Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp9587001ybi; Wed, 24 Jul 2019 06:41:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqwqvXF8IL5uv9kdI6spMFybYz+awX385ol7dNiW/6TlOImBkFXzKoielAETFUtOgoXtMHq7 X-Received: by 2002:aa7:93a5:: with SMTP id x5mr11231468pff.87.1563975666915; Wed, 24 Jul 2019 06:41:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563975666; cv=none; d=google.com; s=arc-20160816; b=0LwDWd8ug24Xb0PClJCQDk9PpWvGDb8XX2AQRUYH8NXr48IeIJa9uC/0DOBalTta5J 73jiaST64v45a5onqo32pSXHgmNNxmhM2of9Qnj9ZdMznCyfPrmu/oZN5ot9yRj9fBhT M8jtItAYcikUtGfVccZoqnpej4EdJhdnp3uq82Qejy/AzOKsiOBxh3d7JR6+QjX5dT/N PtaypteSxrjs+q3o/USkPtkOhJZ//iz4ZjPMdcLmCIC122tET9vCXw9k98m9DGzLSPek PNpCSK8UdZRZa6bUjqCQ2kpqTu5pJ0tMh3nicgKfOmDKW3VWimxAej2m+UPtN8t2mue2 eodw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=V3TBK/T0Eb1hy41FM96HW0kJc++IN0n+5uCb475WYeA=; b=IHmbKszxHCazM5+dVurgCkJj0Kcy1FVan2WUxro4VNwdbUe5SwlrfX8G4B99wLyk1l Q4rT6pkDkFPcWnf32Ez01nNRrahk/6O5TH0xw1u3f29tLy1st8qtdeAVWLwH0KP+Xra9 9blexbHUz8lsnxVuyP+s4z4fNSgcyX0EYXgIkC+Y75Z4rG5Ygmvxemdm7vf+RHYFp1py YPEVUM6UwqURF5sQsI8yWu3TCt4ZOjL39eldGmVqG8T5rCllMGUQoYwsf/+YJF1EL+0X fxZV50hBRcE/DB8IPDqhmwHukeVVZ15Uz4Qt2/xu61r9PtBUDUGsLjLE7ldf5As/VXPE +oKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cf16si13046452plb.346.2019.07.24.06.40.51; Wed, 24 Jul 2019 06:41:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727037AbfGXMx2 (ORCPT + 99 others); Wed, 24 Jul 2019 08:53:28 -0400 Received: from inva021.nxp.com ([92.121.34.21]:38614 "EHLO inva021.nxp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725776AbfGXMx2 (ORCPT ); Wed, 24 Jul 2019 08:53:28 -0400 Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id C139F200254; Wed, 24 Jul 2019 14:53:25 +0200 (CEST) Received: from inva024.eu-rdc02.nxp.com (inva024.eu-rdc02.nxp.com [134.27.226.22]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id B2DDD200214; Wed, 24 Jul 2019 14:53:25 +0200 (CEST) Received: from fsr-ub1864-112.ea.freescale.net (fsr-ub1864-112.ea.freescale.net [10.171.82.98]) by inva024.eu-rdc02.nxp.com (Postfix) with ESMTP id 0857B205EE; Wed, 24 Jul 2019 14:53:24 +0200 (CEST) From: Leonard Crestez To: Will Deacon , Mark Rutland , Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo Cc: Alexander Shishkin , Jiri Olsa , Namhyung Kim , linux-kernel@vger.kernel.org, Frank Li Subject: [PATCH] perf/core: Fix creating kernel counters for PMUs that override event->cpu Date: Wed, 24 Jul 2019 15:53:24 +0300 Message-Id: X-Mailer: git-send-email 2.17.1 X-Virus-Scanned: ClamAV using ClamSMTP Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Some hardware PMU drivers will override perf_event.cpu inside their event_init callback. This causes a lockdep splat when initialized through the kernel API: WARNING: CPU: 0 PID: 250 at kernel/events/core.c:2917 ctx_sched_out+0x78/0x208 CPU: 0 PID: 250 Comm: systemd-udevd Not tainted 5.3.0-rc1-next-20190723-00024-g94e04593c88a #80 Hardware name: FSL i.MX8MM EVK board (DT) pstate: 40000085 (nZcv daIf -PAN -UAO) pc : ctx_sched_out+0x78/0x208 lr : ctx_sched_out+0x78/0x208 sp : ffff0000127a3750 x29: ffff0000127a3750 x28: 0000000000000000 x27: ffff00001162bf20 x26: ffff000008cf3310 x25: ffff0000127a3de0 x24: ffff0000115ff808 x23: ffff7dffbff851b8 x22: 0000000000000004 x21: ffff7dffbff851b0 x20: 0000000000000000 x19: ffff7dffbffc51b0 x18: 0000000000000010 x17: 0000000000000001 x16: 0000000000000007 x15: 2e8ba2e8ba2e8ba3 x14: 0000000000005114 x13: ffff0000117d5e30 x12: ffff000011898378 x11: 0000000000000000 x10: ffff0000117d5000 x9 : 0000000000000045 x8 : 0000000000000000 x7 : ffff000010168194 x6 : ffff0000117d59d0 x5 : 0000000000000001 x4 : ffff80007db56128 x3 : ffff80007db56128 x2 : 0d9c118347a77600 x1 : 0000000000000000 x0 : 0000000000000024 Call trace: ctx_sched_out+0x78/0x208 __perf_install_in_context+0x160/0x248 remote_function+0x58/0x68 generic_exec_single+0x100/0x180 smp_call_function_single+0x174/0x1b8 perf_install_in_context+0x178/0x188 perf_event_create_kernel_counter+0x118/0x160 Fix by calling perf_install_in_context with event->cpu, just like perf_event_open Signed-off-by: Leonard Crestez --- I don't understand why PMUs outside the core are bound to a CPU anyway, all this patch does is attempt to satisfy the assumptions made by __perf_install_in_context and ctx_sched_out at init time so that lockdep no longer complains. ctx_sched_out asserts ctx->lock which seems to be taken by __perf_install_in_context: struct perf_event_context *ctx = event->ctx; struct perf_cpu_context *cpuctx = __get_cpu_context(ctx); ... raw_spin_lock(&cpuctx->ctx.lock); The lockdep warning happens when ctx != &cpuctx->ctx which can happen if __perf_install_in_context is called on a cpu other than event->cpu. Found while working on this patch: https://patchwork.kernel.org/patch/11056785/ kernel/events/core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/events/core.c b/kernel/events/core.c index 026a14541a38..0463c1151bae 100644 --- a/kernel/events/core.c +++ b/kernel/events/core.c @@ -11272,11 +11272,11 @@ perf_event_create_kernel_counter(struct perf_event_attr *attr, int cpu, if (!exclusive_event_installable(event, ctx)) { err = -EBUSY; goto err_unlock; } - perf_install_in_context(ctx, event, cpu); + perf_install_in_context(ctx, event, event->cpu); perf_unpin_context(ctx); mutex_unlock(&ctx->mutex); return event; -- 2.17.1