From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: linux-nfs-owner@vger.kernel.org Received: from ax13.adsl.tnnet.fi ([217.112.254.13]:51530 "EHLO mail.opinsys.fi" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751297Ab3BRI1Y (ORCPT ); Mon, 18 Feb 2013 03:27:24 -0500 Date: Mon, 18 Feb 2013 08:23:12 +0000 (UTC) From: Veli-Matti Lintu To: Chuck Lever Cc: Tuomas =?utf-8?B?UsOkc8OkbmVu?= , linux-nfs@vger.kernel.org Message-ID: <505003638.18320.1361175792539.JavaMail.root@opinsys.fi> In-Reply-To: <74874B5C-CDDE-4F77-B69D-FC40FF5DD933@oracle.com> References: <127351146.98508.1360769367943.JavaMail.root@opinsys.fi> <1117889154.119108.1360851840169.JavaMail.root@opinsys.fi> <654867786.10283.1360929631448.JavaMail.root@opinsys.fi> <74874B5C-CDDE-4F77-B69D-FC40FF5DD933@oracle.com> Subject: Re: Kernels 3.7 and newer break rpc.gssd -n MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Sender: linux-nfs-owner@vger.kernel.org List-ID: > > Yes. With commit 05f4c350 + the compilation fix, the problem occurs, but > > without > > 05f4c350, the parent (6f2ea7f) works as expected, requesting for service > > . > >> When the mount operation fails, is it the first time this client attempts > >> to > >> mount a share on server.example.org, or does the client already have > >> mounts > >> of server.example.org, possibly using other security flavors? > > Yes, the problem occurs on the very first mount attempt. > > Thanks for confirming. Did you try updating nfs-utils on your NFS client to > 1.2.8-rc1 or later (specifically to replace rpc.gssd)? Yes, gssd from nfs-utils 1.2.8-rc3 behaves the same way and fails when service name is not null. The code in gssd that checks for the service name seems to be the same if I understand the code correctly. http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=blob;f=utils/gssd/gssd_proc.c;h=c17ab3bf914526f433fb6c76ace1daa63c10d921;hb=HEAD#l985 --------------------------------------------------------------------------------- if (uid != 0 || (uid == 0 && root_uses_machine_creds == 0 && service == NULL)) { /* Tell krb5 gss which credentials cache to use */ for (dirname = ccachesearch; *dirname != NULL; dirname++) { err = gssd_setup_krb5_user_gss_ccache(uid, clp->servername, *dirname); if (err == -EKEYEXPIRED) downcall_err = -EKEYEXPIRED; else if (!err) create_resp = create_auth_rpc_client(clp, &rpc_clnt, &auth, uid, AUTHTYPE_KRB5); if (create_resp == 0) break; } } --------------------------------------------------------------------------------- Veli-Matti