Your message dated Tue, 21 May 2013 22:17:07 +0000 with message-id <[email protected]> and subject line Bug#682709: fixed in nfs-utils 1:1.2.6-4 has caused the Debian Bug report #682709, regarding nfs-kernel-server: NFS4 krb5 mounts hang under nfs-utils 1.2.6-3 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 682709: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682709 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: nfs-kernel-server Version: 1:1.2.6-3 Severity: important Dear Maintainer, After updating to nfs-kernel-server 1.2.6-3 in testing today, our NFS4 mounts stopped working. "mount -t nfs4 -0 ro,sec=krb5 freyr:/export/test /mnt" hangs indefinitely. The mount succeeds as expected using the previous testing version, 1.2.5-4. After turning up the verbosity on the various rpc services, I found that rpc.gssd seems to be handing after doing its downcall from kerberos verification. Running the 1.2.6 server, all network traffic stops after the downcall and the mount on the client hangs. Under 1.2.5, the server and client continue to exchange data and the mount succeeds. Both of these cases are running the 1.2.6-3 nfs-common package on the clients, but the behavior is the same using the 1.2.5-4 nfs-common. Please let me know if you have any thoughts or would like more information. Thanks, John == v1.2.6-3 syslog (failing) == Jul 24 13:54:10 freyr rpc.gssd[7972]: DEBUG: serialize_krb5_ctx: lucid version! Jul 24 13:54:10 freyr rpc.gssd[7972]: prepare_krb5_rfc4121_buffer: protocol 1 Jul 24 13:54:10 freyr rpc.gssd[7972]: prepare_krb5_rfc4121_buffer: serializing key with enctype 18 and size 32 Jul 24 13:54:10 freyr rpc.gssd[7972]: doing downcall Jul 24 13:57:11 freyr kernel: [ 2699.744016] nfs: server freyr not responding, still trying == v1.2.5-4 syslog (working) == Jul 24 13:53:14 freyr rpc.gssd[7026]: DEBUG: serialize_krb5_ctx: lucid version! Jul 24 13:53:14 freyr rpc.gssd[7026]: prepare_krb5_rfc4121_buffer: protocol 1 Jul 24 13:53:14 freyr rpc.gssd[7026]: prepare_krb5_rfc4121_buffer: serializing key with enctype 18 and size 32 Jul 24 13:53:14 freyr rpc.gssd[7026]: doing downcall Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si 0x7fff9df236b0 data 0x7fff9df23580 Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si 0x7fff9df1eff0 data 0x7fff9df1eec0 Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si 0x7fff9df1eff0 data 0x7fff9df1eec0 Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si 0x7fff9df1eff0 data 0x7fff9df1eec0 Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si 0x7fff9df1eff0 data 0x7fff9df1eec0 Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si 0x7fff9df1eff0 data 0x7fff9df1eec0 Jul 24 13:53:14 freyr rpc.gssd[7026]: dir_notify_handler: sig 37 si 0x7fff9df1eff0 data 0x7fff9df1eec0 == -- Package-specific info: -- rpcinfo -- program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper 100024 1 udp 4000 status 100024 1 tcp 4000 status 100003 2 tcp 2049 nfs 100003 3 tcp 2049 nfs 100003 4 tcp 2049 nfs 100227 2 tcp 2049 100227 3 tcp 2049 100003 2 udp 2049 nfs 100003 3 udp 2049 nfs 100003 4 udp 2049 nfs 100227 2 udp 2049 100227 3 udp 2049 100021 1 udp 53191 nlockmgr 100021 3 udp 53191 nlockmgr 100021 4 udp 53191 nlockmgr 100021 1 tcp 50367 nlockmgr 100021 3 tcp 50367 nlockmgr 100021 4 tcp 50367 nlockmgr 100005 1 udp 4002 mountd 100005 1 tcp 4002 mountd 100005 2 udp 4002 mountd 100005 2 tcp 4002 mountd 100005 3 udp 4002 mountd 100005 3 tcp 4002 mountd -- /etc/default/nfs-kernel-server -- RPCNFSDCOUNT=8 RPCNFSDPRIORITY=0 RPCMOUNTDOPTS="--manage-gids --port 4002" NEED_SVCGSSD=yes RPCSVCGSSDOPTS="-vvv" -- /etc/exports -- /tmp gss/krb5(ro,async,no_subtree_check,mp,fsid=0) /tmp/foo gss/krb5(ro,async,no_subtree_check,mp) -- /proc/fs/nfs/exports -- # Version 1.1 # Path Client(Flags) # IPs -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (700, 'testing'), (600, 'unstable'), (500, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-3-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages nfs-kernel-server depends on: ii libblkid1 2.20.1-5.1 ii libc6 2.13-33 ii libtirpc1 0.2.2-5 ii libwrap0 7.6.q-23 ii lsb-base 4.1+Debian7 ii nfs-common 1:1.2.6-3 ii ucf 3.0025+nmu3 nfs-kernel-server recommends no packages. nfs-kernel-server suggests no packages. -- no debconf information
--- End Message ---
--- Begin Message ---Source: nfs-utils Source-Version: 1:1.2.6-4 We believe that the bug you reported is fixed in the latest version of nfs-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Luk Claes <[email protected]> (supplier of updated nfs-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 11 May 2013 14:37:13 +0200 Source: nfs-utils Binary: nfs-kernel-server nfs-common Architecture: source amd64 Version: 1:1.2.6-4 Distribution: stable Urgency: low Maintainer: Debian kernel team <[email protected]> Changed-By: Luk Claes <[email protected]> Description: nfs-common - NFS support files common to client and server nfs-kernel-server - support for NFS kernel server Closes: 675188 682709 707401 707720 Changes: nfs-utils (1:1.2.6-4) stable; urgency=low . * mountd: auth_unix_ip should downcall on error to prevent hangs (Closes: #682709). * Avoid DNS reverse resolution fixes CVE-2013-1923 (Closes: #707401). * Set default domain (Closes: #675188). * Fix getopt handling for -R option (Closes: #707720). Checksums-Sha1: e12d056ac347f2ca2bdd71af3f537d770b5dbb4d 2244 nfs-utils_1.2.6-4.dsc ecce84b044fca647feb30bec64fdf39427e776ad 39545 nfs-utils_1.2.6-4.debian.tar.bz2 d54414ec2b0696b93d8e53cda1341eb6f0b48f35 156260 nfs-kernel-server_1.2.6-4_amd64.deb 6e22b10977d81da12bf759ea25dc97f3760e0c02 287812 nfs-common_1.2.6-4_amd64.deb Checksums-Sha256: 96e6be52317f30ad86e8dd54eebf4eda403c44e4fba3fbb17ea2aacdddfbfdb3 2244 nfs-utils_1.2.6-4.dsc 3b0ddf1c48d27aaedfd7c15e30301bbbce192024c30978107bfb6ee3ec421611 39545 nfs-utils_1.2.6-4.debian.tar.bz2 5cd88fe13c4e42fefe780b34d4f53f01d32159c6235d17d18e6cac9739638430 156260 nfs-kernel-server_1.2.6-4_amd64.deb 54eb48243394718447bffee1dca72e9240ecd5563af46d73ff926d00b0c8f51e 287812 nfs-common_1.2.6-4_amd64.deb Files: d47f0e26e17d2bd12efe0cf5a6cf9f27 2244 net standard nfs-utils_1.2.6-4.dsc 37dba20026ed7f6778ec1ef85a254b70 39545 net standard nfs-utils_1.2.6-4.debian.tar.bz2 07c75214386fad203bf86c70f4ba64e4 156260 net optional nfs-kernel-server_1.2.6-4_amd64.deb e7167682ea97c27f8dd75bfd9c673816 287812 net standard nfs-common_1.2.6-4_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJRjj3+AAoJECEnNxubsjBisf8P/iuoViemcgKVDo6tbyn3CoR+ qmLTVYQ3vASdsmwC+FcijH39vG/U76hSd3GWJ+9vni7stqaCApJSTpZJunKgD0zb hiCTTxw6Q6aCSgsd0ENNd0IGIoRF/ofyXsatN3TjzMjOCkQacBjdPLL4UTOpYG/W cAbCnYQPcJaQNzS9fC1pLbf5WQ8n43aHRFXH91dZzxYYVS74UB4BwEZ17/IHWKS4 WbA0dZ5TPeor5LW1v4nVT3P3DjkjcPRZUcsSSgy26e/9XEWGMmqiQrdkl0QSWhHr kFJKUGUQJ20Lo/YMjNTgIU1XjL2zIYkhjUJloa/xYGaKjeY+EpnULCXgZOwJ9oXy mmw2TsevVZ2F+DLw4OvSVyImyugGKNaCZvcFgiA/SutdgS30hK+bIXaGg2lvcMjB ISSLhPmC0qKLvpLnaEY7580SJ07Ady7dD/1d/D3KsIAqUNBjG4NuHs5mjIfvA2Gg MiVSWUDhntlgVaFyzKUWeESmVshY2QHZhMuaKwfiJPOceH5C8EKFbzBZPehtvDkX lDLSfxvzltqSNRpokeEhPZshLjF06R/9Ll2Le+C28UgN7DTrXbpmRiUylq0f75l+ 7pHi291eV9qJT9lkAbUgcDZkCyUeZa0m7RGk79f/hkHl6fGaOujPDuIz8s9eHs4E Ig73Rbl1PKRaIOT9k4iR =z20X -----END PGP SIGNATURE-----
--- End Message ---

