Advertisement
ticpu

Untitled

May 20th, 2025
33
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.20 KB | None | 0 0
  1. mai 19 15:02:23 kernel: ------------[ cut here ]------------
  2. mai 19 15:02:23 kernel: btree trans held srcu lock (delaying memory reclaim) for 27 seconds
  3. mai 19 15:02:23 kernel: WARNING: CPU: 8 PID: 5325 at fs/bcachefs/btree_iter.c:3232 bch2_trans_srcu_unlock+0x140/0x160 [bcachefs]
  4. mai 19 15:02:23 kernel: Modules linked in: dm_mod nf_tables bcachefs chacha_neon libchacha poly1305_neon lz4hc_compress lz4_compress sd_mod sg iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi scsi_mod scsi_common binfmt_misc nls_ascii nls_cp437 vfat fat aes_ce_blk aes_ce_cipher polyval_ce polyval_generic ghash_ce evdev gf128mul sha2_ce sha256_arm64 sha1_ce arm_smccc_trng virtio_console button efi_pstore configfs nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vsock efivarfs qemu_fw_cfg virtio_rng ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 btrfs blake2b_generic xor xor_neon raid6_pq virtio_net net_failover virtio_blk failover
  5. mai 19 15:02:23 kernel: CPU: 8 UID: 0 PID: 5325 Comm: bch-reclaim/2ae Not tainted 6.15.0-rc6+ #21 NONE
  6. mai 19 15:02:23 kernel: Hardware name: QEMU KVM Virtual Machine, BIOS 2025.02-6 04/08/2025
  7. mai 19 15:02:23 kernel: pstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
  8. mai 19 15:02:23 kernel: pc : bch2_trans_srcu_unlock+0x140/0x160 [bcachefs]
  9. mai 19 15:02:23 kernel: lr : bch2_trans_srcu_unlock+0x140/0x160 [bcachefs]
  10. mai 19 15:02:23 kernel: sp : ffff80008270b9d0
  11. mai 19 15:02:23 kernel: x29: ffff80008270b9d0 x28: 0000000000494637 x27: ffff0001647c3a68
  12. mai 19 15:02:23 kernel: x26: ffff0001647c3800 x25: ffff80008270bc77 x24: ffff0006ac450000
  13. mai 19 15:02:23 kernel: x23: ffff0001647c39c0 x22: ffff0001647c3a10 x21: 0000000000000003
  14. mai 19 15:02:23 kernel: x20: ffff0001647c0000 x19: ffff0006ac450000 x18: 00000000ffffffff
  15. mai 19 15:02:23 kernel: x17: ffff0000c0e8a6c0 x16: ffffd208ce560468 x15: ffff0009fa75e351
  16. mai 19 15:02:23 kernel: x14: ffff80008270b540 x13: ffff0009fa75e35c x12: 616c636572207972
  17. mai 19 15:02:23 kernel: x11: 6f6d656d20676e69 x10: 79616c656428206b x9 : ffffd208ce7169e8
  18. mai 19 15:02:23 kernel: x8 : 0000000000000002 x7 : 0000000000000000 x6 : 000000000000000d
  19. mai 19 15:02:23 kernel: x5 : ffff0009fa88b908 x4 : 0000000000000000 x3 : 0000000000000000
  20. mai 19 15:02:23 kernel: x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000c0cc1280
  21. mai 19 15:02:23 kernel: Call trace:
  22. mai 19 15:02:23 kernel: bch2_trans_srcu_unlock+0x140/0x160 [bcachefs] (P)
  23. mai 19 15:02:23 kernel: bch2_trans_begin+0x5d4/0x748 [bcachefs]
  24. mai 19 15:02:23 kernel: bch2_btree_write_buffer_flush_locked+0xa8/0xa98 [bcachefs]
  25. mai 19 15:02:23 kernel: btree_write_buffer_flush_seq+0x114/0x220 [bcachefs]
  26. mai 19 15:02:23 kernel: bch2_btree_write_buffer_journal_flush+0x6c/0xe0 [bcachefs]
  27. mai 19 15:02:23 kernel: journal_flush_pins.constprop.0+0x1b8/0x360 [bcachefs]
  28. mai 19 15:02:23 kernel: __bch2_journal_reclaim+0x1b0/0x3c0 [bcachefs]
  29. mai 19 15:02:23 kernel: bch2_journal_reclaim_thread+0x8c/0x200 [bcachefs]
  30. mai 19 15:02:23 kernel: kthread+0x120/0x220
  31. mai 19 15:02:23 kernel: ret_from_fork+0x10/0x20
  32. mai 19 15:02:23 kernel: ---[ end trace 0000000000000000 ]---
  33. mai 20 01:41:20 kernel: ------------[ cut here ]------------
  34. mai 20 01:41:20 kernel: Ignoring spurious kernel translation fault at virtual address ffff000632a40088
  35. mai 20 01:41:20 kernel: WARNING: CPU: 3 PID: 872847 at arch/arm64/mm/fault.c:381 __do_kernel_fault+0x160/0x1d0
