Public bug reported: The kernel seems to lock up when accessing a kerberos mounted nfs share with a user holding a kerberos ticket. This is in a virtualbox vm(run by vagrant), but it also occurs in a VMware vm from a standard ubuntu 14.04 server install disk.
To reproduce: Join machine to windows active directory domain using sssd Install nfs-kernel server, enable NEED_SVCGSSD Enable NEED_GSSD for the client(can be same host as the server) $ sudo mount -t nfs4 <fqdn>:/ /mnt/nfs -o sec=krb5 $ sudo ls -l /mnt/nfs # this works ok $ kinit <a_domain_user> $ ls /mnt/nfs Permission denied error # I don't recall the exact wording # wait a few moments, and the kernel starts reporting a soft lockup. I think there are a few other things that trigger this error as well. It basically makes nfs+kerberos unusable. I have the kernel crash dump, and the debugsyms installed so if there is any other information I can provide please let me know. lsb_release -rd: Description: Ubuntu 14.04.2 LTS Release: 14.04 $ apt-cache policy nfs-common nfs-common: Installed: 1:1.2.8-6ubuntu1.1 Info from crash: KERNEL: /usr/lib/debug/boot/vmlinux-3.13.0-53-generic DUMPFILE: dump.201506181954 [PARTIAL DUMP] CPUS: 2 DATE: Thu Jun 18 19:54:08 2015 UPTIME: 00:05:48 LOAD AVERAGE: 1.50, 0.45, 0.18 TASKS: 120 NODENAME: t-fileserver RELEASE: 3.13.0-53-generic VERSION: #89-Ubuntu SMP Wed May 20 10:34:39 UTC 2015 MACHINE: x86_64 (3581 Mhz) MEMORY: 511.6 MB PANIC: "Kernel panic - not syncing: softlockup: hung tasks" PID: 1353 COMMAND: "rpc.svcgssd" TASK: ffff880014dce000 [THREAD_INFO: ffff88001514e000] CPU: 0 STATE: TASK_RUNNING (PANIC) Backtrace: PID: 1353 TASK: ffff880014dce000 CPU: 0 COMMAND: "rpc.svcgssd" #0 [ffff88001fc03d18] machine_kexec at ffffffff8104ace2 #1 [ffff88001fc03d68] crash_kexec at ffffffff810e7423 #2 [ffff88001fc03e30] panic at ffffffff8171bcc4 #3 [ffff88001fc03ea8] watchdog_timer_fn at ffffffff8110dc85 #4 [ffff88001fc03ed8] __run_hrtimer at ffffffff8108e8c7 #5 [ffff88001fc03f18] hrtimer_interrupt at ffffffff8108f08f #6 [ffff88001fc03f80] local_apic_timer_interrupt at ffffffff81043617 #7 [ffff88001fc03f98] smp_apic_timer_interrupt at ffffffff81735ccf #8 [ffff88001fc03fb0] apic_timer_interrupt at ffffffff8173465d --- <IRQ stack> --- #9 [ffff88001514fd58] apic_timer_interrupt at ffffffff8173465d [exception RIP: qword_addhex+176] RIP: ffffffffa01c2df0 RSP: ffff88001514fe08 RFLAGS: 00000206 RAX: 0000000000000001 RBX: 0000000000000006 RCX: 00000000000001f6 RDX: ffff880015e54678 RSI: ffff88001514fe84 RDI: ffff88001514fe88 RBP: ffff88001514fe18 R8: ffff880015e57cf5 R9: 000000000000030b R10: 0000000000000039 R11: 0000000000000027 R12: 0000000000000006 R13: ffffea0000422420 R14: ffffea00003e46e0 R15: ffff88001514fe98 ORIG_RAX: ffffffffffffff10 CS: 0010 SS: 0018 #10 [ffff88001514fe20] rsi_request at ffffffffa01f61bb [auth_rpcgss] #11 [ffff88001514fe48] cache_read at ffffffffa01c5045 [sunrpc] #12 [ffff88001514fec0] cache_read_procfs at ffffffffa01c51a1 [sunrpc] #13 [ffff88001514fee8] proc_reg_read at ffffffff81224a6d #14 [ffff88001514ff08] vfs_read at ffffffff811bdf55 #15 [ffff88001514ff40] sys_read at ffffffff811bea69 #16 [ffff88001514ff80] system_call_fastpath at ffffffff8173391d RIP: 00007f85cf9f3810 RSP: 00007ffdba7dfe78 RFLAGS: 00000206 RAX: 0000000000000000 RBX: ffffffff8173391d RCX: ffffffffffffffff RDX: 0000000000001000 RSI: 00000000008746f0 RDI: 0000000000000004 RBP: 00000000006083f8 R8: 0000000000000000 R9: 0000000000878820 R10: 00007f85cfcc67b8 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000004 R14: 0000000000608400 R15: 00000000008744b0 ORIG_RAX: 0000000000000000 CS: 0033 SS: 002b Log: [ 348.084011] BUG: soft lockup - CPU#0 stuck for 23s! [rpc.svcgssd:1353] [ 348.084011] Modules linked in: cts vboxsf(OX) nfsv4 rpcsec_gss_krb5 nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache dm_crypt ip6t_REJECT ppdev xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT xt_comment xt_limit xt_tcpudp xt_addrtype nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack ip6table_filter parport_pc ip6_tables parport nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat nf_conntrack_ftp nf_conntrack iptable_filter serio_raw ip_tables x_tables vboxguest(OX) psmouse ahci libahci e1000 [ 348.084011] CPU: 0 PID: 1353 Comm: rpc.svcgssd Tainted: G OX 3.13.0-53-generic #89-Ubuntu [ 348.084011] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 [ 348.084011] task: ffff880014dce000 ti: ffff88001514e000 task.ti: ffff88001514e000 [ 348.084011] RIP: 0010:[<ffffffffa01c2df0>] [<ffffffffa01c2df0>] qword_addhex+0xb0/0x100 [sunrpc] [ 348.084011] RSP: 0018:ffff88001514fe08 EFLAGS: 00000206 [ 348.084011] RAX: 0000000000000001 RBX: 0000000000000006 RCX: 00000000000001f6 [ 348.084011] RDX: ffff880015e54678 RSI: ffff88001514fe84 RDI: ffff88001514fe88 [ 348.084011] RBP: ffff88001514fe18 R08: ffff880015e57cf5 R09: 000000000000030b [ 348.084011] R10: 0000000000000039 R11: 0000000000000027 R12: 0000000000000006 [ 348.084011] R13: ffffea0000422420 R14: ffffea00003e46e0 R15: ffff88001514fe98 [ 348.084011] FS: 00007f85d02f3740(0000) GS:ffff88001fc00000(0000) knlGS:0000000000000000 [ 348.084011] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [ 348.084011] CR2: 0000000000408000 CR3: 00000000152f7000 CR4: 00000000000006f0 [ 348.084011] Stack: [ 348.084011] ffff88001478d580 ffff88001514fe88 ffff88001514fe40 ffffffffa01f61bb [ 348.084011] ffff8800150b2840 0000000000001000 ffff88001f48f500 ffff88001514feb8 [ 348.084011] ffffffffa01c5045 0002000000000001 ffff88000c084a60 ffff880015c2bb60 [ 348.084011] Call Trace: [ 348.084011] [<ffffffffa01f61bb>] rsi_request+0x3b/0x50 [auth_rpcgss] [ 348.084011] [<ffffffffa01c5045>] cache_read.isra.19+0x275/0x3a0 [sunrpc] [ 348.084011] [<ffffffffa01c51a1>] cache_read_procfs+0x31/0x40 [sunrpc] [ 348.084011] [<ffffffff81224a6d>] proc_reg_read+0x3d/0x80 [ 348.084011] [<ffffffff811bdf55>] vfs_read+0x95/0x160 [ 348.084011] [<ffffffff811bea69>] SyS_read+0x49/0xa0 [ 348.084011] [<ffffffff811d35e5>] ? SyS_poll+0x65/0x100 [ 348.084011] [<ffffffff8173391d>] system_call_fastpath+0x1a/0x1f [ 348.084011] Code: e0 27 42 8d 44 20 30 41 88 40 fe 41 0f b6 c2 83 f8 0a 44 89 d8 0f 4c c3 41 83 e9 02 83 e9 01 46 8d 54 10 30 0f 95 c0 41 83 f9 01 <45> 88 50 ff 7f aa 45 85 c9 7f 1f 5b 41 5c 5d 41 b9 ff ff ff ff [ 348.084011] Kernel panic - not syncing: softlockup: hung tasks [ 348.084011] CPU: 0 PID: 1353 Comm: rpc.svcgssd Tainted: G OX 3.13.0-53-generic #89-Ubuntu [ 348.084011] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 [ 348.084011] 000000000000012d ffff88001fc03e28 ffffffff81722e1e ffffffff81a62b16 [ 348.084011] ffff88001fc03ea0 ffffffff8171bcbd 0000000000000008 ffff88001fc03eb0 [ 348.084011] ffff88001fc03e50 0000000000000086 0000000000000046 0000000000000007 [ 348.084011] Call Trace: [ 348.084011] <IRQ> [<ffffffff81722e1e>] dump_stack+0x45/0x56 [ 348.084011] [<ffffffff8171bcbd>] panic+0xc8/0x1d7 [ 348.084011] [<ffffffff8110dc85>] watchdog_timer_fn+0x165/0x170 [ 348.084011] [<ffffffff8108e8c7>] __run_hrtimer+0x77/0x1d0 [ 348.084011] [<ffffffff8110db20>] ? watchdog_cleanup+0x10/0x10 [ 348.084011] [<ffffffff8108f08f>] hrtimer_interrupt+0xef/0x230 [ 348.084011] [<ffffffff81043617>] local_apic_timer_interrupt+0x37/0x60 [ 348.084011] [<ffffffff81735ccf>] smp_apic_timer_interrupt+0x3f/0x60 [ 348.084011] [<ffffffff8173465d>] apic_timer_interrupt+0x6d/0x80 [ 348.084011] <EOI> [<ffffffffa01c2df0>] ? qword_addhex+0xb0/0x100 [sunrpc] [ 348.084011] [<ffffffffa01f61bb>] rsi_request+0x3b/0x50 [auth_rpcgss] [ 348.084011] [<ffffffffa01c5045>] cache_read.isra.19+0x275/0x3a0 [sunrpc] [ 348.084011] [<ffffffffa01c51a1>] cache_read_procfs+0x31/0x40 [sunrpc] [ 348.084011] [<ffffffff81224a6d>] proc_reg_read+0x3d/0x80 [ 348.084011] [<ffffffff811bdf55>] vfs_read+0x95/0x160 [ 348.084011] [<ffffffff811bea69>] SyS_read+0x49/0xa0 [ 348.084011] [<ffffffff811d35e5>] ? SyS_poll+0x65/0x100 [ 348.084011] [<ffffffff8173391d>] system_call_fastpath+0x1a/0x1f ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: nfs-common 1:1.2.8-6ubuntu1.1 ProcVersionSignature: Ubuntu 3.13.0-53.89-generic 3.13.11-ckt19 Uname: Linux 3.13.0-53-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.11 Architecture: amd64 Date: Thu Jun 18 20:46:05 2015 ProcEnviron: TERM=xterm-256color PATH=(custom, no user) XDG_RUNTIME_DIR=<set> LANG=en_US.UTF-8 SHELL=/bin/bash SourcePackage: nfs-utils UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: nfs-utils (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty uec-images -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1466654 Title: kernel soft lockup on nfs server when using a kerberos mount To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1466654/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs