Date
June 5, 2025, 7:08 a.m.
Environment | |
---|---|
x15 |
------------[ cut here ]------------ [ 5.460083] WARNING: CPU: 0 PID: 138 at kernel/smp.c:815 smp_call_function_many_cond+0x510/0x640 [ 5.468994] Modules linked in: [ 5.472076] CPU: 0 UID: 0 PID: 138 Comm: systemd-getty-g Not tainted 6.15.0-next-20250605 #1 NONE [ 5.472106] Hardware name: Generic DRA74X (Flattened Device Tree) [ 5.472106] Call trace: [ 5.472106] unwind_backtrace from show_stack+0x18/0x1c [ 5.472137] show_stack from dump_stack_lvl+0x70/0x90 [ 5.472137] dump_stack_lvl from __warn+0x84/0x130 [ 5.472167] __warn from warn_slowpath_fmt+0x1a0/0x1a8 [ 5.472167] warn_slowpath_fmt from smp_call_function_many_cond+0x510/0x640 [ 5.472198] smp_call_function_many_cond from smp_call_function+0x34/0x3c [ 5.472198] smp_call_function from set_memory_valid+0x84/0xc0 [ 5.472229] set_memory_valid from kfence_guarded_free+0x170/0x2dc [ 5.472259] kfence_guarded_free from kmem_cache_free+0x364/0x424 [ 5.472259] kmem_cache_free from rcu_core+0x2d8/0x9fc [ 5.472290] rcu_core from handle_softirqs+0x14c/0x3d4 [ 5.472320] handle_softirqs from __irq_exit_rcu+0xa0/0x114 [ 5.472320] __irq_exit_rcu from irq_exit+0x10/0x30 [ 5.472351] irq_exit from call_with_stack+0x18/0x20 [ 5.472351] call_with_stack from __irq_svc+0x90/0xac [ 5.472381] Exception stack(0xf16e9d58 to 0xf16e9da0) [ 5.472381] 9d40: 00000000 efb66f30 [ 5.472381] 9d60: 80001869 c0439f98 efb66f30 04200000 ffefea80 00000400 00000000 00000002 [ 5.472412] 9d80: b6750000 f16e9ed8 00000000 f16e9da8 c0437568 c043756c 40040113 ffffffff [ 5.472412] __irq_svc from __sync_icache_dcache+0xb4/0xc4 [ 5.472442] __sync_icache_dcache from set_ptes+0xb4/0xb8 [ 5.472442] set_ptes from set_pte_range+0xb0/0x10c [ 5.472473] set_pte_range from filemap_map_pages+0x484/0x6bc [ 5.472503] filemap_map_pages from handle_mm_fault+0x1174/0x18dc [ 5.472503] handle_mm_fault from do_page_fault+0x250/0x538 [ 5.472534] do_page_fault from do_DataAbort+0x38/0xac [ 5.472534] do_DataAbort from __dabt_usr+0x58/0x60 [ 5.472534] Exception stack(0xf16e9fb0 to 0xf16e9ff8) [ 5.472564] 9fa0: bea35970 b6750000 0031b6cc b68e2959 [ 5.472564] 9fc0: b6752390 00000000 bea35990 bea35928 b66e0000 b675b638 00000000 b6fd18e8 [ 5.472564] 9fe0: b66eacf8 bea35918 b675b638 b6fad53a 20040030 ffffffff [ 5.472564] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------ [ 4.856842] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x588/0x614 [ 4.865509] Modules linked in: [ 4.868591] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.15.0-next-20250605 #1 NONE [ 4.868591] Hardware name: Generic DRA74X (Flattened Device Tree) [ 4.868591] Call trace: [ 4.868591] unwind_backtrace from show_stack+0x10/0x14 [ 4.868621] show_stack from dump_stack_lvl+0x54/0x68 [ 4.868621] dump_stack_lvl from __warn+0x7c/0x128 [ 4.868652] __warn from warn_slowpath_fmt+0x184/0x18c [ 4.868652] warn_slowpath_fmt from smp_call_function_many_cond+0x588/0x614 [ 4.868682] smp_call_function_many_cond from smp_call_function+0x2c/0x34 [ 4.868682] smp_call_function from set_memory_valid+0x7c/0xb8 [ 4.868713] set_memory_valid from kfence_guarded_free+0x168/0x300 [ 4.868743] kfence_guarded_free from rcu_core+0x2b8/0x964 [ 4.868743] rcu_core from handle_softirqs+0x108/0x344 [ 4.868743] handle_softirqs from __irq_exit_rcu+0xa0/0x114 [ 4.868774] __irq_exit_rcu from irq_exit+0x8/0x10 [ 4.868774] irq_exit from call_with_stack+0x18/0x20 [ 4.868804] call_with_stack from __irq_svc+0x8c/0xa4 [ 4.868804] Exception stack(0xf0059f50 to 0xf0059f98) [ 4.868804] 9f40: 0000337c 00000001 00000001 00000000 [ 4.868804] 9f60: c297b780 c2270c80 c2004f1c c2004f5c 00000000 00000000 00000000 00000000 [ 4.868835] 9f80: c22700e0 f0059fa0 c14462ec c144779c 600f0013 ffffffff [ 4.868835] __irq_svc from default_idle_call+0x4c/0xb0 [ 4.868835] default_idle_call from do_idle+0x200/0x288 [ 4.868835] do_idle from cpu_startup_entry+0x28/0x2c [ 4.868865] cpu_startup_entry from secondary_start_kernel+0x120/0x128 [ 4.868865] secondary_start_kernel from 0x8041c094 [ 4.868896] ---[ end trace 0000000000000000 ]---
------------[ cut here ]------------ [ 6.022186] WARNING: CPU: 0 PID: 135 at kernel/smp.c:815 smp_call_function_many_cond+0x4c4/0x5fc [ 6.031799] Modules linked in: [ 6.034881] CPU: 0 UID: 0 PID: 135 Comm: 9 Not tainted 6.15.0-next-20250605 #1 NONE [ 6.034912] Hardware name: Generic DRA74X (Flattened Device Tree) [ 6.034912] Call trace: [ 6.034912] unwind_backtrace from show_stack+0x10/0x14 [ 6.034942] show_stack from dump_stack_lvl+0x50/0x64 [ 6.034942] dump_stack_lvl from __warn+0x80/0x130 [ 6.034942] __warn from warn_slowpath_fmt+0x174/0x17c [ 6.034973] warn_slowpath_fmt from smp_call_function_many_cond+0x4c4/0x5fc [ 6.034973] smp_call_function_many_cond from smp_call_function+0x2c/0x34 [ 6.035003] smp_call_function from flush_tlb_kernel_range+0x60/0xa8 [ 6.035003] flush_tlb_kernel_range from __change_memory_common+0x60/0x80 [ 6.035034] __change_memory_common from set_memory_valid+0x4c/0x54 [ 6.035034] set_memory_valid from kfence_guarded_free+0x2ac/0x594 [ 6.035064] kfence_guarded_free from rcu_core+0x2c8/0x998 [ 6.035064] rcu_core from handle_softirqs+0x108/0x314 [ 6.035095] handle_softirqs from irq_exit+0xa4/0x110 [ 6.035095] irq_exit from call_with_stack+0x18/0x20 [ 6.035095] call_with_stack from __irq_usr+0x80/0xa0 [ 6.035125] Exception stack(0xf1f7dfb0 to 0xf1f7dff8) [ 6.035125] dfa0: b63413c4 0031e110 b6f34400 00000002 [ 6.035125] dfc0: b6378328 00000016 b630beb8 bee2da48 b6300000 b6f34420 b661e110 b6f3ceb0 [ 6.035125] dfe0: 0000fff1 bee2da38 b6f1c9b3 b6f1fae4 200d0030 ffffffff [ 6.035156] ---[ end trace 0000000000000000 ]---