Your message dated Tue, 18 Feb 2025 12:30:35 +0000 with message-id <e1tkmkf-004lwp...@fasolo.debian.org> and subject line Bug#1093734: fixed in linux 6.13.3-1~exp1 has caused the Debian Bug report #1093734, regarding nfsd: validate the nfsd_serv pointer before calling svc_wake_up to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1093734: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093734 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: nfs-kernel-server Version: 1:2.8.2-1+b1 Severity: grave Justification: causes non-serious data loss X-Debbugs-Cc: invernom...@paranoici.org Dear maintainers, I encountered a big issue, while upgrading package 'nfs-kernel-server' on the box where the NFS server runs (the clients run on the compute nodes of an HPC cluster). The upgrade: [UPGRADE] nfs-kernel-server:amd64 1:2.8.2-1 -> 1:2.8.2-1+b1 got stuck at [...] Setting up nfs-kernel-server (1:2.8.2-1+b1) ... It looks like it was stuck at the restart of the systemd service: # systemctl status nfs-kernel-server.service ● nfs-server.service - NFS server and services Loaded: loaded (/usr/lib/systemd/system/nfs-server.service; enabled; prese> Drop-In: /run/systemd/generator/nfs-server.service.d └─order-with-mounts.conf Active: activating (start-pre) since Tue 2025-01-21 12:40:52 CET; 10min ago Job: 97667 Invocation: ced460d410fe4059b9e8781b35340d70 Docs: man:rpc.nfsd(8) man:exportfs(8) Cntrl PID: 249039 (exportfs) Tasks: 3 (limit: 154102) Memory: 680K (peak: 2.5M) CPU: 10ms CGroup: /system.slice/nfs-server.service ├─239857 /usr/sbin/nfsdctl threads 0 ├─239918 /usr/sbin/exportfs -au └─249039 /usr/sbin/exportfs -r There was a 'nfsdctl' process in uninterruptible sleep (D): $ ps -eldaf | grep nf[s] 4 D root 239857 1 0 80 0 - 847 - 12:07 ? 00:00:00 /usr/sbin/nfsdctl threads 0 5 S root 247511 1 0 80 0 - 1375 - 12:35 ? 00:00:00 /usr/sbin/nfsdcld After about 30 min, since trying to kill PID 239857 obviously had no effect, and I could not find any other strategy to restart nfs-kernel-server.service, I had to reboot the box, thus causing many problems to all the NFS clients. After reboot, I could issue: # aptitude --purge-unused safe-upgrade which finally completed the upgrade (fixing the nfs-kernel-server package, which was left in a partially configured state). I have never seen anything like this before, and I have upgraded nfs-kernel-server and related packages on Debian machines for quite a long time. Anyway, this should *not* happen during a system upgrade with aptitude or apt! I don't know whether bug [#992661] is related or not. [#992661]: <https://bugs.debian.org/992661> By looking at /var/log/kern.log , I see that a kernel BUG was traced at the time when the 'nfsdctl' process got stuck in D state. See the attached kern.log snippet. Please investigate and fix the issue as soon as possible. I really hope we can prevent this from happening again! Thanks for your time and dedication. -- Package-specific info: -- rpcinfo -- program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper 100011 1 udp 64737 rquotad 100011 2 udp 64737 rquotad 100011 1 tcp 55614 rquotad 100011 2 tcp 55614 rquotad 100024 1 udp 41792 status 100024 1 tcp 50467 status 100005 1 udp 46127 mountd 100005 1 tcp 39579 mountd 100005 2 udp 49119 mountd 100005 2 tcp 40039 mountd 100005 3 udp 33530 mountd 100005 3 tcp 55283 mountd 100003 3 tcp 2049 nfs 100003 4 tcp 2049 nfs 100227 3 tcp 2049 nfs_acl 100021 1 udp 38915 nlockmgr 100021 3 udp 38915 nlockmgr 100021 4 udp 38915 nlockmgr 100021 1 tcp 33105 nlockmgr 100021 3 tcp 33105 nlockmgr 100021 4 tcp 33105 nlockmgr -- /etc/default/nfs-kernel-server -- RPCNFSDPRIORITY=0 NEED_SVCGSSD="" -- /etc/nfs.conf -- [general] pipefs-directory=/run/rpc_pipefs [nfsrahead] [exports] [exportfs] [gssd] [lockd] [exportd] [mountd] manage-gids=y [nfsdcld] [nfsdcltrack] [nfsd] rdma=y rdma-port=20049 [statd] [sm-notify] [svcgssd] -- /etc/nfs.conf.d/*.conf -- -- System Information: Debian Release: trixie/sid APT prefers testing APT policy: (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 6.12.9-amd64 (SMP w/16 CPU threads; PREEMPT) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages nfs-kernel-server depends on: ii keyutils 1.6.3-4 ii libblkid1 2.40.4-1 ii libc6 2.40-5 ii libcap2 1:2.66-5+b1 ii libevent-core-2.1-7t64 2.1.12-stable-10+b1 ii libnl-3-200 3.7.0-0.3+b1 ii libnl-genl-3-200 3.7.0-0.3+b1 ii libreadline8t64 8.2-6 ii libsqlite3-0 3.46.1-1 ii libtirpc3t64 1.3.4+ds-1.3+b1 ii libuuid1 2.40.4-1 ii libwrap0 7.6.q-35 ii libxml2 2.12.7+dfsg+really2.9.14-0.2+b1 ii netbase 6.4 ii nfs-common 1:2.8.2-1+b1 ii ucf 3.0048 Versions of packages nfs-kernel-server recommends: ii python3 3.12.8-1 ii python3-yaml 6.0.2-1+b1 Versions of packages nfs-kernel-server suggests: ii procps 2:4.0.4-6 -- no debconf information
kern_log_snippet.log.gz
Description: application/gzip
--- End Message ---
--- Begin Message ---Source: linux Source-Version: 6.13.3-1~exp1 Done: Salvatore Bonaccorso <car...@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1093...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Salvatore Bonaccorso <car...@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 18 Feb 2025 12:49:42 +0100 Source: linux Architecture: source Version: 6.13.3-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Salvatore Bonaccorso <car...@debian.org> Closes: 1087807 1088159 1091517 1091858 1093371 1093734 1095232 1095435 1095647 Changes: linux (6.13.3-1~exp1) experimental; urgency=medium . * New upstream stable update: https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.13.3 - [x86] xen: fix xen_hypercall_hvm() to not clobber %rbx (Closes: #1095435) - mips/math-emu: fix emulation of the prefx instruction (Closes: #1091858) . [ John Paul Adrian Glaubitz ] * [alpha] Disable CONFIG_COMPACTION to avoid memory corruption . [ Yoann Congal ] * [arm64/rt] Re-enable KVM . [ Salvatore Bonaccorso ] * [mips*] Increase RELOCATION_TABLE_SIZE to 0x00280000 (fixes FTBFS) * nfsd: validate the nfsd_serv pointer before calling svc_wake_up (Closes: #1093734) * [x86] xen: allow larger contiguous memory regions in PV guests (Closes: #1093371, #1088159, #1087807) * xen/swiotlb: relax alignment requirements (Closes: #1093371, #1088159, #1087807) * USB: Add USB_QUIRK_NO_LPM quirk for sony xperia xz1 smartphone (Closes: #1091517) . [ Bastian Blank ] * [amd64, arm64] Enable NITRO_ENCLAVES, NSM. (closes: #1095647) * Enable DEVICE_PRIVATE, DRM_AMDGPU, HSA_AMD, HSA_AMD_SVM. (closes: #1095232) * Compress kernel with zstd where supported. * [arm64, riscv64] Enable EFI_ZBOOT. * Support zstd for firmware loader, enable FW_LOADER_COMPRESS_ZSTD. . [ Luca Boccassi ] * linux-bpf-dev: mark as MA: same Checksums-Sha1: b23f6b8e2b3e6fbfdfb8ec084391afb8fa3b301e 200433 linux_6.13.3-1~exp1.dsc 7e5ed6692f7592c209e845fbe7db84f9223c2290 151518868 linux_6.13.3.orig.tar.xz 53f8daeda01295a384f4849cc23b789bac362463 1545896 linux_6.13.3-1~exp1.debian.tar.xz 2b87a17f2daea6e1f9c16a9fe60c00f13956b821 7093 linux_6.13.3-1~exp1_source.buildinfo Checksums-Sha256: c938874612c3253fd3bea1773d3ed672e27fd4ee7be667ffc87f898ac22a5e33 200433 linux_6.13.3-1~exp1.dsc 04c2caa318adc0d7ff5a9071e11a35c6f4bc7ac0b40bc0c2c03e914f2bbc26c5 151518868 linux_6.13.3.orig.tar.xz a883ab7caa4825b427f6a5bb22a1b6b39cc276a550ed9796c7b9273f632521e8 1545896 linux_6.13.3-1~exp1.debian.tar.xz c42d7fd06397f78d27dad9a465c1801198f71924f9537ac24017d1221db3442c 7093 linux_6.13.3-1~exp1_source.buildinfo Files: db30cecd680b6ed552c2284b96de2db9 200433 kernel optional linux_6.13.3-1~exp1.dsc 0a95cdd823c4277a326688f025b8ed1b 151518868 kernel optional linux_6.13.3.orig.tar.xz 9a4f07b367c94e7cf1bd849eb00743bf 1545896 kernel optional linux_6.13.3-1~exp1.debian.tar.xz 37ed453a201ed10e3560a45810241fd4 7093 kernel optional linux_6.13.3-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAme0d+tfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk ZWJpYW4ub3JnAAoJEAVMuPMTQ89E2ogP+weQttsdyyi5ex4INZijLqnmhCtXl7lL Td4qHfQ+UWC8WVvqbg3Ng6y5VLXqSIxwdBBfaErXOEqcLR3gpbJxgpDD4yka3tFK v9Q4CCAQN+c8FLYL0B5CzizxF9kn6dx5CRuiNHl/vWUGaRdU4EClmmtLjHEkGxat 5gKpHsullFTGBIU9onX/rBBbHPJNd2knGPQr43cu2YYclNQWUM8Mq7t5uPtxIp7e AiBaVruaZtgBKkub1uq1tJZoAS4Va3iZ4T97mB4yT3cL3BKitc6Ny1LDfnWG1wVM lDdox9DbPsFoi07+j65RCoRPyzTEIvx0ubmXA2scBIPubz7fHXeQko35zV/RrS9I +A3UsVZFuJRI/dN+U5iHgQ5WdSolfwOVIRL/Nhn5+z5YBEq/tp8B9KOqL+ZsmL+t b1xnjNl8st8qVt4eP3ck1TsRgycmMcJwYSQYKOh9DWzTByPbxWzGHJyk+5nYg8O4 ov0SO++FujWfgZ9yCeZxBDSa6ADtSk8ig+hDx3/xOGVkFNxXJ0ArW7v1OT+TVw2D nfZkVa7dr8Q0Z9RP3ftGhW56SvtbwJf7mlbNGRpgsz4C/yOoITF6Jp1eyh9Tvo88 7iaLTN1k4L5tP4OqqFRH12J6iVCnbARYWjFSx+j6fDkQP0FAZVipG/r6zz8aCc/+ KKM0VhwaFaTj =KfO8 -----END PGP SIGNATURE-----
pgps1dMdOVooI.pgp
Description: PGP signature
--- End Message ---