Received: by 10.192.165.156 with SMTP id m28csp1752269imm; Tue, 17 Apr 2018 05:04:58 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+Ftmat41sTqC4xSq6YLKgn2JjS9NdAL8H8VJdxd4empy/spcUQY38k8hkrnj3xpv73u4bh X-Received: by 10.99.120.202 with SMTP id t193mr1395647pgc.255.1523966698438; Tue, 17 Apr 2018 05:04:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523966698; cv=none; d=google.com; s=arc-20160816; b=V31FVaBpN4op/9Bu3TFeWyB7PrnsIiU6wd8F2uFoHCTCDBiLJoyWrA0tLAFW0FaBJG uJFpxaHgqW3uwKT5Tw4znVmpvgq5tR35muDYOcAL6j0zAeD/ni228z6M8vPnW15nkMKT DMjgqgYu+vs/fHgfWpVRfwExoHgnw1Pz/TIK7XWzS28UTaImuFoo9h5BdW7pMQ1wZhzt QvlKawLZ+ueCwqmt07RhWZB+Hk8Rylv3MJD3oPOEdBw9aCmuFCkZwlIA+4gLusuuOcWo BITUK26Pf16bYwxcA95xYH100Cyp0EZdqTppkjpm3wLT6VEFyAmLQukzCN70Z9gq12RX TjLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=PU7vJk7wIMHRpD3O7L/mc99H1/9RtjxjMxnWGiP2r5o=; b=j13tBEswyU+NDIgWKRJXAuKy4wKE4pmNuP6kkx9pe7szMTMxRWu4IwLHNGu+Vw9rr1 2bqeo0BSeZYopMfQ6OqSCNwKQQUS82IpP2kc/gQVR0dwzTHtCaeE5HRapj7RvmIszTWb +UCfvdn27HyfZiMutMTrfoTSGvS0B8TnYvWPluH7oAaPbIz3tePIGOr3rsx+Db6kImyj qMOEXi6IIogGX42U1ohYetdJXVBO6FC9D0ocGfTDssSVTblpxJGeKFDvmQWzqdHsE2ki HfKv/ou7i8OsqGC4VcdIyt41WEY2thVzd66G3zmXYwUP5kjkIIzWK33oU0aHiR86anWc WMsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g1si2246757pgv.186.2018.04.17.05.04.39; Tue, 17 Apr 2018 05:04:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752888AbeDQMDJ (ORCPT + 99 others); Tue, 17 Apr 2018 08:03:09 -0400 Received: from mx2.suse.de ([195.135.220.15]:39020 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752707AbeDQMDI (ORCPT ); Tue, 17 Apr 2018 08:03:08 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 7D8EDAF61; Tue, 17 Apr 2018 12:03:06 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 3578B1E0531; Tue, 17 Apr 2018 14:03:06 +0200 (CEST) Date: Tue, 17 Apr 2018 14:03:06 +0200 From: Jan Kara To: Amir Goldstein Cc: Greg KH , Dexuan Cui , Jan Kara , Guillaume Morin , Haiyang Zhang , Pavlos Parissis , "stable@vger.kernel.org" , "jack@suse.com" , "linux-fsdevel@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "mszeredi@redhat.com" Subject: Re: kernel panics with 4.14.X versions Message-ID: <20180417120306.536sc3yzsndta5wb@quack2.suse.cz> References: <20180416132550.d25jtdntdvpy55l3@bender.morinfr.org> <20180416144041.t2mt7ugzwqr56ka3@quack2.suse.cz> <20180417103344.GB8445@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 17-04-18 14:48:35, Amir Goldstein wrote: > On Tue, Apr 17, 2018 at 1:33 PM, Greg KH wrote: > > On Mon, Apr 16, 2018 at 09:10:35PM +0000, Dexuan Cui wrote: > >> > From: Jan Kara > >> > Sent: Monday, April 16, 2018 07:41 > >> > ... > >> > How easily can you hit this? Are you able to run debug kernels / inspect > >> > crash dumps when the issue occurs? Also testing with the latest mainline > >> > kernel (4.16) would be welcome whether this isn't just an issue with the > >> > backport of fsnotify fixes from Miklos. > >> > >> It's not easy for us to reproduce the fsnotify() lockup issue, and actually > >> we still don't have an easy & reliable way to reproduce it. > >> > >> According to our tests, v4.16 doesn't have the issue. > >> And v4.15 doesn't have the issue either, if I recall correctly. > >> I only know the issue happens to v4.14.x and 4.13.x kernels > > > > Any chance to run 'git bisect' between 4.14 and 4.15 to find the fix? > > > > Looking at the changes between 4.14 and 4.15, that are not in 4.14.32, > the only viable suspects are: > 9cf90cef362d fsnotify: Protect bail out path of fsnotify_add_mark_locked() > properly > 3427ce715541 fsnotify: clean up fsnotify() > > Both don't claim to fix a known issue. Yeah, and the second one is just a code refactorization and I don't see how the first fix could lead to anything like what's reported. So I don't think picking these to 4.14 stable is really the right solution. We first need to understand what's going wrong. Honza -- Jan Kara SUSE Labs, CR