[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20220508150007.GA16958@xsang-OptiPlex-9020>
Date: Sun, 8 May 2022 23:00:07 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Jchao Sun <sunjunchao2870@...il.com>
Cc: 0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
lkp@...ts.01.org
Subject: [writeback] af0b042e91: WARNING:at_fs/read_write.c:#vfs_read
Greeting,
FYI, we noticed the following commit (built with gcc-11):
commit: af0b042e914fbaf7a7ac9d463c91b8566461c39f ("writeback: Fix inode->i_io_list not be protected by inode->i_lock error")
url: https://github.com/intel-lab-lkp/linux/commits/UPDATE-20220505-023756/Jchao-Sun/Add-assert-for-inode-i_io_list-in-inode_io_list_move_locked/20220503-180501
in testcase: xfstests
version: xfstests-x86_64-46e1b83-1_20220414
with following parameters:
disk: 4HDD
fs: xfs
test: xfs-reflink-10
ucode: 0x21
test-description: xfstests is a regression test suite for xfs and other files ystems.
test-url: git://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git
on test machine: 4 threads 1 sockets Intel(R) Core(TM) i3-3220 CPU @ 3.30GHz with 8G memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>
[ 125.042119][ C1] WARNING: CPU: 1 PID: 1 at fs/read_write.c:470 vfs_read (fs/read_write.c:470)
[ 125.042132][ C1] Modules linked in:
[ 125.042134][ T1] xfs dm_mod netconsole btrfs blake2b_generic xor raid6_pq zstd_compress libcrc32c sd_mod t10_pi crc64_rocksoft_generic crc64_rocksoft crc64 intel_rapl_msr intel_rapl_common sg ipmi_devintf x86_pkg_temp_thermal intel_powerclamp ipmi_msghandler coretemp i915 kvm_intel kvm intel_gtt drm_buddy drm_dp_helper ttm drm_kms_helper irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel syscopyarea sysfillrect wmi_bmof ghash_clmulni_intel sysimgblt ahci libahci fb_sys_fops rapl intel_cstate libata intel_uncore mei_me drm mei wmi video ip_tables
[ 125.059472][ C1]
[ 125.059476][ C1] CPU: 1 PID: 1 Comm: systemd Not tainted 5.18.0-rc5-00007-gaf0b042e914f #1
[ 125.059479][ C1] Hardware name: Hewlett-Packard HP Pro 3340 MT/17A1, BIOS 8.07 01/24/2013
[ 125.059481][ C1] RIP: 0010:vfs_read (fs/read_write.c:470)
[ 125.059489][ C1] Code: 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 98 03 00 00 41 8b 94 24 00 23 00 00 85 d2 75 02 <0f> 0b 48 b8 00 f0 ff ff ff 7f 00 00 49 c7 c4 f2 ff ff ff 48 39 c5
All code
========
0: 00 00 add %al,(%rax)
2: 00 00 add %al,(%rax)
4: fc cld
5: ff (bad)
6: df 48 89 fisttps -0x77(%rax)
9: fa cli
a: 48 c1 ea 03 shr $0x3,%rdx
e: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax
12: 84 c0 test %al,%al
14: 74 08 je 0x1e
16: 3c 03 cmp $0x3,%al
18: 0f 8e 98 03 00 00 jle 0x3b6
1e: 41 8b 94 24 00 23 00 mov 0x2300(%r12),%edx
25: 00
26: 85 d2 test %edx,%edx
28: 75 02 jne 0x2c
2a:* 0f 0b ud2 <-- trapping instruction
2c: 48 b8 00 f0 ff ff ff movabs $0x7ffffffff000,%rax
33: 7f 00 00
36: 49 c7 c4 f2 ff ff ff mov $0xfffffffffffffff2,%r12
3d: 48 39 c5 cmp %rax,%rbp
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 48 b8 00 f0 ff ff ff movabs $0x7ffffffff000,%rax
9: 7f 00 00
c: 49 c7 c4 f2 ff ff ff mov $0xfffffffffffffff2,%r12
13: 48 39 c5 cmp %rax,%rbp
[ 125.059492][ C1] RSP: 0018:ffffc9000002fe60 EFLAGS: 00010246
[ 125.059495][ C1] RAX: 0000000000000000 RBX: ffff8881133a7040 RCX: ffffc9000002fec8