  36. mai 20 01:41:21 kernel: Modules linked in: dm_mod nf_tables bcachefs chacha_neon libchacha poly1305_neon lz4hc_compress lz4_compress sd_mod sg iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi scsi_mod scsi_common binfmt_misc nls_ascii nls_cp437 vfat fat aes_ce_blk aes_ce_cipher polyval_ce polyval_generic ghash_ce evdev gf128mul sha2_ce sha256_arm64 sha1_ce arm_smccc_trng virtio_console button efi_pstore configfs nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vsock efivarfs qemu_fw_cfg virtio_rng ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 btrfs blake2b_generic xor xor_neon raid6_pq virtio_net net_failover virtio_blk failover
  37. mai 20 01:41:21 kernel: CPU: 3 UID: 0 PID: 872847 Comm: kworker/u80:13 Tainted: G W 6.15.0-rc6+ #21 NONE
  38. mai 20 01:41:21 kernel: Tainted: [W]=WARN
  39. mai 20 01:41:21 kernel: Hardware name: QEMU KVM Virtual Machine, BIOS 2025.02-6 04/08/2025
  40. mai 20 01:41:21 kernel: Workqueue: btree_update btree_interior_update_work [bcachefs]
  41. mai 20 01:41:21 kernel: pstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
  42. mai 20 01:41:21 kernel: pc : __do_kernel_fault+0x160/0x1d0
  43. mai 20 01:41:21 kernel: lr : __do_kernel_fault+0x160/0x1d0
  44. mai 20 01:41:21 kernel: sp : ffff8000b59e3a60
  45. mai 20 01:41:21 kernel: x29: ffff8000b59e3a60 x28: ffff0000d0a19280 x27: ffff0000c0019c28
  46. mai 20 01:41:21 kernel: x26: ffffd208cf1dabe8 x25: 0000000000000000 x24: ffff0001647c0000
  47. mai 20 01:41:21 kernel: x23: 0000000060401005 x22: 0000000094000000 x21: ffff000632a40088
  48. mai 20 01:41:21 kernel: x20: ffff8000b59e3b30 x19: 0000000096000007 x18: 0000000000000010
  49. mai 20 01:41:21 kernel: x17: 0000000000000000 x16: ffffd208ce613b90 x15: ffff0009fa75ee26
  50. mai 20 01:41:21 kernel: x14: 0000000000000000 x13: ffff0009fa75ee38 x12: ffff0009fa719fa8
  51. mai 20 01:41:21 kernel: x11: ffff0009fa66a000 x10: ffff0009fa71a000 x9 : ffffd208ce7169e8
  52. mai 20 01:41:21 kernel: x8 : 0000000000000001 x7 : 000000000002ffe8 x6 : c0000000ffffdfff
  53. mai 20 01:41:21 kernel: x5 : ffff0009fa7eb908 x4 : 0000000000000000 x3 : 0000000000000000
  54. mai 20 01:41:21 kernel: x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000d0a19280
  55. mai 20 01:41:21 kernel: Call trace:
  56. mai 20 01:41:21 kernel: __do_kernel_fault+0x160/0x1d0 (P)
  57. mai 20 01:41:21 kernel: do_bad_area+0x70/0x90
  58. mai 20 01:41:21 kernel: do_translation_fault+0x50/0xa0
  59. mai 20 01:41:21 kernel: do_mem_abort+0x48/0xa0
  60. mai 20 01:41:21 kernel: el1_abort+0x40/0x68
  61. mai 20 01:41:21 kernel: el1h_64_sync_handler+0xf0/0x120
  62. mai 20 01:41:21 kernel: el1h_64_sync+0x6c/0x70
  63. mai 20 01:41:21 kernel: btree_node_seq_matches+0x10/0x40 [bcachefs] (P)
  64. mai 20 01:41:21 kernel: process_one_work+0x178/0x3d0
  65. mai 20 01:41:21 kernel: worker_thread+0x208/0x400
  66. mai 20 01:41:21 kernel: kthread+0x120/0x220
  67. mai 20 01:41:21 kernel: ret_from_fork+0x10/0x20
  68. mai 20 01:41:21 kernel: ---[ end trace 0000000000000000 ]---
  69.  
  70. ---
  71.  
  72. root@casrvbackups2:/home/jerome.poulin/debs-ext4/bcachefs# ./scripts/faddr2line fs/bcachefs/bcachefs.ko btree_node_seq_matches+0x10/0x40
  73. btree_node_seq_matches+0x10/0x40:
  74. btree_node_seq_matches at /home/jerome.poulin/debs-ext4/bcachefs/fs/bcachefs/btree_update_interior.c:660 (discriminator 1)
  75. root@casrvbackups2:/home/jerome.poulin/debs-ext4/bcachefs# sed -n '640,661p' /home/jerome.poulin/debs-ext4/bcachefs/fs/bcachefs/btree_update_interior.c
  76. return ret;
  77. }
  78.  
  79. for_each_keylist_key(&as->new_keys, k) {
  80. unsigned level = bkey_i_to_btree_ptr_v2(k)->v.mem_ptr;
  81.  
  82. ret = bch2_key_trigger_new(trans, as->btree_id, level, bkey_i_to_s(k),
  83. BTREE_TRIGGER_transactional);
  84. if (ret)
  85. return ret;
  86. }
  87.  
  88. return 0;
  89. }
  90.  
  91. /* If the node has been reused, we might be reading uninitialized memory - that's fine: */
  92. static noinline __no_kmsan_checks bool btree_node_seq_matches(struct btree *b, __le64 seq)
  93. {
  94. struct btree_node *b_data = READ_ONCE(b->data);
  95.  
  96. return (b_data ? b_data->keys.seq : 0) == seq;
  97. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement