Your message dated Sat, 01 Jun 2013 17:48:17 +0000 with message-id <[email protected]> and subject line Bug#707960: fixed in nfs-utils 1:1.2.8-4 has caused the Debian Bug report #707960, regarding nfs-common: After upgrade to 1.2.8-2, rpc.gssd segfaults on startup to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 707960: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=707960 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: nfs-common Version: 1:1.2.8-2 Severity: important Dear Maintainer, After upgrading to 1.2.8-2 as part of normal Jessie upkeep, rpc.gssd started segfaulting immediately on startup, and I'm not really able to wrap my head around just why. The crash happens in libgssglue, in __gss_get_mechanism_cred, called by gss_init_sec_context, at g_init_sec_context.c:153 (still in libgssglue). It is rather clear that the crash happens because the copy of mglueP.h that is shipped with the source of libgssglue does not match that which is shipped with libkrb5. In the latter, the struct `gss_union_cred_t' has gained a new field called `loopback', and lost its `auxinfo' field, and when inspecting the gss_union_cred_t that has been passed to __gss_get_mechanism_cred, it clearly matched the definition from libkrb5. However, the fault does not seem to be lying with libgssglue, since the segafult only happens when nfs-common is upgraded, and downgrading nfs-common back to 1.2.6-3 makes it start working again. A simple guess from my side is that nfs-common has (erroneously?) been compiled against libkrb5 in some place where it should be compiled against libgssglue, perhaps? The structure and dependencies between the various packages involved is, however, far from obvious to me. (At the face of it, it seems like a hack, to begin with, that libgssglue has a local copy of a private header file from MIT Kerberos.) Whatever the problem is, it makes rpc.gssd, and therefore Kerberized NFS mounts, entirely unusable. Fix pl0x. :) -- Package-specific info: -- rpcinfo -- program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper 100021 1 udp 33453 nlockmgr 100021 3 udp 33453 nlockmgr 100021 4 udp 33453 nlockmgr 100021 1 tcp 54248 nlockmgr 100021 3 tcp 54248 nlockmgr 100021 4 tcp 54248 nlockmgr 100007 2 udp 708 ypbind 100007 1 udp 708 ypbind 100007 2 tcp 709 ypbind 100007 1 tcp 709 ypbind 100024 1 udp 38590 status 100024 1 tcp 43595 status -- /etc/default/nfs-common -- NEED_STATD= STATDOPTS= NEED_IDMAPD=yes NEED_GSSD=yes -- /etc/idmapd.conf -- [General] Verbosity = 0 Pipefs-Directory = /var/lib/nfs/rpc_pipefs Domain = dolda2000.com [Mapping] Nobody-User = nobody Nobody-Group = nogroup -- /etc/fstab -- home.nfs:/home /home nfs4 sec=krb5i 0 0 home.nfs:/usr/site /usr/site nfs hard,intr,tcp 0 0 home.nfs:/video /home/pub/video nfs4 sec=krb5i 0 0 -- /proc/mounts -- home.nfs:/home /home nfs4 rw,relatime,vers=4,rsize=131072,wsize=131072,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=krb5i,clientaddr=192.168.1.181,minorversion=0,local_lock=none,addr=192.168.1.1 0 0 home.nfs:/usr/site /usr/site nfs rw,relatime,vers=3,rsize=131072,wsize=131072,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=sys,mountaddr=192.168.1.1,mountvers=3,mountport=50152,mountproto=tcp,local_lock=none,addr=192.168.1.1 0 0 home.nfs:/video /home/pub/video nfs4 rw,relatime,vers=4,rsize=131072,wsize=131072,namlen=255,hard,proto=tcp,port=0,timeo=600,retrans=2,sec=krb5i,clientaddr=192.168.1.181,minorversion=0,local_lock=none,addr=192.168.1.1 0 0 rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw,relatime 0 0 -- System Information: Debian Release: jessie/sid APT prefers testing APT policy: (500, 'testing'), (99, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 3.2.0-4-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages nfs-common depends on: ii adduser 3.113+nmu3 ii initscripts 2.88dsf-41 ii libc6 2.17-3 ii libcap2 1:2.22-1.2 ii libcomerr2 1.42.5-1.1 ii libdevmapper1.02.1 2:1.02.74-7 ii libevent-2.0-5 2.0.19-stable-3 ii libgssglue1 0.4-2 ii libk5crypto3 1.10.1+dfsg-5 ii libkeyutils1 1.5.5-7 ii libkrb5-3 1.10.1+dfsg-5 ii libmount1 2.20.1-5.4 ii libnfsidmap2 0.25-4 ii libtirpc1 0.2.2-5 ii libwrap0 7.6.q-24 ii lsb-base 4.1+Debian9 ii rpcbind 0.2.0-8 ii ucf 3.0025+nmu3 Versions of packages nfs-common recommends: ii python 2.7.3-5 Versions of packages nfs-common suggests: pn open-iscsi <none> pn watchdog <none> -- no debconf information
--- End Message ---
--- Begin Message ---Source: nfs-utils Source-Version: 1:1.2.8-4 We believe that the bug you reported is fixed in the latest version of nfs-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve Langasek <[email protected]> (supplier of updated nfs-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 01 Jun 2013 10:29:32 -0700 Source: nfs-utils Binary: nfs-kernel-server nfs-common Architecture: source amd64 Version: 1:1.2.8-4 Distribution: unstable Urgency: low Maintainer: Debian kernel team <[email protected]> Changed-By: Steve Langasek <[email protected]> Description: nfs-common - NFS support files common to client and server nfs-kernel-server - support for NFS kernel server Closes: 707960 Changes: nfs-utils (1:1.2.8-4) unstable; urgency=low . * The configure option name is --with-gssglue, not --with-libgssglue. Fix this, so that rpc.gssd really works. Really closes: #707960. Checksums-Sha1: bea2d98661a77da5db911b2ce3b2d7e33e43abd0 2299 nfs-utils_1.2.8-4.dsc d0046e6f53864ee4c1056bf0e286fded5a12ef15 38293 nfs-utils_1.2.8-4.debian.tar.bz2 dbb5aacbb1a36d4efebb9db50e09a1d1a658eec2 145006 nfs-kernel-server_1.2.8-4_amd64.deb 1c1964ebe80a517866def9123dd560df36e3b9eb 274452 nfs-common_1.2.8-4_amd64.deb Checksums-Sha256: 9644b6ac120c4faad0665430c4e68d1c13e3243fc8868090bff71b176cc4920f 2299 nfs-utils_1.2.8-4.dsc c32703a4b7f52fc00a1a2b5d96a05434214605ce1aa61c9e2d971bafb6a5ed0c 38293 nfs-utils_1.2.8-4.debian.tar.bz2 9ec90a33f10b4b3e130fd0f3ed56ba3259fcc9dc26b738b787b3dbefe1901eba 145006 nfs-kernel-server_1.2.8-4_amd64.deb b3d0c292908a6418a4e7b94ad374ea130394e3d2551aa206e35e3ffc485c853f 274452 nfs-common_1.2.8-4_amd64.deb Files: e4e53fccf52bb2e57be8a32f19038da4 2299 net standard nfs-utils_1.2.8-4.dsc f598fe41fd21182928a4a95db9fe9460 38293 net standard nfs-utils_1.2.8-4.debian.tar.bz2 0bf0821a16a9d091046bdb146f8b18f5 145006 net optional nfs-kernel-server_1.2.8-4_amd64.deb 9f475458a7f4dd92c0a0aa98c5c765ea 274452 net standard nfs-common_1.2.8-4_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJRqjATAAoJEFaNMPMhshM9ObwP/2TnsXKe++D2ib+8epx8wkDc R/k+LR/l0MJJUdyKE+U98zjMSbnX9Ss3TDETUneIkDjR/o2L31RADiQFygWLlB7W Z5FueQaMO9kE+eb6UBo6qyZMQ+6Pj/ZMr0njTS+XHLm8H9gNtH2MI3V46nfv/Hun fBBCPFh9U3T+RusBaA7HD1ccyQGO5Yu/8PLEUsuLg1Cm/+jmXSMPjT3JJYNKUJ6l iJhKYnfyFNgcsRpGBs1OQsux39z3kbwP/h2TqerBVRsK/tfvBnZFYc8vWDyVfYdJ lzrWOpy2tvKRW6LM0J+T+D1IjGlCpmf7+sC9A0xJwn1v4Bl7I4cC5w5iiNVnvhyp mlG5/JAVdQcMGVgV5roMz40nZS/zJHqvnWHvCOQh4Qs042lnSY7L81VzTYgakuk0 QUkaDoDfab9DEbIuWe08LsIacGg82lm9hTu1abJ9hlj084ibFNt6EGy12f8W8H54 SqRKarlFSV9SibYUdMxO2iQffRVOpbjuHlZyh2kNi86MIOpECDWHG2lQzY6fjCPT iU9rN7GpmINfiWO1S/06fVsHHUX61TmRm5Z4wlE6E63KX/L1JnX3jWo/R1gdTYg2 plkhpGrwGsvbv3ug7tuJxboz1PtMZ0+0Ze8y2fLoKCVhEoRKNSDONnaf/tktWDzv 4vdFia6zYGguNvOZQIzL =gIBH -----END PGP SIGNATURE-----
--- End Message ---

