Message ID | 20230708225144.3785600-1-zhengyejian1@huawei.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:9f45:0:b0:3ea:f831:8777 with SMTP id v5csp3844132vqx; Sat, 8 Jul 2023 03:55:56 -0700 (PDT) X-Google-Smtp-Source: APBJJlGgp+wqekF5EJMeSbKKp2/88ZIa3W8wdd7uVy6w8HSV0XACZClTqch9rFPysu8GXTfpLvE+ X-Received: by 2002:a05:6a00:2190:b0:682:37be:c9fe with SMTP id h16-20020a056a00219000b0068237bec9femr8105137pfi.10.1688813755761; Sat, 08 Jul 2023 03:55:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688813755; cv=none; d=google.com; s=arc-20160816; b=a4OKBA1oeQCdvZGynPWIv0/2idB/i0/I2Zcy2+M0SjwLdpXwwAD75NoMdw3x5eLxOc MGi3a//0Klr9mmCsPpyAfer7+GrGcyCBWZtn+alix3E9wn4xy/NVWTMyeuDJ1wZyvt2p /JQUOVz9YkZ9QDlRuRxAWLTLJpqEN/L8TtfIicWr76rZ1NvMZQD6SDpvQFS9jnDFC3Vd fU/UONKVAfLtv+Ph3JkymeG7Leq8YTE00uHFCeHEqbcug7xlAS3ALcGH2eKjPkQWOgWe MLClRYOA7SDmSvja7wHaJ8Ar+XoDg/ynyaaRCC/XdkWRTpbITqwb6wy3zrYcj4Bd/gah DdWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=EQpIP5biODW6Usee+3boFtHSL1/y/ikdDcAdLzlA8J4=; fh=gI9FEBZwCPkanigZF8HYbw13aijx656e2P76SW8PY5Y=; b=YHqoLsZMWoelPmhDODzHq8UMZ65WuEOcA7xXQdeIGsiUMtyfbYtVwek7K7F0lhh6KS +uJm5CTUupBqYcDCf4J00g/gWdRwJnT8sdIfm8uYuvttc8KQZBNsUeiGBJkfOAhX5TkT hOCqR+DkDcHi7fWN1TO2GYFbY41qo0XSZFQ48uczr6PWJ9eVEP8MaQAU2oshuDIbQ/JP q7XWrrBYp1Sy2pnRs0/1TkFW3DjdH+GDJ/eMee/s2dSlXoKiweC+K5LZqNN22CVTjj8o 0H5Fa+/IB48cVQz8yZd7K70GNZh5yp59I4tHbYGSn3OYszuRofdpkTkQrX3fGIcVG76y ohbw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u6-20020a63df06000000b0053fb354c194si5408641pgg.659.2023.07.08.03.55.42; Sat, 08 Jul 2023 03:55:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229761AbjGHKvR (ORCPT <rfc822;tebrre53rla2o@gmail.com> + 99 others); Sat, 8 Jul 2023 06:51:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54352 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229458AbjGHKvO (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Sat, 8 Jul 2023 06:51:14 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3834C1994; Sat, 8 Jul 2023 03:51:12 -0700 (PDT) Received: from dggpeml500012.china.huawei.com (unknown [172.30.72.55]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4Qyn9W2rtWzqVMd; Sat, 8 Jul 2023 18:50:39 +0800 (CST) Received: from localhost.localdomain (10.67.175.61) by dggpeml500012.china.huawei.com (7.185.36.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Sat, 8 Jul 2023 18:51:09 +0800 From: Zheng Yejian <zhengyejian1@huawei.com> To: <rostedt@goodmis.org>, <mhiramat@kernel.org> CC: <linux-kernel@vger.kernel.org>, <linux-trace-kernel@vger.kernel.org>, <zhengyejian1@huawei.com> Subject: [PATCH] ring-buffer: Fix deadloop issue on reading trace_pipe Date: Sun, 9 Jul 2023 06:51:44 +0800 Message-ID: <20230708225144.3785600-1-zhengyejian1@huawei.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.175.61] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpeml500012.china.huawei.com (7.185.36.15) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.0 required=5.0 tests=BAYES_00,DATE_IN_FUTURE_12_24, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1770849572906728625?= X-GMAIL-MSGID: =?utf-8?q?1770849572906728625?= |
Series |
ring-buffer: Fix deadloop issue on reading trace_pipe
|
|
Commit Message
Zheng Yejian
July 8, 2023, 10:51 p.m. UTC
Soft lockup occurs when reading file 'trace_pipe':
watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488]
[...]
