[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#632141: marked as done (rpc.gssd: ERROR: can't open /var/lib/nfs/rpc_pipefs/nfs/clnt[[:xdigit:]]+: No such file or directory)



Your message dated Thu, 11 Aug 2016 17:23:05 +0000
with message-id <E1bXthB-0005f0-Rj@franck.debian.org>
and subject line Bug#632141: fixed in nfs-utils 1:1.2.8-9.2
has caused the Debian Bug report #632141,
regarding rpc.gssd: ERROR: can't open /var/lib/nfs/rpc_pipefs/nfs/clnt[[:xdigit:]]+: No such file or directory
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
632141: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632141
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.2.2-4

On a VM where autofs is being kept rather busy mounting and unmounting NFS
shares I get a stream of messages like the following:

rpc.gssd[513]: ERROR: can't open /var/lib/nfs/rpc_pipefs/nfs/clnt1ac6: No such file or directory
rpc.gssd[513]: ERROR: can't open /var/lib/nfs/rpc_pipefs/nfs/clnt1aca: No such file or directory

and so on with the client counter incrementing in uneven steps. From eyeballing
the logs I'd say that about 1-3% of the clnt* directories give rise to such a
message.

The message is generated by utils/gssd/gssd_proc.c:process_clnt_dir(), which
is called from utils/gssd/gssd_proc.c:process_pipedir(). The latter does a
scandir(3) on /var/lib/nfs/rpc_pipefs/nfs, then calls process_clnt_dir()
for every entry whose name begins with "clnt". process_clnt_dir() tries to
open(2) the clnt* directory and sometimes gets ENOENT. My guess is that there
is a race condition: something else removes clnt* directories between the
scandir() and the open(). If so, maybe the message should be downgraded to
a WARNING and not printed at verbosity 0?

I haven't been able to discern an actual impact other than the stream of
error messages in the logs. Of course that doesn't mean that there is no 
such impact.



--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.2.8-9.2

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 632141@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andreas Henriksson <andreas@fatal.se> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 11 Aug 2016 18:50:24 +0200
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source amd64
Version: 1:1.2.8-9.2
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Andreas Henriksson <andreas@fatal.se>
Description:
 nfs-common - NFS support files common to client and server
 nfs-kernel-server - support for NFS kernel server
Closes: 632141 828826 830777
Changes:
 nfs-utils (1:1.2.8-9.2) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Really add keyutils as a dependency of nfs-common. (Closes: #830777)
     - changelog entry included but actual change missed when partially
       merging the ubuntu delta in previous NMU.
   * Add debian/patches/unbreak-blkmapd-rpc_pipefs-run.patch (Closes: #828826)
     - patch from Christoph Hellwig to unbreak blkmapd after move of
       rpc_pipefs to /run.
   * Add debian/patches/unbreak-gssd-rpc_pipefs-run.patch (Closes: #632141)
     - similarly to blkmapd also unbreak gssd. Thanks to Christoph Hellwig
       for pointing this out.
Checksums-Sha1:
 56e3ca351c3d0a137028b5fc8e7c3604a2629eb4 2300 nfs-utils_1.2.8-9.2.dsc
 5dc1048510ee61dceac786918b36c6ad97eeb61a 46932 nfs-utils_1.2.8-9.2.debian.tar.bz2
 5d0e8040144b29fa5fc0976272213ae81af10b11 509750 nfs-common-dbgsym_1.2.8-9.2_amd64.deb
 cfaa819260ed26553cce2431577edc131c9333aa 208954 nfs-common_1.2.8-9.2_amd64.deb
 bafd5d3d9ac7b8e416e6c265ceffa4f573a929fe 272468 nfs-kernel-server-dbgsym_1.2.8-9.2_amd64.deb
 7802d7edcbe85a659a7f2eca39b3aca3f2d78e21 117218 nfs-kernel-server_1.2.8-9.2_amd64.deb
Checksums-Sha256:
 78c874e6643bce59d7b8dfbe49872e765412beb78a415ee4508bc53b54d6b02b 2300 nfs-utils_1.2.8-9.2.dsc
 469abe26778c432989da9955695d16f27d2e0aae566e7b257107a1bb19d0d47d 46932 nfs-utils_1.2.8-9.2.debian.tar.bz2
 79fefa0a7787ef65c9ef275ee0d444b7ef5df11dcaaf0755ce2ae41ac7daf38a 509750 nfs-common-dbgsym_1.2.8-9.2_amd64.deb
 69fd30c0fd50a395ed0962d86a77202949ca693144718e830e80af5c6b589600 208954 nfs-common_1.2.8-9.2_amd64.deb
 e280063ef4894ad1df764083f5745cd47704e9baa2721e932862909eaee21646 272468 nfs-kernel-server-dbgsym_1.2.8-9.2_amd64.deb
 fccc65f4d5f3e80e5850de1bf23a078162755119843e1437fdb4eee5c447673b 117218 nfs-kernel-server_1.2.8-9.2_amd64.deb
Files:
 80c10a177a6b0475e8f81f016a0de384 2300 net standard nfs-utils_1.2.8-9.2.dsc
 5595dbb24afb839a0f46f995e492a624 46932 net standard nfs-utils_1.2.8-9.2.debian.tar.bz2
 f2bf2705a9949f7d4ff7169292c441ca 509750 debug extra nfs-common-dbgsym_1.2.8-9.2_amd64.deb
 6c336add92bb959f1248ed841477a96e 208954 net standard nfs-common_1.2.8-9.2_amd64.deb
 ce5ada58a82b12d7fdf1a46bbd123877 272468 debug extra nfs-kernel-server-dbgsym_1.2.8-9.2_amd64.deb
 7d8ac15330f7ae68dd0ff7d70e21ec77 117218 net optional nfs-kernel-server_1.2.8-9.2_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJXrK4cAAoJEAvEfcZNE1MGOBgP/1OuGySyFgjEuFVC/9NQAC7H
WnLMKYc/Eu9lLjwT7D//m6UZjpNlTz+NeOCpNrQBm/m9/7p55hmOye+kqA8l4+95
FF6U8glhrWyrvVhcUSQ1lUJOgH1CO9mnKTbIxBN6xeHSyd6uIMCZ+EylZkFPxeMe
O0ggoPyZ/DW817IuSBGFqAFdIu/JedqSKrwtgXvLPSni+NK+QYhB3EADwQRtavqe
HOhPvLnHER6FC7h8qDdSst65uS5qu7Mj/7EBjUPewlDKJhy535OARWqc/JbjFTiP
Uckg5NxwosQWl5S3DF7iYMcrpyFmTGA0aMQxI8ZGO8M4fsqTk0PzSVTWCFG28asr
48OJ6BtrA1uCXqiO2VUGv0r3PDobn0h/LS6fBJ7z5Eb/iZgRGqJqKQM+bv4Ad+IP
bAN5ZAp6EuoFXP+uOrmynQWICtPqQ7KU3vEPJNk5h7tyCjrL5La60CDqvHdj0E3q
OInduBOgShe+wIyM3oATd1JEu1duGT4Ja07ykRWW5tbtdbvrp+08e/fIYJ6R+9aA
+tZHpZzaZJkdMb8i88BSTewMiaH0zF2Tkanv7GXh207AyCL7Wp0IoWnRHMT7supS
6//g6ppuewDMjA/4Z/cLz6RTKrKWPy/MkGxhAAhJ/yqUwerHl7Y1csrVNnqe+ltv
VtjKS2vm1Gd8iLNQzGW9
=fb8x
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: