Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp9930491ybi; Wed, 24 Jul 2019 12:31:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqzaNK60KkhMIn1KuhKe17Qcg9R5Cf536RUsVpIh1aFt/Kk8vnCO3s6geZwH0bB7bLPLXt+5 X-Received: by 2002:aa7:9191:: with SMTP id x17mr12863422pfa.23.1563996715440; Wed, 24 Jul 2019 12:31:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563996715; cv=none; d=google.com; s=arc-20160816; b=uSnRLlzhmz9H0L9GZ4hie5CFz+TCWd26Z026WrVCfx7rDIKaqvhdHDvFhMktR47Qx6 EmiElgWfzYcOJ7Kf8Xs2t+nZ8+5bNgXV4T0pblC6bLiBT6VI4b/AVs7dqYAm/xoXHnbt fFIX09YFrwqcQvLShnoHhc1l7H0TiVDmIyTzNgpfyC88qEqb0ymoMTwXKIpKAoVxC5z2 LMOqb673g/xjpdywMmytB+jZ5VUqVFcKG8/n5Pmbqpwb8H/EN9usRfzmjby/2/F1JPcN 0GY7/8DA+pkj+SCVfNJ7VSGoLfezBIvK8qkF/EknujSAJsASRK+K+uM5t9dfTxTxfyRF y/eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bN9zJU7+4373+VKqLfMUfal6Ojg7S997y7nrTX04muk=; b=P28i+pc7Fvczdzixqoa/tNDLYueVKTRfe7HjsStVW5WSw/oyr8WrOi9XVDVRRewbvw gvB5Fb7oFRZ5lxvL/BaKEwsaD/ChL6oxAq7g/JjQ4VOwNZ30Wxj1ak+J+XXRhRaGSM1R 1EuJo7uoKK5Fi3hkA4sIJuEn0B9zTEol5B7cY+jO1XG+1ibe5NCaK4BDoSxrnWv5CITx QoKbd7d/CqzfHPCy/1Hh0WaoNDLlemUEj5OVskxrscLYEPXFoLHi3BM/EFlGWMgi16bb CDylu+UbWZRfOgSDquxgl989oJjy6ruGjisrZQ2ZL9Lo3wMsgFBvHI7lVyY+vHNDfAn1 UEIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EorSSQtb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f8si17008227pfn.43.2019.07.24.12.31.40; Wed, 24 Jul 2019 12:31:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EorSSQtb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388301AbfGXT2d (ORCPT + 99 others); Wed, 24 Jul 2019 15:28:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:46864 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388238AbfGXT2c (ORCPT ); Wed, 24 Jul 2019 15:28:32 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 67E1C20659; Wed, 24 Jul 2019 19:28:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563996510; bh=79wgBEdS+tTSwk3MNTN/5WnJD5bRp8HjE21Rnpe/NEA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EorSSQtbCBXhO9yhIrhbZ9Ms4Q0KxDARW6HWacBDViWYhrVNa+5RPbzJHS8g0ksSJ V1him3ZyZkup03B1xvcxIYdiG5Z9SBRXltopVgP2oMG0eJQhGUdKc/RBaHdcA2T0by GSOSpekaJeyrRWj8qvxUfSv3/RoYq7IE7l10aMPw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Richter , Hendrik Brueckner , Heiko Carstens , Hendrik Brueckner , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 5.2 081/413] perf report: Fix OOM error in TUI mode on s390 Date: Wed, 24 Jul 2019 21:16:12 +0200 Message-Id: <20190724191740.910760822@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190724191735.096702571@linuxfoundation.org> References: <20190724191735.096702571@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 8a07aa4e9b7b0222129c07afff81634a884b2866 ] Debugging a OOM error using the TUI interface revealed this issue on s390: [tmricht@m83lp54 perf]$ cat /proc/kallsyms |sort .... 00000001119b7158 B radix_tree_node_cachep 00000001119b8000 B __bss_stop 00000001119b8000 B _end 000003ff80002850 t autofs_mount [autofs4] 000003ff80002868 t autofs_show_options [autofs4] 000003ff80002a98 t autofs_evict_inode [autofs4] .... There is a huge gap between the last kernel symbol __bss_stop/_end and the first kernel module symbol autofs_mount (from autofs4 module). After reading the kernel symbol table via functions: dso__load() +--> dso__load_kernel_sym() +--> dso__load_kallsyms() +--> __dso_load_kallsyms() +--> symbols__fixup_end() the symbol __bss_stop has a start address of 1119b8000 and an end address of 3ff80002850, as can be seen by this debug statement: symbols__fixup_end __bss_stop start:0x1119b8000 end:0x3ff80002850 The size of symbol __bss_stop is 0x3fe6e64a850 bytes! It is the last kernel symbol and fills up the space until the first kernel module symbol. This size kills the TUI interface when executing the following code: process_sample_event() hist_entry_iter__add() hist_iter__report_callback() hist_entry__inc_addr_samples() symbol__inc_addr_samples(symbol = __bss_stop) symbol__cycles_hist() annotated_source__alloc_histograms(..., symbol__size(sym), ...) This function allocates memory to save sample histograms. The symbol_size() marco is defined as sym->end - sym->start, which results in above value of 0x3fe6e64a850 bytes and the call to calloc() in annotated_source__alloc_histograms() fails. The histgram memory allocation might fail, make this failure no-fatal and continue processing. Output before: [tmricht@m83lp54 perf]$ ./perf --debug stderr=1 report -vvvvv \ -i ~/slow.data 2>/tmp/2 [tmricht@m83lp54 perf]$ tail -5 /tmp/2 __symbol__inc_addr_samples(875): ENOMEM! sym->name=__bss_stop, start=0x1119b8000, addr=0x2aa0005eb08, end=0x3ff80002850, func: 0 problem adding hist entry, skipping event 0x938b8 [0x8]: failed to process type: 68 [Cannot allocate memory] [tmricht@m83lp54 perf]$ Output after: [tmricht@m83lp54 perf]$ ./perf --debug stderr=1 report -vvvvv \ -i ~/slow.data 2>/tmp/2 [tmricht@m83lp54 perf]$ tail -5 /tmp/2 symbol__inc_addr_samples map:0x1597830 start:0x110730000 end:0x3ff80002850 symbol__hists notes->src:0x2aa2a70 nr_hists:1 symbol__inc_addr_samples sym:unlink_anon_vmas src:0x2aa2a70 __symbol__inc_addr_samples: addr=0x11094c69e 0x11094c670 unlink_anon_vmas: period++ [addr: 0x11094c69e, 0x2e, evidx=0] => nr_samples: 1, period: 526008 [tmricht@m83lp54 perf]$ There is no error about failed memory allocation and the TUI interface shows all entries. Signed-off-by: Thomas Richter Reviewed-by: Hendrik Brueckner Cc: Heiko Carstens Cc: Hendrik Brueckner Link: http://lkml.kernel.org/r/90cb5607-3e12-5167-682d-978eba7dafa8@linux.ibm.com Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/util/annotate.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/tools/perf/util/annotate.c b/tools/perf/util/annotate.c index 79db038b56f2..c8ce13419d9b 100644 --- a/tools/perf/util/annotate.c +++ b/tools/perf/util/annotate.c @@ -931,9 +931,8 @@ static int symbol__inc_addr_samples(struct symbol *sym, struct map *map, if (sym == NULL) return 0; src = symbol__hists(sym, evsel->evlist->nr_entries); - if (src == NULL) - return -ENOMEM; - return __symbol__inc_addr_samples(sym, map, src, evsel->idx, addr, sample); + return (src) ? __symbol__inc_addr_samples(sym, map, src, evsel->idx, + addr, sample) : 0; } static int symbol__account_cycles(u64 addr, u64 start, -- 2.20.1