RIP: 0010:ring_buffer_empty_cpu+0xed/0x170
RSP: 0018:ffff88810dd6fc48 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff93d1aaeb
RDX: ffff88810a280040 RSI: 0000000000000008 RDI: ffff88811164b218
RBP: ffff88811164b218 R08: 0000000000000000 R09: ffff88815156600f
R10: ffffed102a2acc01 R11: 0000000000000001 R12: 0000000051651901
R13: 0000000000000000 R14: ffff888115e49500 R15: 0000000000000000
[...]
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8d853c2000 CR3: 000000010dcd8000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__find_next_entry+0x1a8/0x4b0
? peek_next_entry+0x250/0x250
? down_write+0xa5/0x120
? down_write_killable+0x130/0x130
trace_find_next_entry_inc+0x3b/0x1d0
tracing_read_pipe+0x423/0xae0
? tracing_splice_read_pipe+0xcb0/0xcb0
vfs_read+0x16b/0x490
ksys_read+0x105/0x210
? __ia32_sys_pwrite64+0x200/0x200
? switch_fpu_return+0x108/0x220
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x61/0xc6
Through the vmcore, I found it's because in tracing_read_pipe(),
ring_buffer_empty_cpu() found some buffer is not empty but then it
cannot read anything due to "rb_num_of_entries() == 0" always true,
Then it infinitely loop the procedure due to user buffer not been
filled, see following code path:
tracing_read_pipe() {
... ...
waitagain:
tracing_wait_pipe() // 1. find non-empty buffer here
trace_find_next_entry_inc() // 2. loop here try to find an entry
__find_next_entry()
ring_buffer_empty_cpu(); // 3. find non-empty buffer
peek_next_entry() // 4. but peek always return NULL
ring_buffer_peek()
rb_buffer_peek()
rb_get_reader_page()
// 5. because rb_num_of_entries() == 0 always true here
// then return NULL
// 6. user buffer not been filled so goto 'waitgain'
// and eventually leads to an deadloop in kernel!!!
}
By some analyzing, I found that when resetting ringbuffer, the 'entries'
of its pages are not all cleared (see rb_reset_cpu()). Then when reducing
the ringbuffer, and if some reduced pages exist dirty 'entries' data, they
will be added into 'cpu_buffer->overrun' (see rb_remove_pages()), which
cause wrong 'overrun' count and eventually cause the deadloop issue.
To fix it, we need to clear every pages in rb_reset_cpu().
Signed-off-by: Zheng Yejian <zhengyejian1@huawei.com>
---
kernel/trace/ring_buffer.c | 24 +++++++++++++++---------
1 file changed, 15 insertions(+), 9 deletions(-)
Comments
On Sun, 9 Jul 2023 06:51:44 +0800 Zheng Yejian <zhengyejian1@huawei.com> wrote: > Soft lockup occurs when reading file 'trace_pipe': > > watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488] > [...] > RIP: 0010:ring_buffer_empty_cpu+0xed/0x170 > RSP: 0018:ffff88810dd6fc48 EFLAGS: 00000246 > RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff93d1aaeb > RDX: ffff88810a280040 RSI: 0000000000000008 RDI: ffff88811164b218 > RBP: ffff88811164b218 R08: 0000000000000000 R09: ffff88815156600f > R10: ffffed102a2acc01 R11: 0000000000000001 R12: 0000000051651901 > R13: 0000000000000000 R14: ffff888115e49500 R15: 0000000000000000 > [...] > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 00007f8d853c2000 CR3: 000000010dcd8000 CR4: 00000000000006e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > __find_next_entry+0x1a8/0x4b0 > ? peek_next_entry+0x250/0x250 > ? down_write+0xa5/0x120 > ? down_write_killable+0x130/0x130 > trace_find_next_entry_inc+0x3b/0x1d0 > tracing_read_pipe+0x423/0xae0 > ? tracing_splice_read_pipe+0xcb0/0xcb0 > vfs_read+0x16b/0x490 > ksys_read+0x105/0x210 > ? __ia32_sys_pwrite64+0x200/0x200 > ? switch_fpu_return+0x108/0x220 > do_syscall_64+0x33/0x40 > entry_SYSCALL_64_after_hwframe+0x61/0xc6 > > Through the vmcore, I found it's because in tracing_read_pipe(), > ring_buffer_empty_cpu() found some buffer is not empty but then it > cannot read anything due to "rb_num_of_entries() == 0" always true, > Then it infinitely loop the procedure due to user buffer not been > filled, see following code path: > > tracing_read_pipe() { > ... ... > waitagain: > tracing_wait_pipe() // 1. find non-empty buffer here > trace_find_next_entry_inc() // 2. loop here try to find an entry > __find_next_entry() > ring_buffer_empty_cpu(); // 3. find non-empty buffer > peek_next_entry() // 4. but peek always return NULL > ring_buffer_peek() > rb_buffer_peek() > rb_get_reader_page() > // 5. because rb_num_of_entries() == 0 always true here > // then return NULL > // 6. user buffer not been filled so goto 'waitgain' > // and eventually leads to an deadloop in kernel!!! > } > > By some analyzing, I found that when resetting ringbuffer, the 'entries' > of its pages are not all cleared (see rb_reset_cpu()). Then when reducing > the ringbuffer, and if some reduced pages exist dirty 'entries' data, they > will be added into 'cpu_buffer->overrun' (see rb_remove_pages()), which > cause wrong 'overrun' count and eventually cause the deadloop issue. > > To fix it, we need to clear every pages in rb_reset_cpu(). Nice catch and analysis! > > Signed-off-by: Zheng Yejian <zhengyejian1@huawei.com> > --- > kernel/trace/ring_buffer.c | 24 +++++++++++++++--------- > 1 file changed, 15 insertions(+), 9 deletions(-) > > diff --git a/kernel/trace/ring_buffer.c b/kernel/trace/ring_buffer.c > index 834b361a4a66..14d8001140c8 100644 > --- a/kernel/trace/ring_buffer.c > +++ b/kernel/trace/ring_buffer.c > @@ -5242,28 +5242,34 @@ unsigned long ring_buffer_size(struct trace_buffer *buffer, int cpu) > } > EXPORT_SYMBOL_GPL(ring_buffer_size); > > +static void rb_clear_buffer_page(struct buffer_page *page) > +{ > + local_set(&page->write, 0); > + local_set(&page->entries, 0); > + rb_init_page(page->page); > + page->read = 0; > +} > + > static void > rb_reset_cpu(struct ring_buffer_per_cpu *cpu_buffer) > { > + struct buffer_page *page; > + > rb_head_page_deactivate(cpu_buffer); > > cpu_buffer->head_page > = list_entry(cpu_buffer->pages, struct buffer_page, list); > - local_set(&cpu_buffer->head_page->write, 0); > - local_set(&cpu_buffer->head_page->entries, 0); > - local_set(&cpu_buffer->head_page->page->commit, 0); > - > - cpu_buffer->head_page->read = 0; > + rb_clear_buffer_page(cpu_buffer->head_page); > + list_for_each_entry(page, cpu_buffer->pages, list) { > + rb_clear_buffer_page(page); > + } > > cpu_buffer->tail_page = cpu_buffer->head_page; > cpu_buffer->commit_page = cpu_buffer->head_page; > > INIT_LIST_HEAD(&cpu_buffer->reader_page->list); > INIT_LIST_HEAD(&cpu_buffer->new_pages); > - local_set(&cpu_buffer->reader_page->write, 0); > - local_set(&cpu_buffer->reader_page->entries, 0); > - local_set(&cpu_buffer->reader_page->page->commit, 0); > - cpu_buffer->reader_page->read = 0; > + rb_clear_buffer_page(cpu_buffer->reader_page); Looks good. I'll apply it shortly and start running it through my tests. Thanks! -- Steve > > local_set(&cpu_buffer->entries_bytes, 0); > local_set(&cpu_buffer->overrun, 0);
On 2023/7/10 03:45, Steven Rostedt wrote: > On Sun, 9 Jul 2023 06:51:44 +0800 > Zheng Yejian <zhengyejian1@huawei.com> wrote: > >> Soft lockup occurs when reading file 'trace_pipe': >> >> watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488] >> [...] >> RIP: 0010:ring_buffer_empty_cpu+0xed/0x170 >> RSP: 0018:ffff88810dd6fc48 EFLAGS: 00000246 >> RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff93d1aaeb >> RDX: ffff88810a280040 RSI: 0000000000000008 RDI: ffff88811164b218 >> RBP: ffff88811164b218 R08: 0000000000000000 R09: ffff88815156600f >> R10: ffffed102a2acc01 R11: 0000000000000001 R12: 0000000051651901 >> R13: 0000000000000000 R14: ffff888115e49500 R15: 0000000000000000 >> [...] >> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >> CR2: 00007f8d853c2000 CR3: 000000010dcd8000 CR4: 00000000000006e0 >> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 >> Call Trace: >> __find_next_entry+0x1a8/0x4b0 >> ? peek_next_entry+0x250/0x250 >> ? down_write+0xa5/0x120 >> ? down_write_killable+0x130/0x130 >> trace_find_next_entry_inc+0x3b/0x1d0 >> tracing_read_pipe+0x423/0xae0 >> ? tracing_splice_read_pipe+0xcb0/0xcb0 >> vfs_read+0x16b/0x490 >> ksys_read+0x105/0x210 >> ? __ia32_sys_pwrite64+0x200/0x200 >> ? switch_fpu_return+0x108/0x220 >> do_syscall_64+0x33/0x40 >> entry_SYSCALL_64_after_hwframe+0x61/0xc6 >> >> Through the vmcore, I found it's because in tracing_read_pipe(), >> ring_buffer_empty_cpu() found some buffer is not empty but then it >> cannot read anything due to "rb_num_of_entries() == 0" always true, >> Then it infinitely loop the procedure due to user buffer not been >> filled, see following code path: >> >> tracing_read_pipe() { >> ... ... >> waitagain: >> tracing_wait_pipe() // 1. find non-empty buffer here >> trace_find_next_entry_inc() // 2. loop here try to find an entry >> __find_next_entry() >> ring_buffer_empty_cpu(); // 3. find non-empty buffer >> peek_next_entry() // 4. but peek always return NULL >> ring_buffer_peek() >> rb_buffer_peek() >> rb_get_reader_page() >> // 5. because rb_num_of_entries() == 0 always true here >> // then return NULL >> // 6. user buffer not been filled so goto 'waitgain' >> // and eventually leads to an deadloop in kernel!!! >> } >> >> By some analyzing, I found that when resetting ringbuffer, the 'entries' >> of its pages are not all cleared (see rb_reset_cpu()). Then when reducing >> the ringbuffer, and if some reduced pages exist dirty 'entries' data, they >> will be added into 'cpu_buffer->overrun' (see rb_remove_pages()), which >> cause wrong 'overrun' count and eventually cause the deadloop issue. >> >> To fix it, we need to clear every pages in rb_reset_cpu(). > > Nice catch and analysis! > Thanks! Steve, IIUC, following tags should be added? Cc: stable@vger.kernel.org Fixes: 48fdc72f23ad ("ring-buffer: Fix accounting of entries when removing pages") Fixes: 83f40318dab0 ("ring-buffer: Make removal of ring buffer pages atomic") --- Thanks, Zheng Yejian >> >> Signed-off-by: Zheng Yejian <zhengyejian1@huawei.com> >> --- >> kernel/trace/ring_buffer.c | 24 +++++++++++++++--------- >> 1 file changed, 15 insertions(+), 9 deletions(-) >> >> diff --git a/kernel/trace/ring_buffer.c b/kernel/trace/ring_buffer.c >> index 834b361a4a66..14d8001140c8 100644 >> --- a/kernel/trace/ring_buffer.c >> +++ b/kernel/trace/ring_buffer.c >> @@ -5242,28 +5242,34 @@ unsigned long ring_buffer_size(struct trace_buffer *buffer, int cpu) >> } >> EXPORT_SYMBOL_GPL(ring_buffer_size); >> >> +static void rb_clear_buffer_page(struct buffer_page *page) >> +{ >> + local_set(&page->write, 0); >> + local_set(&page->entries, 0); >> + rb_init_page(page->page); >> + page->read = 0; >> +} >> + >> static void >> rb_reset_cpu(struct ring_buffer_per_cpu *cpu_buffer) >> { >> + struct buffer_page *page; >> + >> rb_head_page_deactivate(cpu_buffer); >> >> cpu_buffer->head_page >> = list_entry(cpu_buffer->pages, struct