Bug #58404
kclient: debug message precision 65506 too large
% Done:
0%
Source:
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Crash signature (v1):
Crash signature (v2):
Description
When running the xfstests-dev test I saw one kernel call trace:
generic/020 _check_dmesg: something found in dmesg (see /data/xfstests-dev/results//generic/020.dmesg)
<4>[436647.873423] ------------[ cut here ]------------ <4>[436647.873432] precision 65506 too large <4>[436647.873630] WARNING: CPU: 15 PID: 386031 at lib/vsprintf.c:2693 set_precision+0x43/0x70 <4>[436647.873711] Modules linked in: ceph libceph dns_resolver netfs overlay tcp_diag udp_diag raw_diag inet_diag unix_diag af_packet_diag netlink_diag xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nf_nat_tftp nf_conntrack_tftp bridge stp llc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set rfkill nf_tables nfnetlink sunrpc squashfs loop intel_rapl_msr intel_rapl_common nfit libnvdimm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel sha512_ssse3 joydev i2c_piix4 pcspkr xfs libcrc32c sd_mod t10_pi crc64_rocksoft sr_mod bochs crc64 drm_vram_helper cdrom drm_kms_helper sg syscopyarea sysfillrect sysimgblt drm_ttm_helper ttm ata_generic virtio_net ata_piix net_failover libata virtio_scsi failover virtio_console drm crc32c_intel serio_raw dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse <4>[436647.874018] CPU: 15 PID: 386031 Comm: attr Tainted: G B 6.2.0-rc2+ #190 <4>[436647.874033] Hardware name: Red Hat RHEV Hypervisor, BIOS 1.11.0-2.el7 04/01/2014 <4>[436647.874043] RIP: 0010:set_precision+0x43/0x70 <4>[436647.874058] Code: 07 39 d8 75 07 5b 5d c3 cc cc cc cc 80 3d fa 49 88 01 00 75 17 89 de 48 c7 c7 80 69 0b a6 c6 05 e8 49 88 01 01 e8 7d eb 01 00 <0f> 0b 48 89 ef be 08 00 00 00 e8 4e 4d 40 ff 31 c0 85 db 0f 48 d8 <4>[436647.874067] RSP: 0018:ffffc9000436f2d8 EFLAGS: 00010086 <4>[436647.874081] RAX: 0000000000000000 RBX: 000000000000ffe2 RCX: 0000000000000000 <4>[436647.874087] RDX: 0000000000000002 RSI: 0000000000000004 RDI: fffff5200086de4d <4>[436647.874093] RBP: ffffc9000436f338 R08: ffffffffa47905d4 R09: ffff8887dedaf80b <4>[436647.874100] R10: ffffed10fbdb5f01 R11: 0000000000000001 R12: ffffc9000436f400 <4>[436647.874106] R13: ffffc9000436f740 R14: ffffc9000436f338 R15: ffffffffc11cf438 <4>[436647.874114] FS: 000014c4fb537740(0000) GS:ffff8887ded80000(0000) knlGS:0000000000000000 <4>[436647.874124] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 <4>[436647.874130] CR2: 00005562bc7082f8 CR3: 0000000170834006 CR4: 00000000007706e0 <4>[436647.874137] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 <4>[436647.874142] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 <4>[436647.874147] PKRU: 55555554 <4>[436647.874156] Call Trace: <4>[436647.874162] <TASK> <4>[436647.874172] vsnprintf+0x3ea/0x880 <4>[436647.874191] ? __pfx_vsnprintf+0x10/0x10 <4>[436647.874202] ? prb_read+0xf6/0x1f0 <4>[436647.874256] ? __pfx_prb_read+0x10/0x10 <4>[436647.874268] va_format.constprop.0+0x104/0x200 <4>[436647.874281] ? __pfx_va_format.constprop.0+0x10/0x10 <4>[436647.874293] ? __pfx_widen_string+0x10/0x10 <4>[436647.874303] ? desc_read+0x157/0x190 <4>[436647.874316] pointer+0x40f/0x770 <4>[436647.874326] ? format_decode+0x20a/0x540 <4>[436647.874335] ? __pfx_pointer+0x10/0x10 <4>[436647.874346] ? pvclock_clocksource_read+0xdc/0x1b0 <4>[436647.874384] vsnprintf+0x317/0x880 <4>[436647.874396] ? __pfx_vsnprintf+0x10/0x10 <4>[436647.874408] ? _prb_read_valid+0x101/0x180 <4>[436647.874420] vprintk_store+0x1e8/0x620 <4>[436647.874434] ? __pfx_vprintk_store+0x10/0x10 <4>[436647.874447] ? prb_read_valid+0x66/0x90 <4>[436647.874459] ? __pfx_prb_read_valid+0x10/0x10 <4>[436647.874473] ? console_unlock+0x96/0x160 <4>[436647.874483] ? __pfx_console_unlock+0x10/0x10 <4>[436647.874496] vprintk_emit+0x10e/0x2c0 <4>[436647.874509] _printk+0xb2/0xe7 <4>[436647.874536] ? __pfx__printk+0x10/0x10 <4>[436647.874550] ? kasan_save_stack+0x1e/0x40 <4>[436647.874589] ? __dynamic_pr_debug+0x13e/0x1c0 <4>[436647.874636] __dynamic_pr_debug+0x170/0x1c0 <4>[436647.874649] ? __pfx___dynamic_pr_debug+0x10/0x10 <4>[436647.874668] ? kmem_cache_alloc+0x1a9/0x350 <4>[436647.874679] ? rb_insert_color+0xf9/0x290 <4>[436647.874697] ? __list_add_valid+0x36/0xe0 <4>[436647.874714] __set_xattr+0x2cd/0x6b0 [ceph] <4>[436647.875033] __build_xattrs+0x378/0x3d0 [ceph] <4>[436647.875212] __ceph_getxattr+0x17c/0x3e0 [ceph] <4>[436647.875398] ceph_get_xattr_handler+0x35/0x50 [ceph] <4>[436647.875575] __vfs_getxattr+0xdc/0x130 <4>[436647.875598] ? __pfx___vfs_getxattr+0x10/0x10 <4>[436647.875607] ? security_inode_getxattr+0x5b/0x70 <4>[436647.875635] do_getxattr+0x1ab/0x200 <4>[436647.875647] getxattr+0xde/0x140 <4>[436647.875656] ? __pfx_getxattr+0x10/0x10 <4>[436647.875671] ? __call_rcu_common.constprop.0+0x295/0x490 <4>[436647.875695] ? __pfx_free_object_rcu+0x10/0x10 <4>[436647.875715] ? __pfx___call_rcu_common.constprop.0+0x10/0x10 <4>[436647.875727] ? __list_del_entry_valid+0x76/0x140 <4>[436647.875738] ? kasan_quarantine_put+0x21/0x1b0 <4>[436647.875756] ? user_path_at_empty+0x45/0x60 <4>[436647.875771] ? kmem_cache_free+0xde/0x4c0 <4>[436647.875784] path_getxattr+0xc0/0x130 <4>[436647.875794] ? __pfx_path_getxattr+0x10/0x10 <4>[436647.875802] ? __audit_syscall_entry+0x178/0x200 <4>[436647.875828] ? ktime_get_coarse_real_ts64+0x4a/0x70 <4>[436647.875859] do_syscall_64+0x38/0x90 <4>[436647.875889] entry_SYSCALL_64_after_hwframe+0x72/0xdc <4>[436647.875911] RIP: 0033:0x14c4faa39c1e <4>[436647.875932] Code: 48 8b 0d 6d 52 38 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 c0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 3a 52 38 00 f7 d8 64 89 01 48 <4>[436647.875940] RSP: 002b:00007ffe5b67e5a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 <4>[436647.875949] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000014c4faa39c1e <4>[436647.875956] RDX: 00005562bc6f82f0 RSI: 00007ffe5b67e5d0 RDI: 00007ffe5b680919 <4>[436647.875962] RBP: 00007ffe5b67e5d0 R08: 0000000000000001 R09: 00727474615f676e <4>[436647.875969] R10: 0000000000010000 R11: 0000000000000246 R12: 00007ffe5b67e75c <4>[436647.875975] R13: 0000000000000000 R14: 000014c4faa39c10 R15: 0000000000000000 <4>[436647.875987] </TASK>
History
#1 Updated by Xiubo Li about 1 year ago
- Status changed from New to In Progress
#2 Updated by Xiubo Li about 1 year ago
- Status changed from In Progress to Fix Under Review