Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1149961imm; Wed, 23 May 2018 11:03:42 -0700 (PDT) X-Google-Smtp-Source: AB8JxZr1KFmbN5G6zgDDAX8vxbNdqwdnLqo5snD4o8n/DSMqicR2gE6IhXaS37ANbyXQLcJtHm4O X-Received: by 2002:a17:902:224:: with SMTP id 33-v6mr3847410plc.309.1527098622500; Wed, 23 May 2018 11:03:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527098622; cv=none; d=google.com; s=arc-20160816; b=k8et7rdU2M8BG9yw4VKuPjBddfNU2Y8lIG30TZMVm5oTKQw5jYGGT5SX6WtvQpjfCT Lng7l2khPpPqgesIDlg1J61bpPjhFF2GAXLn74qISpsROL1wxFtDI45vLdnZZHxm6iLK 7YNGyRw0zD6Dm8nS2qSKAnffiL0eTVvQe90z7MVcwt1h9llQ0QHUEulRI8D3mNQ3yeAK 31uh2/Zzv7PmqStjzR0QYaJ5Re846Qvo2kvjTTlyJygxLEtq0VfJMoTZgkDoAi1nx72b xGdVd0Bp4Lv1xnzCUbQI23O6Dphe2dT6rhSUw4IM1vLhNvAKgQYHgaQzUyDud+Rux5jE aj+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=DFMvaZGYprXfIlDq0NbG6HJhmAmrk6ksZV5SGHNY6JM=; b=hGWSwAyMnSh00xeZS7qYqqtAoVG3UY6FIGCTDtdIzjL7oihGehGtSWM0mHpKBJfqzt IyN+sIBXAiEhHZ2gnD1yjuXFIQ4RFp46A9cRwg/+MQuVNo332pa88fHtw8XkTYlEVt3g UKzGvm3pMtg0z8q6ka8LX1/xyuLGoIL+ex1TtHnsrREaFl0bk+Zer8jZtRg5W+2k3bpa WkuesnrtawHvK99NOzAZxgds4njKK7F+lpWF+9RMNccQjKF4MWG0ooi+D44yR3Ko5wqI wVw/dwF2I2d//VsJ140D/qtnxbLt2JcqXNO9LE4RBeE7TcQjSEkK4qKvQrM2O8ZBsMVk 1Yug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sandeen.net Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u14-v6si19403262pfa.84.2018.05.23.11.03.25; Wed, 23 May 2018 11:03:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sandeen.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754726AbeEWSCC (ORCPT + 99 others); Wed, 23 May 2018 14:02:02 -0400 Received: from sandeen.net ([63.231.237.45]:56092 "EHLO sandeen.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750771AbeEWSCB (ORCPT ); Wed, 23 May 2018 14:02:01 -0400 Received: from [10.0.0.4] (liberator [10.0.0.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by sandeen.net (Postfix) with ESMTPSA id B813B450AAD; Wed, 23 May 2018 13:01:46 -0500 (CDT) Subject: Re: INFO: task hung in xlog_grant_head_check To: Eric Biggers , "Darrick J. Wong" Cc: Dave Chinner , Brian Foster , syzbot , linux-kernel@vger.kernel.org, linux-xfs@vger.kernel.org, syzkaller-bugs@googlegroups.com References: <000000000000457b2d056cbb0044@google.com> <20180522123107.GC3751@bfoster.bfoster> <20180522222620.GW23861@dastard> <20180522225208.GB658@sol.localdomain> <20180523074425.GM14384@magnolia> <20180523162015.GA3684@sol.localdomain> From: Eric Sandeen Message-ID: Date: Wed, 23 May 2018 13:01:59 -0500 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180523162015.GA3684@sol.localdomain> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/23/18 11:20 AM, Eric Biggers wrote: > Hi Darrick, ... > Now, if you *really* don't want syzbot to report XFS bugs as you believe XFS > contains known unfixable bugs or for other reasons, you can formally ask Dmitry > to remove CONFIG_XFS_FS from the syzbot config. But of course that doesn't make > the bugs go away, it just makes the bug reports go away; you'll have to fix them > eventually anyway, one way or another. I'd revise that to "have to fix /some/ of them anyway." What I'm personally hung up on are the bugs where the "exploit" involves merely mounting a crafted filesystem that in reality would never (until the heat death of the universe) corrupt itself into that state on its own; it's the "malicious image" case, which is quite different than exposing fundamental bugs like the SB_BORN race or or the user-exploitable ext4 flaw you mentioned in your reply. Those are more insidious and/or things which can be hit by real users in real life. I don't know if I can win the "malicious images aren't a critical security threat" battle, but I do think they are at least a different class of flaws, because as Dave said, mount is supposed to be a privileged operation. In a perfect world we'd fix them anyway, but I don't know that our resource pool can keep up with your google-scale bot and still make progress in other critical areas. Anyway, the upshot is that we're probably just not going to care much about V4 filesystem oops-or-hang-on-mount bugs. Those problems are solved (largely) with V5 filesystem format. Maybe I /will/ propose a system-wide tunable to disallow V4 for those who are worried about such things. To Darrick's points about more collaboration, I still wish that our requests for more traditional fs fuzzer reporting (i.e. a filesystem image) weren't met with such resistance.Tailoring your bug reports to the needs of the developer community you're interacting with seems like a pretty reasonable thing to do. As an aside, I wonder how much coverage of the V5 format code syzkaller /has/ achieved; that would be another useful datapoint google could provide - if syzkaller is in fact traversing the V5 codepaths and isn't turning anything up, that'd be pretty useful to know. Thanks, -Eric