Editing crashreport #72069

ReasonCrashing FunctionWhere to cut BacktraceReports Count
BUG: kernel NULL pointer dereference_raw_read_locksptlrpc_import_sec_ref
srpc_sptlrpc_sepol_seq_show
seq_read_iter
seq_read
full_proxy_read
vfs_read
ksys_read
do_syscall_64
entry_SYSCALL_64_after_hwframe
38

Added fields:

Match messages in logs
(every line would be required to be present in log output
Copy from "Messages before crash" column below):
Match messages in full crash
(every line would be required to be present in crash log output
Copy from "Full Crash" column below):
Limit to a test:
(Copy from below "Failing text"):
Delete these reports as invalid (real bug in review or some such)
Bug or comment:
Extra info:

Failures list (last 100):

Failing TestFull CrashMessages before crashComment
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111143 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 74 6c b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffc22484f0fab8 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffc22484f0fa90 R09: ffff9ea586840000
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9ea56dfdad98
R13: ffffc22484f0fb78 R14: ffff9ea56dfdadc0 R15: 0000000000000001
FS: 00007fe863009740(0000) GS:ffff9ea5ffc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000034c56004 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? kmem_cache_free+0x15/0x360
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? _copy_to_user+0x1a/0x30
? cp_new_stat+0x150/0x180
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fe862efdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111142:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9ea5746db800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111142:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111142:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111142:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111406 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 f4 7a b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffa430466178f8 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffa430466178d0 R09: ffff944b83ac9c88
R10: 0000000000020000 R11: 0000000000000000 R12: ffff944b8602b7f8
R13: ffffa430466179b8 R14: ffff944b8602b820 R15: 0000000000000001
FS: 00007fe0c980c740(0000) GS:ffff944bbbc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000101b0a006 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? path_openat+0xc1/0x280
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __check_object_size.part.0+0x47/0xd0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? terminate_walk+0xe5/0xf0
? path_lookupat+0xa2/0x1c0
? filename_lookup+0xcf/0x1d0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? _copy_to_user+0x1a/0x30
? cp_new_stat+0x150/0x180
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fe0c96fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111405:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff944b82aeb000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111405:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111405:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111405:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
LustreError: 111406:0:(obd_class.h:478:obd_check_dev()) Device 12 not setup
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 800000010b043067 P4D 800000010b043067 PUD 11ad54067 PMD 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 25604 Comm: lctl Kdump: loaded Tainted: G OE n 6.4.0-150600.23.50-default #1 SLE15-SP6 32013eadc71d652cb07a599d8a722b9604994156
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 bc 99 7b 6f b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 e9 bf 1b 00 00 e9 6a 0a 00 00 66
RSP: 0018:ffffc0b400707c88 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000001000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffc0b400707c48 R09: 0000000000000000
R10: ffffc0b400707ca8 R11: 0000000000001000 R12: 0000000000000000
R13: ffff9d88c4599028 R14: 0000000000000001 R15: 0000000000000001
FS: 00007f3a74a3ff80(0000) GS:ffff9d88fbc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000011ac86001 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
sptlrpc_import_sec_ref+0x19/0x40 [ptlrpc 2f0d3d496a4509c255c3c23186e679074e73b56b]
srpc_sptlrpc_sepol_seq_show+0x33/0x110 [ptlrpc 2f0d3d496a4509c255c3c23186e679074e73b56b]
seq_read_iter+0xd7/0x430
? aa_file_perm+0x125/0x500
seq_read+0xac/0xe0
full_proxy_read+0x53/0x80
vfs_read+0xaf/0x2e0
? kmem_cache_free+0x255/0x480
ksys_read+0xa5/0xe0
do_syscall_64+0x5b/0x80
? syscall_exit_to_user_mode+0x1e/0x40
? do_syscall_64+0x67/0x80
? do_syscall_64+0x67/0x80
? do_syscall_64+0x67/0x80
? do_syscall_64+0x67/0x80
? do_syscall_64+0x67/0x80
? exc_page_fault+0x69/0x150
entry_SYSCALL_64_after_hwframe+0x7c/0xe6
RIP: 0033:0x7f3a73520b6d
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 25605:0:(lov_obd.c:784:lov_cleanup()) lustre-clilov-ffff9d88c2cb2800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 25605:0:(lov_obd.c:784:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 25605:0:(obd_class.h:479:obd_check_dev()) Device 10 not setup
LustreError: 25605:0:(obd_class.h:479:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 1552358 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-570.17.1.el9_6.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 3e ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 cc c1 8f 76 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 9a 0a 00 00 66
RSP: 0018:ffffc009c37bfb78 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 000000000000000d RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: 0000458340020a20 R09: ffff9a85d4ad6a80
R10: ffffc009c37bfbd0 R11: ffff9a85c3090000 R12: ffff9a85f5e564b0
R13: ffffc009c37bfc38 R14: ffff9a85f5e564d8 R15: 0000000000000001
FS: 00007f7d10825740(0000) GS:ffff9a867fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000006a9fc001 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? do_sys_openat2+0x81/0xd0
seq_read+0x146/0x190
full_proxy_read+0x56/0x80
vfs_read+0xae/0x3b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xe0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xe0
? do_syscall_64+0x6b/0xe0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xe0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xe0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xe0
? do_syscall_64+0x6b/0xe0
? vfs_write+0x1aa/0x480
? vfs_write+0x1aa/0x480
? syscall_exit_to_user_mode+0x19/0x40
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xe0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f7d106fddf2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 1552357:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9a862a999800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 1552357:0:(lov_obd.c:781:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 1552357:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 1552358:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 1552357:0:(obd_class.h:478:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111095 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 b4 4c b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffa2b744803948 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffa2b744803920 R09: ffff979ec5f46530
R10: 0000000000020000 R11: 0000000000000000 R12: ffff979ef605cac8
R13: ffffa2b744803a08 R14: ffff979ef605caf0 R15: 0000000000000001
FS: 00007fd302608740(0000) GS:ffff979f7fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000033512002 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? rmqueue+0x426/0x10d0
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? full_proxy_open+0xa3/0x1f0
? ima_file_check+0x53/0x80
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_filp_open+0xb2/0x160
? __check_object_size.part.0+0x47/0xd0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __pfx_file_free_rcu+0x10/0x10
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fd3024fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111096:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff979ec6e70800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111096:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111096:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111096:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 780134 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 74 66 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb47602ff7c48 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb47602ff7c20 R09: ffff9efeb5a42298
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9efeb61f3d98
R13: ffffb47602ff7d08 R14: ffff9efeb61f3dc0 R15: 0000000000000001
FS: 00007f46da666740(0000) GS:ffff9eff3fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000005144002 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? syscall_exit_work+0x103/0x130
? __mod_memcg_lruvec_state+0x76/0xc0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __pfx_file_free_rcu+0x10/0x10
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f46da4fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 780133:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9efeb0b44000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 780133:0:(lov_obd.c:781:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 780133:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 780133:0:(obd_class.h:478:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 2503041 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 34 74 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb3af02663a80 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb3af02663a58 R09: ffff9b29017e19f0
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9b2906671ca8
R13: ffffb3af02663b40 R14: ffff9b2906671cd0 R15: 0000000000000001
FS: 00007faa73e09740(0000) GS:ffff9b293bc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000138052003 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? filename_lookup+0xcf/0x1d0
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? path_openat+0xc1/0x280
? do_filp_open+0xb2/0x160
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __check_object_size.part.0+0x47/0xd0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __pfx_file_free_rcu+0x10/0x10
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7faa73cfdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 2503043:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9b2905930000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 2503043:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 2503041:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 2503043:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 2503043:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 2328012 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 d4 5c b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffc38246c1bc90 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffc38246c1bc68 R09: ffff9f5dc9784530
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9f5dc09ab078
R13: ffffc38246c1bd50 R14: ffff9f5dc09ab0a0 R15: 0000000000000001
FS: 00007fec8ec2f740(0000) GS:ffff9f5dfbd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 00000001079ce002 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? __check_object_size.part.0+0x47/0xd0
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? __count_memcg_events+0x4f/0xb0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fec8eafdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 2328013:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9f5df9629000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 2328013:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 2328012:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 2328013:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 2328013:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 1822913 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 94 63 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffaf19461c7a10 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffaf19461c79e8 R09: ffff9792db4d3c88
R10: 0000000000020000 R11: 0000000000000000 R12: ffff979328dd99d8
R13: ffffaf19461c7ad0 R14: ffff979328dd9a00 R15: 0000000000000001
FS: 00007ff0d6a27740(0000) GS:ffff97937fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 00000000549d6006 CR4: 00000000001706f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? __pfx_srpc_sptlrpc_sepol_seq_show+0x10/0x10 [ptlrpc]
