Bug 21937 - last kernel update drops support for mounting smb v3 resources
Summary: last kernel update drops support for mounting smb v3 resources
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: RPM Packages (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal minor
Target Milestone: ---
Assignee: Kernel and Drivers maintainers
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-10-26 17:51 CEST by fabrice roussin
Modified: 2018-09-17 11:13 CEST (History)
3 users (show)

See Also:
Source RPM: kernel-tmb
CVE:
Status comment:


Attachments

Description fabrice roussin 2017-10-26 17:51:07 CEST
with 4.9.56-tmb-desktop-1.mga6 I have a error when trying to mount smb v3 network drive :

[root@mypc ~]# mount -t cifs //srv-file/share /mnt/partage/ --verbose -o vers=3.0,...
mount.cifs kernel mount options: ip=192.1.2.3,unc=\\srv-file\share,vers=3.0,iocharset=utf8,uid=1000,...
mount error(5): Input/output error
Refer to the mount.cifs(8) manual page (e.g. man mount.cifs)

dmesg output is 
[   37.853441] CIFS VFS: validate protocol negotiate failed: -11
[   37.853494] CIFS VFS: cifs_mount failed w/return code = -5



same command works fine with with 4.9.50-tmb-desktop-1.mga6 

(Fortunately for me, the server accepts version 2.1)
(maybe linked to https://bugzilla.redhat.com/show_bug.cgi?id=1502606 ?)
David Walser 2017-10-26 18:28:09 CEST

Assignee: bugsquad => kernel

Samuel Verschelde 2017-10-27 10:14:19 CEST

Source RPM: (none) => kernel-tmb

Shlomi Fish 2017-10-27 10:34:37 CEST

Summary: last kernel update drops support for mounting smb v3 ressource => last kernel update drops support for mounting smb v3 resources
CC: (none) => shlomif

Comment 1 Thomas Backlund 2017-10-27 14:23:43 CEST
It's an regression introduced upstream  in 4.4.90, 4.9.53, 4.13.5 so all current Mageia 5 / 6 / Cauldron kernels are affected... :/

Seems they now have a working fix upstream heading to linus:
https://git.samba.org/?p=sfrench/cifs-2.6.git;a=commit;h=cf237481182846c508a4baa4f8281a2a7262ca09

Status: UNCONFIRMED => ASSIGNED
CC: (none) => tmb
Ever confirmed: 0 => 1

Comment 2 Thomas Backlund 2017-10-27 23:00:38 CEST
I've pushed a kernel-tmb-4.9.59-1.mga6 with the fix referenced in comment 1 to updates_testing (currently building) so it should be available in ~1+ hour or so...

Please test it and let me know if it works for you
Comment 3 fabrice roussin 2017-10-29 13:53:09 CET
(In reply to Thomas Backlund from comment #2)
> I've pushed a kernel-tmb-4.9.59-1.mga6 with the fix referenced in comment 1
> to updates_testing (currently building) so it should be available in ~1+
> hour or so...
> 
> Please test it and let me know if it works for you


Hi Thomas,

thank you for the explanation and for the fix. 

I won't be able to test until I'm connected to my corporate network tomorrow. 

Could you please give me a guideline to update only kernel-tmb once I declare updates_testing to the repos (this may sound like a newbie question, but I'm afraid of breaking other things if I update the whole system) ?
Comment 4 Thomas Backlund 2017-10-29 15:59:00 CET
as root run theese commands:


urpmi.update ""

urpmi --media Testing kernel-tmb-desktop-latest


or if you use any dkms packages (like nvidia proprietary drivers) you need to instead do:


urpmi --media Testing kernel-tmb-desktop-latest kernel-tmb-desktop-devel-latest
Comment 5 fabrice roussin 2017-10-30 10:17:02 CET
(In reply to Thomas Backlund from comment #4)

Hello Thomas,

thanks to your instructions, I could install 4.9.59-tmb-desktop-1.mga6. Mounting v2 cifs still works, but no success with v3. Here is dmesg output :

-----------------------------------------------------------------------
[   84.998722] BUG: unable to handle kernel NULL pointer dereference at 0000000000000040
[   84.998760] IP: [<ffffffff8130d97a>] crypto_shash_setkey+0x1a/0xc0
[   84.998786] PGD 0 

[   84.998795] Oops: 0000 [#1] PREEMPT SMP
[   84.998807] Modules linked in: fuse rfcomm pci_stub vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O) md4 cifs ccm af_packet binfmt_misc bnep msr joydev sunrpc dm_mirror dm_region_hash dm_log dm_mod hid_generic usbhid btusb uvcvideo btrtl btbcm btintel bluetooth videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videodev snd_hda_codec_realtek snd_hda_codec_hdmi snd_hda_codec_generic videobuf2_core iTCO_wdt iTCO_vendor_support intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel arc4 dell_wmi sparse_keymap kvm ppdev mei_wdt irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel nls_utf8 iwldvm nls_cp437 aesni_intel dell_laptop dell_smbios aes_x86_64 vfat dcdbas lrw glue_helper ablk_helper cryptd fat intel_cstate psmouse intel_uncore mac80211 intel_rapl_perf input_leds
[   84.999171]  i2c_i801 lpc_ich i2c_smbus wmi thermal snd_soc_rt5640 snd_soc_rl6231 parport_pc snd_soc_core iwlwifi snd_hda_intel parport snd_hda_codec rtc_cmos elan_i2c dell_smo8800 snd_compress ac97_bus i2c_designware_platform dw_dmac cfg80211 dw_dmac_core spi_pxa2xx_platform snd_soc_sst_acpi 8250_dw snd_hda_core i2c_designware_core snd_soc_sst_match snd_hwdep battery dell_rbtn e1000e snd_pcm ac fjes rfkill tpm_tis tpm_tis_core tpm snd_timer ie31200_edac ptp snd mei_me pps_core mei soundcore edac_core shpchp yenta_socket pcmcia_rsrc pcmcia_core evdev nvram dell_smm_hwmon sch_fq_codel efivarfs ipv6 autofs4 xhci_pci xhci_hcd ehci_pci ehci_hcd usbcore sr_mod sdhci_pci serio_raw usb_common sdhci_acpi mmc_block sdhci mmc_core i2c_hid hid i915 video button i2c_algo_bit drm_kms_helper syscopyarea sysfillrect
[   84.999559]  sysimgblt fb_sys_fops drm
[   84.999579] CPU: 1 PID: 13464 Comm: mount.cifs Tainted: G           O    4.9.59-tmb-desktop-1.mga6 #1
[   84.999610] Hardware name: Dell Inc. Latitude E6540/05V0V4, BIOS A11 08/28/2014
[   84.999635] task: ffff8803d1788bc0 task.stack: ffffc9000971c000
[   84.999657] RIP: 0010:[<ffffffff8130d97a>]  [<ffffffff8130d97a>] crypto_shash_setkey+0x1a/0xc0
[   84.999701] RSP: 0000:ffffc9000971f9e8  EFLAGS: 00010286
[   84.999720] RAX: ffff8803fc6a5800 RBX: ffff8803d1513d00 RCX: 00000000fffcb980
[   84.999744] RDX: 0000000000000010 RSI: ffff8803fc6a5918 RDI: 0000000000000000
[   84.999767] RBP: ffffc9000971fa20 R08: ffffc9000971fb94 R09: 0000000000000000
[   84.999792] R10: 000000008020001f R11: 00000015f4ad60ee R12: ffff8803ee939880
[   84.999813] R13: 0000000000000000 R14: ffff8803fc6a5918 R15: 0000000000000010
[   84.999839] FS:  00007f9bb796a740(0000) GS:ffff88041ea80000(0000) knlGS:0000000000000000
[   84.999866] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   84.999884] CR2: 0000000000000040 CR3: 00000003b5920000 CR4: 00000000001406e0
[   84.999909] Stack:
[   84.999915]  ffffffff810fa221 ffffffff81075ab9 ffff8803d1513d00 ffff8803ee939880
[   84.999944]  ffffc9000971fae0 ffff8803c4766000 ffff8803c4766000 ffffc9000971fa68
[   84.999975]  ffffffffa09dc19c 0000000000000000 0000000000000000 0a61a6b245bbf6d7
[   85.000005] Call Trace:
[   85.000013]  [<ffffffff810fa221>] ? mempool_alloc+0x61/0x160
[   85.000032]  [<ffffffff81075ab9>] ? smt_should_schedule+0x69/0x110
[   85.000062]  [<ffffffffa09dc19c>] smb3_calc_signature+0x7c/0x130 [cifs]
[   85.000097]  [<ffffffffa09db88b>] smb2_sign_rqst+0x2b/0x40 [cifs]
[   85.000121]  [<ffffffffa09dc50f>] smb2_setup_request+0xdf/0x130 [cifs]
[   85.000148]  [<ffffffffa09cfc03>] SendReceive2+0xe3/0x3e0 [cifs]
[   85.000170]  [<ffffffffa09cd9e5>] ? cifs_small_buf_get+0x15/0x30 [cifs]
[   85.000203]  [<ffffffffa09df6dd>] SMB2_ioctl+0x14d/0x2b0 [cifs]
[   85.000223]  [<ffffffffa09df928>] smb3_validate_negotiate+0xe8/0x1c0 [cifs]
[   85.000251]  [<ffffffffa09dd9c0>] SMB2_tcon+0x290/0x3a0 [cifs]
[   85.000281]  [<ffffffffa09bdce9>] cifs_get_tcon+0x139/0x330 [cifs]
[   85.000305]  [<ffffffffa09bfb8c>] cifs_mount+0x69c/0xc10 [cifs]
[   85.000326]  [<ffffffffa09b0885>] cifs_do_mount+0xf5/0x430 [cifs]
[   85.000340]  [<ffffffff8115d92f>] mount_fs+0xf/0x90
[   85.000352]  [<ffffffff8117a412>] vfs_kern_mount+0x62/0x110
[   85.000364]  [<ffffffff8117c9d2>] do_mount+0x1b2/0xc50
[   85.000377]  [<ffffffff81155d70>] ? __check_object_size+0x100/0x1d5
[   85.000391]  [<ffffffff811132ca>] ? memdup_user+0x4a/0x70
[   85.000403]  [<ffffffff8117d790>] SyS_mount+0x90/0xd0
[   85.000415]  [<ffffffff81629924>] entry_SYSCALL_64_fastpath+0x17/0x98
[   85.000429] Code: 89 e5 8b 12 e8 a8 bf 04 00 31 c0 5d c3 0f 1f 40 00 55 48 89 e5 41 57 41 56 41 55 41 54 49 89 fd 53 49 89 f6 41 89 d7 48 83 ec 10 <4c> 8b 67 40 41 8b 5c 24 2c 48 85 de 75 14 41 ff 54 24 e8 48 83 
[   85.000535] RIP  [<ffffffff8130d97a>] crypto_shash_setkey+0x1a/0xc0
[   85.000550]  RSP <ffffc9000971f9e8>
[   85.000557] CR2: 0000000000000040
[   85.006714] ---[ end trace 8df3b318e2b8b0a2 ]---
-----------------------------------------------------------------------
Comment 6 Morgan Leijström 2018-09-17 08:12:11 CEST
Is it OK on current kernels?

CC: (none) => fri

Comment 7 fabrice roussin 2018-09-17 09:39:03 CEST
(In reply to Morgan Leijström from comment #6)
> Is it OK on current kernels?

yes, I confirm there is no problem with 4.14.65-tmb-desktop-1.mga6
Thank you
Comment 8 Morgan Leijström 2018-09-17 11:13:54 CEST
Thank you.
Marking as FIXED then :)

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.