Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp3022716rwb; Fri, 16 Dec 2022 09:10:33 -0800 (PST) X-Google-Smtp-Source: AMrXdXtDEw0jDBPL8X4XdDa8CVgniAiTYPkHuMWtd6P5XZkQdF9BMKr6POO4sZG4lTQ5YeihCUh7 X-Received: by 2002:a17:907:9714:b0:7db:55c1:6534 with SMTP id jg20-20020a170907971400b007db55c16534mr5121224ejc.5.1671210633252; Fri, 16 Dec 2022 09:10:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671210633; cv=none; d=google.com; s=arc-20160816; b=x852BpbzROW2U17Zxc9buql/rdzSCTjNJozkDsEkgj8wZJKvPAzfOMrjQjeG7l9Ntc SdYM1LMwRrrjzzXJ7pp0xJEqCbOjH9+8lkP6eV5etEuVhx3n1/jcj4d60sSILk7CzqF4 Ne6l6yykrt+3B2Z34LN2CTRKKRxd6FD3uwDts7tQ/wgTBk4uxV/ZZF8kgWL6Pq0WSfNT MkOAXN36buOkf8Y8bpx2pEDgjFduntCJWtI1RHgEft2QAkX4jnxqZ0Szzc7adKQG/RaE +Pk+KFhWSjINvu6P7L9HAMf72Mt6Y9fEiQdRaMlYIGthRWhUe5B8Kq2h87pecbUtf/cn 7Nwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=czyZa4h4xnG1V2lFwz0kam2aIsqEihy+AZSfIfZu/AY=; b=NgOpYO+84HtZjKn4a4qqoljoTUqplYFai5efezXau3TT84gVFzPD3aOQKvusx6wxId lrOrLyNgpnqdLgsh5k3mzs6PPFtzaPfBGNyLiY2eajA2OZIgPE70Wc4fUFbQtNCMarlK CqGA872sP+d3Ms26Hob7tpOdeCqtVCM8xvdVp8CjQwLSvLnhFz/Il2KatvM8d9qtdkOj Y8JacyDRaBYFNlsPEO9AeOqDU9mbnB2gMSGyCjxnP/RMP+L3qKXWXiN0lnsJvWBYmZns e4JlUKS78Qglz5Mw9ph4jdJs+32i9CDVCxuvYeynAHCSh1W/JReyh6+p9RYGHm+fGW2g k+9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b="KvOaE/9h"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id xg1-20020a170907320100b007c10a0c31a3si2376416ejb.425.2022.12.16.09.10.04; Fri, 16 Dec 2022 09:10:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b="KvOaE/9h"; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231311AbiLPRFO (ORCPT + 99 others); Fri, 16 Dec 2022 12:05:14 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59190 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230171AbiLPRFM (ORCPT ); Fri, 16 Dec 2022 12:05:12 -0500 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2B06A69ABB for ; Fri, 16 Dec 2022 09:05:11 -0800 (PST) Received: from cwcc.thunk.org (pool-173-48-120-46.bstnma.fios.verizon.net [173.48.120.46]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 2BGH4tFH017214 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 16 Dec 2022 12:04:56 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1671210298; bh=czyZa4h4xnG1V2lFwz0kam2aIsqEihy+AZSfIfZu/AY=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=KvOaE/9hc3wBmqQYhQFxe6AuvtCcPhKHEh9QBl1oQgL/pTsVUkHNLxzTggMMcMLqd i+XOmb4YWd/KI7Z2HU/F81WV6tBI6d/fdZNqDBb/xigPS2Z/Ms+Wd5+BHnykxt/iIS pGqVYGXAwtdDxmJiUcIc4H3fg13OOvvgRpdT51t5SVaDFo7DL1JPv/TNNKQG1x5D1+ IoOWtbG+k7bEq5VP9YSTjAWj/VM9kuO0c1cY8mHlZ90Xx4+9372a78jYN2xFMg/2pw krgWbFFpjHLZByuOqZpCSsHwNfmRB6g8l470apqUcLDnX/EL4upEPkzC1a4Hmv+/ly ozWT4d3npKD+g== Received: by cwcc.thunk.org (Postfix, from userid 15806) id 4F0E415C40A2; Fri, 16 Dec 2022 12:04:55 -0500 (EST) Date: Fri, 16 Dec 2022 12:04:55 -0500 From: "Theodore Ts'o" To: Aleksandr Nogikh Cc: Lee Jones , syzbot , adilger.kernel@dilger.ca, gregkh@linuxfoundation.org, lczerner@redhat.com, linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, sashal@kernel.org, stable@vger.kernel.org, syzkaller-android-bugs@googlegroups.com, tadeusz.struk@linaro.org Subject: Re: kernel BUG in ext4_free_blocks (2) Message-ID: References: <0000000000006c411605e2f127e5@google.com> <000000000000b60c1105efe06dea@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Fri, Dec 16, 2022 at 03:09:04PM +0100, Aleksandr Nogikh wrote: > > Syzbot is actually reacting here to this bug from the Android namespace: > > https://syzkaller.appspot.com/bug?id=5266d464285a03cee9dbfda7d2452a72c3c2ae7c Thanks for the clarification; stupid question, though -- I see "upstream" is listed on the dashboard link above. Assuming that "usptream" is "Linus's tree", why was it still saying, "I can't find this patch in any of my trees"? What about the upstream tree? > > Although this does appear to be a Stable candidate, I do not see it > > in any of the Stable branches yet. So I suspect the answer here is to > > wait for the fix to filter down. The reason why it's not hit any of the long-term stable trees is because the patch doesn't apply cleanly, because there are pre-requisite commits that were required. Here are the required commits for 5.15: https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git ext4_for_5.15.83 % git log --reverse --oneline v5.15.83.. 96d070a12a7c ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() [ Upstream commit 8ac3939db99f99667b8eb670cf4baf292896e72d ] 2fa7a1780ecd ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() [ Upstream commit 6bc6c2bdf1baca6522b8d9ba976257d722423085 ] 8dc76aa246b1 ext4: add strict range checks while freeing blocks [ Upstream commit a00b482b82fb098956a5bed22bd7873e56f152f1 ] deb2e1554497 ext4: block range must be validated before use in ext4_mb_clear_bb() [ Upstream commit 1e1c2b86ef86a8477fd9b9a4f48a6bfe235606f6 ] Further backports to LTS kernels for 5.10, 5.4, etc., are left as an exercise to the reader. :-) - Ted P.S. I have not tried to run gce-xfstests regressions yet. so the only QA done on these backports is "it builds, ship it!" (And it fixes the syzbot reproducers.) Then again, we're not running this kind of regression tests on the LTS kernels. P.P.S. If anyone is willing to volunteer to be an ext4 backports maintainer, please contact me. The job description is (a) dealing with the stable backport failures and addressing the patch conflicts, potentially by dragging in patch prerequisites, and (b) running "gce-xfstests ltm -c ext4/all -g auto" and making sure there are no regressions. - Ted