? single_open+0x58/0xa0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? do_filp_open+0xb2/0x160
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? full_proxy_read+0x61/0x80
? vfs_read+0xa7/0x330
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7ff0d68fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 1822911:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9792fce76800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 1822911:0:(lov_obd.c:781:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 1822911:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 1822911:0:(obd_class.h:478:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 111263 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 54 58 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb670c25bfc98 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb670c25bfc70 R09: ffff962e84dcbc88
R10: 0000000000020000 R11: 0000000000000000 R12: ffff962eb5fc5528
R13: ffffb670c25bfd58 R14: ffff962eb5fc5550 R15: 0000000000000001
FS: 00007f518f6d5740(0000) GS:ffff962f3fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 00000000050b0003 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? __do_sys_newfstatat+0x35/0x60
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f518f8fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111262:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff962e946b6800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111262:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111262:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111262:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111211 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 14 44 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffa3134319ba10 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffa3134319b9e8 R09: ffff934485b6acf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff93448624fca8
R13: ffffa3134319bad0 R14: ffff93448624fcd0 R15: 0000000000000001
FS: 00007f091ba0e740(0000) GS:ffff9344bbc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000101a28001 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? do_filp_open+0xb2/0x160
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? path_lookupat+0xa2/0x1c0
? filename_lookup+0xcf/0x1d0
? __pfx_file_free_rcu+0x10/0x10
? __call_rcu_common.constprop.0+0x117/0x2b0
? _copy_to_user+0x1a/0x30
? cp_new_stat+0x150/0x180
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f091b8fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111212:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff934491a68000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111212:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111212:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111212:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111894 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 34 52 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffa15d81017c18 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffa15d81017bf0 R09: ffff9348c6a699f0
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9348f6061d98
R13: ffffa15d81017cd8 R14: ffff9348f6061dc0 R15: 0000000000000001
FS: 00007f966861b740(0000) GS:ffff93497fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000034b10004 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? ima_file_check+0x53/0x80
? mntput_no_expire+0x4a/0x250
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? __check_object_size.part.0+0x47/0xd0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f96684fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111892:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9348f4926000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111892:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111892:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111892:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111220 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 b4 75 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb29140ed3ac0 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb29140ed3a98 R09: ffff96742f27c000
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9674067052d0
R13: ffffb29140ed3b80 R14: ffff9674067052f8 R15: 0000000000000001
FS: 00007f68b3008740(0000) GS:ffff96743bc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000104c2e006 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? kmem_cache_free+0x15/0x360
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? full_proxy_read+0x61/0x80
? vfs_read+0xa7/0x330
? __pfx_file_free_rcu+0x10/0x10
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f68b2efdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111219:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff96741dba1000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111219:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111220:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111219:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111219:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 80000001031ba067 P4D 80000001031ba067 PUD 112de1067 PMD 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 25617 Comm: lctl Kdump: loaded Tainted: G OE n 6.4.0-150600.23.50-default #1 SLE15-SP6 32013eadc71d652cb07a599d8a722b9604994156
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 bc 99 1b 77 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 e9 bf 1b 00 00 e9 6a 0a 00 00 66
RSP: 0018:ffffaf85c6937c50 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000001000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffaf85c6937c08 R09: 0000000000000000
R10: ffffaf85c6937c70 R11: 0000000000001000 R12: 0000000000000000
R13: ffff9fa5815e13e8 R14: 0000000000000001 R15: 0000000000000001
FS: 00007fbf48683f80(0000) GS:ffff9fa5bbd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 00000001196c2001 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
sptlrpc_import_sec_ref+0x19/0x40 [ptlrpc b59cdaef91c8f687b2ab1ad89b5b1a3cb6d1618c]
srpc_sptlrpc_sepol_seq_show+0x33/0x110 [ptlrpc b59cdaef91c8f687b2ab1ad89b5b1a3cb6d1618c]
