Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3838812pxv; Mon, 28 Jun 2021 14:19:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwUbJnkf89VuZHrlhwWEd0WWcxXvYOXd1MjpXehFUR6Nc9u83Zs6UgcnnMNPy0za7jtIJwW X-Received: by 2002:a05:6e02:808:: with SMTP id u8mr9366130ilm.57.1624915195236; Mon, 28 Jun 2021 14:19:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624915195; cv=none; d=google.com; s=arc-20160816; b=tGXsg17JhQbUDzRwGuBumKTWvWV6kmMX3gFbB6gtpA9s7F/XR7ebPYKr3wkDTBJ8t1 Y18g/XsoOwGzg0TEI5OSTFl8oPUzmDn1NKToX0sdjt/ZYMzVYkpocDZ8nJlABgPqDteR IL1iFlSVSwkKZyRGTWbdpsRAvnhyvYAJgGouedRXBcDeK2EWMr1/SNopVLfg2cvUJglu V9WtOaqFXXZRiBktZWx26Cl6rqSanYIgW6SDgWBIHfJFcdZ54NLi3As8T6JU7OEEAmcL RT9FJ0/drJJLKvXMCYIZ6Bxg2EdTjoIJIN9cHw5eGqpOI384oYOUnlkkCD/4GSjXF5XA Uphg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Q5eCHRFCzduSUSNbvsQLNTupxcU7+8k1rSwf6lVOb7E=; b=FW8lreUs8GCcJp55HbnGM22Iy+ilG0bJQV3lZN9NoKrHTnrV6Pgnzh+vlZZ8vw8wgH EAEL7gS6M9FXPmIxZJ2WDXigZM4m06FypQmioM0HPnNbETmaji55+rDw371XHYQymYQm 3K2eOtI1oAJy4PnTIDw9lSEZJ0CAwGJPzDzaQQBW47dHwuSx7tw59N3uQrLNmnQLd+oi zxAbZiSCMlTryZgqVPq1aVU5BYUWNfotlbI1qnXk9hMnGIdzQBMwMAmDMoblL4CgKm5u bSfvSdxbQhGt6WjEZ2exDu3YSpdZp2XkFBFvDziawc42dJRIwuIpsP4nKb2LHpJy4mTe cqBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DersC0hW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q3si21474497ilu.88.2021.06.28.14.19.40; Mon, 28 Jun 2021 14:19:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DersC0hW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237203AbhF1PWv (ORCPT + 99 others); Mon, 28 Jun 2021 11:22:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:34938 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235049AbhF1O6g (ORCPT ); Mon, 28 Jun 2021 10:58:36 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A36B761D5C; Mon, 28 Jun 2021 14:40:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624891239; bh=zxESz0oYPlrfrpOw0k4UWQnGA2r1ftjJYTw1jEyQXr4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DersC0hWs8GnR42qMK3EPZ7S8V6Ta0zCkO1DMqBsmQBKylRDaViX9odbEduQximx9 ifO5Yy+TBh/NoV2AVU6oV3JwP7y0Tb0MpEXcQ931OWsZqWe0rZvgN/Y5aIVBYCPn5D 0+pqVw9xfBFVPD7F6KO5Y8pV3s4/dmHDXOE2xkZlAWDMwNjhc+VHkwVyP6Kugt8NCd ATRXrKNIxTjs7YsM8J3qRCqy7Joi0Nha/4I+WrV73Ib9rYCrwZimOcwB95LcDEzmJk LV06RaQKiwI1MWc688xKirJNZ2DMTXpsGzb3HHMHKwqwPCcVM2cIXv+EqUqyvcwn/x JUnqMop9o46wA== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: "Steven Rostedt (VMware)" , Greg Kroah-Hartman Subject: [PATCH 4.9 39/71] tracing: Do no increment trace_clock_global() by one Date: Mon, 28 Jun 2021 10:39:31 -0400 Message-Id: <20210628144003.34260-40-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210628144003.34260-1-sashal@kernel.org> References: <20210628144003.34260-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.9.274-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.9.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.9.274-rc1 X-KernelTest-Deadline: 2021-06-30T14:39+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Steven Rostedt (VMware)" commit 89529d8b8f8daf92d9979382b8d2eb39966846ea upstream. The trace_clock_global() tries to make sure the events between CPUs is somewhat in order. A global value is used and updated by the latest read of a clock. If one CPU is ahead by a little, and is read by another CPU, a lock is taken, and if the timestamp of the other CPU is behind, it will simply use the other CPUs timestamp. The lock is also only taken with a "trylock" due to