From nobody Sun Feb 26 20:56:08 2023 X-Original-To: fs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PPws50xc4z3v4BW for ; Sun, 26 Feb 2023 20:56:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PPws46jwZz4L48 for ; Sun, 26 Feb 2023 20:56:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1677444968; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=yt6dFQqzTt8BnondcP6IcETq6GVvZAEZvYLhTrGRIKs=; b=HL2+WISd4WF12jS149lTsE4Chabx0mqHqd1dfRcbK8q+7zgLxuGxNAIARF47Hku/Dm6a5J IFPzpvHkmQuio2QLUSkUkoCkSxqeLV9kYosmopMmZ24DkM29AVmIvXmC0jCYZMgJUIpFp1 N3Ozlr6FIYHS7DT4io99DUGAsvu8/U3sKToAFkx6YnkCLzFleiUuU1dJDCjPS0OCIe1xSD II7zAYulotuyjs4e8r3eLnWf2PnqYvyAA6F7E5FDMgRZemFNVlqILQqFfPNUDqR8oehWfF XMtS3XOMdqaone2wGor2fWsWCtGvfERiMMcd0RA1/LaspfXD0Lh60jucoTv8Ag== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1677444968; a=rsa-sha256; cv=none; b=OXH5wKbJ+H4PVGl43lkDIidHbFq02QgHaahXQEz3D6NotjtuMSYyUKGvAWypcVL6qLc6GC b/PPP4kWHZREQT3dJohlDp7X8sq+Ab2ylpJz6+vSTVB9GI34beJYpQzArdB1o+eR9t1Mah /O3PJyCCXtJMl6oR9g7xURqPjbtER3B24gmj1QB6Zfbw+LNel0esK/7+c1cXsN6TporAZr bPqQWV2SwGjZVV/o2H1WgyxRudGDzgirPrRTpX/hgA6VNsXOc2iHOnsYPMxL7jYmXSltYB kjk1jUtuaii6m/Kfsbv8bnPYCmZYQXNYViFomYkPgovsmuvxGOwQ2t7ZdiIPYA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PPws45hR5z10hx for ; Sun, 26 Feb 2023 20:56:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 31QKu8GT088449 for ; Sun, 26 Feb 2023 20:56:08 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 31QKu8gZ088448 for fs@FreeBSD.org; Sun, 26 Feb 2023 20:56:08 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: fs@FreeBSD.org Subject: [Bug 267028] kernel panics when booting with ZFS and amdgpu.ko (both are required) Date: Sun, 26 Feb 2023 20:56:08 +0000 X-Bugzilla-Reason: CC AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-RELEASE X-Bugzilla-Keywords: crash, needs-qa X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: fs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? maintainer-feedback? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Filesystems List-Archive: https://lists.freebsd.org/archives/freebsd-fs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-fs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D267028 --- Comment #82 from Mark Millard --- Using the gdb-based backtrace information: #8 0xffffffff80be8c5d in modlist_lookup (name=3D0xfffff80006217400 "acpi_w= mi",=20 ver=3D0) at /usr/src/sys/kern/kern_linker.c:1487 is for the strcmp code line in: static modlist_t modlist_lookup(const char *name, int ver) { modlist_t mod; TAILQ_FOREACH(mod, &found_modules, link) { if (strcmp(mod->name, name) =3D=3D 0 && (ver =3D=3D 0 || mod->version =3D=3D ver)) return (mod); } return (NULL); } We also see that strcmp was called via: #6 #7 strcmp (s1=3D, s2=3D) at /usr/src/sys/libkern/strcmp.c:46 We also see name was accessible, as shown in the "#8" line above. We see from #7 that strcmp was considered called, suggesting that the mod->name of itself did not fail. The implication would be that that value of name in mod->name was a bad pointer when strcmp tried to use the value. Nothing says that mod->name was or should have been for acpi_wmi at all. The "acpi_wmi" side of the comparison need not be relevant information. Other backtraces that look similar may well have a similar status for the name in the right had argument to the strcmp. This might be a useful hint to someone with appropriate background or suggest some way of detecting the bad value in mod->name earlier when that earlier context might be of more use for investigations. --=20 You are receiving this mail because: You are on the CC list for the bug. You are the assignee for the bug.=