seq_read_iter+0xd7/0x430
? aa_file_perm+0x125/0x500
seq_read+0xac/0xe0
full_proxy_read+0x53/0x80
vfs_read+0xaf/0x2e0
ksys_read+0xa5/0xe0
? do_sys_openat2+0x1d7/0x320
do_syscall_64+0x5b/0x80
? do_sys_open+0x57/0x80
? syscall_exit_to_user_mode+0x1e/0x40
? do_syscall_64+0x67/0x80
? ksys_read+0xa5/0xe0
? syscall_exit_to_user_mode+0x1e/0x40
? do_syscall_64+0x67/0x80
? exc_page_fault+0x69/0x150
entry_SYSCALL_64_after_hwframe+0x7c/0xe6
RIP: 0033:0x7fbf47120b6d
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 25618:0:(lov_obd.c:784:lov_cleanup()) lustre-clilov-ffff9fa5831df000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 25618:0:(lov_obd.c:784:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 25618:0:(obd_class.h:479:obd_check_dev()) Device 10 not setup
LustreError: 25618:0:(obd_class.h:479:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 1822846 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.40.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 34 66 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb67602f47c90 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb67602f47c68 R09: ffff8f5eb5adecf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff8f5eae3d8000
R13: ffffb67602f47d50 R14: ffff8f5eae3d8028 R15: 0000000000000001
FS: 00007f30eb236740(0000) GS:ffff8f5f3fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000005d54c002 CR4: 00000000001706f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? kmem_cache_free+0x15/0x360
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f30eb0fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 1822845:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff8f5e82848000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 1822845:0:(lov_obd.c:781:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 1822845:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 1822845:0:(obd_class.h:478:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111204 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 94 4c b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffad8fc3dbfc28 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffad8fc3dbfc00 R09: ffff88a279958530
R10: 0000000000020000 R11: 0000000000000000 R12: ffff88a2462765a0
R13: ffffad8fc3dbfce8 R14: ffff88a2462765c8 R15: 0000000000000001
FS: 00007f28b0a5a740(0000) GS:ffff88a27bc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000012e37e005 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? __do_sys_newfstatat+0x35/0x60
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f28b08fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111205:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff88a263786000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111205:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111205:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111205:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111206 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 f4 62 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb2e1c3f1b9e8 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb2e1c3f1b9c0 R09: ffff9a41ecf694c0
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9a41f49d70f0
R13: ffffb2e1c3f1baa8 R14: ffff9a41f49d7118 R15: 0000000000000001
FS: 00007f7b1ea18740(0000) GS:ffff9a41fbc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000132908001 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? memcg_slab_post_alloc_hook+0x181/0x250
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __pfx_srpc_sptlrpc_sepol_seq_show+0x10/0x10 [ptlrpc]
? single_open+0x58/0xa0
? full_proxy_open+0xa3/0x1f0
? ima_file_check+0x53/0x80
? mntput_no_expire+0x4a/0x250
? terminate_walk+0xe5/0xf0
? path_openat+0xc1/0x280
? do_filp_open+0xb2/0x160
? __check_object_size.part.0+0x47/0xd0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f7b1e8fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111205:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9a41c45ca000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111205:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111205:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111205:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 111047 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 74 48 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffff9fddc4853a10 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffff9fddc48539e8 R09: ffff8e4ceb10e000
R10: 0000000000020000 R11: 0000000000000000 R12: ffff8e4d3efd87f8
R13: ffff9fddc4853ad0 R14: ffff8e4d3efd8820 R15: 0000000000000001
FS: 00007faad96c6740(0000) GS:ffff8e4d7fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000033030003 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? seq_open+0x50/0x80
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? _copy_to_user+0x1a/0x30
? cp_new_stat+0x150/0x180
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __pfx_file_free_rcu+0x10/0x10
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7faad98fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111046:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff8e4cc59aa000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111046:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111046:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111046:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111060 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 74 63 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb1e946d47948 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb1e946d47920 R09: ffff94adc9cd2cf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff94adc776e7f8
R13: ffffb1e946d47a08 R14: ffff94adc776e820 R15: 0000000000000001
FS: 00007fd70d614740(0000) GS:ffff94ae7fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000000411c001 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? memcg_slab_post_alloc_hook+0x181/0x250
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? ima_file_check+0x53/0x80
? mntput_no_expire+0x4a/0x250
? terminate_walk+0xe5/0xf0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __check_object_size.part.0+0x47/0xd0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? __kmalloc_node+0x4e/0x140
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? seq_read+0xe6/0x130
? full_proxy_read+0x61/0x80
? vfs_read+0xa7/0x330
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fd70d4fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111059:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff94adc41f5000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111059:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111060:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111059:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111059:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111216 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 b4 45 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb2e94213f948 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb2e94213f920 R09: ffff93f446d54a60
R10: 0000000000020000 R11: 0000000000000000 R12: ffff93f47605cc30
R13: ffffb2e94213fa08 R14: ffff93f47605cc58 R15: 0000000000000001
FS: 00007f521be09740(0000) GS:ffff93f4ffc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000006194005 CR4: 00000000001706f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? do_filp_open+0xb2/0x160
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? step_into+0xd0/0x380
? mntput_no_expire+0x4a/0x250
? terminate_walk+0xe5/0xf0
? path_lookupat+0xa2/0x1c0
? filename_lookup+0xcf/0x1d0
? seq_read_iter+0x209/0x4b0
? _copy_to_user+0x1a/0x30
? cp_new_stat+0x150/0x180
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f521bcfdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111215:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff93f4458f9800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111215:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111216:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111215:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111215:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 1792938 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 14 72 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffaabb01e6fc60 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffaabb01e6fc38 R09: ffff97ac56393c88
R10: 0000000000020000 R11: 0000000000000000 R12: ffff97ac46672960
R13: ffffaabb01e6fd20 R14: ffff97ac46672988 R15: 0000000000000001
FS: 00007fcc75029740(0000) GS:ffff97ac7bc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 00000001370ce002 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_user_addr_fault+0x1d6/0x6a0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fcc74efdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 1792937:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff97ac458be800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 1792937:0:(lov_obd.c:781:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 1792937:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 1792937:0:(obd_class.h:478:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111203 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 b4 79 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffa856c1af7c58 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffa856c1af7c30 R09: ffff9c43f94527c8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9c43c64db348
R13: ffffa856c1af7d18 R14: ffff9c43c64db370 R15: 0000000000000001
FS: 00007fca5fc09740(0000) GS:ffff9c43fbc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000105894005 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? __do_sys_newfstatat+0x35/0x60
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fca5fafdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111202:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9c43cc2da000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111202:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111202:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111202:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 781078 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 34 68 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffabc8c5333c58 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffabc8c5333c30 R09: ffff9a8976124cf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9a8946925690
R13: ffffabc8c5333d18 R14: ffff9a89469256b8 R15: 0000000000000001
FS: 00007f8dc9051740(0000) GS:ffff9a897bd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000011c064004 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? do_filp_open+0xb2/0x160
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_user_addr_fault+0x1d6/0x6a0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f8dc8efdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 781077:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9a895b461800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 781077:0:(lov_obd.c:781:lov_cleanup()) Skipped 6 previous similar messages
LustreError: 781078:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 781077:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 781077:0:(obd_class.h:478:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 2371500 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-427.42.1.el9_4.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 47 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 ac ab f9 55 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffbb0286d83c78 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffbb0286d83c50 R09: ffffa06a42307c88
R10: 0000000000020000 R11: 0000000000000000 R12: ffffa06a9c1e34b0
R13: ffffbb0286d83d38 R14: ffffa06a9c1e34d8 R15: 0000000000000001
FS: 00007f84bfa1c740(0000) GS:ffffa06affd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 00000000590be004 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x53/0x80
vfs_read+0xa7/0x330
? __check_object_size.part.0+0x47/0xd0
ksys_read+0x5f/0xe0
do_syscall_64+0x5c/0x90
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x77/0xe1
RIP: 0033:0x7f84bf8fd9b2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 2371501:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffffa06a42fb3000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 2371501:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 2371501:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 2371501:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
LustreError: 2371500:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 110495 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 94 78 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffa9c0421f39e0 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffa9c0421f39b8 R09: ffff9a8644e37c88
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9a864770d960
R13: ffffa9c0421f3aa0 R14: ffff9a864770d988 R15: 0000000000000001
FS: 00007f3ea0e09740(0000) GS:ffff9a86fcc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000005038001 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? seq_open+0x50/0x80
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? do_filp_open+0xb2/0x160
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? terminate_walk+0xe5/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_user_addr_fault+0x1d6/0x6a0
? syscall_exit_to_user_mode+0x19/0x40
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f3ea0cfdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 110496:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110496:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 111201 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 d4 77 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb5be01ef39b8 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb5be01ef3990 R09: ffff9f09756d7228
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9f09bd7d7168
R13: ffffb5be01ef3a78 R14: ffff9f09bd7d7190 R15: 0000000000000001
FS: 00007f003520e740(0000) GS:ffff9f09ffd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000000557c002 CR4: 00000000001706f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? _raw_spin_unlock+0xa/0x30
? rmqueue+0x426/0x10d0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? post_alloc_hook+0xb6/0xd0
? get_page_from_freelist+0x441/0x650
? __mod_memcg_lruvec_state+0x76/0xc0
? __mod_lruvec_page_state+0x97/0x160
? folio_add_new_anon_rmap+0x44/0xe0
? _raw_spin_unlock+0xa/0x30
? do_anonymous_page+0x25a/0x410
? __handle_mm_fault+0x2fb/0x690
? __count_memcg_events+0x4f/0xb0
? mm_account_fault+0x6c/0x100
? handle_mm_fault+0x116/0x270
? do_user_addr_fault+0x1d6/0x6a0
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f00350fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111200:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9f0949c2a800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111200:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111200:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111200:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111057 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 f4 4e b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb48446057a58 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb48446057a30 R09: ffff8ed20288ccf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff8ed1f6030690
R13: ffffb48446057b18 R14: ffff8ed1f60306b8 R15: 0000000000000001
FS: 00007fa70c645740(0000) GS:ffff8ed27fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000004319a001 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? __check_object_size.part.0+0x47/0xd0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __check_object_size.part.0+0x47/0xd0
? __mod_memcg_lruvec_state+0x76/0xc0
? single_release+0x33/0x40
? __kmem_cache_free+0x141/0x2e0
? rcu_nocb_try_bypass+0x5e/0x460
? __pfx_file_free_rcu+0x10/0x10
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fa70c4fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111056:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff8ed1c9337800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111056:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111057:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111056:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111056:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 111350 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 b4 70 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb27dc2fdfbe0 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb27dc2fdfbb8 R09: ffff9c4332c11228
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9c4336024c30
R13: ffffb27dc2fdfca0 R14: ffff9c4336024c58 R15: 0000000000000001
FS: 00007f816d411740(0000) GS:ffff9c43bfc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000001e09a002 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? do_sys_openat2+0x81/0xd0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f816d2fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111351:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff9c4303600800: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111351:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111351:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111351:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
LustreError: 111350:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 111262 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 14 6d b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffff96cc01723a50 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffff96cc01723a28 R09: ffff8a0485c64cf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff8a04a19d99d8
R13: ffff96cc01723b10 R14: ffff8a04a19d9a00 R15: 0000000000000001
FS: 00007f8a8aed0740(0000) GS:ffff8a04bbd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000010344a004 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? kmem_cache_alloc+0x181/0x340
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? terminate_walk+0xe5/0xf0
? path_openat+0xc1/0x280
? _copy_to_user+0x1a/0x30
? post_alloc_hook+0xb6/0xd0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __mod_memcg_lruvec_state+0x76/0xc0
? __mod_lruvec_page_state+0x97/0x160
? folio_add_new_anon_rmap+0x44/0xe0
? _raw_spin_unlock+0xa/0x30
? do_anonymous_page+0x25a/0x410
? __handle_mm_fault+0x2fb/0x690
? do_syscall_64+0x6b/0xf0
? __count_memcg_events+0x4f/0xb0
? mm_account_fault+0x6c/0x100
? handle_mm_fault+0x116/0x270
? do_user_addr_fault+0x1d6/0x6a0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f8a8b0fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 111263:0:(lov_obd.c:781:lov_cleanup()) lustre-clilov-ffff8a0381188000: lov tgt 0 not cleaned! deathrow=0, lovrc=1
