPE_HARDWARE, .size = sizeof(struct perf_event_attr), .sample_period = 100000, .config = 0, .sample_type = PERF_SAMPLE_IP | PERF_SAMPLE_TID | PERF_SAMPLE_TIME | PERF_SAMPLE_CPU, .precise_ip = 3, .mmap = 1, .comm = 1, .task = 1, .mmap2 = 1, .sample_id_all = 1, .comm_exec = 1, }; ctx->buf = NULL; ctx->fd = syscall(__NR_perf_event_open, &attr, -1, cpu, -1, 0); if (ctx->fd < 0) { perror("perf_event_open"); return -1; } return 0; } void perf_close(struct cpu *ctx) { close(ctx->fd); if (ctx->buf) munmap(ctx->buf, pagesize); } int main(int ac, char **av) { struct cpu ctx; u64 count; perf_open(&ctx, 0); while (1) { sleep(5); if (read(ctx.fd, &count, 8) != 8) { perror("counter read"); break; } printf("0x%llx\n", count); } perf_close(&ctx); } Kan Liang (5): perf/x86/intel: fix event update for auto-reload perf/x86: introduce read function for x86_pmu perf/x86/intel/ds: introduce read function for large pebs perf/x86/intel: introduce read function for intel_pmu perf/x86: fix: disable userspace RDPMC usage for large PEBS arch/x86/events/core.c | 5 ++- arch/x86/events/intel/core.c | 9 +++++ arch/x86/events/intel/ds.c | 85 ++++++++++++++++++++++++++++++++++++++++++-- arch/x86/events/perf_event.h | 3 ++ 4 files changed, 99 insertions(+), 3 deletions(-) -- 2.7.4