buffer_page, list); >> - local_set(&cpu_buffer->head_page->write, 0); >> - local_set(&cpu_buffer->head_page->entries, 0); >> - local_set(&cpu_buffer->head_page->page->commit, 0); >> - >> - cpu_buffer->head_page->read = 0; >> + rb_clear_buffer_page(cpu_buffer->head_page); >> + list_for_each_entry(page, cpu_buffer->pages, list) { >> + rb_clear_buffer_page(page); >> + } >> >> cpu_buffer->tail_page = cpu_buffer->head_page; >> cpu_buffer->commit_page = cpu_buffer->head_page; >> >> INIT_LIST_HEAD(&cpu_buffer->reader_page->list); >> INIT_LIST_HEAD(&cpu_buffer->new_pages); >> - local_set(&cpu_buffer->reader_page->write, 0); >> - local_set(&cpu_buffer->reader_page->entries, 0); >> - local_set(&cpu_buffer->reader_page->page->commit, 0); >> - cpu_buffer->reader_page->read = 0; >> + rb_clear_buffer_page(cpu_buffer->reader_page); > > Looks good. I'll apply it shortly and start running it through my tests. > Thanks! > Thanks! > > -- Steve > >> >> local_set(&cpu_buffer->entries_bytes, 0); >> local_set(&cpu_buffer->overrun, 0); > >
On Mon, 10 Jul 2023 09:37:52 +0800 Zheng Yejian <zhengyejian1@huawei.com> wrote: > teve, IIUC, following tags should be added? > > Cc: stable@vger.kernel.org > Fixes: 48fdc72f23ad ("ring-buffer: Fix accounting of entries when > removing pages") > Fixes: 83f40318dab0 ("ring-buffer: Make removal of ring buffer pages > atomic") I actually added: Fixes: a5fb833172eca ("ring-buffer: Fix uninitialized read_stamp") -- Steve
On 2023/7/13 00:14, Steven Rostedt wrote: > On Mon, 10 Jul 2023 09:37:52 +0800 > Zheng Yejian <zhengyejian1@huawei.com> wrote: > >> teve, IIUC, following tags should be added? >> >> Cc: stable@vger.kernel.org >> Fixes: 48fdc72f23ad ("ring-buffer: Fix accounting of entries when >> removing pages") >> Fixes: 83f40318dab0 ("ring-buffer: Make removal of ring buffer pages >> atomic") > > I actually added: > > Fixes: a5fb833172eca ("ring-buffer: Fix uninitialized read_stamp") > > -- Steve > Yes, a5fb833172eca directly cause the deadloop issue. -- Thanks, Zheng Yejian
diff --git a/kernel/trace/ring_buffer.c b/kernel/trace/ring_buffer.c index 834b361a4a66..14d8001140c8 100644 --- a/kernel/trace/ring_buffer.c +++ b/kernel/trace/ring_buffer.c @@ -5242,28 +5242,34 @@ unsigned long ring_buffer_size(struct trace_buffer *buffer, int cpu) } EXPORT_SYMBOL_GPL(ring_buffer_size); +static void rb_clear_buffer_page(struct buffer_page *page) +{ + local_set(&page->write, 0); + local_set(&page->entries, 0); + rb_init_page(page->page); + page->read = 0; +} + static void rb_reset_cpu(struct ring_buffer_per_cpu *cpu_buffer) { + struct buffer_page *page; + rb_head_page_deactivate(cpu_buffer); cpu_buffer->head_page = list_entry(cpu_buffer->pages, struct buffer_page, list); - local_set(&cpu_buffer->head_page->write, 0); - local_set(&cpu_buffer->head_page->entries, 0); - local_set(&cpu_buffer->head_page->page->commit, 0); - - cpu_buffer->head_page->read = 0; + rb_clear_buffer_page(cpu_buffer->head_page); + list_for_each_entry(page, cpu_buffer->pages, list) { + rb_clear_buffer_page(page); + } cpu_buffer->tail_page = cpu_buffer->head_page; cpu_buffer->commit_page = cpu_buffer->head_page; INIT_LIST_HEAD(&cpu_buffer->reader_page->list); INIT_LIST_HEAD(&cpu_buffer->new_pages); - local_set(&cpu_buffer->reader_page->write, 0); - local_set(&cpu_buffer->reader_page->entries, 0); - local_set(&cpu_buffer->reader_page->page->commit, 0); - cpu_buffer->reader_page->read = 0; + rb_clear_buffer_page(cpu_buffer->reader_page); local_set(&cpu_buffer->entries_bytes, 0); local_set(&cpu_buffer->overrun, 0);