hang on tests generic/525 to Azure

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I saw the following hang on running generic/525 to Azure (with
multichannel).  Any ideas? Thoughts?

[10820.512212] run fstests generic/524 at 2024-03-09 14:43:18
[10821.207477] CIFS: Attempting to mount
//linuxsmb3testsharesmc.file.core.windows.net/test
[10822.802851] CIFS: Attempting to mount
//linuxsmb3testsharesmc.file.core.windows.net/scratch
[10830.810280] run fstests generic/525 at 2024-03-09 14:43:29
==================================================================
[10831.998037] BUG: KASAN: slab-use-after-free in
_cifsFileInfo_put+0xaf/0x7b0 [cifs]
[10831.998185] Read of size 8 at addr ff1100012ee820a0 by task xfs_io/2391

[10831.998191] CPU: 7 PID: 2391 Comm: xfs_io Not tainted 6.8.0-rc7 #1
[10831.998195] Hardware name: Red Hat KVM, BIOS 1.16.1-1.el9 04/01/2014
[10831.998197] Call Trace:
[10831.998200]  <TASK>
[10831.998202]  dump_stack_lvl+0x5c/0x90
[10831.998214]  print_report+0xcc/0x620
[10831.998220]  ? __virt_addr_valid+0x18d/0x2f0
[10831.998227]  ? _cifsFileInfo_put+0xaf/0x7b0 [cifs]
[10831.998347]  kasan_report+0xbe/0xf0
[10831.998353]  ? _cifsFileInfo_put+0xaf/0x7b0 [cifs]
[10831.998479]  _cifsFileInfo_put+0xaf/0x7b0 [cifs]
[10831.998600]  ? lock_acquire+0x157/0x3b0
[10831.998605]  ? fs_reclaim_acquire+0x67/0xf0
[10831.998611]  ? __pfx__cifsFileInfo_put+0x10/0x10 [cifs]
[10831.998733]  ? lock_release+0x1c8/0x390
[10831.998736]  ? kmalloc_trace+0x4d/0x370
[10831.998742]  ? __pfx_lock_release+0x10/0x10
[10831.998746]  ? kasan_unpoison+0x27/0x60
[10831.998750]  ? __kasan_slab_alloc+0x30/0x70
[10831.998754]  ? rcu_is_watching+0x23/0x50
[10831.998759]  ? kmalloc_trace+0x2b4/0x370
[10831.998766]  cifs_close+0xf8/0x320 [cifs]
[10831.998889]  ? task_work_run+0xc7/0x150
[10831.998895]  __fput+0x132/0x4f0
[10831.998902]  task_work_run+0xed/0x150
[10831.998906]  ? __pfx_task_work_run+0x10/0x10
[10831.998909]  ? do_raw_spin_unlock+0x9d/0x100
[10831.998915]  do_exit+0x58d/0x1240
[10831.998920]  ? lock_release+0x1c8/0x390
[10831.998924]  ? __pfx_do_exit+0x10/0x10
[10831.998927]  ? __pfx_lock_release+0x10/0x10
[10831.998931]  ? do_raw_spin_lock+0x10e/0x190
[10831.998935]  ? mark_held_locks+0x24/0x90
[10831.998939]  do_group_exit+0x68/0x110
[10831.998944]  get_signal+0x11c4/0x11d0
[10831.998949]  ? lockdep_hardirqs_on_prepare+0x13a/0x200
[10831.998953]  ? finish_task_switch.isra.0+0x1a7/0x4f0
[10831.998959]  ? __pfx_get_signal+0x10/0x10
[10831.998962]  ? __schedule+0x728/0x1790
[10831.998969]  arch_do_signal_or_restart+0x7a/0x3b0
[10831.998975]  ? __pfx_arch_do_signal_or_restart+0x10/0x10
[10831.998978]  ? __pfx___schedule+0x10/0x10
[10831.998982]  ? lock_release+0x1c8/0x390
[10831.998987]  ? mark_held_locks+0x24/0x90
[10831.998993]  syscall_exit_to_user_mode+0x1f3/0x2a0
[10831.998997]  do_syscall_64+0x8c/0x190
[10831.999003]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[10831.999014] RIP: 0033:0x7f0d79c434b2
[10831.999018] Code: Unable to access opcode bytes at 0x7f0d79c43488.
[10831.999020] RSP: 002b:00007f0d793ffd90 EFLAGS: 00000293 ORIG_RAX:
0000000000000022
[10831.999025] RAX: fffffffffffffdfe RBX: 0000000000000000 RCX: 00007f0d79c434b2
[10831.999028] RDX: 9b1399c5de36a46b RSI: 0000000000000000 RDI: 0000000000000000
[10831.999030] RBP: 0000000000000000 R08: 00007f0d79400700 R09: 00007f0d79400700
[10831.999033] R10: 00007f0d794009d0 R11: 0000000000000293 R12: 00007ffe48be931e
[10831.999035] R13: 00007ffe48be931f R14: 0000000000000000 R15: 00007f0d793ffe80
[10831.999042]  </TASK>

[10831.999045] Allocated by task 2390:
[10831.999047]  kasan_save_stack+0x24/0x50
[10831.999051]  kasan_save_track+0x14/0x30
[10831.999055]  __kasan_kmalloc+0x7f/0x90
[10831.999058]  cifs_new_fileinfo+0xbf/0x9d0 [cifs]
[10831.999213]  cifs_atomic_open+0x49c/0x9c0 [cifs]
[10831.999363]  lookup_open.isra.0+0x5ef/0x8f0
[10831.999368]  path_openat+0x492/0x10e0
[10831.999371]  do_filp_open+0x146/0x250
[10831.999374]  do_sys_openat2+0xe0/0x110
[10831.999379]  __x64_sys_openat+0xc1/0x120
[10831.999382]  do_syscall_64+0x80/0x190
[10831.999386]  entry_SYSCALL_64_after_hwframe+0x6e/0x76

[10831.999391] Freed by task 23873:
[10831.999393]  kasan_save_stack+0x24/0x50
[10831.999396]  kasan_save_track+0x14/0x30
[10831.999399]  kasan_save_free_info+0x3b/0x60
[10831.999402]  __kasan_slab_free+0x106/0x190
[10831.999406]  kfree+0xd7/0x2f0
[10831.999409]  process_one_work+0x452/0x8d0
[10831.999413]  worker_thread+0x36f/0x660
[10831.999417]  kthread+0x18a/0x1d0
[10831.999420]  ret_from_fork+0x34/0x60
[10831.999426]  ret_from_fork_asm+0x1b/0x30

[10831.999432] Last potentially related work creation:
[10831.999433]  kasan_save_stack+0x24/0x50
[10831.999437]  __kasan_record_aux_stack+0x8e/0xa0
[10831.999441]  insert_work+0x25/0xe0
[10831.999444]  __queue_work+0x309/0x810
[10831.999448]  queue_work_on+0x86/0x90
[10831.999451]  _cifsFileInfo_put+0x3d7/0x7b0 [cifs]
[10831.999603]  smb2_compound_op+0x11a4/0x3b10 [cifs]
[10831.999753]  smb2_set_path_size+0x1fa/0x250 [cifs]
[10831.999902]  cifs_set_file_size+0x1a3/0x430 [cifs]
[10832.000053]  cifs_setattr+0x13d0/0x18d0 [cifs]
[10832.000210]  notify_change+0x563/0x780
[10832.000214]  do_truncate+0xd6/0x150
[10832.000217]  do_sys_ftruncate+0x304/0x350
[10832.000221]  do_syscall_64+0x80/0x190
[10832.000225]  entry_SYSCALL_64_after_hwframe+0x6e/0x76

[10832.000230] The buggy address belongs to the object at ff1100012ee82000
                which belongs to the cache kmalloc-1k of size 1024
[10832.000232] The buggy address is located 160 bytes inside of
                freed 1024-byte region [ff1100012ee82000, ff1100012ee82400)

[10832.000237] The buggy address belongs to the physical page:
[10832.000239] page:00000000c3cfb2fc refcount:1 mapcount:0
mapping:0000000000000000 index:0x0 pfn:0x12ee80
[10832.000243] head:00000000c3cfb2fc order:3 entire_mapcount:0
nr_pages_mapped:0 pincount:0
[10832.000246] flags:
0x17ffffc0000840(slab|head|node=0|zone=2|lastcpupid=0x1fffff)
[10832.000250] page_type: 0xffffffff()
[10832.000254] raw: 0017ffffc0000840 ff1100010003cdc0 dead000000000100
dead000000000122
[10832.000258] raw: 0000000000000000 0000000080100010 00000001ffffffff
0000000000000000
[10832.000260] page dumped because: kasan: bad access detected

[10832.000263] Memory state around the buggy address:
[10832.000265]  ff1100012ee81f80: fc fc fc fc fc fc fc fc fc fc fc fc
fc fc fc fc
[10832.000267]  ff1100012ee82000: fa fb fb fb fb fb fb fb fb fb fb fb
fb fb fb fb
[10832.000270] >ff1100012ee82080: fb fb fb fb fb fb fb fb fb fb fb fb
fb fb fb fb
[10832.000272]                                ^
[10832.000274]  ff1100012ee82100: fb fb fb fb fb fb fb fb fb fb fb fb
fb fb fb fb
[10832.000276]  ff1100012ee82180: fb fb fb fb fb fb fb fb fb fb fb fb
fb fb fb fb
[10832.000278] ==================================================================
[10832.000308] Disabling lock debugging due to kernel taint
[10832.000313] list_del corruption, ff1100012ee82010->next is
LIST_POISON1 (dead000000000100)
[10832.000354] ------------[ cut here ]------------
[10832.000355] kernel BUG at lib/list_debug.c:56!
[10832.000422] invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
[10832.000470] CPU: 7 PID: 2391 Comm: xfs_io Tainted: G    B
   6.8.0-rc7 #1
[10832.000523] Hardware name: Red Hat KVM, BIOS 1.16.1-1.el9 04/01/2014
[10832.000568] RIP: 0010:__list_del_entry_valid_or_report+0xb9/0x100
[10832.000615] Code: e8 9c c4 5b ff 0f 0b 48 89 ee 48 c7 c7 e0 3b d2
ab e8 8b c4 5b ff 0f 0b 4c 89 e2 48 89 ee 48 c7 c7 40 3c d2 ab e8 77
c4 5b ff <0f> 0b 4c 89 ea 48 89 ee 48 c7 c7 a0 3c d2 ab e8 63 c4 5b ff
0f 0b
[10832.000737] RSP: 0018:ff1100010caef978 EFLAGS: 00010282
[10832.000777] RAX: 000000000000004e RBX: ffffffffc19f8960 RCX: 0000000000000027
[10832.000827] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ff110004cb3b19c8
[10832.000875] RBP: ff1100012ee82010 R08: ffffffffaa3f971e R09: ffe21c0099676339
[10832.000924] R10: ff110004cb3b19cb R11: 0000000000000000 R12: dead000000000100
[10832.000973] R13: dead000000000122 R14: ff1100012ee82018 R15: ff1100012ee82010
[10832.001044] FS:  0000000000000000(0000) GS:ff110004cb380000(0000)
knlGS:0000000000000000
[10832.001126] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[10832.001178] CR2: 00007ff18b8ec738 CR3: 0000000420660003 CR4: 0000000000371ef0
[10832.001248] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[10832.001311] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[10832.001373] Call Trace:
[10832.001397]  <TASK>
[10832.001419]  ? die+0x37/0x90
[10832.001451]  ? do_trap+0x134/0x230
[10832.001487]  ? __list_del_entry_valid_or_report+0xb9/0x100
[10832.001542]  ? do_error_trap+0x94/0x130
[10832.001581]  ? __list_del_entry_valid_or_report+0xb9/0x100
[10832.001632]  ? __list_del_entry_valid_or_report+0xb9/0x100
[10832.001685]  ? handle_invalid_op+0x2c/0x40
[10832.001724]  ? __list_del_entry_valid_or_report+0xb9/0x100
[10832.001775]  ? exc_invalid_op+0x2f/0x50
[10832.001813]  ? asm_exc_invalid_op+0x1a/0x20
[10832.001856]  ? irq_work_claim+0x1e/0x40
[10832.001898]  ? __list_del_entry_valid_or_report+0xb9/0x100
[10832.001950]  ? __list_del_entry_valid_or_report+0xb9/0x100
[10832.002002]  _cifsFileInfo_put+0x233/0x7b0 [cifs]
[10832.002218]  ? __pfx__cifsFileInfo_put+0x10/0x10 [cifs]
[10832.002419]  cifs_close+0xf8/0x320 [cifs]
[10832.002603]  ? task_work_run+0xc7/0x150
[10832.002642]  __fput+0x132/0x4f0
[10832.002677]  task_work_run+0xed/0x150
[10832.002713]  ? __pfx_task_work_run+0x10/0x10
[10832.002754]  ? do_raw_spin_unlock+0x9d/0x100
[10832.002797]  do_exit+0x58d/0x1240
[10832.004329]  ? lock_release+0x1c8/0x390
[10832.005836]  ? __pfx_do_exit+0x10/0x10
[10832.007341]  ? __pfx_lock_release+0x10/0x10
[10832.008831]  ? do_raw_spin_lock+0x10e/0x190
[10832.010712]  ? mark_held_locks+0x24/0x90
[10832.012274]  do_group_exit+0x68/0x110
[10832.013690]  get_signal+0x11c4/0x11d0
[10832.015079]  ? lockdep_hardirqs_on_prepare+0x13a/0x200
[10832.016479]  ? finish_task_switch.isra.0+0x1a7/0x4f0
[10832.017849]  ? __pfx_get_signal+0x10/0x10
[10832.019210]  ? __schedule+0x728/0x1790
[10832.020508]  arch_do_signal_or_restart+0x7a/0x3b0
[10832.021767]  ? __pfx_arch_do_signal_or_restart+0x10/0x10
[10832.023007]  ? __pfx___schedule+0x10/0x10
[10832.024234]  ? lock_release+0x1c8/0x390
[10832.025443]  ? mark_held_locks+0x24/0x90
[10832.026636]  syscall_exit_to_user_mode+0x1f3/0x2a0
[10832.027827]  do_syscall_64+0x8c/0x190
[10832.029007]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[10832.030195] RIP: 0033:0x7f0d79c434b2
[10832.031342] Code: Unable to access opcode bytes at 0x7f0d79c43488.
[10832.032505] RSP: 002b:00007f0d793ffd90 EFLAGS: 00000293 ORIG_RAX:
0000000000000022
[10832.033708] RAX: fffffffffffffdfe RBX: 0000000000000000 RCX: 00007f0d79c434b2
[10832.034933] RDX: 9b1399c5de36a46b RSI: 0000000000000000 RDI: 0000000000000000
[10832.036159] RBP: 0000000000000000 R08: 00007f0d79400700 R09: 00007f0d79400700
[10832.037390] R10: 00007f0d794009d0 R11: 0000000000000293 R12: 00007ffe48be931e
[10832.038635] R13: 00007ffe48be931f R14: 0000000000000000 R15: 00007f0d793ffe80
[10832.039894]  </TASK>
[10832.041129] Modules linked in: loop cmac nls_utf8 cifs cifs_arc4
nls_ucs2_utils cifs_md4 rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver
nfs lockd grace netfs nf_conntrack_netbios_ns nf_conntrack_broadcast
xt_CT ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT
nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat ip6table_mangle
ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle
iptable_raw iptable_security nf_conntrack nf_defrag_ipv6
nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables
ip6table_filter ip6_tables iptable_filter sunrpc kvm_intel kvm
irqbypass crct10dif_pclmul crc32_pclmul bochs ghash_clmulni_intel
drm_vram_helper sha512_ssse3 drm_ttm_helper sha1_ssse3 ttm
drm_kms_helper drm floppy virtio_balloon ip_tables xfs crc32c_intel
virtio_net virtio_console net_failover sha256_ssse3 virtio_blk
failover qemu_fw_cfg
[10832.051923] ---[ end trace 0000000000000000 ]---
[10832.053867] RIP: 0010:__list_del_entry_valid_or_report+0xb9/0x100
[10832.055636] Code: e8 9c c4 5b ff 0f 0b 48 89 ee 48 c7 c7 e0 3b d2
ab e8 8b c4 5b ff 0f 0b 4c 89 e2 48 89 ee 48 c7 c7 40 3c d2 ab e8 77
c4 5b ff <0f> 0b 4c 89 ea 48 89 ee 48 c7 c7 a0 3c d2 ab e8 63 c4 5b ff
0f 0b
[10832.059161] RSP: 0018:ff1100010caef978 EFLAGS: 00010282
[10832.060769] RAX: 000000000000004e RBX: ffffffffc19f8960 RCX: 0000000000000027
[10832.062562] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ff110004cb3b19c8
[10832.064342] RBP: ff1100012ee82010 R08: ffffffffaa3f971e R09: ffe21c0099676339
[10832.066228] R10: ff110004cb3b19cb R11: 0000000000000000 R12: dead000000000100
[10832.068074] R13: dead000000000122 R14: ff1100012ee82018 R15: ff1100012ee82010
[10832.069816] FS:  0000000000000000(0000) GS:ff110004cb380000(0000)
knlGS:0000000000000000
[10832.071716] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[10832.073581] CR2: 00007ff18b8ec738 CR3: 0000000420660003 CR4: 0000000000371ef0
[10832.075463] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[10832.077314] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[10832.079120] note: xfs_io[2391] exited with preempt_count 2
[10832.080875] Fixing recursive fault but reboot is needed!
[10832.083187] BUG: scheduling while atomic: xfs_io/2391/0x00000000
[10832.085515] INFO: lockdep is turned off.
[10832.087412] Modules linked in: loop cmac nls_utf8 cifs cifs_arc4
nls_ucs2_utils cifs_md4 rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver
nfs lockd grace netfs nf_conntrack_netbios_ns nf_conntrack_broadcast
xt_CT ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT
nf_reject_ipv4 xt_conntrack ebtable_nat ip6table_nat ip6table_mangle
ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle
iptable_raw iptable_security nf_conntrack nf_defrag_ipv6
nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables
ip6table_filter ip6_tables iptable_filter sunrpc kvm_intel kvm
irqbypass crct10dif_pclmul crc32_pclmul bochs ghash_clmulni_intel
drm_vram_helper sha512_ssse3 drm_ttm_helper sha1_ssse3 ttm
drm_kms_helper drm floppy virtio_balloon ip_tables xfs crc32c_intel
virtio_net virtio_console net_failover sha256_ssse3 virtio_blk
failover qemu_fw_cfg
[10832.103205] CPU: 7 PID: 2391 Comm: xfs_io Tainted: G    B D
   6.8.0-rc7 #1
[10832.105580] Hardware name: Red Hat KVM, BIOS 1.16.1-1.el9 04/01/2014
[10832.108018] Call Trace:
[10832.110493]  <TASK>
[10832.113007]  dump_stack_lvl+0x77/0x90
[10832.115460]  __schedule_bug+0x84/0xa0
[10832.117877]  __schedule+0x148a/0x1790
[10832.120252]  ? __irq_work_queue_local+0x57/0x180
[10832.122601]  ? lock_acquire+0xbf/0x3b0
[10832.124925]  ? __pfx___schedule+0x10/0x10
[10832.127254]  ? do_task_dead+0x43/0x60
[10832.129560]  ? __pfx_lock_release+0x10/0x10
[10832.131863]  ? __pfx_do_raw_spin_lock+0x10/0x10
[10832.134176]  ? __pfx__printk+0x10/0x10
[10832.136450]  ? lockdep_hardirqs_on_prepare+0x12/0x200
[10832.138690]  ? _raw_spin_unlock_irqrestore+0x31/0x60
[10832.140874]  do_task_dead+0x5a/0x60
[10832.142994]  make_task_dead+0x1e3/0x210
[10832.145058]  rewind_stack_and_make_dead+0x17/0x20
[10832.147082] RIP: 0033:0x7f0d79c434b2
[10832.149041] Code: Unable to access opcode bytes at 0x7f0d79c43488.
[10832.150979] RSP: 002b:00007f0d793ffd90 EFLAGS: 00000293 ORIG_RAX:
0000000000000022
[10832.152927] RAX: fffffffffffffdfe RBX: 0000000000000000 RCX: 00007f0d79c434b2
[10832.154873] RDX: 9b1399c5de36a46b RSI: 0000000000000000 RDI: 0000000000000000
[10832.156774] RBP: 0000000000000000 R08: 00007f0d79400700 R09: 00007f0d79400700
[10832.158632] R10: 00007f0d794009d0 R11: 0000000000000293 R12: 00007ffe48be931e
[10832.160469] R13: 00007ffe48be931f R14: 0000000000000000 R15: 00007f0d793ffe80
[10832.162292]  </TASK>


-- 
Thanks,

Steve




[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux