Linux-Fsdevel Archive mirror
 help / color / mirror / Atom feed
From: kernel test robot <oliver.sang@intel.com>
To: Al Viro <viro@zeniv.linux.org.uk>
Cc: <oe-lkp@lists.linux.dev>, <lkp@intel.com>,
	<linux-fsdevel@vger.kernel.org>, <linux-nfs@vger.kernel.org>,
	<oliver.sang@intel.com>
Subject: [viro-vfs:untested.persistency] [rpc_gssd_dummy_populate()] 5b8fc55107: WARNING:at_fs/namei.c:#lookup_one_len
Date: Tue, 21 May 2024 23:07:39 +0800	[thread overview]
Message-ID: <202405212204.3561a6e0-lkp@intel.com> (raw)



Hello,

kernel test robot noticed "WARNING:at_fs/namei.c:#lookup_one_len" on:

commit: 5b8fc55107547b5e2029da70e48a802555ddebc5 ("rpc_gssd_dummy_populate(): don't bother with rpc_populate()")
https://git.kernel.org/cgit/linux/kernel/git/viro/vfs.git untested.persistency

in testcase: boot

compiler: gcc-13
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+---------------------------------------+------------+------------+
|                                       | f1e3e91194 | 5b8fc55107 |
+---------------------------------------+------------+------------+
| WARNING:at_fs/namei.c:#lookup_one_len | 0          | 10         |
| EIP:lookup_one_len                    | 0          | 10         |
+---------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202405212204.3561a6e0-lkp@intel.com


[   12.875884][   T78] ------------[ cut here ]------------
[ 12.877101][ T78] WARNING: CPU: 0 PID: 78 at fs/namei.c:2749 lookup_one_len (fs/namei.c:2749 (discriminator 1)) 
[   12.878808][   T78] Modules linked in:
[   12.879785][   T78] CPU: 0 PID: 78 Comm: mount Not tainted 6.9.0-00025-g5b8fc5510754 #1
[   12.881481][   T78] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 12.883591][ T78] EIP: lookup_one_len (fs/namei.c:2749 (discriminator 1)) 
[ 12.884634][ T78] Code: 5d 31 d2 31 c9 c3 8d 74 26 00 31 c9 89 da 89 f0 e8 d5 f7 ff ff 85 c0 75 e2 31 c9 89 da 89 f0 e8 46 fe ff ff eb d5 8d 74 26 00 <0f> 0b eb b4 55 89 e5 56 53 89 cb 83 ec 0c 8b 49 38 c7 45 ec 00 00
All code
========
   0:	5d                   	pop    %rbp
   1:	31 d2                	xor    %edx,%edx
   3:	31 c9                	xor    %ecx,%ecx
   5:	c3                   	ret
   6:	8d 74 26 00          	lea    0x0(%rsi,%riz,1),%esi
   a:	31 c9                	xor    %ecx,%ecx
   c:	89 da                	mov    %ebx,%edx
   e:	89 f0                	mov    %esi,%eax
  10:	e8 d5 f7 ff ff       	call   0xfffffffffffff7ea
  15:	85 c0                	test   %eax,%eax
  17:	75 e2                	jne    0xfffffffffffffffb
  19:	31 c9                	xor    %ecx,%ecx
  1b:	89 da                	mov    %ebx,%edx
  1d:	89 f0                	mov    %esi,%eax
  1f:	e8 46 fe ff ff       	call   0xfffffffffffffe6a
  24:	eb d5                	jmp    0xfffffffffffffffb
  26:	8d 74 26 00          	lea    0x0(%rsi,%riz,1),%esi
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	eb b4                	jmp    0xffffffffffffffe2
  2e:	55                   	push   %rbp
  2f:	89 e5                	mov    %esp,%ebp
  31:	56                   	push   %rsi
  32:	53                   	push   %rbx
  33:	89 cb                	mov    %ecx,%ebx
  35:	83 ec 0c             	sub    $0xc,%esp
  38:	8b 49 38             	mov    0x38(%rcx),%ecx
  3b:	c7                   	.byte 0xc7
  3c:	45 ec                	rex.RB in (%dx),%al
	...