tracing, and strange recursions can happen. The lock is not taken at all in NMI context. In the case where the lock is not able to be taken, the non synced timestamp is returned. But it will not be less than the saved global timestamp. The problem arises because when the time goes "backwards" the time returned is the saved timestamp plus 1. If the lock is not taken, and the plus one to the timestamp is returned, there's a small race that can cause the time to go backwards! CPU0 CPU1 ---- ---- trace_clock_global() { ts = clock() [ 1000 ] trylock(clock_lock) [ success ] global_ts = ts; [ 1000 ] trace_clock_global() { ts = clock() [ 999 ] if (ts < global_ts) ts = global_ts + 1 [ 1001 ] trylock(clock_lock) [ fail ] return ts [ 1001] } unlock(clock_lock); return ts; [ 1000 ] } trace_clock_global() { ts = clock() [ 1000 ] if (ts < global_ts) [ false 1000 == 1000 ] trylock(clock_lock) [ success ] global_ts = ts; [ 1000 ] unlock(clock_lock) return ts; [ 1000 ] } The above case shows to reads of trace_clock_global() on the same CPU, but the second read returns one less than the first read. That is, time when backwards, and this is not what is allowed by trace_clock_global(). This was triggered by heavy tracing and the ring buffer checker that tests for the clock going backwards: Ring buffer clock went backwards: 20613921464 -> 20613921463 ------------[ cut here ]------------ WARNING: CPU: 2 PID: 0 at kernel/trace/ring_buffer.c:3412 check_buffer+0x1b9/0x1c0 Modules linked in: [..] [CPU: 2]TIME DOES NOT MATCH expected:20620711698 actual:20620711697 delta:6790234 before:20613921463 after:20613921463 [20613915818] PAGE TIME STAMP [20613915818] delta:0 [20613915819] delta:1 [20613916035] delta:216 [20613916465] delta:430 [20613916575] delta:110 [20613916749] delta:174 [20613917248] delta:499 [20613917333] delta:85 [20613917775] delta:442 [20613917921] delta:146 [20613918321] delta:400 [20613918568] delta:247 [20613918768] delta:200 [20613919306] delta:538 [20613919353] delta:47 [20613919980] delta:627 [20613920296] delta:316 [20613920571] delta:275 [20613920862] delta:291 [20613921152] delta:290 [20613921464] delta:312 [20613921464] delta:0 TIME EXTEND [20613921464] delta:0 This happened more than once, and always for an off by one result. It also started happening after commit aafe104aa9096 was added. Cc: stable@vger.kernel.org Fixes: aafe104aa9096 ("tracing: Restructure trace_clock_global() to never block") Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Greg Kroah-Hartman --- kernel/trace/trace_clock.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/kernel/trace/trace_clock.c b/kernel/trace/trace_clock.c index b67ea5eed2a8..b70233a9563f 100644 --- a/kernel/trace/trace_clock.c +++ b/kernel/trace/trace_clock.c @@ -113,9 +113,9 @@ u64 notrace trace_clock_global(void) prev_time = READ_ONCE(trace_clock_struct.prev_time); now = sched_clock_cpu(this_cpu); - /* Make sure that now is always greater than prev_time */ + /* Make sure that now is always greater than or equal to prev_time */ if ((s64)(now - prev_time) < 0) - now = prev_time + 1; + now = prev_time; /* * If in an NMI context then dont risk lockups and simply return @@ -129,7 +129,7 @@ u64 notrace trace_clock_global(void) /* Reread prev_time in case it was already updated */ prev_time = READ_ONCE(trace_clock_struct.prev_time); if ((s64)(now - prev_time) < 0) - now = prev_time + 1; + now = prev_time; trace_clock_struct.prev_time = now; -- 2.30.2