Has this bug been fixed in Ubuntu 18.04?
I seem to have the same issue (kernel 4.15.0-34).
I do not have any SMB drives mounted, yet old connections from several
months ago are open and still flooding 445:
> sudo netstat -tnp | grep 445
tcp0 0 x.x.x.x:54508a.a.a.a:445 EST
Hello, is it going to appear in 4.4? I'm getting tired of running
4.4.0-66 (jk works ok but still would prefer to update).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flo
(A couple of other boxes with 16.04 (not 16.04.1) xenial have 4.4.0-81
as latest).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume u
Hi, it may have been fixed in 16.10 yakkety 4.8.0-58.63, but 16.04.1
xenial (LTS) still has 4.8.0-56 as latest on one of my boxes, as
woldemar and Andrij Abyzov report above.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
This bug was fixed in the package linux - 4.8.0-58.63
---
linux (4.8.0-58.63) yakkety; urgency=low
* linux: 4.8.0-58.63 -proposed tracker (LP: #1700533)
* CVE-2017-1000364
- Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
- Revert "mm: do not collapse s
I also confirm that the issue is here with
4.8.0-56-generic #61~16.04.1-Ubuntu
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under
when the problem will be solved in a stable kernel ?
4.8.0-56-generic #61~16.04.1-Ubuntu SMP
The bug is still there
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to
Uhm, sorry too late in the evening...
What I wanted to say is: I tried the proposed kernel (4.8.0-55-generic
#58~16.04.1-Ubuntu)
the whole day long, and NO connection spam appeared. This means the fix seems
to work.
As I don't know how to set the tag, or have insufficient rights, please modify
t
Is ok for me, 4.8.0-55-generic #58~16.04.1-Ubuntu SMP
No more flood with this kernel version.
** Tags removed: verification-needed-yakkety
** Tags added: verification-done-yakkety
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
Had 4.8.0-55-generic #58~16.04.1-Ubuntu the whole day, now connection
spam appeared.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
yakkety' to 'verification-done-yakkety'. If the problem still exists,
change the tag 'verifi
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume un
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kerne
Hi,
I also ran the kernel for the past three days, and no
connection spam appeared.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume
@Joseph Salisbury (jsalisbury)
I installed your patched kernel on my Desktop today and it run now from
3 hours without problem, no more cifs flood.. :)
So, i will continue my test today, but apparently this bug is fixed in
your patched kernel.
If is confirmed, can you tell me approximatively whe
I built a Yakkety test kernel with a cherry pick of commit 62a6cfddcc.
The test kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1686099/
Before I SRU this commit to Yakkety, can folks affected by this bug test
this kernel?
--
You received this bug notification because you
@MichaelB, The commit is in Xenial master-next. It has not been tagged
for a specific version. It looks like it will be in 4.4.0-80.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
co
@Joseph Salisbury (jsalisbury)
Can you please tell me from which version of ubuntu kernel this is
applied. I tried also the last 4.4 on Ubuntu 16.04 (4.4.0-78-generic
#99-Ubuntu SMP) and i have the same problem.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bug
This has been fixed upstream by the following commit:
commit 62a6cfddcc0a5313e7da3e8311ba16226fe0ac10
Author: Sachin Prabhu
Date: Sun Apr 16 20:37:24 2017 +0100
cifs: Do not send echoes before Negotiate is complete
It has been cc'd to upstream stable and has landed in Xenial and Zesty
mas
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
** Also affects: linux (Ubuntu Zesty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Artful)
Importance:
4.8.0-52-generic #55~16.04.1-Ubuntu released today (2017-05-16) not ok -
The bug is still here too! Please fix this quickly because my company
network are overloaded because of this bug. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
4.4.0-77-generic #98-Ubuntu, the bug is still here.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kernel
To manage notifica
Fix released in what version?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kernel
To manage notifications about this bug g
** Changed in: linux
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kernel
To manag
At GitHub raspberrypi/linux, 6by9 writes: "[The fix] was applied to the
4.4 tree 5 days ago, so should be in 4.4.64 and later. When Ubuntu bump
the kernel in their repos is totally up to them."
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-
stable.git/log/?id=refs/tags/v4.4.65
--
At https://bugzilla.kernel.org/show_bug.cgi?id=194531 Steve French
writes:
"The fix was merged into mainline kernel last week, and should be
backported to at least a few older kernels due to cc:stable."
Does that mean it will be fixed for folk reporting issues with Ubuntu
4.4.0-75?
** Bug watch
I have 5 desktop on Ubuntu 16.04 with various official kernel 4.4, 4.8,
4.10. All this desktop are connected via CIFS to a Windows Server 2008
R2 for a simple shared folder.
After some minutes of activity i got a high CIFS flood traffic between
desktop and server. Many giga per desktop are transfe
** Changed in: linux
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kernel
To manage notific
I downgraded to linux-image-4.4.0-66-generic and no longer have the
flooding issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume
If you reboot (or unmount/remount) with the "ls every minute" cron job
active, it should prevent the timeout on the share and not reach the
keep-alive echo that starts the flood. I think it is about the
15-minute mark (of inactivity) where the client starts the echo flood.
--
You received this b
I did try to install the upstream kernel linux-
image-4.11.0-041100rc8-generic_4.11.0-041100rc8.201704232131_amd64.deb
and linux-
headers-4.11.0-041100rc8-generic_4.11.0-041100rc8.201704232131_amd64.deb
but unfortunately the system barely boots and the networking is messed
up after the change. I c
My workaround may have added some time, but eventually the share
dismounted :(
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under
I failed to mention my kernel version: 4.4.0-75-generic #96-Ubuntu SMP
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kernel
As a workaround, I've added a cron job that does a directory listing on
the share every minute. It has not stopped the flood but it seems to be
allowing the cifs client to stay connected for a longer period of time
(a major annoyance when the application relies on that share being
available.)
--
I've got the same problem from a number of Ubuntu 16.04 machines.
They're running on Hyper-V and so they've got the following installed as
per Microsoft recommendations:
linux-virtual-lts-xenial linux-tools-virtual-lts-xenial linux-cloud-
tools-virtual-lts-xenial
It happens a few minutes after mo
The screenshot above is from traffic between the two RPis, which run
Raspbian (RPi + Debian).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting ci
** Changed in: linux
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kernel
To manage notificat
Maybe. This is a production system so I'll have to schedule something.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection flood to port 445 on mounting cifs volume under kernel
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.11 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix t
The system is behind a firewall so I can't run apport-collect directly.
Is there a way to run it to a file and upload separately?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connect
** Attachment added: "output from ubuntu-bug linux"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1686099/+attachment/4867760/+files/bug.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/168
and the "apport-bug linux" attachment isn't sufficient?
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686099
Title:
connection
42 matches
Mail list logo