Hello, kernel test robot noticed "WARNING:at_fs/kernfs/file.c:#kernfs_ops" on: commit: c6eefad61209dab3de7446cf8151d38e70440484 ("[PATCH v6 1/2] kernfs: sysfs: support custom llseek method for sysfs entries") url: https://github.com/intel-lab-lkp/linux/commits/Valentine-Sinitsyn/PCI-Implement-custom-llseek-for-sysfs-resource-entries/20230902-235234 patch link: https://lore.kernel.org/all/20230902155038.1661970-1-valesini@xxxxxxxxxxxxxx/ patch subject: [PATCH v6 1/2] kernfs: sysfs: support custom llseek method for sysfs entries in testcase: boot compiler: clang-16 test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G (please refer to attached dmesg/kmsg for entire log/backtrace) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-lkp/202309051442.bd6f9879-oliver.sang@xxxxxxxxx [ 96.320907][ T252] ------------[ cut here ]------------ [ 96.321715][ T252] WARNING: CPU: 1 PID: 252 at fs/kernfs/file.c:109 kernfs_ops (fs/kernfs/file.c:109) [ 96.322853][ T252] Modules linked in: [ 96.323438][ T252] CPU: 1 PID: 252 Comm: systemd-logind Not tainted 6.5.0-10888-gc6eefad61209 #1 [ 96.324966][ T252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 96.326330][ T252] RIP: 0010:kernfs_ops (fs/kernfs/file.c:109) [ 96.327026][ T252] Code: 48 83 c3 68 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 de f3 e2 ff 48 8b 03 5b 41 5e 41 5f 31 c9 31 ff 31 f6 c3 cc <0f> 0b eb d2 44 89 f1 80 e1 07 fe c1 38 c1 7c 91 4c 89 f7 e8 76 f3 All code ======== 0: 48 83 c3 68 add $0x68,%rbx 4: 48 89 d8 mov %rbx,%rax 7: 48 c1 e8 03 shr $0x3,%rax b: 42 80 3c 38 00 cmpb $0x0,(%rax,%r15,1) 10: 74 08 je 0x1a 12: 48 89 df mov %rbx,%rdi 15: e8 de f3 e2 ff call 0xffffffffffe2f3f8 1a: 48 8b 03 mov (%rbx),%rax 1d: 5b pop %rbx 1e: 41 5e pop %r14 20: 41 5f pop %r15 22: 31 c9 xor %ecx,%ecx 24: 31 ff xor %edi,%edi 26: 31 f6 xor %esi,%esi 28: c3 ret 29: cc int3 2a:* 0f 0b ud2 <-- trapping instruction 2c: eb d2 jmp 0x0 2e: 44 89 f1 mov %r14d,%ecx 31: 80 e1 07 and $0x7,%cl 34: fe c1 inc %cl 36: 38 c1 cmp %al,%cl 38: 7c 91 jl 0xffffffffffffffcb 3a: 4c 89 f7 mov %r14,%rdi 3d: e8 .byte 0xe8 3e: 76 f3 jbe 0x33 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: eb d2 jmp 0xffffffffffffffd6 4: 44 89 f1 mov %r14d,%ecx 7: 80 e1 07 and $0x7,%cl a: fe c1 inc %cl c: 38 c1 cmp %al,%cl e: 7c 91 jl 0xffffffffffffffa1 10: 4c 89 f7 mov %r14,%rdi 13: e8 .byte 0xe8 14: 76 f3 jbe 0x9 [ 96.329439][ T252] RSP: 0018:ffff8881638e7ea0 EFLAGS: 00010246 [ 96.330261][ T252] RAX: 0000000000000000 RBX: ffff888111e4a2b8 RCX: 0000000000000000 [ 96.331346][ T252] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 96.332425][ T252] RBP: dffffc0000000000 R08: 0000000000000000 R09: 0000000000000000 [ 96.333503][ T252] R10: 0000000000000000 R11: ffffffff8184fd65 R12: ffff8881538a5c00 [ 96.334649][ T252] R13: ffff888161bc5ec0 R14: ffff888111e4a350 R15: dffffc0000000000 [ 96.335717][ T252] FS: 00007f2d9c6a8980(0000) GS:ffff8883aeb00000(0000) knlGS:0000000000000000 [ 96.336833][ T252] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 96.337593][ T252] CR2: 00005600c8ef1595 CR3: 0000000162f96000 CR4: 00000000000406a0 [ 96.338544][ T252] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 96.339487][ T252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 96.340472][ T252] Call Trace: [ 96.340983][ T252] <TASK> [ 96.341447][ T252] ? __warn (kernel/panic.c:673) [ 96.342078][ T252] ? kernfs_ops (fs/kernfs/file.c:109) [ 96.342740][ T252] ? kernfs_ops (fs/kernfs/file.c:109) [ 96.343391][ T252] ? report_bug (lib/bug.c:?) [ 96.344046][ T252] ? find_held_lock (kernel/locking/lockdep.c:?) [ 96.344738][ T252] ? handle_bug (arch/x86/kernel/traps.c:237) [ 96.345314][ T252] ? exc_invalid_op (arch/x86/kernel/traps.c:258) [ 96.345963][ T252] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:568) [ 96.346694][ T252] ? __cfi_kernfs_fop_llseek (fs/kernfs/file.c:907) [ 96.347473][ T252] ? kernfs_ops (fs/kernfs/file.c:109) [ 96.348135][ T252] kernfs_fop_llseek (fs/kernfs/file.c:911) [ 96.348869][ T252] ksys_lseek (fs/read_write.c:289) [ 96.349497][ T252] do_syscall_64 (arch/x86/entry/common.c:?) [ 96.350141][ T252] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120) [ 96.350952][ T252] RIP: 0033:0x7f2d9cf82fc7 [ 96.351602][ T252] Code: c7 c0 ff ff ff ff c3 0f 1f 40 00 48 8b 15 c1 ee 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb ba 0f 1f 00 b8 08 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 99 ee 0c 00 f7 d8 64 89 02 48 All code ======== 0: c7 c0 ff ff ff ff mov $0xffffffff,%eax 6: c3 ret 7: 0f 1f 40 00 nopl 0x0(%rax) b: 48 8b 15 c1 ee 0c 00 mov 0xceec1(%rip),%rdx # 0xceed3 12: f7 d8 neg %eax 14: 64 89 02 mov %eax,%fs:(%rdx) 17: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax 1e: eb ba jmp 0xffffffffffffffda 20: 0f 1f 00 nopl (%rax) 23: b8 08 00 00 00 mov $0x8,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 01 ja 0x33 32: c3 ret 33: 48 8b 15 99 ee 0c 00 mov 0xcee99(%rip),%rdx # 0xceed3 3a: f7 d8 neg %eax 3c: 64 89 02 mov %eax,%fs:(%rdx) 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 01 ja 0x9 8: c3 ret 9: 48 8b 15 99 ee 0c 00 mov 0xcee99(%rip),%rdx # 0xceea9 10: f7 d8 neg %eax 12: 64 89 02 mov %eax,%fs:(%rdx) 15: 48 rex.W [ 96.357571][ T252] RSP: 002b:00007fff4e4c3fc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 96.358740][ T252] RAX: ffffffffffffffda RBX: 0000563f1ffa0a80 RCX: 00007f2d9cf82fc7 [ 96.359842][ T252] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 96.360873][ T252] RBP: 0000563f1ffa0a80 R08: 00007fff4e4c3fc0 R09: 0000000000000000 [ 96.361934][ T252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.363024][ T252] R13: 0000000000000000 R14: 00007fff4e4c4188 R15: 00007fff4e4c41a0 [ 96.364155][ T252] </TASK> [ 96.364719][ T252] irq event stamp: 64209 [ 96.365341][ T252] hardirqs last enabled at (64219): __up_console_sem (arch/x86/include/asm/irqflags.h:26 arch/x86/include/asm/irqflags.h:67 arch/x86/include/asm/irqflags.h:127 kernel/printk/printk.c:347) [ 96.366558][ T252] hardirqs last disabled at (64228): __up_console_sem (kernel/printk/printk.c:345) [ 96.367774][ T252] softirqs last enabled at (64128): __do_softirq (arch/x86/include/asm/preempt.h:27 kernel/softirq.c:400 kernel/softirq.c:582) [ 96.368971][ T252] softirqs last disabled at (64119): __irq_exit_rcu (kernel/softirq.c:612) [ 96.370158][ T252] ---[ end trace 0000000000000000 ]--- Starting LKP bootstrap... Starting /etc/rc.local Compatibility... Starting OpenBSD Secure Shell server... Starting Permit User Sessions... [FAILED] Failed to start LSB: OpenIPMI Driver init script. See 'systemctl status openipmi.service' for details. [ OK ] Started User Login Management. [ OK ] Started LKP bootstrap. [ OK ] Started LSB: Load kernel image with kexec. LKP: ttyS0: 296: skip deploy intel ucode as no ucode is specified [ OK ] Finished Permit User Sessions. [ OK ] Started OpenBSD Secure Shell server. LKP: ttyS0: 296: Kernel tests: Boot OK! LKP: ttyS0: 296: HOSTNAME vm-snb, MAC 52:54:00:12:34:56, kernel 6.5.0-10888-gc6eefad61209 1 LKP: ttyS0: 296: /lkp/lkp/src/bin/run-lkp /lkp/jobs/scheduled/vm-meta-300/boot-1-debian-11.1-x86_64-20220510.cgz-x86_64-randconfig-071-20230903-c6eefad61209-20230903-11038-o17p1l-0.yaml [ 104.602900][ T165] kmemleak: Automatic memory scanning thread ended [ OK ] Started System Logging Service. [ 106.970306][ T310] is_virt=true [ 106.970347][ T310] [ 108.079565][ T310] lkp: kernel tainted state: 512 [ 108.079600][ T310] [ 108.704632][ T310] LKP: stdout: 296: Kernel tests: Boot OK! [ 108.704672][ T310] [ 112.730026][ T310] LKP: stdout: 296: HOSTNAME vm-snb, MAC 52:54:00:12:34:56, kernel 6.5.0-10888-gc6eefad61209 1 [ 112.730070][ T310] [ 112.732401][ T310] NO_NETWORK= [ 112.732437][ T310] [ 118.521298][ T310] LKP: stdout: 296: /lkp/lkp/src/bin/run-lkp /lkp/jobs/scheduled/vm-meta-300/boot-1-debian-11.1-x86_64-20220510.cgz-x86_64-randconfig-071-20230903-c6eefad61209-20230903-11038-o17p1l-0.yaml [ 118.521368][ T310] [ 118.537313][ T310] RESULT_ROOT=/result/boot/1/vm-snb/debian-11.1-x86_64-20220510.cgz/x86_64-randconfig-071-20230903/clang-16/c6eefad61209dab3de7446cf8151d38e70440484/0 [ 118.537382][ T310] [ 118.542693][ T310] job=/lkp/jobs/scheduled/vm-meta-300/boot-1-debian-11.1-x86_64-20220510.cgz-x86_64-randconfig-071-20230903-c6eefad61209-20230903-11038-o17p1l-0.yaml The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20230905/202309051442.bd6f9879-oliver.sang@xxxxxxxxx -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki