Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-17852

Lots of "Invalid gss ctx"

    XMLWordPrintable

Details

    • Bug
    • Resolution: Fixed
    • Minor
    • Lustre 2.16.0
    • Lustre 2.16.0
    • 3
    • 9223372036854775807

    Description

      There are some Lustre warnings

      (gss_svc_upcall.c:962:gss_svc_upcall_get_ctx()) Invalid gss ctx idx 0xa6a894a730abbb50 from 192.168.0.192@o2ib

      which seems to match on server side:

      Lustre: 1439318:0:(sec_gss.c:685:gss_cli_ctx_handle_err_notify()) testfs-MDT0001: req x1797233949251264/t0, ctx 00000000137475b7 idx 0xfa7d3292507e467a(0->c): reverse server res>
      Lustre: 1439318:0:(sec_gss.c:723:gss_cli_ctx_handle_err_notify()) testfs-MDT0001: client might have lost the context (NO_CONTEXT), retrying
      

      This seems related to LDLM BL AST. It comes from expired GSS contexts on server side, which seem to be too numerous, and stay there for hours or even days. For instance:

      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715685010, delta: -7197, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0fe2:0xd24bbd2980dc2c0f", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715602210, delta: -89997, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0e6b:0xd24bbd2980dc27d5", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715516218, delta: -175989, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0d11:0xd24bbd2980dc243c", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715432277, delta: -259930, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0ba8:0xd24bbd2980dc1f65", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715347795, delta: -344412, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0a3d:0xd24bbd2980dc1a68", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715261655, delta: -430552, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a08d5:0xd24bbd2980dc15d0", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715685010, delta: -7197, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0f7a:0xd24bbd2980dc2c0c", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715602210, delta: -89997, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0df1:0xd24bbd2980dc27d2", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715516218, delta: -175989, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0ca8:0xd24bbd2980dc2439", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715432277, delta: -259930, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0b30:0xd24bbd2980dc1f61", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715347795, delta: -344412, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a09cc:0xd24bbd2980dc1a65", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715261655, delta: -430552, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a085d:0xd24bbd2980dc15cd", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715685010, delta: -7197, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0f00:0xd24bbd2980dc2c09", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715602210, delta: -89997, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0edf:0xd24bbd2980dc27d8", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715516345, delta: -175862, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0c22:0xd24bbd2980dc2421", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715431937, delta: -260270, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0ab6:0xd24bbd2980dc1e80", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715346043, delta: -346164, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a0950:0xd24bbd2980dc1a62", mech: "krb5 (aes256-cts-hmac-sha1-96)" }
      - { peer_nid: 192.168.0.8@o2ib, uid: 0, ctxref: 1, expire: 1715261655, delta: -430552, flags: [uptodate, cached], seq: 0, win: 2048, key: 00000000, keyref: 0, hdl: "0xd28d8bea236a07e5:0xd24bbd2980dc15ca", mech: "krb5 (aes256-cts-hmac-sha1-96)" }

      Attachments

        Activity

          People

            sebastien Sebastien Buisson
            sebastien Sebastien Buisson
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: