--- Begin Message ---
Package: nfs-kernel-server
Version: 1:1.2.6-3
Severity: important
Dear Maintainer,
After updating to nfs-kernel-server 1.2.6-3 in testing today, our NFS4
mounts stopped working. "mount -t nfs4 -0 ro,sec=krb5 freyr:/export/test
/mnt" hangs indefinitely. The mount succeeds as expected using the
previous testing version, 1.2.5-4. After turning up the verbosity on
the various rpc services, I found that rpc.gssd seems to be handing
after doing its downcall from kerberos verification. Running the 1.2.6
server, all network traffic stops after the downcall and the mount on
the client hangs. Under 1.2.5, the server and client continue to
exchange data and the mount succeeds. Both of these cases are running
the 1.2.6-3 nfs-common package on the clients, but the behavior is the
same using the 1.2.5-4 nfs-common.
Please let me know if you have any thoughts or would like more
information.
Thanks,
John
== v1.2.6-3 syslog (failing) ==
Jul 24 13:54:10 freyr rpc.gssd[7972]: DEBUG: serialize_krb5_ctx: lucid
version!
Jul 24 13:54:10 freyr rpc.gssd[7972]: prepare_krb5_rfc4121_buffer:
protocol 1
Jul 24 13:54:10 freyr rpc.gssd[7972]: prepare_krb5_rfc4121_buffer:
serializing key with enctype 18 and size 32
Jul 24 13:54:10 freyr rpc.gssd[7972]: doing downcall
Jul 24 13:57:11 freyr kernel: [ 2699.744016] nfs: server freyr not
responding, still trying
== v1.2.5-4 syslog (working) ==
Jul 24 13:53:14 freyr rpc.gssd[7026]: DEBUG: serialize_krb5_ctx: lucid
version!
Jul 24 13:53:14 freyr rpc.gssd[7026]: prepare_krb5_rfc4121_buffer:
protocol 1
Jul 24 13:53:14 freyr rpc.gssd[7026]: prepare_krb5_rfc4121_buffer:
serializing key with enctype 18 and size 32
Jul 24 13:53:14 freyr rpc.gssd[7026]: doing downcall
Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si
0x7fff9df236b0 data 0x7fff9df23580
Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si
0x7fff9df1eff0 data 0x7fff9df1eec0
Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si
0x7fff9df1eff0 data 0x7fff9df1eec0
Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si
0x7fff9df1eff0 data 0x7fff9df1eec0
Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si
0x7fff9df1eff0 data 0x7fff9df1eec0
Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si
0x7fff9df1eff0 data 0x7fff9df1eec0
Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si
0x7fff9df1eff0 data 0x7fff9df1eec0
==
-- Package-specific info:
-- rpcinfo --
program vers proto port service
100000 4 tcp 111 portmapper
100000 3 tcp 111 portmapper
100000 2 tcp 111 portmapper
100000 4 udp 111 portmapper
100000 3 udp 111 portmapper
100000 2 udp 111 portmapper
100024 1 udp 4000 status
100024 1 tcp 4000 status
100003 2 tcp 2049 nfs
100003 3 tcp 2049 nfs
100003 4 tcp 2049 nfs
100227 2 tcp 2049
100227 3 tcp 2049
100003 2 udp 2049 nfs
100003 3 udp 2049 nfs
100003 4 udp 2049 nfs
100227 2 udp 2049
100227 3 udp 2049
100021 1 udp 53191 nlockmgr
100021 3 udp 53191 nlockmgr
100021 4 udp 53191 nlockmgr
100021 1 tcp 50367 nlockmgr
100021 3 tcp 50367 nlockmgr
100021 4 tcp 50367 nlockmgr
100005 1 udp 4002 mountd
100005 1 tcp 4002 mountd
100005 2 udp 4002 mountd
100005 2 tcp 4002 mountd
100005 3 udp 4002 mountd
100005 3 tcp 4002 mountd
-- /etc/default/nfs-kernel-server --
RPCNFSDCOUNT=8
RPCNFSDPRIORITY=0
RPCMOUNTDOPTS="--manage-gids --port 4002"
NEED_SVCGSSD=yes
RPCSVCGSSDOPTS="-vvv"
-- /etc/exports --
/tmp gss/krb5(ro,async,no_subtree_check,mp,fsid=0)
/tmp/foo gss/krb5(ro,async,no_subtree_check,mp)
-- /proc/fs/nfs/exports --
# Version 1.1
# Path Client(Flags) # IPs
-- System Information:
Debian Release: wheezy/sid
APT prefers testing
APT policy: (700, 'testing'), (600, 'unstable'), (500, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages nfs-kernel-server depends on:
ii libblkid1 2.20.1-5.1
ii libc6 2.13-33
ii libtirpc1 0.2.2-5
ii libwrap0 7.6.q-23
ii lsb-base 4.1+Debian7
ii nfs-common 1:1.2.6-3
ii ucf 3.0025+nmu3
nfs-kernel-server recommends no packages.
nfs-kernel-server suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.2.6-4
We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 682709@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Luk Claes <luk@debian.org> (supplier of updated nfs-utils package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 11 May 2013 14:37:13 +0200
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source amd64
Version: 1:1.2.6-4
Distribution: stable
Urgency: low
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Luk Claes <luk@debian.org>
Description:
nfs-common - NFS support files common to client and server
nfs-kernel-server - support for NFS kernel server
Closes: 675188 682709 707401 707720
Changes:
nfs-utils (1:1.2.6-4) stable; urgency=low
.
* mountd: auth_unix_ip should downcall on error to prevent
hangs (Closes: #682709).
* Avoid DNS reverse resolution fixes CVE-2013-1923 (Closes: #707401).
* Set default domain (Closes: #675188).
* Fix getopt handling for -R option (Closes: #707720).
Checksums-Sha1:
e12d056ac347f2ca2bdd71af3f537d770b5dbb4d 2244 nfs-utils_1.2.6-4.dsc
ecce84b044fca647feb30bec64fdf39427e776ad 39545 nfs-utils_1.2.6-4.debian.tar.bz2
d54414ec2b0696b93d8e53cda1341eb6f0b48f35 156260 nfs-kernel-server_1.2.6-4_amd64.deb
6e22b10977d81da12bf759ea25dc97f3760e0c02 287812 nfs-common_1.2.6-4_amd64.deb
Checksums-Sha256:
96e6be52317f30ad86e8dd54eebf4eda403c44e4fba3fbb17ea2aacdddfbfdb3 2244 nfs-utils_1.2.6-4.dsc
3b0ddf1c48d27aaedfd7c15e30301bbbce192024c30978107bfb6ee3ec421611 39545 nfs-utils_1.2.6-4.debian.tar.bz2
5cd88fe13c4e42fefe780b34d4f53f01d32159c6235d17d18e6cac9739638430 156260 nfs-kernel-server_1.2.6-4_amd64.deb
54eb48243394718447bffee1dca72e9240ecd5563af46d73ff926d00b0c8f51e 287812 nfs-common_1.2.6-4_amd64.deb
Files:
d47f0e26e17d2bd12efe0cf5a6cf9f27 2244 net standard nfs-utils_1.2.6-4.dsc
37dba20026ed7f6778ec1ef85a254b70 39545 net standard nfs-utils_1.2.6-4.debian.tar.bz2
07c75214386fad203bf86c70f4ba64e4 156260 net optional nfs-kernel-server_1.2.6-4_amd64.deb
e7167682ea97c27f8dd75bfd9c673816 287812 net standard nfs-common_1.2.6-4_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=z20X
-----END PGP SIGNATURE-----
--- End Message ---