From owner-freebsd-ports-bugs@freebsd.org Mon Nov 26 18:22:24 2018 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7E047113F427 for ; Mon, 26 Nov 2018 18:22:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 160ED80F3E for ; Mon, 26 Nov 2018 18:22:24 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id CCD27113F422; Mon, 26 Nov 2018 18:22:23 +0000 (UTC) Delivered-To: ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AA16B113F41E for ; Mon, 26 Nov 2018 18:22:23 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 49A8E80F36 for ; Mon, 26 Nov 2018 18:22:23 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 64BD11F9E3 for ; Mon, 26 Nov 2018 18:22:22 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAQIMMi4015122 for ; Mon, 26 Nov 2018 18:22:22 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAQIMMgE015117 for ports-bugs@FreeBSD.org; Mon, 26 Nov 2018 18:22:22 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 233540] emulators/virtualbox-ose panic on 12.0 PRERELEASE Date: Mon, 26 Nov 2018 18:22:21 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: aurel@bodenmann.biz X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: vbox@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: 160ED80F3E X-Spamd-Result: default: False [2.19 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_SPAM_LONG(0.79)[0.792,0]; NEURAL_SPAM_MEDIUM(0.52)[0.525,0]; ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US]; NEURAL_SPAM_SHORT(0.87)[0.869,0] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Nov 2018 18:22:24 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233540 Bug ID: 233540 Summary: emulators/virtualbox-ose panic on 12.0 PRERELEASE Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: vbox@FreeBSD.org Reporter: aurel@bodenmann.biz Assignee: vbox@FreeBSD.org Flags: maintainer-feedback?(vbox@FreeBSD.org) I'm opening a new PR since I'm not sure, if my problem is related to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230460 or not (seems to= me as if it isn't). I get an instant kernel panic when I start vboxwebsrv or a VM= on a 12.0 PRERELEASE system: /var/crash# uname -a FreeBSD Server 12.0-PRERELEASE FreeBSD 12.0-PRERELEASE #2 r328635M: Fri Nov= 23 14:32:30 UTC 2018 root@Server:/usr/obj/usr/src/amd64.amd64/sys/GENERIC= =20 amd64 Virtualbox has been rebuilt: /var/crash# pkg info -f virtualbox-ose\* | egrep "^Name|^Installed" Name : virtualbox-ose Installed on : Sat Nov 24 10:05:11 2018 UTC Name : virtualbox-ose-kmod Installed on : Sat Nov 24 10:05:08 2018 UTC r482464 (see https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D230460) is installed /usr/ports/emulators/virtualbox-ose/files# ll patch-src-VBox-HostDrivers-VBoxNetFlt-freebsd-files_vboxnetflt -rw-r--r-- 1 root wheel 638B Oct 20 04:42 patch-src-VBox-HostDrivers-VBoxNetFlt-freebsd-files_vboxnetflt I even disabled SMAP /var/crash# cat /boot/loader.conf | grep hw.cpu_stdext_disable hw.cpu_stdext_disable=3D0x00100000 Still, the system crashes instantly: /var/crash# less core.txt.3 Server dumped core - see /var/crash/vmcore.3 Sun Nov 25 18:01:56 UTC 2018 FreeBSD Server 12.0-PRERELEASE FreeBSD 12.0-PRERELEASE #2 r328635M: Fri Nov= 23 14:32:30 UTC 2018 root@Server:/usr/obj/usr/src/amd64.amd64/sys/GENERIC= =20 amd64 panic: page fault GNU gdb 6.1.1 [FreeBSD] Copyright 2004 Free Software Foundation, Inc. GDB is free software, covered by the GNU General Public License, and you are welcome to change it and/or distribute copies of it under certain condition= s. Type "show copying" to see the conditions. There is absolutely no warranty for GDB. Type "show warranty" for details. This GDB was configured as "amd64-marcel-freebsd"... Unread portion of the kernel message buffer: Fatal trap 12: page fault while in kernel mode cpuid =3D 1; apic id =3D 02 fault virtual address =3D 0x28 fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80c9a34d stack pointer =3D 0x28:0xfffffe00591306b0 frame pointer =3D 0x28:0xfffffe00591306e0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 64337 (VBoxNetAdpCtl) trap number =3D 12 panic: page fault cpuid =3D 1 time =3D 1543168840 KDB: stack backtrace: #0 0xffffffff80bed147 at kdb_backtrace+0x67 #1 0xffffffff80ba1253 at vpanic+0x1a3 #2 0xffffffff80ba10a3 at panic+0x43 #3 0xffffffff810793ff at trap_fatal+0x35f #4 0xffffffff81079459 at trap_pfault+0x49 #5 0xffffffff81078a7e at trap+0x29e #6 0xffffffff810549f5 at calltrap+0x8 #7 0xffffffff82cd902a at vboxNetAdpOsCreate+0x1a #8 0xffffffff82cd964c at vboxNetAdpCreate+0xcc #9 0xffffffff82cd9526 at VBoxNetAdpFreeBSDCtrlioctl+0x86 #10 0xffffffff80a583bd at devfs_ioctl+0xad #11 0xffffffff811ffa6e at VOP_IOCTL_APV+0x7e #12 0xffffffff80c7f3c4 at vn_ioctl+0x1a4 #13 0xffffffff80a5899f at devfs_ioctl_f+0x1f #14 0xffffffff80c0a64d at kern_ioctl+0x26d #15 0xffffffff80c0a36e at sys_ioctl+0x15e #16 0xffffffff81079f92 at amd64_syscall+0x352 #17 0xffffffff810552dd at fast_syscall_common+0x101 Uptime: 1d6h15m53s Any ideas? --=20 You are receiving this mail because: You are the assignee for the bug.=