From nobody Mon Dec 16 19:17:42 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YBqTM4lY9z5fsN1 for ; Mon, 16 Dec 2024 19:17:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YBqTM18r5z4hqb for ; Mon, 16 Dec 2024 19:17:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1734376663; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mYgCFMMk0e+uXdVWefNWbr2PnIObhPIo5e91t3ticxk=; b=ZBD8VjKBjYyh7xkhjpuexDIOdOVwoNgEkBnt6m/+bSg3MGM3H/kzgqDk6cNqoeIn3xfEME 1juQAVPiW7aXjoQzkadj0Z9UFbkim0/cuANve3C9suk47p4PmgK82sBkJkkj//lkdqHngr Maw7FK5NYWwfvA14IYtikn1KMXmUs3TteUSCozAeojIMsqvd7+T1tn4XXmh9UCdQDzkYp9 no1jjkOmbCvmjioBVRH8sGTbrww8H19FsyfJWpdlPbWf5Gi7RiwlnDDKi1iwhsJgvgkCuQ ap1OAGJcv13C5uuXLUHrtK7SJ/4eQFWk1Rs7zI7mH1dLEB1QiLR44/6zas7QCQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1734376663; a=rsa-sha256; cv=none; b=nY1atZYFgWxMiSkdbe0qnKhur++hlScaxO6lsw7ugKB7RHrCjJ7QNyBbQL+y9QoKM+RXT6 o/uHoOv3mPTQJk8vPsXfciGR3KYdo9J+e7R9aSsUUKSkeX9VNHM0+UKNjsOTSFL5m5upAz 2p9Nv3DMalgL74szhwELU4/+gQ2gL85T0kN+yoZKOXIvR36jHz2XmX+ubePd3XuwpiNOWw QxbX5SjGgN/f3ql8km5ROCCAHViwiLhxSUyVBBDTqob/uAMaQSncwSvmsZ1EEyyNnwobMZ LBf9jsaCB2N0S27KwFwgtSWmnSx0skQ6J4jTzDOzG0JcdZ5ypLxSCoEGZjxwig== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YBqTM0klWz15hM for ; Mon, 16 Dec 2024 19:17:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BGJHgfP077064 for ; Mon, 16 Dec 2024 19:17:42 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BGJHgPh077062 for bugs@FreeBSD.org; Mon, 16 Dec 2024 19:17:42 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 267028] kernel panics when booting with both (zfs,ko or vboxnetflt,ko or acpi_wmi.ko) and amdgpu.ko Date: Mon, 16 Dec 2024 19:17:42 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-RELEASE X-Bugzilla-Keywords: crash, needs-qa X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D267028 --- Comment #241 from Mark Millard --- One of the older ("obsolete") crash dump reports is for: /* * free: *=20 * Free a block of memory allocated by malloc. *=20 * This routine may not block. */ void free(void *addr, struct malloc_type *mtp) { uma_zone_t zone; uma_slab_t slab; u_long size; #ifdef MALLOC_DEBUG if (free_dbg(&addr, mtp) !=3D 0) return; #endif /* free(NULL, ...) does nothing */ if (addr =3D=3D NULL) return; vtozoneslab((vm_offset_t)addr & (~UMA_SLAB_MASK), &zone, &slab); . . . where addr ended up being 0xfffff80000000007 , in other words PHYS_TO_DMAP(0x7). The (vm_offset_t)addr & (~UMA_SLAB_MASK) turned it into 0xfffff80000000000 for vtozoneslab. That in turn reported a failure. The presence of a NULL check in the kernel's free suggests to me that the kernel's free may not be intended to handle DMAP addresses. Similarly for other kernel code that checks against NULL but not against PHYS_TO_DMAP(NULL). How does one tell where DMAP addresses should not appear when looking around via kgdb? --=20 You are receiving this mail because: You are the assignee for the bug.=