Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp1316154rdg; Fri, 13 Oct 2023 18:56:49 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEoPJzVsv7Jn9CtANgeL4mKBLZUFOrSjLce6THI+H84nevv/XGyUmbp7YNHRZT2jA8HOGhn X-Received: by 2002:a17:902:d2c2:b0:1c9:f418:c07b with SMTP id n2-20020a170902d2c200b001c9f418c07bmr3537768plc.66.1697248608831; Fri, 13 Oct 2023 18:56:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697248608; cv=none; d=google.com; s=arc-20160816; b=r/1jyCtG5UXxJwF79TPOJRrglV5aFHc3wOFXt3Gj5SDEZhKH3KK4VsyInio1k8Ls9C 9hWk0fHK2n7jYU+vKy7gdfSJDIYqTyXnTbnhKhuZiOXeSwZgQAMUkelBxgrdgr/J4nuW l9bMT9ZbXifL1djirobsjSXFa1/5ZpM4uo374I2hUvUSaoE4zYoX1bTyudoObMQg9pYZ UMTNKTVIn7kqXvaEhbEKF/JSmVOUlmDAFtrXuCN4/dQZumBHFmnCT+kO9gs0HDm1VdGz nJR9TXwSLi4xNDf8m+62/l8YFf5aeLfodRAC5IJ2eFN/u78lJbSO7HCgD8Zd8/HouPEX V3ng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=sktGs/iimbpIZyqy4tFc5WyBA1lNSHSFUNmqlNczQFM=; fh=CWXAO/83Wey8pWd+yHFqje96lFPgTxe1WoryqgUdLv8=; b=gTeHR12vwPTTwZsliLjEgbSJd3PSAj1nxFmQGagmIfIDg/lIRp2IHuso145K7Gd4eF WmcdOaYKSQXAkmkACTRPj0oGIGpQFQ/2vwG8gxQ2hHofCG1AvZsoaWuQSTGTA4GlyEzv ynvnY3+VoyJ/vA0mZjIUX8BOU68EXMOXpkgmvzBNaHSWx2GItwXo+eUHzZrtDwCBgObo PJZN+B0MPR0KMUAHVncZuZ5wMmcxc+WjOA/norEeQaJPMitRiz/RJSLIHM6iGCELn4eO QHvyHLyIbczBvzXcmIWBa18P9FHgA5T7kCFctlY+sHmcF87chWqr7gwHXsjyZOirbsOC qbRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mit.edu header.s=outgoing header.b=hVJLP8aq; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=mit.edu Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id f9-20020a17090274c900b001bb9e2c38ecsi5265053plt.264.2023.10.13.18.56.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 13 Oct 2023 18:56:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@mit.edu header.s=outgoing header.b=hVJLP8aq; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=mit.edu Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 9C8CD80A5300; Fri, 13 Oct 2023 18:56:00 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232705AbjJNBzx (ORCPT + 99 others); Fri, 13 Oct 2023 21:55:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57212 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232841AbjJNBzn (ORCPT ); Fri, 13 Oct 2023 21:55:43 -0400 Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 771BEF4 for ; Fri, 13 Oct 2023 18:55:21 -0700 (PDT) Received: from cwcc.thunk.org (pool-173-48-111-200.bstnma.fios.verizon.net [173.48.111.200]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 39E1srLp024472 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 13 Oct 2023 21:54:54 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing; t=1697248496; bh=sktGs/iimbpIZyqy4tFc5WyBA1lNSHSFUNmqlNczQFM=; h=Date:From:Subject:Message-ID:MIME-Version:Content-Type; b=hVJLP8aq1UrfT5TGbDR6qAnEssWY889xVe+Jk/B8FR8360bv8d7Fp6y40WKtT/XNu P22X6613wieWb8RriCGjtrY9XZYFuqLtGhAmGay+jCYde2F1bWj62Km39k0rmUwARE vMbfnVwgn67alem03RAMgOeXCaDlz61i4AMYPiKPDBdj0cg4ywv+EMbRCh9Ekw32UW A0eaXfUObyvb17k5VhqPbosASgaI/qxV1ot6c7xfE+l0lt+FU79VAVAlFme6miCSbO 6BgU3v8b8PkA+M9fmykjLwpHU5VAWR7OTIGPg4wJS7xbR3E4K0zry8g+QTAJ0UOEs6 fX5WbiVauisTA== Received: by cwcc.thunk.org (Postfix, from userid 15806) id 71AAA15C0255; Fri, 13 Oct 2023 21:54:53 -0400 (EDT) Date: Fri, 13 Oct 2023 21:54:53 -0400 From: "Theodore Ts'o" To: Shreeya Patel Cc: Thorsten Leemhuis , Andres Freund , linux-ext4@vger.kernel.org, Ricardo =?iso-8859-1?Q?Ca=F1uelo?= , "gustavo.padovan@collabora.com" , groeck@google.com, zsm@google.com, garrick@google.com, Linux regressions mailing list Subject: Re: [syzbot] INFO: task hung in ext4_fallocate Message-ID: <20231014015453.GE255452@mit.edu> References: <20231003141138.owt6qwqyf4slgqgp@alap3.anarazel.de> <20231003232505.GA444157@mit.edu> <20231004004247.zkswbseowwwc6vvk@alap3.anarazel.de> <604bc623-a090-005b-cbfc-39805a8a7b20@collabora.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Fri, 13 Oct 2023 18:56:01 -0700 (PDT) On Fri, Oct 13, 2023 at 02:28:52AM +0530, Shreeya Patel wrote: > > Just to clarify, this issue is still seen on upstream 5.10 and earlier > kernels. > I can confirm that we did not see this issue being reproduced on mainline > kernel using #sys test feature. So I'm confused. In the original post on this thread[1], it was stated: > When I tried to reproduce this issue on mainline linux kernel using the > reproducer provided by syzbot, I see an endless loop of following errors :- and > #regzbot introduced: v6.6-rc1.. [1] https://lore.kernel.org/all/d89989ef-e53b-050e-2916-a4f06433798b@collabora.com/ ... and now you're sayingg this *wasn't* reproduced upstream? And of course, because this was a private syzbot instance, there was syzbot dashboard given, and the reproducer had the serial number filed off (there is a URL in the comments at the beginning of the reproducer for a *reason*), so *I* couldn't run "#syz test". Huh? Reading between the lines, it looks like the only similarity between what was happening in the 5.10 kernel and the mainline kernel was that it did not *hang* the kernel, but it was generating a stream of EXT4-fs error messages. Well, if you take a deliberately corrupted kernel, and mount it with errors=continue, and then keep pounding it with lots of file system operations, of *course* it will continually spew ext4 errors message. That is "Working As Intended" by *definition*. And this is why I maintain that irresponsible use of syzbot is effectively a denial of service attack on upstream maintainers. At this point, just as upstream policy is that debugging ancient LTS kernels is not something upstream maintainers to do (and attempting to trick them to debug it by claiming it is found in mainline is *really* uncool), if there are bugs that are reported using private syzbot instances, or where there isn't a URL to a public syzbot dashboard, they should be treated as P4 priority or worse.... - Ted