Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp9938205ybi; Wed, 24 Jul 2019 12:40:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqy/Gp/Pq2iCSSSGQ+wR4570n23r9jucL7PAcXSW2jLcoexlyDHsrT9Kd2qjB7H6XZ5ebrnj X-Received: by 2002:a17:902:583:: with SMTP id f3mr86933022plf.137.1563997231271; Wed, 24 Jul 2019 12:40:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563997231; cv=none; d=google.com; s=arc-20160816; b=0as0O/VmuP5tOL+OSjvNyV8JNmNuSgyH7koA/PVuyRO8fm6eY/GEja/UcS45s3yMmo DuEzI5HWNfqM8eZdwg2YTNtinaaLZ70OZMBBrDWi+l6G3jr19NS2EujlJPChss336srJ ijGiTZcgGaTrTQkfijwcbYnwTohYM0u1MWdvPz+S5Zj2SSxUAx+aM1/zjUOYhfWT+v4p gLPpiwZvVKkhoUBQWrsNLLhJ0+N4dOdech2bxs0dudQM2QrBBrDwIIb5zncscMzp1PPx RUJlM0ZEILrMxdPhQJaQQtQMjS3aa3pFJR6LL02MAz5Q7qxL9w3AgkqyZMmLdc3BhcDW +8wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZSRYAPOtGspM/br13RpmpWKraWJ7HP9U1SjMd6s45Z0=; b=Ablmw+Cl3sd/ana8cWC5543SiLRJdlKIg2gj+OHcN8tyhWdYxHwN4BXiXBb1wXB7He 6Rb9s7KbqJft5IAYKr8kgUbcdJRF4kDrsPrRLW2FtMfJpbC73XKDtAUIrNdpKgywKExO oKMFrus/zvn9AXmnBmtNUiT0h/pDR65YT0IgCD3rze/m9FeQQFEnCkCQ4H8TNqQis9Ai TgvAlutKxgHq/YX0USQnR9SmGhS/+9kkTJSwmBJk0qa/4MpK7XJ9t8KJA/ZyQ3vWQnbK XNSeGuZII42rzDT15MPFeScEtOYUpZRRXemwXNGo103vTesUx08aPJDEf2XcCOHwra9e /WaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XDuzIWgP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f10si14463407pjw.89.2019.07.24.12.40.16; Wed, 24 Jul 2019 12:40:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XDuzIWgP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389869AbfGXTjJ (ORCPT + 99 others); Wed, 24 Jul 2019 15:39:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:40076 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389063AbfGXTjH (ORCPT ); Wed, 24 Jul 2019 15:39:07 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D570E20665; Wed, 24 Jul 2019 19:39:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563997147; bh=Bn01p6f4dJ+UG76o1+0Rtg6qiDDghmkM6c0UTczyLIM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XDuzIWgPPkNoG61Vg/e5pVzLihpTtJI2kqGNpcRcGoUtFAHCclG908X4UW4mOIvxi qW9/jEqsNY+eej4YE/JN91xqGc93903JaKndef4US2sgNEs3GzBTHuL+op5aI4WGqk gFvjAszAhhINRbca/AKi89ZG9mcASESEs+bH5/4w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Joe Perches , Like Xu , Paolo Bonzini Subject: [PATCH 5.2 335/413] KVM: x86/vPMU: refine kvm_pmu err msg when event creation failed Date: Wed, 24 Jul 2019 21:20:26 +0200 Message-Id: <20190724191759.797865671@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190724191735.096702571@linuxfoundation.org> References: <20190724191735.096702571@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Like Xu commit 6fc3977ccc5d3c22e851f2dce2d3ce2a0a843842 upstream. If a perf_event creation fails due to any reason of the host perf subsystem, it has no chance to log the corresponding event for guest which may cause abnormal sampling data in guest result. In debug mode, this message helps to understand the state of vPMC and we may not limit the number of occurrences but not in a spamming style. Suggested-by: Joe Perches Signed-off-by: Like Xu Cc: stable@vger.kernel.org Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/pmu.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/arch/x86/kvm/pmu.c +++ b/arch/x86/kvm/pmu.c @@ -128,8 +128,8 @@ static void pmc_reprogram_counter(struct intr ? kvm_perf_overflow_intr : kvm_perf_overflow, pmc); if (IS_ERR(event)) { - printk_once("kvm_pmu: event creation failed %ld\n", - PTR_ERR(event)); + pr_debug_ratelimited("kvm_pmu: event creation failed %ld for pmc->idx = %d\n", + PTR_ERR(event), pmc->idx); return; }