Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp714133yba; Fri, 12 Apr 2019 12:10:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqxGHLtAge8x0d1WJJ91CnNjD7EtgyqQArHwqJ6/xOb4U0806yY1SvYbyzSY+4+NAqy/OOBw X-Received: by 2002:a63:2e87:: with SMTP id u129mr54022189pgu.321.1555096212313; Fri, 12 Apr 2019 12:10:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555096212; cv=none; d=google.com; s=arc-20160816; b=xCr/QE8fl0FgpbI6EgAf+7TQajXFqP27RB6k4M6j1Wb15loILgnUgvZrxoSfc7j8W6 VshcG771WyT8Qdt+SB9M/uC7xUCXAb9AdvIL8EetoLskiyl7wEzDEEUOCK4bMKlESRVb Y+2OmdFcStDax6ZqGagbX6pn4JRQMHxZdhNpztiOGjrEsWHIMfTJcP/bgZUIYEMcF6f2 1e3lOq6sNNlZcdrQk7sl1eua+b4nh+1yMBP9k05FEgKACXF0+RzqObanKHqQRujX5/rJ gWrxDL/oxcIobygRQzcj2RJEyAcAIZGxDOEbLIGwrCBj/mGX1tVETrwyV0B3eQndbAGU HdAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id:date :subject:cc:to:from; bh=RbPJMb49GWIRdqj+e6lJ2XnM7TfxS+ysOWKP32rYhjg=; b=LCZvss4kaO707/wbqKVmOXmTG20mdJRZBPWnKUqMBcZNzJ3DHzndMttgxiDvoqr91A zktrFvgaOtTNhDZ8fSBfwRl4gBZzmP1PJiB79UE3iRlh8B9tEu59A4oV7na8uW3n2iuK QP1hy8wjAjnNTweCUoRk+2eVrhefe7XdZxyiPXQmaXbxgPNMmtT46EQ4qFDFJwT/MSaQ TMcaXEjsEpdCcjcHdY//m3njo9tk6xkRrKuFmJK4p9+6vN1LtBMzHkL3nt9RsiMUaPgx cW+LCGRiMq/6PWYd1BNaYJiExGGjVAjQ73vEq9ZkhFogrZeTeERM6YquF+YujUuXVujJ mDdQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q4si37995409pfh.157.2019.04.12.12.09.56; Fri, 12 Apr 2019 12:10:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726944AbfDLTJT (ORCPT + 99 others); Fri, 12 Apr 2019 15:09:19 -0400 Received: from mx1.redhat.com ([209.132.183.28]:41922 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726832AbfDLTJT (ORCPT ); Fri, 12 Apr 2019 15:09:19 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 840CB2CD80A; Fri, 12 Apr 2019 19:09:18 +0000 (UTC) Received: from gigantic.usersys.redhat.com (helium.bos.redhat.com [10.18.17.132]) by smtp.corp.redhat.com (Postfix) with ESMTPS id CB7D1600C2; Fri, 12 Apr 2019 19:09:17 +0000 (UTC) From: Bandan Das To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Jiri Olsa Cc: linux-kernel@vger.kernel.org, x86@kernel.org Subject: [PATCH] perf/x86: descriptive failure messages for PMU init Date: Fri, 12 Apr 2019 15:09:17 -0400 Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Fri, 12 Apr 2019 19:09:18 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There's a default warning message that gets printed, however, there are various failure conditions: - a msr read can fail - a msr write can fail - a msr has an unexpected value - all msrs have unexpected values (disable PMU) Also, commit commit 005bd0077a79 ("perf/x86: Modify error message in virtualized environment") completely removed printing the msr in question but these messages could be helpful for debugging vPMUs as well. Add them back and change them to pr_debugs, this keeps the behavior the same for baremetal. Lastly, use %llx to silence checkpatch Signed-off-by: Bandan Das --- arch/x86/events/core.c | 66 ++++++++++++++++++++++++++++++++---------- 1 file changed, 50 insertions(+), 16 deletions(-) diff --git a/arch/x86/events/core.c b/arch/x86/events/core.c index e2b1447192a8..786e03893a0c 100644 --- a/arch/x86/events/core.c +++ b/arch/x86/events/core.c @@ -192,9 +192,16 @@ static void release_pmc_hardware(void) {} static bool check_hw_exists(void) { - u64 val, val_fail = -1, val_new= ~0; - int i, reg, reg_fail = -1, ret = 0; - int bios_fail = 0; + u64 val = -1, val_fail = -1, val_new = ~0; + int i, reg = -1, reg_fail = -1, ret = 0; + bool virt = boot_cpu_has(X86_FEATURE_HYPERVISOR) ? true : false; + enum { + READ_FAIL = 1, + WRITE_FAIL = 2, + PMU_FAIL = 3, + BIOS_FAIL = 4, + }; + int status = 0; int reg_safe = -1; /* @@ -204,10 +211,13 @@ static bool check_hw_exists(void) for (i = 0; i < x86_pmu.num_counters; i++) { reg = x86_pmu_config_addr(i); ret = rdmsrl_safe(reg, &val); - if (ret) + if (ret) { + status = READ_FAIL; goto msr_fail; + } + if (val & ARCH_PERFMON_EVENTSEL_ENABLE) { - bios_fail = 1; + status = BIOS_FAIL; val_fail = val; reg_fail = reg; } else { @@ -218,11 +228,13 @@ static bool check_hw_exists(void) if (x86_pmu.num_counters_fixed) { reg = MSR_ARCH_PERFMON_FIXED_CTR_CTRL; ret = rdmsrl_safe(reg, &val); - if (ret) + if (ret) { + status = READ_FAIL; goto msr_fail; + } for (i = 0; i < x86_pmu.num_counters_fixed; i++) { if (val & (0x03 << i*4)) { - bios_fail = 1; + status = BIOS_FAIL; val_fail = val; reg_fail = reg; } @@ -236,7 +248,7 @@ static bool check_hw_exists(void) */ if (reg_safe == -1) { - reg = reg_safe; + status = PMU_FAIL; goto msr_fail; } @@ -246,18 +258,22 @@ static bool check_hw_exists(void) * (qemu/kvm) that don't trap on the MSR access and always return 0s. */ reg = x86_pmu_event_addr(reg_safe); - if (rdmsrl_safe(reg, &val)) + if (rdmsrl_safe(reg, &val)) { + status = READ_FAIL; goto msr_fail; + } val ^= 0xffffUL; ret = wrmsrl_safe(reg, val); ret |= rdmsrl_safe(reg, &val_new); - if (ret || val != val_new) + if (ret || val != val_new) { + status = WRITE_FAIL; goto msr_fail; + } /* * We still allow the PMU driver to operate: */ - if (bios_fail) { + if (status == BIOS_FAIL) { pr_cont("Broken BIOS detected, complain to your hardware vendor.\n"); pr_err(FW_BUG "the BIOS has corrupted hw-PMU resources (MSR %x is %Lx)\n", reg_fail, val_fail); @@ -266,12 +282,30 @@ static bool check_hw_exists(void) return true; msr_fail: - if (boot_cpu_has(X86_FEATURE_HYPERVISOR)) { + if (virt) pr_cont("PMU not available due to virtualization, using software events only.\n"); - } else { - pr_cont("Broken PMU hardware detected, using software events only.\n"); - pr_err("Failed to access perfctr msr (MSR %x is %Lx)\n", - reg, val_new); + switch (status) { + case READ_FAIL: + if (virt) + pr_debug("Failed to read perfctr msr (MSR %x)\n", reg); + else + pr_err("Failed to read perfctr msr (MSR %x)\n", reg); + break; + case WRITE_FAIL: + if (virt) + pr_debug("Failed to write perfctr msr (MSR %x, wrote: %llx, read: %llx)\n", + reg, val, val_new); + else + pr_err("Failed to write perfctr msr (MSR %x, wrote: %llx, read: %llx)\n", + reg, val, val_new); + break; + case PMU_FAIL: + /* fall through for default message */ + default: + if (virt) + pr_debug("Broken PMU hardware detected, using software events only.\n"); + else + pr_cont("Broken PMU hardware detected, using software events only.\n"); } return false; -- 2.19.2