Your message dated Fri, 11 Jul 2025 11:34:37 +0000
with message-id <e1uac1v-004c42...@fasolo.debian.org>
and subject line Bug#1077626: fixed in glusterfs 11.1-6
has caused the Debian Bug report #1077626,
regarding glusterfs: brick segfaults
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1077626: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077626
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: glusterfs
Version: 11.1-4
Severity: normal
Dear Maintainer,
in Ubuntu we got a bug report[1] on glusterfs 11.1-4 (which was in
sync with debian), that it would segfault under certain conditions on
a user's system.
The reporter tracked the problem down to an upstream PR that
introduced it, and then to another PR that fixed it:
* PR which introduced the bug: https://github.com/gluster/glusterfs/pull/1763
* PR which added this patch: https://github.com/gluster/glusterfs/pull/4302
* Issue discussion: https://github.com/gluster/glusterfs/issues/4295
This bug report and supporting data was good enough for the Ubuntu SRU
process, which was completed successfully.
I suppose debian users could be affected as well, so I'm filing this
bug here with the patch that was used in the Ubuntu update.
1. https://bugs.launchpad.net/ubuntu/+source/glusterfs/+bug/2064843
Description: Fix stack overflow in __inode_destroy
A recursive call to inode_unref was introduced when support for inode-level
namespaces was added. This results in a stack overflow under certain
conditions leading to brick SEGFAULTs. This patch removes the recurisve call
to inode_unref. This was fixed upstream but is yet to be included in a
release.
.
glusterfs (11.1-4ubuntu1) noble; urgency=medium
.
* Fix stack overflow in __inode_destroy (LP: #2064843)
Origin: upstream, https://github.com/gluster/glusterfs/commit/da2391dacd3483555e91a33ecdf89948be62b691
Bug: https://github.com/gluster/glusterfs/issues/4295
Bug-Ubuntu: https://launchpad.net/bugs/2064843
Author: Mohit Agrawal <moagr...@redhat.com>
Reviewed-By: Xavi Hernandez <xhernan...@gmail.com>
Reviewed-By: Amar Tumballi <a...@dhiway.com>
Reviewed-By: Bryce Harrington <bryce.harring...@canonical.com>
Last-Update: 2024-05-08
---
--- glusterfs-11.1.orig/libglusterfs/src/inode.c
+++ glusterfs-11.1/libglusterfs/src/inode.c
@@ -351,9 +351,19 @@ __inode_ctx_free(inode_t *inode)
static void
__inode_destroy(inode_t *inode)
{
- inode_unref(inode->ns_inode);
- __inode_ctx_free(inode);
+ inode_table_t *table = NULL;
+ inode_t *ns_inode = inode->ns_inode;
+
+ if (ns_inode) {
+ table = ns_inode->table;
+ pthread_mutex_lock(&table->lock);
+ {
+ __inode_unref(ns_inode, false);
+ }
+ pthread_mutex_unlock(&table->lock);
+ }
+ __inode_ctx_free(inode);
LOCK_DESTROY(&inode->lock);
// memset (inode, 0xb, sizeof (*inode));
GF_FREE(inode);
--- End Message ---
--- Begin Message ---
Source: glusterfs
Source-Version: 11.1-6
Done: Patrick Matthäi <pmatth...@debian.org>
We believe that the bug you reported is fixed in the latest version of
glusterfs, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1077...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Patrick Matthäi <pmatth...@debian.org> (supplier of updated glusterfs package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 11 Jul 2025 10:26:54 +0200
Source: glusterfs
Architecture: source
Version: 11.1-6
Distribution: unstable
Urgency: medium
Maintainer: Patrick Matthäi <pmatth...@debian.org>
Changed-By: Patrick Matthäi <pmatth...@debian.org>
Closes: 1077626
Changes:
glusterfs (11.1-6) unstable; urgency=medium
.
* Add patch 09-fix-stack-overflow-in-inode-destroy from Andreas Hasenack to
fix a segfault under certain conditions.
Closes: #1077626
Checksums-Sha1:
4f2a2e8cded7ab3bd55f189759072c58a8a5d7b0 3537 glusterfs_11.1-6.dsc
1f70019c36a7a852b941888b548d21ec17f2a7d6 8365581 glusterfs_11.1.orig.tar.gz
dd63c93f167128f678769ea2052f4235431b0490 25348 glusterfs_11.1-6.debian.tar.xz
656286de76b7e07b46ceb0c27fdfeb35343d2f2f 7596 glusterfs_11.1-6_source.buildinfo
Checksums-Sha256:
32630c7c8e5bfb6318bb046d9ee71e287a1a81ad6443686123567521671e8f80 3537
glusterfs_11.1-6.dsc
6a31b8450d02cd12f47f4571c031e9d6b8705279a0e8970ae9a05e1c87dffb76 8365581
glusterfs_11.1.orig.tar.gz
6e62c30226b211aed55bce3c4e9d975abb51b65654d6de97d0487357d0ae05dd 25348
glusterfs_11.1-6.debian.tar.xz
5fcf840a7c257c772e204a50d77737c922b82af9ec7bd53f4f6d053b7e0fa931 7596
glusterfs_11.1-6_source.buildinfo
Files:
c100b3bd6504068cc3280b727c289819 3537 admin optional glusterfs_11.1-6.dsc
7e290a50026752f435f694651687e0f2 8365581 admin optional
glusterfs_11.1.orig.tar.gz
3c8b6568ba817d5890b4bda53a5aa357 25348 admin optional
glusterfs_11.1-6.debian.tar.xz
9c418985dc1353991f893fb4db0ea8b4 7596 admin optional
glusterfs_11.1-6_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=vVCh
-----END PGP SIGNATURE-----
pgpFQ7uW8NCUt.pgp
Description: PGP signature
--- End Message ---