similar to: C 7 and gssproxy

Displaying 20 results from an estimated 10000 matches similar to: "C 7 and gssproxy"

2019 Jan 28
0
C 7 and gssproxy
On 1/25/19 10:27 AM, mark wrote: > Ok, folks, > > I brought this up some time ago, and got no replies. We have a good > number of systems - > 100 - and we use sssd. On the C 7 boxen, which is > most of them, gssproxy *frequently* (like once a day or so) dies with a > SEGV. It restarts fine. Dies again eventually. > > ARE other people seeing this? If so, I guess
2019 May 02
3
[Fwd: [Bug 1699331] gssproxy segmentation fault]
Hi, folks, Especially Johnny - could you possibly push this fix through as soon as upstream puts it out? It's a real issue for us - we've had a number of servers whether gssproxy keeps SEGVing, which hits NFS and samba. Thanks in advance. mark ---------------------------- Original Message ---------------------------- Subject: [Bug 1699331] gssproxy segmentation fault
2019 May 08
1
[Fwd: [Bug 1699331] gssproxy segmentation fault]
Hi, Johnny, Johnny Hughes wrote: > On 5/2/19 9:15 AM, mark wrote: >> >> Especially Johnny - could you possibly push this fix through as soon as >> upstream puts it out? It's a real issue for us - we've had a number of >> servers whether gssproxy keeps SEGVing, which hits NFS and samba. > > See if this fixes your issues .. if do, let me know and we can
2019 May 08
1
[Fwd: [Bug 1699331] gssproxy segmentation fault]
Hi, Johnny, Johnny Hughes wrote: > On 5/2/19 9:15 AM, mark wrote: >> >> Especially Johnny - could you possibly push this fix through as soon as >> upstream puts it out? It's a real issue for us - we've had a number of >> servers whether gssproxy keeps SEGVing, which hits NFS and samba. > > See if this fixes your issues .. if do, let me know and we can
2015 Jun 30
2
gssproxy items...
Hi, I've been working on some systems trying to get kerberized nfsv4 and kerberized web services going on 7. Kerberized nfsv4 was working with 7.0, but with the 7.1 release it stopped working, the key difference between the two setups is that gssproxy wasn't being used with 7.0, but seems to be key with 7.1. The problem I am encountering with Kerberized NFSv4 is that the directory will
2019 May 08
0
[Fwd: [Bug 1699331] gssproxy segmentation fault]
On 5/2/19 9:15 AM, mark wrote: > Hi, folks, > > Especially Johnny - could you possibly push this fix through as soon as > upstream puts it out? It's a real issue for us - we've had a number of > servers whether gssproxy keeps SEGVing, which hits NFS and samba. > Mark, See if this fixes your issues .. if do, let me know and we can get it released into the fasttrack
2019 Jul 10
2
Winbind issues with AD member file server
I agree that this sounds like, and indeed is, a recipe for disaster. I was going to explain some of the woes of our environment but I don't think it's actually relevant after looking at my problem a bit more. If I'm way off base I'm happy to be herded back, but please tolerate me as I share what I am seeing today because I really hope to solve the narrow issue of SMB file access
2016 Aug 02
0
CEBA-2016:1527 CentOS 7 gssproxy BugFix Update
CentOS Errata and Bugfix Advisory 2016:1527 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1527.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 6a9a1160f894ed26bbdf4ca9ea1565fd5b28195000bdb3a2dc1945fc76c59e66 gssproxy-0.4.1-8.el7_2.x86_64.rpm Source:
2015 Jun 30
0
gssproxy items...
