Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751975Ab3EPPKm (ORCPT ); Thu, 16 May 2013 11:10:42 -0400 Received: from mx1.redhat.com ([209.132.183.28]:22512 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751644Ab3EPPKl (ORCPT ); Thu, 16 May 2013 11:10:41 -0400 Date: Thu, 16 May 2013 11:10:26 -0400 From: Josh Boyer To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo Cc: x86@kernel.org, linux-kernel@vger.kernel.org, gleb@redhat.com Subject: Drop WARN on AMD lack of perfctrs Message-ID: <20130516151026.GB18325@hansolo.jdub.homelinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1807 Lines: 41 Hi All, If you boot a KVM guest on an AMD family 15h and specify -cpu host, you'll get the following splat: [ 0.031000] ------------[ cut here ]------------ [ 0.031000] WARNING: at arch/x86/kernel/cpu/perf_event_amd.c:772 amd_pmu_init+0x18c/0x249() [ 0.031000] Hardware name: Bochs [ 0.031000] Odd, counter constraints enabled but no core perfctrs detected! [ 0.031000] Modules linked in: [ 0.031000] Pid: 1, comm: swapper/0 Not tainted 3.9.0-0.rc1.git0.4.fc19.x86_64 #1 [ 0.031000] Call Trace: [ 0.031000] [] ? amd_pmu_init+0x18c/0x249 [ 0.031000] [] warn_slowpath_common+0x70/0xa0 [ 0.031000] [] ? check_bugs+0x2d/0x2d [ 0.031000] [] warn_slowpath_fmt+0x4c/0x50 [ 0.031000] [] amd_pmu_init+0x18c/0x249 [ 0.031000] [] init_hw_perf_events+0x34/0x428 [ 0.031000] [] ? check_bugs+0x2d/0x2d [ 0.031000] [] do_one_initcall+0x10a/0x160 [ 0.031000] [] kernel_init_freeable+0xcf/0x1fa [ 0.031000] [] ? rest_init+0x80/0x80 [ 0.031000] [] kernel_init+0xe/0x190 [ 0.031000] [] ret_from_fork+0x7c/0xb0 [ 0.031000] [] ? rest_init+0x80/0x80 [ 0.031000] ---[ end trace a1e57d3cb8668105 ]--- That seems a bit excessive, and it gets picked up by auto-reporting tools like ABRT as a bug. Can we remove the WARN and just use pr_err or something else instead? josh -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/