From owner-freebsd-bugs@FreeBSD.ORG Sun Feb 23 20:00:01 2014 Return-Path: Delivered-To: freebsd-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 76E8069C for ; Sun, 23 Feb 2014 20:00:01 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 6360E1FF6 for ; Sun, 23 Feb 2014 20:00:01 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id s1NK01NT011972 for ; Sun, 23 Feb 2014 20:00:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.8/8.14.8/Submit) id s1NK01Qv011971; Sun, 23 Feb 2014 20:00:01 GMT (envelope-from gnats) Date: Sun, 23 Feb 2014 20:00:01 GMT Message-Id: <201402232000.s1NK01Qv011971@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org Cc: From: Tommy Scheunemann Subject: Re: kern/186986: nullfs mount options broken X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: Tommy Scheunemann List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 23 Feb 2014 20:00:01 -0000 The following reply was made to PR kern/186986; it has been noted by GNATS. From: Tommy Scheunemann To: bug-followup@FreeBSD.org Cc: Subject: Re: kern/186986: nullfs mount options broken Date: Sun, 23 Feb 2014 20:54:58 +0100 --Sig_/K/YR3CwiVkCtchtcgf4LCL0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Hello :) small addition to prevent any confusion: mount -t nullfs -o ... works as expected. mount_nullfs -o ... doesn't. So my guess is that the "mount_nullfs" binary doesn't like some options. Kindest regards On Sun, 23 Feb 2014 19:50:00 GMT FreeBSD-gnats-submit@FreeBSD.org wrote: > Thank you very much for your problem report. > It has the internal identification `kern/186986'. > The individual assigned to look at your > report is: freebsd-bugs.=20 >=20 > You can access the state of your problem report at any time > via this link: >=20 > http://www.freebsd.org/cgi/query-pr.cgi?pr=3D186986 >=20 > >Category: kern > >Responsible: freebsd-bugs > >Synopsis: nullfs mount options broken > >Arrival-Date: Sun Feb 23 19:50:00 UTC 2014 --Sig_/K/YR3CwiVkCtchtcgf4LCL0 Content-Type: application/pgp-signature; name=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJTClIVAAoJEPZHWCGodi3EVq0IAKH3msUQuYIksa01OZWLam8t yT6Roe6mg66ovAXVzIE3255tMcYnuW95kvpZq24/aPb1pKLzs4q5ikSjnuWHImmH t3kMcPhuhXzjtOebpxNHI6feHdCuYtpSLRCjh1I1tFyI5Z1JteQXF2RxjUVNkW8C VmZAuVQv7hnl40Xs6DwGZQW0+WLIzyMRc/zXEwkNWPXQiDbn315DOqxRasGIBl4U ZYC9GHNqkdbld856MbOHskjYqRe8PXEUg1576X5IDMxQacYbXm+UeMzG+9gK0TQG B+gNyjEqaxlqIjoNrsSBJisPJP1fs/DDrqh8uP76iwZ4IIC84YRsjMWH3AxPAg0= =H0+v -----END PGP SIGNATURE----- --Sig_/K/YR3CwiVkCtchtcgf4LCL0--