Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp578866img; Thu, 21 Mar 2019 04:44:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqwcyAitG/zDADEclkslFJIle+6HhhmmlsPdw+s6pgMMlEJqbjMFdIT3O7RRa5gmmTX2+7wg X-Received: by 2002:a17:902:a612:: with SMTP id u18mr3024171plq.145.1553168695086; Thu, 21 Mar 2019 04:44:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553168695; cv=none; d=google.com; s=arc-20160816; b=I4fWChTW5Nh2dQcsN1VSaSZVLBwViPZyyhbRZWM6+Cqg954TLHV8LiKjlCIcgf0swU ni+LjlVOtugdvV4e/6bbqtzkazRa2K+wyRmF98YzoPZRKBFJBEASZm0lkMt9aclM3Z6C OJDiIT90HfJ5oUdt1hgb/lX5SNv2I/GDRpC05UZcQOhFBl/3Nd2I7bSwxO4sSv3i3Gbs N6XULps7UCCH3MB3oQOHhOoppOSYWlvl5+9hllU7Afzki2rDRbbBXuVRfqw6+H9OvAR9 cRcAmEIFLRvd8ip24s9BGZWRxvRcI8BBshVRdTR8sQXKAFAI3zLHzwXrzRBpT+YQS6zm 5kHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=xHYr8QHX+M8WUZ12objTjq+YG4TSxlrOSSUHy8SeuxM=; b=Eofuq/qA8l5j9BDDYTCOqfT6UHzv3MLyjeNXFwVLQjGe77Da2+KXpTZGtX5sJ1mfkr Ug2uUFnPpjUGIc55Eow2Vrbim1RxxaiSFgABqP4CijmaazARmWDk2tooBsXsadSXeZGM 0E/Mdgc1Nehd7hgJ12AXTL81VYcoDHlN0f4O8Ihtx1Qc+Hs+B7wz4aCqfmxFanBa+VC4 4cPgTadSW8SjchyHjxsIw/BE2BOdn9nBgQ/1xVPbNE6lGHQdl3smJyQym/+zdT92V02z JGRwbMnAw613z1Iw9mquatebfCmF8OVpeRnHPS9s/ykXIl+h0J7npR5ZvVEDRXN1JANt A8Zg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y4si4038735pfy.157.2019.03.21.04.44.39; Thu, 21 Mar 2019 04:44:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728140AbfCULn5 (ORCPT + 99 others); Thu, 21 Mar 2019 07:43:57 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:41042 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727891AbfCULn4 (ORCPT ); Thu, 21 Mar 2019 07:43:56 -0400 Received: from fsav404.sakura.ne.jp (fsav404.sakura.ne.jp [133.242.250.103]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id x2LBfAnm057030; Thu, 21 Mar 2019 20:41:10 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav404.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav404.sakura.ne.jp); Thu, 21 Mar 2019 20:41:10 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav404.sakura.ne.jp) Received: from [192.168.1.8] (softbank126094122116.bbtec.net [126.94.122.116]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id x2LBf57M056987 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NO); Thu, 21 Mar 2019 20:41:10 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: kernel panic: corrupted stack end in wb_workfn To: Dmitry Vyukov , Andrey Ryabinin Cc: syzbot , Andrew Morton , Qian Cai , David Miller , guro@fb.com, Johannes Weiner , Josef Bacik , Kirill Tkhai , LKML , Linux-MM , linux-sctp@vger.kernel.org, Mel Gorman , Michal Hocko , netdev , Neil Horman , Shakeel Butt , syzkaller-bugs , Al Viro , Vladislav Yasevich , Matthew Wilcox , Xin Long References: <000000000000db3d130584506672@google.com> <426293c3-bf63-88ad-06fb-83927ab0d7c0@I-love.SAKURA.ne.jp> <315c8ff3-fd03-f2ca-c546-ca7dc5c14669@virtuozzo.com> From: Tetsuo Handa Message-ID: Date: Thu, 21 Mar 2019 20:41:04 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.5.3 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/03/21 18:51, Dmitry Vyukov wrote: >>> Lots of bugs (half?) manifest differently. On top of this, titles >>> change as we go back in history. On top of this, if we see a different >>> bug, it does not mean that the original bug is also not there. >>> This will sure solve some subset of cases better then the current >>> logic. But I feel that that subset is smaller then what the current >>> logic solves. >> >> Counter-examples come up in basically every other bisection. >> For example: >> >> bisecting cause commit starting from ccda4af0f4b92f7b4c308d3acc262f4a7e3affad >> building syzkaller on 5f5f6d14e80b8bd6b42db961118e902387716bcb >> testing commit ccda4af0f4b92f7b4c308d3acc262f4a7e3affad with gcc (GCC) 8.1.0 >> all runs: crashed: KASAN: null-ptr-deref Read in refcount_sub_and_test_checked >> testing release v4.19 >> testing commit 84df9525b0c27f3ebc2ebb1864fa62a97fdedb7d with gcc (GCC) 8.1.0 >> all runs: crashed: KASAN: null-ptr-deref Read in refcount_sub_and_test_checked >> testing release v4.18 >> testing commit 94710cac0ef4ee177a63b5227664b38c95bbf703 with gcc (GCC) 8.1.0 >> all runs: crashed: KASAN: null-ptr-deref Read in refcount_sub_and_test >> testing release v4.17 >> testing commit 29dcea88779c856c7dc92040a0c01233263101d4 with gcc (GCC) 8.1.0 >> all runs: crashed: KASAN: null-ptr-deref Read in refcount_sub_and_test > > > And to make things even more interesting, this later changes to "BUG: > unable to handle kernel NULL pointer dereference in vb2_vmalloc_put": > > testing release v4.12 > testing commit 6f7da290413ba713f0cdd9ff1a2a9bb129ef4f6c with gcc (GCC) 8.1.0 > all runs: crashed: general protection fault in refcount_sub_and_test > testing release v4.11 > testing commit a351e9b9fc24e982ec2f0e76379a49826036da12 with gcc (GCC) 7.3.0 > all runs: crashed: BUG: unable to handle kernel NULL pointer > dereference in vb2_vmalloc_put > > And since the original bug is in vb2 subsystem > (https://syzkaller.appspot.com/bug?id=17535f4bf5b322437f7c639b59161ce343fc55a9), > it's actually not clear even for me, if we should treat it as the same > bug or not. May be different manifestation of the same root cause, or > a different bug around. > Well, maybe we should use reproducers for checking whether each not-yet-fixed problem is reproducible with old kernels rather than finding specific commit that is causing specific problem? I think there are two patterns syzbot starts reporting. (a) a commit which causes one or more problems is merged into a codebase where syzbot was already testing because syzbot already knew what/how should that codebase be tested. (b) a commit which causes one or more problems was already there in a codebase where syzbot did not know until now what/how should that codebase be tested. (a) tends to require testing new kernels (i.e. bisection range is narrow) whereas (b) tends to require testing old kernels (i.e. bisection range is wide). Regarding case (b), it is difficult for developers to guess when the problem started, and I think that (b) tends to confuse automatic bisection attempts. Therefore, instead of trying to find specific commit for specific problem using "git bisect" approach, try running all reproducers (gathered from all problems) on each release (e.g. each git tag) and append reproduced crashes to the Manager Time Kernel Commit Syzkaller Config Log Report Syz repro C repro Maintainers table for each not-yet-fixed problem of dashboard interface. That is, if running a repro1 from problem1 on some old kernel reproduced a crash for problem2, append the crash to the problem2's table. Maybe we want to use a new table with only Kernel Commit Syzkaller Config Log Report Syz repro C repro entries because what we want to know is the oldest kernel release which helps guessing when the problem started.