lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1217860597.12535.2.camel@localhost>
Date:	Tue, 05 Aug 2008 00:36:37 +1000
From:	Michael Ellerman <michael@...erman.id.au>
To:	Paul Collins <paul@...ly.ondioline.org>
Cc:	Neil Brown <neilb@...e.de>,
	"J. Bruce Fields" <bfields@...ldses.org>, linuxppc-dev@...abs.org,
	nfsv4@...ux-nfs.org, linux-kernel@...r.kernel.org
Subject: Re: nfsd, v4: oops in find_acceptable_alias, ppc32 Linux,
	post-2.6.27-rc1

On Mon, 2008-08-04 at 22:00 +1200, Paul Collins wrote:
> Paul Collins <paul@...ly.ondioline.org> writes:
> 
> > Neil Brown <neilb@...e.de> writes:
> >> Could you try removing the 'static' declaration for nfsd_acceptable
> >> and recompile?
> >> Or maybe try a different compiler?
> >
> > I will give these a try this evening.
> 
> I built myself a nice new cross compiler:
> 
>         powerpc-linux-gnu-gcc-4.1 (GCC) 4.1.3 20080623 (prerelease) (Debian 4.1.2-23)
> 
> and rebuilt 94ad374a0751f40d25e22e036c37f7263569d24c.  Running that on
> the server and 2.6.26 on the client, I got yet another Oops.  This one
> locked the machine up pretty good, so all I have is a picture:
> 
> http://ondioline.org/~paul/DSCN1608.JPG

Wow.

Can you try building a kernel on the server? ie. not over NFS.

cheers

-- 
Michael Ellerman
OzLabs, IBM Australia Development Lab

wwweb: http://michael.ellerman.id.au
phone: +61 2 6212 1183 (tie line 70 21183)

We do not inherit the earth from our ancestors,
we borrow it from our children. - S.M.A.R.T Person

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