LustreError: 111263:0:(lov_obd.c:781:lov_cleanup()) Skipped 7 previous similar messages
LustreError: 111263:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 111263:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 110720 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 94 7a b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb74c82b7faf0 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb74c82b7fac8 R09: ffff8a238a18a7c8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff8a238629e690
R13: ffffb74c82b7fbb0 R14: ffff8a238629e6b8 R15: 0000000000000001
FS: 00007fbd24011740(0000) GS:ffff8a23bbd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000118046006 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
? _raw_spin_unlock+0xa/0x30
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? folio_add_new_anon_rmap+0x44/0xe0
? _raw_spin_unlock+0xa/0x30
? do_anonymous_page+0x25a/0x410
? __handle_mm_fault+0x2fb/0x690
? __kmem_cache_free+0x141/0x2e0
? __count_memcg_events+0x4f/0xb0
? mm_account_fault+0x6c/0x100
? handle_mm_fault+0x116/0x270
? do_user_addr_fault+0x1d6/0x6a0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7fbd23efdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 110720:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110721:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110721:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 755415 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 f4 64 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffabe644367958 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffabe644367930 R09: ffff9c2ac5cd9228
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9c2ac62e9000
R13: ffffabe644367a18 R14: ffff9c2ac62e9028 R15: 0000000000000001
FS: 00007f76ed307740(0000) GS:ffff9c2afbd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000101ae4001 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? terminate_walk+0xe5/0xf0
? path_openat+0xc1/0x280
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __check_object_size.part.0+0x47/0xd0
? kmem_cache_free+0x15/0x360
? do_sys_openat2+0x81/0xd0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f76ed4fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 755414:0:(obd_class.h:478:obd_check_dev()) Device 10 not setup
LustreError: 755414:0:(obd_class.h:478:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 110584 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 74 50 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffbe0e061fbb78 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffbe0e061fbb50 R09: ffff9766ad7facf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9766b5fedd20
R13: ffffbe0e061fbc38 R14: ffff9766b5fedd48 R15: 0000000000000001
FS: 00007f89d040b740(0000) GS:ffff97673fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000002e8fc003 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? __mod_memcg_lruvec_state+0x76/0xc0
? __mod_lruvec_page_state+0x97/0x160
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __count_memcg_events+0x4f/0xb0
? mm_account_fault+0x6c/0x100
? handle_mm_fault+0x116/0x270
? do_user_addr_fault+0x1d6/0x6a0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f89d02fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 110583:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110583:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 110891 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 14 49 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb54f020f7a48 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb54f020f7a20 R09: ffffa052f58499f0
R10: 0000000000020000 R11: 0000000000000000 R12: ffffa052f6006f00
R13: ffffb54f020f7b08 R14: ffffa052f6006f28 R15: 0000000000000001
FS: 00007f727ce9a740(0000) GS:ffffa0537fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000004c0e6005 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? __check_object_size.part.0+0x47/0xd0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? _copy_to_user+0x1a/0x30
? cp_new_stat+0x150/0x180
? __do_sys_newfstatat+0x35/0x60
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f727d0fdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 110893:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110893:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 800000005b2ad067 P4D 800000005b2ad067 PUD 5cce5067 PMD 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 18890 Comm: lctl Kdump: loaded Tainted: G OE n 6.4.0-150600.23.38-default #1 SLE15-SP6 46e958e1e6a4044cfee7b3413eeabfe5a22d6494
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 fc d9 3b 67 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 6a 0a 00 00 66
RSP: 0018:ffffad8bc17a7c28 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000001000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffad8bc17a7be8 R09: 0000000000000000
R10: ffffad8bc17a7c48 R11: 0000000000001000 R12: 0000000000000000
R13: ffff944d049ddfa0 R14: 0000000000000001 R15: 0000000000000001
FS: 00007f3df9aa2f80(0000) GS:ffff944d7fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000005ce9e001 CR4: 00000000000606e0
Call Trace:
<TASK>
? __die_body+0x1a/0x60
? page_fault_oops+0x131/0x540
? fixup_exception+0x22/0x310
? exc_page_fault+0x69/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x19/0x40 [ptlrpc 0077481001a98cba9f5ac70b73d543332e04d3f4]
srpc_sptlrpc_sepol_seq_show+0x33/0x110 [ptlrpc 0077481001a98cba9f5ac70b73d543332e04d3f4]
seq_read_iter+0xd7/0x430
? aa_file_perm+0x125/0x500
seq_read+0xac/0xe0
full_proxy_read+0x53/0x80
vfs_read+0xaf/0x2e0
? kmem_cache_free+0x255/0x480
? kmem_cache_free+0x255/0x480
ksys_read+0xa5/0xe0
do_syscall_64+0x5b/0x80
? do_syscall_64+0x67/0x80
? syscall_exit_to_user_mode+0x1e/0x40
? do_syscall_64+0x67/0x80
? do_syscall_64+0x67/0x80
? exc_page_fault+0x69/0x150
entry_SYSCALL_64_after_hwframe+0x7c/0xe6
RIP: 0033:0x7f3df8520b6d
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 18892:0:(obd_class.h:479:obd_check_dev()) Device 10 not setup
