Steve, The segfault on the client side is gone after client reboot. This segfault occurs when nfs-utils has been updated and then I just restart corresponding services (rpcbind, rpc.idmapd, rpc.gssd) without rebooting the client. Now client simply exits with the lines below (as I described initially in my first mail): mount.nfs: mount(2): Permission denied mount.nfs: access denied by server while mounting ... Regards, Vladimir. On Sat, 2011-03-19 at 22:19 -0400, Steve Dickson wrote: > > On 03/19/2011 03:56 AM, Vladimir Elisseev wrote: > > Kevin, > > > > I have some updates. I recompiled nfs-utils and dependencies (libgssglue > > keyutils librpcsecgss libtirpc) on the server and on the test client. > > Nevertheless, while on the server side I see the same error: > > rpc.svcgssd[8390]: qword_eol: fflush failed: errno 22 (Invalid argument) > > on the client side rpc.gssd segfault(!): > > kernel: rpc.gssd[2107] segfault at 4 ip 0000003ef9430805 sp 00007fff655cdd10 error 4 in libgssapi_krb5.so.2.2[3ef9400000+3e000] > > Reverting back to nfs-utils 1.2.2 on the client and everything is fine. > > Below are relevant log entries from KDC when using nfs-utils 1.2.2 and 1.2.3 on the client: > > > > ****** nfs-utils 1.2.2 ******* > > Mar 19 07:56:27 srv2 krb5kdc[7945]: AS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.8: ISSUE: authtime 1300517787, etypes {rep=18 tkt=18 ses=18}, host/vbox.xxx.xxx@xxx for krbtgt/X.X@xxx > > Mar 19 07:56:28 srv2 krb5kdc[7945]: TGS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.8: ISSUE: authtime 1300517787, etypes {rep=18 tkt=18 ses=18}, host/vbox.xxx.xxx@xxx for nfs/nfs.xxx.xxx@xxx > > Mar 19 07:56:28 srv2 krb5kdc[7945]: TGS_REQ (3 etypes {1 3 2}) 192.168.1.8: ISSUE: authtime 1300517787, etypes {rep=18 tkt=18 ses=1}, host/vbox.xxx.xxx@xxx for nfs/nfs.xxx.xxx@xxx > > > > ****** nfs-utils 1.2.3 ******* > > Mar 19 08:22:22 srv2 krb5kdc[7945]: AS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.2: ISSUE: authtime 1300519342, etypes {rep=18 tkt=18 ses=18}, host/x.x.x@xxx for krbtgt/X.X@xxx > > Mar 19 08:22:22 srv2 krb5kdc[7945]: TGS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.2: ISSUE: authtime 1300519342, etypes {rep=18 tkt=18 ses=18}, host/x.x.x@xxx for nfs/nfs.x.x@xxx > > then > > rpc.svcgssd[8390]: qword_eol: fflush failed: errno 22 (Invalid argument) > > and segfault on the client side. > Would it be possible to get a back trace from the core? > > steved. -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html