Your message dated Sat, 01 Jun 2013 17:48:17 +0000 with message-id <[email protected]> and subject line Bug#707960: fixed in nfs-utils 1:1.2.8-4 has caused the Debian Bug report #707960, regarding nfs-common: rpc.gssd crashes when performing nfs4 mount to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 707960: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=707960 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: nfs-common Version: 1:1.2.6-3 Severity: normal Mounting a kerberos-protected nfs4 export is unsuccsessfull on powerpcspe. nfs-common initializes without error, and rpc.gssd appears to be running. Upon a mount attempt, the following error message was displayed: mount: fstab path: "/etc/fstab" mount: mtab path: "/etc/mtab" mount: lock path: "/etc/mtab~" mount: temp path: "/etc/mtab.tmp" mount: UID: 0 mount: eUID: 0 mount: spec: "nfsserver:/home/yesterday" mount: node: "/home" mount: types: "nfs4" mount: opts: "noatime,sec=krb5" mount: external mount: argv[0] = "/sbin/mount.nfs4" mount: external mount: argv[1] = "nfsserver:/home/yesterday" mount: external mount: argv[2] = "/home" mount: external mount: argv[3] = "-v" mount: external mount: argv[4] = "-o" mount: external mount: argv[5] = "rw,noatime,sec=krb5" mount.nfs4: timeout set for Mon Apr 15 17:35:12 2013 mount.nfs4: trying text-based options 'sec=krb5,addr=192.168.1.2,clientaddr=192.168.1.3' mount.nfs4: mount(2): Broken pipe mount.nfs4: Broken pipe After this message, rpc.gssd is no longer running. Further mount attempts timeout with the following: mount: fstab path: "/etc/fstab" mount: mtab path: "/etc/mtab" mount: lock path: "/etc/mtab~" mount: temp path: "/etc/mtab.tmp" mount: UID: 0 mount: eUID: 0 mount: spec: "titansteel:/home/yesterday" mount: node: "/home" mount: types: "nfs4" mount: opts: "noatime,sec=krb5" mount: external mount: argv[0] = "/sbin/mount.nfs4" mount: external mount: argv[1] = "titansteel:/home/yesterday" mount: external mount: argv[2] = "/home" mount: external mount: argv[3] = "-v" mount: external mount: argv[4] = "-o" mount: external mount: argv[5] = "rw,noatime,sec=krb5" mount.nfs4: timeout set for Mon Apr 15 17:37:21 2013 mount.nfs4: trying text-based options 'sec=krb5,addr=192.168.1.2,clientaddr=192.168.1.3' mount.nfs4: mount(2): Permission denied mount.nfs4: access denied by server while mounting nfsserver:/home/yesterday A gdb trace of rpc.gssd reveals the following: Program received signal SIGSEGV, Segmentation fault. 0x0ffd9154 in __gss_get_mechanism_cred () from /lib/powerpc-linux-gnuspe/libtirpc.so.1 (gdb) where #0 0x0ffd9154 in __gss_get_mechanism_cred () from /lib/powerpc-linux-gnuspe/libtirpc.so.1 #1 0x0ffd845c in gss_add_cred () from /lib/powerpc-linux-gnuspe/libtirpc.so.1 #2 0x0fb4dc38 in gss_acquire_cred (minor_status=0xbfc5f2fc, desired_name=0x0, time_req=0, desired_mechs=<optimized out>, cred_usage=1, output_cred_handle=0xbfc5f1f4, actual_mechs=0x0, time_rec=0xbfc5f1ec) at ../../../../src/lib/gssapi/mechglue/g_acquire_cred.c:152 #3 0x0ffd8588 in gss_add_cred () from /lib/powerpc-linux-gnuspe/libtirpc.so.1 #4 0x0ffd8af8 in gss_acquire_cred () from /lib/powerpc-linux-gnuspe/libtirpc.so.1 #5 0x10007b90 in ?? () #6 0x10004e04 in ?? () #7 0x100054d0 in ?? () #8 0x10005d14 in ?? () #9 0x10003b6c in ?? () #10 0x10002590 in ?? () #11 0x0fcaadcc in generic_start_main (main=<optimized out>, argc=<optimized out>, ubp_av=<optimized out>, auxvec=<optimized out>, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=<optimized out>) at ../csu/libc-start.c:228 #12 0x0fcaaf84 in __libc_start_main ( argc=<error reading variable: value has been optimized out>, ubp_av=<error reading variable: value has been optimized out>, ubp_ev=<optimized out>, auxvec=<error reading variable: value has been optimized out>, rtld_fini=<error reading variable: value has been optimized out>, stinfo=<optimized out>, stack_on_entry=<error reading variable: value has been optimized out>) at ../sysdeps/unix/sysv/linux/powerpc/libc-start.c:105 #13 0x00000000 in ?? () (gdb) I have not verified this as a problem with the same package versions on any other architecture, but I suspect this is an architecture specific problem. -- Package-specific info: -- rpcinfo -- program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper 100024 1 udp 4000 status 100024 1 tcp 4000 status 100003 2 tcp 2049 nfs 100003 3 tcp 2049 nfs 100003 4 tcp 2049 nfs 100227 2 tcp 2049 100227 3 tcp 2049 100003 2 udp 2049 nfs 100003 3 udp 2049 nfs 100003 4 udp 2049 nfs 100227 2 udp 2049 100227 3 udp 2049 100021 1 udp 45924 nlockmgr 100021 3 udp 45924 nlockmgr 100021 4 udp 45924 nlockmgr 100021 1 tcp 46132 nlockmgr 100021 3 tcp 46132 nlockmgr 100021 4 tcp 46132 nlockmgr -- /etc/default/nfs-common -- NEED_STATD= STATDOPTS="--port 4000 --outgoing-port 4001" NEED_IDMAPD=yes NEED_GSSD=yes RPCGSSDOPTS="-vvvrrr" -- /etc/idmapd.conf -- [General] Verbosity = 0 Pipefs-Directory = /var/lib/nfs/rpc_pipefs Domain = exmeritus.com Local-Realm = EXMERITUS.COM [Mapping] Nobody-User = nobody Nobody-Group = nogroup -- /etc/fstab -- nfsserver:/home /home nfs4 noatime,sec=krb5 0 2 -- /proc/mounts -- rpc_pipefs /var/lib/nfs/rpc_pipefs rpc_pipefs rw,relatime 0 0 nfsd /proc/fs/nfsd nfsd rw,relatime 0 0 -- System Information: Debian Release: 7.0 APT prefers unreleased APT policy: (500, 'unreleased'), (500, 'unstable') Architecture: powerpcspe (ppc) Kernel: Linux 3.2.0bareboard (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/dash Versions of packages nfs-common depends on: ii adduser 3.113+nmu3 ii initscripts 2.88dsf-41 ii libc6 2.13-38 ii libcap2 1:2.22-1.2 ii libcomerr2 1.42.5-1.1 ii libdevmapper1.02.1 2:1.02.77-1 ii libevent-2.0-5 2.0.19-stable-3 ii libgssglue1 0.4-2 ii libk5crypto3 1.10.1+dfsg-5 ii libkeyutils1 1.5.5-7 ii libkrb5-3 1.10.1+dfsg-5 ii libmount1 2.20.1-5.3 ii libnfsidmap2 0.25-4 ii libtirpc1 0.2.2-5 ii libwrap0 7.6.q-24 ii lsb-base 4.1+Debian9 ii rpcbind 0.2.0-8 ii ucf 3.0025+nmu3 Versions of packages nfs-common recommends: ii python 2.7.3-4 Versions of packages nfs-common suggests: pn open-iscsi <none> pn watchdog <none> Versions of packages nfs-kernel-server depends on: ii libblkid1 2.20.1-5.3 ii libc6 2.13-38 ii libtirpc1 0.2.2-5 ii libwrap0 7.6.q-24 ii lsb-base 4.1+Debian9 ii ucf 3.0025+nmu3 -- no debconf information
--- End Message ---
--- Begin Message ---Source: nfs-utils Source-Version: 1:1.2.8-4 We believe that the bug you reported is fixed in the latest version of nfs-utils, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Steve Langasek <[email protected]> (supplier of updated nfs-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Sat, 01 Jun 2013 10:29:32 -0700 Source: nfs-utils Binary: nfs-kernel-server nfs-common Architecture: source amd64 Version: 1:1.2.8-4 Distribution: unstable Urgency: low Maintainer: Debian kernel team <[email protected]> Changed-By: Steve Langasek <[email protected]> Description: nfs-common - NFS support files common to client and server nfs-kernel-server - support for NFS kernel server Closes: 707960 Changes: nfs-utils (1:1.2.8-4) unstable; urgency=low . * The configure option name is --with-gssglue, not --with-libgssglue. Fix this, so that rpc.gssd really works. Really closes: #707960. Checksums-Sha1: bea2d98661a77da5db911b2ce3b2d7e33e43abd0 2299 nfs-utils_1.2.8-4.dsc d0046e6f53864ee4c1056bf0e286fded5a12ef15 38293 nfs-utils_1.2.8-4.debian.tar.bz2 dbb5aacbb1a36d4efebb9db50e09a1d1a658eec2 145006 nfs-kernel-server_1.2.8-4_amd64.deb 1c1964ebe80a517866def9123dd560df36e3b9eb 274452 nfs-common_1.2.8-4_amd64.deb Checksums-Sha256: 9644b6ac120c4faad0665430c4e68d1c13e3243fc8868090bff71b176cc4920f 2299 nfs-utils_1.2.8-4.dsc c32703a4b7f52fc00a1a2b5d96a05434214605ce1aa61c9e2d971bafb6a5ed0c 38293 nfs-utils_1.2.8-4.debian.tar.bz2 9ec90a33f10b4b3e130fd0f3ed56ba3259fcc9dc26b738b787b3dbefe1901eba 145006 nfs-kernel-server_1.2.8-4_amd64.deb b3d0c292908a6418a4e7b94ad374ea130394e3d2551aa206e35e3ffc485c853f 274452 nfs-common_1.2.8-4_amd64.deb Files: e4e53fccf52bb2e57be8a32f19038da4 2299 net standard nfs-utils_1.2.8-4.dsc f598fe41fd21182928a4a95db9fe9460 38293 net standard nfs-utils_1.2.8-4.debian.tar.bz2 0bf0821a16a9d091046bdb146f8b18f5 145006 net optional nfs-kernel-server_1.2.8-4_amd64.deb 9f475458a7f4dd92c0a0aa98c5c765ea 274452 net standard nfs-common_1.2.8-4_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJRqjATAAoJEFaNMPMhshM9ObwP/2TnsXKe++D2ib+8epx8wkDc R/k+LR/l0MJJUdyKE+U98zjMSbnX9Ss3TDETUneIkDjR/o2L31RADiQFygWLlB7W Z5FueQaMO9kE+eb6UBo6qyZMQ+6Pj/ZMr0njTS+XHLm8H9gNtH2MI3V46nfv/Hun fBBCPFh9U3T+RusBaA7HD1ccyQGO5Yu/8PLEUsuLg1Cm/+jmXSMPjT3JJYNKUJ6l iJhKYnfyFNgcsRpGBs1OQsux39z3kbwP/h2TqerBVRsK/tfvBnZFYc8vWDyVfYdJ lzrWOpy2tvKRW6LM0J+T+D1IjGlCpmf7+sC9A0xJwn1v4Bl7I4cC5w5iiNVnvhyp mlG5/JAVdQcMGVgV5roMz40nZS/zJHqvnWHvCOQh4Qs042lnSY7L81VzTYgakuk0 QUkaDoDfab9DEbIuWe08LsIacGg82lm9hTu1abJ9hlj084ibFNt6EGy12f8W8H54 SqRKarlFSV9SibYUdMxO2iQffRVOpbjuHlZyh2kNi86MIOpECDWHG2lQzY6fjCPT iU9rN7GpmINfiWO1S/06fVsHHUX61TmRm5Z4wlE6E63KX/L1JnX3jWo/R1gdTYg2 plkhpGrwGsvbv3ug7tuJxboz1PtMZ0+0Ze8y2fLoKCVhEoRKNSDONnaf/tktWDzv 4vdFia6zYGguNvOZQIzL =gIBH -----END PGP SIGNATURE-----
--- End Message ---