LustreError: 18892:0:(obd_class.h:479:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 110664 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.38.1.el9_5.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 42 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 1c d7 34 49 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffa52884cf7c40 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffa52884cf7c18 R09: ffff8d5c2f134cf8
R10: 0000000000020000 R11: 0000000000000000 R12: ffff8d5c06713528
R13: ffffa52884cf7d00 R14: ffff8d5c06713550 R15: 0000000000000001
FS: 00007feb4f9a9740(0000) GS:ffff8d5c3bd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 00000001021d2004 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x56/0x80
vfs_read+0xa7/0x330
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
ksys_read+0x5f/0xe0
do_syscall_64+0x5f/0xf0
? __call_rcu_common.constprop.0+0x117/0x2b0
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x6b/0xf0
? do_syscall_64+0x6b/0xf0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7feb4fafdab2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 110665:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110664:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110665:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 8000000017bf0067 P4D 8000000017bf0067 PUD 2b428067 PMD 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 596 Comm: lctl Kdump: loaded Tainted: G OE n 6.4.0-150600.23.38-default #1 SLE15-SP6 46e958e1e6a4044cfee7b3413eeabfe5a22d6494
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 fc d9 5b 5e b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 6a 0a 00 00 66
RSP: 0018:ffffbc0846df3be8 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000001000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffbc0846df3ba8 R09: 0000000000000000
R10: ffffbc0846df3c08 R11: 0000000000001000 R12: 0000000000000000
R13: ffff9a3efcfdd898 R14: 0000000000000001 R15: 0000000000000001
FS: 00007f644862ef80(0000) GS:ffff9a3f3fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000005c402001 CR4: 00000000000606e0
Call Trace:
<TASK>
? __die_body+0x1a/0x60
? page_fault_oops+0x131/0x540
? fixup_exception+0x22/0x310
? exc_page_fault+0x69/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x19/0x40 [ptlrpc fcbdcd9e7762c8e619b7bf9ad5cb6b7ed487d91d]
srpc_sptlrpc_sepol_seq_show+0x33/0x110 [ptlrpc fcbdcd9e7762c8e619b7bf9ad5cb6b7ed487d91d]
seq_read_iter+0xd7/0x430
? aa_file_perm+0x125/0x500
seq_read+0xac/0xe0
full_proxy_read+0x53/0x80
vfs_read+0xaf/0x2e0
? kmem_cache_free+0x255/0x480
ksys_read+0xa5/0xe0
do_syscall_64+0x5b/0x80
? syscall_exit_to_user_mode+0x1e/0x40
? do_syscall_64+0x67/0x80
? do_syscall_64+0x67/0x80
? ksys_read+0xa5/0xe0
? syscall_exit_to_user_mode+0x1e/0x40
? do_syscall_64+0x67/0x80
? do_sys_openat2+0x1d7/0x320
? do_sys_open+0x57/0x80
? syscall_exit_to_user_mode+0x1e/0x40
? do_syscall_64+0x67/0x80
entry_SYSCALL_64_after_hwframe+0x7c/0xe6
RIP: 0033:0x7f6447120b6d
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 597:0:(obd_class.h:479:obd_check_dev()) Device 10 not setup
LustreError: 597:0:(obd_class.h:479:obd_check_dev()) Skipped 15 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 110706 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-427.42.1.el9_4.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 47 ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 ac ab 59 6c b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffffb246410dbc70 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffffb246410dbc48 R09: ffff9f7cb54fea60
R10: 0000000000020000 R11: 0000000000000000 R12: ffff9f7c96fe1258
R13: ffffb246410dbd30 R14: ffff9f7c96fe1280 R15: 0000000000000001
FS: 00007fa0e360e740(0000) GS:ffff9f7d3fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 000000003f414002 CR4: 00000000000606f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x53/0x80
vfs_read+0xa7/0x330
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x69/0x90
ksys_read+0x5f/0xe0
do_syscall_64+0x5c/0x90
? __rseq_handle_notify_resume+0x26/0xb0
? exit_to_user_mode_loop+0xd0/0x130
? exit_to_user_mode_prepare+0xb6/0x100
? syscall_exit_to_user_mode+0x19/0x40
? do_syscall_64+0x69/0x90
entry_SYSCALL_64_after_hwframe+0x77/0xe1
RIP: 0033:0x7fa0e34fd9b2
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 110705:0:(obd_class.h:478:obd_check_dev()) Device 14 not setup
LustreError: 110705:0:(obd_class.h:478:obd_check_dev()) Skipped 23 previous similar messages
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: kernel NULL pointer dereference, address: 00000000000000c8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 0 PID: 106801 Comm: lctl Kdump: loaded Tainted: G OE ------- --- 5.14.0-362.24.1.el9_3.x86_64 #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:_raw_read_lock+0x11/0x30
Code: 4a ff 31 c0 c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 65 ff 05 dc 3c 9c 73 b8 00 02 00 00 <f0> 0f c1 07 a9 ff 01 00 00 75 05 c3 cc cc cc cc e9 aa 0a 00 00 66
RSP: 0018:ffff993382acbcd8 EFLAGS: 00010282
RAX: 0000000000000200 RBX: 0000000000000000 RCX: 0000000000000001
RDX: ffff8c1ff6523980 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: 00000000000000c8 R08: ffff993382acbce8 R09: 0000000000001000
R10: 0000000000020000 R11: 0000000000000000 R12: ffff8c1feb7e39d8
R13: ffff993382acbd98 R14: ffff8c1feb7e3a00 R15: 0000000000000001
FS: 00007f0aeaac6740(0000) GS:ffff8c207fc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000c8 CR3: 0000000002d10004 CR4: 00000000001706f0
Call Trace:
<TASK>
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
? __die_body.cold+0x8/0xd
? page_fault_oops+0x134/0x170
? kernelmode_fixup_or_oops+0x84/0x110
? exc_page_fault+0x62/0x150
? asm_exc_page_fault+0x22/0x30
? _raw_read_lock+0x11/0x30
sptlrpc_import_sec_ref+0x1b/0x50 [ptlrpc]
srpc_sptlrpc_sepol_seq_show+0x31/0x120 [ptlrpc]
seq_read_iter+0x120/0x4b0
seq_read+0xe6/0x130
full_proxy_read+0x53/0x80
vfs_read+0x97/0x190
ksys_read+0x5f/0xe0
do_syscall_64+0x5c/0x90
? do_user_addr_fault+0x1d6/0x6a0
? exc_page_fault+0x62/0x150
entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f0aead3e882
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
LustreError: 106801:0:(obd_class.h:1102:obd_statfs()) Device 14 not setup
Link to test
Return to new crashes list