From nobody Sun Dec 8 17:10:24 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Y5s292QdSz5gtbq for ; Sun, 08 Dec 2024 17:10:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Y5s291F5yz3wnQ for ; Sun, 8 Dec 2024 17:10:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1733677825; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=9VHyiF7100Gl+wOdmPlS4EZMGEI7RyAQH4uat+0NeHE=; b=B+CBB1gOgnxtp0WDkkFZtAu8Gf6ApNVsjs2mXnp4quJxd0ALGaw4YfzQs9aDI/KCfwPMGX HtLhYQY1CR8/z7SBIv/wWB/y3Yije8LYsN4mqKhAWvcIZMUJp3+L2sCBBJuyDT1nDfJhQu yqp6HYLq4vkAoa/1h/pvU5Pevc1K0zZZe7Oty+uR20lOcJ/8pH3stAaUjotuOx2vjg7ljj e66mPwkyKeqFv3Vfkvbn0qId57C3d9uFNzdNkUyy1vyb8IU/tcCMYyZ+FR6XIGr0IAT7W/ 4G1I8CX38Q5NHgF+Ph7HaMFx8OUY1U4ar1m48PJkuimKxvE42UCKUfY1Gu7uRw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1733677825; a=rsa-sha256; cv=none; b=MtKaEaFkTcKTsJNQue83arcR+QNRJJg58MlqhGgpz6g8rkE0tTOR1QpBBM0Dtlms/swGy5 Qk7C10yDszKKy032b4rSNt2CWiSifPKYlNLrUp5/cdGm6j0J2BUdNmJZAVo7oxghk2HBPJ egsOgFgoddq1mSXlNSR97/iTuW8us2g9+kRZpDe+05VNPjllMCUpNrd7IFztio9yq37NBb Gp2moJYn/qkbmCkp4g5xSN7DcyjZXDQGYuBvostO5vAsp74q05lC4EBhdubt8TXf8SGLSX WH/7NEUHU7JTQE+QaZMHd5ugcLkF0KW0eNBkHehD8uvsN0isORwkYnL1liqZHg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Y5s290sGgz11Mw for ; Sun, 8 Dec 2024 17:10:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4B8HAPDe074536 for ; Sun, 8 Dec 2024 17:10:25 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4B8HAPGx074535 for bugs@FreeBSD.org; Sun, 8 Dec 2024 17:10:25 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 282156] page fault while in kernel mode after 14.0-Release to 14.1-Release upgrade Date: Sun, 08 Dec 2024 17:10:24 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.1-RELEASE X-Bugzilla-Keywords: crash, regression X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: rmacklem@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282156 --- Comment #9 from Rick Macklem --- (In reply to Rick Macklem from comment #8) OK, I got the packet traces. It appears that the server is doing a CB_RECALL_ANY (which is not currently supported by the client) and that is causing the crash. It looks like the code should reply NFSERR_NOTSUPP, so I cannot spot an obvious bug. I do not currently have a server that does this callback, but I should be able to hack one to-gether to do testing with. I really should implement the callback. Not sure why 14.0 works and 14.1 does not? If you need to upgrade to 14.1, you could try a couple of workarounds: 1 - Try running the client without the nfscbd daemon (Just delete the nfscbd_enable=3D"YES" line from /etc/rc.conf and reboot it.) or 2 - Use NFSv4.0 by specifying minorversion=3D0 on the mount command line. (It is possible that the default might have been 0 for 14.0. That would explain why the crash occurs on 14.1, but not 14.0.) If you do: # nfsstat -m on the 14.0 client, it will show you what minor version it is using. --=20 You are receiving this mail because: You are the assignee for the bug.=