Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1984428imu; Fri, 14 Dec 2018 04:05:18 -0800 (PST) X-Google-Smtp-Source: AFSGD/WF6IS1fh9K8PvQtk/WCZ5leaeDfSOYn2ANhH+FBH5ERaGrc9knlQDIDAR5HrtEbQzXwXa+ X-Received: by 2002:a62:4e83:: with SMTP id c125mr2585499pfb.101.1544789117998; Fri, 14 Dec 2018 04:05:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544789117; cv=none; d=google.com; s=arc-20160816; b=g1aWsr76SfVYpbd881PdH37zW8SUqeTxx0VTeRoWQCrsDRUeg67YQuxH4YI4jbaiPt vO/ileY/KbSXTVOQ4OvgmcJrhmj0g/2JKcElsUJ6MfxWwQde1haR4V99xwAk2Uz+UXLA xtraPG+syJRtXqGR5m6jPdjrV0PndE2HHI2b+jWvbPSyGdj0apPXoZxIYTixU2/m/1Ii ns3/ErRaOpGMG23pbR10PxEXxCH6KzO1sPHm/GJJ8nrVZeuQi/pmf4Nx3Nbkc/vj73Y4 BDZDk6+hkajH6I+pNmJOcoCRHb00MFWY7nzYXHe9zyuhjw1yYQ7vf56QShWy0GqpBqmA h/fw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JPODjduXVtn23LS+Iu+Mpl9DLKcdxKfxD0pW1o/dFBY=; b=kt/Kt1+NqnYRJimalEGZvv6dap074iga29MXQGs5avv5hUfg333eaXZk9jnLNpHaBV aYEni5m6uQEEfcKJ7DVvaeVOzi3FNNOdx1iu2iTacwdPFrYVGysLD0J1UXz7kjPQgYIM qnxrC9X83/zAb58JkljtfApjWOlp7mQ6wkPkaT3yt1n3pSujbTlFrfzaloCoYbFjGWnf oALVUmSccJQpWlLyNqmsUi7Kfhm9caLE0Ujfi1cuAvKCgKNlPgUsOj+Hto1SqimaysdQ GIenGCDrfyW30HBvOmT54DP+5jV8H6Yk2Ji/bpK/pZrHNiofvAAa/QzY9p3AjE94YGdk l5qA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cAzYYWXd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x23si3842930pgk.272.2018.12.14.04.05.02; Fri, 14 Dec 2018 04:05:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cAzYYWXd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730263AbeLNMDO (ORCPT + 99 others); Fri, 14 Dec 2018 07:03:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:46528 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729783AbeLNMDM (ORCPT ); Fri, 14 Dec 2018 07:03:12 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F2D052146E; Fri, 14 Dec 2018 12:03:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544788991; bh=LOashIrlZsoct0ocmmwsyW66vpJghMvW7gXI0yKha60=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cAzYYWXdjgd7usEe0QX/kRD3Te4nFUQvSV6EsNj/VlI5N6fjWTVQI7AFSZEKxRumX zAo7T574Xlom4OjwCsZLmAQOqPsg9mhlxfxL5MlK+HFHBuvpmXlkg9vX+CLLWIePUO MS379LTsi3nglCHtpsGPjv4a6LGOTMhl3uJqDHP8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Richter , Hendrik Brueckner , Martin Schwidefsky , Sasha Levin Subject: [PATCH 4.19 052/142] s390/cpum_cf: Reject request for sampling in event initialization Date: Fri, 14 Dec 2018 12:58:57 +0100 Message-Id: <20181214115749.142962601@linuxfoundation.org> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20181214115747.053633987@linuxfoundation.org> References: <20181214115747.053633987@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 613a41b0d16e617f46776a93b975a1eeea96417c ] On s390 command perf top fails [root@s35lp76 perf] # ./perf top -F100000 --stdio Error: cycles: PMU Hardware doesn't support sampling/overflow-interrupts. Try 'perf stat' [root@s35lp76 perf] # Using event -e rb0000 works as designed. Event rb0000 is the event number of the sampling facility for basic sampling. During system start up the following PMUs are installed in the kernel's PMU list (from head to tail): cpum_cf --> s390 PMU counter facility device driver cpum_sf --> s390 PMU sampling facility device driver uprobe kprobe tracepoint task_clock cpu_clock Perf top executes following functions and calls perf_event_open(2) system call with different parameters many times: cmd_top --> __cmd_top --> perf_evlist__add_default --> __perf_evlist__add_default --> perf_evlist__new_cycles (creates event type:0 (HW) config 0 (CPU_CYCLES) --> perf_event_attr__set_max_precise_ip Uses perf_event_open(2) to detect correct precise_ip level. Fails 3 times on s390 which is ok. Then functions cmd_top --> __cmd_top --> perf_top__start_counters -->perf_evlist__config --> perf_can_comm_exec --> perf_probe_api This functions test support for the following events: "cycles:u", "instructions:u", "cpu-clock:u" using --> perf_do_probe_api --> perf_event_open_cloexec Test the close on exec flag support with perf_event_open(2). perf_do_probe_api returns true if the event is supported. The function returns true because event cpu-clock is supported by the PMU cpu_clock. This is achieved by many calls to perf_event_open(2). Function perf_top__start_counters now calls perf_evsel__open() for every event, which is the default event cpu_cycles (config:0) and type HARDWARE (type:0) which a predfined frequence of 4000. Given the above order of the PMU list, the PMU cpum_cf gets called first and returns 0, which indicates support for this sampling. The event is fully allocated in the function perf_event_open (file kernel/event/core.c near line 10521 and the following check fails: event = perf_event_alloc(&attr, cpu, task, group_leader, NULL, NULL, NULL, cgroup_fd); if (IS_ERR(event)) { err = PTR_ERR(event); goto err_cred; } if (is_sampling_event(event)) { if (event->pmu->capabilities & PERF_PMU_CAP_NO_INTERRUPT) { err = -EOPNOTSUPP; goto err_alloc; } } The check for the interrupt capabilities fails and the system call perf_event_open() returns -EOPNOTSUPP (-95). Add a check to return -ENODEV when sampling is requested in PMU cpum_cf. This allows common kernel code in the perf_event_open() system call to test the next PMU in above list. Fixes: 97b1198fece0 (" "s390, perf: Use common PMU interrupt disabled code") Signed-off-by: Thomas Richter Reviewed-by: Hendrik Brueckner Signed-off-by: Martin Schwidefsky Signed-off-by: Sasha Levin --- arch/s390/kernel/perf_cpum_cf.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/s390/kernel/perf_cpum_cf.c b/arch/s390/kernel/perf_cpum_cf.c index 74091fd3101e..d5523adeddbf 100644 --- a/arch/s390/kernel/perf_cpum_cf.c +++ b/arch/s390/kernel/perf_cpum_cf.c @@ -346,6 +346,8 @@ static int __hw_perf_event_init(struct perf_event *event) break; case PERF_TYPE_HARDWARE: + if (is_sampling_event(event)) /* No sampling support */ + return -ENOENT; ev = attr->config; /* Count user space (problem-state) only */ if (!attr->exclude_user && attr->exclude_kernel) { -- 2.19.1