This is a server side problem. Mount up an export with sec=krb5i: # mount -t nfs -o sec=krb5i server:/export /mnt/server ...now, do a large write. I used test5 from connectathon suite: # cd /mnt/server # env NFSTESTDIR=`pwd` strace /root/cthon04/basic/test5 -s relevant strace info: open("bigfile", O_WRONLY|O_CREAT|O_TRUNC|O_SYNC, 0666) = 3 stat("bigfile", {st_mode=S_IFREG|0666, st_size=0, ...}) = 0 write(3, "\0\0\0\0\1\0\0\0\2\0\0\0\3\0\0\0\4\0\0\0\5\0\0\0\6\0\0\0\7\0\0\0\10"..., 8192) = -1 EIO (Input/output error) ...the capture shows that the server had a problem decoding the args: Accept State: procedure can't decode params (4) ...this happens on all versions of nfs and when sec=krb5i or krb5p is used. sec=krb5 seems to be unaffected.
Created attachment 332830 [details] binary wireshark capture Binary capture of the problem. See frames 53 and 54.
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
Reassigning to Peter... I backed out the patch for bug 228854 and this problem went away. For reference, this is commit 7880f3a898df1feefd7f43458be3d18aedde7765 in dzickus' git tree.
Created attachment 332876 [details] patch -- change conditional on length check This patch is backported from upstream and seems to fix the problem.
Created attachment 340595 [details] Proposed patch Here is the patch as ported to RHEL-5.
in kernel-2.6.18-141.el5 You can download this test kernel from http://people.redhat.com/dzickus/el5 Please do NOT transition this bugzilla state to VERIFIED until our QE team has sent specific instructions indicating when to do so. However feel free to provide a comment indicating that this fix has been verified.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2009-1243.html