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	eb b4                	jmp    0xffffffffffffffb8
   4:	55                   	push   %rbp
   5:	89 e5                	mov    %esp,%ebp
   7:	56                   	push   %rsi
   8:	53                   	push   %rbx
   9:	89 cb                	mov    %ecx,%ebx
   b:	83 ec 0c             	sub    $0xc,%esp
   e:	8b 49 38             	mov    0x38(%rcx),%ecx
  11:	c7                   	.byte 0xc7
  12:	45 ec                	rex.RB in (%dx),%al
	...
[   12.888482][   T78] EAX: c2ae9824 EBX: c75406d0 ECX: 00000006 EDX: 00000000
[   12.889887][   T78] ESI: c2ae9824 EDI: eba49c64 EBP: eba49bf8 ESP: eba49be4
[   12.891386][   T78] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010246
[   12.892954][   T78] CR0: 80050033 CR2: b7f4f630 CR3: 2ab45000 CR4: 000406d0
[   12.894310][   T78] Call Trace:
[ 12.895022][ T78] ? show_regs (arch/x86/kernel/dumpstack.c:479) 
[ 12.896014][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1)) 
[ 12.896981][ T78] ? __warn (kernel/panic.c:694) 
[ 12.897870][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1)) 
[ 12.898831][ T78] ? report_bug (lib/bug.c:201 lib/bug.c:219) 
[ 12.899934][ T78] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 12.900893][ T78] ? handle_bug (arch/x86/kernel/traps.c:218) 
[ 12.901802][ T78] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1)) 
[ 12.902792][ T78] ? handle_exception (arch/x86/entry/entry_32.S:1047) 
[ 12.903923][ T78] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 12.904877][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1)) 
[ 12.905831][ T78] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 12.906751][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1)) 
[ 12.907837][ T78] start_creating_persistent (fs/libfs.c:2157 (discriminator 1)) 
[ 12.908975][ T78] rpc_create_common (net/sunrpc/rpc_pipe.c:492) 
[ 12.910041][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4)) 
[ 12.911039][ T78] ? __d_lookup (fs/dcache.c:2393) 
[ 12.912069][ T78] rpc_new_dir (net/sunrpc/rpc_pipe.c:532 (discriminator 1)) 
[ 12.913007][ T78] ? d_lookup (fs/dcache.c:2317) 
[ 12.913842][ T78] ? rpc_new_dir (net/sunrpc/rpc_pipe.c:532 (discriminator 1)) 
[ 12.914816][ T78] rpc_fill_super (net/sunrpc/rpc_pipe.c:1130 net/sunrpc/rpc_pipe.c:1167) 
[ 12.915900][ T78] ? shrinker_register (arch/x86/include/asm/atomic.h:28 include/linux/atomic/atomic-arch-fallback.h:503 include/linux/atomic/atomic-instrumented.h:68 include/linux/refcount.h:125 mm/shrinker.c:755) 
[ 12.916948][ T78] get_tree_keyed (fs/super.c:1268 fs/super.c:1305) 
[ 12.917939][ T78] ? rpc_kill_sb (net/sunrpc/rpc_pipe.c:1146) 
[ 12.918846][ T78] ? rpc_kill_sb (net/sunrpc/rpc_pipe.c:1146) 
[ 12.919861][ T78] ? get_tree_keyed (fs/super.c:1268 fs/super.c:1305) 
[ 12.920846][ T78] rpc_fs_get_tree (net/sunrpc/rpc_pipe.c:1195) 
[ 12.921836][ T78] vfs_get_tree (fs/super.c:1779) 
[ 12.922768][ T78] do_new_mount (fs/namespace.c:3352) 
[ 12.923821][ T78] path_mount (fs/namespace.c:3679) 
[ 12.924766][ T78] __ia32_sys_mount (fs/namespace.c:3692 fs/namespace.c:3898 fs/namespace.c:3875 fs/namespace.c:3875) 
[ 12.925813][ T78] ia32_sys_call (arch/x86/entry/syscall_32.c:42) 
[ 12.926845][ T78] do_int80_syscall_32 (arch/x86/entry/common.c:165 (discriminator 1) arch/x86/entry/common.c:339 (discriminator 1)) 
[ 12.927960][ T78] ? do_faccessat (fs/open.c:530) 
[ 12.928987][ T78] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4599) 
[ 12.934850][ T78] ? syscall_exit_to_user_mode (kernel/entry/common.c:221) 
[ 12.936035][ T78] ? do_int80_syscall_32 (arch/x86/entry/common.c:343) 
[ 12.937087][ T78] ? __lock_release+0x42/0x148 
[ 12.938193][ T78] ? filemap_map_pages (include/linux/rcupdate.h:813 mm/filemap.c:3615) 
[ 12.939319][ T78] ? filemap_map_pages (include/linux/rcupdate.h:813 mm/filemap.c:3615) 
[ 12.940365][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4)) 
[ 12.941304][ T78] ? filemap_map_pages (mm/filemap.c:3617 (discriminator 2)) 
[ 12.942365][ T78] ? find_held_lock (kernel/locking/lockdep.c:5244 (discriminator 1)) 
[ 12.943411][ T78] ? __lock_release+0x42/0x148 
[ 12.944537][ T78] ? do_fault_around (include/linux/rcupdate.h:813 mm/memory.c:4855) 
[ 12.945572][ T78] ? do_fault_around (include/linux/rcupdate.h:813 mm/memory.c:4855) 
[ 12.946583][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4)) 
[ 12.947532][ T78] ? do_fault_around (mm/memory.c:4858) 
[ 12.948449][ T78] ? do_pte_missing (mm/memory.c:4885 mm/memory.c:5024 mm/memory.c:3880) 
[ 12.949473][ T78] ? handle_pte_fault (include/linux/rcupdate.h:813 mm/memory.c:5294) 
[ 12.950502][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4)) 
[ 12.951532][ T78] ? handle_pte_fault (mm/memory.c:5300) 
[ 12.952592][ T78] ? find_held_lock (kernel/locking/lockdep.c:5244 (discriminator 1)) 
[ 12.953569][ T78] ? __lock_release+0x42/0x148 
[ 12.954665][ T78] ? do_user_addr_fault (arch/x86/mm/fault.c:1412 (discriminator 1)) 
[ 12.955830][ T78] ? do_user_addr_fault (arch/x86/mm/fault.c:1412 (discriminator 1)) 
[ 12.956945][ T78] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4599) 
[ 12.958255][ T78] ? syscall_exit_to_user_mode (kernel/entry/common.c:221) 
[ 12.959452][ T78] ? do_int80_syscall_32 (arch/x86/entry/common.c:343) 
[ 12.960522][ T78] ? exc_page_fault (arch/x86/mm/fault.c:1536) 
[ 12.961548][ T78] entry_INT80_32 (arch/x86/entry/entry_32.S:944) 
[   12.962475][   T78] EIP: 0xb7fa6092
[ 12.963303][ T78] Code: 00 00 00 e9 90 ff ff ff ff a3 24 00 00 00 68 30 00 00 00 e9 80 ff ff ff ff a3 f8 ff ff ff 66 90 00 00 00 00 00 00 00 00 cd 80 <c3> 8d b4 26 00 00 00 00 8d b6 00 00 00 00 8b 1c 24 c3 8d b4 26 00
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 e9                	add    %ch,%cl
   4:	90                   	nop
   5:	ff                   	(bad)
   6:	ff                   	(bad)
   7:	ff                   	(bad)
   8:	ff a3 24 00 00 00    	jmp    *0x24(%rbx)
   e:	68 30 00 00 00       	push   $0x30
  13:	e9 80 ff ff ff       	jmp    0xffffffffffffff98
  18:	ff a3 f8 ff ff ff    	jmp    *-0x8(%rbx)
  1e:	66 90                	xchg   %ax,%ax
	...
  28:	cd 80                	int    $0x80
  2a:*	c3                   	ret		<-- trapping instruction
  2b:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
  32:	8d b6 00 00 00 00    	lea    0x0(%rsi),%esi
  38:	8b 1c 24             	mov    (%rsp),%ebx
  3b:	c3                   	ret
  3c:	8d                   	.byte 0x8d
  3d:	b4 26                	mov    $0x26,%ah
	...

Code starting with the faulting instruction
===========================================
   0:	c3                   	ret
   1:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
   8:	8d b6 00 00 00 00    	lea    0x0(%rsi),%esi
   e:	8b 1c 24             	mov    (%rsp),%ebx
  11:	c3                   	ret
  12:	8d                   	.byte 0x8d
  13:	b4 26                	mov    $0x26,%ah


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240521/202405212204.3561a6e0-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


                 reply	other threads:[~2024-05-21 15:08 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202405212204.3561a6e0-lkp@intel.com \
    --to=oliver.sang@intel.com \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=linux-nfs@vger.kernel.org \
    --cc=lkp@intel.com \
    --cc=oe-lkp@lists.linux.dev \
    --cc=viro@zeniv.linux.org.uk \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).