ALT Linux Bugzilla
– Attachment 20320 Details for
Bug 57209
2.3.5: kernel Oops
New bug
|
Search
|
[?]
|
Help
Register
|
Log In
[x]
|
Forgot Password
Login:
[x]
|
EN
|
RU
zfs kernel Oops
kernel_Oops_20251211.log (text/x-log), 5.54 KB, created by
Sergey Y. Afonin
on 2025-12-11 19:09:39 MSK
(
hide
)
Description:
zfs kernel Oops
Filename:
MIME Type:
Creator:
Sergey Y. Afonin
Created:
2025-12-11 19:09:39 MSK
Size:
5.54 KB
patch
obsolete
>Dec 11 16:42:20 kernel: Oops: Oops: 0002 [#1] PREEMPT SMP PTI >Dec 11 16:42:20 kernel: CPU: 2 UID: 987 PID: 2068 Comm: zpool Tainted: P OE 6.12.59-6.12-alt1 #1 >Dec 11 16:42:20 kernel: Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE >Dec 11 16:42:20 kernel: Hardware name: Supermicro X9SCI/X9SCA/X9SCI/X9SCA, BIOS 2.3a 01/06/2021 >Dec 11 16:42:20 kernel: RIP: 0010:mutex_lock+0x18/0x40 >Dec 11 16:42:20 kernel: Code: ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 53 48 89 fb e8 32 db ff ff 65 48 8b 15 8a 63 1f 59 31 c0 <f0> 48 0f b1 13 75 0c 5b 31 c0 31 d2 31 ff c3 cc cc cc cc 48 89 df >Dec 11 16:42:20 kernel: RSP: 0018:ffffaafc43a6faf8 EFLAGS: 00010246 >Dec 11 16:42:20 kernel: RAX: 0000000000000000 RBX: 0000000000000980 RCX: 0000000000000000 >Dec 11 16:42:20 kernel: RDX: ffff88be2f7b8000 RSI: 0000000000000000 RDI: 0000000000000000 >Dec 11 16:42:20 kernel: RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 >Dec 11 16:42:20 kernel: R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffc10c9188 >Dec 11 16:42:20 kernel: R13: 00000000000009c0 R14: 0000000000000009 R15: ffff88be2f7b8000 >Dec 11 16:42:20 kernel: FS: 00007f97b714f940(0000) GS:ffff88c11fb00000(0000) knlGS:0000000000000000 >Dec 11 16:42:20 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >Dec 11 16:42:20 kernel: CR2: 0000000000000980 CR3: 000000011204e001 CR4: 00000000001726f0 >Dec 11 16:42:20 kernel: Call Trace: >Dec 11 16:42:20 kernel: <TASK> >Dec 11 16:42:20 kernel: zfs_range_tree_span+0x146/0x2a0 [zfs] >Dec 11 16:42:20 kernel: spa_prop_get+0x63/0xfe0 [zfs] >Dec 11 16:42:20 kernel: ? spa_event_notify+0x51d/0x610 [zfs] >Dec 11 16:42:20 kernel: zfs_impl_get_ops+0x42d9/0x7650 [zfs] >Dec 11 16:42:20 kernel: zfsdev_ioctl_common+0x434/0x9a0 [zfs] >Dec 11 16:42:20 kernel: zfs_file_put+0x11f/0x2d0 [zfs] >Dec 11 16:42:20 kernel: __x64_sys_ioctl+0x98/0xe0 >Dec 11 16:42:20 kernel: do_syscall_64+0x85/0x180 >Dec 11 16:42:20 kernel: ? __lruvec_stat_mod_folio+0x7f/0xd0 >Dec 11 16:42:20 kernel: ? __folio_mod_stat+0x26/0x80 >Dec 11 16:42:20 kernel: ? set_ptes.isra.0+0x23/0xd0 >Dec 11 16:42:20 kernel: ? do_anonymous_page+0xfa/0x7f0 >Dec 11 16:42:20 kernel: ? __pte_offset_map+0x17/0x1e0 >Dec 11 16:42:20 kernel: ? __handle_mm_fault+0xb40/0xfa0 >Dec 11 16:42:20 kernel: ? syscall_exit_to_user_mode+0x66/0x130 >Dec 11 16:42:20 kernel: ? __count_memcg_events+0x69/0x110 >Dec 11 16:42:20 kernel: ? count_memcg_events.constprop.0+0x3a/0x70 >Dec 11 16:42:20 kernel: ? handle_mm_fault+0x9d/0x280 >Dec 11 16:42:20 kernel: ? sched_clock+0xc/0x30 >Dec 11 