Bug 1228093
Summary: | Glusterd crash | ||||||
---|---|---|---|---|---|---|---|
Product: | [Community] GlusterFS | Reporter: | Alexandros Soumplis <soumplis> | ||||
Component: | glusterd | Assignee: | Susant Kumar Palai <spalai> | ||||
Status: | CLOSED CURRENTRELEASE | QA Contact: | |||||
Severity: | unspecified | Docs Contact: | |||||
Priority: | unspecified | ||||||
Version: | mainline | CC: | amukherj, bugs, nbalacha | ||||
Target Milestone: | --- | ||||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | glusterfs-3.8rc2 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | |||||||
: | 1228541 (view as bug list) | Environment: | |||||
Last Closed: | 2016-06-16 13:08:04 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 1228541 | ||||||
Attachments: |
|
Description
Alexandros Soumplis
2015-06-04 08:01:28 UTC
Can you please attach the coredump if it is available? Created attachment 1034608 [details]
Core dump of glusterd
This is the core dump file created when running on the console of node0 (while node1 is up'n'running)
glusterd -LDEBUG --debug
REVIEW: http://review.gluster.org/11090 (glusterd: Buffer overflow causing crash for glusterd) posted (#4) for review on master by Atin Mukherjee (amukherj) REVIEW: http://review.gluster.org/11090 (glusterd: Buffer overflow causing crash for glusterd) posted (#6) for review on master by Atin Mukherjee (amukherj) COMMIT: http://review.gluster.org/11090 committed in master by Vijay Bellur (vbellur) ------ commit 1ea9c9a3d59d8c3ddf1e27e2939c136a4ed3c6e8 Author: Susant Palai <spalai> Date: Thu Jun 4 22:37:11 2015 +0530 glusterd: Buffer overflow causing crash for glusterd Problem: In GLUSTERD_GET_DEFRAG_PROCESS we are using PATH_MAX (4096) as the max size of the input for target path, but we have allocated NAME_MAX (255) size of buffer for the target. Now this crash is not seen with source install, but is seen with RPMS. The reason is _foritfy_fail. This check happens when _FORTIFY_SOURCE flag is enabled. This option tries to figure out possible overflow scenarios like the bug here and does crash the process. Change-Id: I26261be85936d2e94a526fdcaa8d3249f8af11c3 BUG: 1228093 Signed-off-by: Susant Palai <spalai> Reviewed-on: http://review.gluster.org/11090 Tested-by: Gluster Build System <jenkins.com> Reviewed-by: N Balachandran <nbalacha> Reviewed-by: Raghavendra G <rgowdapp> This bug was accidentally moved from POST to MODIFIED via an error in automation, please see mmccune with any questions This bug is getting closed because a release has been made available that should address the reported issue. In case the problem is still not fixed with glusterfs-3.8.0, please open a new bug report. glusterfs-3.8.0 has been announced on the Gluster mailinglists [1], packages for several distributions should become available in the near future. Keep an eye on the Gluster Users mailinglist [2] and the update infrastructure for your distribution. [1] http://blog.gluster.org/2016/06/glusterfs-3-8-released/ [2] http://thread.gmane.org/gmane.comp.file-systems.gluster.user |