linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [Bug] task hung in ret_from_fork in Linux v6.12
@ 2025-06-04  4:16 Luka
  2025-06-04  7:52 ` Mark Rutland
  0 siblings, 1 reply; 2+ messages in thread
From: Luka @ 2025-06-04  4:16 UTC (permalink / raw)
  To: Catalin Marinas, Will Deacon; +Cc: linux-arm-kernel, linux-kernel

Dear Kernel Maintainers,

I am writing to report a potential vulnerability identified in the
upstream Linux Kernel version v6.12, corresponding to the following
commit in the mainline repository:

Git Commit:  adc218676eef25575469234709c2d87185ca223a (tag: v6.12)

This issue was discovered during the testing of the Android 16 AOSP
kernel, which is based on Linux kernel version 6.12, specifically from
the AOSP kernel branch:

AOSP kernel branch: android16-6.12
Manifest path: kernel/common.git
Source URL:  https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12

Although this kernel branch is used in Android 16 development, its
base is aligned with the upstream Linux v6.12 release. I observed this
issue while conducting stability and fuzzing tests on the Android 16
platform and identified that the root cause lies in the upstream
codebase.


Bug Location: ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860

Bug Report: https://hastebin.com/share/xiyapaboxu.shell

Entire Log: https://hastebin.com/share/kibohuxobi.yaml


Thank you very much for your time and attention. I sincerely apologize
that I am currently unable to provide a reproducer for this issue.
However, I am actively working on reproducing the problem, and I will
make sure to share any findings or reproducing steps with you as soon
as they are available.

I greatly appreciate your efforts in maintaining the Linux kernel and
your attention to this matter.

Best regards,
Luka

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [Bug] task hung in ret_from_fork in Linux v6.12
  2025-06-04  4:16 [Bug] task hung in ret_from_fork in Linux v6.12 Luka
@ 2025-06-04  7:52 ` Mark Rutland
  0 siblings, 0 replies; 2+ messages in thread
From: Mark Rutland @ 2025-06-04  7:52 UTC (permalink / raw)
  To: Luka; +Cc: Catalin Marinas, Will Deacon, linux-arm-kernel, linux-kernel

On Wed, Jun 04, 2025 at 12:16:53PM +0800, Luka wrote:
> Dear Kernel Maintainers,
> 
> I am writing to report a potential vulnerability identified in the
> upstream Linux Kernel version v6.12, corresponding to the following
> commit in the mainline repository:
> 
> Git Commit:  adc218676eef25575469234709c2d87185ca223a (tag: v6.12)

In the bug report linked below, the kernel identifies itself as:

  6.12.18-android16-1-maybe-dirty-4k #1

... which strongly suggests that (in addition to uncommitted changes),
the kernel is based on the v6.12.18 table kernel, i.e. commit:

  105a31925e2d (tag v6.12.18)

... in the upstream stable tree.

Please note that between v6.12 and v6.12.18 there are 3929 commits, any
of which could be significant to this issue.

As with the other report I replied on:

  https://lore.kernel.org/linux-arm-kernel/aD_zu4GNfOKxXXQk@J2N7QTR9R3/T/#t

... I do not think you are providing accurate details.

> This issue was discovered during the testing of the Android 16 AOSP
> kernel, which is based on Linux kernel version 6.12, specifically from
> the AOSP kernel branch:
> 
> AOSP kernel branch: android16-6.12
> Manifest path: kernel/common.git
> Source URL:  https://android.googlesource.com/kernel/common/+/refs/heads/android16-6.12
> 
> Although this kernel branch is used in Android 16 development, its
> base is aligned with the upstream Linux v6.12 release. I observed this
> issue while conducting stability and fuzzing tests on the Android 16
> platform and identified that the root cause lies in the upstream
> codebase.

Based on the information provided so far, I don't think this is true.
You have not identified the root cause, and you have not demonstrated
that the issue exists in the upstream tag you mention above.

Why do you believe that the root cause lies in the upstream codebase?

It's not clear which kernel specifically you're running, but I'm fairly
confident that it's not built from a recent commit in the android16-6.12
branch.

If the "v6.12.18" prefix in the kernel tree is accurate, then your
kernel is no newer than commit:

  b3fb80bdc64b ("Merge 6.12.19 into android16-6.12")

... in the android16-6.12 branch, and there are 1000+ commits since
then.

[...]

> Bug Location: ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860

This is misleading; ret_from_fork() has nothing to do with this hang.

Is this something you've guessed at yourself, or is this what syzkaller
reported to you?

In the linked bug, the kernel reports:

| INFO: task kworker/2:7:5593 blocked for more than 143 seconds.
|       Tainted: G            E      6.12.18-android16-1-maybe-dirty-4k #1
| "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
| task:kworker/2:7     state:D stack:0     pid:5593  tgid:5593  ppid:2      flags:0x00000008
| Call trace:
|  __switch_to+0x424/0x798 proc/self/cwd/common/arch/arm64/kernel/process.c:617
|  context_switch proc/self/cwd/common/kernel/sched/core.c:5911 [inline]
|  __schedule+0xa48/0x1018 proc/self/cwd/common/kernel/sched/core.c:7737
|  __schedule_loop proc/self/cwd/common/kernel/sched/core.c:7818 [inline]
|  schedule+0x54/0xdc proc/self/cwd/common/kernel/sched/core.c:7833
|  schedule_preempt_disabled+0x2c/0x4c proc/self/cwd/common/kernel/sched/core.c:7890
|  kthread+0x180/0x25c proc/self/cwd/common/kernel/kthread.c:382
|  ret_from_fork+0x10/0x20 proc/self/cwd/common/arch/arm64/kernel/entry.S:860

Note that ret_from_fork() is the assembly stub used to start any kernel
thread. Here it just means that a new kthread was started, and that has
blocked for some reaason in TASK_UNINTERRUPTIBLE state.

Whatever it's blocked on is due to code elsewhere.

Mark.

> 
> Bug Report: https://hastebin.com/share/xiyapaboxu.shell
> 
> Entire Log: https://hastebin.com/share/kibohuxobi.yaml
> 
> 
> Thank you very much for your time and attention. I sincerely apologize
> that I am currently unable to provide a reproducer for this issue.
> However, I am actively working on reproducing the problem, and I will
> make sure to share any findings or reproducing steps with you as soon
> as they are available.
> 
> I greatly appreciate your efforts in maintaining the Linux kernel and
> your attention to this matter.
> 
> Best regards,
> Luka
> 

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2025-06-04  7:52 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-06-04  4:16 [Bug] task hung in ret_from_fork in Linux v6.12 Luka
2025-06-04  7:52 ` Mark Rutland

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).