From nobody Mon Sep 18 19:20:56 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RqF551HrBz4tdbs for ; Mon, 18 Sep 2023 19:20:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4RqF55054Kz4HWM for ; Mon, 18 Sep 2023 19:20:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1695064857; a=rsa-sha256; cv=none; b=hy9Jrps9BIkiM1SujBOcXXA/7WKDmhzTUn66j7jGFH8VXm/h2dXyOElgMvN0pJiqfzf0uH tZ0vFDsqGTvAj/jTT7t3WQ8xYwQzW2aoOq6m7ka0zSwsQv0n7MzrvvE2kTLJQWPxkQ7wAc PBan4j6FikFH7fc2XOpZui6l1j0q35MXaT4plAI372MYUKyLiV4+BOfYS9iW30UQLnx+j7 tfOdzVP6akD8jsLt4zYxXls06ylfPs0aZviGUgPKbvYZzGoWqeB4eHqusKXHO/8dYoghu+ z2f5NaUVjE/1m72E456Ey+zKq4Nlq20OESB0XBsIwHSjvOpwsXtNIZfnyykbeg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1695064857; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=hBR++9QHvAncLi1cXyIAgN+xZHUrlqzXYmA85gUWmz8=; b=mtuhpqMXEkzkarPV7eWUveThRHLhdgVjdvR9pi0UZ3S9Wwj6D1K8whZNw4zUcWx/bjRGpg CHG1Hr4LAd4mTTHk43QKCVtPxI5t7TgNxCYuEq59tKu4Dl5H6uAw68SYWlvvotJfX9TBM/ J8xPSwTjmx7LssrmVE9xqqLJDU0Q9wQT5I44Pk4w2h9rzzjPpDBnLPCZZOd9lVgtNV0KHv /llkfPOJckAef7ceLhKX4xgC9p6+0aXCwgcOUrw9oFIgoO3d0uyiK8ZcHBL9IS317f4PHk 4EiFbaGX7ezZAiZJAgBiPiGguNJTDXIxQugxBO644lgM2ZkknhvESsg6wSJ6fg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4RqF546JSZzjyd for ; Mon, 18 Sep 2023 19:20:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 38IJKuoI033580 for ; Mon, 18 Sep 2023 19:20:56 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 38IJKuAY033579 for bugs@FreeBSD.org; Mon, 18 Sep 2023 19:20:56 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 273418] [panic] Repeating kernel panic on open(/dev/console) Date: Mon, 18 Sep 2023 19:20:56 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.2-STABLE X-Bugzilla-Keywords: crash, regression X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: jah@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D273418 Jason A. Harmening changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jah@FreeBSD.org --- Comment #13 from Jason A. Harmening --- Per mjg's comment above, would something like this be useful as a starting point for debugging? (WARNING: compile-tested only) diff --git a/sys/fs/devfs/devfs_devs.c b/sys/fs/devfs/devfs_devs.c index 6d8ce5cc3a63..245dcdc22307 100644 --- a/sys/fs/devfs/devfs_devs.c +++ b/sys/fs/devfs/devfs_devs.c @@ -175,6 +175,8 @@ devfs_free(struct cdev *cdev) struct cdev_priv *cdp; cdp =3D cdev2priv(cdev); + KASSERT((cdp->cdp_flags & CDP_ON_ACTIVE_LIST) =3D=3D 0, + ("cdp %p still on active list", cdp)); if (cdev->si_cred !=3D NULL) crfree(cdev->si_cred); devfs_free_cdp_inode(cdp->cdp_inode); @@ -521,6 +523,8 @@ devfs_populate_loop(struct devfs_mount *dm, int cleanup) dev_lock(); TAILQ_FOREACH(cdp, &cdevp_list, cdp_list) { KASSERT(cdp->cdp_dirents !=3D NULL, ("NULL cdp_dirents")); + KASSERT((cdp->cdp_flags & CDP_ON_ACTIVE_LIST) !=3D 0, + ("cdp %p should not be on active list", cdp)); /* * If we are unmounting, or the device has been destroyed, @@ -552,6 +556,7 @@ devfs_populate_loop(struct devfs_mount *dm, int cleanup) if (!(cdp->cdp_flags & CDP_ACTIVE)) { if (cdp->cdp_inuse > 0) continue; + cdp->cdp_flags &=3D ~CDP_ON_ACTIVE_LIST; TAILQ_REMOVE(&cdevp_list, cdp, cdp_list); dev_unlock(); dev_rel(&cdp->cdp_c); @@ -703,7 +708,9 @@ devfs_create(struct cdev *dev) dev_lock_assert_locked(); cdp =3D cdev2priv(dev); - cdp->cdp_flags |=3D CDP_ACTIVE; + KASSERT((cdp->cdp_flags & CDP_ON_ACTIVE_LIST) =3D=3D 0, + ("cdp %p already on active list", cdp)); + cdp->cdp_flags |=3D (CDP_ACTIVE | CDP_ON_ACTIVE_LIST); cdp->cdp_inode =3D alloc_unrl(devfs_inos); dev_refl(dev); TAILQ_INSERT_TAIL(&cdevp_list, cdp, cdp_list); diff --git a/sys/fs/devfs/devfs_int.h b/sys/fs/devfs/devfs_int.h index 26589e0bded6..9cf50c58018d 100644 --- a/sys/fs/devfs/devfs_int.h +++ b/sys/fs/devfs/devfs_int.h @@ -57,6 +57,7 @@ struct cdev_priv { #define CDP_ACTIVE (1 << 0) #define CDP_SCHED_DTR (1 << 1) #define CDP_UNREF_DTR (1 << 2) +#define CDP_ON_ACTIVE_LIST (1 << 3) u_int cdp_inuse; u_int cdp_maxdirent; diff --git a/sys/fs/devfs/devfs_vnops.c b/sys/fs/devfs/devfs_vnops.c index e8c8956d36fd..a8c3c2a36db5 100644 --- a/sys/fs/devfs/devfs_vnops.c +++ b/sys/fs/devfs/devfs_vnops.c @@ -1676,6 +1676,9 @@ devfs_revoke(struct vop_revoke_args *ap) dev_lock(); cdp->cdp_inuse--; if (!(cdp->cdp_flags & CDP_ACTIVE) && cdp->cdp_inuse =3D=3D 0) { + KASSERT((cdp->cdp_flags & CDP_ON_ACTIVE_LIST) !=3D 0, + ("cdp %p already not on active list", cdp)); + cdp->cdp_flags &=3D ~CDP_ON_ACTIVE_LIST; TAILQ_REMOVE(&cdevp_list, cdp, cdp_list); dev_unlock(); dev_rel(&cdp->cdp_c); --=20 You are receiving this mail because: You are the assignee for the bug.=