From nobody Thu Dec 12 00:29:04 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Y7tcx0TGFz5ghVm for ; Thu, 12 Dec 2024 00:29:05 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Y7tcw503zz4HQQ for ; Thu, 12 Dec 2024 00:29:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1733963344; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=8Q0YckfL3fc9ZfJubaUBJxPEmFG1dorPPFm0xqZZNVY=; b=asrw//4jrFnQNb3rxbjR3vTFk/E/ArnDolcry5DGs8sZN7DJN+++fBEy9ld6ewbgzS8Qo+ ecYoy+EN+LyssY5Q9IYvbvWvay3W7GnQdhiZ0dzRGmOjYuH0eCvqN8dd1k5i9LWvlt68G3 9tF+lxYYrWqj9vTSpIZY9AXZ25fRmNNdLcpA7HS1P5MisoxQ7fc42yhD2usJYxH/eT2hgB QM/aSQl+OcfyQzFRdZ+hU5Ibj/sZirKuAwvNXGvyYQ305m9yCa0G+LbYJ1zvrpcwouA0q8 rMrz0/+dLBG93CDnSBj6IPyv1PyJ5n3WlIZveT8a5WiHrPSL33dBL59DGqx/JQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1733963344; a=rsa-sha256; cv=none; b=Y9MuRqBjlsRjYkasGGxqnFiOdhdkZGTnfHYLqoO5Cs97cnERuGTg8KECqvkdpUzcV3iRBY 8gZsPblJjqUA1T4RR2UenZZxECpdTL30siYUBAR6hQdn3YC3jNP/HGwoCqlscXDCp7vbf6 E50IuMZbl+85SIY0TSMoxVFksmXt+L8vHf9ll0WdMNQNGC2rAn6avKKS/r3Y1U5yPvIDdl LFLZPe1Q3GpQBOXk1yMhJL7IiEI0Pm9tgrlcc+G0jY22N12nm7nq8La6ps60md1oOg9JD2 F9w4eBzxaiuCj9yTevBdUgnX5kGrk8tWslY/EDoyma+IeO3c/MB9OUr+tWMhqA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Y7tcw4JrrzW3m for ; Thu, 12 Dec 2024 00:29:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BC0T4mO022769 for ; Thu, 12 Dec 2024 00:29:04 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BC0T4NM022767 for bugs@FreeBSD.org; Thu, 12 Dec 2024 00:29:04 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 267028] kernel panics when booting with both (zfs,ko or vboxnetflt,ko or acpi_wmi.ko) and amdgpu.ko Date: Thu, 12 Dec 2024 00:29:04 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-RELEASE X-Bugzilla-Keywords: crash, needs-qa X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D267028 --- Comment #214 from Mark Millard --- Interesting. Your context: Local exec file: `/boot/kernel/kernel', file type elf64-x86-64-freebsd. Entry point: 0xffffffff8038e000 0xffffffff802002a8 - 0xffffffff802002b5 is .interp 0xffffffff802002b8 - 0xffffffff80231108 is .hash 0xffffffff80231108 - 0xffffffff8025f9e4 is .gnu.hash 0xffffffff8025f9e8 - 0xffffffff802f24c0 is .dynsym 0xffffffff802f24c0 - 0xffffffff8036d162 is .dynstr 0xffffffff8036d168 - 0xffffffff8038db08 is .rela.dyn 0xffffffff8038e000 - 0xffffffff811843f8 is .text 0xffffffff81184400 - 0xffffffff817f68d0 is .rodata . . . The downloaded kernel.txz expanded: Local exec file: `/usr/home/root/artifacts/13.4R/boot/kernel/kernel', file type elf64-x86-64-freebsd. Entry point: 0xffffffff8038e000 0xffffffff802002a8 - 0xffffffff802002b5 is .interp 0xffffffff802002b8 - 0xffffffff802310f0 is .hash 0xffffffff802310f0 - 0xffffffff8025f9c0 is .gnu.hash 0xffffffff8025f9c0 - 0xffffffff802f2450 is .dynsym 0xffffffff802f2450 - 0xffffffff8036d0c4 is .dynstr 0xffffffff8036d0c8 - 0xffffffff8038da68 is .rela.dyn 0xffffffff8038e000 - 0xffffffff811863f8 is .text 0xffffffff81186400 - 0xffffffff817f8c20 is .rodata . . . And, your context: (kgdb) disass 0xffffffff80cf0110 Dump of assembler code for function strcmp: 0xffffffff80cf0100 <+0>: push %rbp 0xffffffff80cf0101 <+1>: mov %rsp,%rbp 0xffffffff80cf0104 <+4>: xor %ecx,%ecx 0xffffffff80cf0106 <+6>: cs nopw 0x0(%rax,%rax,1) 0xffffffff80cf0110 <+16>: movzbl (%rdi,%rcx,1),%eax 0xffffffff80cf0114 <+20>: movzbl (%rsi,%rcx,1),%edx 0xffffffff80cf0118 <+24>: cmp %dl,%al 0xffffffff80cf011a <+26>: jne 0xffffffff80cf0127 0xffffffff80cf011c <+28>: inc %rcx 0xffffffff80cf011f <+31>: test %eax,%eax 0xffffffff80cf0121 <+33>: jne 0xffffffff80cf0110 0xffffffff80cf0123 <+35>: xor %eax,%eax 0xffffffff80cf0125 <+37>: pop %rbp 0xffffffff80cf0126 <+38>: ret 0xffffffff80cf0127 <+39>: sub %edx,%eax 0xffffffff80cf0129 <+41>: pop %rbp 0xffffffff80cf012a <+42>: ret End of assembler dump. My 13.4-RELEASE kernel.txz expansion: (kgdb) disass strcmp Dump of assembler code for function strcmp: 0xffffffff80cf2290 <+0>: push %rbp 0xffffffff80cf2291 <+1>: mov %rsp,%rbp 0xffffffff80cf2294 <+4>: xor %ecx,%ecx 0xffffffff80cf2296 <+6>: cs nopw 0x0(%rax,%rax,1) 0xffffffff80cf22a0 <+16>: movzbl (%rdi,%rcx,1),%eax 0xffffffff80cf22a4 <+20>: movzbl (%rsi,%rcx,1),%edx 0xffffffff80cf22a8 <+24>: cmp %dl,%al 0xffffffff80cf22aa <+26>: jne 0xffffffff80cf22b7 0xffffffff80cf22ac <+28>: inc %rcx 0xffffffff80cf22af <+31>: test %eax,%eax 0xffffffff80cf22b1 <+33>: jne 0xffffffff80cf22a0 0xffffffff80cf22b3 <+35>: xor %eax,%eax 0xffffffff80cf22b5 <+37>: pop %rbp 0xffffffff80cf22b6 <+38>: ret 0xffffffff80cf22b7 <+39>: sub %edx,%eax 0xffffffff80cf22b9 <+41>: pop %rbp 0xffffffff80cf22ba <+42>: ret End of assembler dump. Same code, different address range. It does not look like I can investigate backtraces via just the kernel*.txz contents. That invalidates a lot of my older notes that involve such. strcmp is in your context is at least believable, presuming the address interpretation of the blur is accurate: the nice start of an instruction could well produce the general protection fault: 0xffffffff80cf0110 <+16>: movzbl (%rdi,%rcx,1),%eax Most bad values would not point to an intended instruction start of an instruction that could generate the initially reported failure. For reference, for the kernel.txz expansion: # strings boot/kernel/kernel | grep "\-RELEASE " @(#)FreeBSD 13.4-RELEASE releng/13.4-n258257-58066db597be GENERIC FreeBSD 13.4-RELEASE releng/13.4-n258257-58066db597be GENERIC --=20 You are receiving this mail because: You are the assignee for the bug.=