Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2400561imu; Thu, 24 Jan 2019 12:07:08 -0800 (PST) X-Google-Smtp-Source: ALg8bN66Rd0v3QV1tw7yUKLZUGJbDwOCK9c4tGRAfne16uWDEraizrSUlNHQ2vkut6G34b/XgmgP X-Received: by 2002:a62:9fd9:: with SMTP id v86mr7855944pfk.191.1548360428404; Thu, 24 Jan 2019 12:07:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548360428; cv=none; d=google.com; s=arc-20160816; b=S9nNeLYUbEuovPKU3PwkivVOBU0ONZjWNLufIrRVu6dSmi/y94CTu6ZtQSeHffKWf2 yx7GmhlpsbdYfoMZuP3iH9X78Jw04h9HBDQ0SxUdIyZU4LJZr1yXjZl2ThS5MDUBUyFY X/l/X1dfZSgFkEI9g26CDQawRw7/ulTle2Q0lcNPzafCJPNsWC70hmqgLWdEpxmN8kG4 m/pT1+aSie1DRfv5CZtMwrtEiihYWkezwnxhN7hnTwFvkvGIW0WxuxzAMH5jcvItKdTX 8ZOdVV9OUIj87U02yhenGV8k7xIO5acBTEWWShui5h9vDI2lbGTiPm55H9H5gQQRMEva yJ2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6XAvsnkJOlqqkT+VsnnqtmxROmCqJ4wO4fr2K3MqMJs=; b=p4mYh9o0kuHmrSnbswCpZnCydLX3M3wiW9orL1lz0EDnDpazbCHmoWz2Pf5nqpvgs6 u6aA/cwWkszkZRMson/ZaWO3NRi8SHZIWMB0EP+3evGxT/f2wdUPLf7lfdjKfTfe1uev VUGg6A8wpouDC7YcNSPe+mvwJ9d/1q1lJWsZR/hYmzclgszxjeu9AMFP5TiwyEPnG0LV qrrn4WNDiCH1aFU40VAF8649r8ZUQrlVI3xFiRBpLSgFYYQLbjpcD7yU4WfkIh9ofEUJ ry2mAW+1R8X+XhPvlyHQhDLrzMccP0eJbIv9cJSe40t2OyIeirUEOkrrNJh1DcpiL2b7 fnPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=x4QjEgNa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e11si22553796pls.71.2019.01.24.12.06.52; Thu, 24 Jan 2019 12:07:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=x4QjEgNa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730833AbfAXTbG (ORCPT + 99 others); Thu, 24 Jan 2019 14:31:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:58718 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731534AbfAXTbE (ORCPT ); Thu, 24 Jan 2019 14:31:04 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D2B45218D4; Thu, 24 Jan 2019 19:31:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548358263; bh=z2ZTAsY7eD2FQVDeA3++R1GdAEsJNaDlF2i7MjRi+ls=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=x4QjEgNaWP2wu6tx6vgfeeWpOVsH1hI5dECyJWkYcI7TUr6aYNuEV+hTsiodqdvZ0 jWO6KKAWVUY7F55BqylWWyC0cHKclTx8XqUwUNTq8Yt0d5NKwDCDu2H2/6fYfrfdFI AaHKU1QjhZKw8NCtPc3DTvCrEDJxuDr1vVoneYcU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Richard Cochran , Miroslav Lichvar , Jacob Keller , Aaron Brown , Jeff Kirsher , Sasha Levin Subject: [PATCH 4.14 11/63] e1000e: allow non-monotonic SYSTIM readings Date: Thu, 24 Jan 2019 20:20:00 +0100 Message-Id: <20190124190156.297840714@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190124190155.176570028@linuxfoundation.org> References: <20190124190155.176570028@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit e1f65b0d70e9e5c80e15105cd96fa00174d7c436 ] It seems with some NICs supported by the e1000e driver a SYSTIM reading may occasionally be few microseconds before the previous reading and if enabled also pass e1000e_sanitize_systim() without reaching the maximum number of rereads, even if the function is modified to check three consecutive readings (i.e. it doesn't look like a double read error). This causes an underflow in the timecounter and the PHC time jumps hours ahead. This was observed on 82574, I217 and I219. The fastest way to reproduce it is to run a program that continuously calls the PTP_SYS_OFFSET ioctl on the PHC. Modify e1000e_phc_gettime() to use timecounter_cyc2time() instead of timecounter_read() in order to allow non-monotonic SYSTIM readings and prevent the PHC from jumping. Cc: Richard Cochran Signed-off-by: Miroslav Lichvar Acked-by: Jacob Keller Tested-by: Aaron Brown Signed-off-by: Jeff Kirsher Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/e1000e/ptp.c | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/drivers/net/ethernet/intel/e1000e/ptp.c b/drivers/net/ethernet/intel/e1000e/ptp.c index b366885487a8..cd16b70a4e70 100644 --- a/drivers/net/ethernet/intel/e1000e/ptp.c +++ b/drivers/net/ethernet/intel/e1000e/ptp.c @@ -191,10 +191,14 @@ static int e1000e_phc_gettime(struct ptp_clock_info *ptp, struct timespec64 *ts) struct e1000_adapter *adapter = container_of(ptp, struct e1000_adapter, ptp_clock_info); unsigned long flags; - u64 ns; + u64 cycles, ns; spin_lock_irqsave(&adapter->systim_lock, flags); - ns = timecounter_read(&adapter->tc); + + /* Use timecounter_cyc2time() to allow non-monotonic SYSTIM readings */ + cycles = adapter->cc.read(&adapter->cc); + ns = timecounter_cyc2time(&adapter->tc, cycles); + spin_unlock_irqrestore(&adapter->systim_lock, flags); *ts = ns_to_timespec64(ns); @@ -250,9 +254,12 @@ static void e1000e_systim_overflow_work(struct work_struct *work) systim_overflow_work.work); struct e1000_hw *hw = &adapter->hw; struct timespec64 ts; + u64 ns; - adapter->ptp_clock_info.gettime64(&adapter->ptp_clock_info, &ts); + /* Update the timecounter */ + ns = timecounter_read(&adapter->tc); + ts = ns_to_timespec64(ns); e_dbg("SYSTIM overflow check at %lld.%09lu\n", (long long) ts.tv_sec, ts.tv_nsec); -- 2.19.1