[Bug 275731] panic in zfs: VERIFY(buf[i] == 0) failed
- In reply to: bugzilla-noreply_a_freebsd.org: "[Bug 275731] panic in zfs: VERIFY(buf[i] == 0) failed"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 14 Dec 2023 14:05:03 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275731 --- Comment #1 from John F. Carr <jfc@mit.edu> --- The object that failed verification prints as *db = {db = { db_object = 144497, db_offset = 0, db_size = 512, db_data = 0xffffa00184020a00}, db_objset = 0xffffa00004ac3000, db_dnode_handle = 0xffffa0019f8cd618, db_parent = 0xffffa0015a5557f8, db_hash_next = 0x0, db_link = {avl_child = {0x0, 0x0}, avl_pcb = 1}, db_blkid = 0, db_blkptr = 0xffff0000f9cab240, db_level = 0 '\000', db_rwlock = { lock_object = { lo_name = 0xffff000000c16eaf "db->db_rwlock", lo_flags = 577830912, lo_data = 0, lo_witness = 0x0}, sx_lock = 1}, db_buf = 0xffffa000bb982480, db_mtx = { lock_object = { lo_name = 0xffff000000bf395d "db->db_mtx", lo_flags = 577830912, lo_data = 0, lo_witness = 0x0}, sx_lock = 18446462602811342848}, db_state = DB_CACHED, db_holds = { rc_count = 2, rc_mtx = { lock_object = { lo_name = 0xffff000000c8cca3 "rc->rc_mtx", lo_flags = 577830912, lo_data = 0, lo_witness = 0x0}, sx_lock = 1}, rc_tree = { avl_root = 0x0, avl_compar = 0xffff000000162ee0 <zfs_refcount_compare>, avl_offset = 0, avl_numnodes = 0}, rc_removed = { list_size = 48, list_offset = 0, list_head = { list_next = 0xffffa0003d1c3c40, list_prev = 0xffffa0003d1c3c40} }, rc_removed_count = 0, rc_tracked = 0}, db_changed = { cv_description = 0xffff000000c0b27b "db->db_changed", cv_waiters = 0}, db_data_pending = 0x0, db_dirty_records = { list_size = 408, list_offset = 40, list_head = { list_next = 0xffffa0003d1c3c80, list_prev = 0xffffa0003d1c3c80}}, db_cache_link = {list_next = 0x0, list_prev = 0x0}, db_caching_status = DB_NO_CACHE, db_hash = 3780604374730761540, db_user = 0x0, db_user_immediate_evict = 0 '\000', db_freed_in_flight = 0 '\000', db_pending_evict = 0 '\000', db_dirtycnt = 0 '\000', db_partial_read = 1 '\001'} The db_data field points to something kgdb can't read from the core dump ("Cannot access memory at address 0xffffa00184020a00"). -- You are receiving this mail because: You are the assignee for the bug.