Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp418469rdb; Mon, 18 Sep 2023 21:53:44 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGk3yYdT4G8vA0rDtxNKR1mlCNmjxGyrU9gYuk+gru/2JuQsFoEQ0DbtW3rx5KAecgXq7tr X-Received: by 2002:a05:6a20:3255:b0:14d:6309:fc94 with SMTP id hm21-20020a056a20325500b0014d6309fc94mr12079310pzc.36.1695099224048; Mon, 18 Sep 2023 21:53:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695099224; cv=none; d=google.com; s=arc-20160816; b=JidKeY149crLD8ewDZiflkJqpcAhVtr7qMAzZpUjz49oqP2frSiIl/sWzO56B09mIp mDwCaRHN8Y+XG3CPo1Q56c6TRPhJUWr7r6MEVZZY0pueZSL694t+c0az6IrZSVFsVFkv mehNFl6UyWzeO7rfXMAGIfIU1yaIeXqgUNpnV17GT/wxCbsJMcNWPLSkTlZLeh2X1TnH 12aTol29S7Byg/Fng2P1qSlYPG0Ir8Pa9ycPWMPjQGSHbkN2Ro4weVb6NQzk0j1fO3hC RjzegYizOOSZL6XqBtqBcHXV7LpWRDdW1kM4fnJNoV/Yhi4Pb0FukYmpVFRoNo/Vv5Dz 2+Tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=I/OPhMVwEE+FwTeKxUk3XfclqMUzxdhNE/ZJTqJbFUs=; fh=gqP2IBa2JibsHADtdVrlN5PJSkVyHQlV0AzR2yI0AVA=; b=OvqSNadW54FhRgP2vyKzcqcWSdnEG1BhopEds2p186+7uD6R1wbOLS0XHoXSMc56A6 +q618iaYfFzLkUYRt/E0g1jXlbVcvO+1dZkkkFqYbQYtINzj46pBG0Ig93q8hCP2BeOn 0PqzpRYxsSgvjCrShPwJvH+3uS4yKKARD3BQK39lQYC//rUdNDTR6DF9T1SzFpHRvgkl KbjfXzPvKjtwc525j55goIyqxwgdP2qjE55crjnUrzNY9xTE/e1Mn769HWc57Ha9qeRO hG+i5dJHfleLgLnc2oR5YcBWas/182ucecDLsA53JLzBwqEmYqt3qgPwxHbu6GmiXV6D AtiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mit.edu header.s=outgoing header.b=qVm6xg5c; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id ef6-20020a056a002c8600b0068a3c575900si9024965pfb.84.2023.09.18.21.53.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Sep 2023 21:53:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@mit.edu header.s=outgoing header.b=qVm6xg5c; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 37DB281E554F; Mon, 18 Sep 2023 15:08:12 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229472AbjIRWIP (ORCPT + 99 others); Mon, 18 Sep 2023 18:08:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50418 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229447AbjIRWIO (ORCPT ); Mon, 18 Sep 2023 18:08:14 -0400 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8F7A28F for ; Mon, 18 Sep 2023 15:08:08 -0700 (PDT) Received: from letrec.thunk.org (c-73-8-226-230.hsd1.il.comcast.net [73.8.226.230]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 38IM7tV0032420 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 18 Sep 2023 18:07:56 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1695074878; bh=I/OPhMVwEE+FwTeKxUk3XfclqMUzxdhNE/ZJTqJbFUs=; h=Date:From:Subject:Message-ID:MIME-Version:Content-Type; b=qVm6xg5cusG8V92imaVhpgMCM7daJ0Gxrue+ArwTiVjd0A0eFqRkP+8RttOUSgqXi GTfUxYvHZB6dqwm7jUZBSFa0BqtYVembC5hPIRFRu3SaEWN+gKK3yxOvinJtBKA7K9 dgApbjcFy/AQnHDi8RSWy61LEOqLUQbVA+sfr9jEwvxAhDXH+rPKlGT8tthDIrMkNV ijqfCmAdCy2Kfe1KyqFztJIZHG8ZPTfdPfn7KO+GbDt7Nbgv4Xtth1BR0gUo4dGh2s rdZJnVvccRA/HLmGy8Rgh1rJpyXeh+RUcbkrIyMSFMC100TRumx/h1Lt2us03SXTZG kWf4vh3QBMPFQ== Received: by letrec.thunk.org (Postfix, from userid 15806) id D4E808C02E6; Mon, 18 Sep 2023 18:07:54 -0400 (EDT) Date: Mon, 18 Sep 2023 18:07:54 -0400 From: "Theodore Ts'o" To: Shreeya Patel Cc: linux-ext4@vger.kernel.org, Ricardo =?iso-8859-1?Q?Ca=F1uelo?= , "gustavo.padovan@collabora.com" , groeck@google.com, zsm@google.com, garrick@google.com, Linux regressions mailing list Subject: Re: [syzbot] INFO: task hung in ext4_fallocate Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Mon, 18 Sep 2023 15:08:12 -0700 (PDT) On Mon, Sep 18, 2023 at 08:13:30PM +0530, Shreeya Patel wrote: > Hi Everyone, > > syzbot has reported a task hung issue in ext4_fallocate, crash report can be > seen at the bottom of the email. What's the link to the syzbot dashboard URL? This is typically the first line of the reproducer, but it's been snipped out in your reproducer. > > When I tried to reproduce this issue on mainline linux kernel using the > reproducer provided by syzbot, I see an endless loop of following errors :- > > [?? 89.689751][ T3922] loop1: detected capacity change from 0 to 512 > [?? 89.690514][ T3916] EXT4-fs error (device loop4): ext4_map_blocks:577: > inode #3: block 9: comm poc: lblock 0 mapped to illegal pblock 9 (length 1) > [?? 89.694709][ T3890] EXT4-fs error (device loop0): ext4_map_blocks:577: Please note that maliciously corrupted file system is considered low priority by ext4 developers. If this is something which is important to Google, then it needs to fund more headcount so that we have time to take a look at these things. There has been plenty of discussions about how syzbot is effectively a denial of service attack on upstream resources, and the only way we can respond is to down-prioritize such bug reports. This is *especially* true when we receive reports from private syzbot instances where we don't have any of the features provided by syzbot console --- including convenient access to the file system image that was mounted as part of the test, the ability to use #syz test to try out patches --- and more importantly, so we can introduce debugging messages and using the syzbot testing facility to run the tests. If you really are concerned about the threat model of users picking up random USB thumb drives that they found in the parking lot, consider running fsck.ext4 -f on the file system first, and if the file system checker is not able to fix the file system, refuse to mount it. Alternatively, consider using cros-vm, and mounting the file system in the guest-kernel so that the VMM provides an additional sandbox layer. Anyway, please provide a link to a public Syzkaller dashboard report, and we'll take a look at it when we have time... Cheers, - Ted