lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 24 Mar 2008 17:42:33 -0700
From:	Chris Wright <chrisw@...s-sol.org>
To:	Chr <chunkeey@....de>
Cc:	Nick Piggin <nickpiggin@...oo.com.au>, Greg KH <greg@...ah.com>,
	Pierre Ossman <drzeus-list@...eus.cx>,
	LKML <linux-kernel@...r.kernel.org>,
	Nick Piggin <npiggin@...e.de>, stable@...nel.org
Subject: Re: inotify fixes in stable

* Chr (chunkeey@....de) wrote:
> On Tuesday 11 March 2008 05:12:37 Nick Piggin wrote:
> >
> > The messages should actually be harmless. There is a race in the debug
> > code that can trigger them. But I wouldn't object to the patches going
> > to -stable...
> >
> let me guess... the patch didn't get into 2.6.24.4, right? because I still
> get these noisy "WARNING: at fs/inotify.c:172 set_dentry_child_flags()"
> and probably alot of other kde4 users too?!

a) doesn't appear to have been Cc'd to stable@...nel.org until now
(fell through one crack)
b) there was outstanding request from greg for clarification of the
issue for 2.6.24 (fell through another crack)

Please just explicitly send the fixes to stable@...nel.org and Cc Nick.

I'm actually disinclined to take 0d71bd5993b630a989d15adc2562a9ffe41cd26d
which seems to primarily just remove the WARN_ON(), although that is
assuming it is indeed no longer triggered with just the race fix,
d599e36a9ea85432587f4550acc113cd7549d12a.

thanks,
-chris
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