[Bug 1954902] [NEW] lpoptions cannot change system-wide default printer

2021-12-15 Thread Niklas Rother
Public bug reported:

According to "man lpoptions":

> When  run by the root user, lpoptions gets and sets default options and
> instances for all users in the  /etc/cups/lpoptions  file.   Otherwise,
> the per-user defaults are managed in the ~/.cups/lpoptions file.

According to my experimentation, this is incorrect. When lpoptions is
run as root, the file "/root/.cups/lpoptions" is updated (aka the
personal default printer of root), not "/etc/cups/lpoptions" (aka the
system-wide default printer).

I'm unsure whether this is a documentation bug or wrong behavior. I
assume the later, because there seems to be no other option to set the
system-wide default printer.

root@mi553-022:~# lsb_release -rd
Description:Ubuntu 20.04.3 LTS
Release:20.04
root@mi553-022:~# apt-cache policy cups
cups:
  Installed: 2.3.1-9ubuntu1.1
  Candidate: 2.3.1-9ubuntu1.1
  Version table:
 *** 2.3.1-9ubuntu1.1 500
500 http://ftp.luis.uni-hannover.de/ubuntu focal-updates/main amd64 
Packages
500 http://ftp.luis.uni-hannover.de/ubuntu focal-security/main amd64 
Packages
100 /var/lib/dpkg/status
 2.3.1-9ubuntu1 500
500 http://ftp.luis.uni-hannover.de/ubuntu focal/main amd64 Packages
 2.2.7-1ubuntu2.8 500
500 http://ftp.luis.uni-hannover.de/ubuntu bionic-security/main amd64 
Packages

** Affects: cups (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954902

Title:
  lpoptions cannot change system-wide default printer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1954902/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938144] Re: monitor_read: unpermitted request 48 on server while attempting GSSAPI key exchange

2021-09-15 Thread Niklas Rother
Thanks for building the packages for focal.

I can confirm that this fixes the problem for me!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938144

Title:
  monitor_read: unpermitted request 48 on server while attempting GSSAPI
  key exchange

To manage notifications about this bug go to:
https://bugs.launchpad.net/openssh/+bug/1938144/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938144] Re: monitor_read: unpermitted request 48 on server while attempting GSSAPI key exchange

2021-09-14 Thread Niklas Rother
Thanks for the PPA! I currently don't have an impish system at hand,
would it be possible to build it for focal as well?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938144

Title:
  monitor_read: unpermitted request 48 on server while attempting GSSAPI
  key exchange

To manage notifications about this bug go to:
https://bugs.launchpad.net/openssh/+bug/1938144/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938144] Re: monitor_read: unpermitted request 48 on server while attempting GSSAPI key exchange

2021-08-02 Thread Niklas Rother
Ok, I managed to reproduces this in a clean "ubuntu:latest" docker
container. Steps to reproduce are below. During testing, I noticed that
I aliased "ssh" to "ssh -K -X", and that "-K" (or equivalently "-o
GSSAPIAuthentication=yes") is crucial. This changes the problematic SSH
client command to

ssh -o PreferredAuthentications=gssapi-with-mic,gssapi-keyex
root@ac3f9944f201 -v -p  -o GSSAPIKeyExchange=yes -o
GSSAPIAuthentication=yes -F /dev/null

Complete steps to reproduce (container ac3f9944f201 is the server, IP
1.2.3.4 is the IP of the container host; this needs to be adapted):

Server:

podman run -it -p :,:88 ubuntu

apt update
apt install openssh-server krb5-kdc krb5-admin-server
touch /etc/krb5kdc/kadm5.acl
touch /etc/krb5kdc/kadm5.dict
krb5_newrealm 
kadmin.local 

addprinc user
addprinc -randkey host/ac3f9944f201
ktadd -k /etc/krb5.keytab host/ac3f9944f201
exit

mkdir /run/sshd
/usr/sbin/sshd -d -p  -f /dev/null -o GSSAPIKeyExchange=yes -o 
GSSAPIAuthentication=yes

Client:

podman run -it ubuntu

apt update
apt install openssh-client krb5-user
kinit user
echo "1.2.3.4 ac3f9944f201" >> /etc/hosts

ssh -o PreferredAuthentications=gssapi-with-mic,gssapi-keyex
root@ac3f9944f201 -v -p  -o GSSAPIKeyExchange=yes -o
GSSAPIAuthentication=yes -F /dev/null

Notice "monitor_read: unpermitted request 48" on the server, and
"Connection closed by 1.2.3.4 port " on the client (instead of the
expected "permission denied).

** Changed in: openssh (Ubuntu)
   Status: Incomplete => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938144

Title:
  monitor_read: unpermitted request 48 on server while attempting GSSAPI
  key exchange

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1938144/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938144] Re: monitor_read: unpermitted request 48 on server while attempting GSSAPI key exchange

2021-08-02 Thread Niklas Rother
Thanks Sergio for trying to reproduce this! I'm a bit puzzled, why the
bug did not trigger in your case. I'll try to reproduce this in a clean
VM as well now. One important thing might be that I tried to login as
"root", for which I did not have a Kerberos-Ticket, so a "permission
denied" would be expected, unless something like "publickey" is included
in  PreferredAuthentications.

@Miriam: The SSH-configuration should be irrelevant, because of the
options "-f /dev/null" and "-F /dev/null". The Kerberos-config could be
part of this. I'll try to reproduce this on a clean machine and post
better steps for reproducing afterwards.

Thank you all for helping with this!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938144

Title:
  monitor_read: unpermitted request 48 on server while attempting GSSAPI
  key exchange

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1938144/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938144] Re: monitor_read: unpermitted request 48 on server while attempting GSSAPI key exchange

2021-07-29 Thread Niklas Rother
Hello Athos,

thanks for looking into this!

This is reproducible without Ansible, that was just use-case that
brought up the issue. I've further narrowed it down to the following
setup:

Server:
/usr/sbin/sshd -d -p  -f /dev/null -o GSSAPIKeyExchange=yes -o 
GSSAPIAuthentication=yes

Client:
ssh -o PreferredAuthentications=gssapi-with-mic,gssapi-keyex root@compute-test 
-v -p  -o GSSAPIKeyExchange=yes -F /dev/null

I think this should make it independent from my local config, right?
Obviously there is also Kerberos involved, which I would call configured
pretty standard in our environment, but I can have a look at that config
as well, if this is desired.

The problem will not arise when:
- The client has no valid Kerberos-Key (unset KRB5CCNAME)
- If any of the the GSSAPI* options is missing on client or server
- If the order of "gssapi-with-mic,gssapi-keyex" is switched (!)


** Changed in: openssh (Ubuntu)
   Status: Incomplete => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938144

Title:
  monitor_read: unpermitted request 48 on server while attempting GSSAPI
  key exchange

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1938144/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1938144] [NEW] monitor_read: unpermitted request 48 on server while attempting GSSAPI key exchange

2021-07-27 Thread Niklas Rother
Public bug reported:

I'm using openssh 1:8.2p1-4ubuntu0.2 on Ubuntu 20.04.2 LTS (client and
server) with the option "GSSAPIKeyExchange=yes", and this causes the
connection to fail. The server has GSSAPI (Kerberos authentication)
enabled, but is is only used for non-root users (root uses SSH keys).

Client command:

ssh -o PreferredAuthentications=gssapi-with-mic,gssapi-keyex root@server
-v -p  -o GSSAPIKeyExchange=yes

Client log:

OpenSSH_8.2p1 Ubuntu-4ubuntu0.2, OpenSSL 1.1.1f  31 Mar 2020
debug1: Reading configuration data /home/user/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: include /etc/ssh/ssh_config.d/*.conf 
matched no files
debug1: /etc/ssh/ssh_config line 21: Applying options for *
debug1: Connecting to compute-test [130.75.80.46] port .
debug1: Connection established.
debug1: identity file /home/rother/.ssh/id_rsa type 0
debug1: identity file /home/rother/.ssh/id_rsa-cert type -1
debug1: identity file /home/rother/.ssh/id_dsa type -1
debug1: identity file /home/rother/.ssh/id_dsa-cert type -1
debug1: identity file /home/rother/.ssh/id_ecdsa type -1
debug1: identity file /home/rother/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/rother/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/rother/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/rother/.ssh/id_ed25519 type -1
debug1: identity file /home/rother/.ssh/id_ed25519-cert type -1
debug1: identity file /home/rother/.ssh/id_ed25519_sk type -1
debug1: identity file /home/rother/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/rother/.ssh/id_xmss type -1
debug1: identity file /home/rother/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.2
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.2p1 
Ubuntu-4ubuntu0.2
debug1: match: OpenSSH_8.2p1 Ubuntu-4ubuntu0.2 pat OpenSSH* compat 0x0400
debug1: Authenticating to server: as 'root'
debug1: Offering GSSAPI proposal: 
gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==,gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==,gss-gex-sha1-eipGX3TCiQSrx573bT1o1Q==,gss-group14-sha1-eipGX3TCiQSrx573bT1o1Q==
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1...@openssh.com MAC: 
 compression: none
debug1: kex: client->server cipher: chacha20-poly1...@openssh.com MAC: 
 compression: none
debug1: Doing group exchange
debug1: Calling gss_init_sec_context
debug1: Delegating credentials
debug1: Received GSSAPI_COMPLETE
debug1: Calling gss_init_sec_context
debug1: Delegating credentials
debug1: Rekey has happened - updating saved versions
debug1: rekey out after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey in after 134217728 blocks
debug1: Will attempt key: /home/rother/.ssh/id_rsa RSA 
SHA256:n/EY/cGjgd/r+7JpuqODxIotHHLsYptGXYx9GlKCWSM agent
debug1: Will attempt key: /home/rother/.ssh/root_id_rsa RSA 
SHA256:yCLAID9FMILharHmDpCB8wW8eiA+iHa4oQKLODbbzKw agent
debug1: Will attempt key: /home/user/.ssh/id_dsa 
debug1: Will attempt key: /home/user/.ssh/id_ecdsa 
debug1: Will attempt key: /home/user/.ssh/id_ecdsa_sk 
debug1: Will attempt key: /home/user/.ssh/id_ed25519 
debug1: Will attempt key: /home/user/.ssh/id_ed25519_sk 
debug1: Will attempt key: /home/user/.ssh/id_xmss 
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: 
server-sig-algs=
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: 
publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Next authentication method: gssapi-with-mic
debug1: Delegating credentials
debug1: Delegating credentials
debug1: Authentications that can continue: 
publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Authentications that can continue: 
publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Next authentication method: gssapi-keyex
Connection closed by 1.2.3.4 port 

Server log:

debug1: sshd version OpenSSH_8.2, OpenSSL 1.1.1f  31 Mar 2020
debug1: private host key #0: ssh-rsa SHA256:REDACTED
debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:REDACTED
debug1: private host key #2: ssh-ed25519 SHA256:REDACTED
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-d'
debug1: rexec_argv[2]='-p'
debug1: rexec_argv[3]=''
debug1: Set /proc/self/oom_score_adj from 0 to -1000
debug1: Bind to port  on 0.0.0.0.
Server listening on 0.0.0.0 port .
debug1: Bind to port  on ::.
Server listening on :: port .
debug1: Server will not fork when running in debugging mode.
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug1: sshd version OpenSSH_8.2, OpenSSL 1.1.1f  31 Mar 2020
debug1: private host key #0: ssh-rsa SHA256:REDACTED
debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:REDACTED
debu

[Bug 1818501] Re: kernel BUG at fs/ocfs2/alloc.c:1514

2019-03-12 Thread Niklas Rother
Unfortunately we don't have a dedicated test system here, and I don't
really want to test this on the production system... I can confirm that
upgrading to the HWE kernel (4.18, which contains the patches) seems to
solve the problem.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1818501

Title:
  kernel BUG at fs/ocfs2/alloc.c:1514

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818501/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1818501] Re: kernel BUG at fs/ocfs2/alloc.c:1514

2019-03-06 Thread Niklas Rother
It should be
63de8bd9328bf2a778fc277503da163ae3defa3c  ocfs2: make metadata estimation 
accurate and clear 
71a36944042b7d9dd71f6a5d1c5ea1c2353b5d42  ocfs2: try to reuse extent block in 
dealloc without meta_alloc

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1818501

Title:
  kernel BUG at fs/ocfs2/alloc.c:1514

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818501/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1818501] Re: kernel BUG at fs/ocfs2/alloc.c:1514

2019-03-04 Thread Niklas Rother
Adding log with apport-collect files is not easily possible due to our
security setup, but should not be necessary because all information can
be found in the linked debian bug report.

