[Bug 1718244] Re: missing xfs_check in xfs_progs

2020-08-31 Thread Christoph Probst
xfs_check has been merged into / replaced by xfs_repair in 2014. ** Changed in: xfsprogs (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1718244 Title: missing

[Bug 1718244] Re: missing xfs_check in xfs_progs

2020-08-31 Thread Christoph Probst
xfs_check is deprecated and has been removed from xfsprogs since 2014. See https://fossies.org/linux/xfsprogs/doc/CHANGES > 602 xfsprogs-3.2.1 (15 July 2014) > [...] > 606 - xfs_check has been removed Manpage for fsck.xfs ("do nothing, successfully") still exists and recommends: "If you

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-08-08 Thread Christoph Probst
Hi Guilherme, I haven't been able to verify the patch as we modified our computing pipeline to remove load from the cifs share. I might be able to create a test setup but this will take some time. Thank you for your support to get the patch into the Ubuntu kernels. I subscribed to #1795659 as

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-05-08 Thread Christoph Probst
Yes, there are two issues that got mixed up in this single bug report. 1) strcat Imho there are not many ways strcat could overflow in that single function. My patch (especially the strncpy()) should fix the buffer overflow and thereby my inititial issue. Your solution still had that strcat

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-05-08 Thread Christoph Probst
From: Steve French Date: Tue, 7 May 2019 11:13:34 -0500 merged into cifs-2.6.git for-next ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Christoph Probst (christophprobst) -- You received th

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-05-06 Thread Christoph Probst
There is now a kernel patch for cifs that is supposed to fix the buffer overflow in strcat. Details see https://patchwork.kernel.org/patch/10931327/ An alternative workaround is to downgrade the connection to SMB2 (mount option vers=2.0) as the bug only affects SMB2.1 and SMB3 code. Regarding

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-05-01 Thread Christoph Probst
We installed the latest upstream kernel 5.1.0-050100rc7-generic (Ubuntu version from https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.1-rc7/) with still triggers a NULL pointer dereference from cifsoplockd. I was hoping "CIFS: keep FileInfo handle live during oplock break"[1] might fix our

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-30 Thread Christoph Probst
And now a crash with the special 4.15.0-48-generic #51~lp1824981 kernel. So the buffer overflow is NOT fixed with any 4.15 or 4.18 kernel currently available with Ubuntu. We started some IO-intense tasks lately that didn't run the last 2 weeks. That seems to be the trigger for the bug buffer

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-29 Thread Christoph Probst
Oh no. Had a strcat buffer overflow with 4.15.0-48-generic. Issue is NOT solved. Apr 29 19:29:00 kernel: [78713.491646] detected buffer overflow in strcat Apr 29 19:29:00 kernel: [78713.491685] [ cut here ] Apr 29 19:29:00 kernel: [78713.491686] kernel BUG at

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-29 Thread Christoph Probst
4.15.0.47-generic kernel BUG at /build/linux-6ZmFRN/linux-4.15.0/lib/string.c:1052! Crashes system (requires hard reboot or SysRQ+b) 4.18.0-17-generic kernel BUG at /build/linux-hwe-4PejID/linux-hwe-4.18.0/lib/string.c:1052! Crashes system (requires hard reboot or SysRQ+b) 4.15.0-48-generic

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-24 Thread Christoph Probst
Actually there is one waiting in state flush_work, one in call_rwsem_down_read_failed and 12 in call_rwsem_down_write_failed. The "flush_work" task call trace genesplicer D0 53332 52566 0x Call Trace: __schedule+0x291/0x8a0 ? __switch_to_asm+0x40/0x70 ?

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-24 Thread Christoph Probst
The "NULL pointer dereference" bug create state D pocesses waiting in call_rwsem_down_write_failed. [ +0.000341] genesplicer D0 53349 52579 0x8000 [ +0.000362] Call Trace: [ +0.000346] __schedule+0x291/0x8a0 [ +0.000348] ? mempool_free+0x2f/0x90 [ +0.000347]

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-24 Thread Christoph Probst
Yes, it happend once with 4.18.0-17 (see kernel.log below) and once with 4.15.0-48. Haven't seen this one on 4.15.0-46-generic or 4.15.0-47-generic before. Apr 17 18:51:53 Linux version 4.18.0-17-generic (buildd@lgw01-amd64-021) (gcc version 7.3.0 (Ubuntu 7.3.0-16ubuntu3)) #18~18.04.1-Ubuntu

