From owner-freebsd-bugs@FreeBSD.ORG Wed Sep 20 18:20:29 2006 Return-Path: X-Original-To: freebsd-bugs@hub.freebsd.org Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9903916A47B for ; Wed, 20 Sep 2006 18:20:29 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id DE44A43D5C for ; Wed, 20 Sep 2006 18:20:25 +0000 (GMT) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.13.4/8.13.4) with ESMTP id k8KIKPmM067152 for ; Wed, 20 Sep 2006 18:20:25 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.13.4/8.13.4/Submit) id k8KIKPSf067151; Wed, 20 Sep 2006 18:20:25 GMT (envelope-from gnats) Date: Wed, 20 Sep 2006 18:20:25 GMT Message-Id: <200609201820.k8KIKPSf067151@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org From: Kris Kennaway Cc: Subject: Re: kern/103432: panic: nfssvc_nfsd(): debug.mpsafenet=1 && Giant X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Kris Kennaway List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Sep 2006 18:20:29 -0000 The following reply was made to PR kern/103432; it has been noted by GNATS. From: Kris Kennaway To: Daniel Rudy Cc: freebsd-gnats-submit@FreeBSD.org Subject: Re: kern/103432: panic: nfssvc_nfsd(): debug.mpsafenet=1 && Giant Date: Wed, 20 Sep 2006 14:15:09 -0400 --J2SCkAp4GZ/dPZZf Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Wed, Sep 20, 2006 at 03:34:20PM +0000, Daniel Rudy wrote: > This computer is configured as a NFS server and it also has IPSEC enabled. When a NFS client accesses this server, the server imediately panics with the following error "panic: nfssvc_nfsd(): debug.mpsafenet=1 && Giant" and reboots hanging the client. On a release 6.0 machine, debug.mpsafe is forced to 0 because IPSEC requires Giant. > >How-To-Repeat: This may have been fixed after 6.1-RELEASE, but it's impossible to say without a traceback. Please follow the directions in the chapter on kernel debugging in the developers handbook and report back. > On a 6.1 system, enable IPSEC and NFS then try to access the server remotely. > >Fix: > Can't. The OID for debug.mpsafenet is readonly. It's a tunable, you can set it in /boot/loader.conf at boot time. Kris --J2SCkAp4GZ/dPZZf Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (FreeBSD) iD8DBQFFEYUtWry0BWjoQKURArdMAJ91mPvWFrNEUAB3J90uX2RkLga81QCeOakw /oHcANBZ61JG3mcroiuv10w= =jald -----END PGP SIGNATURE----- --J2SCkAp4GZ/dPZZf--