From nobody Fri Dec 27 12:58:04 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YKQXD6tMsz5hTMH for ; Fri, 27 Dec 2024 12:58:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YKQXD50mrz4N1X for ; Fri, 27 Dec 2024 12:58:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1735304284; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=6FaX9aFp26npkRJiPFswDWNEaqPYC01ymzueE2oibwk=; b=et/OU7uYUstGO1k8hSeGrCo6wU1B6ivNdN2FNI/O3zta6PGkt6+8SNXog4S9RhRvT2UjFr /YtJZBwqWE2giVzfkTlOdFOtmOb8MFod/lGpokVPlMcxWjtEPGHonKxLZnUIwVSI673zYL tjPOg33lW/xqSxeoSTWM6c5uFpenQn+8eGPBm81Q/siQ87S8eVO8ZNE8c1MCJ46kTNCB2J Il1GxpbRfqk1331GceDPIN+bvX20mH8ZWRu40ZqOONIdLQ4bPjnTuZtwTQb/++orGch6aD GEFR5mOQ/PTzkgkYGZChEGf50I5DI2fe/dLdjpEwepyH8vjcMhV7DGWo6siv5w== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1735304284; a=rsa-sha256; cv=none; b=L45MrTuodTd/P8Om3hMcNwsE6ZsZYDKtfRtwjWMFGduQAGf8L2uGTimiXmJV5gENbJNJ4T m9J7SAv8wqh5vGcJstfbSVN0mv/UtpQyCbTCKvxq6cl347GIbDCP4Sj/YcnJTw1Y+GdfM+ N/VcBOVR/sK7J7m9hj3mGLUcwTRmaPvMPbc974Dsw/4eGOk7nedXmgIItDJdx0hZjbXynP aMRzLEtvnAxgPd1K8ZJDVVWnxY3+FjXFT9XuKo4NHTwf8HAIYBDl6VBzZoxRt7/ZfCOcb+ O9UjlqMFCgg7Gl0P9gVrDzVSHyym4q+NvDC83StTZ0jDxN6KEnbyeNVzxnxczA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YKQXD4cCPzgPs for ; Fri, 27 Dec 2024 12:58:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4BRCw4mT052447 for ; Fri, 27 Dec 2024 12:58:04 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4BRCw4hE052446 for bugs@FreeBSD.org; Fri, 27 Dec 2024 12:58:04 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 267028] kernel panics when booting with both (zfs,ko or vboxnetflt,ko or acpi_wmi.ko) and amdgpu.ko Date: Fri, 27 Dec 2024 12:58:04 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-RELEASE X-Bugzilla-Keywords: crash, needs-qa X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D267028 --- Comment #310 from Mark Millard --- (In reply to Andriy Gapon from comment #308) I'll also remind that back before the vmcore.* files were involved in the investigations but just looking at a backtrace that had been reported in one of the examples ( see comment #148 ) . . . /* * Remove the references to the thread from all of the objects we were * polling. */ static void seltdclear(struct thread *td) { struct seltd *stp; struct selfd *sfp; struct selfd *sfn; stp =3D td->td_sel; STAILQ_FOREACH_SAFE(sfp, &stp->st_selq, sf_link, sfn) selfdfree(stp, sfp); stp->st_flags =3D 0; } It was a sfp value that ended up being reported as: 0xfffff80000000007 (so, again a next pointer in a list). But it was a different type of node and a different list, even STAILQ vs. not being different. Still the same odd value showing up. It was definitely not the same kernel or kernel.debug when looking that far back in the investigations. The port vintage involved was likely older as well? --=20 You are receiving this mail because: You are the assignee for the bug.=