Hi, I?m afraid the last Epoch fix for bridge is not solving the problem ( or perhaps creates a new ). This seems to happen when the jail epair is added to the bridge. Removing both fixes solves the problem. Peter kernel trap 12 with interrupts disabled Fatal trap 12: page fault while in kernel mode cpuid = 6; apic id = 06 fault virtual address = 0xc10 fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff80695e76 stack pointer = 0x28:0xfffffe00bf14e6e0 frame pointer = 0x28:0xfffffe00bf14e720 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = resume, IOPL = 0 current process = 1686 (jail) trap number = 12 panic: page fault cpuid = 6 time = 1605811310 KDB: stack backtrace: #0 0xffffffff8069bb85 at kdb_backtrace+0x65 #1 0xffffffff80650a4b at vpanic+0x17b #2 0xffffffff806508c3 at panic+0x43 #3 0xffffffff809d0351 at trap_fatal+0x391 #4 0xffffffff809d03af at trap_pfault+0x4f #5 0xffffffff809cf9f6 at trap+0x286 #6 0xffffffff809a98c8 at calltrap+0x8 #7 0xffffffff80368a8d at ck_epoch_synchronize_wait+0x8d #8 0xffffffff80695c8a at epoch_wait_preempt+0xaa #9 0xffffffff80757d40 at vnet_if_init+0x120 #10 0xffffffff8078c994 at vnet_alloc+0x114 #11 0xffffffff8061e3f7 at kern_jail_set+0x1bb7 #12 0xffffffff80620190 at sys_jail_set+0x40 #13 0xffffffff809d0f07 at amd64_syscall+0x387 #14 0xffffffff809aa1ee at fast_syscall_common+0xf8 -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/pkcs7-signature Size: 2348 bytes Desc: not available URL: <http://lists.freebsd.org/pipermail/freebsd-stable/attachments/20201120/c91a3927/attachment.bin>