From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.7 required=3.0 tests=BAYES_00,FROM_LOCAL_HEX, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7E20DC433EF for ; Fri, 17 Sep 2021 07:30:24 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 2BBF960F48 for ; Fri, 17 Sep 2021 07:30:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 2BBF960F48 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=syzkaller.appspotmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id A9CF06B0072; Fri, 17 Sep 2021 03:30:23 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A4CB56B0073; Fri, 17 Sep 2021 03:30:23 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8ED2E900002; Fri, 17 Sep 2021 03:30:23 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0043.hostedemail.com [216.40.44.43]) by kanga.kvack.org (Postfix) with ESMTP id 80E6A6B0072 for ; Fri, 17 Sep 2021 03:30:23 -0400 (EDT) Received: from smtpin02.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 31B0439F2A for ; Fri, 17 Sep 2021 07:30:23 +0000 (UTC) X-FDA: 78596242326.02.D756464 Received: from mail-il1-f198.google.com (mail-il1-f198.google.com [209.85.166.198]) by imf24.hostedemail.com (Postfix) with ESMTP id E04DFB0000B3 for ; Fri, 17 Sep 2021 07:30:22 +0000 (UTC) Received: by mail-il1-f198.google.com with SMTP id b18-20020a92a052000000b00243a23d77c2so8082547ilm.14 for ; Fri, 17 Sep 2021 00:30:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=m3nRbhKCaWxS8OkQmfuFA20q5t1TuojdS6u2lz7XyIg=; b=CWi+jV8xaCxMovACy/ZRo/iZ39K2H7vpZMpEISOqjr4OWYkxjSFDzCNc3p+wZzBuyI HxSV+SEPO6oVxW90BJvnRNUT0tj3lxOnDayGrFt0iqPOsZdkqaleKLFO3QpA7cyvEnFB UjWzBOHb6MpiK+rrgC9yRukSJnkMogmFvCsW101nUs3TYoEpcuMoARI7amwdcqjDUUu4 JDwHNh1peY2KDW46mbi/M6Bb3tvd9Qv5RU/NR0bT1iUe0brovH7dAA4WjeljyLdhnDZJ r1IKNv38etQWJabNG+0JUwtMOurUJRkpB0AFXpZUCTtlJIj6Lh//wL1kAzJgOCJki81n CAMQ== X-Gm-Message-State: AOAM533Ksp5jUan6bReVI/7wJEniZywwubqmP+IOYU1opo1NS+xcy2Y9 LwEl7m5EW3YAWoUx2AaFP+M4UGrzTaUeNJKJb7XUZNahMBO5 X-Google-Smtp-Source: ABdhPJyeZuMqnpDFXxjm6O9W9SV4ZGifaV5hgG26+z2XjKRZ6Y6MYgNglhtAC3RvKn9D6zriNGPo/kRc5mu8i4LhGAboVLFM3xQN MIME-Version: 1.0 X-Received: by 2002:a05:6638:1909:: with SMTP id p9mr7767060jal.108.1631863822026; Fri, 17 Sep 2021 00:30:22 -0700 (PDT) Date: Fri, 17 Sep 2021 00:30:22 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000006f0bec05cc2be7dc@google.com> Subject: [syzbot] BUG: soft lockup in call_usermodehelper_exec_async From: syzbot To: akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Authentication-Results: imf24.hostedemail.com; dkim=none; dmarc=fail reason="SPF not aligned (relaxed), No valid DKIM" header.from=appspotmail.com (policy=none); spf=pass (imf24.hostedemail.com: domain of 3DkREYQkbALcpvwhXiiboXmmfa.dlldibrpboZlkqbkq.Zlj@M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com designates 209.85.166.198 as permitted sender) smtp.mailfrom=3DkREYQkbALcpvwhXiiboXmmfa.dlldibrpboZlkqbkq.Zlj@M3KW2WVRGUFZ5GODRSRYTGD7.apphosting.bounces.google.com X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: E04DFB0000B3 X-Stat-Signature: ojookgebmb4nbjexc5d8mnxfut73ncsb X-HE-Tag: 1631863822-486464 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hello, syzbot found the following issue on: HEAD commit: 8cae8cd89f05 seq_file: disallow extremely large seq buffer.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=135dbd12300000 kernel config: https://syzkaller.appspot.com/x/.config?x=548fbb1e84c1808e dashboard link: https://syzkaller.appspot.com/bug?extid=c3963f4f025fa5dfb78b compiler: aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.1 userspace arch: arm Unfortunately, I don't have any reproducer for this issue yet. IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+c3963f4f025fa5dfb78b@syzkaller.appspotmail.com watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [kworker/u4:5:21352] Modules linked in: irq event stamp: 196 hardirqs last enabled at (195): [] exit_to_kernel_mode+0x38/0x230 arch/arm64/kernel/entry-common.c:71 hardirqs last disabled at (196): [] enter_el1_irq_or_nmi+0x10/0x20 arch/arm64/kernel/entry-common.c:113 softirqs last enabled at (116): [] _stext+0x9a4/0x1050 softirqs last disabled at (51): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (51): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (51): [] __irq_exit_rcu+0x470/0x520 kernel/softirq.c:636 CPU: 1 PID: 21352 Comm: kworker/u4:5 Not tainted 5.14.0-rc2-syzkaller-00001-g8cae8cd89f05 #0 Hardware name: linux,dummy-virt (DT) pstate: 00000005 (nzcv daif -PAN -UAO -TCO BTYPE=--) pc : clear_page+0x14/0x28 arch/arm64/lib/clear_page.S:23 lr : clear_highpage include/linux/highmem.h:184 [inline] lr : kernel_init_free_pages.part.0+0x6c/0x17c mm/page_alloc.c:1283 sp : ffff800018c67380 x29: ffff800018c67380 x28: 0000000000000000 x27: ffff00007fc11ec0 x26: ffff00000fe7aef8 x25: ffff600001fcf5df x24: 00000000000014b8 x23: ffff00000fe79a40 x22: fffffc0000171340 x21: ffff800015706c40 x20: dfff800000000000 x19: fffffc0000171300 x18: ffff00006aa70bc8 x17: ffff800055045000 x16: ffff800018598000 x15: ffff000010dd0600 x14: 1ffff0000318ce3a x13: 0000000000000014 x12: ffff7f800002e267 x11: 1fffff800002e266 x10: ffff7f800002e266 x9 : 0000000000000000 x8 : ffff600000b89a00 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 1ffff0000304db70 x3 : 1fffe00001fcf349 x2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff000005c4ca40 Call trace: clear_page+0x14/0x28 arch/arm64/lib/clear_page.S:21 kernel_init_free_pages mm/page_alloc.c:1280 [inline] post_alloc_hook+0x1ac/0x25c mm/page_alloc.c:2423 prep_new_page mm/page_alloc.c:2433 [inline] get_page_from_freelist+0x1840/0x2310 mm/page_alloc.c:4166 __alloc_pages+0x1a8/0x2234 mm/page_alloc.c:5388 alloc_pages_vma+0xb4/0x4dc mm/mempolicy.c:2208 alloc_zeroed_user_highpage_movable+0x9c/0xd0 arch/arm64/mm/fault.c:939 do_anonymous_page mm/memory.c:3767 [inline] handle_pte_fault mm/memory.c:4547 [inline] __handle_mm_fault+0xcbc/0x25e4 mm/memory.c:4684 handle_mm_fault+0x1dc/0x4ec mm/memory.c:4782 faultin_page mm/gup.c:951 [inline] __get_user_pages+0x3e4/0x744 mm/gup.c:1173 __get_user_pages_locked mm/gup.c:1359 [inline] __get_user_pages_remote+0x10c/0x500 mm/gup.c:1865 get_user_pages_remote+0x28/0x40 mm/gup.c:1938 get_arg_page+0x9c/0x1bc fs/exec.c:220 copy_string_kernel+0x170/0x294 fs/exec.c:631 kernel_execve+0x1ac/0x380 fs/exec.c:1961 call_usermodehelper_exec_async+0x260/0x460 kernel/umh.c:112 ret_from_fork+0x10/0x18 arch/arm64/kernel/entry.S:782 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot.