lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <fae6a9700906190519u1fbdce71m9910d8d7b3248b25@mail.gmail.com>
Date:	Fri, 19 Jun 2009 17:49:38 +0530
From:	Vivek Satpute <vivek@...syssoft.com>
To:	linux-kernel@...r.kernel.org
Subject: Crash occurs while NFS mounting of RFS

Hi,

I am trying to do NFS mounted RFS and while doing that, before RFS get
mounted, I get
following call-trace. ( CONFIG_LOCKDEP is enabled in kernel )

Looking up port of RPC 100003/2 on 192.168.1.18

------------[ cut here ]------------
WARNING: at kernel/sched.c:4995 local_bh_enable+0x60/0x1a4()
Modules linked in:
Call Trace:
[<80111770>] dump_stack+0x8/0x34
[<8012e9a8>] warn_on_slowpath+0x60/0x88
[<80135d4c>] local_bh_enable+0x60/0x1a4
[<8035e23c>] lock_sock_nested+0xf8/0x11c
[<803bcd88>] inet_bind+0x100/0x210
[<803d8a68>] xs_bind4+0x70/0x158
[<803dac80>] xs_udp_connect_worker4+0x120/0x1a4
[<801441d8>] run_workqueue+0x1d0/0x288
[<801451b0>] worker_thread+0x7c/0xec
[<80149074>] kthread+0x58/0x94
[<8010cc34>] kernel_thread_helper+0x10/0x18

---[ end trace cde2c19f73cb7209 ]---


I am not getting from where I should start ? Could anyone please
suggest me what can be the problem and how to fix it to make
NFS mounting working.

Any comments will be appreciated. Thanks in advance.

Thanks again,
Vivek Satpute
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