From owner-freebsd-fs@FreeBSD.ORG Sun Apr 20 23:04:48 2014 Return-Path: Delivered-To: freebsd-fs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B14CE751; Sun, 20 Apr 2014 23:04:48 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 84B6D1D49; Sun, 20 Apr 2014 23:04:48 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.8/8.14.8) with ESMTP id s3KN4miK023986; Sun, 20 Apr 2014 23:04:48 GMT (envelope-from rmacklem@freefall.freebsd.org) Received: (from rmacklem@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s3KN4m10023982; Sun, 20 Apr 2014 23:04:48 GMT (envelope-from rmacklem) Date: Sun, 20 Apr 2014 23:04:48 GMT Message-Id: <201404202304.s3KN4m10023982@freefall.freebsd.org> To: rmacklem@FreeBSD.org, freebsd-fs@FreeBSD.org, rmacklem@FreeBSD.org From: rmacklem@FreeBSD.org Subject: Re: kern/185232: [nfs] [patch] Kernel page fault in jailed() via vn_stat() when using uio_td from nfsrv_read() X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 20 Apr 2014 23:04:48 -0000 Synopsis: [nfs] [patch] Kernel page fault in jailed() via vn_stat() when using uio_td from nfsrv_read() Responsible-Changed-From-To: freebsd-fs->rmacklem Responsible-Changed-By: rmacklem Responsible-Changed-When: Sun Apr 20 23:03:30 UTC 2014 Responsible-Changed-Why: I'll take this one. http://www.freebsd.org/cgi/query-pr.cgi?pr=185232