Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3621255pxk; Tue, 29 Sep 2020 01:36:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxsOr5XKn7lQ78RZelztRnTtSH+M22LFmFyASHvsepVmYzvb3QNt8alN4aswRNakkjU1S6I X-Received: by 2002:aa7:d815:: with SMTP id v21mr2095174edq.56.1601368572724; Tue, 29 Sep 2020 01:36:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601368572; cv=none; d=google.com; s=arc-20160816; b=QlWrTqzUvmu32+ldOPicve5hAXvnAcHu6xe5yVbn5wVdzISF+GrnIn0HwAeNJ+iioC sXo8/kofoeubZnIK2eA2yF8axKPme7eOWdnZjRDOsKehYbxEl0KV8oqHbpkwh9uxNXdc p4K1IxTO+9SxLG/2i4GbXbTOG3E0cKUHWerHTDh+9KNNnHYzDX67UewqtjNwz3siWHa2 28cqh075LQI+jA4UukXssC5gqS/pKV9MNIgKRgqoCaM5RGyYBqGwhNoshFkEdSH+EVcv a9uAn/DTsN+tL53BTs9/G9FoRhYB0i+1Jv8Zx3IBFXfQyO52mzUtByRh31A6MdHwBQUT vdlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=zRkl9psdawzE3dNwfpL675Lq6bA7FNwxEYbUX2Cq0Jc=; b=R7jCv7taPZVhhP4fID9urJoIB11sRVpGVxm0woY/p8C0gL989xphQMsaDE5tdbLLHN aiFFpZUw1kqngqRfs98ubI2VFH4Gbku5ZX8NznL3KtbSUfnxRGiRviQQEffJJxjcTtv7 0e/AmMdUrCum59MEpOhTx30SHDPccjbg4g439rydnSQbIdMoYPS3kUXlYWzZkncOtlK5 28xePPTDEzjQERk0Ty2LJVkQYZMJ6GBzBAs3NgW95yTVA1ebYU1Z5k4cuq5qG6UJYHru oJBSumFSQE/BuwDYlSZpTY7pcb/BTSmohJdvTcO+g4hULGv4jviu9RYs8KSGegMu0u0B e5Jw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=ApxB9Ise; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p13si2178611ejx.235.2020.09.29.01.35.49; Tue, 29 Sep 2020 01:36:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=ApxB9Ise; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727756AbgI2Idq (ORCPT + 99 others); Tue, 29 Sep 2020 04:33:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37706 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727484AbgI2Idq (ORCPT ); Tue, 29 Sep 2020 04:33:46 -0400 Received: from mail.skyhub.de (mail.skyhub.de [IPv6:2a01:4f8:190:11c2::b:1457]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3773FC061755 for ; Tue, 29 Sep 2020 01:33:46 -0700 (PDT) Received: from zn.tnic (p200300ec2f0ead00a43ad9adcc23f8e0.dip0.t-ipconnect.de [IPv6:2003:ec:2f0e:ad00:a43a:d9ad:cc23:f8e0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 86BC31EC0380; Tue, 29 Sep 2020 10:33:44 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1601368424; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=zRkl9psdawzE3dNwfpL675Lq6bA7FNwxEYbUX2Cq0Jc=; b=ApxB9IseuUOLN/z0/ymlpfm6pRayqf3cLQH1B1wqjKIHsuqzc9SMIiz8ohjVxlJFI7EdiX zze4XjkydM0s9x4lcS8irgJKE6AK9jSPwF8P3QSvcXajSGfWUoZAzwIR0bNYEyO0koqYCG NRKjvMnIyTQhmg1pVZ8mRqxoHF9lBgA= Date: Tue, 29 Sep 2020 10:33:36 +0200 From: Borislav Petkov To: Dmitry Vyukov Cc: Alexander Potapenko , Marco Elver , syzbot , Arnaldo Carvalho de Melo , Alexander Shishkin , "H. Peter Anvin" , Jiri Olsa , LKML , Mark Rutland , Ingo Molnar , Namhyung Kim , Peter Zijlstra , syzkaller-bugs , Thomas Gleixner , the arch/x86 maintainers , clang-built-linux Subject: Re: general protection fault in perf_misc_flags Message-ID: <20200929083336.GA21110@zn.tnic> References: <00000000000052569205afa67426@google.com> <20200927145737.GA4746@zn.tnic> <20200928083819.GD1685@zn.tnic> <20200928085401.GE1685@zn.tnic> <20200928202353.GI1685@zn.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200928202353.GI1685@zn.tnic> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 28, 2020 at 10:23:53PM +0200, Borislav Petkov wrote: > 2020/09/28 22:21:01 VMs 3, executed 179, corpus cover 11792, corpus signal 10881, max signal 19337, crashes 0, repro 0 Ok, so far triggered two things: WARNING in f2fs_is_valid_blkaddr 1 2020/09/29 10:27 reproducing WARNING in reiserfs_put_super 1 2020/09/28 22:42 you've probably seen them already. Anyway, next question. Let's say I trigger the corruption: is there a way to stop the guest VM which has triggered it so that I'm able to examine it with gdb? What about kdump? Can I dump the guest memory either with kdump or through the qemu monitor (I believe there's a command to dump memory) so that it can be poked at? Because as it is, we don't have a reproducer and as I see it, the fuzzing simply gets restarted: 2020/09/29 10:27:03 vm-3: crash: WARNING in f2fs_is_valid_blkaddr ... 2020/09/29 10:27:05 loop: phase=1 shutdown=false instances=1/4 [3] repro: pending=0 reproducing=1 queued=1 2020/09/29 10:27:05 loop: starting instance 3 so it would be good to be able to say, when a vm encounters a crash, it should be stopped immediately so that the guest can be examined through qemu's gdb interface, i.e., -gdb tcp:: or so? Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette