[Bug 1046762] [NEW] rpc.gssd crashes in gss_pipe_downcall
Carlos Aguado
caguadosa at gmail.com
Thu Sep 6 10:12:33 UTC 2012
Public bug reported:
Source: nfs-utils
# lsb_release -rd
Description: Ubuntu 12.04.1 LTS
Release: 12.04
# apt-cache policy nfs-common
nfs-common:
Installed: 1:1.2.5-3ubuntu3
Candidate: 1:1.2.5-3ubuntu3
Version table:
*** 1:1.2.5-3ubuntu3 0
500 http://archive.ubuntu.com/ubuntu/ precise/main amd64 Packages
100 /var/lib/dpkg/status
Expected:
To be able to mount a krb5-protected NFSv4 share.
# cat /etc/fstab
san.example.com:/data/volume /nfs4/san.example.com/volume nfs4 _netdev,sec=krb5 0 0
What actually happens:
The kerberos service ticket is successfully requested as shown below [1], but the mount of the share never happens. Instead, /var/log/syslog sees the trace of what is reported as a kernel bug [2].
[1]
# klist -c /tmp/krb5cc_machine_EXAMPLE.COM
Ticket cache: FILE:/tmp/krb5cc_machine_EXAMPLE.COM
Default principal: host/client.example.com at EXAMPLE.COM
Valid starting Expires Service principal
06/09/2012 11:44 06/09/2012 21:44 krbtgt/EXAMPLE.COM at EXAMPLE.COM
renew until 11/09/2012 16:44
06/09/2012 11:44 06/09/2012 21:44 nfs/san.example.com at EXAMPLE.COM
renew until 11/09/2012 16:44
[2]
gss_pipe_downcall: bad return from gss_fill_context: -4
Sep 6 11:44:20 client kernel: [ 23.655189] ------------[ cut here ]------------
Sep 6 11:44:20 client kernel: [ 23.655190] kernel BUG at /build/buildd/linux-3.2.0/net/sunrpc/auth_gss/auth_gss.c:671!
Sep 6 11:44:20 client kernel: [ 23.655192] invalid opcode: 0000 [#1] SMP
Sep 6 11:44:20 client kernel: [ 23.655193] CPU 2
Sep 6 11:44:20 client kernel: [ 23.655194] Modules linked in: bnep rfcomm bluetooth parport_pc ppdev vesafb rpcsec_gss_krb5 nfsd nfs lockd fscache auth_rpcgss nfs_acl sunrpc snd_hda
_codec_hdmi snd_hda_codec_realtek nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm joydev snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device snd mac_hid mei(
C) soundcore snd_page_alloc video tpm_tis lp parport firewire_ohci firewire_core usbhid crc_itu_t hid e1000e
Sep 6 11:44:20 client kernel: [ 23.655211]
Sep 6 11:44:20 client kernel: [ 23.655212] Pid: 820, comm: rpc.gssd Tainted: P C O 3.2.0-29-generic #46-Ubuntu /DQ77MK
Sep 6 11:44:20 client kernel: [ 23.655215] RIP: 0010:[<ffffffffa0d79b9a>] [<ffffffffa0d79b9a>] gss_pipe_downcall+0x27a/0x2b0 [auth_rpcgss]
Sep 6 11:44:20 client kernel: [ 23.655219] RSP: 0018:ffff8803fb2d7e58 EFLAGS: 00010296
Sep 6 11:44:20 client kernel: [ 23.655220] RAX: 000000000000004d RBX: 0000000000000044 RCX: 000000000000001e
Sep 6 11:44:20 client kernel: [ 23.655221] RDX: 0000000000000000 RSI: 0000000000000086 RDI: 0000000000000246
Sep 6 11:44:20 client kernel: [ 23.655222] RBP: ffff8803fb2d7eb8 R08: 000000000000000a R09: 0000000000000000
Sep 6 11:44:20 client kernel: [ 23.655223] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8803ff32c7e0
Sep 6 11:44:20 client kernel: [ 23.655224] R13: ffff8803ff32cc00 R14: ffff8803fb085600 R15: fffffffffffffffc
Sep 6 11:44:20 client kernel: [ 23.655226] FS: 00007f846eabd740(0000) GS:ffff88041dc80000(0000) knlGS:0000000000000000
Sep 6 11:44:20 client kernel: [ 23.655227] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Sep 6 11:44:20 client kernel: [ 23.655228] CR2: 000000000061ac88 CR3: 00000003fe8b8000 CR4: 00000000001406e0
Sep 6 11:44:20 client kernel: [ 23.655229] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Sep 6 11:44:20 client kernel: [ 23.655230] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 6 11:44:20 client kernel: [ 23.655231] Process rpc.gssd (pid: 820, threadinfo ffff8803fb2d6000, task ffff880400cc4500)
Sep 6 11:44:20 client kernel: [ 23.655232] Stack:
Sep 6 11:44:20 client kernel: [ 23.655233] ffff8804009a1e00 0000000000000010 ffff8803ff32c824 ffff880402398700
Sep 6 11:44:20 client kernel: [ 23.655235] ffff8803fb2d7ec8 0000000081178fb3 ffff8803fb2d7e98 ffff880402398720
Sep 6 11:44:20 client kernel: [ 23.655237] ffff8803fe143c00 00000000013da320 ffffffffffffffe0 0000000000000044
Sep 6 11:44:20 client kernel: [ 23.655239] Call Trace:
Sep 6 11:44:20 client kernel: [ 23.655248] [<ffffffffa0d546a0>] rpc_pipe_write+0x60/0x90 [sunrpc]
Sep 6 11:44:20 client kernel: [ 23.655251] [<ffffffff81177b43>] vfs_write+0xb3/0x180
Sep 6 11:44:20 client kernel: [ 23.655253] [<ffffffff81177e6a>] sys_write+0x4a/0x90
Sep 6 11:44:20 client kernel: [ 23.655255] [<ffffffff81661ec2>] system_call_fastpath+0x16/0x1b
Sep 6 11:44:20 client kernel: [ 23.655256] Code: 89 c7 74 3b 7f 27 48 83 f8 81 74 40 48 83 f8 da 90 74 2c 48 89 c2 48 c7 c6 50 e3 d7 a0 48 c7 c7 f8 e5 d7 a0 31 c0 e8 41 74 8c e0 <0f> 0b 48 83 f8 f3 74 19 48 83 f8 f4 74 06 48 83 f8 f2 75 d4 41
Sep 6 11:44:20 client kernel: [ 23.655273] RIP [<ffffffffa0d79b9a>] gss_pipe_downcall+0x27a/0x2b0 [auth_rpcgss]
Sep 6 11:44:20 client kernel: [ 23.655276] RSP <ffff8803fb2d7e58>
Sep 6 11:44:20 client kernel: [ 23.655277] ---[ end trace 66b6cbe2d5cfccd8 ]---
ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: nfs-common 1:1.2.5-3ubuntu3
ProcVersionSignature: Ubuntu 3.2.0-29.46-generic 3.2.24
Uname: Linux 3.2.0-29-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.0.1-0ubuntu12
Architecture: amd64
Date: Thu Sep 6 11:52:36 2012
ProcEnviron:
TERM=xterm
LANG=en_US
SHELL=/bin/bash
SourcePackage: nfs-utils
UpgradeStatus: No upgrade log present (probably fresh install)
** Affects: nfs-utils (Ubuntu)
Importance: Undecided
Status: New
** Tags: amd64 apport-bug precise
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to nfs-utils in Ubuntu.
https://bugs.launchpad.net/bugs/1046762
Title:
rpc.gssd crashes in gss_pipe_downcall
Status in “nfs-utils” package in Ubuntu:
New
Bug description:
Source: nfs-utils
# lsb_release -rd
Description: Ubuntu 12.04.1 LTS
Release: 12.04
# apt-cache policy nfs-common
nfs-common:
Installed: 1:1.2.5-3ubuntu3
Candidate: 1:1.2.5-3ubuntu3
Version table:
*** 1:1.2.5-3ubuntu3 0
500 http://archive.ubuntu.com/ubuntu/ precise/main amd64 Packages
100 /var/lib/dpkg/status
Expected:
To be able to mount a krb5-protected NFSv4 share.
# cat /etc/fstab
san.example.com:/data/volume /nfs4/san.example.com/volume nfs4 _netdev,sec=krb5 0 0
What actually happens:
The kerberos service ticket is successfully requested as shown below [1], but the mount of the share never happens. Instead, /var/log/syslog sees the trace of what is reported as a kernel bug [2].
[1]
# klist -c /tmp/krb5cc_machine_EXAMPLE.COM
Ticket cache: FILE:/tmp/krb5cc_machine_EXAMPLE.COM
Default principal: host/client.example.com at EXAMPLE.COM
Valid starting Expires Service principal
06/09/2012 11:44 06/09/2012 21:44 krbtgt/EXAMPLE.COM at EXAMPLE.COM
renew until 11/09/2012 16:44
06/09/2012 11:44 06/09/2012 21:44 nfs/san.example.com at EXAMPLE.COM
renew until 11/09/2012 16:44
[2]
gss_pipe_downcall: bad return from gss_fill_context: -4
Sep 6 11:44:20 client kernel: [ 23.655189] ------------[ cut here ]------------
Sep 6 11:44:20 client kernel: [ 23.655190] kernel BUG at /build/buildd/linux-3.2.0/net/sunrpc/auth_gss/auth_gss.c:671!