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-23 Thread Christoph Probst
New variant of kernel bug appeard in both 4.18.0-17 (package manager) and in 4.15.0-48 (provided by @kaihengfeng). System didn't crash (compared to "buffer overflow in strcat" where cifs can't recover). Have seen this one twice, both within 3-7 hours after reboot. Apr 22 17:28:23 Linux version

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-20 Thread Christoph Probst
Here are some details from proc what is happening on our servers. Both running 4.15.0-47-generic. server13 / uptime 2 days # cat /proc/fs/cifs/Stats Resources in use CIFS Session: 1 Share (unique mount targets): 2 SMB Request/Response Buffer: 1 Pool size: 5 SMB Small Req/Resp Buffer: 1 Pool size:

[Bug 1824981] Re: cifs set_oplock buffer overflow in strcat

2019-04-20 Thread Christoph Probst
I tried Ubuntu kernel "4.18.0-17-generic #18~18.04.1-Ubuntu". Crashed the same way on high load as the 4.15.0-47 does. Now testing 4.15.0-48 from Kai-Heng. Still haven't found the trigger for that bug. Seems to be load related - we're having five servers each running many threads

[Bug 1824981] Re: cifs set_oplock overflow in strcat

2019-04-17 Thread Christoph Probst
** Summary changed: - cifs related buffer overflow in strcat + cifs set_oplock overflow in strcat ** Summary changed: - cifs set_oplock overflow in strcat + cifs set_oplock buffer overflow in strcat -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1633251] Re: Crashes when installing on Ubuntu 16.10

2019-04-16 Thread Christoph Probst
There is a workaround for Ubuntu 18.04 Bionic manually replacing spooldefaults.bin, libspoolb.so and libspoolc.so with the files from the Debian 8.1.9+dfsg-9 package. For details see https://bugs.launchpad.net/ubuntu/+source/gridengine/+bug/1774302 -- You received this bug notification because

[Bug 1774302] Re: package gridengine-master 8.1.9+dfsg-7build1 failed to install/upgrade: installed gridengine-master package post-installation script subprocess returned error exit status 139

2019-04-16 Thread Christoph Probst
Can confirm that using spooldefaults.bin, libspoolb.so and libspoolc.so from http://ftp.debian.org/debian/pool/main/g/gridengine/gridengine- client_8.1.9+dfsg-9_amd64.deb does workaround the segfault issue in gridengine-master 8.1.9+dfsg-7build1 on Ubuntu 18.04 Bionic. Make sure to reset

[Bug 1824981] Re: cifs related buffer overflow in strcat

2019-04-16 Thread Christoph Probst
System is firewalled so apport-collect wouldn't work. Relevant details should already be included in the bug report. ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1824981] [NEW] cifs related buffer overflow in strcat

2019-04-16 Thread Christoph Probst
Public bug reported: Ubuntu 18.04.2 LTS Linux SRV013 4.15.0-47-generic #50-Ubuntu SMP Wed Mar 13 10:44:52 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux DELL R740, 2 CPU (40 Cores, 80 Threads), 384 GiB RAM top - 12:39:53 up 3:41, 4 users, load average: 66.19, 64.06, 76.90 Tasks: 1076 total, 1

[Bug 1029822] Re: local-premount/mdadm script drops to initramfs shell unnecessarily

2014-10-24 Thread Christoph Probst
*** This bug is a duplicate of bug 990913 *** https://bugs.launchpad.net/bugs/990913 ** This bug has been marked a duplicate of bug 990913 RAID goes into degrade mode on every boot 12.04 LTS server -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 990913] Re: RAID goes into degrade mode on every boot 12.04 LTS server

2014-10-24 Thread Christoph Probst
I just upgraded an Ubuntu Server 10.04 LTM to 12.04 LTM and was affected by this bug. # mdadm --version mdadm - v3.2.5 - 18th May 2012 # uname -a Linux srv001 3.2.0-70-gerneric-pae #105-Ubuntu SMP ... My system is a Dell PowerEdge 2900 with four 250 GB WD Harddrives. Three of them are