Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2006209imu; Fri, 14 Dec 2018 04:23:41 -0800 (PST) X-Google-Smtp-Source: AFSGD/VObXjnKlsssxjNNl0jszA4j1H/um1+dudA40DEG4MjLiF5Va8UWQ0s/g/otTk1V2GXpYjN X-Received: by 2002:a62:b15:: with SMTP id t21mr2765598pfi.136.1544790221109; Fri, 14 Dec 2018 04:23:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544790221; cv=none; d=google.com; s=arc-20160816; b=jMxul5aYWEHQ73ckLZEM4l+bbAMEja6JziZkrc9hQW38Qvp8mD3AanNRfzVF+tzXeR ZkogIMLMtUJnEdi5GQ8F2MXhB6rC/hhAWd4g6nXRKa6mhVZuBQvwmjwcqRBySFvw1lwL biLqVjlmbYqIdls4QePixLI4Dt6A0C6XHl0zkCN5tEQ3Pmtka/0uIlZdG9i4y4IUvEGd 5mqTza1mplrW2KZmWTjsCqUaNGk7gEHDkfElqAmFAtU21Go9MQWXVoNsuPkDRWrPFEFb 0DyQ5YrOtUGRmN+94+dlHMaMqTy8SF0XjOwsd89MrB9XxItpMKBSsHLW4k24m14SsJg6 ftxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=97wXGxPEoU0TfEeBXioDXFftC7lN6gq4O49RYY3EfUE=; b=tL8UfzTy/nMohf6FwTQYHG1p0jmJL2L52xCUDR4m1orqhA5kQmUlZH00GNVfl5s5Fn P3UpFHvXAIkI1jebyLsXbaez3fuDKmLSlvBwYam1pbp23gR1VWTfoDqaq6h0pgTPsOv0 8hdEiCoIhDgyOzv/5x6M2WHFL1iuhRasswKq1nCErr4gsuR82BXmE/mpGPKJ0OmTuf1X 6PssSNzAD27FNkwAVSPQFRSB6/Jydcjg4yehon2v7QzK+3WUL3qSYeup14sF1Zc9/4Wt VY7DiYkqa1mYSsktLf8V2BTSJ0VIVBc10Lo8Yx/CFsiIPzWRDzns1uxW17y3cT5AryjP MZhA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ojztsi5u; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b61si4051619plb.70.2018.12.14.04.23.25; Fri, 14 Dec 2018 04:23:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ojztsi5u; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732418AbeLNMOr (ORCPT + 99 others); Fri, 14 Dec 2018 07:14:47 -0500 Received: from mail.kernel.org ([198.145.29.99]:34464 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732115AbeLNMOn (ORCPT ); Fri, 14 Dec 2018 07:14:43 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9B199214F1; Fri, 14 Dec 2018 12:14:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544789682; bh=1IQWvINSnpy9bfMkDdnffb/7BKMA5vnaXxeXJU30KRk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ojztsi5u1LztZH5pOVaHW0Y4KRFo8yJLF+1aSnLruL3OpEPyeRgbXVfY9iQP4mPGU qjTYqSEp73vv93cJzoHErrv9Y6l2pM6V4/a7sRm4odhk9667PdnwzF+gF/VckN0qbh 6clEdswQZbcjFttKsX1eb6gqoA1DZNHam14Xop/Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Richter , Hendrik Brueckner , Martin Schwidefsky , Sasha Levin Subject: [PATCH 4.4 13/88] s390/cpum_cf: Reject request for sampling in event initialization Date: Fri, 14 Dec 2018 12:59:47 +0100 Message-Id: <20181214115703.242290128@linuxfoundation.org> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20181214115702.151309521@linuxfoundation.org> References: <20181214115702.151309521@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 613a41b0d16e617f46776a93b975a1eeea96417c ] On s390 command perf top fails [root@s35lp76 perf] # ./perf top -F100000 --stdio Error: cycles: PMU Hardware doesn't support sampling/overflow-interrupts. Try 'perf stat' [root@s35lp76 perf] # Using event -e rb0000 works as designed. Event rb0000 is the event number of the sampling facility for basic sampling. During system start up the following PMUs are installed in the kernel's PMU list (from head to tail): cpum_cf --> s390 PMU counter facility device driver cpum_sf --> s390 PMU sampling facility device driver uprobe kprobe tracepoint task_clock cpu_clock Perf top executes following functions and calls perf_event_open(2) system call with different parameters many times: cmd_top --> __cmd_top --> perf_evlist__add_default --> __perf_evlist__add_default --> perf_evlist__new_cycles (creates event type:0 (HW) config 0 (CPU_CYCLES) --> perf_event_attr__set_max_precise_ip Uses perf_event_open(2) to detect correct precise_ip level. Fails 3 times on s390 which is ok. Then functions cmd_top --> __cmd_top --> perf_top__start_counters -->perf_evlist__config --> perf_can_comm_exec --> perf_probe_api This functions test support for the following events: "cycles:u", "instructions:u", "cpu-clock:u" using --> perf_do_probe_api --> perf_event_open_cloexec Test the close on exec flag support with perf_event_open(2). perf_do_probe_api returns true if the event is supported. The function returns true because event cpu-clock is supported by the PMU cpu_clock. This is achieved by many calls to perf_event_open(2). Function perf_top__start_counters now calls perf_evsel__open() for every event, which is the default event cpu_cycles (config:0) and type HARDWARE (type:0) which a predfined frequence of 4000. Given the above order of the PMU list, the PMU cpum_cf gets called first and returns 0, which indicates support for this sampling. The event is fully allocated in the function perf_event_open (file kernel/event/core.c near line 10521 and the following check fails: event = perf_event_alloc(&attr, cpu, task, group_leader, NULL, NULL, NULL, cgroup_fd); if (IS_ERR(event)) { err = PTR_ERR(event); goto err_cred; } if (is_sampling_event(event)) { if (event->pmu->capabilities & PERF_PMU_CAP_NO_INTERRUPT) { err = -EOPNOTSUPP; goto err_alloc; } } The check for the interrupt capabilities fails and the system call perf_event_open() returns -EOPNOTSUPP (-95). Add a check to return -ENODEV when sampling is requested in PMU cpum_cf. This allows common kernel code in the perf_event_open() system call to test the next PMU in above list. Fixes: 97b1198fece0 (" "s390, perf: Use common PMU interrupt disabled code") Signed-off-by: Thomas Richter Reviewed-by: Hendrik Brueckner Signed-off-by: Martin Schwidefsky Signed-off-by: Sasha Levin --- arch/s390/kernel/perf_cpum_cf.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/s390/kernel/perf_cpum_cf.c b/arch/s390/kernel/perf_cpum_cf.c index 929c147e07b4..1b69bfdf59f9 100644 --- a/arch/s390/kernel/perf_cpum_cf.c +++ b/arch/s390/kernel/perf_cpum_cf.c @@ -344,6 +344,8 @@ static int __hw_perf_event_init(struct perf_event *event) break; case PERF_TYPE_HARDWARE: + if (is_sampling_event(event)) /* No sampling support */ + return -ENOENT; ev = attr->config; /* Count user space (problem-state) only */ if (!attr->exclude_user && attr->exclude_kernel) { -- 2.19.1