* [linux-next:master] [fs] f8f25893a4: WARNING:at_fs/debugfs/file.c:#open_proxy_open
@ 2025-01-10 2:43 kernel test robot
0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2025-01-10 2:43 UTC (permalink / raw)
To: Johannes Berg
Cc: oe-lkp, lkp, Greg Kroah-Hartman, Geert Uytterhoeven,
linux-fsdevel, oliver.sang
Hello,
kernel test robot noticed "WARNING:at_fs/debugfs/file.c:#open_proxy_open" on:
commit: f8f25893a477a4da4414c3e40ddd51d77fac9cfc ("fs: debugfs: differentiate short fops with proxy ops")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
[test failed on linux-next/master 6ecd20965bdc21b265a0671ccf36d9ad8043f5ab]
in testcase: boot
config: i386-randconfig-054-20250108
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+-------------------------------------------------------------------------+-----------+------------+
| | v6.13-rc3 | f8f25893a4 |
+-------------------------------------------------------------------------+-----------+------------+
| WARNING:at_fs/debugfs/file.c:#open_proxy_open | 0 | 24 |
| EIP:open_proxy_open | 0 | 24 |
+-------------------------------------------------------------------------+-----------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202501101055.bb8bf3e7-lkp@intel.com
[ 26.402607][ T279] ------------[ cut here ]------------
[ 26.403497][ T279] WARNING: CPU: 1 PID: 279 at fs/debugfs/file.c:90 open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.405856][ T279] Modules linked in: crc32_pclmul floppy i2c_piix4 i2c_smbus bochs i6300esb intel_agp intel_gtt tiny_power_button qemu_fw_cfg button
[ 26.407586][ T279] CPU: 1 UID: 0 PID: 279 Comm: run-lkp Tainted: G T 6.13.0-rc3-00001-gf8f25893a477 #1 1ddff3390d23c70538fc5495354291f300c5b61c
[ 26.409304][ T279] Tainted: [T]=RANDSTRUCT
[ 26.409883][ T279] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 26.411181][ T279] EIP: open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.411815][ T279] Code: 8b 71 08 83 c1 08 85 f6 89 45 f0 74 39 8d 7e 01 89 f0 f0 0f b1 39 89 c7 8b 45 f0 74 2b 89 fe 85 ff 75 ea 31 f6 8b 45 f0 eb 1e <0f> 0b be ea ff ff ff e9 47 01 00 00 be fe ff ff ff 39 5b 28 0f 85
All code
========
0: 8b 71 08 mov 0x8(%rcx),%esi
3: 83 c1 08 add $0x8,%ecx
6: 85 f6 test %esi,%esi
8: 89 45 f0 mov %eax,-0x10(%rbp)
b: 74 39 je 0x46
d: 8d 7e 01 lea 0x1(%rsi),%edi
10: 89 f0 mov %esi,%eax
12: f0 0f b1 39 lock cmpxchg %edi,(%rcx)
16: 89 c7 mov %eax,%edi
18: 8b 45 f0 mov -0x10(%rbp),%eax
1b: 74 2b je 0x48
1d: 89 fe mov %edi,%esi
1f: 85 ff test %edi,%edi
21: 75 ea jne 0xd
23: 31 f6 xor %esi,%esi
25: 8b 45 f0 mov -0x10(%rbp),%eax
28: eb 1e jmp 0x48
2a:* 0f 0b ud2 <-- trapping instruction
2c: be ea ff ff ff mov $0xffffffea,%esi
31: e9 47 01 00 00 jmp 0x17d
36: be fe ff ff ff mov $0xfffffffe,%esi
3b: 39 5b 28 cmp %ebx,0x28(%rbx)
3e: 0f .byte 0xf
3f: 85 .byte 0x85
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: be ea ff ff ff mov $0xffffffea,%esi
7: e9 47 01 00 00 jmp 0x153
c: be fe ff ff ff mov $0xfffffffe,%esi
11: 39 5b 28 cmp %ebx,0x28(%rbx)
14: 0f .byte 0xf
15: 85 .byte 0x85
[ 26.414405][ T279] EAX: c406c2f0 EBX: c4004008 ECX: c2599185 EDX: ec4bedc0
[ 26.415331][ T279] ESI: ec4bedc0 EDI: c144fde0 EBP: edf3dd0c ESP: edf3dcf8
[ 26.416318][ T279] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010202
[ 26.417258][ T279] CR0: 80050033 CR2: 004e1a10 CR3: 2c4b7000 CR4: 000406d0
[ 26.418217][ T279] Call Trace:
[ 26.418680][ T279] ? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
[ 26.419395][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.420080][ T279] ? __warn (kernel/panic.c:242)
[ 26.420669][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.421369][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.422017][ T279] ? report_bug (lib/bug.c:199 (discriminator 2))
[ 26.422798][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 26.423456][ T279] ? handle_bug (arch/x86/kernel/traps.c:?)
[ 26.424048][ T279] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1))
[ 26.424725][ T279] ? handle_exception (arch/x86/entry/entry_32.S:1055)
[ 26.425536][ T279] ? debugfs_leave_cancellation (fs/debugfs/file.c:278)
[ 26.426343][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 26.426977][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.427665][ T279] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 26.428307][ T279] ? open_proxy_open (fs/debugfs/file.c:90 (discriminator 10))
[ 26.429504][ T279] ? debugfs_leave_cancellation (fs/debugfs/file.c:278)
[ 26.430226][ T279] do_dentry_open (fs/open.c:946)
[ 26.430821][ T279] vfs_open (fs/open.c:1076)
[ 26.431374][ T279] path_openat (fs/namei.c:3829)
[ 26.432010][ T279] ? stack_depot_save (lib/stackdepot.c:686)
[ 26.432760][ T279] ? set_track_prepare (mm/slub.c:937)
[ 26.433483][ T279] ? getname_flags (fs/namei.c:?)
[ 26.434155][ T279] ? do_sys_openat2 (fs/open.c:1396)
[ 26.434795][ T279] ? __ia32_sys_openat (fs/open.c:1417 fs/open.c:1433 fs/open.c:1428 fs/open.c:1428)
[ 26.435544][ T279] ? ia32_sys_call (kbuild/obj/consumer/i386-randconfig-054-20250108/./arch/x86/include/generated/asm/syscalls_32.h:317 (discriminator 1141047296))
[ 26.436271][ T279] do_filp_open (fs/namei.c:4014)
[ 26.436934][ T279] do_sys_openat2 (fs/open.c:1402)
[ 26.437559][ T279] __ia32_sys_openat (fs/open.c:1417 fs/open.c:1433 fs/open.c:1428 fs/open.c:1428)
[ 26.438228][ T279] ia32_sys_call (kbuild/obj/consumer/i386-randconfig-054-20250108/./arch/x86/include/generated/asm/syscalls_32.h:317 (discriminator 1141047296))
[ 26.438978][ T279] do_int80_syscall_32 (arch/x86/entry/common.c:?)
[ 26.439688][ T279] ? handle_mm_fault (mm/memory.c:5817)
[ 26.440403][ T279] ? lock_release (kernel/locking/lockdep.c:?)
[ 26.441403][ T279] ? do_user_addr_fault (arch/x86/mm/fault.c:1419)
[ 26.442202][ T279] ? irqentry_exit_to_user_mode (kernel/entry/common.c:234)
[ 26.443014][ T279] ? irqentry_exit (kernel/entry/common.c:367)
[ 26.443673][ T279] ? exc_page_fault (arch/x86/mm/fault.c:1543 (discriminator 1))
[ 26.444279][ T279] entry_INT80_32 (arch/x86/entry/entry_32.S:945)
[ 26.444945][ T279] EIP: 0xb7f77092
[ 26.445472][ T279] Code: 00 00 00 e9 90 ff ff ff ff a3 24 00 00 00 68 30 00 00 00 e9 80 ff ff ff ff a3 f8 ff ff ff 66 90 00 00 00 00 00 00 00 00 cd 80 <c3> 8d b4 26 00 00 00 00 8d b6 00 00 00 00 8b 1c 24 c3 8d b4 26 00
All code
========
0: 00 00 add %al,(%rax)
2: 00 e9 add %ch,%cl
4: 90 nop
5: ff (bad)
6: ff (bad)
7: ff (bad)
8: ff a3 24 00 00 00 jmp *0x24(%rbx)
e: 68 30 00 00 00 push $0x30
13: e9 80 ff ff ff jmp 0xffffffffffffff98
18: ff a3 f8 ff ff ff jmp *-0x8(%rbx)
1e: 66 90 xchg %ax,%ax
...
28: cd 80 int $0x80
2a:* c3 ret <-- trapping instruction
2b: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
32: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi
38: 8b 1c 24 mov (%rsp),%ebx
3b: c3 ret
3c: 8d .byte 0x8d
3d: b4 26 mov $0x26,%ah
...
Code starting with the faulting instruction
===========================================
0: c3 ret
1: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
8: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi
e: 8b 1c 24 mov (%rsp),%ebx
11: c3 ret
12: 8d .byte 0x8d
13: b4 26 mov $0x26,%ah
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250110/202501101055.bb8bf3e7-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2025-01-10 2:44 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-01-10 2:43 [linux-next:master] [fs] f8f25893a4: WARNING:at_fs/debugfs/file.c:#open_proxy_open kernel test robot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox