From owner-freebsd-current@FreeBSD.ORG Wed Oct 5 02:49:05 2005 Return-Path: X-Original-To: current@freebsd.org Delivered-To: freebsd-current@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2225716A41F; Wed, 5 Oct 2005 02:49:05 +0000 (GMT) (envelope-from thompsa@freebsd.org) Received: from heff.fud.org.nz (60-234-149-201.bitstream.orcon.net.nz [60.234.149.201]) by mx1.FreeBSD.org (Postfix) with ESMTP id 915C443D76; Wed, 5 Oct 2005 02:49:04 +0000 (GMT) (envelope-from thompsa@freebsd.org) Received: by heff.fud.org.nz (Postfix, from userid 1001) id 535EC1CCD4; Wed, 5 Oct 2005 15:49:03 +1300 (NZDT) Date: Wed, 5 Oct 2005 15:49:03 +1300 From: Andrew Thompson To: FreeBSD Current Message-ID: <20051005024903.GA72743@heff.fud.org.nz> Mail-Followup-To: Andrew Thompson , FreeBSD Current , Brooks Davis Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.4.2.1i Cc: Brooks Davis Subject: panic: ifc_free_unit: bit is already cleared X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Oct 2005 02:49:05 -0000 Hi, I have found a repeatable panic with network device cloning, unfortunatly I am unable to dump on this box. This is sparc64 with a 2 day old current. [root@dev]# kldload if_vlan [root@dev]# for i in `jot 100 1`; do for> ifconfig xl0.$i create for> done [root@dev]# kldunload if_vlan panic: ifc_free_unit: bit is already cleared cpuid = 0 KDB: enter: panic [thread pid 4527 tid 100089 ] Stopped at kdb_enter+0x3c: ta %xcc, 1 db> trace Tracing pid 4527 tid 100089 td 0xfffff8000ab8e4c0 panic() at panic+0x164 ifc_free_unit() at ifc_free_unit+0x50 vlan_clone_destroy() at vlan_clone_destroy+0x8c vlan_modevent() at vlan_modevent+0x44 module_unload() at module_unload+0x60 linker_file_unload() at linker_file_unload+0x7c kern_kldunload() at kern_kldunload+0x84 kldunloadf() at kldunloadf+0x1c syscall() at syscall+0x2dc -- syscall (444, FreeBSD ELF64, kldunloadf) %o7=0x100b58 -- userland() at 0x40391348 user trace: trap %o7=0x100b58 pc 0x40391348, sp 0x7fdffffdde1 pc 0x100894, sp 0x7fdffffe2c1 pc 0x40209474, sp 0x7fdffffe381 done db>