lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 6 Feb 2015 22:43:34 -0500
From:	Trond Myklebust <trond.myklebust@...marydata.com>
To:	Fengguang Wu <fengguang.wu@...el.com>
Cc:	LKML <linux-kernel@...r.kernel.org>, LKP <lkp@...org>
Subject: Re: [NFSv4.1] 6ae373394c4: kernel boot crash

On Fri, Feb 6, 2015 at 9:45 PM, Fengguang Wu <fengguang.wu@...el.com> wrote:
>
> Hi Trond,
>
> We noticed the below kernel crash on
>
> git://git.linux-nfs.org/projects/trondmy/linux-nfs.git testing
> commit 6ae373394c4257bad562817aa60464ff7fe8f9c4 ("NFSv4.1: Ask for no delegation on OPEN if using O_DIRECT")
>
>
> testbox/testcase/testparams: vm-vp-quantal-x86_64/boot/1
>
> 0e3b137fbf0f4ab9  6ae373394c4257bad562817aa6
> ----------------  --------------------------
>        fail:runs  %reproduction    fail:runs
>            |             |             |
>            :100          4%           2:46    dmesg.BUG:kernel_test_crashed
>
> The last dmesg lines before the kernel crash are
>
> [    0.274266] NET: Registered protocol family 1
> [    0.275236] RPC: Registered named UNIX socket transport module.
> [    0.276123] RPC: Registered udp transport module.
> [    0.276860] RPC: Registered tcp transport module.
> [    0.277617] RPC: Registered tcp NFSv4.1 backchannel transport module
>
> Thanks,
> Fengguang


Hi Fengguang,

I'm trying to reproduce this issue, but so far no luck. Do you have
any details on the test itself that you could share with me?

Thanks
   Trond

-- 
Trond Myklebust
Linux NFS client maintainer, PrimaryData
trond.myklebust@...marydata.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