Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp3086809rwd; Fri, 2 Jun 2023 21:31:38 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5qce/LIWccRc7PAcAtQiVDW8XCQHbUFrlaxg+SRwNS0LbRnDglx1JmNUZom4e6ZsWni1tN X-Received: by 2002:a05:6358:5e19:b0:127:c1c9:2f70 with SMTP id q25-20020a0563585e1900b00127c1c92f70mr10186042rwn.14.1685766698662; Fri, 02 Jun 2023 21:31:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685766698; cv=none; d=google.com; s=arc-20160816; b=0cIrQlVEAa5jgGKnqSe62ugOEvJNJHI6NYYCp7XDwesltwAVRAqsbMlcJOggQ4lML/ 7xm3Hk6kZgob2g1sLqJUgB/JAEd58njY9vJPqYR2ngFJBO+ESCnZBcURR+F8MIyMyRpt CW79CrqanZnV/ptf5SK5EQQfuavUTdRd/d2AwLUGnLyAGTqCutgjvTcyTxWm2mj8Kizw ybJxUmoXcU1QD/pALoH1vQgt9Lh7yVMxy4jYW4VfKPTzbvg69GJXVoCsdAs75BZhc/gS F51NlZtUzl+D5kq0HNk62BQjllj2BQLfK+uxi3Jxz/oQ833JZK447DTL2JD7RICBSxDb ajPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=9g29hcQMYlOi1UnsGeiipDa7HpF1GkhixP7H7lVhEYE=; b=kSYQkWe/2QQAhOaTeftJr0VyvZUZEIe/VD5gAwAz1MPAD3Y+U+ti62Ll3xlJQRV8GX 70vTYKfPaoYYoY0/BHWdXLAkV+mOGabqLxwJvOAepILvpDzbx35QSXh2K00aMAS69dd6 ziPmqppqBc/7jKtxXEFiOdmV6Dh3byjCjXuyLayksvu3vnkkoP5n2FuN5IcV9ag/VJef geUZrzKT7ka6QeXckfVUSTjoh7L9A8mcAS0unoGvoC7y9oWkTz76CNmSW5RGP1QJX67V Shl8fRrNnHZrIbzEGtjoL3r2cxiy0+CU0HOFJ7L4v4uonK8JcdX02YQQxzm0E1aTK9tb t/RA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b=F5jEaF8X; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g28-20020aa79f1c000000b0065304909e29si1816413pfr.187.2023.06.02.21.31.19; Fri, 02 Jun 2023 21:31:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@mit.edu header.s=outgoing header.b=F5jEaF8X; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230294AbjFCEbF (ORCPT + 99 others); Sat, 3 Jun 2023 00:31:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53754 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230217AbjFCEbE (ORCPT ); Sat, 3 Jun 2023 00:31:04 -0400 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3DF58135 for ; Fri, 2 Jun 2023 21:31:00 -0700 (PDT) Received: from cwcc.thunk.org (pool-173-48-119-27.bstnma.fios.verizon.net [173.48.119.27]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 3534UTOG025754 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 3 Jun 2023 00:30:30 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1685766632; bh=9g29hcQMYlOi1UnsGeiipDa7HpF1GkhixP7H7lVhEYE=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=F5jEaF8XoP0TKPSjy64K3XslrdbRXk7oeT4qyGfIHw4qpdFSWUNJH4Nr5kaEZCozK BgOuEa0hKtkMhUcV3dLiMqjoyiM04B93gpzLGJZjGVn2RvtiG/r367KvKLZ+57xhzn m33aReiHJaNGK3KF/+wIIcNLobqX76CxB2l4si0gsDFxzmZxfAUX56DlODeraWsFmY 5VTaIQdgu4sHeVOfvtkrvzqABKUMxc8VdkhpzGZS2turdn0cy4r/zFZMWFB2suMc1U DaL/H6BFqCuupqMvJ8daTXWy4kmikTsXpaGehx1ZpE3BM2BJYnA8KjRx9bDWqwxd05 3+aBgOB2IzjxQ== Received: by cwcc.thunk.org (Postfix, from userid 15806) id 6EE0115C02EE; Sat, 3 Jun 2023 00:30:28 -0400 (EDT) Date: Sat, 3 Jun 2023 00:30:28 -0400 From: "Theodore Ts'o" To: Baokun Li Cc: syzbot , adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, yangerkun Subject: Re: [syzbot] Monthly ext4 report (May 2023) Message-ID: <20230603043028.GE1128875@mit.edu> References: <000000000000834af205fce87c00@google.com> <20230602210639.GA1154817@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Sat, Jun 03, 2023 at 10:05:44AM +0800, Baokun Li wrote: > > There are many sources of syzkaller issues, and the patches I send out > to fix syzkaller issues add Reported-by to all but the ones that fix issues > reported by our internal syzbot. > However, there may be multiple syzbot reports for the same issue. Yes, that happens a lot especially for Lockdep reports; depending on how the reproducer triggers the locks in which order, there can often be multiple different lockdep signatures, and Syzkaller can't tell that they are all the same thing. I tend to focus on syzbot reproducers on the upstream Linux instance, rather than the Android-5.15 syzkaller instance. And that allows me to use the ext4 subsystem dashboard available at: https://syzkaller.appspot.com/upstream/s/ext4 It's against this list of reports that the Monthly ext4 report is generated. So if people who are submitting fixes against syzkaller reports, it would be nice if they were to check the ext4 dashboard above to look for syzbot reports that might be also relevant to your patch. Thanks, - Ted