Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1261308imm; Fri, 13 Jul 2018 14:59:43 -0700 (PDT) X-Google-Smtp-Source: AAOMgpflCllsfhDaLCVYNx7eg2tnkdl7hmHVQFzclNeb+h7MHu228NkwKLMbo1jtyoA0wl//ZkNH X-Received: by 2002:a65:6109:: with SMTP id z9-v6mr7576946pgu.243.1531519183943; Fri, 13 Jul 2018 14:59:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531519183; cv=none; d=google.com; s=arc-20160816; b=V9fTvIyRgI3EYRsSpHAswgtHCzU6W1YhDvbXOuBTB+tctNo1lAE8EnJtvLututqEbg fTew21VZjXPhUzVAnXV3CchyQNYVHd/JM9nTb0hI+WBZQpe42sfa8ZTKs8OFx9zjpvyy Q1/LIsczlmrKay0kwj0TdZBK92Q3Ux6xqRow9Y9q7I2VPsgjHqBCqbl5PIEUYQHIDSOu Ylj0lcyuEKYv9lSmQWaQBNkj60yzUIdew/6SLpvdE53Qw5HHdgnzrMDGdd6xffNFz3FG o6ksuP+PJxwyjytLjfzUlJjQzp1zYvip/861iG6aYobyFbJhu1XjuT36ZeMNubMLYJ6J trQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=lKascPpFEUJWns7W/TsC1szumsC1Uw9Vf2x1NgK3Iw0=; b=rqT/7H3mvQxLi67+siJuZOp2G9jde9NKJTE3JC3UfBki0ySatRxbDypSv0+Gj5srUk 0WIJHPt0fzRckgSv2V9WC3a47+84myTuc9C5ZnltKnqX8ym+HV+9+hjP4vUmBA0KPMUi UEPDaIMEUTHF4bJ0Bgdw5+QdhWFZZ27VZ7xYlpnImhLBXqz/CZHqrefyhcpHuJ4nosSd 4fzJwZe0VGQw85EL1xJMXAA3Ul8Z8kEKwZHBdDcPtrE49Eh4OM6Pgmzr68U1aoTuRLWB T41fLaodc1XKThV5TPffa8FS/Zv8RLRplLyqS9mLzD/x3683CQNxNPGlRiadsP31BX3U 6pKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z10-v6si23929492pgo.412.2018.07.13.14.59.28; Fri, 13 Jul 2018 14:59:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731949AbeGMWOm (ORCPT + 99 others); Fri, 13 Jul 2018 18:14:42 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38950 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727482AbeGMWOm (ORCPT ); Fri, 13 Jul 2018 18:14:42 -0400 Received: from akpm3.svl.corp.google.com (unknown [104.133.9.92]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 42913BAE; Fri, 13 Jul 2018 21:58:12 +0000 (UTC) Date: Fri, 13 Jul 2018 14:58:11 -0700 From: Andrew Morton To: syzbot Cc: adobriyan@gmail.com, gs051095@gmail.com, jhugo@codeaurora.org, jpoimboe@redhat.com, lauraa@codeaurora.org, linux-kernel@vger.kernel.org, linux@dominikbrodowski.net, mingo@kernel.org, rostedt@goodmis.org, syzkaller-bugs@googlegroups.com, tglx@linutronix.de, thomas.lendacky@amd.com Subject: Re: unexpected kernel reboot (3) Message-Id: <20180713145811.683ffd0043cac26a5a5af725@linux-foundation.org> In-Reply-To: <000000000000eb546f0570e84e90@google.com> References: <000000000000eb546f0570e84e90@google.com> X-Mailer: Sylpheed 3.6.0 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 13 Jul 2018 14:39:02 -0700 syzbot wrote: > Hello, > > syzbot found the following crash on: hm, I don't think I've seen an "unexpected reboot" report before. Can you expand on specifically what happened here? Did the machine simply magically reboot itself? Or did an external monitor whack it, or... Does this test distinguish from a kernel which simply locks up? > HEAD commit: 1e4b044d2251 Linux 4.18-rc4 > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=17c6a6d0400000 > kernel config: https://syzkaller.appspot.com/x/.config?x=25856fac4e580aa7 > dashboard link: https://syzkaller.appspot.com/bug?extid=cce9ef2dd25246f815ee > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=165012c2400000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1571462c400000 I assume the "C reproducer" is irrelevant here. Is it reproducible? > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+cce9ef2dd25246f815ee@syzkaller.appspotmail.com > > output_len: 0x00000000092459b0 > kernel_total_size: 0x000000000a505000 > trampoline_32bit: 0x000000000009d000 > > Decompressing Linux... Parsing ELF... done. > Booting the kernel. > [ 0.000000] Linux version 4.18.0-rc4+ (syzkaller@ci) (gcc version 8.0.1 > 20180413 (experimental) (GCC)) #138 SMP Mon Jul 9 10:45:11 UTC 2018 > [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 > console=ttyS0 earlyprintk=serial vsyscall=native rodata=n > ftrace_dump_on_oops=orig_cpu oops=panic panic_on_warn=1 nmi_watchdog=panic > panic=86400 workqueue.watchdog_thresh=140 kvm-intel.nested=1 > > ... > > regulatory database > [ 4.519364] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' > [ 4.520839] platform regulatory.0: Direct firmware load for > regulatory.db failed with error -2 > [ 4.522155] cfg80211: failed to load regulatory.db > [ 4.522185] ALSA device list: > [ 4.523499] #0: Dummy 1 > [ 4.523951] #1: Loopback 1 > [ 4.524389] #2: Virtual MIDI Card 1 > [ 4.825991] input: ImExPS/2 Generic Explorer Mouse as > /devices/platform/i8042/serio1/input/input4 > [ 4.829533] md: Waiting for all devices to be available before autodetect > [ 4.830562] md: If you don't use raid, use raid=noautodetect > [ 4.835237] md: Autodetecting RAID arrays. > [ 4.835882] md: autorun ... > [ 4.836364] md: ... autorun DONE. Can we assume that the failure occurred in or immediately after the MD code, or might some output have been truncated? It would be useful to know what the kernel was initializing immediately after MD. Do you have a kernel log for the same config when the kerenl didn't fail? Or maybe enable initcall_debug?