[Bug 284073] bnxt: kernel panic on 14.2-RELEASE
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 21 Jan 2025 01:49:12 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=284073 --- Comment #14 from Zhenlei Huang <zlei@FreeBSD.org> --- (In reply to Zhenlei Huang from comment #9) Emm, I was wrong, RIP is next instruction. Stupid ... ``` % objdump --disassemble-symbols=sysctl_handle_string /boot/kernel/kernel /boot/kernel/kernel: file format elf64-x86-64 Disassembly of section .text: ffffffff80b4de20 <sysctl_handle_string>: ffffffff80b4de20: 55 pushq %rbp ffffffff80b4de21: 48 89 e5 movq %rsp, %rbp ffffffff80b4de24: 41 57 pushq %r15 ffffffff80b4de26: 41 56 pushq %r14 ffffffff80b4de28: 41 55 pushq %r13 ffffffff80b4de2a: 41 54 pushq %r12 ffffffff80b4de2c: 53 pushq %rbx ffffffff80b4de2d: 50 pushq %rax ffffffff80b4de2e: 48 89 cb movq %rcx, %rbx ffffffff80b4de31: 49 89 f6 movq %rsi, %r14 ffffffff80b4de34: 48 85 d2 testq %rdx, %rdx ffffffff80b4de37: 0f 84 9c 00 00 00 je 0xffffffff80b4ded9 <sysctl_handle_string+0xb9> ffffffff80b4de3d: b8 00 00 08 40 movl $0x40080000, %eax # imm = 0x40080000 ffffffff80b4de42: 23 47 2c andl 0x2c(%rdi), %eax ffffffff80b4de45: 0f 84 8e 00 00 00 je 0xffffffff80b4ded9 <sysctl_handle_string+0xb9> ffffffff80b4de4b: 80 3d 5f 22 cb 00 00 cmpb $0x0, 0xcb225f(%rip) # 0xffffffff818000b1 <kdb_active> ffffffff80b4de52: 0f 85 81 00 00 00 jne 0xffffffff80b4ded9 <sysctl_handle_string+0xb9> ffffffff80b4de58: 49 89 d7 movq %rdx, %r15 ffffffff80b4de5b: 48 83 7b 10 00 cmpq $0x0, 0x10(%rbx) ffffffff80b4de60: 0f 84 a0 00 00 00 je 0xffffffff80b4df06 <sysctl_handle_string+0xe6> ffffffff80b4de66: 4c 89 ff movq %r15, %rdi ffffffff80b4de69: 48 c7 c6 c0 5c 8d 81 movq $-0x7e72a340, %rsi # imm = 0x818D5CC0 ffffffff80b4de70: ba 02 00 00 00 movl $0x2, %edx ffffffff80b4de75: e8 e6 51 fc ff callq 0xffffffff80b13060 <malloc> ffffffff80b4de7a: 49 89 c4 movq %rax, %r12 ffffffff80b4de7d: 48 c7 c7 70 21 bb 81 movq $-0x7e44de90, %rdi # imm = 0x81BB2170 ffffffff80b4de84: 31 f6 xorl %esi, %esi ffffffff80b4de86: e8 f5 bb ff ff callq 0xffffffff80b49a80 <_sx_slock_int> ffffffff80b4de8b: 4c 89 e7 movq %r12, %rdi ffffffff80b4de8e: 4c 89 f6 movq %r14, %rsi ffffffff80b4de91: 4c 89 fa movq %r15, %rdx ffffffff80b4de94: e8 00 00 00 00 callq 0xffffffff80b4de99 <sysctl_handle_string+0x79> ffffffff80b4de99: 48 c7 c7 70 21 bb 81 movq $-0x7e44de90, %rdi # imm = 0x81BB2170 ffffffff80b4dea0: e8 db c2 ff ff callq 0xffffffff80b4a180 <_sx_sunlock_int> ffffffff80b4dea5: 4c 89 e7 movq %r12, %rdi ffffffff80b4dea8: e8 d3 3c 4d 00 callq 0xffffffff81021b80 <strlen> ffffffff80b4dead: 48 8d 50 01 leaq 0x1(%rax), %rdx ffffffff80b4deb1: 48 89 df movq %rbx, %rdi ffffffff80b4deb4: 4c 89 e6 movq %r12, %rsi ffffffff80b4deb7: ff 53 28 callq *0x28(%rbx) ffffffff80b4deba: 41 89 c5 movl %eax, %r13d ffffffff80b4debd: 4c 89 e7 movq %r12, %rdi ffffffff80b4dec0: 48 c7 c6 c0 5c 8d 81 movq $-0x7e72a340, %rsi # imm = 0x818D5CC0 ffffffff80b4dec7: e8 34 50 fc ff callq 0xffffffff80b12f00 <free> ffffffff80b4decc: 44 89 e8 movl %r13d, %eax ffffffff80b4decf: 85 c0 testl %eax, %eax ffffffff80b4ded1: 0f 85 de 00 00 00 jne 0xffffffff80b4dfb5 <sysctl_handle_string+0x195> ffffffff80b4ded7: eb 64 jmp 0xffffffff80b4df3d <sysctl_handle_string+0x11d> ffffffff80b4ded9: 4c 89 f7 movq %r14, %rdi ffffffff80b4dedc: e8 9f 3c 4d 00 callq 0xffffffff81021b80 <strlen> ffffffff80b4dee1: 49 89 c7 movq %rax, %r15 ffffffff80b4dee4: 49 ff c7 incq %r15 ffffffff80b4dee7: 4c 8b 63 10 movq 0x10(%rbx), %r12 ffffffff80b4deeb: 4c 89 f7 movq %r14, %rdi ffffffff80b4deee: e8 8d 3c 4d 00 callq 0xffffffff81021b80 <strlen> ffffffff80b4def3: 48 89 c2 movq %rax, %rdx ffffffff80b4def6: 4d 85 e4 testq %r12, %r12 ffffffff80b4def9: 74 33 je 0xffffffff80b4df2e <sysctl_handle_string+0x10e> ffffffff80b4defb: 48 ff c2 incq %rdx ffffffff80b4defe: 48 89 df movq %rbx, %rdi ... ``` The current instruction should be `0xffffffff80b4dee4`. ``` % addr2line -fip -e kernel.debug 0xffffffff80b4dee4 sysctl_handle_string at /usr/src/sys/kern/kern_sysctl.c:1783 ``` https://cgit.freebsd.org/src/tree/sys/kern/kern_sysctl.c?h=releng/14.2#n1783 Then that makes sense. -- You are receiving this mail because: You are the assignee for the bug.