2024-05-21 15:14:15

by kernel test robot

[permalink] [raw]
Subject: [viro-vfs:untested.persistency] [rpc_gssd_dummy_populate()] 5b8fc55107: WARNING:at_fs/namei.c:#lookup_one_len



Hello,

kernel test robot noticed "WARNING:at_fs/namei.c:#lookup_one_len" on:

commit: 5b8fc55107547b5e2029da70e48a802555ddebc5 ("rpc_gssd_dummy_populate(): don't bother with rpc_populate()")
https://git.kernel.org/cgit/linux/kernel/git/viro/vfs.git untested.persistency

in testcase: boot

compiler: gcc-13
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+---------------------------------------+------------+------------+
| | f1e3e91194 | 5b8fc55107 |
+---------------------------------------+------------+------------+
| WARNING:at_fs/namei.c:#lookup_one_len | 0 | 10 |
| EIP:lookup_one_len | 0 | 10 |
+---------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <[email protected]>
| Closes: https://lore.kernel.org/oe-lkp/[email protected]


[ 12.875884][ T78] ------------[ cut here ]------------
[ 12.877101][ T78] WARNING: CPU: 0 PID: 78 at fs/namei.c:2749 lookup_one_len (fs/namei.c:2749 (discriminator 1))
[ 12.878808][ T78] Modules linked in:
[ 12.879785][ T78] CPU: 0 PID: 78 Comm: mount Not tainted 6.9.0-00025-g5b8fc5510754 #1
[ 12.881481][ T78] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 12.883591][ T78] EIP: lookup_one_len (fs/namei.c:2749 (discriminator 1))
[ 12.884634][ T78] Code: 5d 31 d2 31 c9 c3 8d 74 26 00 31 c9 89 da 89 f0 e8 d5 f7 ff ff 85 c0 75 e2 31 c9 89 da 89 f0 e8 46 fe ff ff eb d5 8d 74 26 00 <0f> 0b eb b4 55 89 e5 56 53 89 cb 83 ec 0c 8b 49 38 c7 45 ec 00 00
All code
========
0: 5d pop %rbp
1: 31 d2 xor %edx,%edx
3: 31 c9 xor %ecx,%ecx
5: c3 ret
6: 8d 74 26 00 lea 0x0(%rsi,%riz,1),%esi
a: 31 c9 xor %ecx,%ecx
c: 89 da mov %ebx,%edx
e: 89 f0 mov %esi,%eax
10: e8 d5 f7 ff ff call 0xfffffffffffff7ea
15: 85 c0 test %eax,%eax
17: 75 e2 jne 0xfffffffffffffffb
19: 31 c9 xor %ecx,%ecx
1b: 89 da mov %ebx,%edx
1d: 89 f0 mov %esi,%eax
1f: e8 46 fe ff ff call 0xfffffffffffffe6a
24: eb d5 jmp 0xfffffffffffffffb
26: 8d 74 26 00 lea 0x0(%rsi,%riz,1),%esi
2a:* 0f 0b ud2 <-- trapping instruction
2c: eb b4 jmp 0xffffffffffffffe2
2e: 55 push %rbp
2f: 89 e5 mov %esp,%ebp
31: 56 push %rsi
32: 53 push %rbx
33: 89 cb mov %ecx,%ebx
35: 83 ec 0c sub $0xc,%esp
38: 8b 49 38 mov 0x38(%rcx),%ecx
3b: c7 .byte 0xc7
3c: 45 ec rex.RB in (%dx),%al
...

Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: eb b4 jmp 0xffffffffffffffb8
4: 55 push %rbp
5: 89 e5 mov %esp,%ebp
7: 56 push %rsi
8: 53 push %rbx
9: 89 cb mov %ecx,%ebx
b: 83 ec 0c sub $0xc,%esp
e: 8b 49 38 mov 0x38(%rcx),%ecx
11: c7 .byte 0xc7
12: 45 ec rex.RB in (%dx),%al
...
[ 12.888482][ T78] EAX: c2ae9824 EBX: c75406d0 ECX: 00000006 EDX: 00000000
[ 12.889887][ T78] ESI: c2ae9824 EDI: eba49c64 EBP: eba49bf8 ESP: eba49be4
[ 12.891386][ T78] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 12.892954][ T78] CR0: 80050033 CR2: b7f4f630 CR3: 2ab45000 CR4: 000406d0
[ 12.894310][ T78] Call Trace:
[ 12.895022][ T78] ? show_regs (arch/x86/kernel/dumpstack.c:479)
[ 12.896014][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1))
[ 12.896981][ T78] ? __warn (kernel/panic.c:694)
[ 12.897870][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1))
[ 12.898831][ T78] ? report_bug (lib/bug.c:201 lib/bug.c:219)
[ 12.899934][ T78] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 12.900893][ T78] ? handle_bug (arch/x86/kernel/traps.c:218)
[ 12.901802][ T78] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[ 12.902792][ T78] ? handle_exception (arch/x86/entry/entry_32.S:1047)
[ 12.903923][ T78] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 12.904877][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1))
[ 12.905831][ T78] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 12.906751][ T78] ? lookup_one_len (fs/namei.c:2749 (discriminator 1))
[ 12.907837][ T78] start_creating_persistent (fs/libfs.c:2157 (discriminator 1))
[ 12.908975][ T78] rpc_create_common (net/sunrpc/rpc_pipe.c:492)
[ 12.910041][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4))
[ 12.911039][ T78] ? __d_lookup (fs/dcache.c:2393)
[ 12.912069][ T78] rpc_new_dir (net/sunrpc/rpc_pipe.c:532 (discriminator 1))
[ 12.913007][ T78] ? d_lookup (fs/dcache.c:2317)
[ 12.913842][ T78] ? rpc_new_dir (net/sunrpc/rpc_pipe.c:532 (discriminator 1))
[ 12.914816][ T78] rpc_fill_super (net/sunrpc/rpc_pipe.c:1130 net/sunrpc/rpc_pipe.c:1167)
[ 12.915900][ T78] ? shrinker_register (arch/x86/include/asm/atomic.h:28 include/linux/atomic/atomic-arch-fallback.h:503 include/linux/atomic/atomic-instrumented.h:68 include/linux/refcount.h:125 mm/shrinker.c:755)
[ 12.916948][ T78] get_tree_keyed (fs/super.c:1268 fs/super.c:1305)
[ 12.917939][ T78] ? rpc_kill_sb (net/sunrpc/rpc_pipe.c:1146)
[ 12.918846][ T78] ? rpc_kill_sb (net/sunrpc/rpc_pipe.c:1146)
[ 12.919861][ T78] ? get_tree_keyed (fs/super.c:1268 fs/super.c:1305)
[ 12.920846][ T78] rpc_fs_get_tree (net/sunrpc/rpc_pipe.c:1195)
[ 12.921836][ T78] vfs_get_tree (fs/super.c:1779)
[ 12.922768][ T78] do_new_mount (fs/namespace.c:3352)
[ 12.923821][ T78] path_mount (fs/namespace.c:3679)
[ 12.924766][ T78] __ia32_sys_mount (fs/namespace.c:3692 fs/namespace.c:3898 fs/namespace.c:3875 fs/namespace.c:3875)
[ 12.925813][ T78] ia32_sys_call (arch/x86/entry/syscall_32.c:42)
[ 12.926845][ T78] do_int80_syscall_32 (arch/x86/entry/common.c:165 (discriminator 1) arch/x86/entry/common.c:339 (discriminator 1))
[ 12.927960][ T78] ? do_faccessat (fs/open.c:530)
[ 12.928987][ T78] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4599)
[ 12.934850][ T78] ? syscall_exit_to_user_mode (kernel/entry/common.c:221)
[ 12.936035][ T78] ? do_int80_syscall_32 (arch/x86/entry/common.c:343)
[ 12.937087][ T78] ? __lock_release+0x42/0x148
[ 12.938193][ T78] ? filemap_map_pages (include/linux/rcupdate.h:813 mm/filemap.c:3615)
[ 12.939319][ T78] ? filemap_map_pages (include/linux/rcupdate.h:813 mm/filemap.c:3615)
[ 12.940365][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4))
[ 12.941304][ T78] ? filemap_map_pages (mm/filemap.c:3617 (discriminator 2))
[ 12.942365][ T78] ? find_held_lock (kernel/locking/lockdep.c:5244 (discriminator 1))
[ 12.943411][ T78] ? __lock_release+0x42/0x148
[ 12.944537][ T78] ? do_fault_around (include/linux/rcupdate.h:813 mm/memory.c:4855)
[ 12.945572][ T78] ? do_fault_around (include/linux/rcupdate.h:813 mm/memory.c:4855)
[ 12.946583][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4))
[ 12.947532][ T78] ? do_fault_around (mm/memory.c:4858)
[ 12.948449][ T78] ? do_pte_missing (mm/memory.c:4885 mm/memory.c:5024 mm/memory.c:3880)
[ 12.949473][ T78] ? handle_pte_fault (include/linux/rcupdate.h:813 mm/memory.c:5294)
[ 12.950502][ T78] ? lock_release (kernel/locking/lockdep.c:467 (discriminator 4) kernel/locking/lockdep.c:5776 (discriminator 4))
[ 12.951532][ T78] ? handle_pte_fault (mm/memory.c:5300)
[ 12.952592][ T78] ? find_held_lock (kernel/locking/lockdep.c:5244 (discriminator 1))
[ 12.953569][ T78] ? __lock_release+0x42/0x148
[ 12.954665][ T78] ? do_user_addr_fault (arch/x86/mm/fault.c:1412 (discriminator 1))
[ 12.955830][ T78] ? do_user_addr_fault (arch/x86/mm/fault.c:1412 (discriminator 1))
[ 12.956945][ T78] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4599)
[ 12.958255][ T78] ? syscall_exit_to_user_mode (kernel/entry/common.c:221)
[ 12.959452][ T78] ? do_int80_syscall_32 (arch/x86/entry/common.c:343)
[ 12.960522][ T78] ? exc_page_fault (arch/x86/mm/fault.c:1536)
[ 12.961548][ T78] entry_INT80_32 (arch/x86/entry/entry_32.S:944)
[ 12.962475][ T78] EIP: 0xb7fa6092
[ 12.963303][ T78] Code: 00 00 00 e9 90 ff ff ff ff a3 24 00 00 00 68 30 00 00 00 e9 80 ff ff ff ff a3 f8 ff ff ff 66 90 00 00 00 00 00 00 00 00 cd 80 <c3> 8d b4 26 00 00 00 00 8d b6 00 00 00 00 8b 1c 24 c3 8d b4 26 00
All code
========
0: 00 00 add %al,(%rax)
2: 00 e9 add %ch,%cl
4: 90 nop
5: ff (bad)
6: ff (bad)
7: ff (bad)
8: ff a3 24 00 00 00 jmp *0x24(%rbx)
e: 68 30 00 00 00 push $0x30
13: e9 80 ff ff ff jmp 0xffffffffffffff98
18: ff a3 f8 ff ff ff jmp *-0x8(%rbx)
1e: 66 90 xchg %ax,%ax
...
28: cd 80 int $0x80
2a:* c3 ret <-- trapping instruction
2b: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
32: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi
38: 8b 1c 24 mov (%rsp),%ebx
3b: c3 ret
3c: 8d .byte 0x8d
3d: b4 26 mov $0x26,%ah
...

Code starting with the faulting instruction
===========================================
0: c3 ret
1: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
8: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi
e: 8b 1c 24 mov (%rsp),%ebx
11: c3 ret
12: 8d .byte 0x8d
13: b4 26 mov $0x26,%ah


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240521/[email protected]



--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki