Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753430Ab3EPR4a (ORCPT ); Thu, 16 May 2013 13:56:30 -0400 Received: from mx1.redhat.com ([209.132.183.28]:64382 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751643Ab3EPR41 (ORCPT ); Thu, 16 May 2013 13:56:27 -0400 Date: Thu, 16 May 2013 13:55:57 -0400 From: Josh Boyer To: Peter Zijlstra Cc: Ingo Molnar , Arnaldo Carvalho de Melo , x86@kernel.org, linux-kernel@vger.kernel.org, gleb@redhat.com, Robert Richter Subject: Re: Drop WARN on AMD lack of perfctrs Message-ID: <20130516175557.GC18325@hansolo.jdub.homelinux.org> References: <20130516151026.GB18325@hansolo.jdub.homelinux.org> <20130516175117.GK19669@dyad.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20130516175117.GK19669@dyad.programming.kicks-ass.net> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2569 Lines: 55 On Thu, May 16, 2013 at 07:51:17PM +0200, Peter Zijlstra wrote: > On Thu, May 16, 2013 at 11:10:26AM -0400, Josh Boyer wrote: > > Hi All, > > > > If you boot a KVM guest on an AMD family 15h and specify -cpu host, > > you'll get the following splat: > > > > [ 0.031000] ------------[ cut here ]------------ > > [ 0.031000] WARNING: at arch/x86/kernel/cpu/perf_event_amd.c:772 > > amd_pmu_init+0x18c/0x249() > > [ 0.031000] Hardware name: Bochs > > [ 0.031000] Odd, counter constraints enabled but no core perfctrs > > detected! > > [ 0.031000] Modules linked in: > > > > [ 0.031000] Pid: 1, comm: swapper/0 Not tainted > > 3.9.0-0.rc1.git0.4.fc19.x86_64 #1 > > [ 0.031000] Call Trace: > > [ 0.031000] [] ? amd_pmu_init+0x18c/0x249 > > [ 0.031000] [] warn_slowpath_common+0x70/0xa0 > > [ 0.031000] [] ? check_bugs+0x2d/0x2d > > [ 0.031000] [] warn_slowpath_fmt+0x4c/0x50 > > [ 0.031000] [] amd_pmu_init+0x18c/0x249 > > [ 0.031000] [] init_hw_perf_events+0x34/0x428 > > [ 0.031000] [] ? check_bugs+0x2d/0x2d > > [ 0.031000] [] do_one_initcall+0x10a/0x160 > > [ 0.031000] [] kernel_init_freeable+0xcf/0x1fa > > [ 0.031000] [] ? rest_init+0x80/0x80 > > [ 0.031000] [] kernel_init+0xe/0x190 > > [ 0.031000] [] ret_from_fork+0x7c/0xb0 > > [ 0.031000] [] ? rest_init+0x80/0x80 > > [ 0.031000] ---[ end trace a1e57d3cb8668105 ]--- > > > > That seems a bit excessive, and it gets picked up by auto-reporting > > tools like ABRT as a bug. Can we remove the WARN and just use pr_err or > > something else instead? > > Robert put that in, I suppose its because the CPUID crap indicates its got perf > counters but then it doesn't actually have them. > > Clearly this is something that should be fixed in your virt thingy instead. Maybe. But do you really need to dump a stack trace here? What is a user supposed to do with that information? Can they fix the kernel? Can the fix the CPU? As far as I can tell, they can't do either. Is using pr_err with the same message really somehow worse than using WARN? josh -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/