Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.kernel    |    Debian kernel discussions    |    2,884 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,432 of 2,884    |
|    Salvatore Bonaccorso to Tyler W. Ross    |
|    Bug#1120598: ls input/output error ("NFS    |
|    13 Nov 25 06:10:01    |
      XPost: linux.debian.bugs.dist, linux.kernel       From: carnil@debian.org              Hi NFS folks,              Tyler W. Ross reported the following issue in Debian (in       https://bugs.debian.org/1120598)              On Wed, Nov 12, 2025 at 04:41:28PM -0500, Tyler W. Ross wrote:       > Package: nfs-common       > Version: 1:2.8.4-1+b1       > Severity: important       > X-Debbugs-Cc: twr+debbugs@tylerwross.com       >       >       > When the session key of a kerberos ticket uses a SHA2 cipher (       es256-cts-hmac-sha384-192 and aes128-cts-hmac-sha256-128 tested), readdir       requests fail.       >       > SHA1 ciphers (aes256-cts-hmac-sha1-96 and aes128-cts-hmac-sha1-96 tested)       work as expected.       >       > ls reports the following:       > ls: reading directory '/mnt/example/': Input/output error       >       > stat and touch of files and directories is working, and cat'ing a file works       (see also: later note about cat with NFSv4.1 and 4.0).       >       >       >       > Example of a non-working ticket, as reported by klist -e:       > 11/12/25 18:37:30 11/13/25 17:49:03 nfs/nfssrv.ipa.twrlab.ne       @IPA.TWRLAB.NET       > Etype (skey, tkt): aes256-cts-hmac-sha384-192, aes256-cts-hmac-sha384-192       >       > Example of a working ticket:       > 11/12/25 19:01:46 11/13/25 18:27:33 nfs/nfssrv.ipa.twrlab.ne       @IPA.TWRLAB.NET       > Etype (skey, tkt): aes256-cts-hmac-sha1-96, aes256-cts-hmac-sha384-192       >       > If rpcdebug is enabled for nfs and rpc modules, the following is logged to       dmesg:       > [332376.797836] NFS: nfs_weak_revalidate: inode 262146 is valid       > [332376.798512] NFS: revalidating (0:58/262146)       > [332376.799169] --> nfs41_call_sync_prepare data->seq_server 00000000e22b1bd9       > [332376.799916] --> nfs4_alloc_slot used_slots=0000 highest_used=4294967295       max_slots=64       > [332376.800764] <-- nfs4_alloc_slot used_slots=0001 highest_used=0 slotid=0       > [332376.801507] RPC: gss_krb5_get_mic_v2       > [332376.802009] encode_sequence: sessionid=1762048597:1479457708:22:0       seqid=27 slotid=0 max_slotid=0 cache_this=0       > [332376.803204] RPC: gss_krb5_get_mic_v2       > [332376.803726] RPC: xs_tcp_send_request(260) = 0       > [332376.804536] RPC: gss_krb5_verify_mic_v2       > [332376.805093] RPC: gss_krb5_verify_mic_v2       > [332376.805643] decode_attr_type: type=040000       > [332376.806149] decode_attr_change: change attribute=22       > [332376.806866] decode_attr_size: file size=4096       > [332376.807398] decode_attr_fsid: fsid=(0xfdcb5a40986843e0/0xa       fc6c44ad8345ad)       > [332376.808154] decode_attr_fileid: fileid=262146       > [332376.808742] decode_attr_fs_locations: fs_locations done, error = 0       > [332376.809495] decode_attr_mode: file mode=0777       > [332376.810042] decode_attr_nlink: nlink=3       > [332376.810695] decode_attr_owner: uid=591200000       > [332376.811229] decode_attr_group: gid=591200004       > [332376.811761] decode_attr_rdev: rdev=(0x0:0x0)       > [332376.812291] decode_attr_space_used: space used=4096       > [332376.812878] decode_attr_time_access: atime=1762383044       > [332376.813487] decode_attr_time_create: btime=1761952933       > [332376.814098] decode_attr_time_metadata: ctime=1762055558       > [332376.814895] decode_attr_time_modify: mtime=1762055558       > [332376.815578] decode_attr_mounted_on_fileid: fileid=262146       > [332376.816225] decode_getfattr_attrs: xdr returned 0       > [332376.816796] decode_getfattr_generic: xdr returned 0       > [332376.817374] --> nfs4_alloc_slot used_slots=0001 highest_used=0       max_slots=64       > [332376.818135] <-- nfs4_alloc_slot used_slots=0003 highest_used=1 slotid=1       > [332376.818873] nfs4_free_slot: slotid 1 highest_used_slotid 0       > [332376.819604] nfs41_sequence_process: Error 0 free the slot       > [332376.820228] nfs4_free_slot: slotid 0 highest_used_slotid 4294967295       > [332376.820930] NFS: nfs_update_inode(0:58/262146 fh_crc=0xad8c294c ct=2       info=0x4427e7f)       > [332376.821767] NFS: (0:58/262146) revalidation complete       > [332376.822342] NFS: nfs_weak_revalidate: inode 262146 is valid       > [332376.823056] NFS: permission(0:58/262146), mask=0x24, res=0       > [332376.823684] NFS: open dir(/)       > [332376.824087] NFS: readdir(/) starting at cookie 0       > [332376.824641] _nfs4_proc_readdir: dentry = /, cookie = 0       > [332376.825229] --> nfs41_call_sync_prepare data->seq_server 00000000e22b1bd9       > [332376.825967] --> nfs4_alloc_slot used_slots=0000 highest_used=4294967295       max_slots=64       > [332376.826814] <-- nfs4_alloc_slot used_slots=0001 highest_used=0 slotid=0       > [332376.827616] RPC: gss_krb5_get_mic_v2       > [332376.828114] encode_sequence: sessionid=1762048597:1479457708:22:0       seqid=28 slotid=0 max_slotid=0 cache_this=0       > [332376.829146] encode_readdir: cookie = 0, verifier = 00000000:00000000,       bitmap = 0018091a:00b4a23a:00000000       > [332376.830144] RPC: gss_krb5_get_mic_v2       > [332376.830720] RPC: xs_tcp_send_request(284) = 0       > [332376.831431] RPC: gss_krb5_verify_mic_v2       > [332376.831967] RPC: gss_krb5_verify_mic_v2       > [332376.832498] --> nfs4_alloc_slot used_slots=0001 highest_used=0       max_slots=64       > [332376.833254] <-- nfs4_alloc_slot used_slots=0003 highest_used=1 slotid=1       > [332376.833994] nfs4_free_slot: slotid 1 highest_used_slotid 0       > [332376.834695] nfs41_sequence_process: Error 0 free the slot       > [332376.835318] nfs4_free_slot: slotid 0 highest_used_slotid 4294967295       > [332376.836016] _nfs4_proc_readdir: returns -5       > [332376.836519] NFS: readdir(/) returns -5       >       >       >       > Environment/Supporting Systems:       > - The NFS server is a fresh Debian 13 cloud image. freeipa-client, gssproxy,       nfs-kernel-server, and qemu-guest-agent have been installed. Joined to FreeIPA       via ipa-client-install.       > - Kerberos is provided by a newly installed FreeIPA instance on Fedora 43.       >       > Failing NFS client configurations:       > 1. Freshly deployed and updated Debian 13 official cloud image       (debian-13-genericcloud-amd64). freeipa-client, gssproxy, nfs-common, and       qemu-guest-agent have been installed. Joined to FreeIPA via ipa-client-install.              [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca