[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100902141900.GG4879@redhat.com>
Date: Thu, 2 Sep 2010 10:19:00 -0400
From: Don Zickus <dzickus@...hat.com>
To: Stephane Eranian <eranian@...gle.com>
Cc: Robert Richter <robert.richter@....com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"mingo@...e.hu" <mingo@...e.hu>,
Peter Zijlstra <peterz@...radead.org>
Subject: Re: [PATCH 4/4] [x86] perf: fix accidentally ack'ing a second event
on intel perf counter
On Thu, Sep 02, 2010 at 10:13:19AM +0200, Stephane Eranian wrote:
> Robert,
>
> Do you have the test program you used to test this?
> I believe the NHM hack does not solve the problem, it
> just makes it harder to appear.
Could be.
>
> I suspect the real issue is that the GLOBAL_STATUS
> bitmask cannot be trusted. I'd like to verify this.
>
> Has the problem appear only on Nehalem or also on
> Westmere?
I was able to duplicate on
Intel(R) Core(TM) i5 CPU 650 @ 3.20GHz
Intel(R) Xeon(R) CPU X5560 @ 2.80GHz
with just running 'perf top' for about 60 seconds.
You would need the first three patches to expose the problem.
Reading the code, it seemed like the perf counters should be disabled and
this patch should be unecessary, but after playing around with the code
for a few hours, I came up with this patch to trap the issue.
I read through the cpu errata and could not find anything related but I
might have missed something.
I am willing to help test if you have a more targeted patch.
Cheers,
Don
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists