[Bug 275731] panic in zfs: VERIFY(buf[i] == 0) failed
- In reply to: bugzilla-noreply_a_freebsd.org: "[Bug 275731] panic in zfs: VERIFY(buf[i] == 0) failed"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 14 Dec 2023 14:05:03 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=275731
--- Comment #1 from John F. Carr <jfc@mit.edu> ---
The object that failed verification prints as
*db =
{db = {
db_object = 144497, db_offset = 0, db_size = 512,
db_data = 0xffffa00184020a00},
db_objset = 0xffffa00004ac3000,
db_dnode_handle = 0xffffa0019f8cd618, db_parent = 0xffffa0015a5557f8,
db_hash_next = 0x0,
db_link = {avl_child = {0x0, 0x0}, avl_pcb = 1}, db_blkid = 0,
db_blkptr = 0xffff0000f9cab240, db_level = 0 '\000',
db_rwlock = {
lock_object = {
lo_name = 0xffff000000c16eaf "db->db_rwlock",
lo_flags = 577830912, lo_data = 0,
lo_witness = 0x0}, sx_lock = 1},
db_buf = 0xffffa000bb982480,
db_mtx = {
lock_object = {
lo_name = 0xffff000000bf395d "db->db_mtx", lo_flags = 577830912,
lo_data = 0, lo_witness = 0x0},
sx_lock = 18446462602811342848},
db_state = DB_CACHED,
db_holds = {
rc_count = 2, rc_mtx = {
lock_object = {
lo_name = 0xffff000000c8cca3 "rc->rc_mtx",
lo_flags = 577830912, lo_data = 0, lo_witness = 0x0},
sx_lock = 1},
rc_tree = {
avl_root = 0x0,
avl_compar = 0xffff000000162ee0 <zfs_refcount_compare>,
avl_offset = 0,
avl_numnodes = 0},
rc_removed = {
list_size = 48, list_offset = 0,
list_head = {
list_next = 0xffffa0003d1c3c40, list_prev = 0xffffa0003d1c3c40}
},
rc_removed_count = 0, rc_tracked = 0},
db_changed = {
cv_description = 0xffff000000c0b27b "db->db_changed", cv_waiters = 0},
db_data_pending = 0x0,
db_dirty_records = {
list_size = 408, list_offset = 40,
list_head = {
list_next = 0xffffa0003d1c3c80, list_prev = 0xffffa0003d1c3c80}},
db_cache_link = {list_next = 0x0, list_prev = 0x0},
db_caching_status = DB_NO_CACHE,
db_hash = 3780604374730761540, db_user = 0x0,
db_user_immediate_evict = 0 '\000',
db_freed_in_flight = 0 '\000', db_pending_evict = 0 '\000',
db_dirtycnt = 0 '\000',
db_partial_read = 1 '\001'}
The db_data field points to something kgdb can't read from the core dump
("Cannot access memory at address 0xffffa00184020a00").
--
You are receiving this mail because:
You are the assignee for the bug.