Editing crashreport #72742

ReasonCrashing FunctionWhere to cut BacktraceReports Count
BUG: unable to handle kernel NULL pointer dereferencedo_raw_read_lock_raw_read_lock
sptlrpc_import_sec_ref
srpc_sptlrpc_sepol_seq_show
seq_read
vfs_read
SyS_read
system_call_fastpath
14

Added fields:

Match messages in logs
(every line would be required to be present in log output
Copy from "Messages before crash" column below):
Match messages in full crash
(every line would be required to be present in crash log output
Copy from "Full Crash" column below):
Limit to a test:
(Copy from below "Failing text"):
Delete these reports as invalid (real bug in review or some such)
Bug or comment:
Extra info:

Failures list (last 100):

Failing TestFull CrashMessages before crashComment
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2e1448067 PUD 326a70067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_balloon i2c_piix4 virtio_console pcspkr ip_tables rpcsec_gss_krb5 ata_generic drm_kms_helper ttm pata_acpi drm drm_panel_orientation_quirks ata_piix virtio_blk floppy serio_raw libata i2c_core [last unloaded: libcfs]
CPU: 15 PID: 2672 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8802a5573760 ti: ffff8802a8560000 task.ti: ffff8802a8560000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
Lustre: Unmounted lustre-client
RSP: 0018:ffff8802a8563df8 EFLAGS: 00010202
RAX: ffff8802a8563fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802a8563e00 R08: ffff8802da4fc548 R09: ffff8802da4fb3f8
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8802a8563f18 R14: 0000000000000001 R15: ffff88031b278638
FS: 00007fd94168d740(0000) GS:ffff880331dc0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002a4534000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa063179e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa063e970>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD b51a4067 PUD ad65f067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_ldiskfs(OE) ldiskfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) dm_flakey dm_mod libcfs(OE) loop zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) jbd2 mbcache crc32_generic crc_t10dif crct10dif_generic crct10dif_common pcspkr virtio_balloon virtio_console i2c_piix4 ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm ata_piix drm drm_panel_orientation_quirks serio_raw virtio_blk libata i2c_core floppy [last unloaded: libcfs]
CPU: 5 PID: 24371 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
Lustre: Unmounted lustre-client
task: ffff8800a990b760 ti: ffff8800a4204000 task.ti: ffff8800a4204000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8800a4207df8 EFLAGS: 00010202
RAX: ffff8800a4207fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8800a4207e00 R08: ffff8802e0d8b3f8 R09: ffff8802e0d8a2a8
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8800a4207f18 R14: 0000000000000001 R15: ffff8800a1f13de8
FS: 00007f74eab0c740(0000) GS:ffff880331b40000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 000000009e540000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa06af79e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06bc970>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2f4e11067 PUD 2de786067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_balloon virtio_console pcspkr i2c_piix4 ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix drm_panel_orientation_quirks floppy virtio_blk serio_raw i2c_core libata [last unloaded: libcfs]
CPU: 6 PID: 11509 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8800ae639280 ti: ffff8802d5344000 task.ti: ffff8802d5344000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8802d5347df8 EFLAGS: 00010202
RAX: ffff8802d5347fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802d5347e00 R08: ffff8802d4e022a8 R09: ffff8802d4e04548
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8802d5347f18 R14: 0000000000000001 R15: ffff8802eb4d6d68
FS: 00007fc80912d740(0000) GS:ffff880331b80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002f4da6000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa063bf0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06492f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
LustreError: 11509:0:(obd_class.h:1101:obd_statfs()) Device 31 not setup
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2f17ac067 PUD 2f16d8067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_ldiskfs(OE) ldiskfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) dm_flakey dm_mod loop zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) jbd2 mbcache crc32_generic crc_t10dif crct10dif_generic crct10dif_common i2c_piix4 virtio_balloon pcspkr virtio_console ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix serio_raw drm_panel_orientation_quirks libata virtio_blk i2c_core floppy [last unloaded: libcfs]
CPU: 13 PID: 22286 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8800a70cdc40 ti: ffff8802f1740000 task.ti: ffff8802f1740000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8802f1743df8 EFLAGS: 00010202
RAX: ffff8802f1743fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802f1743e00 R08: ffff8803228b0008 R09: ffff8803228b5698
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8802f1743f18 R14: 0000000000000001 R15: ffff8802f1a2ad68
FS: 00007fabc89e4740(0000) GS:ffff880331d40000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002f0dce000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa0687f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06952f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Lustre: Unmounted lustre-client
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2f4214067 PUD 2f4215067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Lustre: Unmounted lustre-client
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_ldiskfs(OE) ldiskfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) dm_flakey dm_mod loop zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) jbd2 mbcache crc32_generic crc_t10dif crct10dif_generic crct10dif_common pcspkr virtio_balloon i2c_piix4 virtio_console ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix drm_panel_orientation_quirks virtio_blk floppy serio_raw i2c_core libata [last unloaded: libcfs]
CPU: 13 PID: 24584 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8800a99049d0 ti: ffff8802f4210000 task.ti: ffff8802f4210000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8802f4213df8 EFLAGS: 00010202
RAX: ffff8802f4213fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802f4213e00 R08: ffff8802f6bc67e8 R09: ffff8802f6bc0008
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8802f4213f18 R14: 0000000000000001 R15: ffff8802f3334638
FS: 00007fbaea40f740(0000) GS:ffff880331d40000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002f4094000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa066cf0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa067a2f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2efe8a067 PUD 2e855c067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_ldiskfs(OE) ldiskfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) dm_flakey dm_mod libcfs(OE) loop zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) jbd2 mbcache crc32_generic crc_t10dif crct10dif_generic crct10dif_common i2c_piix4 virtio_console pcspkr virtio_balloon ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix drm_panel_orientation_quirks virtio_blk floppy i2c_core libata serio_raw [last unloaded: libcfs]
CPU: 3 PID: 14977 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff88031bee9280 ti: ffff8802ce41c000 task.ti: ffff8802ce41c000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
Lustre: Unmounted lustre-client
RSP: 0018:ffff8802ce41fdf8 EFLAGS: 00010202
RAX: ffff8802ce41ffd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802ce41fe00 R08: ffff8802d0a55698 R09: ffff8802d0a533f8
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8802ce41ff18 R14: 0000000000000001 R15: ffff8802d3dcf398
FS: 00007fa68d4bb740(0000) GS:ffff880331ac0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002f939e000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa06c0f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06ce2f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 31dfaf067 PUD 2ee4e8067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_ldiskfs(OE) ldiskfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) dm_flakey dm_mod libcfs(OE) loop zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) jbd2 mbcache crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_console i2c_piix4 pcspkr virtio_balloon ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix drm_panel_orientation_quirks virtio_blk libata i2c_core serio_raw floppy [last unloaded: libcfs]
CPU: 12 PID: 17528 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff88031ba31280 ti: ffff88031d11c000 task.ti: ffff88031d11c000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff88031d11fdf8 EFLAGS: 00010202
RAX: ffff88031d11ffd8 RBX: 0000000000000000 RCX: 0000000000000000
Lustre: Unmounted lustre-client
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff88031d11fe00 R08: ffff8802f267b3f8 R09: ffff8802f267d698
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff88031d11ff18 R14: 0000000000000001 R15: ffff88032797ed68
FS: 00007f5d55317740(0000) GS:ffff880331d00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002f2f00000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa0691f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa069f2f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD a1775067 PUD a7a1b067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common pcspkr virtio_balloon virtio_console i2c_piix4 ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm serio_raw drm_panel_orientation_quirks ata_piix floppy virtio_blk i2c_core libata [last unloaded: libcfs]
CPU: 8 PID: 25723 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8802bf900010 ti: ffff880087e58000 task.ti: ffff880087e58000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff880087e5bdf8 EFLAGS: 00010202
RAX: ffff880087e5bfd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff880087e5be00 R08: ffff8802f283e7e8 R09: ffff8802f2838008
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff880087e5bf18 R14: 0000000000000001 R15: ffff8802f2805298
FS: 00007fb2f1256740(0000) GS:ffff880331c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 000000009f56a000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa0660f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa066e2f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2e9451067 PUD 2e9450067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_balloon i2c_piix4 pcspkr virtio_console ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix drm_panel_orientation_quirks serio_raw virtio_blk i2c_core libata floppy [last unloaded: libcfs]
CPU: 11 PID: 11293 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
Lustre: Unmounted lustre-client
task: ffff8802f8ed49d0 ti: ffff8802d73ec000 task.ti: ffff8802d73ec000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8802d73efdf8 EFLAGS: 00010202
RAX: ffff8802d73effd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802d73efe00 R08: ffff8800aada1158 R09: ffff8800aada67e8
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8802d73eff18 R14: 0000000000000001 R15: ffff8802e5449298
FS: 00007f341140e740(0000) GS:ffff880331cc0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002d7a14000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa063af0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06482f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2cc60f067 PUD 2f4c28067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_ldiskfs(OE) ldiskfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) dm_flakey dm_mod libcfs(OE) loop zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) jbd2 mbcache crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_console i2c_piix4 virtio_balloon pcspkr ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix drm_panel_orientation_quirks serio_raw libata virtio_blk i2c_core floppy [last unloaded: libcfs]
