Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp406429imm; Thu, 26 Jul 2018 05:51:32 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcbxMTk4okmRwzNMc36NX1lqTAlMb8bYRG1jTa0MmCKsl9CoK6j6UKLs+7nX0/XAiL/6GBf X-Received: by 2002:a62:c819:: with SMTP id z25-v6mr2008500pff.44.1532609492526; Thu, 26 Jul 2018 05:51:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532609492; cv=none; d=google.com; s=arc-20160816; b=BgpdJfuIZktqhNdo/y/CuM8cR5eY8Wr2YeKr1ckfvRX1Vg1HE1ZQkLjgUjT7bIueES 47tc+BNSflCizIrLdYGTaOD1Np/NP2bWXUcVq/9CNqvgWBSkeoHltmPE2YRhAuzR5xrj EpmbUYkqz1pyX5AbqwfZRPSP36L2UDgoxelVMVB5BJH11qlJSM0HjIyc6h/IqRVvb8ws 5xwpKHjvIPue/SZv10EGsZgiezI04yBhzeGnCPHjFj+VN75nShHEEDUTQcbgLHpYVP0Y ey2OyHprxnFiS6r/SdhhJqb4iebuegxIaHhbPxOW8u2+ObHGrAxHYwmRV45bLlXWMilc d5yA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:subject:cc:to:from:message-id:date :arc-authentication-results; bh=HqradcRfkXhPOsyVqLiG48cc/p9uTsMF2sqo6b4FyA0=; b=gcoXL3krfrjQJg/cLIF50Gfm/ySQB9koFuVfhlj1k31caWm4aFapUXcLxNGzgE4a9C ggAR/PR8zCV4MJXgO+yw+kHvBxyvW5D8F7OAcB0zX8N0lSUt0Ha4Kujv9qP+hHLTtMC9 pPYlFkq7dgK/T7nEaHRj/A2bp47vg2XTpSm1FvbmfUAhWbAqT6eDapQbsTKJpikcAz4u VUETVn3oKVJiHxtZdidP1wM6PyMRGBAkrYVfoHFQSmMtB/22V6yIl6Ot0W5HjX5mwIl2 WK9jCqfFVFpArC8OaZI+BPpyjlPYiOYE3Rf2OsOkfDuiKjzhhh8YBOI5/S4vZfIfX+Eb Jl2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u4-v6si1114684pgu.546.2018.07.26.05.51.17; Thu, 26 Jul 2018 05:51:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730085AbeGZOHK (ORCPT + 99 others); Thu, 26 Jul 2018 10:07:10 -0400 Received: from mx2.suse.de ([195.135.220.15]:60172 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729902AbeGZOHK (ORCPT ); Thu, 26 Jul 2018 10:07:10 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 594C3AEE5; Thu, 26 Jul 2018 12:50:25 +0000 (UTC) Date: Thu, 26 Jul 2018 14:50:25 +0200 Message-ID: From: Takashi Iwai To: " Dae R. Jeong " Cc: , , , , , Subject: Re: BUG: soft lockup in snd_virmidi_output_trigger In-Reply-To: <20180726055326.GA12625@dragonet> References: <20180726055326.GA12625@dragonet> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI/1.14.6 (Maruoka) FLIM/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL/10.8 Emacs/26 (x86_64-suse-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 26 Jul 2018 07:53:26 +0200, Dae R. Jeong wrote: > > Reporting the crash: BUG: soft lockup in snd_virmidi_output_trigger > > This crash has been found in v4.18-rc3 using RaceFuzzer (a modified > version of Syzkaller), which we describe more at the end of this > report. > > Note that this bug is previously reported by Syzkaller a few month ago. > (https://syzkaller.appspot.com/bug?id=642c927972318775e0ea1b4779ccd8624ce9e6f5) > Nonetheless, the crash still can be detected. We guess that the crash has > not fixed yet. > We report the crash log and the attached reproducer with a hope that they are > helpful to diagnose the crash and to fix a bug. > > C Reproducer: > https://kiwi.cs.purdue.edu/static/race-fuzzer/repro-dab082.c > > Kernel config: > https://kiwi.cs.purdue.edu/static/race-fuzzer/config-dab082 > > (Please disregard all code related to "should_hypercall" in the C repro, > as this is only for our debugging purposes using our own hypervisor.) > > > Crash log: > ================================================================== > watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor0:24261] > Modules linked in: > irq event stamp: 6692 > hardirqs last enabled at (6691): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] > hardirqs last enabled at (6691): [] _raw_spin_unlock_irqrestore+0x62/0x90 kernel/locking/spinlock.c:184 > hardirqs last disabled at (6692): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 > softirqs last enabled at (1468): [] __do_softirq+0x5ff/0x7f4 kernel/softirq.c:314 > softirqs last disabled at (1455): [] invoke_softirq kernel/softirq.c:368 [inline] > softirqs last disabled at (1455): [] irq_exit+0x126/0x130 kernel/softirq.c:408 > CPU: 1 PID: 24261 Comm: syz-executor0 Not tainted 4.18.0-rc3 #1 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.8.2-0-g33fbe13 by qemu-project.org 04/01/2014 > RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline] > RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] > RIP: 0010:_raw_spin_unlock_irqrestore+0x7d/0x90 kernel/locking/spinlock.c:184 > Code: 0d c8 ce 16 7b 5b 41 5c 5d c3 e8 3e 0f 52 fc 48 c7 c7 68 b0 71 86 e8 62 4c 8d fc 48 83 3d 42 91 86 01 00 74 0e 48 89 df 57 9d <0f> 1f 44 00 00 eb cd 0f 0b 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 > RSP: 0018:ffff8801b8e4f7e8 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 > RAX: 0000000000000000 RBX: 0000000000000282 RCX: ffffffff84eb1f1e > RDX: dffffc0000000000 RSI: dffffc0000000000 RDI: 0000000000000282 > RBP: ffff8801b8e4f7f8 R08: ffffed002573a06a R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000000 R12: ffff88012b9d0348 > R13: ffff8801e6417580 R14: ffff8801b8e4f868 R15: ffff8801e64175a8 > FS: 00007f3447a49700(0000) GS:ffff8801f6d00000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 00007f3447a48db8 CR3: 00000001ee58d000 CR4: 00000000000006e0 > Call Trace: > spin_unlock_irqrestore include/linux/spinlock.h:365 [inline] > snd_virmidi_output_trigger+0x37d/0x420 sound/core/seq/seq_virmidi.c:205 > snd_rawmidi_output_trigger sound/core/rawmidi.c:150 [inline] > snd_rawmidi_kernel_write1+0x383/0x410 sound/core/rawmidi.c:1288 > snd_rawmidi_write+0x249/0xa50 sound/core/rawmidi.c:1338 This seems to be a long loop in snd_virmidi_output_trigger processed in a spinlock. The below patch puts a cond_resched() for avoiding the possible stalls, and it seems working. Let me know if this works for you. thanks, Takashi -- 8< -- From: Takashi Iwai Subject: [PATCH] ALSA: virmidi: Fix too long output trigger loop The virmidi output trigger tries to parse the all available bytes and process sequencer events as much as possible. In a normal situation, this is supposed to be relatively short, but a program may give a huge buffer and it'll take a long time in a single spin lock, which may eventually lead to a soft lockup. This patch simply adds a workaround, a cond_resched() call in the loop if applicable. A better solution would be to move the event processor into a work, but let's put a duct-tape quickly at first. Reported-by: Dae R. Jeong Cc: Signed-off-by: Takashi Iwai --- sound/core/seq/seq_virmidi.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/sound/core/seq/seq_virmidi.c b/sound/core/seq/seq_virmidi.c index 289ae6bb81d9..65549d41533e 100644 --- a/sound/core/seq/seq_virmidi.c +++ b/sound/core/seq/seq_virmidi.c @@ -163,6 +163,7 @@ static void snd_virmidi_output_trigger(struct snd_rawmidi_substream *substream, int count, res; unsigned char buf[32], *pbuf; unsigned long flags; + bool check_resched = !in_atomic(); if (up) { vmidi->trigger = 1; @@ -200,6 +201,11 @@ static void snd_virmidi_output_trigger(struct snd_rawmidi_substream *substream, vmidi->event.type = SNDRV_SEQ_EVENT_NONE; } } + if (!check_resched) + continue; + spin_unlock_irqrestore(&substream->runtime->lock, flags); + cond_resched(); + spin_lock_irqsave(&substream->runtime->lock, flags); } out: spin_unlock_irqrestore(&substream->runtime->lock, flags); -- 2.18.0