Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp599976ybg; Tue, 9 Jun 2020 08:15:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyGoI9G2z3/HSFH7EZIyENLnG16FlizVOWjjUDY70xikmYtdCC1IqmaDN6I61m1UIiSRarO X-Received: by 2002:a50:9556:: with SMTP id v22mr26521783eda.291.1591715737690; Tue, 09 Jun 2020 08:15:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591715737; cv=none; d=google.com; s=arc-20160816; b=dzGc4DL+GUrRwhCcDJ08iGAXEPKZwIYj6pVxBnQ15LGUhIkczl9NHx0Taxd0E+K/Bv VeKtFEvBdbvPpFPYiVLK9vV0hql9jWMzk8ZFfVjgEfvhbUnXOthyWjsLvfk2ox+5qy4c wGQYepWz9oTKFSdWsUsDl/darB1CFJ49ZAnX9QIYiJ4UV7YqajRiUhu4sDeftbX5WByV CXQdnyrIiFlY6S/R41dyJ7yxt3y3TOuAbZs8sM2OCiyRaBEW7hXCQyu0mPoAnMzbVVpY OB586VUmfsb88x2a/GTI1tK01PuQDPUzdwJYn8p7nRCwkom1rUglLnf8H4DLDCTa7z41 Mg0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:subject:cc:to:from:message-id:date; bh=sK5bG8WoyHeTjtgw5dpUCkOwKDj9OA8C6oLaVi9kfyY=; b=VEjVeqN6pp/aqpZf+fdfPyDCAWLYvUiN+Ag3eVzPHgLiflyfMpzavpFwjerRNApXK6 nAbto1Few6fdaKMEOaZ36bmXDZkOgK6uiP/n/V6WoGglKMvMTv3W5LeTiU1CCqA92+0E mgeeroDRCqhvQ5ir5oPhuNOY7BjpEb/d64vqJbgL8JEvs9t6ZyiXbb+3voUwCn7Ul2jm IHNH4bAYAIf9svmjRWhiHSj+uJ2UfOWtgrEN+XzjZBoO1UkMCD8WlTs6KCOQ+mRjQNH0 CEUdNAn3b1fbPzt2hZJV05Te3PiHwp4m1vhCIqhRfKebfVUxBOv7R/6wmFXwOKXXZMe0 V+mA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n24si12213193edb.277.2020.06.09.08.15.12; Tue, 09 Jun 2020 08:15:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730569AbgFIPMq (ORCPT + 99 others); Tue, 9 Jun 2020 11:12:46 -0400 Received: from mx2.suse.de ([195.135.220.15]:38748 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728082AbgFIPMn (ORCPT ); Tue, 9 Jun 2020 11:12:43 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id B30BBAE0A; Tue, 9 Jun 2020 15:12:45 +0000 (UTC) Date: Tue, 09 Jun 2020 17:12:41 +0200 Message-ID: From: Takashi Iwai To: "Alex Xu (Hello71)" Cc: Christoph Hellwig , , , , , , , Pavel Machek , , , , , Subject: Re: next-0519 on thinkpad x60: sound related? window manager crash In-Reply-To: <20200609114733.GA1621@lst.de> References: <20200520111136.GA3802@amd> <1591545088.74ii116nf2.none@localhost> <20200608061950.GA17476@lst.de> <1591624340.z01ejtod28.none@localhost> <20200609114733.GA1621@lst.de> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI/1.14.6 (Maruoka) FLIM/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL/10.8 Emacs/25.3 (x86_64-suse-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 09 Jun 2020 13:47:33 +0200, Christoph Hellwig wrote: > > Alex, can you try this patch? Also could you check whether just papering over the memset() call alone avoids the crash like below? For PulseAudio and dmix/dsnoop, it's the only code path that accesses the vmapped buffer, I believe. If this works more or less, I'll cook a more comprehensive fix. thanks, Takashi --- a/sound/core/pcm_native.c +++ b/sound/core/pcm_native.c @@ -754,9 +754,11 @@ static int snd_pcm_hw_params(struct snd_pcm_substream *substream, while (runtime->boundary * 2 <= LONG_MAX - runtime->buffer_size) runtime->boundary *= 2; +#if 0 /* clear the buffer for avoiding possible kernel info leaks */ if (runtime->dma_area && !substream->ops->copy_user) memset(runtime->dma_area, 0, runtime->dma_bytes); +#endif snd_pcm_timer_resolution_change(substream); snd_pcm_set_state(substream, SNDRV_PCM_STATE_SETUP);