Received: by 2002:a17:90a:9103:0:0:0:0 with SMTP id k3csp11788656pjo; Thu, 2 Jan 2020 14:17:58 -0800 (PST) X-Google-Smtp-Source: APXvYqzy5Dq8Uy7WEs8UJbibKqL6cgbgiyd4XDYk5hddMVfWIGJSk/WqMaQspuaMmkyRCUcTues2 X-Received: by 2002:a9d:5784:: with SMTP id q4mr39476310oth.278.1578003478705; Thu, 02 Jan 2020 14:17:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578003478; cv=none; d=google.com; s=arc-20160816; b=d6wPcVOwaBrffULARkRS9XrQbRFG2nBfhRuVZxTOoFhdDgmsrA/Mf9gtgcJpKE7VCf FnsYD2oXAec5VASh2GAHIGf/qq786rmKtfMcc383HxRxxM6BKNa8BU3D+Z1JgAnNrVnL ixq/VIzkl0BOq/9UM/qEjS9WNFCbzWQRlgnIw1HqKhzOsHmYZ38R3a62w76NVYoiVGgj CyoevSLxoBwwn63ZDWvE9yR6G9aQ17IotCC6rJ0zNr35n7kXJPQfjWoc63hT11IfI9dH hCWtqnbv7VdMwh/2VLTA0+66db4cJSIGz3jESMPb9VMYOVTECjRHudODLJzUkVWxClVY ChHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jwLIMdRf97O+BijW3QtDrP/LVYCff2ZZXOOs/61Bq10=; b=rgXc0Oi0ylGJrhCkVEQQUur1fPKAVW6NKzrKXFuC2F9/gomDH4BzKFSLW1BCQWLww0 lYnijbchaSMxCxbAV+F8mhA4fxL21pcyWSUsKJTFVldWyP+oC5DNxc8EDHPrZdKO7hpz Z9va6GmMbaYMItDIRGF8dvPhMDqSmR8C6orzVANDCH1u44WjZe0wBs0he1zLTDnQCixe 99miUuQ+ySqSmBDh7h3DxuByzlLp1GVWkkpXMHmw8Bg/6MKrxUHuHfhwvS/Q0Rd7q0jA yj0wptAURgYjT6CNABd1fLFPb2lH1B06tc0h2255XpeciEjYUWnYOr2FB8iFhwKqskL7 uIEw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gz/5AuY8"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n139si27833053oig.121.2020.01.02.14.17.46; Thu, 02 Jan 2020 14:17:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gz/5AuY8"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727984AbgABWQy (ORCPT + 99 others); Thu, 2 Jan 2020 17:16:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:58912 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728295AbgABWQr (ORCPT ); Thu, 2 Jan 2020 17:16:47 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 066C821582; Thu, 2 Jan 2020 22:16:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578003406; bh=Birul+HGvSsfkaIIXrZqrmLjg6SzRxqyua3TaeNW7JA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gz/5AuY8wHxvtHs5s5C2qj96K1k1UWFnum25kcZxplk2u4F6/hojinNrtCdUwHLBy 6UQHUzMqmPOrWbJjLkRjbNZJoa+zB5p9elcF4YG+6nArjno+RCyjRE41S7HxltngSp OYxWQ/V56yiZjJyK/1aCoBg+FGtfqptt/yvw6YO4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Richter , Vasily Gorbik , Sasha Levin Subject: [PATCH 5.4 122/191] s390/cpum_sf: Check for SDBT and SDB consistency Date: Thu, 2 Jan 2020 23:06:44 +0100 Message-Id: <20200102215842.877737784@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102215829.911231638@linuxfoundation.org> References: <20200102215829.911231638@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Richter [ Upstream commit 247f265fa502e7b17a0cb0cc330e055a36aafce4 ] Each SBDT is located at a 4KB page and contains 512 entries. Each entry of a SDBT points to a SDB, a 4KB page containing sampled data. The last entry is a link to another SDBT page. When an event is created the function sequence executed is: __hw_perf_event_init() +--> allocate_buffers() +--> realloc_sampling_buffers() +---> alloc_sample_data_block() Both functions realloc_sampling_buffers() and alloc_sample_data_block() allocate pages and the allocation can fail. This is handled correctly and all allocated pages are freed and error -ENOMEM is returned to the top calling function. Finally the event is not created. Once the event has been created, the amount of initially allocated SDBT and SDB can be too low. This is detected during measurement interrupt handling, where the amount of lost samples is calculated. If the number of lost samples is too high considering sampling frequency and already allocated SBDs, the number of SDBs is enlarged during the next execution of cpumsf_pmu_enable(). If more SBDs need to be allocated, functions realloc_sampling_buffers() +---> alloc-sample_data_block() are called to allocate more pages. Page allocation may fail and the returned error is ignored. A SDBT and SDB setup already exists. However the modified SDBTs and SDBs might end up in a situation where the first entry of an SDBT does not point to an SDB, but another SDBT, basicly an SBDT without payload. This can not be handled by the interrupt handler, where an SDBT must have at least one entry pointing to an SBD. Add a check to avoid SDBTs with out payload (SDBs) when enlarging the buffer setup. Signed-off-by: Thomas Richter Signed-off-by: Vasily Gorbik Signed-off-by: Sasha Levin --- arch/s390/kernel/perf_cpum_sf.c | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-) diff --git a/arch/s390/kernel/perf_cpum_sf.c b/arch/s390/kernel/perf_cpum_sf.c index 3d8b12a9a6ff..7511b71d2931 100644 --- a/arch/s390/kernel/perf_cpum_sf.c +++ b/arch/s390/kernel/perf_cpum_sf.c @@ -193,7 +193,7 @@ static int realloc_sampling_buffer(struct sf_buffer *sfb, unsigned long num_sdb, gfp_t gfp_flags) { int i, rc; - unsigned long *new, *tail; + unsigned long *new, *tail, *tail_prev = NULL; if (!sfb->sdbt || !sfb->tail) return -EINVAL; @@ -232,6 +232,7 @@ static int realloc_sampling_buffer(struct sf_buffer *sfb, sfb->num_sdbt++; /* Link current page to tail of chain */ *tail = (unsigned long)(void *) new + 1; + tail_prev = tail; tail = new; } @@ -241,10 +242,22 @@ static int realloc_sampling_buffer(struct sf_buffer *sfb, * issue, a new realloc call (if required) might succeed. */ rc = alloc_sample_data_block(tail, gfp_flags); - if (rc) + if (rc) { + /* Undo last SDBT. An SDBT with no SDB at its first + * entry but with an SDBT entry instead can not be + * handled by the interrupt handler code. + * Avoid this situation. + */ + if (tail_prev) { + sfb->num_sdbt--; + free_page((unsigned long) new); + tail = tail_prev; + } break; + } sfb->num_sdb++; tail++; + tail_prev = new = NULL; /* Allocated at least one SBD */ } /* Link sampling buffer to its origin */ -- 2.20.1