[Bug 2028304] [NEW] continuous handle_nullreq: failed; please move to gssproxy

Charles Hedrick 2028304 at bugs.launchpad.net
Thu Jul 20 19:07:08 UTC 2023


Public bug reported:

[don't look at the system config. The actual server can't contact your
bug system, so this is being submitted from a desktop]

Ubuntu 22.04.1. NFS server using kerberized NFS.

Occasionally individual users lose access to their files, typically at
login. They get permission failed. The server shows continuous messages:

rpc.svcgssd[5672]: WARNING: handle_nullreq: failed reading request.

Looking at the code, this seems to happen when the GSS token is too
large for the fixed kernel buffer. The limit is documented as 2K, except
that the protocol to svcgssd is in text, so it's 4K there. Using strace,
I can see that when the system is working, some of the tokens are very
nearly 4K.

This problem should be fixed by using gssproxy instead of svcgssd. I'd
suggest that you move to gssproxy as the default. I think we'll see
increasing evidence of this problem as sites move to newer versions of
Kerberos.

The problem seems to have started when we upgraded our IPA servers. The
newest version of Kerberos includes PACs in the Kerberos tickets. That
increases the size of tickets. We're guessing that this was enough to
push the system into this failure mode intermittently.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: nfs-common 1:2.6.1-1ubuntu1.2
ProcVersionSignature: Ubuntu 5.19.0-35.36~22.04.1-generic 5.19.17
Uname: Linux 5.19.0-35-generic x86_64
.etc.request-key.d.id_resolver.conf: create	id_resolver	*	*	/usr/sbin/nfsidmap -t 600 %k %d
ApportVersion: 2.20.11-0ubuntu82.4
Architecture: amd64
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Thu Jul 20 14:56:18 2023
InstallationDate: Installed on 2022-11-07 (254 days ago)
InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 (20220809.1)
NFSMounts:
 
NFSv4Mounts: /staff/users temp.lcsr.rutgers.edu:/beta/users nfs4   rw,nosuid,nodev,relatime,vers=4.2,rsize=65536,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=krb5,clientaddr=128.6.26.16,local_lock=none,addr=172.16.90.121
SourcePackage: nfs-utils
UpgradeStatus: No upgrade log present (probably fresh install)
modified.conffile..etc.default.apport: [modified]
modified.conffile..etc.default.nfs-common: [modified]
mtime.conffile..etc.default.apport: 2022-11-23T13:25:53.902233
mtime.conffile..etc.default.nfs-common: 2022-11-23T12:56:19.514493

** Affects: nfs-utils (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug jammy wayland-session

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to nfs-utils in Ubuntu.
https://bugs.launchpad.net/bugs/2028304

Title:
  continuous handle_nullreq: failed; please move to gssproxy

Status in nfs-utils package in Ubuntu:
  New

Bug description:
  [don't look at the system config. The actual server can't contact your
  bug system, so this is being submitted from a desktop]

  Ubuntu 22.04.1. NFS server using kerberized NFS.

  Occasionally individual users lose access to their files, typically at
  login. They get permission failed. The server shows continuous
  messages:

  rpc.svcgssd[5672]: WARNING: handle_nullreq: failed reading request.

  Looking at the code, this seems to happen when the GSS token is too
  large for the fixed kernel buffer. The limit is documented as 2K,
  except that the protocol to svcgssd is in text, so it's 4K there.
  Using strace, I can see that when the system is working, some of the
  tokens are very nearly 4K.

  This problem should be fixed by using gssproxy instead of svcgssd. I'd
  suggest that you move to gssproxy as the default. I think we'll see
  increasing evidence of this problem as sites move to newer versions of
  Kerberos.

  The problem seems to have started when we upgraded our IPA servers.
  The newest version of Kerberos includes PACs in the Kerberos tickets.
  That increases the size of tickets. We're guessing that this was
  enough to push the system into this failure mode intermittently.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: nfs-common 1:2.6.1-1ubuntu1.2
  ProcVersionSignature: Ubuntu 5.19.0-35.36~22.04.1-generic 5.19.17
  Uname: Linux 5.19.0-35-generic x86_64
  .etc.request-key.d.id_resolver.conf: create	id_resolver	*	*	/usr/sbin/nfsidmap -t 600 %k %d
  ApportVersion: 2.20.11-0ubuntu82.4
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Thu Jul 20 14:56:18 2023
  InstallationDate: Installed on 2022-11-07 (254 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 (20220809.1)
  NFSMounts:
   
  NFSv4Mounts: /staff/users temp.lcsr.rutgers.edu:/beta/users nfs4   rw,nosuid,nodev,relatime,vers=4.2,rsize=65536,wsize=1048576,namlen=255,hard,proto=tcp,timeo=600,retrans=2,sec=krb5,clientaddr=128.6.26.16,local_lock=none,addr=172.16.90.121
  SourcePackage: nfs-utils
  UpgradeStatus: No upgrade log present (probably fresh install)
  modified.conffile..etc.default.apport: [modified]
  modified.conffile..etc.default.nfs-common: [modified]
  mtime.conffile..etc.default.apport: 2022-11-23T13:25:53.902233
  mtime.conffile..etc.default.nfs-common: 2022-11-23T12:56:19.514493

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/2028304/+subscriptions




More information about the foundations-bugs mailing list