16:42:20 kernel: ? get_vtime_delta+0xf/0xb0 >Dec 11 16:42:20 kernel: ? ct_kernel_exit.isra.0+0x65/0x80 >Dec 11 16:42:20 kernel: ? __ct_user_enter+0x5e/0xd0 >Dec 11 16:42:20 kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e >Dec 11 16:42:20 kernel: RIP: 0033:0x7f97b735cacb >Dec 11 16:42:20 kernel: Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 >Dec 11 16:42:20 kernel: RSP: 002b:00007ffc76d8b700 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 >Dec 11 16:42:20 kernel: RAX: ffffffffffffffda RBX: 000055ae138b8890 RCX: 00007f97b735cacb >Dec 11 16:42:20 kernel: RDX: 00007ffc76d8b760 RSI: 0000000000005a27 RDI: 0000000000000003 >Dec 11 16:42:20 kernel: RBP: 00007ffc76d8ed40 R08: 0000000000060781 R09: 0000000000000000 >Dec 11 16:42:20 kernel: R10: 0000000000000004 R11: 0000000000000246 R12: 00007ffc76d8b760 >Dec 11 16:42:20 kernel: R13: 000055ae13883930 R14: 000055ae13887550 R15: 0000000000002000 >Dec 11 16:42:20 kernel: </TASK> >Dec 11 16:42:20 kernel: Modules linked in: e1000e binfmt_misc zfs(POE) spl(OE) intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm mpt3sas irqbypass jc42 crct10dif_pclmul crc32_pclmul at24 i2c_i801 mei_me ipmi_ssif iTCO_wdt crc32c_intel i2c_mux intel_pmc_bxt raid_class iTCO_vendor_support ghash_clmulni_intel mei i2c_smbus pcspkr scsi_transport_sas joydev lpc_ich acpi_ipmi cryptd ahci ipmi_si libahci ie31200_edac edac_core ipmi_devintf video ipmi_msghandler sha512_ssse3 wmi sha256_ssse3 libata sha1_ssse3 thermal fan tiny_power_button button sch_fq_codel dm_multipath efi_pstore scsi_dh_rdac scsi_dh_emc scsi_dh_alua fuse dm_mod nfnetlink dmi_sysfs ip_tables x_tables autofs4 evdev input_leds hid_generic usbhid hid sd_mod aacraid scsi_mod ehci_pci scsi_common ehci_hcd [last unloaded: e1000e] >Dec 11 16:42:21 kernel: CR2: 0000000000000980 >Dec 11 16:42:21 kernel: ---[ end trace 0000000000000000 ]--- >Dec 11 16:42:21 kernel: RIP: 0010:mutex_lock+0x18/0x40 >Dec 11 16:42:21 kernel: Code: ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 53 48 89 fb e8 32 db ff ff 65 48 8b 15 8a 63 1f 59 31 c0 <f0> 48 0f b1 13 75 0c 5b 31 c0 31 d2 31 ff c3 cc cc cc cc 48 89 df >Dec 11 16:42:21 kernel: RSP: 0018:ffffaafc43a6faf8 EFLAGS: 00010246 >Dec 11 16:42:21 kernel: RAX: 0000000000000000 RBX: 0000000000000980 RCX: 0000000000000000 >Dec 11 16:42:21 kernel: RDX: ffff88be2f7b8000 RSI: 0000000000000000 RDI: 0000000000000000 >Dec 11 16:42:21 kernel: RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 >Dec 11 16:42:21 kernel: R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffc10c9188 >Dec 11 16:42:21 kernel: R13: 00000000000009c0 R14: 0000000000000009 R15: ffff88be2f7b8000 >Dec 11 16:42:21 kernel: FS: 00007f97b714f940(0000) GS:ffff88c11fb00000(0000) knlGS:0000000000000000 >Dec 11 16:42:21 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >Dec 11 16:42:21 kernel: CR2: 0000000000000980 CR3: 000000011204e001 CR4: 00000000001726f0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 57209
: 20320 |
20328