From nobody Wed Nov 1 09:18:41 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SL1dt3HMMz504dc for ; Wed, 1 Nov 2023 09:18:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SL1dt24Hyz3PlL for ; Wed, 1 Nov 2023 09:18:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698830322; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=dE0Fc6UllXNreQpYwLDdxQ/GYDVH77hry8yFavNbBEA=; b=wzSBTi+bLOTI2iyp7OMqww+kT+GFElXXGWyJHil2vg5KilW9ON7+NFZtjADuVEfcdffQXp A9GLaGwtrGp9lTO0vS5LE1wfopg9amwhv5I2MCXwSjkLk7cJRJCseaMgafiUle1xeFvB0w xcgZ42Dg69Duw3+M0zS02oESr4qjLR/liH/wzKsmmE0NRuMzIyimCvaVJOgRVO6EnphxPR xfcsRTNcTKKkioomutpcL4Q6bqn5qlRfsAnfiLaEchiTCsuLxpM9mnsTHk4igwpfTizPwm EWto9oWvevAXy1zgIm/HFU0PBNo+EGZJmIDOjZrMyfzKAuHTzl3UQn7pFvHblA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698830322; a=rsa-sha256; cv=none; b=cVKxIoSqbXCiFJurEXi3CGFUSJjkI9JYGSEqYnKqRyLwP3tojB2chpjNHYN7evntCAuJmj Jz8fleU44CP5KoMww+RBrrUGmR/e1rtHFHuFGROdFMfXikXG2rRwTavO86EXXogrJYWnaV WUzrvenF4FtODOKWYWvl3q15rnyzg7AbL+LFPAC1hWYaobR0FzZDbBYLnINmYMpg+DMLNf PpLA8Rc+BbisdCNvuITPIR8XTGaHTTyxJh3hU07nfZ8sz3Zov0QfPC/359cjkrDRBT4iJI csuB1lY8PIBFVzXMoQEy8qsj7RKk1HbSKDRJ/AIyTVCJnqVrIjy7Px+sB9xlSA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4SL1dt0Y2XzgST for ; Wed, 1 Nov 2023 09:18:42 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 3A19Ig9M068934 for ; Wed, 1 Nov 2023 09:18:42 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 3A19IgkQ068933 for bugs@FreeBSD.org; Wed, 1 Nov 2023 09:18:42 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 274810] [regression] FreeBSD 14.0-RC3 crash during early boot on Vultr with custom ISO Date: Wed, 01 Nov 2023 09:18:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.0-RELEASE X-Bugzilla-Keywords: regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: zlei@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: mfc-stable14? X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D274810 --- Comment #15 from Zhenlei Huang --- I managed to repeat this with QEMU 7.2.5 on Debian 12.2.0 host. ``` # uname -a Linux debian 6.1.0-13-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.55-1 (2023-09= -29) x86_64 GNU/Linux # qemu-system-x86_64 --version QEMU emulator version 7.2.5 (Debian 1:7.2+dfsg-7+deb12u2) Copyright (c) 2003-2022 Fabrice Bellard and the QEMU Project developers=20 ``` A minimal script to repeat (be sure firstly load kvm / kvm_intel, AMD is not tested yet): ``` #!/bin/sh qemu-system-x86_64 \ -vnc 0.0.0.0:1,password=3Don \ -monitor stdio \ --enable-kvm \ --cpu host,hv-vpindex,hv-synic \ --smp 1 \ --m 512M \ --cdrom FreeBSD-14.0-RC3-amd64-bootonly.iso ``` The Vultr 's enabled feature flags should be equivalent to=20 ``` --enable-kvm \ --cpu host,hv-relaxed,hv-vapic,hv-vpindex,hv-synic,hv-time,hv-stimer,hv-xmm-input ``` I've tested the patch with QEMU, it still works :) --=20 You are receiving this mail because: You are the assignee for the bug.=