[ 125.059497][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881002bf580
[ 125.059499][ C1] RBP: 0000000000001000 R08: 0000000000000000 R09: ffff8881133a707f
[ 125.059500][ C1] R10: ffffed1022674e0f R11: 0000000000000001 R12: ffff8881002bd280
[ 125.059502][ C1] R13: ffffc9000002fec8 R14: 000055b02d170e70 R15: ffff8881133a7084
[ 125.059504][ C1] FS: 00007f4af7253940(0000) GS:ffff8881aac80000(0000) knlGS:0000000000000000
[ 125.059506][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 125.059508][ C1] CR2: 00007f2f979c54f4 CR3: 000000012c982002 CR4: 00000000001706e0
[ 125.059510][ C1] Call Trace:
[ 125.059511][ C1] <TASK>
[ 125.059513][ C1] ksys_read (fs/read_write.c:620)
[ 125.059517][ C1] ? __ia32_sys_pwrite64 (fs/read_write.c:610)
[ 125.059522][ C1] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
[ 125.059526][ C1] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:115)
[ 125.059529][ C1] RIP: 0033:0x7f4af8404494
[ 125.059533][ C1] Code: 66 0f 1f 44 00 00 41 54 49 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 cb c2 01 00 4c 89 e2 48 89 ee 89 df 41 89 c0 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 48 89 44 24 08 e8 07 c3 01 00 48
All code
========
0: 66 0f 1f 44 00 00 nopw 0x0(%rax,%rax,1)
6: 41 54 push %r12
8: 49 89 d4 mov %rdx,%r12
b: 55 push %rbp
c: 48 89 f5 mov %rsi,%rbp
f: 53 push %rbx
10: 89 fb mov %edi,%ebx
12: 48 83 ec 10 sub $0x10,%rsp
16: e8 cb c2 01 00 callq 0x1c2e6
1b: 4c 89 e2 mov %r12,%rdx
1e: 48 89 ee mov %rbp,%rsi
21: 89 df mov %ebx,%edi
23: 41 89 c0 mov %eax,%r8d
26: 31 c0 xor %eax,%eax
28: 0f 05 syscall
2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction
30: 77 38 ja 0x6a
32: 44 89 c7 mov %r8d,%edi
35: 48 89 44 24 08 mov %rax,0x8(%rsp)
3a: e8 07 c3 01 00 callq 0x1c346
3f: 48 rex.W
Code starting with the faulting instruction
===========================================
0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax
6: 77 38 ja 0x40
8: 44 89 c7 mov %r8d,%edi
b: 48 89 44 24 08 mov %rax,0x8(%rsp)
10: e8 07 c3 01 00 callq 0x1c31c
15: 48 rex.W
[ 125.059535][ C1] RSP: 002b:00007fff09a72080 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 125.059538][ C1] RAX: ffffffffffffffda RBX: 0000000000000025 RCX: 00007f4af8404494
[ 125.059540][ C1] RDX: 0000000000001000 RSI: 000055b02d170e70 RDI: 0000000000000025
[ 125.059541][ C1] RBP: 000055b02d170e70 R08: 0000000000000000 R09: 00007f4af84d5d90
[ 125.059543][ C1] R10: 000055b02d0b3010 R11: 0000000000000246 R12: 0000000000001000
[ 125.059544][ C1] R13: 00007f4af84d22a0 R14: 0000000000000d68 R15: 00007f4af84d1760
[ 125.059547][ C1] </TASK>
[ 125.059548][ C1] ---[ end trace 0000000000000000 ]---
To reproduce:
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
--
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config-5.18.0-rc5-00007-gaf0b042e914f" of type "text/plain" (166090 bytes)
View attachment "job-script" of type "text/plain" (5875 bytes)
Download attachment "dmesg.xz" of type "application/x-xz" (9260 bytes)
View attachment "xfstests" of type "text/plain" (1320 bytes)
View attachment "job.yaml" of type "text/plain" (4983 bytes)
View attachment "reproduce" of type "text/plain" (975 bytes)
Powered by blists - more mailing lists