lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 28 Aug 2008 17:23:43 +0200
From:	"Ulrich Windl" <ulrich.windl@...uni-regensburg.de>
To:	Jiri Kosina <jkosina@...e.cz>
CC:	linux-kernel@...r.kernel.org
Subject: Re: SLES10 SP1 (x86_64): Hard-hang when using NFSv4 from HP-UX

On 28 Aug 2008 at 13:37, Jiri Kosina wrote:

> On Thu, 28 Aug 2008, Ulrich Windl wrote:
> 
> > I'm fighting for a while with using NFSv4 provided by HP-UX 11.31 (ONCplus 
> > B.11.31.04 (ONC+ 2.3)) on a SLES10 SP1 (x86_64) client. HP's NFS is basically that 
> > from Sun. The problems are:
> [ ... ]
> > Mounting the filesystems as NFSv3 causes no problems at all, using NFSv4 makes 
> > every file open() attempt to hang hard. I must "kill -9" the processes. Even 
> > "umount -vat nfs4" hangs on umount().
> 
> Sorry, but this mailinglist would be appropriate only if this happens 
> still with current vanilla kernel.
> 
> Otherwise, you should report this problem to your vendor (Novell bugzilla 
> in this case).

Hi!

(ingoring the fact your opinion may be influenced by SUSE/Novell)

Are you saying that SUSE/Novell added bugs regarding NFS4 that are not present in 
the vanilla kernel, or are you saying that the vanilla kernel may have fixed NFSv4 
bugs that SUSE/Novell did not fix? Why shouldn't anybody be interested in the fact 
that there are problems?

Regards,
Ulrich

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