Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- mai 19 15:02:23 kernel: ------------[ cut here ]------------
- mai 19 15:02:23 kernel: btree trans held srcu lock (delaying memory reclaim) for 27 seconds
- mai 19 15:02:23 kernel: WARNING: CPU: 8 PID: 5325 at fs/bcachefs/btree_iter.c:3232 bch2_trans_srcu_unlock+0x140/0x160 [bcachefs]
- mai 19 15:02:23 kernel: Modules linked in: dm_mod nf_tables bcachefs chacha_neon libchacha poly1305_neon lz4hc_compress lz4_compress sd_mod sg iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi scsi_mod scsi_common binfmt_misc nls_ascii nls_cp437 vfat fat aes_ce_blk aes_ce_cipher polyval_ce polyval_generic ghash_ce evdev gf128mul sha2_ce sha256_arm64 sha1_ce arm_smccc_trng virtio_console button efi_pstore configfs nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vsock efivarfs qemu_fw_cfg virtio_rng ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 btrfs blake2b_generic xor xor_neon raid6_pq virtio_net net_failover virtio_blk failover
- mai 19 15:02:23 kernel: CPU: 8 UID: 0 PID: 5325 Comm: bch-reclaim/2ae Not tainted 6.15.0-rc6+ #21 NONE
- mai 19 15:02:23 kernel: Hardware name: QEMU KVM Virtual Machine, BIOS 2025.02-6 04/08/2025
- mai 19 15:02:23 kernel: pstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
- mai 19 15:02:23 kernel: pc : bch2_trans_srcu_unlock+0x140/0x160 [bcachefs]
- mai 19 15:02:23 kernel: lr : bch2_trans_srcu_unlock+0x140/0x160 [bcachefs]
- mai 19 15:02:23 kernel: sp : ffff80008270b9d0
- mai 19 15:02:23 kernel: x29: ffff80008270b9d0 x28: 0000000000494637 x27: ffff0001647c3a68
- mai 19 15:02:23 kernel: x26: ffff0001647c3800 x25: ffff80008270bc77 x24: ffff0006ac450000
- mai 19 15:02:23 kernel: x23: ffff0001647c39c0 x22: ffff0001647c3a10 x21: 0000000000000003
- mai 19 15:02:23 kernel: x20: ffff0001647c0000 x19: ffff0006ac450000 x18: 00000000ffffffff
- mai 19 15:02:23 kernel: x17: ffff0000c0e8a6c0 x16: ffffd208ce560468 x15: ffff0009fa75e351
- mai 19 15:02:23 kernel: x14: ffff80008270b540 x13: ffff0009fa75e35c x12: 616c636572207972
- mai 19 15:02:23 kernel: x11: 6f6d656d20676e69 x10: 79616c656428206b x9 : ffffd208ce7169e8
- mai 19 15:02:23 kernel: x8 : 0000000000000002 x7 : 0000000000000000 x6 : 000000000000000d
- mai 19 15:02:23 kernel: x5 : ffff0009fa88b908 x4 : 0000000000000000 x3 : 0000000000000000
- mai 19 15:02:23 kernel: x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000c0cc1280
- mai 19 15:02:23 kernel: Call trace:
- mai 19 15:02:23 kernel: bch2_trans_srcu_unlock+0x140/0x160 [bcachefs] (P)
- mai 19 15:02:23 kernel: bch2_trans_begin+0x5d4/0x748 [bcachefs]
- mai 19 15:02:23 kernel: bch2_btree_write_buffer_flush_locked+0xa8/0xa98 [bcachefs]
- mai 19 15:02:23 kernel: btree_write_buffer_flush_seq+0x114/0x220 [bcachefs]
- mai 19 15:02:23 kernel: bch2_btree_write_buffer_journal_flush+0x6c/0xe0 [bcachefs]
- mai 19 15:02:23 kernel: journal_flush_pins.constprop.0+0x1b8/0x360 [bcachefs]
- mai 19 15:02:23 kernel: __bch2_journal_reclaim+0x1b0/0x3c0 [bcachefs]
- mai 19 15:02:23 kernel: bch2_journal_reclaim_thread+0x8c/0x200 [bcachefs]
- mai 19 15:02:23 kernel: kthread+0x120/0x220
- mai 19 15:02:23 kernel: ret_from_fork+0x10/0x20
- mai 19 15:02:23 kernel: ---[ end trace 0000000000000000 ]---
- mai 20 01:41:20 kernel: ------------[ cut here ]------------
- mai 20 01:41:20 kernel: Ignoring spurious kernel translation fault at virtual address ffff000632a40088
- mai 20 01:41:20 kernel: WARNING: CPU: 3 PID: 872847 at arch/arm64/mm/fault.c:381 __do_kernel_fault+0x160/0x1d0
- mai 20 01:41:21 kernel: Modules linked in: dm_mod nf_tables bcachefs chacha_neon libchacha poly1305_neon lz4hc_compress lz4_compress sd_mod sg iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi scsi_mod scsi_common binfmt_misc nls_ascii nls_cp437 vfat fat aes_ce_blk aes_ce_cipher polyval_ce polyval_generic ghash_ce evdev gf128mul sha2_ce sha256_arm64 sha1_ce arm_smccc_trng virtio_console button efi_pstore configfs nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vsock efivarfs qemu_fw_cfg virtio_rng ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 btrfs blake2b_generic xor xor_neon raid6_pq virtio_net net_failover virtio_blk failover
- mai 20 01:41:21 kernel: CPU: 3 UID: 0 PID: 872847 Comm: kworker/u80:13 Tainted: G W 6.15.0-rc6+ #21 NONE
- mai 20 01:41:21 kernel: Tainted: [W]=WARN
- mai 20 01:41:21 kernel: Hardware name: QEMU KVM Virtual Machine, BIOS 2025.02-6 04/08/2025
- mai 20 01:41:21 kernel: Workqueue: btree_update btree_interior_update_work [bcachefs]
- mai 20 01:41:21 kernel: pstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
- mai 20 01:41:21 kernel: pc : __do_kernel_fault+0x160/0x1d0
- mai 20 01:41:21 kernel: lr : __do_kernel_fault+0x160/0x1d0
- mai 20 01:41:21 kernel: sp : ffff8000b59e3a60
- mai 20 01:41:21 kernel: x29: ffff8000b59e3a60 x28: ffff0000d0a19280 x27: ffff0000c0019c28
- mai 20 01:41:21 kernel: x26: ffffd208cf1dabe8 x25: 0000000000000000 x24: ffff0001647c0000
- mai 20 01:41:21 kernel: x23: 0000000060401005 x22: 0000000094000000 x21: ffff000632a40088
- mai 20 01:41:21 kernel: x20: ffff8000b59e3b30 x19: 0000000096000007 x18: 0000000000000010
- mai 20 01:41:21 kernel: x17: 0000000000000000 x16: ffffd208ce613b90 x15: ffff0009fa75ee26
- mai 20 01:41:21 kernel: x14: 0000000000000000 x13: ffff0009fa75ee38 x12: ffff0009fa719fa8
- mai 20 01:41:21 kernel: x11: ffff0009fa66a000 x10: ffff0009fa71a000 x9 : ffffd208ce7169e8
- mai 20 01:41:21 kernel: x8 : 0000000000000001 x7 : 000000000002ffe8 x6 : c0000000ffffdfff
- mai 20 01:41:21 kernel: x5 : ffff0009fa7eb908 x4 : 0000000000000000 x3 : 0000000000000000
- mai 20 01:41:21 kernel: x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000d0a19280
- mai 20 01:41:21 kernel: Call trace:
- mai 20 01:41:21 kernel: __do_kernel_fault+0x160/0x1d0 (P)
- mai 20 01:41:21 kernel: do_bad_area+0x70/0x90
- mai 20 01:41:21 kernel: do_translation_fault+0x50/0xa0
- mai 20 01:41:21 kernel: do_mem_abort+0x48/0xa0
- mai 20 01:41:21 kernel: el1_abort+0x40/0x68
- mai 20 01:41:21 kernel: el1h_64_sync_handler+0xf0/0x120
- mai 20 01:41:21 kernel: el1h_64_sync+0x6c/0x70
- mai 20 01:41:21 kernel: btree_node_seq_matches+0x10/0x40 [bcachefs] (P)
- mai 20 01:41:21 kernel: process_one_work+0x178/0x3d0
- mai 20 01:41:21 kernel: worker_thread+0x208/0x400
- mai 20 01:41:21 kernel: kthread+0x120/0x220
- mai 20 01:41:21 kernel: ret_from_fork+0x10/0x20
- mai 20 01:41:21 kernel: ---[ end trace 0000000000000000 ]---
- ---
- root@casrvbackups2:/home/jerome.poulin/debs-ext4/bcachefs# ./scripts/faddr2line fs/bcachefs/bcachefs.ko btree_node_seq_matches+0x10/0x40
- btree_node_seq_matches+0x10/0x40:
- btree_node_seq_matches at /home/jerome.poulin/debs-ext4/bcachefs/fs/bcachefs/btree_update_interior.c:660 (discriminator 1)
- root@casrvbackups2:/home/jerome.poulin/debs-ext4/bcachefs# sed -n '640,661p' /home/jerome.poulin/debs-ext4/bcachefs/fs/bcachefs/btree_update_interior.c
- return ret;
- }
- for_each_keylist_key(&as->new_keys, k) {
- unsigned level = bkey_i_to_btree_ptr_v2(k)->v.mem_ptr;
- ret = bch2_key_trigger_new(trans, as->btree_id, level, bkey_i_to_s(k),
- BTREE_TRIGGER_transactional);
- if (ret)
- return ret;
- }
- return 0;
- }
- /* If the node has been reused, we might be reading uninitialized memory - that's fine: */
- static noinline __no_kmsan_checks bool btree_node_seq_matches(struct btree *b, __le64 seq)
- {
- struct btree_node *b_data = READ_ONCE(b->data);
- return (b_data ? b_data->keys.seq : 0) == seq;
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement