Editing crashreport #73662

ReasonCrashing FunctionWhere to cut BacktraceReports Count
kernel BUG at sg_init_onederive_key_aes
llcrypt_setup_v1_file_key
llcrypt_setup_v1_file_key_via_subscribed_keyrings
llcrypt_get_encryption_info
ll_new_node
ll_mkdir
vfs_mkdir
do_mkdirat
__x64_sys_mkdir
do_syscall_64
entry_SYSCALL_64_after_hwframe
2

Added fields:

Match messages in logs
(every line would be required to be present in log output
Copy from "Messages before crash" column below):
Match messages in full crash
(every line would be required to be present in crash log output
Copy from "Full Crash" column below):
Limit to a test:
(Copy from below "Failing text"):
Delete these reports as invalid (real bug in review or some such)
Bug or comment:
Extra info:

Failures list (last 100):

Failing TestFull CrashMessages before crashComment
sanity-sec test 36: control if clients can use encryption
kernel BUG at ../include/linux/scatterlist.h:163!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 13914 Comm: mkdir Kdump: loaded Tainted: G W OE n 6.4.0-150600.23.50-default #1 SLE15-SP6 32013eadc71d652cb07a599d8a722b9604994156
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:sg_init_one+0x81/0x90
Code: 01 48 89 d6 83 e6 03 a8 03 75 21 83 e2 01 75 1e 48 09 f0 41 89 6c 24 0c 41 89 4c 24 08 5b 49 89 04 24 5d 41 5c e9 bf 8f 66 00 <0f> 0b 0f 0b 0f 0b 48 8b 05 62 b4 82 01 eb b2 90 90 90 90 90 90 90
RSP: 0018:ffffb4e044edfaa0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000010 RCX: ffffb4e044edfae8
RDX: 0000677440000010 RSI: 0000000000000000 RDI: 0000000080000010
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: ffffb4e044edfae8 R11: 00000000000000f0 R12: ffffb4e044edfae8
R13: ffffb4e044edfae8 R14: ffff988bc3379780 R15: ffff988c0f05797c
FS: 00007fd798c47380(0000) GS:ffff988c7cc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fd798b0097e CR3: 0000000003948004 CR4: 00000000001706f0
Call Trace:
<TASK>
derive_key_aes+0xf3/0x190 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a]
llcrypt_setup_v1_file_key+0x4d/0x1d0 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a]
llcrypt_setup_v1_file_key_via_subscribed_keyrings+0x65/0xf0 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a]
llcrypt_get_encryption_info+0x518/0x620 [libcfs 7b80484d917fc0726f62ef80440e56d9a30d488a]
? ll_new_node+0x176/0x1300 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2]
? ll_new_node+0x121/0x1300 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2]
ll_new_node+0x176/0x1300 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2]
ll_mkdir+0x82/0x230 [lustre 7e8c9c1776053c5377cd5feb72b2207697efc8e2]
vfs_mkdir+0x198/0x240
do_mkdirat+0xfb/0x120
__x64_sys_mkdir+0x26/0x30
do_syscall_64+0x5b/0x80
? __count_memcg_events+0x46/0x90
? count_memcg_event_mm+0x3d/0x60
? handle_mm_fault+0x196/0x2f0
? do_user_addr_fault+0x267/0x890
? exc_page_fault+0x69/0x150
entry_SYSCALL_64_after_hwframe+0x7c/0xe6
RIP: 0033:0x7fd798b1ffe7
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
Lustre: Unmounted lustre-client
Lustre: DEBUG MARKER: mkdir -p /mnt/lustre
Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock,test_dummy_encryption trevis-107vm7@tcp:/lustre /mnt/lustre
Lustre: lustre: server lustre-clilmv-ffff988be9956000 does not support name encryption, not using it.
Lustre: Test dummy encryption mode enabled
Lustre: Mounted lustre-client
------------[ cut here ]------------
Link to test
sanity-sec test 36: control if clients can use encryption
kernel BUG at ../include/linux/scatterlist.h:163!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 9478 Comm: mkdir Kdump: loaded Tainted: G W OE n 6.4.0-150600.23.50-default #1 SLE15-SP6 32013eadc71d652cb07a599d8a722b9604994156
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:sg_init_one+0x81/0x90
Code: 01 48 89 d6 83 e6 03 a8 03 75 21 83 e2 01 75 1e 48 09 f0 41 89 6c 24 0c 41 89 4c 24 08 5b 49 89 04 24 5d 41 5c e9 bf 8f 66 00 <0f> 0b 0f 0b 0f 0b 48 8b 05 62 b4 82 01 eb b2 90 90 90 90 90 90 90
RSP: 0018:ffffb2250415fb50 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000010 RCX: ffffb2250415fb98
RDX: 00006ee900000010 RSI: 0000000000000000 RDI: 0000000080000010
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: ffffb2250415fb98 R11: 00000000000000f0 R12: ffffb2250415fb98
R13: ffffb2250415fb98 R14: ffff911754d87c00 R15: ffff911721b419dc
FS: 00007fe0c7086380(0000) GS:ffff9117bfc00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe0c6f0097e CR3: 0000000003636004 CR4: 00000000000606f0
Call Trace:
<TASK>
derive_key_aes+0xf3/0x190 [libcfs df43ec0866cbe984257ccb569c596f06afea5279]
llcrypt_setup_v1_file_key+0x4d/0x1d0 [libcfs df43ec0866cbe984257ccb569c596f06afea5279]
llcrypt_setup_v1_file_key_via_subscribed_keyrings+0x65/0xf0 [libcfs df43ec0866cbe984257ccb569c596f06afea5279]
llcrypt_get_encryption_info+0x518/0x620 [libcfs df43ec0866cbe984257ccb569c596f06afea5279]
? ll_new_node+0x176/0x1300 [lustre af103a2319fcc908329fe073712f51299b5a71c5]
ll_new_node+0x176/0x1300 [lustre af103a2319fcc908329fe073712f51299b5a71c5]
ll_mkdir+0x82/0x230 [lustre af103a2319fcc908329fe073712f51299b5a71c5]
vfs_mkdir+0x198/0x240
do_mkdirat+0xfb/0x120
__x64_sys_mkdir+0x26/0x30
do_syscall_64+0x5b/0x80
? exc_page_fault+0x69/0x150
entry_SYSCALL_64_after_hwframe+0x7c/0xe6
RIP: 0033:0x7fe0c6f1ffe7
Lustre: DEBUG MARKER: grep -c /mnt/lustre' ' /proc/mounts
Lustre: DEBUG MARKER: lsof -t /mnt/lustre
Lustre: DEBUG MARKER: umount /mnt/lustre 2>&1
Lustre: Unmounted lustre-client
Lustre: DEBUG MARKER: mkdir -p /mnt/lustre
Lustre: DEBUG MARKER: mount -t lustre -o user_xattr,flock,test_dummy_encryption trevis-33vm6@tcp:/lustre /mnt/lustre
Lustre: lustre: server lustre-clilmv-ffff911723aee800 does not support name encryption, not using it.
Lustre: Test dummy encryption mode enabled
Lustre: Mounted lustre-client
------------[ cut here ]------------
Link to test
Return to new crashes list