Match messages in logs (every line would be required to be present in log output Copy from "Messages before crash" column below): | |
Match messages in full crash (every line would be required to be present in crash log output Copy from "Full Crash" column below): | |
Limit to a test: (Copy from below "Failing text"): | |
Delete these reports as invalid (real bug in review or some such) | |
Bug or comment: | |
Extra info: |
Failing Test | Full Crash | Messages before crash | Comment |
---|---|---|---|
recovery-small test 57: read procfs entries causes kernel crash | general protection fault: 0000 [#1] SMP DEBUG_PAGEALLOC Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_zfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) libcfs(OE) zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) crc32_generic crc_t10dif crct10dif_generic crct10dif_common i2c_piix4 virtio_balloon pcspkr virtio_console ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm drm_panel_orientation_quirks ata_piix virtio_blk i2c_core floppy libata serio_raw [last unloaded: libcfs] CPU: 11 PID: 5041 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2 Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014 Lustre: Unmounted lustre-client task: ffff8802ecf85c40 ti: ffff8802ee548000 task.ti: ffff8802ee548000 RIP: 0010:[<ffffffffa039b169>] [<ffffffffa039b169>] lprocfs_import_seq_show_locked+0x39/0x980 [obdclass] RSP: 0018:ffff8802ee54bd58 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff8800899d16c8 RCX: ffff8802ee54bfd8 RDX: 6b6b6b6b6b6b6b6b RSI: ffff8800899d16c8 RDI: ffff8802de838a58 RBP: ffff8802ee54be18 R08: ffff8802f6174548 R09: ffff8802f6170008 R10: 0000000000000000 R11: ffff880331406d40 R12: 6b6b6b6b6b6b6e5b R13: 6b6b6b6b6b6b6b6b R14: 0000000000000001 R15: ffff8802de838a58 FS: 00007fadc850c740(0000) GS:ffff880331cc0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000b6d018 CR3: 00000002f5b7c000 CR4: 00000000000007e0 Call Trace: [<ffffffff812222d2>] ? __kmalloc_node+0x1f2/0x3e0 [<ffffffffa039baf3>] lprocfs_import_seq_show+0x43/0xa0 [obdclass] [<ffffffffa08fba7a>] osc_import_seq_show+0x1a/0x30 [osc] [<ffffffff8126f0b5>] seq_read+0x135/0x470 [<ffffffff81245839>] vfs_read+0xb9/0x1c0 [<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a [<ffffffff8124676f>] SyS_read+0x7f/0xf0 [<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a [<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24 [<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a | LustreError: 5071:0:(obd_class.h:479:obd_check_dev()) Device 31 not setup LustreError: 5071:0:(obd_class.h:479:obd_check_dev()) Skipped 21 previous similar messages | Link to test |
recovery-small test 57: read procfs entries causes kernel crash | general protection fault: 0000 [#1] SMP DEBUG_PAGEALLOC Modules linked in: lustre(OE) osp(OE) ofd(OE) lod(OE) mdt(OE) mdd(OE) mgs(OE) osd_ldiskfs(OE) ldiskfs(OE) lquota(OE) lfsck(OE) obdecho(OE) mgc(OE) mdc(OE) lov(OE) osc(OE) lmv(OE) fid(OE) fld(OE) ptlrpc_gss(OE) ptlrpc(OE) obdclass(OE) ksocklnd(OE) lnet(OE) dm_flakey dm_mod libcfs(OE) loop zfs(PO) zunicode(PO) zlua(PO) zcommon(PO) znvpair(PO) zavl(PO) icp(PO) spl(O) jbd2 mbcache crc32_generic crc_t10dif crct10dif_generic crct10dif_common virtio_console virtio_balloon pcspkr i2c_piix4 ip_tables rpcsec_gss_krb5 ata_generic pata_acpi drm_kms_helper ttm drm drm_panel_orientation_quirks ata_piix floppy serio_raw i2c_core virtio_blk libata [last unloaded: libcfs] CPU: 12 PID: 20143 Comm: lctl Kdump: loaded Tainted: P OE ------------ 3.10.0-7.9-debug #2 Hardware name: Red Hat KVM, BIOS 1.16.0-3.module_el8.7.0+1218+f626c2ff 04/01/2014 task: ffff8802c3621280 ti: ffff8802c4b00000 task.ti: ffff8802c4b00000 RIP: 0010:[<ffffffffa0489259>] [<ffffffffa0489259>] lprocfs_import_seq_show_locked+0x39/0x980 [obdclass] RSP: 0018:ffff8802c4b03d58 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff8802b7e94448 RCX: ffff8802c4b03fd8 RDX: 6b6b6b6b6b6b6b6b RSI: ffff8802b7e94448 RDI: ffff88031daccc68 RBP: ffff8802c4b03e18 R08: ffff8802e7bad698 R09: ffff8802e7ba8008 R10: 0000000000000000 R11: ffff880331406d40 R12: 6b6b6b6b6b6b6e5b R13: 6b6b6b6b6b6b6b6b R14: 0000000000000001 R15: ffff88031daccc68 FS: 00007f9b8874e740(0000) GS:ffff880331d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000011f7078 CR3: 00000002c4b06000 CR4: 00000000000007e0 Call Trace: [<ffffffff812222d2>] ? __kmalloc_node+0x1f2/0x3e0 [<ffffffffa0489be3>] lprocfs_import_seq_show+0x43/0xa0 [obdclass] [<ffffffffa0995a7a>] osc_import_seq_show+0x1a/0x30 [osc] [<ffffffff8126f0b5>] seq_read+0x135/0x470 [<ffffffff81245839>] vfs_read+0xb9/0x1c0 [<ffffffff817edf49>] ? system_call_after_swapgs+0x96/0x13a [<ffffffff8124676f>] SyS_read+0x7f/0xf0 [<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a [<ffffffff817ee00c>] system_call_fastpath+0x1f/0x24 [<ffffffff817edf55>] ? system_call_after_swapgs+0xa2/0x13a | Link to test |