[linux-next:master] [fs] f8f25893a4: WARNING:at_fs/debugfs/file.c:#open_proxy_open

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Hello,

kernel test robot noticed "WARNING:at_fs/debugfs/file.c:#open_proxy_open" on:

commit: f8f25893a477a4da4414c3e40ddd51d77fac9cfc ("fs: debugfs: differentiate short fops with proxy ops")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

[test failed on linux-next/master 6ecd20965bdc21b265a0671ccf36d9ad8043f5ab]

in testcase: boot

config: i386-randconfig-054-20250108
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+-------------------------------------------------------------------------+-----------+------------+
|                                                                         | v6.13-rc3 | f8f25893a4 |
+-------------------------------------------------------------------------+-----------+------------+
| WARNING:at_fs/debugfs/file.c:#open_proxy_open                           | 0         | 24         |
| EIP:open_proxy_open                                                     | 0         | 24         |
+-------------------------------------------------------------------------+-----------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202501101055.bb8bf3e7-lkp@xxxxxxxxx


[   26.402607][  T279] ------------[ cut here ]------------
[ 26.403497][ T279] WARNING: CPU: 1 PID: 279 at fs/debugfs/file.c:90 open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[   26.405856][  T279] Modules linked in: crc32_pclmul floppy i2c_piix4 i2c_smbus bochs i6300esb intel_agp intel_gtt tiny_power_button qemu_fw_cfg button
[   26.407586][  T279] CPU: 1 UID: 0 PID: 279 Comm: run-lkp Tainted: G                T  6.13.0-rc3-00001-gf8f25893a477 #1 1ddff3390d23c70538fc5495354291f300c5b61c
[   26.409304][  T279] Tainted: [T]=RANDSTRUCT
[   26.409883][  T279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 26.411181][ T279] EIP: open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.411815][ T279] Code: 8b 71 08 83 c1 08 85 f6 89 45 f0 74 39 8d 7e 01 89 f0 f0 0f b1 39 89 c7 8b 45 f0 74 2b 89 fe 85 ff 75 ea 31 f6 8b 45 f0 eb 1e <0f> 0b be ea ff ff ff e9 47 01 00 00 be fe ff ff ff 39 5b 28 0f 85
All code
========
   0:	8b 71 08             	mov    0x8(%rcx),%esi
   3:	83 c1 08             	add    $0x8,%ecx
   6:	85 f6                	test   %esi,%esi
   8:	89 45 f0             	mov    %eax,-0x10(%rbp)
   b:	74 39                	je     0x46
   d:	8d 7e 01             	lea    0x1(%rsi),%edi
  10:	89 f0                	mov    %esi,%eax
  12:	f0 0f b1 39          	lock cmpxchg %edi,(%rcx)
  16:	89 c7                	mov    %eax,%edi
  18:	8b 45 f0             	mov    -0x10(%rbp),%eax
  1b:	74 2b                	je     0x48
  1d:	89 fe                	mov    %edi,%esi
  1f:	85 ff                	test   %edi,%edi
  21:	75 ea                	jne    0xd
  23:	31 f6                	xor    %esi,%esi
  25:	8b 45 f0             	mov    -0x10(%rbp),%eax
  28:	eb 1e                	jmp    0x48
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	be ea ff ff ff       	mov    $0xffffffea,%esi
  31:	e9 47 01 00 00       	jmp    0x17d
  36:	be fe ff ff ff       	mov    $0xfffffffe,%esi
  3b:	39 5b 28             	cmp    %ebx,0x28(%rbx)
  3e:	0f                   	.byte 0xf
  3f:	85                   	.byte 0x85

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	be ea ff ff ff       	mov    $0xffffffea,%esi
   7:	e9 47 01 00 00       	jmp    0x153
   c:	be fe ff ff ff       	mov    $0xfffffffe,%esi
  11:	39 5b 28             	cmp    %ebx,0x28(%rbx)
  14:	0f                   	.byte 0xf
  15:	85                   	.byte 0x85
[   26.414405][  T279] EAX: c406c2f0 EBX: c4004008 ECX: c2599185 EDX: ec4bedc0
[   26.415331][  T279] ESI: ec4bedc0 EDI: c144fde0 EBP: edf3dd0c ESP: edf3dcf8
[   26.416318][  T279] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010202
[   26.417258][  T279] CR0: 80050033 CR2: 004e1a10 CR3: 2c4b7000 CR4: 000406d0
[   26.418217][  T279] Call Trace:
[ 26.418680][ T279] ? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
[ 26.419395][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.420080][ T279] ? __warn (kernel/panic.c:242)
[ 26.420669][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.421369][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.422017][ T279] ? report_bug (lib/bug.c:199 (discriminator 2))
[ 26.422798][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 26.423456][ T279] ? handle_bug (arch/x86/kernel/traps.c:?)
[ 26.424048][ T279] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1))
[ 26.424725][ T279] ? handle_exception (arch/x86/entry/entry_32.S:1055)
[ 26.425536][ T279] ? debugfs_leave_cancellation (fs/debugfs/file.c:278)
[ 26.426343][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 26.426977][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.427665][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 26.428307][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.429504][ T279] ? debugfs_leave_cancellation (fs/debugfs/file.c:278)
[ 26.430226][ T279] do_dentry_open (fs/open.c:946)
[ 26.430821][ T279] vfs_open (fs/open.c:1076)
[ 26.431374][ T279] path_openat (fs/namei.c:3829)
[ 26.432010][ T279] ? stack_depot_save (lib/stackdepot.c:686)
[ 26.432760][ T279] ? set_track_prepare (mm/slub.c:937)
[ 26.433483][ T279] ? getname_flags (fs/namei.c:?)
[ 26.434155][ T279] ? do_sys_openat2 (fs/open.c:1396)
[ 26.434795][ T279] ? __ia32_sys_openat (fs/open.c:1417 fs/open.c:1433 fs/open.c:1428 fs/open.c:1428)
[ 26.435544][ T279] ? ia32_sys_call (kbuild/obj/consumer/i386-randconfig-054-20250108/./arch/x86/include/generated/asm/syscalls_32.h:317 (discriminator 1141047296))
[ 26.436271][ T279] do_filp_open (fs/namei.c:4014)
[ 26.436934][ T279] do_sys_openat2 (fs/open.c:1402)
[ 26.437559][ T279] __ia32_sys_openat (fs/open.c:1417 fs/open.c:1433 fs/open.c:1428 fs/open.c:1428)
[ 26.438228][ T279] ia32_sys_call (kbuild/obj/consumer/i386-randconfig-054-20250108/./arch/x86/include/generated/asm/syscalls_32.h:317 (discriminator 1141047296))
[ 26.438978][ T279] do_int80_syscall_32 (arch/x86/entry/common.c:?)
[ 26.439688][ T279] ? handle_mm_fault (mm/memory.c:5817)
[ 26.440403][ T279] ? lock_release (kernel/locking/lockdep.c:?)
[ 26.441403][ T279] ? do_user_addr_fault (arch/x86/mm/fault.c:1419)
[ 26.442202][ T279] ? irqentry_exit_to_user_mode (kernel/entry/common.c:234)
[ 26.443014][ T279] ? irqentry_exit (kernel/entry/common.c:367)
[ 26.443673][ T279] ? exc_page_fault (arch/x86/mm/fault.c:1543 (discriminator 1))
[ 26.444279][ T279] entry_INT80_32 (arch/x86/entry/entry_32.S:945)
[   26.444945][  T279] EIP: 0xb7f77092
[ 26.445472][ T279] Code: 00 00 00 e9 90 ff ff ff ff a3 24 00 00 00 68 30 00 00 00 e9 80 ff ff ff ff a3 f8 ff ff ff 66 90 00 00 00 00 00 00 00 00 cd 80 <c3> 8d b4 26 00 00 00 00 8d b6 00 00 00 00 8b 1c 24 c3 8d b4 26 00
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 e9                	add    %ch,%cl
   4:	90                   	nop
   5:	ff                   	(bad)
   6:	ff                   	(bad)
   7:	ff                   	(bad)
   8:	ff a3 24 00 00 00    	jmp    *0x24(%rbx)
   e:	68 30 00 00 00       	push   $0x30
  13:	e9 80 ff ff ff       	jmp    0xffffffffffffff98
  18:	ff a3 f8 ff ff ff    	jmp    *-0x8(%rbx)
  1e:	66 90                	xchg   %ax,%ax
	...
  28:	cd 80                	int    $0x80
  2a:*	c3                   	ret		<-- trapping instruction
  2b:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
  32:	8d b6 00 00 00 00    	lea    0x0(%rsi),%esi
  38:	8b 1c 24             	mov    (%rsp),%ebx
  3b:	c3                   	ret
  3c:	8d                   	.byte 0x8d
  3d:	b4 26                	mov    $0x26,%ah
	...

Code starting with the faulting instruction
===========================================
   0:	c3                   	ret
   1:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
   8:	8d b6 00 00 00 00    	lea    0x0(%rsi),%esi
   e:	8b 1c 24             	mov    (%rsp),%ebx
  11:	c3                   	ret
  12:	8d                   	.byte 0x8d
  13:	b4 26                	mov    $0x26,%ah


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250110/202501101055.bb8bf3e7-lkp@xxxxxxxxx



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki





[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [NTFS 3]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [NTFS 3]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux