Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp318153imm; Thu, 7 Jun 2018 19:32:54 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKgyg68ysgQbHP27Qs8RkZY1hPN1hqaMjtWxpm3pNehg86TGEFk3cZLsRSuGdclBl7NiDSe X-Received: by 2002:a17:902:26:: with SMTP id 35-v6mr4578400pla.276.1528425174691; Thu, 07 Jun 2018 19:32:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528425174; cv=none; d=google.com; s=arc-20160816; b=OZZm8fHLyKe8yogx6pWiFBGIHQUPB5hHe1s9FNGfPWJL8FZbzHqkz40lzhHoBOts5f 5lVvHkBd52A4KNhZ2NbSnBmD1nUF/1kIt0Qyo7zU89VQjEcfxylz+5Y3TXd0oZqOjupy kkAgeH7C0bvao/ZqQV4LDbiYppnDMIrTQiKfqC862342p8abVa2ZsKxuHcTTENuK3zni xRv7DpeVQAg6Gtl+TEFYSAj62OskwbF4uNHjwZRteVocqnG3msQiY0bO3ohVcQN2xUp0 5zWBPMcOq6VTVXaRPJvN2swYLHhRw8oEZAEjjbAn25acGIF0g1Iai/LnVqFrb30eeERv k+3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :references:date:mime-version:cc:to:from:subject:message-id :arc-authentication-results; bh=l0FAZJO7WgOaiAC3IDJbfCa9En+WoO0ACuAWa88mwP0=; b=0DwliSuHT4VHPBvmfCtUjXgphE144Yrj7QKuIfN63MWiu0Xe43WdmcddMJONc8QU2C cSKN302hdBYftg2YMqoV9z8YRpcouEHI1CL1MtdqxycGGtSAFxbaNl+1jY3VD/zlpxiQ BaPWeLc4GHRhrzYTlAwNBpiOJOX7mTff0cBYXpdn/Ovq4PpHxgkUmWyPqmM+dlq7MbUO wauHzpAUvCwDBPyLeG8z4nLL+p2P7tOqcuDfxDA1dAzfCYEAxVpYXw7vCZIUySGe2Ojj hvj9U92ujNiJIQQcEB47Q2053+XSEyEKVYVISA/3fZQG6QKgxMYlSXVnYm9zaBDJ4Lxq Fudg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2-v6si6843478pfl.133.2018.06.07.19.32.39; Thu, 07 Jun 2018 19:32:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752692AbeFHCcO (ORCPT + 99 others); Thu, 7 Jun 2018 22:32:14 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:61003 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752385AbeFHCcM (ORCPT ); Thu, 7 Jun 2018 22:32:12 -0400 Received: from fsav103.sakura.ne.jp (fsav103.sakura.ne.jp [27.133.134.230]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id w582VIoF021014; Fri, 8 Jun 2018 11:31:18 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav103.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav103.sakura.ne.jp); Fri, 08 Jun 2018 11:31:18 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav103.sakura.ne.jp) Received: from www262.sakura.ne.jp (localhost [127.0.0.1]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id w582VIWu021010; Fri, 8 Jun 2018 11:31:18 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: (from i-love@localhost) by www262.sakura.ne.jp (8.15.2/8.15.2/Submit) id w582VIRn021009; Fri, 8 Jun 2018 11:31:18 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Message-Id: <201806080231.w582VIRn021009@www262.sakura.ne.jp> X-Authentication-Warning: www262.sakura.ne.jp: i-love set sender to penguin-kernel@i-love.sakura.ne.jp using -f Subject: Re: general protection fault in =?ISO-2022-JP?B?d2Jfd29ya2ZuICgyKQ==?= From: Tetsuo Handa To: Dmitry Vyukov Cc: Jens Axboe , Jan Kara , syzbot , syzkaller-bugs , linux-fsdevel , LKML , Al Viro , Tejun Heo , Dave Chinner , linux-block@vger.kernel.org, Linus Torvalds MIME-Version: 1.0 Date: Fri, 08 Jun 2018 11:31:18 +0900 References: <95865cab-e12f-d45b-b6e3-465b624862ba@i-love.sakura.ne.jp> In-Reply-To: Content-Type: text/plain; charset="ISO-2022-JP" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dmitry Vyukov wrote: > On Tue, Jun 5, 2018 at 3:45 PM, Tetsuo Handa > wrote: > > Dmitry, can you assign VM resources for a git tree for this bug? This bug wants to fight > > against https://github.com/google/syzkaller/blob/master/docs/syzbot.md#no-custom-patches ... > > Hi Tetsuo, > > Most of the reasons for not doing it still stand. A syzkaller instance > will produce not just this bug, it will produce hundreds of different > bugs. Then the question is: what to do with these bugs? Report all to > mailing lists? Is it possible to add linux-next.git tree as a target for fuzzing? If yes, we can try debug patches easily, in addition to find bugs earlier than now. > I think the solution here is just to run syzkaller instance locally. > It's just a program anybody can run it on any kernel with any custom > patches. Moreover for local instance it's also possible to limit set > of tested syscalls to increase probability of hitting this bug and at > the same time filter out most of other bugs. If this bug is reproducible with VM resources individual developer can afford... Since my Linux development environment is VMware guests on a Windows PC, I can't run VM instance which needs KVM acceleration. Also, due to security policy, I can't utilize external VM resources available on the Internet, as well as I can't use ssh and git protocols. Speak of this bug, even with a lot of VM instances, syzbot can reproduce this bug only once or twice per a day. Thus, the question for me boils down to, whether I can reproduce this bug using one VMware guest instance with 4GB of memory. Effectively, I don't have access to environments for running syzkaller instance... > > Do we have any idea about the guilty subsystem? You mentioned > bdi_unregister, why? What would be the set of syscalls to concentrate > on? > I will do a custom run when I get around to it, if nobody else beats me to it. Because bdi_unregister() does "bdi->dev = NULL;" which wb_workfn() is hitting NULL pointer dereference.