From owner-freebsd-current@freebsd.org Sat Aug 29 07:39:03 2015 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A7D969C4A7A for ; Sat, 29 Aug 2015 07:39:03 +0000 (UTC) (envelope-from joel@vnode.se) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 908D6751 for ; Sat, 29 Aug 2015 07:39:03 +0000 (UTC) (envelope-from joel@vnode.se) Received: by mailman.ysv.freebsd.org (Postfix) id 8DE749C4A79; Sat, 29 Aug 2015 07:39:03 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8D7E89C4A77 for ; Sat, 29 Aug 2015 07:39:03 +0000 (UTC) (envelope-from joel@vnode.se) Received: from smtp.vnode.se (smtp.vnode.se [IPv6:2001:67c:40c:e3aa::5]) by mx1.freebsd.org (Postfix) with ESMTP id 52B0474A; Sat, 29 Aug 2015 07:39:03 +0000 (UTC) (envelope-from joel@vnode.se) Received: from ymer.vnode.se (h71n10-th-c-d4.ias.bredband.telia.com [81.234.63.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.vnode.se (Postfix) with ESMTPSA id C19EB147B6; Sat, 29 Aug 2015 09:39:00 +0200 (CEST) Date: Sat, 29 Aug 2015 09:38:59 +0200 From: Joel Dahl To: Sean Bruno Cc: current@freebsd.org Subject: Re: Kernel panic with fresh current, probably nfs related Message-ID: <20150829073859.GA847@ymer.vnode.se> Mail-Followup-To: Sean Bruno , current@freebsd.org References: <20150822115519.GA79434@ymer.vnode.se> <914810061.28949434.1440248260373.JavaMail.zimbra@uoguelph.ca> <55D8BEB6.7090202@freebsd.org> <20150824013636.GA1015@michelle.fasterthan.com> <55DB5FD8.1010308@freebsd.org> <20150825191006.GA89428@ymer.vnode.se> <55DCC816.603@freebsd.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <55DCC816.603@freebsd.org> User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 29 Aug 2015 07:39:03 -0000 On Tue, Aug 25, 2015 at 12:55:02PM -0700, Sean Bruno wrote: > > > On 08/25/15 12:10, Joel Dahl wrote: > >> > Seems to work. However, I cannot reproduce the user panic in the first > >> > place. What's the scenario that seems to work here? NFS seems happy > >> > with/without the patch so I'm not confident in anything we are doing her > >> > e. > > I see several patches here. Which one should I be using? > > This: > > Index: sys/dev/e1000/if_em.c > =================================================================== > --- sys/dev/e1000/if_em.c (revision 287087) > +++ sys/dev/e1000/if_em.c (working copy) > @@ -3044,7 +3044,7 @@ em_setup_interface(device_t dev, struct adapter *a > if_setioctlfn(ifp, em_ioctl); > if_setgetcounterfn(ifp, em_get_counter); > /* TSO parameters */ > - ifp->if_hw_tsomax = EM_TSO_SIZE; > + ifp->if_hw_tsomax = IP_MAXPACKET; > ifp->if_hw_tsomaxsegcount = EM_MAX_SCATTER; > ifp->if_hw_tsomaxsegsize = EM_TSO_SEG_SIZE; Using this patch, my nfs server has survived several installkernel/installworld cycles. -- Joel