archive mirror
 help / color / mirror / Atom feed
From: Thorsten Leemhuis <>
To: "Paulo Alcantara (SUSE)" <>
Cc: "" <>,
	Moritz Duge <>, Aurelien Aptel <>,
	Ronnie Sahlberg <>,
	Steve French <>,
	Linux Kernel Mailing List <>,
	"" <>
Subject: Regression: CIFS umount fails since 14302ee33 with some servers (exit code 32)
Date: Fri, 8 Apr 2022 12:08:16 +0200	[thread overview]
Message-ID: <> (raw)

Hi, this is your Linux kernel regression tracker.

Paul, it seems a commit authored by you causes a regression:

I noticed a regression report in that afaics nobody
acted upon since it was reported about a week ago, that's why I decided
to forward it to the lists and all people that seemed to be relevant
here. To quote from

>  Moritz Duge 2022-03-31 16:47:35 UTC
> With upstream kernel 5.16.9 CIFS umount fails when using certain SMB servers.
> "umount" returns exit code 32 and the "mount" command still lists the mount as being present.
> See below for the bad commit I've bisected.
> The bug has been reproduced multiple times with upstream kernel 5.16.9!
> But additionally I've done much testing with openSUSE kernels.
> Here's the openSUSE bugreport:
> Additionally with the same servers there's a problem showing the free space with the "df" command. But I haven't been able to find out if this is really related to the umount problem.
> = SMB Server =
> I haven't been able to identify the exact server side settings. But this problem occured with at least this SMB server (with upstream kernel 5.16.9):
> NetApp (Release 9.7P12) with dfs and CIFS mount options "vers=3.1.1,seal"
> (quota state unknown)
> Additionally I've verified the bug with the openSUSE kernel 5.3.18-lp152.72-default and this SMB server:
> Windows Server 2019 with dfs and quota enabled
> (no explicit "vers" or "seal" mount options)
> Additionally the bug appeared with another NetApp SMB server (tested upstream 5.16.9) and two unknown servers (tested only openSUSE-15.2 kernels).
> Also it looks like the bug may need a setup where the user can only read //server/share/username/ but has no permissions to read //server/share/.
> = Bad Commit =
> With the openSUSE kernel I bisected the problem down to this commit (6ae27f2b2) between openSUSE-15.2 kernels 5.3.18-lp152.69.1 and 5.3.18-lp152.72.1.
> This commit is also present in the upstream kernel (14302ee33).
> And it has been merged between 5.11 and 5.12.
> As said I can't reproduce this with arbitrary SMB servers. And it's always a time consuming procedure for me to do a test with the affected production SMB servers. But if you're really unhappy with the bisect search on the openSUSE kernel, I can repeat the test with the upstream commit 14302ee33 and it's predecessor.

Could somebody take a look into this? Or was this discussed somewhere
else already? Or even fixed?

Anyway, to get this tracked:

#regzbot introduced: 14302ee3301b3a77b331cc14
#regzbot from: Moritz Duge <>
#regzbot title: CIFS: umount fails with some servers (exit code 32)
#regzbot link:

Ciao, Thorsten (wearing his 'the Linux kernel's regression tracker' hat)

P.S.: As the Linux kernel's regression tracker I'm getting a lot of
reports on my table. I can only look briefly into most of them and lack
knowledge about most of the areas they concern. I thus unfortunately
will sometimes get things wrong or miss something important. I hope
that's not the case here; if you think it is, don't hesitate to tell me
in a public reply, it's in everyone's interest to set the public record

Additional information about regzbot:

If you want to know more about regzbot, check out its web-interface, the
getting start guide, and the references documentation:

The last two documents will explain how you can interact with regzbot
yourself if your want to.

Hint for reporters: when reporting a regression it's in your interest to
CC the regression list and tell regzbot about the issue, as that ensures
the regression makes it onto the radar of the Linux kernel's regression
tracker -- that's in your interest, as it ensures your report won't fall
through the cracks unnoticed.

Hint for developers: you normally don't need to care about regzbot once
it's involved. Fix the issue as you normally would, just remember to
include 'Link:' tag in the patch descriptions pointing to all reports
about the issue. This has been expected from developers even before
regzbot showed up for reasons explained in
'Documentation/process/submitting-patches.rst' and

             reply	other threads:[~2022-04-08 10:08 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-04-08 10:08 Thorsten Leemhuis [this message]
2022-05-04 13:19 ` Regression: CIFS umount fails since 14302ee33 with some servers (exit code 32) Thorsten Leemhuis
2022-05-04 16:12   ` Moritz Duge
2022-05-04 16:25     ` Paulo Alcantara
2022-05-04 16:43       ` Thorsten Leemhuis

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \ \ \ \ \ \ \ \ \ \ \

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).