Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10490729ybi; Thu, 25 Jul 2019 00:14:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqwo7p2qIg1z4AvqNA290nJbYf/wK/d2aVg3VDXhXfB9ddeV8kDHRbt2aF6ivAbNZCALXlVj X-Received: by 2002:a17:902:324:: with SMTP id 33mr87252039pld.340.1564038872875; Thu, 25 Jul 2019 00:14:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564038872; cv=none; d=google.com; s=arc-20160816; b=0f2oNW6KZHNIbkUjgnqZTO/69vNwLR4theFEBatpdUyKDkDFtBovi6tyqWp8vtuNYR sVmsKU56r8amkGDGvybBfgWz6owblyeXSLGuVQN2qaBzZBiyiX2MvXpYH5v6QY16EgmX 5qdBsQ524zivz6WTD79tEBLvFt/X5PVcrVixhkQTja6amZ2sPCpuVutX3cgJLXiULzV2 imP+rSdFGSGCoDVvDI1AtZmszeLP2OCoxkhotQhjY8Lzxjefg55m838sreGEDA+9fzgt 3Z6HdpgR+vUjB8ehkXYphp5DsY1mlI43Q5q23My0DYxNgWFZjC+lqiEvbgc/CODPFNw7 SWeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bXBOuy1z8GD8Yb/Y9LQgDE0G0rPwv06CvM4b2qppfaI=; b=lF5vZfugdFhRQHMH6GmwfROcdbWg7iqBBvr+MmuByDwkXXgABbFPq+FgOF/Cg8MkL/ EEaHKg5Je0PZ3HfwniJGY4NQCa25/OnkLcfh7nGNqhF8zmyg7lgLN3vefSUMTH6xejjK FpX7lClDhtV8ADXkry290GUw9jwFbG3CfCrKtkjuTkyzzNzGnbBOtecBGmJuWArM+/oP 3Su+faAhwIyPi4bx7aJTsXl3D8yquxs3guQFTEvo4SXsR1nm/O85CbMHoN6uwk64aEfK oPtPsZKdeU7sGoMWnbT94aryvd4DaVg8cpT+znSJc8UGZsMxnVP52bu/kMqfc/Mu4rsM k0/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TUERDJqG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t23si15782874plr.108.2019.07.25.00.14.18; Thu, 25 Jul 2019 00:14:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TUERDJqG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405024AbfGXT7q (ORCPT + 99 others); Wed, 24 Jul 2019 15:59:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:47176 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405017AbfGXT7o (ORCPT ); Wed, 24 Jul 2019 15:59:44 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 54855205C9; Wed, 24 Jul 2019 19:59:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563998383; bh=cD9rrDxEyc0yZkzD6bSEDLpUywUmGpNUOh7GXJ8xpX8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TUERDJqGXVAoYzfMjVYmfOllo8UBBDp1ZGcwLmr2gCyRVjaPUJ2CVYG4MN4TQ62BC 52wu7lgOTwGkzkhGmY/qWhf0kh6MgwyWt4EedgNyM9qN8cyYjaB7pHmtEOatTeBKcG BW0JsYxiikKaICVcK6R/RKzlWXkMKBQUBfISkZGs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Joe Perches , Like Xu , Paolo Bonzini Subject: [PATCH 5.1 305/371] KVM: x86/vPMU: refine kvm_pmu err msg when event creation failed Date: Wed, 24 Jul 2019 21:20:57 +0200 Message-Id: <20190724191747.164107064@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190724191724.382593077@linuxfoundation.org> References: <20190724191724.382593077@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Like Xu commit 6fc3977ccc5d3c22e851f2dce2d3ce2a0a843842 upstream. If a perf_event creation fails due to any reason of the host perf subsystem, it has no chance to log the corresponding event for guest which may cause abnormal sampling data in guest result. In debug mode, this message helps to understand the state of vPMC and we may not limit the number of occurrences but not in a spamming style. Suggested-by: Joe Perches Signed-off-by: Like Xu Cc: stable@vger.kernel.org Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/pmu.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/arch/x86/kvm/pmu.c +++ b/arch/x86/kvm/pmu.c @@ -131,8 +131,8 @@ static void pmc_reprogram_counter(struct intr ? kvm_perf_overflow_intr : kvm_perf_overflow, pmc); if (IS_ERR(event)) { - printk_once("kvm_pmu: event creation failed %ld\n", - PTR_ERR(event)); + pr_debug_ratelimited("kvm_pmu: event creation failed %ld for pmc->idx = %d\n", + PTR_ERR(event), pmc->idx); return; }