Bug 1296722
| Summary: | qemu-kvm crashes with double free or corruption in cephx code | ||
|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Brad Hubbard <bhubbard> |
| Component: | RADOS | Assignee: | Josh Durgin <jdurgin> |
| Status: | CLOSED ERRATA | QA Contact: | ceph-qe-bugs <ceph-qe-bugs> |
| Severity: | urgent | Docs Contact: | |
| Priority: | urgent | ||
| Version: | 1.3.1 | CC: | ceph-eng-bugs, dsafford, dzafman, flucifre, jdillama, kchai, kdreyer, tganguly, vakulkar, vumrao |
| Target Milestone: | rc | ||
| Target Release: | 1.3.2 | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | RHEL: ceph-0.94.3-6.el7cp, Ubuntu: ceph_0.94.3.3-2redhat1trusty | Doc Type: | Bug Fix |
| Doc Text: |
A race condition occurs sporadically in cephx's interactions with libnss. This could cause Ceph applications (for example, qemu-kvm with librbd) to crash. The Cephx NSS code has been refactored, and Ceph no longer crashes in the described scenario.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-02-08 21:28:57 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1319075 | ||
|
Description
Brad Hubbard
2016-01-08 00:57:09 UTC
For the record, the patches Josh cherry-picked for this issue are: auth: return error code from encrypt/decrypt; make error string optional auth: optimize crypto++ key context auth/Crypto: optimize libnss key auth: refactor crypto key context auth/cephx: optimize signature check auth/cephx: move signature calc into helper auth/Crypto: avoid memcpy on libnss crypto operation auth: make CryptoHandler implementations totally private which are part of https://github.com/ceph/ceph/pull/3896/commits Let's file an upstream ticket to ensure these get backported to Hammer upstream as well. (In reply to Ken Dreyer (Red Hat) from comment #12) > Let's file an upstream ticket to ensure these get backported to Hammer > upstream as well. http://tracker.ceph.com/issues/6480 attached under "External Trackers" Ubuntu build with this patch is ceph_0.94.3.3-1redhat1trusty (In reply to Ken Dreyer (Red Hat) from comment #22) > Ubuntu build with this patch is ceph_0.94.3.3-1redhat1trusty I had to bump the version number, so it's ceph_0.94.3.3-2redhat1trusty Marking this Bug as Verified as this was tested part of 1.3.1 Async Release. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2016:0133 I have checked the errata and issue is fixed in version : ceph-0.94.3-6.el7cp |