[Bug 259034] emulators/virtualbox-ose FreeBSD guest panics 14.0-CURRENT host
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 09 Oct 2021 23:10:02 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=259034 Bug ID: 259034 Summary: emulators/virtualbox-ose FreeBSD guest panics 14.0-CURRENT host Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: vbox@FreeBSD.org Reporter: truckman@FreeBSD.org Assignee: vbox@FreeBSD.org Flags: maintainer-feedback?(vbox@FreeBSD.org) Created attachment 228550 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=228550&action=edit patch to avoid virtualbox host epoch panic If a 14.0-CURRENT FreeBSD guest does any network I/O, it causes this epoch-related panic on the 14.0-CURRENT FreeBSD host. panic: Assertion in_epoch(net_epoch_preempt) failed at /usr/src/sys/net/netisr.c:1110 cpuid = 8 time = 1628234931 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01a42b31c0 vpanic() at vpanic+0x187/frame 0xfffffe01a42b3220 panic() at panic+0x43/frame 0xfffffe01a42b3280 netisr_dispatch_src() at netisr_dispatch_src+0x3c2/frame 0xfffffe01a42b32e0 ether_input() at ether_input+0x9d/frame 0xfffffe01a42b3340 vboxNetFltPortOsXmit() at vboxNetFltPortOsXmit+0x241/frame 0xfffffe01a42b33e0 vboxNetFltPortXmit() at vboxNetFltPortXmit+0x145/frame 0xfffffe01a42b3420 __stop_set_sysuninit_set() at 0xffffffff832c9bbe/frame 0xfffffe01a42b3510 __stop_set_sysuninit_set() at 0xffffffff832c514a/frame 0xfffffe01a42b35b0 __stop_set_sysuninit_set() at 0xffffffff832c47d6/frame 0xfffffe01a42b3650 __stop_set_sysuninit_set() at 0xffffffff831d8bbc/frame 0xfffffe01a42b36a0 supdrvIOCtlInnerUnrestricted() at supdrvIOCtlInnerUnrestricted+0x14a1/frame 0xfffffe01a42b3710 VBoxDrvFreeBSDIOCtl() at VBoxDrvFreeBSDIOCtl+0xcc/frame 0xfffffe01a42b3780 VBoxDrvFreeBSDIOCtlSMAP() at VBoxDrvFreeBSDIOCtlSMAP+0x30/frame 0xfffffe01a42b3800 devfs_ioctl() at devfs_ioctl+0xcd/frame 0xfffffe01a42b3850 vn_ioctl() at vn_ioctl+0x131/frame 0xfffffe01a42b3960 devfs_ioctl_f() at devfs_ioctl_f+0x1e/frame 0xfffffe01a42b3980 kern_ioctl() at kern_ioctl+0x202/frame 0xfffffe01a42b39f0 sys_ioctl() at sys_ioctl+0x124/frame 0xfffffe01a42b3ac0 amd64_syscall() at amd64_syscall+0x12e/frame 0xfffffe01a42b3bf0 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01a42b3bf0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip = 0x80038856a, rsp = 0x7fffd9a9dcf8, rbp = 0x7fffd9a9dd00 --- KDB: enter: panic This is an old stack trace, so the addresses have likely changed. The guest network configuration in VirtualBox: Bridged Adapter igb0 Paravirtualized Network (virtio-net) -- You are receiving this mail because: You are the assignee for the bug.