CPU: 13 PID: 28457 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8800ad4d49d0 ti: ffff8802efb84000 task.ti: ffff8802efb84000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8802efb87df8 EFLAGS: 00010202
RAX: ffff8802efb87fd8 RBX: 0000000000000000 RCX: 0000000000000000
Lustre: Unmounted lustre-client
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802efb87e00 R08: ffff8802eece8008 R09: ffff8802eecea2a8
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8802efb87f18 R14: 0000000000000001 R15: ffff8802e92bbbd8
FS: 00007f2bd945e740(0000) GS:ffff880331d40000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 000000031cb2a000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa0674f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06822f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 27af4a067 PUD 27b443067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_balloon i2c_piix4 pcspkr virtio_console ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix virtio_blk drm_panel_orientation_quirks serio_raw floppy i2c_core libata [last unloaded: libcfs]
CPU: 10 PID: 17235 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8802d6643760 ti: ffff8800abe24000 task.ti: ffff8800abe24000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8800abe27df8 EFLAGS: 00010202
RAX: ffff8800abe27fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8800abe27e00 R08: ffff880320c367e8 R09: ffff880320c34548
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8800abe27f18 R14: 0000000000000001 R15: ffff8802c2a97de8
FS: 00007f1ec195c740(0000) GS:ffff880331c80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000000b59a4000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa0636f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06442f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Lustre: Unmounted lustre-client
Lustre: Failing over lustre-MDT0000
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2bb654067 PUD 29de7b067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_console virtio_balloon pcspkr i2c_piix4 ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm serio_raw ata_piix drm_panel_orientation_quirks virtio_blk i2c_core libata floppy [last unloaded: libcfs]
CPU: 6 PID: 6933 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8802e9e58010 ti: ffff88029de90000 task.ti: ffff88029de90000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
Lustre: Unmounted lustre-client
RSP: 0018:ffff88029de93df8 EFLAGS: 00010202
RAX: ffff88029de93fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff88029de93e00 R08: ffff8802dbc222a8 R09: ffff8802dbc20008
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff88029de93f18 R14: 0000000000000001 R15: ffff8802d5a9a108
FS: 00007f18ce44d740(0000) GS:ffff880331b80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002d6c5a000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa0686f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06942f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 2e69c8067 PUD 2c8dfa067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_balloon virtio_console i2c_piix4 pcspkr ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm drm_panel_orientation_quirks ata_piix serio_raw virtio_blk libata i2c_core floppy [last unloaded: libcfs]
CPU: 3 PID: 17993 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8802f9ca3760 ti: ffff8802c8b20000 task.ti: ffff8802c8b20000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8802c8b23df8 EFLAGS: 00010202
RAX: ffff8802c8b23fd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8802c8b23e00 R08: ffff8802ec1a0008 R09: ffff8802ec1a33f8
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
Lustre: Unmounted lustre-client
R13: ffff8802c8b23f18 R14: 0000000000000001 R15: ffff8800a6bb0848
FS: 00007fd438396740(0000) GS:ffff880331ac0000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 00000002e164a000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa112ff0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa113d2f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
recovery-small test 57: read procfs entries causes kernel crash
BUG: unable to handle kernel NULL pointer dereference at 00000000000000d0
IP: [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
PGD 8d49a067 PUD 8d499067 PMD 0
Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_console virtio_balloon pcspkr i2c_piix4 ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm ata_piix drm_panel_orientation_quirks serio_raw floppy virtio_blk i2c_core libata [last unloaded: libcfs]
CPU: 4 PID: 8139 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2
Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014
task: ffff8800a4c48010 ti: ffff8800a9f3c000 task.ti: ffff8800a9f3c000
RIP: 0010:[<ffffffff81411a45>] [<ffffffff81411a45>] do_raw_read_lock+0x5/0x30
RSP: 0018:ffff8800a9f3fdf8 EFLAGS: 00010202
RAX: ffff8800a9f3ffd8 RBX: 0000000000000000 RCX: 0000000000000000
RDX: fffffffffffffff4 RSI: 0000000000000001 RDI: 00000000000000c8
RBP: ffff8800a9f3fe00 R08: ffff88029dd30008 R09: ffff88029dd31158
R10: 0000000000000000 R11: ffff880331406d40 R12: 00000000000000c8
R13: ffff8800a9f3ff18 R14: 0000000000000001 R15: ffff88009b44ab58
FS: 00007fc196caf740(0000) GS:ffff880331b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000d0 CR3: 000000009a83a000 CR4: 00000000000007e0
Call Trace:
[<ffffffff817e333e>] _raw_read_lock+0x1e/0x20
[<ffffffffa0666f0e>] sptlrpc_import_sec_ref+0x1e/0x40 [ptlrpc]
[<ffffffffa06742f0>] srpc_sptlrpc_sepol_seq_show+0x30/0x130 [ptlrpc]
[<ffffffff8126f0b5>] seq_read+0x135/0x470
[<ffffffff81245839>] vfs_read+0xb9/0x1c0
[<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a
[<ffffffff8124676f>] SyS_read+0x7f/0xf0
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
[<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24
[<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a
Link to test
Return to new crashes list