Sep 6 11:44:20 client kernel: [ 23.655192] invalid opcode: 0000 [#1] SMP
Sep 6 11:44:20 client kernel: [ 23.655193] CPU 2
Sep 6 11:44:20 client kernel: [ 23.655194] Modules linked in: bnep rfcomm bluetooth parport_pc ppdev vesafb rpcsec_gss_krb5 nfsd nfs lockd fscache auth_rpcgss nfs_acl sunrpc snd_hda
_codec_hdmi snd_hda_codec_realtek nvidia(P) snd_hda_intel snd_hda_codec snd_hwdep snd_pcm joydev snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device snd mac_hid mei(
C) soundcore snd_page_alloc video tpm_tis lp parport firewire_ohci firewire_core usbhid crc_itu_t hid e1000e
Sep 6 11:44:20 client kernel: [ 23.655211]
Sep 6 11:44:20 client kernel: [ 23.655212] Pid: 820, comm: rpc.gssd Tainted: P C O 3.2.0-29-generic #46-Ubuntu /DQ77MK
Sep 6 11:44:20 client kernel: [ 23.655215] RIP: 0010:[<ffffffffa0d79b9a>] [<ffffffffa0d79b9a>] gss_pipe_downcall+0x27a/0x2b0 [auth_rpcgss]
Sep 6 11:44:20 client kernel: [ 23.655219] RSP: 0018:ffff8803fb2d7e58 EFLAGS: 00010296
Sep 6 11:44:20 client kernel: [ 23.655220] RAX: 000000000000004d RBX: 0000000000000044 RCX: 000000000000001e
Sep 6 11:44:20 client kernel: [ 23.655221] RDX: 0000000000000000 RSI: 0000000000000086 RDI: 0000000000000246
Sep 6 11:44:20 client kernel: [ 23.655222] RBP: ffff8803fb2d7eb8 R08: 000000000000000a R09: 0000000000000000
Sep 6 11:44:20 client kernel: [ 23.655223] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8803ff32c7e0
Sep 6 11:44:20 client kernel: [ 23.655224] R13: ffff8803ff32cc00 R14: ffff8803fb085600 R15: fffffffffffffffc
Sep 6 11:44:20 client kernel: [ 23.655226] FS: 00007f846eabd740(0000) GS:ffff88041dc80000(0000) knlGS:0000000000000000
Sep 6 11:44:20 client kernel: [ 23.655227] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Sep 6 11:44:20 client kernel: [ 23.655228] CR2: 000000000061ac88 CR3: 00000003fe8b8000 CR4: 00000000001406e0
Sep 6 11:44:20 client kernel: [ 23.655229] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Sep 6 11:44:20 client kernel: [ 23.655230] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Sep 6 11:44:20 client kernel: [ 23.655231] Process rpc.gssd (pid: 820, threadinfo ffff8803fb2d6000, task ffff880400cc4500)
Sep 6 11:44:20 client kernel: [ 23.655232] Stack:
Sep 6 11:44:20 client kernel: [ 23.655233] ffff8804009a1e00 0000000000000010 ffff8803ff32c824 ffff880402398700
Sep 6 11:44:20 client kernel: [ 23.655235] ffff8803fb2d7ec8 0000000081178fb3 ffff8803fb2d7e98 ffff880402398720
Sep 6 11:44:20 client kernel: [ 23.655237] ffff8803fe143c00 00000000013da320 ffffffffffffffe0 0000000000000044
Sep 6 11:44:20 client kernel: [ 23.655239] Call Trace:
Sep 6 11:44:20 client kernel: [ 23.655248] [<ffffffffa0d546a0>] rpc_pipe_write+0x60/0x90 [sunrpc]
Sep 6 11:44:20 client kernel: [ 23.655251] [<ffffffff81177b43>] vfs_write+0xb3/0x180
Sep 6 11:44:20 client kernel: [ 23.655253] [<ffffffff81177e6a>] sys_write+0x4a/0x90
Sep 6 11:44:20 client kernel: [ 23.655255] [<ffffffff81661ec2>] system_call_fastpath+0x16/0x1b
Sep 6 11:44:20 client kernel: [ 23.655256] Code: 89 c7 74 3b 7f 27 48 83 f8 81 74 40 48 83 f8 da 90 74 2c 48 89 c2 48 c7 c6 50 e3 d7 a0 48 c7 c7 f8 e5 d7 a0 31 c0 e8 41 74 8c e0 <0f> 0b 48 83 f8 f3 74 19 48 83 f8 f4 74 06 48 83 f8 f2 75 d4 41
Sep 6 11:44:20 client kernel: [ 23.655273] RIP [<ffffffffa0d79b9a>] gss_pipe_downcall+0x27a/0x2b0 [auth_rpcgss]
Sep 6 11:44:20 client kernel: [ 23.655276] RSP <ffff8803fb2d7e58>
Sep 6 11:44:20 client kernel: [ 23.655277] ---[ end trace 66b6cbe2d5cfccd8 ]---
ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: nfs-common 1:1.2.5-3ubuntu3
ProcVersionSignature: Ubuntu 3.2.0-29.46-generic 3.2.24
Uname: Linux 3.2.0-29-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.0.1-0ubuntu12
Architecture: amd64
Date: Thu Sep 6 11:52:36 2012
ProcEnviron:
TERM=xterm
LANG=en_US
SHELL=/bin/bash
SourcePackage: nfs-utils
UpgradeStatus: No upgrade log present (probably fresh install)
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1046762/+subscriptions
More information about the foundations-bugs
mailing list