From owner-freebsd-fs@FreeBSD.ORG Sun Apr 20 12:55:26 2014 Return-Path: Delivered-To: freebsd-fs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D99AE2FC; Sun, 20 Apr 2014 12:55:26 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id ABB3D1C61; Sun, 20 Apr 2014 12:55:26 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.8/8.14.8) with ESMTP id s3KCtQtt032892; Sun, 20 Apr 2014 12:55:26 GMT (envelope-from rmacklem@freefall.freebsd.org) Received: (from rmacklem@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s3KCtPdx032891; Sun, 20 Apr 2014 12:55:25 GMT (envelope-from rmacklem) Date: Sun, 20 Apr 2014 12:55:25 GMT Message-Id: <201404201255.s3KCtPdx032891@freefall.freebsd.org> To: barber@mail.ru, rmacklem@FreeBSD.org, freebsd-fs@FreeBSD.org From: rmacklem@FreeBSD.org Subject: Re: kern/184771: [nfs] [panic] panic on nfs mount X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 20 Apr 2014 12:55:26 -0000 Synopsis: [nfs] [panic] panic on nfs mount State-Changed-From-To: open->closed State-Changed-By: rmacklem State-Changed-When: Sun Apr 20 12:53:06 UTC 2014 State-Changed-Why: I'm pretty sure this crash was fixed by r259765, which has been MFC'd to stable/9 as r261061. It was specific to an NFSv2 mount and the stack corruption only seemed to affect i386. If you experience a similar crash with an up-to-date stable/9 or 9.3 system (when released), please submit another PR. http://www.freebsd.org/cgi/query-pr.cgi?pr=184771