Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp5535060rwd; Mon, 5 Jun 2023 05:15:44 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ58Hg0rnivANo35vB4wUJ/UoWJpBy2IPTAWgl2t8QT+BytK0xD8kfwVqjmZwDFeKV5ppZUX X-Received: by 2002:a05:6a20:728e:b0:10b:78d7:502 with SMTP id o14-20020a056a20728e00b0010b78d70502mr2066717pzk.36.1685967343837; Mon, 05 Jun 2023 05:15:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685967343; cv=none; d=google.com; s=arc-20160816; b=eYoRt2e+4zhYvZ0qhLRkQiPGHlm5yw42iVtuHykCYEfhIA3Az5JqJFvggTXeqoPYvf g7P+ys5GMYOYxceU2p4eBPrsTK3La9sijXTuE82oZtZxOEzwoWG8CMCEh5ve1hu12ihf jBvKRLRoDmyczx+jpeZbHxEL9tEPTcWayGHOb+IpmDTWFkbXK+fP6J9Dyn+DOv/4Ru8W rXkU6PQSiwdWpCKr6mKB002XOy8eCASkvF10Ks2KVY4kIYTmVbL84QX0+BGHn23K4it5 rX5Z2jOWjiyKiLcIS0g+qRkURQGk0009az0dhaZDM9vxA9ixmO0682rbgoOYEw/2XjBX mX8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=XJwFvI7DNf1Vg2EvTAw9eWe4Hvih55xbdKSlyL5yuAY=; b=iXhySvBbweFdYAAWn0JGSNJbcs+2b39vywsL8fXPwor7BFC0nrh8WMke8o3tqTS7zm yWEaJ6xPEL133Vt3G6MUSwKzQPO/0iDE8zWMim9jdTzte8uljxPHdKcSiRk0rN9SEGkA /D+O5Z7MLLkLXeHB/OgLZ+JJSz2Sm0NaLxjMUwRLDSu0Mgd9s7Hx479YE25D0uCwk11n 23BPZHXMRlS/Pe1EV+BKiRaOqCkozyPWghK5i5iKVTjuJMGSu4HKgPMAAELDXU2Kg9wJ b3Lr89lxfVNqHGbZ7BszJdjKx3WeKa3Dqjp9cJlk+RPWYjXxoFA7cIX5SDh+6VfPWqpT 7FVw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b9-20020a63d809000000b0054292b18a8esi5415995pgh.696.2023.06.05.05.15.31; Mon, 05 Jun 2023 05:15:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232477AbjFEMFu (ORCPT + 99 others); Mon, 5 Jun 2023 08:05:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42994 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229815AbjFEMFt (ORCPT ); Mon, 5 Jun 2023 08:05:49 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 7913F9C; Mon, 5 Jun 2023 05:05:48 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B9AA2D75; Mon, 5 Jun 2023 05:06:33 -0700 (PDT) Received: from FVFF77S0Q05N (unknown [10.57.25.215]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 0275A3F663; Mon, 5 Jun 2023 05:05:45 -0700 (PDT) Date: Mon, 5 Jun 2023 13:05:36 +0100 From: Mark Rutland To: Anshuman Khandual Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, will@kernel.org, catalin.marinas@arm.com, Mark Brown , James Clark , Rob Herring , Marc Zyngier , Suzuki Poulose , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , linux-perf-users@vger.kernel.org Subject: Re: [PATCH V11 05/10] arm64/perf: Add branch stack support in ARMV8 PMU Message-ID: References: <20230531040428.501523-1-anshuman.khandual@arm.com> <20230531040428.501523-6-anshuman.khandual@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230531040428.501523-6-anshuman.khandual@arm.com> X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 31, 2023 at 09:34:23AM +0530, Anshuman Khandual wrote: > This enables support for branch stack sampling event in ARMV8 PMU, checking > has_branch_stack() on the event inside 'struct arm_pmu' callbacks. Although > these branch stack helpers armv8pmu_branch_XXXXX() are just dummy functions > for now. While here, this also defines arm_pmu's sched_task() callback with > armv8pmu_sched_task(), which resets the branch record buffer on a sched_in. This generally looks good, but I have a few comments below. [...] > +static inline bool armv8pmu_branch_valid(struct perf_event *event) > +{ > + WARN_ON_ONCE(!has_branch_stack(event)); > + return false; > +} IIUC this is for validating the attr, so could we please name this armv8pmu_branch_attr_valid() ? [...] > +static int branch_records_alloc(struct arm_pmu *armpmu) > +{ > + struct pmu_hw_events *events; > + int cpu; > + > + for_each_possible_cpu(cpu) { > + events = per_cpu_ptr(armpmu->hw_events, cpu); > + events->branches = kzalloc(sizeof(struct branch_records), GFP_KERNEL); > + if (!events->branches) > + return -ENOMEM; > + } > + return 0; This leaks memory if any allocation fails, and the next patch replaces this code entirely. Please add this once in a working state. Either use the percpu allocation trick in the next patch from the start, or have this kzalloc() with a corresponding kfree() in an error path. > } > > static int armv8pmu_probe_pmu(struct arm_pmu *cpu_pmu) > @@ -1145,12 +1162,24 @@ static int armv8pmu_probe_pmu(struct arm_pmu *cpu_pmu) > }; > int ret; > > + ret = armv8pmu_private_alloc(cpu_pmu); > + if (ret) > + return ret; > + > ret = smp_call_function_any(&cpu_pmu->supported_cpus, > __armv8pmu_probe_pmu, > &probe, 1); > if (ret) > return ret; > > + if (arm_pmu_branch_stack_supported(cpu_pmu)) { > + ret = branch_records_alloc(cpu_pmu); > + if (ret) > + return ret; > + } else { > + armv8pmu_private_free(cpu_pmu); > + } I see from the next patch that "private" is four ints, so please just add that to struct arm_pmu under an ifdef CONFIG_ARM64_BRBE. That'll simplify this, and if we end up needing more space in future we can consider factoring it out. > + > return probe.present ? 0 : -ENODEV; > } It also seems odd to ceck probe.present *after* checking arm_pmu_branch_stack_supported(). With the allocation removed I think this can be written more clearly as: | static int armv8pmu_probe_pmu(struct arm_pmu *cpu_pmu) | { | struct armv8pmu_probe_info probe = { | .pmu = cpu_pmu, | .present = false, | }; | int ret; | | ret = smp_call_function_any(&cpu_pmu->supported_cpus, | __armv8pmu_probe_pmu, | &probe, 1); | if (ret) | return ret; | | if (!probe.present) | return -ENODEV; | | if (arm_pmu_branch_stack_supported(cpu_pmu)) | ret = branch_records_alloc(cpu_pmu); | | return ret; | } Thanks, Mark.