Erik Laxdal wrote: > Hi, > > I've been working on some systems trying to get kerberized nfsv4 and > kerberized web services going on 7. Kerberized nfsv4 was working with > 7.0, but with the 7.1 release it stopped working, the key difference > between the two setups is that gssproxy wasn't being used with 7.0, but > seems to be key with 7.1. > > The problem I am
2020 Nov 12
1
nfs root kerberos
On 12/11/2020 14:19, Jason Keltz via samba wrote: > > On 11/12/2020 8:52 AM, Rowland penny via samba wrote: >> On 12/11/2020 13:27, Jason Keltz via samba wrote: >>> >>> On 11/12/2020 8:17 AM, Rowland penny via samba wrote: >>>> On 11/11/2020 10:54, Jason Keltz via samba wrote: >>>>> Hi Louis, >>>>> I've looked into that
2020 Nov 12
2
nfs root kerberos
On 12/11/2020 13:27, Jason Keltz via samba wrote: > > On 11/12/2020 8:17 AM, Rowland penny via samba wrote: >> On 11/11/2020 10:54, Jason Keltz via samba wrote: >>> Hi Louis, >>> I've looked into that and I'm not sure how this would be done? >>> By the way, even with your NFS translation fix (which doesn't work >>> for me because
2016 May 29
2
Unable to boot CentOS 6 - Segmentation Erorr
Hi all, I had an issue this morning with one of my virtual machines. It wouldn't boot (into any runlevel), nor could I chroot into the root partition using a rescue disk. Unfortunately I didn't grab a screenshot, however the error(s) when booting were: /pre-pivot/50selinux-loadpolicy.sh: 14 <other messages> init: readahead main process (425) killed by SEGV signal init:
2019 Feb 08
0
C7, enable an abrt for a daemon
I've mentioned here before that gssproxy is crashing all over the place with a SEGV. However, there's no /var/spool/abrt/... when it does. How do I enable the daemon to give me an abrt with information? I'm just not sure of what the right word is for systemd, so online searching isn't always useful. Thanks in advance. mark
2020 Nov 12
2
nfs root kerberos
On 11/11/2020 10:54, Jason Keltz via samba wrote: > Hi Louis, > I've looked into that and I'm not sure how this would be done? > By the way, even with your NFS translation fix (which doesn't work for me because gssproxy), do you do this before accessing root files..? > sudo root > kinit -k 'host$' > OK, after a bit of a battle, I now have a Centos 7 Unix
2011 Jun 17
0
[LLVMdev] LLVM-based address sanity checker
On 17 June 2011 09:14, Kostya Serebryany <kcc at google.com> wrote: > Maybe the fallback code should just use a function call. Much simpler for > documentation purposes. Sounds good. On 32-bit, the shadow region is: > [0x28000000, 0x3fffffff] HighShadow [0x24000000, 0x27ffffff] ShadowGap [0x20000000, > 0x23ffffff] LowShadow > > This is 0.5G total. So, I mmap all these
2016 Sep 06
5
[SOLVED] Re: Feature Request: what about "core stop panic" ?
On Tue, Sep 6, 2016 at 1:55 AM, Olivier <oza.4h07 at gmail.com> wrote: > Hello, > > After testing "pkill -SEGV -f /usr/sbin/asterisk" on Debian Jessie > platform, I've got several questions : > > > 1. When I issue a "cd /tmp; asterisk -cvvvvvvvvvvvg -U asterisk -G > asterisk" command, and then issue a "pkill -SEGV asterisk" command,
2020 Nov 11
2
nfs root kerberos
Hai Jason, Hmm, yes, well, only one thing i can think of now is And thats the last one.. Is the server allowed to delelagate kerberos services? If you have set that also? It's the last thing i can remember. Greetz, Louis > -----Oorspronkelijk bericht----- > Van: samba [mailto:samba-bounces at lists.samba.org] Namens > Jason Keltz via samba > Verzonden: dinsdag 10 november
2011 Jun 17
3
[LLVMdev] LLVM-based address sanity checker
On Fri, Jun 17, 2011 at 12:04 PM, Renato Golin <rengolin at systemcall.org>wrote: > On 17 June 2011 08:55, Kostya Serebryany <kcc at google.com> wrote: > > I am rather reluctant to add 'generic' code that handles unknown/untested > > platforms because the memory mapping is very platform specific anyway. > > Indeed, but the point of that is more for helping
2010 Apr 29
1
Aide error "Caught SIGBUS/SEGV"
One of my servers has recently started giving an error every time I run "aide --check". I ran it manually twice today with the same results. The second time, I added the -V flag, but that didn't give me anything useful. The system is currently running CentOS 5.3. Nothing on the system has changed recently (that I am aware of). The Aide database hasn't been updated in a few
2013 Aug 19
3
rpcclient netshareenum 502 causes SEGV
Hello: I have a Windows 2003 Server that is causing rpcclient to SEGV via the following command: $ rpcclient -U Administrator%foobar -c 'netshareenum 502' <server> ... type: 0x6269: SEC_DESC_OWNER_DEFAULTED SEC_DESC_DACL_DEFAULTED SEC_DESC_SACL_DEFAULTED SEC_DESC_DACL_TRUSTED SEC_DESC_SACL_AUTO_INHERIT_REQ SEC_DESC_SACL_PROTECTED SEC_DESC_RM_CONTROL_VALID SACL Segmentation fault