Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp19867251rwd; Wed, 28 Jun 2023 15:51:55 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7YfGY1MOI+7D90WVdKBWXtiq44xPWgc5VUbrejwDgjvnElnY4T65AON9Opi38K0DmIoGvE X-Received: by 2002:a05:6a00:c91:b0:677:bdc:cd6b with SMTP id a17-20020a056a000c9100b006770bdccd6bmr11129684pfv.19.1687992714726; Wed, 28 Jun 2023 15:51:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687992714; cv=none; d=google.com; s=arc-20160816; b=nb20DwDSFLZzvL2Q74e8Y8aADpSKhK7C76LzM5YYH+4L7SuJ3VIW2R+grByLrNUbSs tDBFtqnRx5NvRWyQ+9hc2/ZY4Nu1TP0tH6+kQtkBiD2D5R1NPEESrTZz29uKRjfni1YF LGVS+ed/zx5Fru+mOuoL7/jPrSvMK4gPnXpYtQ4Ajhkqh5IScTf/tBRzEmfHWYzB1Utj xKd3zALOEKjuLsHFQmRIhcWAc589jhBJjcTKbTWE2omjGLjZpYEpfKMgku5FQK8xqiNx s472+mVZ1hZYdS49kpcgDxK5bp3djFmZbXPyHd8hV5QZdkILmmWHcdK1Fyk6B5PExZCl K2fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=BesB8LNrjwi6jqO+H9B4CLcycQnbLsXLJHaD0saQWJ0=; fh=ehQUeGat43H2XNjmyPnlzjh4k4Urv2xYB7xuGWwZUm8=; b=ebJcEwLHztJCVpBmW4N/SofF42MUXNmygVMIljzZ+YizGNfprzxtRuKDlaeZMfe+7A zlg1Ak6Qb3lGoUTIePJhllh+8964sIyPbVe2whnyUxDjreYWDtLjaTvuai0myW5mEFCA /Lwxq7nj3Wm+H5ov0i3W/Whl9coTD/ZVBi83a4j70h2f0ZLJx7MpbOIkxmCXG38piQjD 8WBy326ZVZlU1hA2+0pXViz2E6iMDDhttkJaotMLu1f/Vci08v57jcuqFQCwG/sihI/G D7yswfMl2MJnI4iXbEgWeXAKrohrD6RpvBi2v4qbPIUHY3TAfXOY6R8554+syqGVrngB nSbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20221208.gappssmtp.com header.s=20221208 header.b=akS2Q8qE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 1-20020a630101000000b005578c6a767esi9340132pgb.885.2023.06.28.15.51.42; Wed, 28 Jun 2023 15:51:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20221208.gappssmtp.com header.s=20221208 header.b=akS2Q8qE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231359AbjF1WPH (ORCPT + 99 others); Wed, 28 Jun 2023 18:15:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43498 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230329AbjF1WOv (ORCPT ); Wed, 28 Jun 2023 18:14:51 -0400 Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7E3BF2114 for ; Wed, 28 Jun 2023 15:14:47 -0700 (PDT) Received: by mail-pf1-x42f.google.com with SMTP id d2e1a72fcca58-66d6a9851f3so9427b3a.0 for ; Wed, 28 Jun 2023 15:14:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20221208.gappssmtp.com; s=20221208; t=1687990487; x=1690582487; h=content-transfer-encoding:in-reply-to:references:cc:to:from :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=BesB8LNrjwi6jqO+H9B4CLcycQnbLsXLJHaD0saQWJ0=; b=akS2Q8qE3iZWhl0nSNkyUh/+ydzndjZpzZoc86SK9E3ZtxhuMaajbLoJCJ8k40KsGZ 54t1L5b/TVn1ETNegSvucaBshsDA3aYIbtzziokksnXf6FzlkiAaCmWj9yYRqquf8vBK LM6VAUpQjHf/9wlA5447mBvRMNycgeO/kBNYLatnwY5OY/o9Btl0r4247HkWcSvCp2Tl ChjrmDSMmTfs5VQJ36XAcGFLxpBsRl47845G1tRsOn4KimSUjroWqFpY8R076dOzRjEB Y8Q/oqadtP0rPCcwt0kveWNuUqVjUV4ZH3OHDN0udJzYp15LTiRrHio/UB/6l0uJFeyH ThBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687990487; x=1690582487; h=content-transfer-encoding:in-reply-to:references:cc:to:from :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=BesB8LNrjwi6jqO+H9B4CLcycQnbLsXLJHaD0saQWJ0=; b=V+7Uz5xcLPATv9HJ7fiTGUUNgZFIjF97wjyICT9QnZt0gtj41Q7xiv9abdiKFGASe8 WUqveWpq04o/P/qnkV813SkJy/bBlq/hm3nQfOk68MyIyTkmunVktE3bPL6zILojG9l6 vAxtn2lzIju4LMOz3zdS+nrnhGUvJgS++85SCWFNbP+fXHnB/l3dWiJILDFGPN+wNRG8 SBxjSvIf/1If2cAUHrMXhVuePSe0wcfWylSRl6+GmmMt8dWaRVgfS/9+lS2EAt8S5BIR /Ts8O5Uo7cJMXl6EVUbPeUE8lKKIrH9/nF8rly9on+ad9EZFax9xKPTwuitS2Exfcm8q dUvA== X-Gm-Message-State: AC+VfDyOforAIVoyIiw5ZbBwLNf1/5FyZTnS2TavVDnB/td1IGrfVxKj BdosP8HK4yFLAsRBSCvga4lOtFp7zxRVQ65LSlI= X-Received: by 2002:a05:6a20:7295:b0:111:fba0:bd3b with SMTP id o21-20020a056a20729500b00111fba0bd3bmr43595767pzk.1.1687990486517; Wed, 28 Jun 2023 15:14:46 -0700 (PDT) Received: from [192.168.1.136] ([198.8.77.157]) by smtp.gmail.com with ESMTPSA id l187-20020a6391c4000000b00543b4433aa9sm7981707pge.36.2023.06.28.15.14.45 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 28 Jun 2023 15:14:45 -0700 (PDT) Message-ID: <131fdf9b-bd31-fc0d-8fe9-8f68592306e5@kernel.dk> Date: Wed, 28 Jun 2023 16:14:44 -0600 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:102.0) Gecko/20100101 Thunderbird/102.12.0 Subject: Re: [GIT PULL] bcachefs Content-Language: en-US From: Jens Axboe To: Kent Overstreet Cc: torvalds@linux-foundation.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-bcachefs@vger.kernel.org, Christoph Hellwig References: <20230627000635.43azxbkd2uf3tu6b@moria.home.lan> <91e9064b-84e3-1712-0395-b017c7c4a964@kernel.dk> <20230627020525.2vqnt2pxhtgiddyv@moria.home.lan> <23922545-917a-06bd-ec92-ff6aa66118e2@kernel.dk> <20230627201524.ool73bps2lre2tsz@moria.home.lan> <20230628040114.oz46icbsjpa4egpp@moria.home.lan> <20230628175421.funhhfbx5kdvhclx@moria.home.lan> <4d3efe17-e114-96c1-dca8-a100cc6f7fc6@kernel.dk> In-Reply-To: <4d3efe17-e114-96c1-dca8-a100cc6f7fc6@kernel.dk> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/28/23 2:54?PM, Jens Axboe wrote: > On 6/28/23 11:54?AM, Kent Overstreet wrote: >> On Wed, Jun 28, 2023 at 08:58:45AM -0600, Jens Axboe wrote: >>> On 6/27/23 10:01?PM, Kent Overstreet wrote: >>>> On Tue, Jun 27, 2023 at 09:16:31PM -0600, Jens Axboe wrote: >>>>> On 6/27/23 2:15?PM, Kent Overstreet wrote: >>>>>>> to ktest/tests/xfstests/ and run it with -bcachefs, otherwise it kept >>>>>>> failing because it assumed it was XFS. >>>>>>> >>>>>>> I suspected this was just a timing issue, and it looks like that's >>>>>>> exactly what it is. Looking at the test case, it'll randomly kill -9 >>>>>>> fsstress, and if that happens while we have io_uring IO pending, then we >>>>>>> process completions inline (for a PF_EXITING current). This means they >>>>>>> get pushed to fallback work, which runs out of line. If we hit that case >>>>>>> AND the timing is such that it hasn't been processed yet, we'll still be >>>>>>> holding a file reference under the mount point and umount will -EBUSY >>>>>>> fail. >>>>>>> >>>>>>> As far as I can tell, this can happen with aio as well, it's just harder >>>>>>> to hit. If the fput happens while the task is exiting, then fput will >>>>>>> end up being delayed through a workqueue as well. The test case assumes >>>>>>> that once it's reaped the exit of the killed task that all files are >>>>>>> released, which isn't necessarily true if they are done out-of-line. >>>>>> >>>>>> Yeah, I traced it through to the delayed fput code as well. >>>>>> >>>>>> I'm not sure delayed fput is responsible here; what I learned when I was >>>>>> tracking this down has mostly fell out of my brain, so take anything I >>>>>> say with a large grain of salt. But I believe I tested with delayed_fput >>>>>> completely disabled, and found another thing in io_uring with the same >>>>>> effect as delayed_fput that wasn't being flushed. >>>>> >>>>> I'm not saying it's delayed_fput(), I'm saying it's the delayed putting >>>>> io_uring can end up doing. But yes, delayed_fput() is another candidate. >>>> >>>> Sorry - was just working through my recollections/initial thought >>>> process out loud >>> >>> No worries, it might actually be a combination and this is why my >>> io_uring side patch didn't fully resolve it. Wrote a simple reproducer >>> and it seems to reliably trigger it, but is fixed with an flush of the >>> delayed fput list on mount -EBUSY return. Still digging... >>> >>>>>>> For io_uring specifically, it may make sense to wait on the fallback >>>>>>> work. The below patch does this, and should fix the issue. But I'm not >>>>>>> fully convinced that this is really needed, as I do think this can >>>>>>> happen without io_uring as well. It just doesn't right now as the test >>>>>>> does buffered IO, and aio will be fully sync with buffered IO. That >>>>>>> means there's either no gap where aio will hit it without O_DIRECT, or >>>>>>> it's just small enough that it hasn't been hit. >>>>>> >>>>>> I just tried your patch and I still have generic/388 failing - it >>>>>> might've taken a bit longer to pop this time. >>>>> >>>>> Yep see the same here. Didn't have time to look into it after sending >>>>> that email today, just took a quick stab at writing a reproducer and >>>>> ended up crashing bcachefs: >>>> >>>> You must have hit an error before we finished initializing the >>>> filesystem, the list head never got initialized. Patch for that will be >>>> in the testing branch momentarily. >>> >>> I'll pull that in. In testing just now, I hit a few more leaks: >>> >>> unreferenced object 0xffff0000e55cf200 (size 128): >>> comm "mount", pid 723, jiffies 4294899134 (age 85.868s) >>> hex dump (first 32 bytes): >>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ >>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ >>> backtrace: >>> [<000000001d69062c>] slab_post_alloc_hook.isra.0+0xb4/0xbc >>> [<00000000c503def2>] __kmem_cache_alloc_node+0xd0/0x178 >>> [<00000000cde48528>] __kmalloc+0xac/0xd4 >>> [<000000006cb9446a>] kmalloc_array.constprop.0+0x18/0x20 >>> [<000000008341b32c>] bch2_fs_alloc+0x73c/0xbcc >> >> Can you faddr2line this? I just did a bunch of kmemleak testing and >> didn't see it. > > 0xffff800008589a20 is in bch2_fs_alloc (fs/bcachefs/super.c:813). > 808 !(c->online_reserved = alloc_percpu(u64)) || > 809 !(c->btree_paths_bufs = alloc_percpu(struct btree_path_buf)) || > 810 mempool_init_kvpmalloc_pool(&c->btree_bounce_pool, 1, > 811 btree_bytes(c)) || > 812 mempool_init_kmalloc_pool(&c->large_bkey_pool, 1, 2048) || > 813 !(c->unused_inode_hints = kcalloc(1U << c->inode_shard_bits, > 814 sizeof(u64), GFP_KERNEL))) { > 815 ret = -BCH_ERR_ENOMEM_fs_other_alloc; > 816 goto err; > 817 } Got a whole bunch more running that aio reproducer I sent earlier. I'm sure a lot of these are dupes, sending them here for completeness. [ 677.739815] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1283.963249] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) unreferenced object 0xffff0000e35de000 (size 8192): comm "mount", pid 3049, jiffies 4294924385 (age 3938.092s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1d 00 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000005602d414>] __kmalloc_node_track_caller+0xa8/0xd0 [<0000000078a13296>] krealloc+0x7c/0xc4 [<00000000f1fea4ad>] bch2_sb_realloc+0x12c/0x150 [<00000000f03d5ce6>] __copy_super+0x104/0x17c [<000000005567521f>] bch2_sb_to_fs+0x3c/0x80 [<0000000062d4e9f6>] bch2_fs_alloc+0x410/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff00020a209900 (size 128): comm "mount", pid 3049, jiffies 4294924385 (age 3938.092s) hex dump (first 32 bytes): 03 01 01 00 02 01 01 00 04 01 01 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<00000000fcf82258>] kmalloc_array.constprop.0+0x18/0x20 [<00000000182c3be4>] __bch2_sb_replicas_v0_to_cpu_replicas+0x50/0x118 [<0000000012583a94>] bch2_sb_replicas_to_cpu_replicas+0xb0/0xc0 [<00000000fcd0b373>] bch2_sb_to_fs+0x4c/0x80 [<0000000062d4e9f6>] bch2_fs_alloc+0x410/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff000206785400 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.068s) hex dump (first 32 bytes): 00 00 d9 20 02 00 ff ff 01 00 00 00 01 04 00 00 ... ............ 01 04 00 00 01 04 00 00 01 04 00 00 01 04 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<00000000bb95f8a0>] bch2_fs_alloc+0x690/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 [<00000000b4ee996a>] el0_svc+0x74/0x9c unreferenced object 0xffff000206785700 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.076s) hex dump (first 32 bytes): 00 00 96 2d 02 00 ff ff 01 00 00 00 01 04 00 00 ...-............ 01 04 00 00 01 04 00 00 01 04 00 00 01 04 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<0000000089ab54c3>] bch2_fs_replicas_init+0x64/0xac [<0000000056c4a5fe>] bch2_fs_alloc+0x79c/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 unreferenced object 0xffff000206785600 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.076s) hex dump (first 32 bytes): 00 1a 05 00 00 00 00 00 00 0c 02 00 00 00 00 00 ................ 42 9c ba 00 00 00 00 00 00 00 00 00 00 00 00 00 B............... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<00000000f949dcc7>] replicas_table_update+0x84/0x214 [<000000002debc89d>] bch2_fs_replicas_init+0x74/0xac [<0000000056c4a5fe>] bch2_fs_alloc+0x79c/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 [<00000000b4ee996a>] el0_svc+0x74/0x9c unreferenced object 0xffff000206785580 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.076s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 00 00 00 01 04 00 00 ................ 