Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp262739rdb; Thu, 30 Nov 2023 04:23:36 -0800 (PST) X-Google-Smtp-Source: AGHT+IEBIsUDF8dKVqtqtIiDcXwvEmh6zyQ2CarGsLgah1RjA3a5hVzDliRzTFyUCwSjo78xNdVS X-Received: by 2002:a05:6a20:258f:b0:18c:64e0:4408 with SMTP id k15-20020a056a20258f00b0018c64e04408mr16243424pzd.44.1701347016512; Thu, 30 Nov 2023 04:23:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701347016; cv=none; d=google.com; s=arc-20160816; b=OgSbBi5fs/P6FML+FK1FZ5Jp5XvYHkYyWbLmHVo/OiOftr9SI7zdzGEE3a4246Zr52 AGqlbNTH/Qx0jM5QHaq15SeXVnsJFa6EyaQ6K3vEdcMwqk+jgZ8qiPJ7rik4hSZh+NCP H08sYmAEGc+uiLWzHErAtUowQNIZXVswbX/3fumUbGXfb4N3bLWhoP6WHvCpb+S1WeXf qsdykBO2yFI3eDXTdLTQQSG7rh+wiWyfFHuhaagXE/hRlfGT4QWK48Gpoyyo5HsbsF4Z Aa9enXj3PluE0Ocm8dwLmv0TTidwOFDDVBBUzZC8iEc1TLDg5Bt07fPRsG0fDJ6BXBgt b81w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=vCB/w7PioTEzscGc4R5uFqNY8rIgIEdCkvwKruV8hws=; fh=h89pDCf4sb/h8iiH2eBl34HhpquGQT/lUmV6zzg6kCw=; b=LFHL3SNlubYcquXj9jzzP+AXiKJY9re5ngxd1/TZ54N4iOipJXffMablYP8BWrt2DH +ortj+hONR5MihC7GjgzuycdmKrU2i+zmC4t/0Vi/EkN6KBwsPp/hglpn/rZBkh25iRy uQZOsqowfeEyrRmUUovmhoQYj39HFCVvsp4ETmjQyD6vbe9d1FEl7WVfthkP9BKACjG3 EhGRwv40PdhfFkESKvkONjhG6bZ1E7eTB8z1T21vDyB3fGkoXUGuggwxRjNi4hJCt5oY fuEFfUfIwg8lBldZ3m9kYz6KYgQmjKWFuldBkQft7SH3wU8vW/zbV19DFpY04dxrpegg reIA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id h128-20020a636c86000000b005ac4854b202si1193064pgc.321.2023.11.30.04.23.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 04:23:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 6BBDA80CF536; Thu, 30 Nov 2023 04:23:35 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232019AbjK3MXQ (ORCPT + 99 others); Thu, 30 Nov 2023 07:23:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47638 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231796AbjK3MXP (ORCPT ); Thu, 30 Nov 2023 07:23:15 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 4C6301A8; Thu, 30 Nov 2023 04:23:21 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A91081042; Thu, 30 Nov 2023 04:24:07 -0800 (PST) Received: from FVFF77S0Q05N (unknown [10.57.43.250]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 21DB13F5A1; Thu, 30 Nov 2023 04:23:20 -0800 (PST) Date: Thu, 30 Nov 2023 12:23:13 +0000 From: Mark Rutland To: "Ashley, William" Cc: "linux-arm-kernel@lists.infradead.org" , "linux-kernel@vger.kernel.org" , "linux-perf-users@vger.kernel.org" , will@kernel.org Subject: Re: armv8pmu: Pending overflow interrupt is discarded when perf event is disabled Message-ID: References: <950001BD-490C-4BAC-8EEA-CDB9F7C4ADFC@amazon.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 30 Nov 2023 04:23:35 -0800 (PST) On Thu, Nov 30, 2023 at 11:48:54AM +0000, Mark Rutland wrote: > On Wed, Nov 29, 2023 at 04:35:01PM +0000, Mark Rutland wrote: > > Does RR set any of the perf_event_attr::exclude_* bits? If not, does RR > > intentionally count events that occur within the kernel? > > Looking at the test, I see it sets perf_event_attr::exclude_kernel to 1, but > doesn't set perf_event_attr::exclude_host or perf_event_attr::exclude_hv. I > think the poorly-defined exclude_* bits are part of the problem here. > > Using your test as-is on my ThunderX2, I can reproduce the period being longer > than expected by concurrently running the following in a shell: > > while true; do > for C in $(seq 0 63); do > taskset -c -p $C ${TEST_PID_HERE}; > done; > done > /dev/null > > ... resulting in: > > | [mark@gravadlaks:~]% ./counter-overflow > | Pid 20060 running with period 10000 tolerance 1000 > | Signal #1: last: 0, cur: 10292, max diff: 0 > | Signal #415330: delta of 19999 is outside 10000 +/- 1000 > | Signal #415330: last: 4153290187, cur: 4153310186, max diff: 10292 > | Signal #489879: delta of 19998 is outside 10000 +/- 1000 > | Signal #511842: delta of 20058 is outside 10000 +/- 1000 > | Signal #511842: last: 5118430130, cur: 5118450188, max diff: 19999 > > However, if I modify the test to also set perf_event_attr::exclude_host=1, I do > not see any lost overflows after many minutes. On VHE hosts (like the > ThunderX2), the host kernel gets counted when perf_event_attr::exclude_host=0, > even if perf_event_attr::exclude_kernel=1 (which I agree is surprising), so I > think what's happening is the counters are counting in the host kernel, which > isn't what RR actually wants regardless. > I'll continue to look at what we can do kernel-side, but I reckon it's worth > having RR try the other exclude bits regardless, if that's possible? It would > be interesting to know whether that helps you under a hypervisor. Sorry, the above is wrong, and I do not recommend RR goes and changes its exclude_* settings. I had misread the logic in armv8pmu_set_event_filter(), but looking again that's saner than I thought it was, and what was actually happening in my testing is that exclude_host also filtered host EL0 (userspace), and so the test received *no* overflow signals. I'll get back to looking at how we can better capture the overflow when removing an event. Mark.