Traces and soft lockup following unmount with 6.11.0-rc3
Julian Wollrath
jwollrath at web.de
Thu Aug 15 00:08:45 PDT 2024
Dear maintainer.
using the afs.mount service file from the kafs-client package, I tried
to unmount all current AFS mounts under 6.11.0-rc3. This did not
succeed but I got the traces below.
Best regards,
Julian Wollrath
systemd[1]: Unmounting afs.mount - kAFS Dynamic Root mount...
systemd[1]: afs.mount: Deactivated successfully.
systemd[1]: Unmounted afs.mount - kAFS Dynamic Root mount.
kernel: BUG: kernel NULL pointer dereference, address: 00000000000000a0
kernel: #PF: supervisor read access in kernel mode
kernel: #PF: error_code(0x0000) - not-present page
kernel: PGD 0 P4D 0
kernel: Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
kernel: CPU: 10 UID: 0 PID: 118706 Comm: kworker/10:2 Tainted: G W 6.11.0-rc3 #10
kernel: Tainted: [W]=WARN
kernel: Hardware name: LENOVO 21K4S07400/21K4S07400, BIOS R2FET57W (1.37 ) 05/20/2024
kernel: Workqueue: afs SRXAFSCB_CallBack [kafs]
kernel: RIP: 0010:afs_break_callbacks+0x276/0x3e0 [kafs]
kernel: Code: 00 48 89 ee 4c 89 4c 24 08 e8 b6 11 01 00 4c 8b 4c 24 08 65 ff 0d 02 3e 14 3e 0f 85 33 ff ff ff e8 bf f0 91 c3 e9 29 ff ff ff <4c> 8b b3 a0 00 00 00 48 8d ab 20 01 00 00 48 89 ef e8 e4 07 2c c4
kernel: RSP: 0018:ffffb5bc6491fdf8 EFLAGS: 00010246
kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000002
kernel: RDX: ffffa0926c784140 RSI: 0000000000000001 RDI: ffffa09087b53900
kernel: RBP: ffffa0926857b4e0 R08: 000000000000000c R09: ffffa0926857b4e0
kernel: R10: 0000000000000004 R11: 0000000000000004 R12: 0000000000000001
kernel: R13: ffffa0926857b4e0 R14: 000000002003644e R15: ffffa09084bc3800
kernel: FS: 0000000000000000(0000) GS:ffffa097bee80000(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 00000000000000a0 CR3: 00000005f3410000 CR4: 0000000000750ef0
kernel: PKRU: 55555554
kernel: Call Trace:
kernel: <TASK>
kernel: ? __die_body.cold+0x19/0x27
kernel: ? page_fault_oops+0xca/0x280
kernel: ? rxrpc_recvmsg_data+0x214/0x670 [rxrpc]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? kmem_cache_free+0x346/0x390
kernel: ? exc_page_fault+0x71/0x130
kernel: ? asm_exc_page_fault+0x26/0x30
kernel: ? afs_break_callbacks+0x276/0x3e0 [kafs]
kernel: ? afs_break_callbacks+0x3c/0x3e0 [kafs]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: SRXAFSCB_CallBack+0x38/0xa0 [kafs]
kernel: process_one_work+0x168/0x300
kernel: worker_thread+0x31a/0x460
kernel: ? flush_rcu_work+0x40/0x40
kernel: kthread+0xcf/0x100
kernel: ? kthread_park+0x90/0x90
kernel: ret_from_fork+0x31/0x50
kernel: ? kthread_park+0x90/0x90
kernel: ret_from_fork_asm+0x11/0x20
kernel: </TASK>
kernel: CR2: 00000000000000a0
kernel: ---[ end trace 0000000000000000 ]---
kernel: BUG: unable to handle page fault for address: fffffffed646a9b8
kernel: #PF: supervisor instruction fetch in kernel mode
kernel: #PF: error_code(0x0010) - not-present page
kernel: PGD 5f3b33067 P4D 5f3b33067 PUD 5f3b2f063 PMD 100323063 PTE 0
kernel: Oops: Oops: 0010 [#2] PREEMPT SMP NOPTI
kernel: CPU: 10 UID: 0 PID: 118706 Comm: kworker/10:2 Tainted: G D W 6.11.0-rc3 #10
kernel: Tainted: [D]=DIE, [W]=WARN
kernel: Hardware name: LENOVO 21K4S07400/21K4S07400, BIOS R2FET57W (1.37 ) 05/20/2024
kernel: Workqueue: afs SRXAFSCB_CallBack [kafs]
kernel: RIP: 0010:0xfffffffed646a9b8
kernel: Code: Unable to access opcode bytes at 0xfffffffed646a98e.
kernel: RSP: 0018:ffffb5bc6491f8e8 EFLAGS: 00010086
kernel: RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000000007
kernel: RDX: ffffb5bc6491f998 RSI: 0000000000000007 RDI: fffffffed646a9b8
kernel: RBP: ffffb5bc6491f920 R08: ffffb5bc6491f9a0 R09: ffffb5bc6491f9a8
kernel: R10: abcc77118461cefd R11: 0000000000000000 R12: ffffb5bc6491f9a0
kernel: R13: ffffb5bc6491f9a8 R14: 0000000000000000 R15: 0000000000000046
kernel: FS: 0000000000000000(0000) GS:ffffa097bee80000(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: fffffffed646a98e CR3: 00000001001d6000 CR4: 0000000000750ef0
kernel: PKRU: 55555554
kernel: Call Trace:
kernel: <TASK>
kernel: ? __die_body.cold+0x19/0x27
kernel: ? page_fault_oops+0xca/0x280
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? exc_page_fault+0x127/0x130
kernel: ? asm_exc_page_fault+0x26/0x30
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? __efi_call+0x29/0x40
kernel: virt_efi_query_variable_info_nb+0x8d/0xd0
kernel: efi_query_variable_store+0x1c3/0x210
kernel: ? vsnprintf+0x93/0x6e0
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: efivar_set_variable_locked+0xa2/0xf0
kernel: efi_pstore_write+0x154/0x1a0 [efi_pstore]
kernel: ? pstore_dump+0x106/0x320
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: pstore_dump+0x106/0x320
kernel: kmsg_dump+0x50/0x70
kernel: oops_end+0x6a/0xc0
kernel: page_fault_oops.cold+0x12f/0x2fa
kernel: ? rxrpc_recvmsg_data+0x214/0x670 [rxrpc]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? kmem_cache_free+0x346/0x390
kernel: exc_page_fault+0x71/0x130
kernel: asm_exc_page_fault+0x26/0x30
kernel: RIP: 0010:afs_break_callbacks+0x276/0x3e0 [kafs]
kernel: Code: 00 48 89 ee 4c 89 4c 24 08 e8 b6 11 01 00 4c 8b 4c 24 08 65 ff 0d 02 3e 14 3e 0f 85 33 ff ff ff e8 bf f0 91 c3 e9 29 ff ff ff <4c> 8b b3 a0 00 00 00 48 8d ab 20 01 00 00 48 89 ef e8 e4 07 2c c4
kernel: RSP: 0018:ffffb5bc6491fdf8 EFLAGS: 00010246
kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000002
kernel: RDX: ffffa0926c784140 RSI: 0000000000000001 RDI: ffffa09087b53900
kernel: RBP: ffffa0926857b4e0 R08: 000000000000000c R09: ffffa0926857b4e0
kernel: R10: 0000000000000004 R11: 0000000000000004 R12: 0000000000000001
kernel: R13: ffffa0926857b4e0 R14: 000000002003644e R15: ffffa09084bc3800
kernel: ? afs_break_callbacks+0x3c/0x3e0 [kafs]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: SRXAFSCB_CallBack+0x38/0xa0 [kafs]
kernel: process_one_work+0x168/0x300
kernel: worker_thread+0x31a/0x460
kernel: ? flush_rcu_work+0x40/0x40
kernel: kthread+0xcf/0x100
kernel: ? kthread_park+0x90/0x90
kernel: ret_from_fork+0x31/0x50
kernel: ? kthread_park+0x90/0x90
kernel: ret_from_fork_asm+0x11/0x20
kernel: </TASK>
kernel: CR2: fffffffed646a9b8
kernel: ---[ end trace 0000000000000000 ]---
kernel: rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
kernel: rcu: 10-...0: (12 ticks this GP) idle=4784/1/0x4000000000000000 softirq=1324740/1324740 fqs=701
kernel: rcu: (detected by 0, t=6302 jiffies, g=2858341, q=694 ncpus=16)
kernel: Sending NMI from CPU 0 to CPUs 10:
kernel: NMI backtrace for cpu 10
kernel: CPU: 10 UID: 0 PID: 118706 Comm: kworker/10:2 Tainted: G D W 6.11.0-rc3 #10
kernel: Tainted: [D]=DIE, [W]=WARN
kernel: Hardware name: LENOVO 21K4S07400/21K4S07400, BIOS R2FET57W (1.37 ) 05/20/2024
kernel: Workqueue: afs SRXAFSCB_CallBack [kafs]
kernel: RIP: 0010:queued_spin_lock_slowpath+0x51/0x270
kernel: Code: 0f 92 c2 8b 03 0f b6 d2 c1 e2 08 30 e4 09 d0 3d ff 00 00 00 0f 87 b7 01 00 00 85 c0 74 10 0f b6 03 84 c0 74 09 f3 90 0f b6 03 <84> c0 75 f7 b8 01 00 00 00 66 89 03 5b 5d 41 5c 41 5d e9 a3 99 15
kernel: RSP: 0018:ffffb5bc6491f638 EFLAGS: 00000002
kernel: RAX: 0000000000000001 RBX: ffffffffc0661010 RCX: 0000000000000027
kernel: RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffffc0661010
kernel: RBP: 0000000000000002 R08: 0000000000000000 R09: ffffb5bc6491f610
kernel: R10: ffffffff868eaa28 R11: 0000000000000003 R12: 0000000000000002
kernel: R13: ffffa0926c784140 R14: 0000000000000046 R15: 0000000000000000
kernel: FS: 0000000000000000(0000) GS:ffffa097bee80000(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: fffffffed646a98e CR3: 00000001001d6000 CR4: 0000000000750ef0
kernel: PKRU: 55555554
kernel: Call Trace:
kernel: <NMI>
kernel: ? nmi_cpu_backtrace.cold+0x32/0x63
kernel: ? nmi_cpu_backtrace_handler+0x11/0x20
kernel: ? nmi_handle+0x5e/0x120
kernel: ? default_do_nmi+0x40/0x130
kernel: ? exc_nmi+0x103/0x180
kernel: ? end_repeat_nmi+0xf/0x41
kernel: ? queued_spin_lock_slowpath+0x51/0x270
kernel: ? queued_spin_lock_slowpath+0x51/0x270
kernel: ? queued_spin_lock_slowpath+0x51/0x270
kernel: </NMI>
kernel: <TASK>
kernel: _raw_spin_lock_irqsave+0x31/0x40
kernel: pstore_dump+0x7d/0x320
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? console_unlock+0x54/0xe0
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? vprintk_emit+0x13f/0x220
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? _printk+0x6c/0x87
kernel: kmsg_dump+0x50/0x70
kernel: oops_end+0x6a/0xc0
kernel: page_fault_oops.cold+0x12f/0x2fa
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: exc_page_fault+0x127/0x130
kernel: asm_exc_page_fault+0x26/0x30
kernel: RIP: 0010:0xfffffffed646a9b8
kernel: Code: Unable to access opcode bytes at 0xfffffffed646a98e.
kernel: RSP: 0018:ffffb5bc6491f8e8 EFLAGS: 00010086
kernel: RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000000007
kernel: RDX: ffffb5bc6491f998 RSI: 0000000000000007 RDI: fffffffed646a9b8
kernel: RBP: ffffb5bc6491f920 R08: ffffb5bc6491f9a0 R09: ffffb5bc6491f9a8
kernel: R10: abcc77118461cefd R11: 0000000000000000 R12: ffffb5bc6491f9a0
kernel: R13: ffffb5bc6491f9a8 R14: 0000000000000000 R15: 0000000000000046
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? __efi_call+0x29/0x40
kernel: ? virt_efi_query_variable_info_nb+0x8d/0xd0
kernel: ? efi_query_variable_store+0x1c3/0x210
kernel: ? vsnprintf+0x93/0x6e0
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? efivar_set_variable_locked+0xa2/0xf0
kernel: ? efi_pstore_write+0x154/0x1a0 [efi_pstore]
kernel: ? pstore_dump+0x106/0x320
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? pstore_dump+0x106/0x320
kernel: ? kmsg_dump+0x50/0x70
kernel: ? oops_end+0x6a/0xc0
kernel: ? page_fault_oops.cold+0x12f/0x2fa
kernel: ? rxrpc_recvmsg_data+0x214/0x670 [rxrpc]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? kmem_cache_free+0x346/0x390
kernel: ? exc_page_fault+0x71/0x130
kernel: ? asm_exc_page_fault+0x26/0x30
kernel: ? afs_break_callbacks+0x276/0x3e0 [kafs]
kernel: ? afs_break_callbacks+0x3c/0x3e0 [kafs]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? SRXAFSCB_CallBack+0x38/0xa0 [kafs]
kernel: ? process_one_work+0x168/0x300
kernel: ? worker_thread+0x31a/0x460
kernel: ? flush_rcu_work+0x40/0x40
kernel: ? kthread+0xcf/0x100
kernel: ? kthread_park+0x90/0x90
kernel: ? ret_from_fork+0x31/0x50
kernel: ? kthread_park+0x90/0x90
kernel: ? ret_from_fork_asm+0x11/0x20
kernel: </TASK>
kernel: watchdog: BUG: soft lockup - CPU#12 stuck for 23s! [rcu_exp_gp_kthr:19]
kernel: CPU: 12 UID: 0 PID: 19 Comm: rcu_exp_gp_kthr Tainted: G D W 6.11.0-rc3 #10
kernel: Tainted: [D]=DIE, [W]=WARN
kernel: Hardware name: LENOVO 21K4S07400/21K4S07400, BIOS R2FET57W (1.37 ) 05/20/2024
kernel: RIP: 0010:smp_call_function_single+0xe8/0x140
kernel: Code: 2b 14 25 28 00 00 00 75 66 c9 e9 1e 4a 9c 00 65 48 8b 05 03 93 6d 7a 48 8d b0 00 fa 02 00 8b 46 08 a8 01 74 09 f3 90 8b 46 08 <a8> 01 75 f7 83 4e 08 01 4c 89 46 10 48 89 56 18 e8 e3 fd ff ff eb
kernel: RSP: 0018:ffffb5bc401c7de0 EFLAGS: 00000202
kernel: RAX: 0000000000000001 RBX: 000000000000000e RCX: 0000000000000000
kernel: RDX: 0000000000000000 RSI: ffffa097bef2fa00 RDI: 000000000000000e
kernel: RBP: ffffb5bc401c7e28 R08: ffffffff85907510 R09: 0000000000000001
kernel: R10: 0000000000000001 R11: 0000000000000292 R12: ffffa097befaf7c0
kernel: R13: 000000000002a4e0 R14: 0000000000003bf6 R15: ffffffff8691ce70
kernel: FS: 0000000000000000(0000) GS:ffffa097bef00000(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 00007fc3ed221098 CR3: 00000005f3410000 CR4: 0000000000750ef0
kernel: PKRU: 55555554
kernel: Call Trace:
kernel: <IRQ>
kernel: ? watchdog_timer_fn.cold+0x3d/0x9c
kernel: ? softlockup_fn+0x50/0x50
kernel: ? __hrtimer_run_queues+0x12f/0x2a0
kernel: ? hrtimer_interrupt+0xfa/0x210
kernel: ? __sysvec_apic_timer_interrupt+0x52/0x100
kernel: ? sysvec_apic_timer_interrupt+0x64/0x80
kernel: </IRQ>
kernel: <TASK>
kernel: ? asm_sysvec_apic_timer_interrupt+0x1a/0x20
kernel: ? rcu_gp_kthread+0x170/0x170
kernel: ? smp_call_function_single+0xe8/0x140
kernel: __sync_rcu_exp_select_node_cpus+0x273/0x3a0
kernel: ? kvfree_call_rcu+0x350/0x350
kernel: sync_rcu_exp_select_cpus+0x163/0x2e0
kernel: wait_rcu_exp_gp+0x13/0x20
kernel: kthread_worker_fn+0xcc/0x200
kernel: ? kthread_stop_put+0x60/0x60
kernel: kthread+0xcf/0x100
kernel: ? kthread_park+0x90/0x90
kernel: ret_from_fork+0x31/0x50
kernel: ? kthread_park+0x90/0x90
kernel: ret_from_fork_asm+0x11/0x20
kernel: </TASK>
kernel: rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
kernel: rcu: 10-...0: (12 ticks this GP) idle=4784/1/0x4000000000000000 softirq=1324740/1324740 fqs=6859
kernel: rcu: (detected by 1, t=25207 jiffies, g=2858341, q=52278 ncpus=16)
kernel: Sending NMI from CPU 1 to CPUs 10:
kernel: NMI backtrace for cpu 10
kernel: CPU: 10 UID: 0 PID: 118706 Comm: kworker/10:2 Tainted: G D W L 6.11.0-rc3 #10
kernel: Tainted: [D]=DIE, [W]=WARN, [L]=SOFTLOCKUP
kernel: Hardware name: LENOVO 21K4S07400/21K4S07400, BIOS R2FET57W (1.37 ) 05/20/2024
kernel: Workqueue: afs SRXAFSCB_CallBack [kafs]
kernel: RIP: 0010:queued_spin_lock_slowpath+0x51/0x270
kernel: Code: 0f 92 c2 8b 03 0f b6 d2 c1 e2 08 30 e4 09 d0 3d ff 00 00 00 0f 87 b7 01 00 00 85 c0 74 10 0f b6 03 84 c0 74 09 f3 90 0f b6 03 <84> c0 75 f7 b8 01 00 00 00 66 89 03 5b 5d 41 5c 41 5d e9 a3 99 15
kernel: RSP: 0018:ffffb5bc6491f638 EFLAGS: 00000002
kernel: RAX: 0000000000000001 RBX: ffffffffc0661010 RCX: 0000000000000027
kernel: RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffffc0661010
kernel: RBP: 0000000000000002 R08: 0000000000000000 R09: ffffb5bc6491f610
kernel: R10: ffffffff868eaa28 R11: 0000000000000003 R12: 0000000000000002
kernel: R13: ffffa0926c784140 R14: 0000000000000046 R15: 0000000000000000
kernel: FS: 0000000000000000(0000) GS:ffffa097bee80000(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: fffffffed646a98e CR3: 00000001001d6000 CR4: 0000000000750ef0
kernel: PKRU: 55555554
kernel: Call Trace:
kernel: <NMI>
kernel: ? nmi_cpu_backtrace.cold+0x32/0x63
kernel: ? nmi_cpu_backtrace_handler+0x11/0x20
kernel: ? nmi_handle+0x5e/0x120
kernel: ? default_do_nmi+0x40/0x130
kernel: ? exc_nmi+0x103/0x180
kernel: ? end_repeat_nmi+0xf/0x41
kernel: ? queued_spin_lock_slowpath+0x51/0x270
kernel: ? queued_spin_lock_slowpath+0x51/0x270
kernel: ? queued_spin_lock_slowpath+0x51/0x270
kernel: </NMI>
kernel: <TASK>
kernel: _raw_spin_lock_irqsave+0x31/0x40
kernel: pstore_dump+0x7d/0x320
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? console_unlock+0x54/0xe0
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? vprintk_emit+0x13f/0x220
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? _printk+0x6c/0x87
kernel: kmsg_dump+0x50/0x70
kernel: oops_end+0x6a/0xc0
kernel: page_fault_oops.cold+0x12f/0x2fa
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: exc_page_fault+0x127/0x130
kernel: asm_exc_page_fault+0x26/0x30
kernel: RIP: 0010:0xfffffffed646a9b8
kernel: Code: Unable to access opcode bytes at 0xfffffffed646a98e.
kernel: RSP: 0018:ffffb5bc6491f8e8 EFLAGS: 00010086
kernel: RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000000007
kernel: RDX: ffffb5bc6491f998 RSI: 0000000000000007 RDI: fffffffed646a9b8
kernel: RBP: ffffb5bc6491f920 R08: ffffb5bc6491f9a0 R09: ffffb5bc6491f9a8
kernel: R10: abcc77118461cefd R11: 0000000000000000 R12: ffffb5bc6491f9a0
kernel: R13: ffffb5bc6491f9a8 R14: 0000000000000000 R15: 0000000000000046
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? __efi_call+0x29/0x40
kernel: ? virt_efi_query_variable_info_nb+0x8d/0xd0
kernel: ? efi_query_variable_store+0x1c3/0x210
kernel: ? vsnprintf+0x93/0x6e0
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? efivar_set_variable_locked+0xa2/0xf0
kernel: ? efi_pstore_write+0x154/0x1a0 [efi_pstore]
kernel: ? pstore_dump+0x106/0x320
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? pstore_dump+0x106/0x320
kernel: ? kmsg_dump+0x50/0x70
kernel: ? oops_end+0x6a/0xc0
kernel: ? page_fault_oops.cold+0x12f/0x2fa
kernel: ? rxrpc_recvmsg_data+0x214/0x670 [rxrpc]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? kmem_cache_free+0x346/0x390
kernel: ? exc_page_fault+0x71/0x130
kernel: ? asm_exc_page_fault+0x26/0x30
kernel: ? afs_break_callbacks+0x276/0x3e0 [kafs]
kernel: ? afs_break_callbacks+0x3c/0x3e0 [kafs]
kernel: ? srso_alias_return_thunk+0x5/0xfbef5
kernel: ? SRXAFSCB_CallBack+0x38/0xa0 [kafs]
kernel: ? process_one_work+0x168/0x300
kernel: ? worker_thread+0x31a/0x460
kernel: ? flush_rcu_work+0x40/0x40
kernel: ? kthread+0xcf/0x100
kernel: ? kthread_park+0x90/0x90
kernel: ? ret_from_fork+0x31/0x50
kernel: ? kthread_park+0x90/0x90
kernel: ? ret_from_fork_asm+0x11/0x20
kernel: </TASK>
--
() ascii ribbon campaign - against html e-mail
/\ - against proprietary attachments
More information about the linux-afs
mailing list