lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Sun, 8 May 2022 23:00:07 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Jchao Sun <sunjunchao2870@...il.com>
Cc:     0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
        lkp@...ts.01.org
Subject: [writeback]  af0b042e91: WARNING:at_fs/read_write.c:#vfs_read



Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: af0b042e914fbaf7a7ac9d463c91b8566461c39f ("writeback: Fix inode->i_io_list not be protected by inode->i_lock error")
url: https://github.com/intel-lab-lkp/linux/commits/UPDATE-20220505-023756/Jchao-Sun/Add-assert-for-inode-i_io_list-in-inode_io_list_move_locked/20220503-180501

in testcase: xfstests
version: xfstests-x86_64-46e1b83-1_20220414
with following parameters:

	disk: 4HDD
	fs: xfs
	test: xfs-reflink-10
	ucode: 0x21

test-description: xfstests is a regression test suite for xfs and other files ystems.
test-url: git://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git


on test machine: 4 threads 1 sockets Intel(R) Core(TM) i3-3220 CPU @ 3.30GHz with 8G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[ 125.042119][ C1] WARNING: CPU: 1 PID: 1 at fs/read_write.c:470 vfs_read (fs/read_write.c:470) 
[  125.042132][    C1] Modules linked in:
[  125.042134][    T1]  xfs dm_mod netconsole btrfs blake2b_generic xor raid6_pq zstd_compress libcrc32c sd_mod t10_pi crc64_rocksoft_generic crc64_rocksoft crc64 intel_rapl_msr intel_rapl_common sg ipmi_devintf x86_pkg_temp_thermal intel_powerclamp ipmi_msghandler coretemp i915 kvm_intel kvm intel_gtt drm_buddy drm_dp_helper ttm drm_kms_helper irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel syscopyarea sysfillrect wmi_bmof ghash_clmulni_intel sysimgblt ahci libahci fb_sys_fops rapl intel_cstate libata intel_uncore mei_me drm mei wmi video ip_tables
[  125.059472][    C1]
[  125.059476][    C1] CPU: 1 PID: 1 Comm: systemd Not tainted 5.18.0-rc5-00007-gaf0b042e914f #1
[  125.059479][    C1] Hardware name: Hewlett-Packard HP Pro 3340 MT/17A1, BIOS 8.07 01/24/2013
[ 125.059481][ C1] RIP: 0010:vfs_read (fs/read_write.c:470) 
[ 125.059489][ C1] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 98 03 00 00 41 8b 94 24 00 23 00 00 85 d2 75 02 <0f> 0b 48 b8 00 f0 ff ff ff 7f 00 00 49 c7 c4 f2 ff ff ff 48 39 c5
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	fc                   	cld    
   5:	ff                   	(bad)  
   6:	df 48 89             	fisttps -0x77(%rax)
   9:	fa                   	cli    
   a:	48 c1 ea 03          	shr    $0x3,%rdx
   e:	0f b6 04 02          	movzbl (%rdx,%rax,1),%eax
  12:	84 c0                	test   %al,%al
  14:	74 08                	je     0x1e
  16:	3c 03                	cmp    $0x3,%al
  18:	0f 8e 98 03 00 00    	jle    0x3b6
  1e:	41 8b 94 24 00 23 00 	mov    0x2300(%r12),%edx
  25:	00 
  26:	85 d2                	test   %edx,%edx
  28:	75 02                	jne    0x2c
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	48 b8 00 f0 ff ff ff 	movabs $0x7ffffffff000,%rax
  33:	7f 00 00 
  36:	49 c7 c4 f2 ff ff ff 	mov    $0xfffffffffffffff2,%r12
  3d:	48 39 c5             	cmp    %rax,%rbp

