Bug 1792331
Summary: | sssd_be crashes when krb5_realm and krb5_server is omitted and auth_provider is krb5 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Niranjan Mallapadi Raghavender <mniranja> |
Component: | sssd | Assignee: | Alexey Tikhonov <atikhono> |
Status: | CLOSED ERRATA | QA Contact: | sssd-qe <sssd-qe> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 8.2 | CC: | apeetham, atikhono, grajaiya, jhrozek, lslebodn, mpitt, mzidek, pbrezina, rasibley, sbose, sgoveas, tscherf |
Target Milestone: | rc | ||
Target Release: | 8.2 | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | sync-to-jira | ||
Fixed In Version: | sssd-2.2.3-16.el8 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-28 16:56:29 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Niranjan Mallapadi Raghavender
2020-01-17 14:23:03 UTC
Backtrace from the coredump (gdb) bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007f974c01cb25 in __GI_abort () at abort.c:79 #2 0x00007f974c92cde0 in talloc_abort (reason=0x7f974c93aa88 "Bad talloc magic value - unknown value") at ../../talloc.c:505 #3 0x00007f974c92cf2a in talloc_abort_unknown_value () at ../../talloc.c:534 #4 talloc_chunk_from_ptr (ptr=0x5651ebfec0e0) at ../../talloc.c:534 #5 __talloc_get_name (ptr=0x5651ebfec0e0) at ../../talloc.c:1559 #6 talloc_check_name (ptr=ptr@entry=0x5651ebfec0e0, name=name@entry=0x7f974fba84e5 "struct sss_ptr_hash_value") at ../../talloc.c:1582 #7 0x00007f974fb8d731 in sss_ptr_hash_check_type (ptr=0x5651ebfec0e0, type=0x7f974fba84e5 "struct sss_ptr_hash_value") at src/util/sss_ptr_hash.c:31 #8 0x00007f974fb8d80d in sss_ptr_hash_lookup_internal (table=<optimized out>, key=key@entry=0x5651ebfcd7a0 "sssd.nss") at src/util/sss_ptr_hash.c:273 #9 0x00007f974fb8dc62 in _sss_ptr_hash_lookup (table=<optimized out>, key=key@entry=0x5651ebfcd7a0 "sssd.nss", type=type@entry=0x7f974cf8316f "struct sbus_connection") at src/util/sss_ptr_hash.c:286 #10 0x00007f974cf7f33f in sbus_server_connection_has_name (server=0x5651ebf931f0, name=0x5651ebfcd7a0 "sssd.nss", conn=0x5651ebfd1120) at src/sbus/server/sbus_server_match.c:439 #11 sbus_server_matchmaker (server=server@entry=0x5651ebf931f0, conn=conn@entry=0x0, avoid_name=0x5651ebfcd7a0 "sssd.nss", message=message@entry=0x5651ebf98dd0) at src/sbus/server/sbus_server_match.c:439 #12 0x00007f974cf7f69f in sbus_server_name_owner_changed (server=0x5651ebf931f0, name=<optimized out>, new_owner=<optimized out>, old_owner=<optimized out>) at src/sbus/server/sbus_server.c:536 #13 0x00007f974fb8d62f in sss_ptr_hash_delete_cb (item=0x5651ebfb5a70, deltype=HASH_ENTRY_DESTROY, pvt=<optimized out>) at src/util/sss_ptr_hash.c:162 #14 0x00007f974cd54d7d in hash_delete (table=table@entry=0x5651ebf68b90, key=key@entry=0x7fff20704520) at dhash/dhash.c:1077 #15 0x00007f974fb8dd86 in sss_ptr_hash_delete (free_value=false, key=0x5651ebfcd720 "sssd.nss", table=0x5651ebf68b90) at src/util/sss_ptr_hash.c:348 #16 sss_ptr_hash_delete (table=0x5651ebf68b90, key=0x5651ebfcd720 "sssd.nss", free_value=<optimized out>) at src/util/sss_ptr_hash.c:323 #17 0x00007f974fb8de31 in sss_ptr_hash_spy_destructor (spy=spy@entry=0x5651ebfca2a0) at src/util/sss_ptr_hash.c:64 #18 0x00007f974c933c50 in _tc_free_internal (location=0x7f974cf82d78 "src/sbus/connection/sbus_connection.c:438", tc=0x5651ebfca240) at ../../talloc.c:1157 #19 _tc_free_children_internal (location=<optimized out>, ptr=<optimized out>, tc=<optimized out>) at ../../talloc.c:1666 #20 talloc_free_children (ptr=<optimized out>) at ../../talloc.c:1712 #21 0x00007f974c92f034 in _tc_free_internal (location=0x7f974cf82d78 "src/sbus/connection/sbus_connection.c:438", tc=0x5651ec079880) at ../../talloc.c:1183 #22 _talloc_free_internal (location=0x7f974cf82d78 "src/sbus/connection/sbus_connection.c:438", ptr=0x5651ec0798e0) at ../../talloc.c:1247 #23 _talloc_free (ptr=0x5651ec0798e0, location=0x7f974cf82d78 "src/sbus/connection/sbus_connection.c:438") at ../../talloc.c:1789 #24 0x00007f974cb4b3b9 in tevent_common_invoke_timer_handler (te=te@entry=0x5651ebfb3be0, current_time=..., removed=removed@entry=0x0) at ../../tevent_timed.c:370 #25 0x00007f974cb4b55e in tevent_common_loop_timer_delay (ev=ev@entry=0x5651ebf6c210) at ../../tevent_timed.c:442 #26 0x00007f974cb4c7ab in epoll_event_loop_once (ev=0x5651ebf6c210, location=<optimized out>) at ../../tevent_epoll.c:922 #27 0x00007f974cb4a99b in std_event_loop_once (ev=0x5651ebf6c210, location=0x7f974fba3659 "src/util/server.c:719") at ../../tevent_standard.c:110 #28 0x00007f974cb45b15 in _tevent_loop_once (ev=ev@entry=0x5651ebf6c210, location=location@entry=0x7f974fba3659 "src/util/server.c:719") at ../../tevent.c:772 #29 0x00007f974cb45dbb in tevent_common_loop_wait (ev=0x5651ebf6c210, location=0x7f974fba3659 "src/util/server.c:719") at ../../tevent.c:895 #30 0x00007f974cb4a92b in std_event_loop_wait (ev=0x5651ebf6c210, location=0x7f974fba3659 "src/util/server.c:719") at ../../tevent_standard.c:141 #31 0x00007f974fb81927 in server_loop (main_ctx=0x5651ebf4d0c0) at src/util/server.c:719 #32 0x00005651ea39e62b in main (argc=8, argv=<optimized out>) at src/providers/data_provider_be.c:743 Additional info shared by Niranjan: "I can see the crash even on sssd-2.2.2-1.el8.x86_64" Well, it seems: - bug was there till sssd-2.2.3-1 where it was accidentally fixed with f95db37aa8486304d0569d12a876b1c74ee1b0d1 that introduced bz 1783190 - and then this bug was introduced back in sssd-2.2.3-9 with 26e33b1984cce3549df170f58f8221201ad54cfd while fixing bz 1783190 Niranjan, would it be please possible to verify that (2.2.3-1 and 2.2.3-8) *are NOT* affected and (2.2.2-1 and 2.2.3-9) *are* affected? *** Bug 1793303 has been marked as a duplicate of this bug. *** *** Bug 1796044 has been marked as a duplicate of this bug. *** *** Bug 1796470 has been marked as a duplicate of this bug. *** *** Bug 1798492 has been marked as a duplicate of this bug. *** master: * faa5dbf6f716bd4ac0a3020a28a1ee6fbf74654a * adc7730a4e1b9721c93863a1b283457e9c02a3c5 * d0eb88089b059bfe2da3bd1a3797b89d69119c29 * 8cc2ce4e9060a71d441a377008fb2f567baa5d92 * 4bc0c2c7833dd643fc1137daf6519670c05c3736 * 0bb1289252eec972ea26721a92adc7db47383f76 * 88b23bf50dd1c12413f3314639de2c3909bd9098 Versions: sssd-krb5-common-2.2.3-16.el8.x86_64 sssd-winbind-idmap-2.2.3-16.el8.x86_64 sssd-ldap-2.2.3-16.el8.x86_64 sssd-kcm-2.2.3-16.el8.x86_64 sssd-common-pac-2.2.3-16.el8.x86_64 sssd-2.2.3-16.el8.x86_64 python3-sssdconfig-2.2.3-16.el8.noarch sssd-common-2.2.3-16.el8.x86_64 sssd-ad-2.2.3-16.el8.x86_64 sssd-proxy-2.2.3-16.el8.x86_64 sssd-tools-2.2.3-16.el8.x86_64 sssd-nfs-idmap-2.2.3-14.el8.x86_64 sssd-client-2.2.3-16.el8.x86_64 sssd-krb5-2.2.3-16.el8.x86_64 sssd-dbus-2.2.3-16.el8.x86_64 sssd-ipa-2.2.3-16.el8.x86_64 cat /etc/sssd/sssd.conf [sssd] config_file_version = 2 services = nss, pam domains = example1 [domain/example1] ldap_search_base = dc=example,dc=test id_provider = ldap auth_provider = krb5 ldap_user_home_directory = /home/%u ldap_uri = ldaps://vm-10-0-153-149.hosted.upshift.rdu2.redhat.com ldap_tls_cacert = /etc/openldap/cacerts/cacert.pem use_fully_qualified_names = False debug_level = 9 ldap_sasl_mech = GSSAPI Restart sssd [root@vm-10-0-154-50 yum.repos.d]# systemctl restart sssd Job for sssd.service failed because the control process exited with error code. See "systemctl status sssd.service" and "journalctl -xe" for details. As seen above sssd doesn't crash but since the configuration is missing must statements required for auth_provider=krb5 namely krb5_server and krb5_realm , sssd fails to start. But it doesn't crash. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:1863 |