From nobody Sat Oct 9 23:10:02 2021 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id A2CB512D3CF4 for ; Sat, 9 Oct 2021 23:10:02 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4HRgkf47D7z3Dym for ; Sat, 9 Oct 2021 23:10:02 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 6A91E22F26 for ; Sat, 9 Oct 2021 23:10:02 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 199NA2DX045251 for ; Sat, 9 Oct 2021 23:10:02 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 199NA2KD045250 for ports-bugs@FreeBSD.org; Sat, 9 Oct 2021 23:10:02 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 259034] emulators/virtualbox-ose FreeBSD guest panics 14.0-CURRENT host Date: Sat, 09 Oct 2021 23:10:02 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: truckman@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: vbox@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D259034 Bug ID: 259034 Summary: emulators/virtualbox-ose FreeBSD guest panics 14.0-CURRENT host Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: vbox@FreeBSD.org Reporter: truckman@FreeBSD.org Assignee: vbox@FreeBSD.org Flags: maintainer-feedback?(vbox@FreeBSD.org) Created attachment 228550 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D228550&action= =3Dedit patch to avoid virtualbox host epoch panic If a 14.0-CURRENT FreeBSD guest does any network I/O, it causes this epoch-related panic on the 14.0-CURRENT FreeBSD host. panic: Assertion in_epoch(net_epoch_preempt) failed at /usr/src/sys/net/netisr.c:1110 cpuid =3D 8 time =3D 1628234931 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe01a42b3= 1c0 vpanic() at vpanic+0x187/frame 0xfffffe01a42b3220 panic() at panic+0x43/frame 0xfffffe01a42b3280 netisr_dispatch_src() at netisr_dispatch_src+0x3c2/frame 0xfffffe01a42b32e0 ether_input() at ether_input+0x9d/frame 0xfffffe01a42b3340 vboxNetFltPortOsXmit() at vboxNetFltPortOsXmit+0x241/frame 0xfffffe01a42b33= e0 vboxNetFltPortXmit() at vboxNetFltPortXmit+0x145/frame 0xfffffe01a42b3420 __stop_set_sysuninit_set() at 0xffffffff832c9bbe/frame 0xfffffe01a42b3510 __stop_set_sysuninit_set() at 0xffffffff832c514a/frame 0xfffffe01a42b35b0 __stop_set_sysuninit_set() at 0xffffffff832c47d6/frame 0xfffffe01a42b3650 __stop_set_sysuninit_set() at 0xffffffff831d8bbc/frame 0xfffffe01a42b36a0 supdrvIOCtlInnerUnrestricted() at supdrvIOCtlInnerUnrestricted+0x14a1/frame 0xfffffe01a42b3710 VBoxDrvFreeBSDIOCtl() at VBoxDrvFreeBSDIOCtl+0xcc/frame 0xfffffe01a42b3780 VBoxDrvFreeBSDIOCtlSMAP() at VBoxDrvFreeBSDIOCtlSMAP+0x30/frame 0xfffffe01a42b3800 devfs_ioctl() at devfs_ioctl+0xcd/frame 0xfffffe01a42b3850 vn_ioctl() at vn_ioctl+0x131/frame 0xfffffe01a42b3960 devfs_ioctl_f() at devfs_ioctl_f+0x1e/frame 0xfffffe01a42b3980 kern_ioctl() at kern_ioctl+0x202/frame 0xfffffe01a42b39f0 sys_ioctl() at sys_ioctl+0x124/frame 0xfffffe01a42b3ac0 amd64_syscall() at amd64_syscall+0x12e/frame 0xfffffe01a42b3bf0 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe01a42b3bf0 --- syscall (54, FreeBSD ELF64, sys_ioctl), rip =3D 0x80038856a, rsp =3D 0x7fffd9a9dcf8, rbp =3D 0x7fffd9a9dd00 --- KDB: enter: panic This is an old stack trace, so the addresses have likely changed. The guest network configuration in VirtualBox: Bridged Adapter igb0 Paravirtualized Network (virtio-net) --=20 You are receiving this mail because: You are the assignee for the bug.=