From nobody Mon Oct 30 19:34:26 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SK3PG5Fp5z4yL3b for ; Mon, 30 Oct 2023 19:34:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SK3PG12xjz3gcN for ; Mon, 30 Oct 2023 19:34:26 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698694466; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=QEqdBCViKnc+SLRVQcZjdoQLpmQP5l2rBk/P0Mz0mUc=; b=nH70bhHJXZnLbcqsvetxN6LisQzmJuFF5bBk5fQ3QJNU+FxD+s1K51LIFVwFUDpfE5gl/z DWNEQD5tn5aPU0VEZKh+SCUpULST7DCxk9xsBFdgKUov2SVC4dEH0w1BF18JoXX8k5K4FX 484gkvGeJ7dPsEabm3vv2x8Ot/x4KuP0rRhe1YLLrGuEsdQA4SzvUUcYrGMDanmc+cBB6u 7tC4XQsEuyvsgPc1nW4IQ8a14CieDttsgcpMJJKDKhx/JBUZhN7qTTiqZHpFUKXQyiTnZU 6qSqZ9vhu9LsKiNuJXkjXV5hQoT8tsw3c0iJoJVVEJImr0bJlfTH3fxdUSisbw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698694466; a=rsa-sha256; cv=none; b=WUdTx3j7l8FMAcLrGRJ8PNkX13CaFFjDfjGM+ryfLcEVA1ZmZyLUtdFJN1oRP4yhXfT3C/ ypCp50TsHlp5fW9KFQ1h+01yfIle2OpuGlTu0w9c7qoBtS3XQMGRCKhwv0t+SN8feE5dfg 235NXn2c69pFEPL3g7+FJvDEr56Kec+cP21IwljQO0tFTBZitYqQSAHDIZFyGRsWMw8T+6 4/An0V4+munVmt+zzyFlPt/8UGuHxVRPQ5xOpMnAMC9OiYWIkxMJNvEH8H4WydPCUWl9Is NCHKyfMzsniDfbanBoi3hP/jC6IqK9/obt7a90a8Ty7yRqGPCsbNVy17n3WHXg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4SK3PG0156zZLn for ; Mon, 30 Oct 2023 19:34:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 39UJYP8R050318 for ; Mon, 30 Oct 2023 19:34:25 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 39UJYPlW050317 for bugs@FreeBSD.org; Mon, 30 Oct 2023 19:34:25 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 274810] FreeBSD 14.0-RC3 early crash during boot on Vultr Date: Mon, 30 Oct 2023 19:34:26 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: mhorne@freebsd.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_status cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D274810 Mitchell Horne changed: What |Removed |Added ---------------------------------------------------------------------------- Status|New |Open CC| |mhorne@freebsd.org --- Comment #1 from Mitchell Horne --- Hi, I looked at the reported faulting address in objdump/addr2line. It seems to= be the result of a bad call to acpi_get_handle(), whose definition is expanded from line 280 of acpivar.h. Consider the following two lines in vmbus_doattach(), added in e7a9817b8d32 (Sept 2023): dev_res =3D devclass_get_device(devclass_find("vmbus_res"), 0); handle =3D acpi_get_handle(dev_res); There is no NULL check for dev_res, which means if the vmbus_res0 device is= not found (attached), we will get a page fault in the following call to acpi_get_handle(). Now, _why_ vmbus_res0 can't be found, I cannot guess. It has similar attach= ment criteria to vmbus0. Strangely, my Vultr VM doesn't run on Hyper-V, instead the kern.vm_guest sy= sctl reports "kvm". So this is all I can do when it comes to testing/debugging. = Let me tag the maintainers. --=20 You are receiving this mail because: You are the assignee for the bug.=