Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp2074265ybp; Thu, 10 Oct 2019 01:43:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqziso0TE7P3mXO7Z7inRv66/MVHEmLVKOPiX1kvYo1JEEHJ896PGsiB/BZ12SCxpKjsgajD X-Received: by 2002:a17:906:309b:: with SMTP id 27mr6860382ejv.243.1570696992967; Thu, 10 Oct 2019 01:43:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570696992; cv=none; d=google.com; s=arc-20160816; b=WpKHlyfLyr+A6pkZNWqWxgVy4tLK3eaODzz10879Rif5odBOG0DIXiM6V7qqYKPm+f 02FQfmg87otwHU4891Ffy8hldLKFDlfygut7YsTYZFAJ8GM8SVTWedhrVgve0vH2SzoO 98h1E9ONRvTAFmlg+S8etOrfzSU9WiNAbZ46ATcqEc7yrwnPLn0zxa5OCDOfAIZHrB2/ RMhpUP1CstbbaHj0Yxf8GFxmnVdqqBY5nqtndAgSmsVZtPV/CYq14M0tvh6pI1fQ8H1C exSjZ6fZ2Nmlt/b2G0/sCmF5JbRglQKl9HQ0CrKuU/FPsvu9r0X648yKuV1Mk9EotOuf ql0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yKLFR9hajS+S8I8dEJtuTA6UHLbm3L7zOTW6PXctmRc=; b=Rd3uohmfuVV3TD0PWPkTqGwGOKHE3txlFvr28DWeis9il5MmkUxisbt3W3OoioQjkE 97GwiBjLfcrfT1YyBy3ALfoDT0+lRrb4gOxHvTa6G4kiDq9h9X85YD/pwB9UmJ4tyUzP 0oTzt/oEhbe1AkmkvrQZPcVzTXCQpymLpAS/Kt1UAAz9XzJXDd3vxLi3nY4XoMsWptME V/ZndT1UkwdIJ4I+MK+LHu4Zzs/HTc+nvYhS4sX9DbxPEh/hLUP24QzvKRdYSK/Hgdhj vCKhpGM/40VqfsbpeibaVsuiTrpexyt9LNdcgSOXvgpQzFlLYDr7jciv6Rg1aFwU8zWK u6qw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0ZjzBaOU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ym1si2755870ejb.263.2019.10.10.01.42.49; Thu, 10 Oct 2019 01:43:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0ZjzBaOU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387967AbfJJIjt (ORCPT + 99 others); Thu, 10 Oct 2019 04:39:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:43562 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387959AbfJJIjr (ORCPT ); Thu, 10 Oct 2019 04:39:47 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0932220B7C; Thu, 10 Oct 2019 08:39:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570696786; bh=FEXxw9aEBXJ4F+xQknipUPyHSoalYwiabqK+zW9spvE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0ZjzBaOUCC0VjUasmw8TR7ZhH3CWA/OlSKvzhPi4hEU0facuRgfvcWpeq2lunEfgE Ep4ao6hSxKH/qVEhmeUdkI3e8jiUp1H7vdJlj/9i2LsfgoGQdIde+0SwxZPn7bR14y nxWE5i9qPORbOF2LT9Ba6rrZBXIBtHsUnGMQNeF4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Li RongQing , Liang ZhiCheng , Thomas Gleixner Subject: [PATCH 5.3 052/148] timer: Read jiffies once when forwarding base clk Date: Thu, 10 Oct 2019 10:35:13 +0200 Message-Id: <20191010083614.313776593@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191010083609.660878383@linuxfoundation.org> References: <20191010083609.660878383@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Li RongQing commit e430d802d6a3aaf61bd3ed03d9404888a29b9bf9 upstream. The timer delayed for more than 3 seconds warning was triggered during testing. Workqueue: events_unbound sched_tick_remote RIP: 0010:sched_tick_remote+0xee/0x100 ... Call Trace: process_one_work+0x18c/0x3a0 worker_thread+0x30/0x380 kthread+0x113/0x130 ret_from_fork+0x22/0x40 The reason is that the code in collect_expired_timers() uses jiffies unprotected: if (next_event > jiffies) base->clk = jiffies; As the compiler is allowed to reload the value base->clk can advance between the check and the store and in the worst case advance farther than next event. That causes the timer expiry to be delayed until the wheel pointer wraps around. Convert the code to use READ_ONCE() Fixes: 236968383cf5 ("timers: Optimize collect_expired_timers() for NOHZ") Signed-off-by: Li RongQing Signed-off-by: Liang ZhiCheng Signed-off-by: Thomas Gleixner Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/1568894687-14499-1-git-send-email-lirongqing@baidu.com Signed-off-by: Greg Kroah-Hartman --- kernel/time/timer.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) --- a/kernel/time/timer.c +++ b/kernel/time/timer.c @@ -1593,24 +1593,26 @@ void timer_clear_idle(void) static int collect_expired_timers(struct timer_base *base, struct hlist_head *heads) { + unsigned long now = READ_ONCE(jiffies); + /* * NOHZ optimization. After a long idle sleep we need to forward the * base to current jiffies. Avoid a loop by searching the bitfield for * the next expiring timer. */ - if ((long)(jiffies - base->clk) > 2) { + if ((long)(now - base->clk) > 2) { unsigned long next = __next_timer_interrupt(base); /* * If the next timer is ahead of time forward to current * jiffies, otherwise forward to the next expiry time: */ - if (time_after(next, jiffies)) { + if (time_after(next, now)) { /* * The call site will increment base->clk and then * terminate the expiry loop immediately. */ - base->clk = jiffies; + base->clk = now; return 0; } base->clk = next;