From owner-freebsd-current@FreeBSD.ORG Sat Jan 17 15:10:18 2015 Return-Path: Delivered-To: current@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C64C5868 for ; Sat, 17 Jan 2015 15:10:18 +0000 (UTC) Received: from oslo.ath.cx (oslo.ath.cx [IPv6:2a01:4f8:200:42e4::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "oslo.ath.cx", Issuer "oslo.ath.cx" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 44AB81C9 for ; Sat, 17 Jan 2015 15:10:17 +0000 (UTC) Received: by oslo.ath.cx (OpenSMTPD) with ESMTP id b7ca0c45; for ; Sat, 17 Jan 2015 16:10:15 +0100 (CET) Date: Sat, 17 Jan 2015 16:10:15 +0100 From: "Herbert J. Skuhra" To: current@FreeBSD.org Subject: Re: svn commit: r272568 - head/sys/net Message-ID: <20150117151015.GA63617@oslo.ath.cx> References: <201410051943.s95JhbCp073535@svn.freebsd.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <201410051943.s95JhbCp073535@svn.freebsd.org> User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 17 Jan 2015 15:10:18 -0000 On Sun, Oct 05, 2014 at 07:43:37PM +0000, Hiroki Sato wrote: > Author: hrs > Date: Sun Oct 5 19:43:37 2014 > New Revision: 272568 > URL: https://svnweb.freebsd.org/changeset/base/272568 > > Log: > Virtualize if_bridge(4) cloner. Hi, after this commit I always get a kernel panic when I stop my vnet jails. With a recent kernel this only happens when if_bridge is loaded as a module. savecore: writing core to /var/crash/vmcore.4 savecore: reboot after panic: mtx_lock() of destroyed mutex @ /usr/src/sys/modules/if_bridge/../../net/if_bridge.c:1814 dump (textdump=0) at pcpu.h:219 #1 0xffffffff802ded1e in db_dump (dummy=, dummy2=0, dummy3=0, dummy4=0x0) at /usr/src/sys/ddb/db_command.c:543 #2 0xffffffff802de7bd in db_command (cmd_table=0x0) at /usr/src/sys/ddb/db_command.c:449 #3 0xffffffff802de534 in db_command_loop () at /usr/src/sys/ddb/db_command.c:502 #4 0xffffffff802e0fc0 in db_trap (type=, code=0) at /usr/src/sys/ddb/db_main.c:251 #5 0xffffffff8051e5f1 in kdb_trap (type=3, code=0, tf=) at /usr/src/sys/kern/subr_kdb.c:654 #6 0xffffffff8071c2e2 in trap (frame=0xfffffe00980ae680) at /usr/src/sys/amd64/amd64/trap.c:542 #7 0xffffffff80700652 in calltrap () at /usr/src/sys/amd64/amd64/exception.S:231 #8 0xffffffff8051dcee in kdb_enter (why=0xffffffff807e37e8 "panic", msg=) at cpufunc.h:63 #9 0xffffffff804e54e9 in vpanic (fmt=, ap=) at /usr/src/sys/kern/kern_shutdown.c:739 #10 0xffffffff804e5339 in kassert_panic (fmt=) at /usr/src/sys/kern/kern_shutdown.c:634 #11 0xffffffff804d038a in __mtx_lock_flags (c=0xfffffe00016ca278, opts=0, file=0xffffffff8141cb48 "/usr/src/sys/modules/if_bridge/../../net/if_bridge.c", line=1814) at /usr/src/sys/kern +/kern_mutex.c:215 #12 0xffffffff8141a510 in bridge_ifdetach () from /boot/kernel/if_bridge.ko #13 0xffffffff805b1c0a in if_detach_internal (ifp=0xfffff80005c50000, vmove=0) at /usr/src/sys/net/if.c:963 #14 0xffffffff805b188f in if_detach (ifp=0xffffffff80b98530) at /usr/src/sys/net/if.c:894 #15 0xffffffff805bdfc6 in lo_clone_destroy (ifp=0xfffff800059a4800) at /usr/src/sys/net/if_loop.c:117 #16 0xffffffff805b955f in if_clone_destroyif (ifc=0xfffff8000538a580, ifp=0x0) at /usr/src/sys/net/if_clone.c:684 #17 0xffffffff805b9e48 in if_clone_detach (ifc=) at /usr/src/sys/net/if_clone.c:458 #18 0xffffffff805bde56 in vnet_loif_uninit (unused=) at /usr/src/sys/net/if_loop.c:168 #19 0xffffffff805cf217 in vnet_destroy (vnet=0xfffff800053fc6c0) at /usr/src/sys/net/vnet.c:593 #20 0xffffffff804b9fad in prison_deref (pr=0xffffffff80a8b3b0, flags=Cannot access memory at address 0x3 ) at /usr/src/sys/kern/kern_jail.c:2582 #21 0xffffffff804bb637 in sys_jail_remove (td=, uap=) at /usr/src/sys/kern/kern_jail.c:2248 #22 0xffffffff8071d21a in amd64_syscall (td=0xfffff80005c50000, traced=0) at subr_syscall.c:133 #23 0xffffffff8070093b in Xfast_syscall () This system is running in Virtualbox. Is this a known issue? -- Herbert