Received: by 2002:a17:90a:9103:0:0:0:0 with SMTP id k3csp11793565pjo; Thu, 2 Jan 2020 14:23:05 -0800 (PST) X-Google-Smtp-Source: APXvYqxYzh3eqhBBJh0x2mM/NihJYHWN/e/6bBrzsJ+h52knh3rxGYZ0kt2DT5MnW9k48gtm6uU5 X-Received: by 2002:a9d:5c1:: with SMTP id 59mr96024933otd.192.1578003785109; Thu, 02 Jan 2020 14:23:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578003785; cv=none; d=google.com; s=arc-20160816; b=OpbSKJmfZ3sdYRUGqgcCpd6au18EY11CTYyTGVeAIdTZueeV/YmGEa1QmTErGwWZWW dofP8I/VsfNE8tjmq5OiSVhohDlIckvLbI+qBiTfPAnZmu8e81Tr37J8XZY+bZj+TywS lQbb2C8r/Zs401kltjwGdM0Gj64uHFHXen+trYPpJSnbK4xDH68UhLHuB9+jADlB2a2h hB1WQ4A2hYLrmomNiUeugNMoHma7mWeybWBlzmMtFXd1eSEzvrrkwPLrP6GdwatOOoPW jeS/nsX9LGtC9pIyosOp3ZlSSPlcmIdZPPMqlwnYGeC1gaKK3LMvxlL5sPE5dS8NwKkY nLPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FRo941NTIm6u780XBdbCaKAf7pXdryG75b/s67c4tRc=; b=NB3Oh1zQ+547omv/0ObNrLPWZI1jP7xjNGsX1NMkMU5YzHEWhqDI9y60eMbkA2Dmc1 pKHwMRrbWPx7ndaIZTOLvoYERVkfEwr+6oDD3PHbxdZS3AE0aJLdbe5Se9c+kbNpYv/g ipaCcwrnG3gAIyo4U/ACZkkFIV19Fa5SB4F+s05b8tiEYNKYLWcQ57Bk9eOzawHerEi8 LaDbgd76n7CZKWOkVRGc0u9h0fTV2/UgerEG8GVAXG0yhCr4Q0gQGiGKRpkZBaqgrUHd 50ssIW1Uj1jVHuV/nmnJSpAs94WS9iZvjEGLWUaLo9GYVXwCALb2WeWBiYCuDpemTm7x 3znQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ASnqgG8b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 30si17362678otr.75.2020.01.02.14.22.53; Thu, 02 Jan 2020 14:23:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ASnqgG8b; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728982AbgABWVV (ORCPT + 99 others); Thu, 2 Jan 2020 17:21:21 -0500 Received: from mail.kernel.org ([198.145.29.99]:40184 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728716AbgABWVS (ORCPT ); Thu, 2 Jan 2020 17:21:18 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 52C3421D7D; Thu, 2 Jan 2020 22:21:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578003677; bh=4zcmMWZV0iXWhWZZH5zfMx3XDCHgYK6G3e1bCAa4iFc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ASnqgG8bVsCWf0iqOdJknPey4Hz9qhz9AglWBEKyptWmIgRiCs2pthBZBBfHSVkP3 rwzfRzJFfUzYSdnMoxob030upXsT6oVRgxb0d0zmsFa/RyjxTX9NSpk6BIeCFqh/2K fCqfZVXG8cP27pE0j0HiKrfO9Gd1w6BLOT6SGtN0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Richter , Vasily Gorbik , Sasha Levin Subject: [PATCH 4.19 068/114] s390/cpum_sf: Check for SDBT and SDB consistency Date: Thu, 2 Jan 2020 23:07:20 +0100 Message-Id: <20200102220035.931315472@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102220029.183913184@linuxfoundation.org> References: <20200102220029.183913184@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Richter [ Upstream commit 247f265fa502e7b17a0cb0cc330e055a36aafce4 ] Each SBDT is located at a 4KB page and contains 512 entries. Each entry of a SDBT points to a SDB, a 4KB page containing sampled data. The last entry is a link to another SDBT page. When an event is created the function sequence executed is: __hw_perf_event_init() +--> allocate_buffers() +--> realloc_sampling_buffers() +---> alloc_sample_data_block() Both functions realloc_sampling_buffers() and alloc_sample_data_block() allocate pages and the allocation can fail. This is handled correctly and all allocated pages are freed and error -ENOMEM is returned to the top calling function. Finally the event is not created. Once the event has been created, the amount of initially allocated SDBT and SDB can be too low. This is detected during measurement interrupt handling, where the amount of lost samples is calculated. If the number of lost samples is too high considering sampling frequency and already allocated SBDs, the number of SDBs is enlarged during the next execution of cpumsf_pmu_enable(). If more SBDs need to be allocated, functions realloc_sampling_buffers() +---> alloc-sample_data_block() are called to allocate more pages. Page allocation may fail and the returned error is ignored. A SDBT and SDB setup already exists. However the modified SDBTs and SDBs might end up in a situation where the first entry of an SDBT does not point to an SDB, but another SDBT, basicly an SBDT without payload. This can not be handled by the interrupt handler, where an SDBT must have at least one entry pointing to an SBD. Add a check to avoid SDBTs with out payload (SDBs) when enlarging the buffer setup. Signed-off-by: Thomas Richter Signed-off-by: Vasily Gorbik Signed-off-by: Sasha Levin --- arch/s390/kernel/perf_cpum_sf.c | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-) diff --git a/arch/s390/kernel/perf_cpum_sf.c b/arch/s390/kernel/perf_cpum_sf.c index df92c2af99b6..5c3fd9032b74 100644 --- a/arch/s390/kernel/perf_cpum_sf.c +++ b/arch/s390/kernel/perf_cpum_sf.c @@ -193,7 +193,7 @@ static int realloc_sampling_buffer(struct sf_buffer *sfb, unsigned long num_sdb, gfp_t gfp_flags) { int i, rc; - unsigned long *new, *tail; + unsigned long *new, *tail, *tail_prev = NULL; if (!sfb->sdbt || !sfb->tail) return -EINVAL; @@ -232,6 +232,7 @@ static int realloc_sampling_buffer(struct sf_buffer *sfb, sfb->num_sdbt++; /* Link current page to tail of chain */ *tail = (unsigned long)(void *) new + 1; + tail_prev = tail; tail = new; } @@ -241,10 +242,22 @@ static int realloc_sampling_buffer(struct sf_buffer *sfb, * issue, a new realloc call (if required) might succeed. */ rc = alloc_sample_data_block(tail, gfp_flags); - if (rc) + if (rc) { + /* Undo last SDBT. An SDBT with no SDB at its first + * entry but with an SDBT entry instead can not be + * handled by the interrupt handler code. + * Avoid this situation. + */ + if (tail_prev) { + sfb->num_sdbt--; + free_page((unsigned long) new); + tail = tail_prev; + } break; + } sfb->num_sdb++; tail++; + tail_prev = new = NULL; /* Allocated at least one SBD */ } /* Link sampling buffer to its origin */ -- 2.20.1