lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 28 Feb 2013 08:05:41 +0100
From:	richard -rw- weinberger <richard.weinberger@...il.com>
To:	Srinivas Eeda <srinivas.eeda@...cle.com>
Cc:	"Ramappa, Ravi (NSN - IN/Bangalore)" <ravi.ramappa@....com>,
	"ocfs2-users@....oracle.com" <ocfs2-users@....oracle.com>,
	LKML <linux-kernel@...r.kernel.org>,
	linux-fsdevel <linux-fsdevel@...r.kernel.org>,
	david@...ma-star.at
Subject: Re: [Ocfs2-users] Kernel panic due to ocfs2

On Thu, Feb 28, 2013 at 5:54 AM, Srinivas Eeda <srinivas.eeda@...cle.com> wrote:
> On 02/27/2013 03:52 AM, richard -rw- weinberger wrote:
>>
>> On Tue, Feb 26, 2013 at 8:54 AM, richard -rw- weinberger
>> <richard.weinberger@...il.com> wrote:
>>>
>>> On Tue, Feb 26, 2013 at 7:31 AM, Srinivas Eeda <srinivas.eeda@...cle.com>
>>> wrote:
>>>>
>>>> This is due to a race in lock mastery/purge. I have recently fixed this
>>>> problem but haven't yet submitted the patch to mainline. Please file a
>>>> Service request with Oracle to get a one-off fix.
>>>
>>> Please submit the patch immediately.
>>> Why does one need a f§&"!#$ SR from Oracle to have this fixed?
>>
>> So, where can I find this patch?
>> Can you please share it with us insignificant and rubbishy community
>> folks?
>
> Here is the patch against mainline which I haven't yet submitted because I
> have not finished testing on mainline kernel yet. I am running into another
> unrelated crashes during testing. I am forwarding the patch to you assuming
> you are looking for this fix.
>
> https://oss.oracle.com/~seeda/patches/dlm-race/
>
> The other person who emailed about the problem was running older ocfs2
> version(1.4-10). Which is where I originally debugged, patched and tested
> the fix. So I offered to help him.

Thanks a lot for the patch!
Offering help is okay, but the SR thing had a really bad taste.
Iff mainline is not vulnerable, no problem but please communicate such
a fact clearly.
Also if your patch is not yet through your in-house QA, you can still
send an "hey-i-have-an-idea..."-patch.

Is the git repo listed in MAINTAINERS and the ocfs2 website still valid?
It looks kinda outdated...
git://git.kernel.org/pub/scm/linux/kernel/git/jlbec/ocfs2.git

OCFS2 development seems to be very opaque currently.

-- 
Thanks,
//richard
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists