From patchwork Sun Jun 7 16:38:03 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Pavel Machek X-Patchwork-Id: 11591805 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id BC15B618 for ; Sun, 7 Jun 2020 16:39:05 +0000 (UTC) Received: from alsa0.perex.cz (alsa0.perex.cz [77.48.224.243]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id DBC2D20659 for ; Sun, 7 Jun 2020 16:39:04 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=alsa-project.org header.i=@alsa-project.org header.b="cIUgZGEl" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org DBC2D20659 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=ucw.cz Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=alsa-devel-bounces@alsa-project.org Received: from alsa1.perex.cz (alsa1.perex.cz [207.180.221.201]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by alsa0.perex.cz (Postfix) with ESMTPS id 22D6483B; Sun, 7 Jun 2020 18:38:15 +0200 (CEST) DKIM-Filter: OpenDKIM Filter v2.11.0 alsa0.perex.cz 22D6483B DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=alsa-project.org; s=default; t=1591547943; bh=L3JCSq7qeCWleV/aV15xU16dWheoo4EHDIQFizePKVs=; h=Date:From:To:Subject:References:In-Reply-To:Cc:List-Id: List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe: From; b=cIUgZGElKAW2ErWVJASv81yNu2UPgn6fjBNgvLoW8QbemLHtSHta88ugCpbE/C9y6 esP1EzJ57qUgx4bEr3vrjJ03uR5uJ2arhHuriKcZNwutrwCPK8GTWHIQHG7vEcwk7m XzFXnZ2o43edyMXfW5iNskAwH7gtLSx25DClTLG0= Received: from alsa1.perex.cz (localhost.localdomain [127.0.0.1]) by alsa1.perex.cz (Postfix) with ESMTP id A00D5F80122; Sun, 7 Jun 2020 18:38:14 +0200 (CEST) X-Original-To: alsa-devel@alsa-project.org Delivered-To: alsa-devel@alsa-project.org Received: by alsa1.perex.cz (Postfix, from userid 50401) id 0306CF80140; Sun, 7 Jun 2020 18:38:12 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on alsa1.perex.cz X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=SPF_HELO_NONE,SPF_NONE, URIBL_BLOCKED autolearn=disabled version=3.4.0 Received: from jabberwock.ucw.cz (jabberwock.ucw.cz [46.255.230.98]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by alsa1.perex.cz (Postfix) with ESMTPS id 07ED2F80122 for ; Sun, 7 Jun 2020 18:38:05 +0200 (CEST) DKIM-Filter: OpenDKIM Filter v2.11.0 alsa1.perex.cz 07ED2F80122 Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 4BFA81C0BD2; Sun, 7 Jun 2020 18:38:04 +0200 (CEST) Date: Sun, 7 Jun 2020 18:38:03 +0200 From: Pavel Machek To: "Alex Xu (Hello71)" Subject: 82fef0ad811f "x86/mm: unencrypted non-blocking DMA allocations use coherent pools" was Re: next-0519 on thinkpad x60: sound related? window manager crash Message-ID: <20200607163803.GA10303@duo.ucw.cz> References: <20200520111136.GA3802@amd> <1591545088.74ii116nf2.none@localhost> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <1591545088.74ii116nf2.none@localhost> User-Agent: Mutt/1.10.1 (2018-07-13) Cc: alsa-devel@alsa-project.org, x86@kernel.org, tiwai@suse.com, linux-kernel@vger.kernel.org, hch@infradead.org, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, rientjes@google.com, tglx@linutronix.de, hch@lst.de X-BeenThere: alsa-devel@alsa-project.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: "Alsa-devel mailing list for ALSA developers - http://www.alsa-project.org" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: alsa-devel-bounces@alsa-project.org Sender: "Alsa-devel" Hi! > I have a similar issue, caused between aaa2faab4ed8 and b170290c2836. > > [ 20.263098] BUG: unable to handle page fault for address: ffffb2b582cc2000 > [ 20.263104] #PF: supervisor write access in kernel mode > [ 20.263105] #PF: error_code(0x000b) - reserved bit violation > [ 20.263107] PGD 3fd03b067 P4D 3fd03b067 PUD 3fd03c067 PMD 3f8822067 PTE 8000273942ab2163 > [ 20.263113] Oops: 000b [#1] PREEMPT SMP > [ 20.263117] CPU: 3 PID: 691 Comm: mpv Not tainted 5.7.0-11262-gb170290c2836 #1 > [ 20.263119] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./B450 Pro4, BIOS P4.10 03/05/2020 > [ 20.263125] RIP: 0010:__memset+0x24/0x30 > [ 20.263128] Code: cc cc cc cc cc cc 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 f3 > [ 20.263131] RSP: 0018:ffffb2b583d07e10 EFLAGS: 00010216 > [ 20.263133] RAX: 0000000000000000 RBX: ffff8b8000102c00 RCX: 0000000000004000 > [ 20.263134] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb2b582cc2000 > [ 20.263136] RBP: ffff8b8000101000 R08: 0000000000000000 R09: ffffb2b582cc2000 > [ 20.263137] R10: 0000000000005356 R11: ffff8b8000102c18 R12: 0000000000000000 > [ 20.263139] R13: 0000000000000000 R14: ffff8b8039944200 R15: ffffffff9794daa0 > [ 20.263141] FS: 00007f41aa4b4200(0000) GS:ffff8b803ecc0000(0000) knlGS:0000000000000000 > [ 20.263143] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 20.263144] CR2: ffffb2b582cc2000 CR3: 00000003b6731000 CR4: 00000000003406e0 > [ 20.263146] Call Trace: > [ 20.263151] ? snd_pcm_hw_params+0x3f3/0x47a > [ 20.263154] ? snd_pcm_common_ioctl+0xf2/0xf73 > [ 20.263158] ? snd_pcm_ioctl+0x1e/0x29 > [ 20.263161] ? ksys_ioctl+0x77/0x91 > [ 20.263163] ? __x64_sys_ioctl+0x11/0x14 > [ 20.263166] ? do_syscall_64+0x3d/0xf5 > [ 20.263170] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 > [ 20.263173] Modules linked in: uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videodev snd_usb_audio videobuf2_common snd_hwdep snd_usbmidi_lib input_leds snd_rawmidi led_class > [ 20.263182] CR2: ffffb2b582cc2000 > [ 20.263184] ---[ end trace c6b47a774b91f0a0 ]--- > [ 20.263187] RIP: 0010:__memset+0x24/0x30 > [ 20.263190] Code: cc cc cc cc cc cc 0f 1f 44 00 00 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 f3 > [ 20.263192] RSP: 0018:ffffb2b583d07e10 EFLAGS: 00010216 > [ 20.263193] RAX: 0000000000000000 RBX: ffff8b8000102c00 RCX: 0000000000004000 > [ 20.263195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb2b582cc2000 > [ 20.263196] RBP: ffff8b8000101000 R08: 0000000000000000 R09: ffffb2b582cc2000 > [ 20.263197] R10: 0000000000005356 R11: ffff8b8000102c18 R12: 0000000000000000 > [ 20.263199] R13: 0000000000000000 R14: ffff8b8039944200 R15: ffffffff9794daa0 > [ 20.263201] FS: 00007f41aa4b4200(0000) GS:ffff8b803ecc0000(0000) knlGS:0000000000000000 > [ 20.263202] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 20.263204] CR2: ffffb2b582cc2000 CR3: 00000003b6731000 CR4: 00000000003406e0 > > I bisected this to 82fef0ad811f "x86/mm: unencrypted non-blocking DMA > allocations use coherent pools". Reverting 1ee18de92927 resolves the > issue. > > Looks like Thinkpad X60 doesn't have VT-d, but could still be DMA > related. Note that newer -next releases seem to behave okay for me. The commit pointed out by siection is really simple: AFAIK you could verify it is responsible by turning off CONFIG_AMD_MEM_ENCRYPT on latest kernel... Best regards, Pavel index 1d6104ea8af0..2bf2222819d3 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1520,6 +1520,7 @@ config X86_CPA_STATISTICS config AMD_MEM_ENCRYPT bool "AMD Secure Memory Encryption (SME) support" depends on X86_64 && CPU_SUP_AMD + select DMA_COHERENT_POOL select DYNAMIC_PHYSICAL_MASK select ARCH_USE_MEMREMAP_PROT select ARCH_HAS_FORCE_DMA_UNENCRYPTED