Suse has officially issued 4.4.132-94.33.1 with the fix for the XFS problem 
outlined below..
For those who follow kernels:  Suse also issued a new 11SP4 kernel today with a 
fix of a reversion for a System V IPC bug.  I assume that bug showed up in the 
previous 11SP4 package that only appeared on the 21st, and that for some people 
it was serious.
Ted Rodriguez-Bell
Wells Fargo Mainframe and Midrange Services
[email protected]<mailto:[email protected]>

Company policy requires:  This message may contain confidential and/or 
privileged information.  If you are not the addressee or authorized to receive 
this for the addressee, you must not use, copy, disclose, or take any action 
based on this message or any information herein.  If you have received this 
message in error, please advise the sender immediately by reply e-mail and 
delete this message.  Thank you for your cooperation.


_____________________________________________
From: Rodriguez-Bell, Ted
Sent: Wednesday, May 23, 2018 4:05 PM
To: 'Linux on 390 Port' <[email protected]>
Subject: Bug with XFS and SLES 12SP3 kernel-default-4.4.131-94.29-default


Suse just released a new kernel-default-4.4.131-94.29-1 package for SLES 12SP3 
with some kernel security fixes.  If you use XFS, don't install it!
I installed it and the system wouldn't mount an existing XFS filesystem.  Our 
friendly Suse engineer (thanks, Roberto!) told me that it's a regression in the 
kernel.  A *NEW* XFS filesystem created under this kernel mounted under both 
4.4.131 and the older 4.4.126.
The biggest fix with this kernel is that now we have a file for speculative 
store bypass.  If you cat it 
(/sys/devices/system/cpu/vulnerabilities/spec_store_bypass) you get "Not 
Affected".  So I don't think waiting for the fix will significantly harm 
anyone's system security...
If anyone cares, our ticket is SR101165092091
Ted Rodriguez-Bell
Wells Fargo Mainframe and Midrange Services
[email protected]<mailto:[email protected]>

Company policy requires:  This message may contain confidential and/or 
privileged information.  If you are not the addressee or authorized to receive 
this for the addressee, you must not use, copy, disclose, or take any action 
based on this message or any information herein.  If you have received this 
message in error, please advise the sender immediately by reply e-mail and 
delete this message.  Thank you for your cooperation.


_____________________________________________



----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390
----------------------------------------------------------------------
For more information on Linux on System z, visit
http://wiki.linuxvm.org/

Reply via email to