From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.2 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 320BBC433FE for ; Fri, 17 Sep 2021 07:37:33 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id D23AB61152 for ; Fri, 17 Sep 2021 07:37:32 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org D23AB61152 Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id 4A1BC6B0071; Fri, 17 Sep 2021 03:37:32 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 45024900002; Fri, 17 Sep 2021 03:37:32 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 33F8A6B0073; Fri, 17 Sep 2021 03:37:32 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0073.hostedemail.com [216.40.44.73]) by kanga.kvack.org (Postfix) with ESMTP id 22FA46B0071 for ; Fri, 17 Sep 2021 03:37:32 -0400 (EDT) Received: from smtpin38.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id B1EA339F53 for ; Fri, 17 Sep 2021 07:37:31 +0000 (UTC) X-FDA: 78596260302.38.DDE2253 Received: from mail-oo1-f54.google.com (mail-oo1-f54.google.com [209.85.161.54]) by imf09.hostedemail.com (Postfix) with ESMTP id 6B9EF3000100 for ; Fri, 17 Sep 2021 07:37:31 +0000 (UTC) Received: by mail-oo1-f54.google.com with SMTP id m11-20020a056820034b00b0028bb60b551fso2920052ooe.5 for ; Fri, 17 Sep 2021 00:37:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=aQOBAzx61rxkAJlbfySF/J/85hdhSWWhYmV+y8XbxvE=; b=pUoAu88SY8U1MOfSP6sDOznVRZ7O9qkqubIKlZmrDRC9OYjqM6aco+z6mu+vSNHYCx i8/CSdKH2JR1uPYrwJ66v7cKQr/ORNOdp4y+gVjf1RS69RQxPdaVM6+PGW6yflpvuSmN JmjyZxxTK2EkW4IldxIF3rZZMRNK8sy5BVJIZZ0Cft+LQVf7UDKX1qmQuJ8UrEvTXB2P z+gR5MYxtSB9roVemY75n8wRu3YscVtAaPGBDISBHiOfhoYOv1lY9MIifaXqrYZTH24O Z+HkLaoIrdTS7woh/cpiiU1Uyc+pSiR004I8M7ThOxfPHxmwSk26YeI6oAvvJU3ZnE2Q DdRQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=aQOBAzx61rxkAJlbfySF/J/85hdhSWWhYmV+y8XbxvE=; b=RdQVEU26NW5XhDUMnby7qMboYWhFVTAbtEJwTq8S0zwVAC/XgyLBQ9w9J8+34HtuJY /24i8s6mavYgPIX5rdGuj0cZSFiUapGLQXbmwEEYmLYs/M4dN/Tu8+x8n62iqN8ds/1V ZcjNNuewmor/8DKcq9i8aarjn4sPFIfVWc6T7ojjqBsJQvKOfzorB5azrHfLxzwCaabK lE3Tv6elXvQznct/zJELl1W6eYO4ooBZQ5/pWrXCIEIJkUmyTWdeIdVDHi7jpM1kOK9v 2XofTx2HB8t/plnObCe/ldAXTeJgTfPaMcaPua5ZkjGem8+QV9jeehjVwmqC9AkHUprp aDIw== X-Gm-Message-State: AOAM533+NB4rbmKWTYNtMW7Mrp51P7gHiH61oX2IcYCm6ANjzZz3sOl5 9HkoUy2y+q/q0YJ1h14SObeJgp0PJFYA2Hu2VxwvjA== X-Google-Smtp-Source: ABdhPJzKu9jnN9LF4n9wXd3gr6Z0XobhD4/UPpM0onxRRWMNR54YLtcukQcBG9X8BDHtc+AfVCoSZGY6KAK8la/PBb0= X-Received: by 2002:a4a:b64b:: with SMTP id f11mr7779543ooo.18.1631864250191; Fri, 17 Sep 2021 00:37:30 -0700 (PDT) MIME-Version: 1.0 References: <0000000000006f0bec05cc2be7dc@google.com> In-Reply-To: <0000000000006f0bec05cc2be7dc@google.com> From: Dmitry Vyukov Date: Fri, 17 Sep 2021 09:37:19 +0200 Message-ID: Subject: Re: [syzbot] BUG: soft lockup in call_usermodehelper_exec_async To: syzbot , Linux ARM , Will Deacon Cc: akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, syzkaller-bugs@googlegroups.com Content-Type: text/plain; charset="UTF-8" Authentication-Results: imf09.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=pUoAu88S; spf=pass (imf09.hostedemail.com: domain of dvyukov@google.com designates 209.85.161.54 as permitted sender) smtp.mailfrom=dvyukov@google.com; dmarc=pass (policy=reject) header.from=google.com X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 6B9EF3000100 X-Stat-Signature: wfd4jsmtjmhk58ewgtmt7mfuhkeiqnns X-HE-Tag: 1631864251-476066 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Fri, 17 Sept 2021 at 09:30, syzbot wrote: > > Hello, > > syzbot found the following issue on: > > HEAD commit: 8cae8cd89f05 seq_file: disallow extremely large seq buffer.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=135dbd12300000 > kernel config: https://syzkaller.appspot.com/x/.config?x=548fbb1e84c1808e > dashboard link: https://syzkaller.appspot.com/bug?extid=c3963f4f025fa5dfb78b > compiler: aarch64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.1 > userspace arch: arm > > Unfortunately, I don't have any reproducer for this issue yet. > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+c3963f4f025fa5dfb78b@syzkaller.appspotmail.com > > watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [kworker/u4:5:21352] > Modules linked in: > irq event stamp: 196 > hardirqs last enabled at (195): [] exit_to_kernel_mode+0x38/0x230 arch/arm64/kernel/entry-common.c:71 > hardirqs last disabled at (196): [] enter_el1_irq_or_nmi+0x10/0x20 arch/arm64/kernel/entry-common.c:113 > softirqs last enabled at (116): [] _stext+0x9a4/0x1050 > softirqs last disabled at (51): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] > softirqs last disabled at (51): [] invoke_softirq kernel/softirq.c:439 [inline] > softirqs last disabled at (51): [] __irq_exit_rcu+0x470/0x520 kernel/softirq.c:636 > CPU: 1 PID: 21352 Comm: kworker/u4:5 Not tainted 5.14.0-rc2-syzkaller-00001-g8cae8cd89f05 #0 > Hardware name: linux,dummy-virt (DT) > pstate: 00000005 (nzcv daif -PAN -UAO -TCO BTYPE=--) > pc : clear_page+0x14/0x28 arch/arm64/lib/clear_page.S:23 > lr : clear_highpage include/linux/highmem.h:184 [inline] > lr : kernel_init_free_pages.part.0+0x6c/0x17c mm/page_alloc.c:1283 > sp : ffff800018c67380 > x29: ffff800018c67380 x28: 0000000000000000 x27: ffff00007fc11ec0 > x26: ffff00000fe7aef8 x25: ffff600001fcf5df x24: 00000000000014b8 > x23: ffff00000fe79a40 x22: fffffc0000171340 x21: ffff800015706c40 > x20: dfff800000000000 x19: fffffc0000171300 x18: ffff00006aa70bc8 > x17: ffff800055045000 x16: ffff800018598000 x15: ffff000010dd0600 > x14: 1ffff0000318ce3a x13: 0000000000000014 x12: ffff7f800002e267 > x11: 1fffff800002e266 x10: ffff7f800002e266 x9 : 0000000000000000 > x8 : ffff600000b89a00 x7 : 0000000000000000 x6 : 000000000000003f > x5 : 0000000000000040 x4 : 1ffff0000304db70 x3 : 1fffe00001fcf349 > x2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff000005c4ca40 > Call trace: > clear_page+0x14/0x28 arch/arm64/lib/clear_page.S:21 > kernel_init_free_pages mm/page_alloc.c:1280 [inline] > post_alloc_hook+0x1ac/0x25c mm/page_alloc.c:2423 > prep_new_page mm/page_alloc.c:2433 [inline] > get_page_from_freelist+0x1840/0x2310 mm/page_alloc.c:4166 > __alloc_pages+0x1a8/0x2234 mm/page_alloc.c:5388 > alloc_pages_vma+0xb4/0x4dc mm/mempolicy.c:2208 > alloc_zeroed_user_highpage_movable+0x9c/0xd0 arch/arm64/mm/fault.c:939 > do_anonymous_page mm/memory.c:3767 [inline] > handle_pte_fault mm/memory.c:4547 [inline] > __handle_mm_fault+0xcbc/0x25e4 mm/memory.c:4684 > handle_mm_fault+0x1dc/0x4ec mm/memory.c:4782 > faultin_page mm/gup.c:951 [inline] > __get_user_pages+0x3e4/0x744 mm/gup.c:1173 > __get_user_pages_locked mm/gup.c:1359 [inline] > __get_user_pages_remote+0x10c/0x500 mm/gup.c:1865 > get_user_pages_remote+0x28/0x40 mm/gup.c:1938 > get_arg_page+0x9c/0x1bc fs/exec.c:220 > copy_string_kernel+0x170/0x294 fs/exec.c:631 > kernel_execve+0x1ac/0x380 fs/exec.c:1961 > call_usermodehelper_exec_async+0x260/0x460 kernel/umh.c:112 > ret_from_fork+0x10/0x18 arch/arm64/kernel/entry.S:782 +linux-arm-kernels This is caused by broken CONFIG_CMDLINE support on arm64, for context see: https://lore.kernel.org/lkml/CACT4Y+a4S-oXsjgwDh3SmERqKFF1QbapvX6NiSpn51KRtqvTiQ@mail.gmail.com/ syzbot should use 150s stall timeout, but it got's default 20s which produces false positive flakes. #syz dup: BUG: soft lockup in handle_mm_fault (2)