Here is our stacktrace of the bug happening:

Mär 02 06:25:59 prometheus-lo kernel: [ cut here ]
Mär 02 06:25:59 prometheus-lo kernel: kernel BUG at 
/build/linux-uQJ2um/linux-4.15.0/fs/ocfs2/alloc.c:1514!
Mär 02 06:25:59 prometheus-lo kernel: invalid opcode:  [#1] SMP PTI
Mär 02 06:25:59 prometheus-lo kernel: Modules linked in: vhost_net vhost tap 
xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat 
nf_nat_ipv4 devlink ebtable_filter ebtables ocfs2_dlmfs ocfs2_stack_o2cb 
ocfs2_dlm
Mär 02 06:25:59 prometheus-lo kernel:  xt_addrtype xt_conntrack ip6table_filter 
ip6_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_ftp nf_nat 
nf_conntrack_ftp nf_conntrack iptable_filter ib_iser rdma_cm iw_cm ib_cm ib_core
Mär 02 06:25:59 prometheus-lo kernel: CPU: 0 PID: 9345 Comm: kworker/0:1 Not 
tainted 4.15.0-45-generic #48-Ubuntu
Mär 02 06:25:59 prometheus-lo kernel: Hardware name: HPE ProLiant DL360 
Gen10/ProLiant DL360 Gen10, BIOS U32 11/14/2017
Mär 02 06:25:59 prometheus-lo kernel: Workqueue: dio/dm-0 dio_aio_complete_work
Mär 02 06:25:59 prometheus-lo kernel: RIP: 0010:ocfs2_grow_tree+0x5e9/0x7e0 
[ocfs2]
Mär 02 06:25:59 prometheus-lo kernel: RSP: 0018:bea20df37a28 EFLAGS: 
00010246
Mär 02 06:25:59 prometheus-lo kernel: RAX:  RBX: 
bea20df37da0 RCX: bea20df37bb8
Mär 02 06:25:59 prometheus-lo kernel: RDX: bea20df37ac4 RSI: 
bea20df37da0 RDI: 9679f54479f0
Mär 02 06:25:59 prometheus-lo kernel: RBP: bea20df37a98 R08: 
 R09: bea20df37c58
Mär 02 06:25:59 prometheus-lo kernel: R10: bea20df37b68 R11: 
0030 R12: 9676ba5d95a0
Mär 02 06:25:59 prometheus-lo kernel: R13: 9679e321d0c0 R14: 
9676ba5d95a0 R15: 0001
Mär 02 06:25:59 prometheus-lo kernel: FS:  () 
GS:9679ffc0() knlGS:
Mär 02 06:25:59 prometheus-lo kernel: CS:  0010 DS:  ES:  CR0: 
80050033
Mär 02 06:25:59 prometheus-lo kernel: CR2: 7f1b137ba3cc CR3: 
0013a720a002 CR4: 007626f0
Mär 02 06:25:59 prometheus-lo kernel: DR0:  DR1: 
 DR2: 
Mär 02 06:25:59 prometheus-lo kernel: DR3:  DR6: 
fffe0ff0 DR7: 0400
Mär 02 06:25:59 prometheus-lo kernel: PKRU: 5554
Mär 02 06:25:59 prometheus-lo kernel: Call Trace:
Mär 02 06:25:59 prometheus-lo kernel:  ? ocfs2_set_buffer_uptodate+0x34/0x490 
[ocfs2]
Mär 02 06:25:59 prometheus-lo kernel: ocfs2_split_and_insert+0x332/0x4d0 [ocfs2]
Mär 02 06:25:59 prometheus-lo kernel:  ? ocfs2_read_blocks+0x304/0x600 [ocfs2]
Mär 02 06:25:59 prometheus-lo kernel:  ocfs2_split_extent+0x3cb/0x530 [ocfs2]
Mär 02 06:25:59 prometheus-lo kernel:  ? ocfs2_dinode_set_last_eb_blk+0x20/0x20 
[ocfs2]
Mär 02 06:25:59 prometheus-lo kernel: ocfs2_change_extent_flag+0x25b/0x3e0 
[ocfs2]
Mär 02 06:25:59 prometheus-lo kernel: ocfs2_mark_extent_written+0xad/0x1c0 
[ocfs2]
Mär 02 06:25:59 prometheus-lo kernel: ocfs2_dio_end_io_write+0x4ec/0x690 [ocfs2]
Mär 02 06:25:59 prometheus-lo kernel:  ? __switch_to_asm+0x34/0x70
Mär 02 06:25:59 prometheus-lo kernel:  ? 
ocfs2_allocate_extend_trans+0x1a0/0x1a0 [ocfs2]
Mär 02 06:25:59 prometheus-lo kernel:  ocfs2_dio_end_io+0x3e/0x70 [ocfs2]
Mär 02 06:25:59 prometheus-lo kernel:  dio_complete+0x86/0x220
Mär 02 06:25:59 prometheus-lo kernel:  dio_aio_complete_work+0x19/0x20
Mär 02 06:25:59 prometheus-lo kernel:  process_one_work+0x1de/0x410
Mär 02 06:25:59 prometheus-lo kernel:  worker_thread+0x32/0x410
Mär 02 06:25:59 prometheus-lo kernel:  kthread+0x121/0x140
Mär 02 06:25:59 prometheus-lo kernel:  ? process_one_work+0x410/0x410
Mär 02 06:25:59 prometheus-lo kernel:  ? kthread_create_worker_on_cpu+0x70/0x70
Mär 02 06:25:59 prometheus-lo kernel:  ? do_syscall_64+0x73/0x130
Mär 02 06:25:59 prometheus-lo kernel:  ? SyS_exit_group+0x14/0x20
Mär 02 06:25:59 prometheus-lo kernel:  ret_from_fork+0x35/0x40
Mär 02 06:25:59 prometheus-lo kernel: Code: 00 00 00 00 00 00 10 4d 63 c6 48 c7 
c1 40 26 b0 c0 ba 1c 06 00 00 48 c7 c6 f0 59 af c0 48 89 45 c0 e8 5c c2 de ff 
e9 41 fd ff ff <0f> 0b 48 8b 7d b8 48 85 ff 0f 84 e3 fd ff ff eb 22 3d 00 fe ff
Mär 02 06:25:59 prometheus-lo kernel: RIP: ocfs2_grow_tree+0x5e9/0x7e0 [ocfs2] 
RSP: bea20df37a28
Mär 02 06:25:59 prometheus-lo kernel: ---[ end trace 8ba9e5d5bf1ad2c7 ]--- 

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1818501

Title:
  kernel BUG at fs/ocfs2/alloc.c:1514

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818501/+subscriptions

-- 
ubuntu-bugs mailing li

[Bug 1818501] [NEW] kernel BUG at fs/ocfs2/alloc.c:1514

2019-03-04 Thread Niklas Rother
Public bug reported:

The current bionic kernel (4.15) contains a known bug in the OCFS2
distributed filesystem, which can cause all nodes (!) of a redundant
cluster to crash. More information on this bug (including the patch) can
be found here: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841144

This fix was included upstream in 4.16, so it is included in the HWE
stack, but not in the GA kernel.

In my opinion this is quite severe bug, because it can bring a whole
redundant setup down (this happened to us). This patch should be
backported to 4.15.

#cat /proc/version_signature
Ubuntu 4.15.0-45.48-generic 4.15.18

# lsb_release -rd
Description:Ubuntu 18.04.2 LTS
Release:18.04

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete


** Tags: bionic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1818501

Title:
  kernel BUG at fs/ocfs2/alloc.c:1514

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1818501/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs