Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4770663rdb; Tue, 12 Dec 2023 08:52:51 -0800 (PST) X-Google-Smtp-Source: AGHT+IGWqZPTmrqH7eF7vzOb9LOEmpLAwmD0nHCViCIAneLUXwclhGPbAWTEGOw5ZmX4lJEv4rvF X-Received: by 2002:a17:903:22c3:b0:1d1:d9d9:1fa8 with SMTP id y3-20020a17090322c300b001d1d9d91fa8mr3410818plg.49.1702399971308; Tue, 12 Dec 2023 08:52:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702399971; cv=none; d=google.com; s=arc-20160816; b=Wp7VEyzXLCTiBimVBueUtrYBZxR/LWUQo2U6Q96GIDctC8Hu5XpuahRpRWRDgeSiNa CcI/CqZ7Pxo0W0PkEbp1rTq+26TRcBJw1AzDxoZWiwXRwucRunKkyP30KWyqtSNc8K+x qKEUFVdblVLUuIm/DmyytY92FgGbPbkd+swWLsiDDzMRQ1yhalNUIBf+phgCuhNpz2/K wWvK1AqD3iyjcLPROMbMCrqEeglxBfYWqOJmxgmBWlKGwh/PSLG74XpQpKfArvZz1Q/q iIFf+vuV0Atdke4T2HJO1jvpgIT7099iwB4CmkDy2133AnQ0fuZpZnY/eh5XmiN0Pa6K zFIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:subject:cc:to:from:date; bh=FGhE7ZtFJN4h+448i1LBMns4EjG9ZgdThbPt4UbmACo=; fh=R8JZsVKDlS7lXIAvTNV55bsjlDBI0i4sqiOYXO4tZQA=; b=hJy6Aoapof+wdQ4MWGnqeh65V3yLl3yd3DarNxxsei9YH7aR/pBG4pP7nacZ6HcyQH H3ANsJn5opsmfaAkhPP5nXaTqyy5hl0TlXFSwSoaNgx/SbJiD7cQhnewxWg/w7S9Ivgd C/ODQSbdn3SISD5TbxTUzzQUw/M3YImG3NkWOlY0QAzyTCMjn+Yn3Sa1FZmbDhr3kDnP SNUyNw+gshMsglHllCx99N95sGzT0TG8tOIy5wo3uI2FDh5dZrN3I3Bp9T1jDFwQyLxK Ongk2BklvGxDeyaUjZZ996Lxd8ycnr2iFyBN4AFgXu//ICKSiHpbm8Jquy9R6VqI+CbQ v2lA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id j23-20020a635957000000b00565335587absi8059612pgm.802.2023.12.12.08.52.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Dec 2023 08:52:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 2FAEB80AE539; Tue, 12 Dec 2023 08:52:47 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233022AbjLLQwU (ORCPT + 99 others); Tue, 12 Dec 2023 11:52:20 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51348 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232570AbjLLQwO (ORCPT ); Tue, 12 Dec 2023 11:52:14 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DC6F0B7 for ; Tue, 12 Dec 2023 08:52:20 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D996AC433CA; Tue, 12 Dec 2023 16:52:19 +0000 (UTC) Date: Tue, 12 Dec 2023 11:53:01 -0500 From: Steven Rostedt To: LKML , Linux Trace Kernel Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers Subject: [PATCH] ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs Message-ID: <20231212115301.7a9c9a64@gandalf.local.home> X-Mailer: Claws Mail 3.19.1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Tue, 12 Dec 2023 08:52:47 -0800 (PST) From: "Steven Rostedt (Google)" Mathieu Desnoyers pointed out an issue in the rb_time_cmpxchg() for 32 bit architectures. That is: static bool rb_time_cmpxchg(rb_time_t *t, u64 expect, u64 set) { unsigned long cnt, top, bottom, msb; unsigned long cnt2, top2, bottom2, msb2; u64 val; /* The cmpxchg always fails if it interrupted an update */ if (!__rb_time_read(t, &val, &cnt2)) return false; if (val != expect) return false; <<<< interrupted here! cnt = local_read(&t->cnt); The problem is that the synchronization counter in the rb_time_t is read *after* the value of the timestamp is read. That means if an interrupt were to come in between the value being read and the counter being read, it can change the value and the counter and the interrupted process would be clueless about it! The counter needs to be read first and then the value. That way it is easy to tell if the value is stale or not. If the counter hasn't been updated, then the value is still good. Link: https://lore.kernel.org/linux-trace-kernel/20231211201324.652870-1-mathieu.desnoyers@efficios.com/ Cc: stable@vger.kernel.org Fixes: 10464b4aa605e ("ring-buffer: Add rb_time_t 64 bit operations for speeding up 32 bit") Reported-by: Mathieu Desnoyers Signed-off-by: Steven Rostedt (Google) --- kernel/trace/ring_buffer.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/kernel/trace/ring_buffer.c b/kernel/trace/ring_buffer.c index 1d9caee7f542..e110cde685ea 100644 --- a/kernel/trace/ring_buffer.c +++ b/kernel/trace/ring_buffer.c @@ -706,6 +706,9 @@ static bool rb_time_cmpxchg(rb_time_t *t, u64 expect, u64 set) unsigned long cnt2, top2, bottom2, msb2; u64 val; + /* Any interruptions in this function should cause a failure */ + cnt = local_read(&t->cnt); + /* The cmpxchg always fails if it interrupted an update */ if (!__rb_time_read(t, &val, &cnt2)) return false; @@ -713,7 +716,6 @@ static bool rb_time_cmpxchg(rb_time_t *t, u64 expect, u64 set) if (val != expect) return false; - cnt = local_read(&t->cnt); if ((cnt & 3) != cnt2) return false; -- 2.42.0