On 03/21/2011 01:36 AM, Vladimir Elisseev wrote: > Steve, > > The segfault on the client side is gone after client reboot. This > segfault occurs when nfs-utils has been updated and then I just restart > corresponding services (rpcbind, rpc.idmapd, rpc.gssd) without rebooting > the client. Now client simply exits with the lines below (as I described > initially in my first mail): > mount.nfs: mount(2): Permission denied > mount.nfs: access denied by server while mounting ... Ok.. to find out where rpc.gssd is segfaulting do the following: # debuginfo-install nfs-utils (assuming Fedora) # gdb /usr/sbin/rpc.gssd gdb> run -f -vvv (When the segfault happens) gdb> bt (which will show the backtrace) steved. > > Regards, > Vladimir. > > On Sat, 2011-03-19 at 22:19 -0400, Steve Dickson wrote: >> >> On 03/19/2011 03:56 AM, Vladimir Elisseev wrote: >>> Kevin, >>> >>> I have some updates. I recompiled nfs-utils and dependencies (libgssglue >>> keyutils librpcsecgss libtirpc) on the server and on the test client. >>> Nevertheless, while on the server side I see the same error: >>> rpc.svcgssd[8390]: qword_eol: fflush failed: errno 22 (Invalid argument) >>> on the client side rpc.gssd segfault(!): >>> kernel: rpc.gssd[2107] segfault at 4 ip 0000003ef9430805 sp 00007fff655cdd10 error 4 in libgssapi_krb5.so.2.2[3ef9400000+3e000] >>> Reverting back to nfs-utils 1.2.2 on the client and everything is fine. >>> Below are relevant log entries from KDC when using nfs-utils 1.2.2 and 1.2.3 on the client: >>> >>> ****** nfs-utils 1.2.2 ******* >>> Mar 19 07:56:27 srv2 krb5kdc[7945]: AS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.8: ISSUE: authtime 1300517787, etypes {rep=18 tkt=18 ses=18}, host/vbox.xxx.xxx@xxx for krbtgt/X.X@xxx >>> Mar 19 07:56:28 srv2 krb5kdc[7945]: TGS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.8: ISSUE: authtime 1300517787, etypes {rep=18 tkt=18 ses=18}, host/vbox.xxx.xxx@xxx for nfs/nfs.xxx.xxx@xxx >>> Mar 19 07:56:28 srv2 krb5kdc[7945]: TGS_REQ (3 etypes {1 3 2}) 192.168.1.8: ISSUE: authtime 1300517787, etypes {rep=18 tkt=18 ses=1}, host/vbox.xxx.xxx@xxx for nfs/nfs.xxx.xxx@xxx >>> >>> ****** nfs-utils 1.2.3 ******* >>> Mar 19 08:22:22 srv2 krb5kdc[7945]: AS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.2: ISSUE: authtime 1300519342, etypes {rep=18 tkt=18 ses=18}, host/x.x.x@xxx for krbtgt/X.X@xxx >>> Mar 19 08:22:22 srv2 krb5kdc[7945]: TGS_REQ (7 etypes {18 17 16 23 1 3 2}) 192.168.1.2: ISSUE: authtime 1300519342, etypes {rep=18 tkt=18 ses=18}, host/x.x.x@xxx for nfs/nfs.x.x@xxx >>> then >>> rpc.svcgssd[8390]: qword_eol: fflush failed: errno 22 (Invalid argument) >>> and segfault on the client side. >> Would it be possible to get a back trace from the core? >> >> steved. > -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html