Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp797995pxb; Tue, 3 Nov 2020 12:50:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJxUjfAePE6JbghiOfOZcp/M9Yrrwlbo514amtAdRxXjlvv5u1D0WUW9NkXiHR1LUhHGNj+W X-Received: by 2002:a50:d805:: with SMTP id o5mr23691996edj.142.1604436607412; Tue, 03 Nov 2020 12:50:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604436607; cv=none; d=google.com; s=arc-20160816; b=xjL8z46Gq5ILmiXh0KkBqpxBmblboCZbigvplBaO0KUo0brZZjGInueebqXn1K/LkT CJWdE46bwyPdw1IZG8IhuuLpURyd+jO3/juyr1xl2keHpd+Vmp6Roe+PC9qKB/ZQHVCW 6Rjocac9Oy4lwcVoH5XHoPxJHwFwKhf1yUQs7Iw0Rc0RgUdwybd10PvuTPBivFfJOgSy BtIx5tBvWLAxYqQaw5/F2A3jxRsiHm+VWPWZqdSLhKe3v+k21Ywb7QzjlNdohbNz8w2B araq8QKXilB5A81DnmSb+FaenMceQRX/J94H2klF9jpzjP3+rFdSPeHX3p0hgV61KWfq oKCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tTjjzwZiWS2q5tTmt+1LnD0LFHJqLuXhSn9PMteHZoU=; b=AchAysIFGUIvT0NmHNQYajgs96MgxoP3SpNEXNauNj8kYn2HUyda05izfY7xyXq/Nv plJlYAE1235/g93dCthO/z2ocy4cEF5bjPJfKomDhO6yStW++tj02s4AnWMbFLAUlu7l uyOY+tHtilWE7RubjsL9NX46eHENSu+g6OhsNmtvna63SYrS0GIo1y+CYk0R9OOmcvTE IxO+WxFg0M5pDCglEM2/AS37AUTGBC6L37HCYj5OaE+5glggTcDY6RLlDuT6h6sfKEUy 1Q+9WMVG4UkZcU4NdYct8B7aZKW7LMqvpTo3bb3ythh9bwzVzp+WDrTbHj3OjT5ZKIb5 L5HA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=prf11tFF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d19si13519812edp.276.2020.11.03.12.49.44; Tue, 03 Nov 2020 12:50:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=prf11tFF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730972AbgKCUpM (ORCPT + 99 others); Tue, 3 Nov 2020 15:45:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:32984 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730682AbgKCUpI (ORCPT ); Tue, 3 Nov 2020 15:45:08 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 65D48223FD; Tue, 3 Nov 2020 20:45:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604436307; bh=md9wSusj+UYDdkbmuUuq3AZ/paY7fC3MwE3iDZlR9iw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=prf11tFF7acDo6Tol+4AVEndsShgCGbNpY/L3zn1aXiqrr4v4N2AcEH71ra/d3m2f Sa2Exyzycz598wUFwt1LNBQUYXUqndPmAfDqAGTgfhDVsbCN0h4u5u3R5MQT8yzqPn RM6Qj6us/99UZvO1xG84Oaed1kAGtRT+aCawL84M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kim Phillips , "Peter Zijlstra (Intel)" Subject: [PATCH 5.9 194/391] perf/x86/amd/ibs: Dont include randomized bits in get_ibs_op_count() Date: Tue, 3 Nov 2020 21:34:05 +0100 Message-Id: <20201103203359.982200857@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203348.153465465@linuxfoundation.org> References: <20201103203348.153465465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kim Phillips commit 680d69635005ba0e58fe3f4c52fc162b8fc743b0 upstream. get_ibs_op_count() adds hardware's current count (IbsOpCurCnt) bits to its count regardless of hardware's valid status. According to the PPR for AMD Family 17h Model 31h B0 55803 Rev 0.54, if the counter rolls over, valid status is set, and the lower 7 bits of IbsOpCurCnt are randomized by hardware. Don't include those bits in the driver's event count. Fixes: 8b1e13638d46 ("perf/x86-ibs: Fix usage of IBS op current count") Signed-off-by: Kim Phillips Signed-off-by: Peter Zijlstra (Intel) Cc: stable@vger.kernel.org Link: https://bugzilla.kernel.org/show_bug.cgi?id=206537 Signed-off-by: Greg Kroah-Hartman --- arch/x86/events/amd/ibs.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) --- a/arch/x86/events/amd/ibs.c +++ b/arch/x86/events/amd/ibs.c @@ -335,11 +335,15 @@ static u64 get_ibs_op_count(u64 config) { u64 count = 0; + /* + * If the internal 27-bit counter rolled over, the count is MaxCnt + * and the lower 7 bits of CurCnt are randomized. + * Otherwise CurCnt has the full 27-bit current counter value. + */ if (config & IBS_OP_VAL) - count += (config & IBS_OP_MAX_CNT) << 4; /* cnt rolled over */ - - if (ibs_caps & IBS_CAPS_RDWROPCNT) - count += (config & IBS_OP_CUR_CNT) >> 32; + count = (config & IBS_OP_MAX_CNT) << 4; + else if (ibs_caps & IBS_CAPS_RDWROPCNT) + count = (config & IBS_OP_CUR_CNT) >> 32; return count; }