On 22.4.2021. 13:42, Mark Kettenis wrote:
>> Date: Thu, 22 Apr 2021 13:09:34 +0200
>> From: Alexander Bluhm <alexander.bl...@gmx.net>
>>
>> On Thu, Apr 22, 2021 at 12:33:13PM +0200, Hrvoje Popovski wrote:
>>> r620-1# papnpaiancini:cc :p :op
>>> opooolo_llc_ac_caccahhceh_ei_eti_tieetmme_mm__amgamigacigci__cc_hccehhcekcekc::
>>> k :m  bmubmfubfuppflp llc pc pcuup  uf rfferree eel el iilsitss tm tom
>>> omddoidfiiifeifeidde:d ::i ti etietmme m
>>> a  daddardd rd0 r0
>>> xx0fxfffffffffffffddf88d08c0cc0c6c76afc9b3f04500400++01+61 610 6x0
>>> fx0fxffffffffffdffdf88d08
>>> 00020720d72a8c0049703eb!ef!e==!0=x009x59x95995b9ebbaee3ae3ae344ef54f5a4bff7db07990a9
>>
>> Wow.  3 CPUs panic in pool_cache_get() pool_cache_item_magic_check
>> simultaneously.  This makes me think we may have a bug there.
> 
> Note that POOL_DEBUG was disabled until very recently.  That may
> affect both:
> 
> 1. The point at which pool corruption is reported
> 

when i'm sending report i have witness enabled with
kern.pool_debug=1
kern.splassert=2

> 2. The benchmark results.

benchmark results are without pool_debug although differences are not so
big ..

to send panic without pool_debug and splassert?

Reply via email to