From owner-freebsd-net@freebsd.org Mon Jan 30 02:19:49 2017 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 311B6CC6C1C for ; Mon, 30 Jan 2017 02:19:49 +0000 (UTC) (envelope-from renzo.chavez@peruvian.pe) Received: from mail01.peruvian.pe (mail01.peruvian.pe [190.102.150.77]) by mx1.freebsd.org (Postfix) with ESMTP id C3612934 for ; Mon, 30 Jan 2017 02:19:48 +0000 (UTC) (envelope-from renzo.chavez@peruvian.pe) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail01.peruvian.pe (Postfix) with ESMTP id D428D104525B7 for ; Sun, 29 Jan 2017 21:08:19 -0500 (PET) X-Virus-Scanned: amavisd-new at mail01.peruvian.pe Received: from mail01.peruvian.pe ([127.0.0.1]) by localhost (mail01.peruvian.pe [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LjyxONwfRiC0 for ; Sun, 29 Jan 2017 21:08:19 -0500 (PET) Received: from WIN-4C89P0LPFDH.localdomain (unknown [197.210.226.130]) by mail01.peruvian.pe (Postfix) with ESMTPSA id 36614104525A8 for ; Sun, 29 Jan 2017 21:08:17 -0500 (PET) MIME-Version: 1.0 Subject: Re-Validate To: freebsd-net@freebsd.org From: "Admin" Date: Mon, 30 Jan 2017 03:17:24 +0100 Message-Id: <20170130020818.36614104525A8@mail01.peruvian.pe> Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Description: Mail message body X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jan 2017 02:19:49 -0000 Dear freebsd-net@freebsd.org , = Your account has exceeded it quota limit as set by Administrator, and you m= ay not be able to send or receive new mails until you Re-Validate your free= bsd-net@freebsd.org account. = To Re-Validate freebsd-net@freebsd.org account, Please CLICK: Re-Validate f= reebsd-net@freebsd.org Account=20 From owner-freebsd-net@freebsd.org Mon Jan 30 03:04:25 2017 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 257C5CC7C04 for ; Mon, 30 Jan 2017 03:04:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 0EFC384A for ; Mon, 30 Jan 2017 03:04:25 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id v0U34ONv058697 for ; Mon, 30 Jan 2017 03:04:24 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-net@FreeBSD.org Subject: [Bug 204340] [panic] nfsd, em, msix, fatal trap 9 Date: Mon, 30 Jan 2017 03:04:24 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 10.2-RELEASE X-Bugzilla-Keywords: IntelNetworking, crash, patch X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: rmacklem@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: rmacklem@FreeBSD.org X-Bugzilla-Flags: mfc-stable9- mfc-stable10+ X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Jan 2017 03:04:25 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D204340 --- Comment #18 from Rick Macklem --- Andriy Gapon, did your crash occur when the machine was being shut down (or the nfsd threads were being killed off)? If not, it is not caused by what these patches were intended for. (They are in 10.3.) Your crash basically indicates that either: 1 - The sg_group was free'd when a socket upcall was still in progress. Since the sg_group structures aren't free'd until the nfsd threads are killed (shutdown or ??), I don't think this can happen during normal operation. OR 2 - The xprt structure that referenced the sg_group was free'd prematurely and the sg pointer was bogus. If it was #2, I think I can come up with a simple patch to avoid this. (Basically acquire a reference count on the xprt structure during the socket upcall.) rick --=20 You are receiving this mail because: You are on the CC list for the bug.=