01 04 00 00 01 04 00 00 01 04 00 00 01 04 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<00000000639b7f33>] replicas_table_update+0x98/0x214 [<000000002debc89d>] bch2_fs_replicas_init+0x74/0xac [<0000000056c4a5fe>] bch2_fs_alloc+0x79c/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 [<00000000b4ee996a>] el0_svc+0x74/0x9c unreferenced object 0xffff000206785080 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.088s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<000000001335974a>] __prealloc_shrinker+0x3c/0x60 [<0000000017b0bc26>] register_shrinker+0x14/0x34 [<00000000c07d01d7>] bch2_fs_btree_cache_init+0xf8/0x150 [<000000004b948640>] bch2_fs_alloc+0x7ac/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 unreferenced object 0xffff000200f2ec00 (size 1024): comm "mount", pid 3049, jiffies 4294924391 (age 3938.088s) hex dump (first 32 bytes): 40 00 00 00 00 00 00 00 a8 66 18 09 00 00 00 00 @........f...... 10 ec f2 00 02 00 ff ff 10 ec f2 00 02 00 ff ff ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000066405974>] kvmalloc_node+0x54/0xe4 [<00000000a51f16c9>] bucket_table_alloc.isra.0+0x44/0x120 [<0000000000df2e94>] rhashtable_init+0x148/0x1ac [<0000000080f397f7>] bch2_fs_btree_key_cache_init+0x48/0x90 [<0000000089e6783c>] bch2_fs_alloc+0x7c0/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff000206785b80 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.088s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<000000001335974a>] __prealloc_shrinker+0x3c/0x60 [<0000000017b0bc26>] register_shrinker+0x14/0x34 [<00000000228dd43a>] bch2_fs_btree_key_cache_init+0x88/0x90 [<0000000089e6783c>] bch2_fs_alloc+0x7c0/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 unreferenced object 0xffff000206785500 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.096s) hex dump (first 32 bytes): 00 00 20 2b 02 00 ff ff 01 00 00 00 01 04 00 00 .. +............ 01 04 00 00 01 04 00 00 01 04 00 00 01 04 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<00000000fc134979>] bch2_fs_btree_iter_init+0x98/0x130 [<00000000addf57f5>] bch2_fs_alloc+0x7d0/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 unreferenced object 0xffff000206785480 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.096s) hex dump (first 32 bytes): 00 00 97 05 02 00 ff ff 01 00 00 00 01 04 00 00 ................ 01 04 00 00 01 04 00 00 01 04 00 00 01 04 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000004d03e2b7>] bch2_fs_btree_iter_init+0xb8/0x130 [<00000000addf57f5>] bch2_fs_alloc+0x7d0/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 unreferenced object 0xffff000230a31a00 (size 512): comm "mount", pid 3049, jiffies 4294924391 (age 3938.096s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000009502ae7b>] kmalloc_trace+0x38/0x78 [<0000000060cbc45a>] init_srcu_struct_fields+0x38/0x284 [<00000000643a7c95>] init_srcu_struct+0x10/0x18 [<00000000c46c2041>] bch2_fs_btree_iter_init+0xc8/0x130 [<00000000addf57f5>] bch2_fs_alloc+0x7d0/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 unreferenced object 0xffff000222f14f00 (size 256): comm "mount", pid 3049, jiffies 4294924391 (age 3938.100s) hex dump (first 32 bytes): 03 00 00 00 01 00 ff ff 1a cf e0 f2 17 b2 a8 24 ...............$ cf 4a ba c3 fb 05 19 cd f6 4d f5 45 e7 e8 29 eb .J.......M.E..). backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000066405974>] kvmalloc_node+0x54/0xe4 [<00000000c83b22ef>] bch2_fs_buckets_waiting_for_journal_init+0x44/0x6c [<0000000026230712>] bch2_fs_alloc+0x7f0/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 [<00000000b4ee996a>] el0_svc+0x74/0x9c unreferenced object 0xffff000230e00000 (size 720896): comm "mount", pid 3049, jiffies 4294924391 (age 3938.100s) hex dump (first 32 bytes): 40 71 26 38 00 00 00 00 00 00 00 00 00 00 00 00 @q&8............ d2 17 f9 2f 75 7e 51 2a 01 01 00 00 14 00 00 00 .../u~Q*........ backtrace: [<00000000c6d9e620>] __kmalloc_large_node+0x134/0x164 [<000000009024f86b>] __kmalloc_node+0x34/0xd4 [<0000000066405974>] kvmalloc_node+0x54/0xe4 [<00000000729eb36b>] bch2_fs_btree_write_buffer_init+0x58/0xb4 [<000000003e35ba10>] bch2_fs_alloc+0x800/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 [<00000000b4ee996a>] el0_svc+0x74/0x9c [<00000000a22b66b5>] el0t_64_sync_handler+0xa8/0x134 unreferenced object 0xffff000230900000 (size 720896): comm "mount", pid 3049, jiffies 4294924391 (age 3938.100s) hex dump (first 32 bytes): 88 96 28 f7 00 00 00 00 00 00 00 00 00 00 00 00 ..(............. d2 17 f9 2f 75 7e 51 2a 01 01 00 00 13 00 00 00 .../u~Q*........ backtrace: [<00000000c6d9e620>] __kmalloc_large_node+0x134/0x164 [<000000009024f86b>] __kmalloc_node+0x34/0xd4 [<0000000066405974>] kvmalloc_node+0x54/0xe4 [<00000000f27707f5>] bch2_fs_btree_write_buffer_init+0x7c/0xb4 [<000000003e35ba10>] bch2_fs_alloc+0x800/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 [<00000000b4ee996a>] el0_svc+0x74/0x9c [<00000000a22b66b5>] el0t_64_sync_handler+0xa8/0x134 unreferenced object 0xffff0000c8d1e300 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.108s) hex dump (first 32 bytes): 00 c0 0a 02 02 00 ff ff 00 80 5a 20 00 80 ff ff ..........Z .... 00 50 00 00 00 00 00 00 02 00 00 00 00 00 00 00 .P.............. backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<000000004a1ea042>] bch2_fs_io_init+0x2c/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff0002020ac000 (size 448): comm "mount", pid 3049, jiffies 4294924391 (age 3938.108s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 c8 02 00 02 02 00 ff ff ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<00000000af89e1a3>] mempool_alloc_slab+0x24/0x2c [<000000002d6118f3>] mempool_init_node+0x94/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<000000004a1ea042>] bch2_fs_io_init+0x2c/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff0000c8d1e500 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.108s) hex dump (first 32 bytes): 00 40 e4 c9 00 00 ff ff c0 d9 9a 03 00 fc ff ff .@.............. 80 d9 9a 03 00 fc ff ff 40 d9 9a 03 00 fc ff ff ........@....... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000002f5588b4>] biovec_init_pool+0x24/0x2c [<00000000a2b87494>] bioset_init+0x208/0x22c [<000000004a1ea042>] bch2_fs_io_init+0x2c/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 unreferenced object 0xffff0000c8d1e900 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.116s) hex dump (first 32 bytes): 00 c2 0a 02 02 00 ff ff 00 00 58 20 00 80 ff ff ..........X .... 00 50 00 00 00 00 00 00 02 00 00 00 00 00 00 00 .P.............. backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<000000007af2eb34>] bch2_fs_io_init+0x48/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff0002020ac200 (size 448): comm "mount", pid 3049, jiffies 4294924391 (age 3938.116s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 0d 69 37 bf .............i7. 00 00 00 00 00 00 00 00 c8 c2 0a 02 02 00 ff ff ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<00000000af89e1a3>] mempool_alloc_slab+0x24/0x2c [<000000002d6118f3>] mempool_init_node+0x94/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<000000007af2eb34>] bch2_fs_io_init+0x48/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff0000c8d1e980 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.116s) hex dump (first 32 bytes): 00 50 e4 c9 00 00 ff ff c0 dc 9a 03 00 fc ff ff .P.............. 80 dc 9a 03 00 fc ff ff 40 44 23 03 00 fc ff ff ........@D#..... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000002f5588b4>] biovec_init_pool+0x24/0x2c [<00000000a2b87494>] bioset_init+0x208/0x22c [<000000007af2eb34>] bch2_fs_io_init+0x48/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 unreferenced object 0xffff000230a31e00 (size 512): comm "mount", pid 3049, jiffies 4294924391 (age 3938.120s) hex dump (first 32 bytes): 00 9f 39 08 00 fc ff ff 40 f9 99 08 00 fc ff ff ..9.....@....... 40 c0 8b 08 00 fc ff ff 00 d8 14 08 00 fc ff ff @............... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000009f58f780>] bch2_fs_io_init+0x9c/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 unreferenced object 0xffff000200f2e800 (size 1024): comm "mount", pid 3049, jiffies 4294924391 (age 3938.120s) hex dump (first 32 bytes): 40 00 00 00 00 00 00 00 89 16 1e cd 00 00 00 00 @............... 10 e8 f2 00 02 00 ff ff 10 e8 f2 00 02 00 ff ff ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000066405974>] kvmalloc_node+0x54/0xe4 [<00000000a51f16c9>] bucket_table_alloc.isra.0+0x44/0x120 [<0000000000df2e94>] rhashtable_init+0x148/0x1ac [<00000000347789c6>] bch2_fs_io_init+0xb8/0x124 [<000000005ef642fb>] bch2_fs_alloc+0x820/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff000222f14700 (size 256): comm "mount", pid 3049, jiffies 4294924391 (age 3938.120s) hex dump (first 32 bytes): 68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 h............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<000000003a6af69a>] crypto_alloc_tfmmem+0x3c/0x70 [<000000006c0841c0>] crypto_create_tfm_node+0x20/0xa0 [<00000000b0aa6a0f>] crypto_alloc_tfm_node+0x94/0xac [<00000000a2421d04>] crypto_alloc_shash+0x20/0x28 [<00000000aeafee8e>] bch2_fs_encryption_init+0x64/0x150 [<0000000002e060b3>] bch2_fs_alloc+0x840/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 unreferenced object 0xffff00020e544100 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.128s) hex dump (first 32 bytes): 00 00 f0 20 02 00 ff ff 80 04 f0 20 02 00 ff ff ... ....... .... 00 09 f0 20 02 00 ff ff 80 0d f0 20 02 00 ff ff ... ....... .... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<00000000ad63d07f>] bch2_fs_fsio_init+0x8c/0x130 [<00000000048cf3b9>] bch2_fs_alloc+0x870/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff000220f00000 (size 1104): comm "mount", pid 3049, jiffies 4294924391 (age 3938.128s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 98 e7 87 30 02 00 ff ff ...........0.... 22 01 00 00 00 00 ad de 18 00 f0 20 02 00 ff ff ".......... .... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<00000000af89e1a3>] mempool_alloc_slab+0x24/0x2c [<000000002d6118f3>] mempool_init_node+0x94/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<00000000ad63d07f>] bch2_fs_fsio_init+0x8c/0x130 [<00000000048cf3b9>] bch2_fs_alloc+0x870/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff000220f00480 (size 1104): comm "mount", pid 3049, jiffies 4294924391 (age 3938.128s) hex dump (first 32 bytes): 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 01 00 00 00 00 00 00 00 00 00 00 00 9d a2 98 2c ..............., backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<00000000af89e1a3>] mempool_alloc_slab+0x24/0x2c [<000000002d6118f3>] mempool_init_node+0x94/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<00000000ad63d07f>] bch2_fs_fsio_init+0x8c/0x130 [<00000000048cf3b9>] bch2_fs_alloc+0x870/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff000220f00900 (size 1104): comm "mount", pid 3049, jiffies 4294924391 (age 3938.132s) hex dump (first 32 bytes): 22 01 00 00 00 00 ad de 08 09 f0 20 02 00 ff ff ".......... .... 08 09 f0 20 02 00 ff ff b9 17 f0 20 02 00 ff ff ... ....... .... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<00000000af89e1a3>] mempool_alloc_slab+0x24/0x2c [<000000002d6118f3>] mempool_init_node+0x94/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<00000000ad63d07f>] bch2_fs_fsio_init+0x8c/0x130 [<00000000048cf3b9>] bch2_fs_alloc+0x870/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff000220f00d80 (size 1104): comm "mount", pid 3049, jiffies 4294924391 (age 3938.132s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 34 43 3f b1 ............4C?. 00 00 00 00 00 00 00 00 24 00 bb 04 02 28 1e 3b ........$....(.; backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<00000000af89e1a3>] mempool_alloc_slab+0x24/0x2c [<000000002d6118f3>] mempool_init_node+0x94/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000001719fe70>] bioset_init+0x188/0x22c [<00000000ad63d07f>] bch2_fs_fsio_init+0x8c/0x130 [<00000000048cf3b9>] bch2_fs_alloc+0x870/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 unreferenced object 0xffff00020e544000 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.132s) hex dump (first 32 bytes): 00 00 b5 05 02 00 ff ff 00 50 b5 05 02 00 ff ff .........P...... 00 10 b5 05 02 00 ff ff 00 b0 18 09 02 00 ff ff ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000007b360995>] __kmalloc_node+0xac/0xd4 [<0000000050ae8904>] mempool_init_node+0x64/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000002f5588b4>] biovec_init_pool+0x24/0x2c [<00000000a2b87494>] bioset_init+0x208/0x22c [<00000000ad63d07f>] bch2_fs_fsio_init+0x8c/0x130 [<00000000048cf3b9>] bch2_fs_alloc+0x870/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 unreferenced object 0xffff00020918b000 (size 4096): comm "mount", pid 3049, jiffies 4294924391 (age 3938.140s) hex dump (first 32 bytes): c0 5b 26 03 00 fc ff ff 00 10 00 00 00 00 00 00 .[&............. 22 01 00 00 00 00 ad de 18 b0 18 09 02 00 ff ff "............... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<00000000af89e1a3>] mempool_alloc_slab+0x24/0x2c [<000000002d6118f3>] mempool_init_node+0x94/0xd8 [<00000000e714c59a>] mempool_init+0x14/0x1c [<000000002f5588b4>] biovec_init_pool+0x24/0x2c [<00000000a2b87494>] bioset_init+0x208/0x22c [<00000000ad63d07f>] bch2_fs_fsio_init+0x8c/0x130 [<00000000048cf3b9>] bch2_fs_alloc+0x870/0xbcc [<00000000223e06bf>] bch2_fs_open+0x19c/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 unreferenced object 0xffff000200f2f400 (size 1024): comm "mount", pid 3049, jiffies 4294924391 (age 3938.140s) hex dump (first 32 bytes): 19 00 00 00 00 00 00 00 9d 19 00 00 00 00 00 00 ................ a6 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<0000000097d0e280>] bch2_blacklist_table_initialize+0x48/0xc4 [<000000007af2f7c0>] bch2_fs_recovery+0x220/0x140c [<00000000835fe5c8>] bch2_fs_start+0x104/0x2ac [<00000000f2c8e79f>] bch2_fs_open+0x2cc/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 [<00000000f493e836>] __arm64_sys_mount+0x150/0x168 [<00000000595788f9>] invoke_syscall.constprop.0+0x70/0xb8 [<00000000e707b03d>] do_el0_svc+0xbc/0xf0 [<00000000b4ee996a>] el0_svc+0x74/0x9c unreferenced object 0xffff00020e544800 (size 128): comm "mount", pid 3049, jiffies 4294924391 (age 3938.140s) hex dump (first 32 bytes): 07 00 00 01 09 00 00 00 73 74 61 72 74 69 6e 67 ........starting 20 6a 6f 75 72 6e 61 6c 20 61 74 20 65 6e 74 72 journal at entr backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000005602d414>] __kmalloc_node_track_caller+0xa8/0xd0 [<0000000078a13296>] krealloc+0x7c/0xc4 [<00000000224f82f4>] __darray_make_room.constprop.0+0x5c/0x7c [<00000000caa2f6f2>] __bch2_trans_log_msg+0x80/0x12c [<0000000034a8dfea>] __bch2_fs_log_msg+0x68/0x158 [<00000000cc0719ad>] bch2_journal_log_msg+0x60/0x98 [<00000000a0b3d87b>] bch2_fs_recovery+0x8f0/0x140c [<00000000835fe5c8>] bch2_fs_start+0x104/0x2ac [<00000000f2c8e79f>] bch2_fs_open+0x2cc/0x430 [<00000000e72d508e>] bch2_mount+0x194/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 unreferenced object 0xffff00020f2d8398 (size 184): comm "mount", pid 3049, jiffies 4294924395 (age 3938.128s) hex dump (first 32 bytes): 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<0000000059ea6346>] bch2_btree_path_traverse_cached_slowpath+0x240/0x9d0 [<00000000b340fce9>] bch2_btree_path_traverse_cached+0x7c/0x184 [<000000006b501914>] bch2_btree_path_traverse_one+0xbc/0x4f0 [<0000000046611bb8>] bch2_btree_path_traverse+0x20/0x30 [<00000000cb7378ca>] bch2_btree_iter_peek_slot+0xe4/0x3b0 [<000000005b36d96f>] __bch2_bkey_get_iter.constprop.0+0x40/0x74 [<00000000db6c00c7>] bch2_inode_peek+0x80/0xfc [<00000000d48fafeb>] bch2_inode_find_by_inum_trans+0x34/0x74 [<00000000d94a8ca3>] bch2_vfs_inode_get+0xdc/0x1a0 [<00000000b7cffdf2>] bch2_mount+0x3bc/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 [<00000000527b4561>] path_mount+0x5d0/0x6c8 [<00000000dc643d96>] do_mount+0x80/0xa4 unreferenced object 0xffff000222f15e00 (size 256): comm "mount", pid 3049, jiffies 4294924395 (age 3938.128s) hex dump (first 32 bytes): 12 81 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 ff ff ff ff 00 10 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<0000000080dcf5d4>] btree_key_cache_fill+0x190/0x338 [<00000000142a161b>] bch2_btree_path_traverse_cached_slowpath+0x8d8/0x9d0 [<00000000b340fce9>] bch2_btree_path_traverse_cached+0x7c/0x184 [<000000006b501914>] bch2_btree_path_traverse_one+0xbc/0x4f0 [<0000000046611bb8>] bch2_btree_path_traverse+0x20/0x30 [<00000000cb7378ca>] bch2_btree_iter_peek_slot+0xe4/0x3b0 [<000000005b36d96f>] __bch2_bkey_get_iter.constprop.0+0x40/0x74 [<00000000db6c00c7>] bch2_inode_peek+0x80/0xfc [<00000000d48fafeb>] bch2_inode_find_by_inum_trans+0x34/0x74 [<00000000d94a8ca3>] bch2_vfs_inode_get+0xdc/0x1a0 [<00000000b7cffdf2>] bch2_mount+0x3bc/0x45c [<00000000b040daa5>] legacy_get_tree+0x2c/0x54 [<00000000ba80f9a0>] vfs_get_tree+0x28/0xd4 unreferenced object 0xffff00020ab0da80 (size 128): comm "fio", pid 3068, jiffies 4294924399 (age 3938.112s) hex dump (first 32 bytes): 70 61 74 68 3a 20 69 64 78 20 20 30 20 72 65 66 path: idx 0 ref 20 30 3a 30 20 50 20 53 20 62 74 72 65 65 3d 73 0:0 P S btree=s backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000005602d414>] __kmalloc_node_track_caller+0xa8/0xd0 [<0000000078a13296>] krealloc+0x7c/0xc4 [<00000000ac6de278>] bch2_printbuf_make_room+0x6c/0x9c [<00000000e73dab89>] bch2_prt_printf+0xac/0x104 [<00000000ef2c8dc5>] bch2_btree_path_to_text+0x6c/0xb8 [<00000000eab3e43c>] __bch2_trans_paths_to_text+0x60/0x64 [<00000000d843d03a>] bch2_trans_paths_to_text+0x10/0x18 [<00000000fbe77c9c>] bch2_trans_update_max_paths+0x6c/0x104 [<00000000715f184d>] btree_path_alloc+0x44/0x140 [<0000000028aac82e>] bch2_path_get+0x190/0x210 [<000000001fbd1416>] bch2_trans_iter_init_outlined+0xd4/0x100 [<00000000b7c2c8e8>] bch2_trans_iter_init.constprop.0+0x28/0x30 [<000000005ee45b0d>] __bch2_dirent_lookup_trans+0xc4/0x20c [<00000000bf9849b2>] bch2_dirent_lookup+0x9c/0x10c unreferenced object 0xffff00020f2d8450 (size 184): comm "fio", pid 3068, jiffies 4294924400 (age 3938.112s) hex dump (first 32 bytes): 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000047719e9d>] kmem_cache_alloc+0xd0/0x17c [<0000000059ea6346>] bch2_btree_path_traverse_cached_slowpath+0x240/0x9d0 [<00000000b340fce9>] bch2_btree_path_traverse_cached+0x7c/0x184 [<000000006b501914>] bch2_btree_path_traverse_one+0xbc/0x4f0 [<0000000046611bb8>] bch2_btree_path_traverse+0x20/0x30 [<00000000cb7378ca>] bch2_btree_iter_peek_slot+0xe4/0x3b0 [<000000005b36d96f>] __bch2_bkey_get_iter.constprop.0+0x40/0x74 [<00000000db6c00c7>] bch2_inode_peek+0x80/0xfc [<00000000d48fafeb>] bch2_inode_find_by_inum_trans+0x34/0x74 [<00000000d94a8ca3>] bch2_vfs_inode_get+0xdc/0x1a0 [<00000000225a6085>] bch2_lookup+0x7c/0xb8 [<0000000059304a98>] __lookup_slow+0xd4/0x114 [<000000001225c82d>] walk_component+0x98/0xd4 [<0000000095114e46>] path_lookupat+0x84/0x114 [<000000002ee74fa2>] filename_lookup+0x54/0xc4 unreferenced object 0xffff000222f15a00 (size 256): comm "fio", pid 3068, jiffies 4294924400 (age 3938.112s) hex dump (first 32 bytes): 13 81 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 ff ff ff ff f3 15 00 30 00 00 00 00 ...........0.... backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<00000000cd9515c0>] __kmalloc+0xac/0xd4 [<0000000080dcf5d4>] btree_key_cache_fill+0x190/0x338 [<00000000142a161b>] bch2_btree_path_traverse_cached_slowpath+0x8d8/0x9d0 [<00000000b340fce9>] bch2_btree_path_traverse_cached+0x7c/0x184 [<000000006b501914>] bch2_btree_path_traverse_one+0xbc/0x4f0 [<0000000046611bb8>] bch2_btree_path_traverse+0x20/0x30 [<00000000cb7378ca>] bch2_btree_iter_peek_slot+0xe4/0x3b0 [<000000005b36d96f>] __bch2_bkey_get_iter.constprop.0+0x40/0x74 [<00000000db6c00c7>] bch2_inode_peek+0x80/0xfc [<00000000d48fafeb>] bch2_inode_find_by_inum_trans+0x34/0x74 [<00000000d94a8ca3>] bch2_vfs_inode_get+0xdc/0x1a0 [<00000000225a6085>] bch2_lookup+0x7c/0xb8 [<0000000059304a98>] __lookup_slow+0xd4/0x114 [<000000001225c82d>] walk_component+0x98/0xd4 unreferenced object 0xffff0002058e0e00 (size 256): comm "fio", pid 3081, jiffies 4294924461 (age 3937.868s) hex dump (first 32 bytes): 70 61 74 68 3a 20 69 64 78 20 20 31 20 72 65 66 path: idx 1 ref 20 30 3a 30 20 50 20 20 20 62 74 72 65 65 3d 65 0:0 P btree=e backtrace: [<00000000bcb1cd8d>] slab_post_alloc_hook.isra.0+0xb4/0xbc [<0000000027d98280>] __kmem_cache_alloc_node+0xd0/0x178 [<000000005602d414>] __kmalloc_node_track_caller+0xa8/0xd0 [<0000000078a13296>] krealloc+0x7c/0xc4 [<00000000ac6de278>] bch2_printbuf_make_room+0x6c/0x9c [<00000000e73dab89>] bch2_prt_printf+0xac/0x104 [<00000000ef2c8dc5>] bch2_btree_path_to_text+0x6c/0xb8 [<00000000eab3e43c>] __bch2_trans_paths_to_text+0x60/0x64 [<00000000d843d03a>] bch2_trans_paths_to_text+0x10/0x18 [<00000000fbe77c9c>] bch2_trans_update_max_paths+0x6c/0x104 [<00000000af279ad9>] __bch2_btree_path_make_mut+0x64/0x1d0 [<00000000b6ea382b>] __bch2_btree_path_set_pos+0x5c/0x1f4 [<000000001f2292b9>] bch2_btree_path_set_pos+0x68/0x78 [<0000000046402275>] bch2_btree_iter_peek_slot+0xd0/0x3b0 [<00000000a578d851>] bchfs_read.isra.0+0x128/0x77c [<00000000d544d588>] bch2_readahead+0x1a0/0x264 -- Jens Axboe