lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 15 Jun 2013 20:44:22 -0400
From:	Richard Yao <ryao@...too.org>
To:	shencanquan <shencanquan@...wei.com>
CC:	Jeff Liu <jeff.liu@...cle.com>, Mark Fasheh <mfasheh@...e.com>,
	linux-kernel@...r.kernel.org, kernel@...too.org,
	linux-fsdevel@...r.kernel.org,
	Ocfs2-Devel <ocfs2-devel@....oracle.com>
Subject: Re: [Ocfs2-devel] [PATCH 1/2] ocfs2: Fix llseek() semantics and do
 some cleanup

On 06/15/2013 02:22 AM, shencanquan wrote:
> Hello, Richard and Jeff,
>    we found that llseek has another bug when in SEEK_END.  it should be
> add the inode lock and unlock.
>    this bug can be reproduce the following scenario:
>    on one nodeA, open the file and then write some data to file and
> close the file .
>    on  another nodeB , open the file and llseek the end of file . the
> position of file is old.

Did these operations occur sequentially or did they occur concurrently?

If you meant the former, the inode cache is not being invalidated. That
should be a bug because Oracle claims OCFS2 is cache-coherent. However,
it is possible that this case was left out of the cache-coherence
protocol for performance purposes. If that is the case, then this would
be by design. someone who works for Oracle would need to comment on that
though.

If you meant the latter, you should ask yourself what would happen when
you run two separate programs on the same file in a local filesystem.
There should be no way to avoid a race without some kind of a locking
mechanism.


Download attachment "signature.asc" of type "application/pgp-signature" (902 bytes)

Powered by blists - more mailing lists