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	48 b8 00 f0 ff ff ff 	movabs $0x7ffffffff000,%rax
   9:	7f 00 00 
   c:	49 c7 c4 f2 ff ff ff 	mov    $0xfffffffffffffff2,%r12
  13:	48 39 c5             	cmp    %rax,%rbp
[  125.059492][    C1] RSP: 0018:ffffc9000002fe60 EFLAGS: 00010246
[  125.059495][    C1] RAX: 0000000000000000 RBX: ffff8881133a7040 RCX: ffffc9000002fec8
[  125.059497][    C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881002bf580
[  125.059499][    C1] RBP: 0000000000001000 R08: 0000000000000000 R09: ffff8881133a707f
[  125.059500][    C1] R10: ffffed1022674e0f R11: 0000000000000001 R12: ffff8881002bd280
[  125.059502][    C1] R13: ffffc9000002fec8 R14: 000055b02d170e70 R15: ffff8881133a7084
[  125.059504][    C1] FS:  00007f4af7253940(0000) GS:ffff8881aac80000(0000) knlGS:0000000000000000
[  125.059506][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  125.059508][    C1] CR2: 00007f2f979c54f4 CR3: 000000012c982002 CR4: 00000000001706e0
[  125.059510][    C1] Call Trace:
[  125.059511][    C1]  <TASK>
[ 125.059513][ C1] ksys_read (fs/read_write.c:620) 
[ 125.059517][ C1] ? __ia32_sys_pwrite64 (fs/read_write.c:610) 
[ 125.059522][ C1] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
[ 125.059526][ C1] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:115) 
[  125.059529][    C1] RIP: 0033:0x7f4af8404494
[ 125.059533][ C1] Code: 66 0f 1f 44 00 00 41 54 49 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 cb c2 01 00 4c 89 e2 48 89 ee 89 df 41 89 c0 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 48 89 44 24 08 e8 07 c3 01 00 48
All code
========
   0:	66 0f 1f 44 00 00    	nopw   0x0(%rax,%rax,1)
   6:	41 54                	push   %r12
   8:	49 89 d4             	mov    %rdx,%r12
   b:	55                   	push   %rbp
   c:	48 89 f5             	mov    %rsi,%rbp
   f:	53                   	push   %rbx
  10:	89 fb                	mov    %edi,%ebx
  12:	48 83 ec 10          	sub    $0x10,%rsp
  16:	e8 cb c2 01 00       	callq  0x1c2e6
  1b:	4c 89 e2             	mov    %r12,%rdx
  1e:	48 89 ee             	mov    %rbp,%rsi
  21:	89 df                	mov    %ebx,%edi
  23:	41 89 c0             	mov    %eax,%r8d
  26:	31 c0                	xor    %eax,%eax
  28:	0f 05                	syscall 
  2a:*	48 3d 00 f0 ff ff    	cmp    $0xfffffffffffff000,%rax		<-- trapping instruction
  30:	77 38                	ja     0x6a
  32:	44 89 c7             	mov    %r8d,%edi
  35:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  3a:	e8 07 c3 01 00       	callq  0x1c346
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 3d 00 f0 ff ff    	cmp    $0xfffffffffffff000,%rax
   6:	77 38                	ja     0x40
   8:	44 89 c7             	mov    %r8d,%edi
   b:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  10:	e8 07 c3 01 00       	callq  0x1c31c
  15:	48                   	rex.W
[  125.059535][    C1] RSP: 002b:00007fff09a72080 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[  125.059538][    C1] RAX: ffffffffffffffda RBX: 0000000000000025 RCX: 00007f4af8404494
[  125.059540][    C1] RDX: 0000000000001000 RSI: 000055b02d170e70 RDI: 0000000000000025
[  125.059541][    C1] RBP: 000055b02d170e70 R08: 0000000000000000 R09: 00007f4af84d5d90
[  125.059543][    C1] R10: 000055b02d0b3010 R11: 0000000000000246 R12: 0000000000001000
[  125.059544][    C1] R13: 00007f4af84d22a0 R14: 0000000000000d68 R15: 00007f4af84d1760
[  125.059547][    C1]  </TASK>
[  125.059548][    C1] ---[ end trace 0000000000000000 ]---


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.18.0-rc5-00007-gaf0b042e914f" of type "text/plain" (166090 bytes)

View attachment "job-script" of type "text/plain" (5875 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (9260 bytes)

View attachment "xfstests" of type "text/plain" (1320 bytes)

View attachment "job.yaml" of type "text/plain" (4983 bytes)

View attachment "reproduce" of type "text/plain" (975 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