Your message dated Sat, 15 May 2021 05:14:21 -0700 (PDT)
with message-id <609fbb1d.1c69fb81.b8e09.5...@mx.google.com>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #859190,
regarding linux-image-4.9.0-2-amd64-unsigned : NFSv4 client error
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
859190: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859190
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-4.9.0-2-amd64-unsigned
Version: 4.9.18-1
Dear maintainer,
here is a warning I observed on a NFSv4+Kerberos client.
The taint comes from this previous error message:
[ 0.653706] scsi_mod: module verification failed: signature and/or required
key missing - tainting kernel
[ 20.126226] ------------[ cut here ]------------
[ 20.126245] WARNING: CPU: 3 PID: 2431 at
/build/linux-9r9Ph5/linux-4.9.18/fs/nfs/nfs4idmap.c:537
nfs_idmap_legacy_upcall+0x181/0x190 [nfsv4]
[ 20.126245] Modules linked in: hmac(E) cbc(E) cts(E) nfsd(E) nfs_acl(E)
rpcsec_gss_krb5(E) auth_rpcgss(E) nfsv4(E) dns_resolver(E) nfs(E) lockd(E)
grace(E) sunrpc(E) fscache(E) coretemp(E) crct10dif_pclmul(E) crc32_pclmul(E)
ghash_clmulni_intel(E) joydev(E) evdev(E) vmw_balloon(E) vmwgfx(E) ppdev(E)
serio_raw(E) pcspkr(E) ttm(E) acpi_cpufreq(E) tpm_tis(E) tpm_tis_core(E)
parport_pc(E) sg(E) parport(E) drm_kms_helper(E) drm(E) tpm(E) battery(E)
vmw_vmci(E) shpchp(E) ac(E) button(E) autofs4(E) ext4(E) crc16(E) jbd2(E)
fscrypto(E) mbcache(E) sr_mod(E) cdrom(E) sd_mod(E) ata_generic(E)
crc32c_intel(E) aesni_intel(E) aes_x86_64(E) glue_helper(E) lrw(E) gf128mul(E)
ablk_helper(E) cryptd(E) psmouse(E) vmxnet3(E) vmw_pvscsi(E) ata_piix(E)
libata(E) scsi_mod(E)
[ 20.126276] CPU: 3 PID: 2431 Comm: apache2 Tainted: G E
4.9.0-2-amd64 #1 Debian 4.9.18-1
[ 20.126277] Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 04/14/2014
[ 20.126278] 0000000000000000 ffffffff84b28714 0000000000000000
0000000000000000
[ 20.126279] ffffffff84876e9e ffff916b761fc800 00000000fffffff5
ffff916b7570d2c0
[ 20.126281] ffff916b755b8c80 ffff916b761fc830 ffff916b755b8c80
ffffffffc06357c1
[ 20.126282] Call Trace:
[ 20.126288] [<ffffffff84b28714>] ? dump_stack+0x5c/0x78
[ 20.126291] [<ffffffff84876e9e>] ? __warn+0xbe/0xe0
[ 20.126298] [<ffffffffc06357c1>] ? nfs_idmap_legacy_upcall+0x181/0x190
[nfsv4]
[ 20.126301] [<ffffffff84a9e01d>] ? request_key_and_link+0x43d/0x520
[ 20.126303] [<ffffffff84a9a120>] ? keyring_alloc+0x80/0x80
[ 20.126304] [<ffffffff84a9a140>] ? key_default_cmp+0x20/0x20
[ 20.126305] [<ffffffff84a9e1aa>] ? request_key_with_auxdata+0x1a/0x60
[ 20.126307] [<ffffffff84df864b>] ? mutex_lock+0x1b/0x30
[ 20.126313] [<ffffffffc0635575>] ? nfs_idmap_get_key+0x195/0x1c0 [nfsv4]
[ 20.126319] [<ffffffffc0635b92>] ? nfs_map_name_to_uid+0x102/0x160 [nfsv4]
[ 20.126320] [<ffffffff84b3150e>] ? memzero_explicit+0xe/0x10
[ 20.126326] [<ffffffffc062982f>] ? decode_getfattr_attrs+0x11cf/0x1710
[nfsv4]
[ 20.126328] [<ffffffff84adb7c8>] ? crypto_destroy_tfm+0x28/0x80
[ 20.126333] [<ffffffffc062df31>] ?
decode_getfattr_generic.constprop.103+0xa1/0x110 [nfsv4]
[ 20.126338] [<ffffffffc062e7b0>] ? nfs4_xdr_dec_getattr+0x90/0x90 [nfsv4]
[ 20.126343] [<ffffffffc062e862>] ? nfs4_xdr_dec_lookup+0xb2/0xc0 [nfsv4]
[ 20.126345] [<ffffffffc050f4cb>] ? gss_verify_mic_kerberos+0x25b/0x340
[rpcsec_gss_krb5]
[ 20.126347] [<ffffffffc04d3591>] ? gss_unwrap_resp+0xc1/0x230 [auth_rpcgss]
[ 20.126353] [<ffffffffc062e7b0>] ? nfs4_xdr_dec_getattr+0x90/0x90 [nfsv4]
[ 20.126363] [<ffffffffc0590a10>] ? rpcauth_unwrap_resp+0x60/0xe0 [sunrpc]
[ 20.126370] [<ffffffffc058c1d0>] ? __rpc_wait_for_completion_task+0x30/0x30
[sunrpc]
[ 20.126375] [<ffffffffc058c1d0>] ? __rpc_wait_for_completion_task+0x30/0x30
[sunrpc]
[ 20.126381] [<ffffffffc062e7b0>] ? nfs4_xdr_dec_getattr+0x90/0x90 [nfsv4]
[ 20.126386] [<ffffffffc0581afe>] ? call_decode+0x1de/0x810 [sunrpc]
[ 20.126388] [<ffffffff848b8da0>] ? wake_atomic_t_function+0x60/0x60
[ 20.126393] [<ffffffffc0581920>] ? call_refreshresult+0x110/0x110 [sunrpc]
[ 20.126398] [<ffffffffc0581920>] ? call_refreshresult+0x110/0x110 [sunrpc]
[ 20.126404] [<ffffffffc058cf86>] ? __rpc_execute+0x86/0x420 [sunrpc]
[ 20.126410] [<ffffffffc0580d43>] ? rpc_run_task+0xe3/0x120 [sunrpc]
[ 20.126414] [<ffffffffc0612854>] ? nfs4_call_sync_sequence+0x64/0xa0 [nfsv4]
[ 20.126419] [<ffffffffc06134cb>] ? _nfs4_proc_lookup+0x10b/0x170 [nfsv4]
[ 20.126425] [<ffffffffc0621104>] ? nfs4_proc_lookup_common+0x84/0x3c0
[nfsv4]
[ 20.126430] [<ffffffffc062151d>] ? nfs4_proc_lookup+0x4d/0xb0 [nfsv4]
[ 20.126438] [<ffffffffc05d8585>] ? nfs_lookup+0xf5/0x260 [nfs]
[ 20.126440] [<ffffffff84a0dfb3>] ? lookup_slow+0xa3/0x170
[ 20.126441] [<ffffffff84a0e6b3>] ? walk_component+0x1f3/0x320
[ 20.126445] [<ffffffffc05d847b>] ? nfs_permission+0x1cb/0x1e0 [nfs]
[ 20.126447] [<ffffffff84a0f232>] ? link_path_walk+0x1b2/0x650
[ 20.126448] [<ffffffff84a0f7d6>] ? path_lookupat+0x86/0x120
[ 20.126450] [<ffffffff849bffc1>] ? page_add_file_rmap+0x11/0x110
[ 20.126451] [<ffffffff84a120f1>] ? filename_lookup+0xb1/0x180
[ 20.126452] [<ffffffff849fe0da>] ? __check_object_size+0xfa/0x1d8
[ 20.126454] [<ffffffff84b59818>] ? strncpy_from_user+0x48/0x160
[ 20.126455] [<ffffffff84a11d2a>] ? getname_flags+0x6a/0x1e0
[ 20.126456] [<ffffffff84a06ed9>] ? vfs_fstatat+0x59/0xb0
[ 20.126457] [<ffffffff84a0742a>] ? SYSC_newstat+0x2a/0x60
[ 20.126458] [<ffffffff8485fd91>] ? __do_page_fault+0x2d1/0x510
[ 20.126460] [<ffffffff84dfb07b>] ? system_call_fast_compare_end+0xc/0x9b
[ 20.126461] ---[ end trace b7c11d4336e33116 ]---
--
Laurent.
--- End Message ---
--- Begin Message ---
Hi
This bug was filed for a very old kernel or the bug is old itself
without resolution.
If you can reproduce it with
- the current version in unstable/testing
- the latest kernel from backports
please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.
Regards,
Salvatore
--- End Message ---