Match messages in logs (every line would be required to be present in log output Copy from "Messages before crash" column below): | |
Match messages in full crash (every line would be required to be present in crash log output Copy from "Full Crash" column below): | |
Limit to a test: (Copy from below "Failing text"): | |
Delete these reports as invalid (real bug in review or some such) | |
Bug or comment: | |
Extra info: |
Failing Test | Full Crash | Messages before crash | Comment |
---|---|---|---|
sanity-sec test 36: control if clients can use encryption | kernel BUG at ../include/linux/scatterlist.h:163! invalid opcode: 0000 [#1] PREEMPT SMP PTI CPU: 0 PID: 13914 Comm: mkdir Kdump: loaded Tainted: G W OE n 6.4.0-150600.23.50-default #1 SLE15-SP6 32013eadc71d652cb07a599d8a722b9604994156 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 RIP: 0010:sg_init_one+0x81/0x90 Code: 01 48 89 d6 83 e6 03 a8 03 75 21 83 e2 01 75 1e 48 09 f0 41 89 6c 24 0c 41 89 4c 24 08 5b 49 89 04 24 5d 41 5c e9 bf 8f 66 00 <0f> 0b 0f 0b 0f 0b 48 8b 05 62 b4 82 01 eb b2 90 90 90 90 90 90 90 RSP: 0018:ffffb4e044edfaa0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000010 RCX: ffffb4e044edfae8 RDX: 0000677440000010 RSI: 0000000000000000 RDI: 0000000080000010 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: ffffb4e044edfae8 R11: 00000000000000f0 R12: ffffb4e044edfae8 R13: ffffb4e044edfae8 R14: ffff988bc3379780 R15: ffff988c0f05797c FS: 00007fd798c47380(0000) GS:ffff988c7cc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd798b0097e CR3: 0000000003948004 CR4: 00000000001706f0 Call Trace: <TASK> derive_key_aes+0xf3/0x190 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a] llcrypt_setup_v1_file_key+0x4d/0x1d0 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a] llcrypt_setup_v1_file_key_via_subscribed_keyrings+0x65/0xf0 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a] llcrypt_get_encryption_info+0x518/0x620 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a] ? ll_new_node+0x176/0x1300 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2] ? ll_new_node+0x121/0x1300 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2] ll_new_node+0x176/0x1300 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2] ll_mkdir+0x82/0x230 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2] vfs_mkdir+0x198/0x240 do_mkdirat+0xfb/0x120 __x64_sys_mkdir+0x26/0x30 do_syscall_64+0x5b/0x80 ? __count_memcg_events+0x46/0x90 ? count_memcg_event_mm+0x3d/0x60 ? handle_mm_fault+0x196/0x2f0 ? do_user_addr_fault+0x267/0x890 ? exc_page_fault+0x69/0x150 entry_SYSCALL_64_after_hwframe+0x7c/0xe6 RIP: 0033:0x7fd798b1ffe7 | Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: Unmounted lustre-client Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock,test_dummy_encryption trevis-107vm7@tcp:/lustre /mnt/lustre Lustre: lustre: server lustre-clilmv-ffff988be9956000 does not support name encryption, not using it. Lustre: Test dummy encryption mode enabled Lustre: Mounted lustre-client ------------[ cut here ]------------ | Link to test |
sanity-sec test 36: control if clients can use encryption | kernel BUG at ../include/linux/scatterlist.h:163! invalid opcode: 0000 [#1] PREEMPT SMP PTI CPU: 0 PID: 9478 Comm: mkdir Kdump: loaded Tainted: G W OE n 6.4.0-150600.23.50-default #1 SLE15-SP6 32013eadc71d652cb07a599d8a722b9604994156 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 RIP: 0010:sg_init_one+0x81/0x90 Code: 01 48 89 d6 83 e6 03 a8 03 75 21 83 e2 01 75 1e 48 09 f0 41 89 6c 24 0c 41 89 4c 24 08 5b 49 89 04 24 5d 41 5c e9 bf 8f 66 00 <0f> 0b 0f 0b 0f 0b 48 8b 05 62 b4 82 01 eb b2 90 90 90 90 90 90 90 RSP: 0018:ffffb2250415fb50 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000010 RCX: ffffb2250415fb98 RDX: 00006ee900000010 RSI: 0000000000000000 RDI: 0000000080000010 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 R10: ffffb2250415fb98 R11: 00000000000000f0 R12: ffffb2250415fb98 R13: ffffb2250415fb98 R14: ffff911754d87c00 R15: ffff911721b419dc FS: 00007fe0c7086380(0000) GS:ffff9117bfc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fe0c6f0097e CR3: 0000000003636004 CR4: 00000000000606f0 Call Trace: <TASK> derive_key_aes+0xf3/0x190 [libcfs df43ec0866cbe984257ccb569c596f06afea5279] llcrypt_setup_v1_file_key+0x4d/0x1d0 [libcfs df43ec0866cbe984257ccb569c596f06afea5279] llcrypt_setup_v1_file_key_via_subscribed_keyrings+0x65/0xf0 [libcfs df43ec0866cbe984257ccb569c596f06afea5279] llcrypt_get_encryption_info+0x518/0x620 [libcfs df43ec0866cbe984257ccb569c596f06afea5279] ? ll_new_node+0x176/0x1300 [lustre af103a2319fcc908329fe073712f51299b5a71c5] ll_new_node+0x176/0x1300 [lustre af103a2319fcc908329fe073712f51299b5a71c5] ll_mkdir+0x82/0x230 [lustre af103a2319fcc908329fe073712f51299b5a71c5] vfs_mkdir+0x198/0x240 do_mkdirat+0xfb/0x120 __x64_sys_mkdir+0x26/0x30 do_syscall_64+0x5b/0x80 ? exc_page_fault+0x69/0x150 entry_SYSCALL_64_after_hwframe+0x7c/0xe6 RIP: 0033:0x7fe0c6f1ffe7 | Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts Lustre: DEBUG MARKER: lsof -t /mnt/lustre Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1 Lustre: Unmounted lustre-client Lustre: DEBUG MARKER: mkdir -p /mnt/lustre Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock,test_dummy_encryption trevis-33vm6@tcp:/lustre /mnt/lustre Lustre: lustre: server lustre-clilmv-ffff911723aee800 does not support name encryption, not using it. Lustre: Test dummy encryption mode enabled Lustre: Mounted lustre-client ------------[ cut here ]------------ | Link to test |