[Bugs] [Bug 1447523] Glusterd segmentation fault in ' _Unwind_Backtrace' while running peer probe

bugzilla at redhat.com bugzilla at redhat.com
Mon Jun 12 06:24:27 UTC 2017


https://bugzilla.redhat.com/show_bug.cgi?id=1447523



--- Comment #27 from Worker Ant <bugzilla-bot at gluster.org> ---
COMMIT: https://review.gluster.org/17505 committed in release-3.8 by jiffin
tony Thottan (jthottan at redhat.com) 
------
commit ba5115bccdc08f395a88d682d3df4af0e4bbfb0a
Author: Gaurav Yadav <gyadav at redhat.com>
Date:   Mon May 22 23:25:47 2017 +0530

    libglusterfs : Fix crash in glusterd while peer probing

    glusterd crashes when port is being set explcitly to a
    range which is outside greater than short data type range.
    Eg. sysctl net.ipv4.ip_local_reserved_ports="49152-49156"
    In above case glusterd crashes while parsing the port.

    With this fix glusterd will be able to handle port range
    between INT_MIN to INT_MAX

    > Reviewed-on: https://review.gluster.org/17359
    > Smoke: Gluster Build System <jenkins at build.gluster.org>
    > NetBSD-regression: NetBSD Build System <jenkins at build.gluster.org>
    > CentOS-regression: Gluster Build System <jenkins at build.gluster.org>
    > Reviewed-by: Samikshan Bairagya <samikshan at gmail.com>
    > Reviewed-by: Atin Mukherjee <amukherj at redhat.com>
    > Reviewed-by: Niels de Vos <ndevos at redhat.com>
    > Reviewed-by: Jeff Darcy <jeff at pl.atyp.us>

    Change-Id: I7c75ee67937b0e3384502973d96b1c36c89e0fe1
    BUG: 1447523
    Signed-off-by: Gaurav Yadav <gyadav at redhat.com>
    Reviewed-on: https://review.gluster.org/17505
    Smoke: Gluster Build System <jenkins at build.gluster.org>
    NetBSD-regression: NetBSD Build System <jenkins at build.gluster.org>
    CentOS-regression: Gluster Build System <jenkins at build.gluster.org>
    Reviewed-by: Atin Mukherjee <amukherj at redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=aY3PhI8ttJ&a=cc_unsubscribe


More information about the Bugs mailing list