SUSE Support

Here When You Need Us

Random 'permission denied', 'check lease failed' and rpc errors

This document (000022076) is provided subject to the disclaimer at the end of this document.

Environment

SUSE Linux Enterprise Server 15 Service Pack 6


Situation

A mixture of errors are seen at the NFS clients and NFS servers.

At the NFS clients:

[Wed Sep 17 13:24:53 2025] NFS: state manager: check lease failed on NFSv4 server <ip_address>  with error 13
name@server:/sapmnt> ls -la
/bin/ls: cannot access 'file1': Permission denied
total 4
drwxr-xr-x  3 root sapsys   17 Oct 11  2021 .
drwxr-xr-x 28 root root   4096 Sep 17 16:38 ..
d?????????  ? ?    ?         ?            ? file1


At the NFS server:

2025-09-17T08:11:30.393840+00:00 <server_name> kernel: [T101906] rpc-srv/tcp: nfsd: got error -104 when sending 20 bytes - shutting down socket
2025-09-17T08:13:29.429815+00:00 <server_name> kernel: [T101906] rpc-srv/tcp: nfsd: got error -32 when sending 20 bytes - shutting down socket


The errors appear at random intervals and sometimes persist with specific client/server combinations for a few hours.

Please note that various and different issues might cause the above errors and as such, they are somewhat superficial and may occur in scenarios other than the one this document is meant to discuss.  For this specific scenario, the underlying symptom is the RPC layer is denying the NFS client's access to the NFS Server.  In Wireshark (or other packet reading tool) the RPC header shows (in part):

Remote Procedure Call, Type:Reply XID:0x<nnnnnnnn>
     Message Type: Reply (1)
     <snip>
     Reply State: denied (1)
     Reject State: AUTH_ERROR (1)
     Auth State: bad credential (seal broken) (1)

This indicates that the NFS Server does not consider the client in question to be authorized to use the NFS path in question.  It may be related to the export syntax of the path and it's trusted client specification, as well as any code or services needed to resolve the client specification from names to addresses or to resolve netgroup names to membership lists.

Resolution

Making both of the following changes has been shown to avoid the issue:

1.  Adding the IP addresses of the NFS clients to the hosts file of the NFS servers.

2.  Changing the authentication mechanism for the NFS clients from netgroups flat files to IP address based authentication.

 

Cause

At the time of creating this document, it is unclear what the exact cause of the problem is.

The problem may be related to unreliable DNS resolution and the caching of DNS lookup failures. The problem may also involve something specific to netgroups (when used for NFS client authentication), or a combination of some or all of these elements.

Additional Information

Should these issues be encountered, a support case can be opened using an appropriate entitlement.

In addition to providing supportconfigs from affected NFS clients and NFS servers, the following procedure should be followed and the resulting data should be collected and added to a support case:

1.  This change must be made prior to the next occurrence of the issue:

    On the NFS Server nodes, edit the /etc/sysconfig/nfs configuration file

    find "MOUNTD_OPTIONS" and set this to:

    MOUNTD_OPTIONS="-l -d auth"

    Save the changes and restart the nfsserver service to enable the new mount options.

2.  Wait for the problem to reoccur.

3.  Once the problem is present, start tcpdump at the nfs server.  Both nfs and dns traffic are required so the capture
         should be from all interfaces (use '-i any').
    The capture doesn't have to be running during all of the steps in this procedure (a trace of approx 1 minute should be adequate).
    The purpose of the capture is to verify that all NFS Server replies are generating RPC authentication errors.

4.  Other related diagnostic data is also required.  It is captured using the following commands (which can be made
          into a script):

    mkdir /tmp/logs
    grep . /proc/net/rpc/*/content > /tmp/logs/content-before
    grep . /proc/net/rpc/*/channel > /tmp/logs/channel-before
    strace -o /tmp/logs/mountd.strace -s 100 -T -tt -p `pidof rpc.mountd` & sleep 10 ; kill $1
    exportfs -f
    sleep 30
    grep . /proc/net/rpc/*/content > /tmp/logs/content-after

    Note: The /tmp/logs location can be substituted as needed.

    It is possible at this point that the execution of "exportfs -f" will have cleared the problem and the client may be working
         again.
    But if the client has not recovered, restart the nfsserver process (normally, this would be done using
         'systemctl restart nfsserver' but in clustered environments other steps may be needed instead)

    Then execute these commands:

    sleep 30
    grep . /proc/net/rpc/*/content > /tmp/logs/content-after-restart

    At this point, the problem is expected to be fully recovered (at least for the moment). Please record if that is the case or not.

5.  Provide the following logs from the nfs server:

    /var/log/messages
    /tmp/logs/content-before
    /tmp/logs/channel-before
    /tmp/logs/content-after
    /tmp/logs/content-after-restart  #(if applicable)
    /tmp/logs/mountd.strace

     Provide the tcpdump pcap files

     Provide information on whether the problem was cleared after the execution of 'exportfs -f' and/or after restarting the
          NFS server.


Notes: 

The server-side errors are socket-related.
The caching of DNS resolution results related to trusted clients is controlled by a kernel cache managed by rpc.mountd
The default life time of the kernel cache entries managed by rpc.mountd is 1800 seconds (adjustable).
This scope of this issue may not be limited to SLES15 SP6.

Disclaimer

This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:000022076
  • Creation Date: 03-Oct-2025
  • Modified Date:03-Oct-2025
    • SUSE Linux Enterprise Server

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com

tick icon

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

tick icon

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

tick icon

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.