Hello, kernel test robot noticed "WARNING:at_fs/debugfs/file.c:#open_proxy_open" on: commit: f8f25893a477a4da4414c3e40ddd51d77fac9cfc ("fs: debugfs: differentiate short fops with proxy ops") https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master [test failed on linux-next/master 6ecd20965bdc21b265a0671ccf36d9ad8043f5ab] in testcase: boot config: i386-randconfig-054-20250108 compiler: clang-19 test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G (please refer to attached dmesg/kmsg for entire log/backtrace) +-------------------------------------------------------------------------+-----------+------------+ | | v6.13-rc3 | f8f25893a4 | +-------------------------------------------------------------------------+-----------+------------+ | WARNING:at_fs/debugfs/file.c:#open_proxy_open | 0 | 24 | | EIP:open_proxy_open | 0 | 24 | +-------------------------------------------------------------------------+-----------+------------+ If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-lkp/202501101055.bb8bf3e7-lkp@xxxxxxxxx [ 26.402607][ T279] ------------[ cut here ]------------ [ 26.403497][ T279] WARNING: CPU: 1 PID: 279 at fs/debugfs/file.c:90 open_proxy_open (fs/debugfs/file.c:90 (discriminator 10)) [ 26.405856][ T279] Modules linked in: crc32_pclmul floppy i2c_piix4 i2c_smbus bochs i6300esb intel_agp intel_gtt tiny_power_button qemu_fw_cfg button [ 26.407586][ T279] CPU: 1 UID: 0 PID: 279 Comm: run-lkp Tainted: G T 6.13.0-rc3-00001-gf8f25893a477 #1 1ddff3390d23c70538fc5495354291f300c5b61c [ 26.409304][ T279] Tainted: [T]=RANDSTRUCT [ 26.409883][ T279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 26.411181][ T279] EIP: open_proxy_open (fs/debugfs/file.c:90 (discriminator 10)) [ 26.411815][ T279] Code: 8b 71 08 83 c1 08 85 f6 89 45 f0 74 39 8d 7e 01 89 f0 f0 0f b1 39 89 c7 8b 45 f0 74 2b 89 fe 85 ff 75 ea 31 f6 8b 45 f0 eb 1e <0f> 0b be ea ff ff ff e9 47 01 00 00 be fe ff ff ff 39 5b 28 0f 85 All code ======== 0: 8b 71 08 mov 0x8(%rcx),%esi 3: 83 c1 08 add $0x8,%ecx 6: 85 f6 test %esi,%esi 8: 89 45 f0 mov %eax,-0x10(%rbp) b: 74 39 je 0x46 d: 8d 7e 01 lea 0x1(%rsi),%edi 10: 89 f0 mov %esi,%eax 12: f0 0f b1 39 lock cmpxchg %edi,(%rcx) 16: 89 c7 mov %eax,%edi 18: 8b 45 f0 mov -0x10(%rbp),%eax 1b: 74 2b je 0x48 1d: 89 fe mov %edi,%esi 1f: 85 ff test %edi,%edi 21: 75 ea jne 0xd 23: 31 f6 xor %esi,%esi 25: 8b 45 f0 mov -0x10(%rbp),%eax 28: eb 1e jmp 0x48 2a:* 0f 0b ud2 <-- trapping instruction 2c: be ea ff ff ff mov $0xffffffea,%esi 31: e9 47 01 00 00 jmp 0x17d 36: be fe ff ff ff mov $0xfffffffe,%esi 3b: 39 5b 28 cmp %ebx,0x28(%rbx) 3e: 0f .byte 0xf 3f: 85 .byte 0x85 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: be ea ff ff ff mov $0xffffffea,%esi 7: e9 47 01 00 00 jmp 0x153 c: be fe ff ff ff mov $0xfffffffe,%esi 11: 39 5b 28 cmp %ebx,0x28(%rbx) 14: 0f .byte 0xf 15: 85 .byte 0x85 [ 26.414405][ T279] EAX: c406c2f0 EBX: c4004008 ECX: c2599185 EDX: ec4bedc0 [ 26.415331][ T279] ESI: ec4bedc0 EDI: c144fde0 EBP: edf3dd0c ESP: edf3dcf8 [ 26.416318][ T279] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010202 [ 26.417258][ T279] CR0: 80050033 CR2: 004e1a10 CR3: 2c4b7000 CR4: 000406d0 [ 26.418217][ T279] Call Trace: [ 26.418680][ T279] ? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1)) [ 26.419395][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10)) [ 26.420080][ T279] ? __warn (kernel/panic.c:242) [ 26.420669][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10)) [ 26.421369][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10)) [ 26.422017][ T279] ? report_bug (lib/bug.c:199 (discriminator 2)) [ 26.422798][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301) [ 26.423456][ T279] ? handle_bug (arch/x86/kernel/traps.c:?) [ 26.424048][ T279] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 26.424725][ T279] ? handle_exception (arch/x86/entry/entry_32.S:1055) [ 26.425536][ T279] ? debugfs_leave_cancellation (fs/debugfs/file.c:278) [ 26.426343][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301) [ 26.426977][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10)) [ 26.427665][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301) [ 26.428307][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10)) [ 26.429504][ T279] ? debugfs_leave_cancellation (fs/debugfs/file.c:278) [ 26.430226][ T279] do_dentry_open (fs/open.c:946) [ 26.430821][ T279] vfs_open (fs/open.c:1076) [ 26.431374][ T279] path_openat (fs/namei.c:3829) [ 26.432010][ T279] ? stack_depot_save (lib/stackdepot.c:686) [ 26.432760][ T279] ? set_track_prepare (mm/slub.c:937) [ 26.433483][ T279] ? getname_flags (fs/namei.c:?) [ 26.434155][ T279] ? do_sys_openat2 (fs/open.c:1396) [ 26.434795][ T279] ? __ia32_sys_openat (fs/open.c:1417 fs/open.c:1433 fs/open.c:1428 fs/open.c:1428) [ 26.435544][ T279] ? ia32_sys_call (kbuild/obj/consumer/i386-randconfig-054-20250108/./arch/x86/include/generated/asm/syscalls_32.h:317 (discriminator 1141047296)) [ 26.436271][ T279] do_filp_open (fs/namei.c:4014) [ 26.436934][ T279] do_sys_openat2 (fs/open.c:1402) [ 26.437559][ T279] __ia32_sys_openat (fs/open.c:1417 fs/open.c:1433 fs/open.c:1428 fs/open.c:1428) [ 26.438228][ T279] ia32_sys_call (kbuild/obj/consumer/i386-randconfig-054-20250108/./arch/x86/include/generated/asm/syscalls_32.h:317 (discriminator 1141047296)) [ 26.438978][ T279] do_int80_syscall_32 (arch/x86/entry/common.c:?) [ 26.439688][ T279] ? handle_mm_fault (mm/memory.c:5817) [ 26.440403][ T279] ? lock_release (kernel/locking/lockdep.c:?) [ 26.441403][ T279] ? do_user_addr_fault (arch/x86/mm/fault.c:1419) [ 26.442202][ T279] ? irqentry_exit_to_user_mode (kernel/entry/common.c:234) [ 26.443014][ T279] ? irqentry_exit (kernel/entry/common.c:367) [ 26.443673][ T279] ? exc_page_fault (arch/x86/mm/fault.c:1543 (discriminator 1)) [ 26.444279][ T279] entry_INT80_32 (arch/x86/entry/entry_32.S:945) [ 26.444945][ T279] EIP: 0xb7f77092 [ 26.445472][ T279] Code: 00 00 00 e9 90 ff ff ff ff a3 24 00 00 00 68 30 00 00 00 e9 80 ff ff ff ff a3 f8 ff ff ff 66 90 00 00 00 00 00 00 00 00 cd 80 <c3> 8d b4 26 00 00 00 00 8d b6 00 00 00 00 8b 1c 24 c3 8d b4 26 00 All code ======== 0: 00 00 add %al,(%rax) 2: 00 e9 add %ch,%cl 4: 90 nop 5: ff (bad) 6: ff (bad) 7: ff (bad) 8: ff a3 24 00 00 00 jmp *0x24(%rbx) e: 68 30 00 00 00 push $0x30 13: e9 80 ff ff ff jmp 0xffffffffffffff98 18: ff a3 f8 ff ff ff jmp *-0x8(%rbx) 1e: 66 90 xchg %ax,%ax ... 28: cd 80 int $0x80 2a:* c3 ret <-- trapping instruction 2b: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi 32: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi 38: 8b 1c 24 mov (%rsp),%ebx 3b: c3 ret 3c: 8d .byte 0x8d 3d: b4 26 mov $0x26,%ah ... Code starting with the faulting instruction =========================================== 0: c3 ret 1: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi 8: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi e: 8b 1c 24 mov (%rsp),%ebx 11: c3 ret 12: 8d .byte 0x8d 13: b4 26 mov $0x26,%ah The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20250110/202501101055.bb8bf3e7-lkp@xxxxxxxxx -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki