Received: by 2002:a05:7412:3290:b0:fa:6e18:a558 with SMTP id ev16csp92028rdb; Thu, 25 Jan 2024 09:05:59 -0800 (PST) X-Google-Smtp-Source: AGHT+IFOhPJ3ROo/eKWYBqybL9iNfh8WdGqGzaELLoSntagFI/jfyfSGqu1N3YycUUbYcUVaGluu X-Received: by 2002:a05:6a20:8b84:b0:19c:6f85:3f32 with SMTP id m4-20020a056a208b8400b0019c6f853f32mr1184011pzh.119.1706202358812; Thu, 25 Jan 2024 09:05:58 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706202358; cv=pass; d=google.com; s=arc-20160816; b=jcfrUkBKJ1mw83eCiTww6gXBWi02WqxbQlSz0G4Cs4GdK4vsuRqK+uQTzKZzCBZ6Y+ lBRzjDl/wyDbuVxQudMucuV4dVB8yLrARPMIJBZXyGGjf7LV9T/q5mdRsjS5ZdECNHtX jSrtTetAnVDPrLA46xnPpqKGp2ZqX67rcF97AEKKN7Y5K6DjCocoisDjvKSwuSkItYji B9/y3HhWuNsauNiAe6Wi9Fd+A7zy7loAwOuqnbx8je1epDyY2cFGFHeng1lyxa9fH2Sl FThl/8n8thF7f9uRkN8Nb7agVm2Uuuz/N+YlDHhnvgQNtfK3sUgfMghwewwYvM5N1Bxn 4sJg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=VSYrARtztMQ5QyA5O83DKp4hb9mYKZbzbubozk4O0YI=; fh=9DXzNYsNw+YdjoSJkjk+xEL+ByCN0rMbeba8Ib6T04k=; b=cf+5orCfU/gp61kmgpoex4jZ1qfh7wQ6YaCjqZEKfW7Rzx7YRplIUYD8ZM5qimyn3q AFSvFcnRuIVe681gt975zSP3uSHKXq5TiyM6jNzXs5yCLAw5Xvpstny73n1lvHJEt2NV vFrYfNOuEkOhxLeWl7Yd/i7ZCtfwQKKorgDQymwoQGLJ44IwnV5haFMXQD2bXvbisIP1 2VvzSKJnWzuPRN8WCwsMEuzSvUgQHzuLvFkbjxSugzygPPEeIv4aTyImMvQ8ADXSujzb EAMb1xytl7ame0zJJBZGpl5qUgVVcQdG+UhBhdgmEqhWd1y/fRD924OJOKtD9hZouJaQ iGzQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=j2Jv9J93; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-38974-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-38974-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id c1-20020a63d501000000b005c69365abc9si13794627pgg.687.2024.01.25.09.05.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 25 Jan 2024 09:05:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-38974-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=j2Jv9J93; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-38974-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-38974-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 147662980EC for ; Thu, 25 Jan 2024 17:05:23 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 35D951419B4; Thu, 25 Jan 2024 16:55:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="j2Jv9J93" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 564AF136656; Thu, 25 Jan 2024 16:55:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706201723; cv=none; b=BapWVg0dmlMZYgiR8Sstp0Zo46X0IZmvuAt5+FCRLWnH27UTpmAziOHqddLIl3GPG6U5Rqgusql0Y4MmRjER2KvMDSUADyizwn6guy6MYJWnPoVsAHeYlKxr6lNmlqs5OCW60Ptmw4oCeLDI5ADrLyH2tKShHU2IglUf0JkF/rU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706201723; c=relaxed/simple; bh=pzjRcCGvrsjo3wuH+LeThDxqSyRY109U181HGTQgYHI=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=ahQxjzzNORo8a6bJ1FAJVPDgRfkUat/BLGuWY7EM1CKoNdZ/4pyvzUaz3+qnuYbYEzUnrZvIfDvKl0r7cCG/0xCdKBzBCFEMXwVSoDw6l2DqZTzb3EvJrWc5t8URkkbX3NrGKUkGQjBpUG1t03PVUFQSE1Tz0fVuDMzOsqS3KWY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=j2Jv9J93; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 63A27C433F1; Thu, 25 Jan 2024 16:55:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706201722; bh=pzjRcCGvrsjo3wuH+LeThDxqSyRY109U181HGTQgYHI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=j2Jv9J93Su2HLrEG9Sx7oSAjZoSHRJ5+MYJbKCVavuZK+VZUD5YkUmCy6h6DsKfZL 5W4qHcJQBvcVA6WE1wFIH1mmGWjfkGAcz8SovM15ACUcODxk4wlLi+cq644voaGZbz p/ZwhcO4z6syo2SDD+gB/uVcTpr2g2FY6T5ylpUkdVINS7km6+1KRt1C23hulVWVai wTRFAzMIrgGHuGMaM/o2MIo6YrEnwDu5fnQVh7tLCFTP6OcV7IrDP60d4AF8zS87FV 3M89bQUVnb2hE1KHhCw5w6g2RGdV9/7I0nodOe7c4VMlzWEVcsVsfwfrBxwAylo/FJ VNfn8o+eOM/+A== Date: Thu, 25 Jan 2024 17:55:17 +0100 From: Christian Brauner To: Jens Axboe Cc: syzbot , hdanton@sina.com, jack@suse.cz, jfs-discussion@lists.sourceforge.net, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, shaggy@kernel.org, syzkaller-bugs@googlegroups.com Subject: Re: [syzbot] [jfs?] INFO: task hung in path_mount (2) Message-ID: <20240125-erwehren-wandbild-05bf05ac9122@brauner> References: <00000000000083513f060340d472@google.com> <000000000000e5e71a060fc3e747@google.com> <20240125-legten-zugleich-21a988d80b45@brauner> <11868eb4-0528-4298-b8bc-2621fd1aac83@kernel.dk> <20240125-addition-audienz-c955ab3c8435@brauner> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: On Thu, Jan 25, 2024 at 09:51:43AM -0700, Jens Axboe wrote: > On 1/25/24 9:47 AM, Christian Brauner wrote: > > On Thu, Jan 25, 2024 at 09:11:34AM -0700, Jens Axboe wrote: > >> On Thu, Jan 25, 2024 at 9:08?AM Christian Brauner wrote: > >>> > >>> On Thu, Jan 25, 2024 at 03:59:03AM -0800, syzbot wrote: > >>>> syzbot suspects this issue was fixed by commit: > >>>> > >>>> commit 6f861765464f43a71462d52026fbddfc858239a5 > >>>> Author: Jan Kara > >>>> Date: Wed Nov 1 17:43:10 2023 +0000 > >>>> > >>>> fs: Block writes to mounted block devices > >>>> > >>>> bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=13175a53e80000 > >>>> start commit: 2ccdd1b13c59 Linux 6.5-rc6 > >>>> git tree: upstream > >>>> kernel config: https://syzkaller.appspot.com/x/.config?x=9c37cc0e4fcc5f8d > >>>> dashboard link: https://syzkaller.appspot.com/bug?extid=fb337a5ea8454f5f1e3f > >>>> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=17ba5d53a80000 > >>>> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14265373a80000 > >>>> > >>>> If the result looks correct, please mark the issue as fixed by replying with: > >>> > >>> #syz fix: fs: Block writes to mounted block devices > >> > >> Like Dave replied a few days ago, I'm kind of skeptical on all of these > >> bugs being closed by this change. I'm guessing that they are all > >> resolved now because a) the block writes while mounted option was set to > >> Y, and b) the actual bug is just masked by that. > >> > >> Maybe this is fine, but it does seem a bit... sketchy? The bugs aren't > >> really fixed, and what happens if someone doesn't turn on that option? > >> If it's required, perhaps it should not be an option at all? Though > >> that'd seem to be likely to break some funky use cases, whether they are > >> valid or not. > > > > We have no way of actually testing or verifying this stuff and a lot of > > these have been around for a long time. For example, this report here > > has a C reproducer but following the actual dashboard link that > > reproducer is striked-through which supposedly means that it isn't valid > > or reliable. And no other reproducer ever showed up. > > > > As far as I can see we should just close reports such as. If this is a > > real bug that is separate from the ability to mount to writed block > > devices then one should hope that syzbot finds another reproducer that > > let's us really analyze the bug? > > > > A separate issue is that syzbot keeps suggesting as all of these being > > closable because of this. So how serious can we take this and how much > > time can/should we spend given that we got ~20 or more of these mails in > > the last two weeks or so. > > > > I have no better answers than this tbh. And fwiw, apart from this one I > > haven't closed a single bug based on this. > > Oh yeah, it wasn't directed at you specifically, just the overall class > of bugs that get closed due to this in general. > > > And yes, ideally the ability to write to mounted block devices should be > > turned off. But we'll have to let it trickle into the individual > > distributions first and make remaining userspace tools that rely on this > > move to alternate apis before we can make any serious effort. > > Hopefully it's all fine on the distro front and we can just make it the > default some years from now. May even make sense to backport some of > this to stable and get it in their hands faster? Yes, I agree that this would be good.