Suse has officially issued 4.4.132-94.33.1 with the fix for the XFS problem outlined below.. For those who follow kernels: Suse also issued a new 11SP4 kernel today with a fix of a reversion for a System V IPC bug. I assume that bug showed up in the previous 11SP4 package that only appeared on the 21st, and that for some people it was serious. Ted Rodriguez-Bell Wells Fargo Mainframe and Midrange Services [email protected]<mailto:[email protected]>
Company policy requires: This message may contain confidential and/or privileged information. If you are not the addressee or authorized to receive this for the addressee, you must not use, copy, disclose, or take any action based on this message or any information herein. If you have received this message in error, please advise the sender immediately by reply e-mail and delete this message. Thank you for your cooperation. _____________________________________________ From: Rodriguez-Bell, Ted Sent: Wednesday, May 23, 2018 4:05 PM To: 'Linux on 390 Port' <[email protected]> Subject: Bug with XFS and SLES 12SP3 kernel-default-4.4.131-94.29-default Suse just released a new kernel-default-4.4.131-94.29-1 package for SLES 12SP3 with some kernel security fixes. If you use XFS, don't install it! I installed it and the system wouldn't mount an existing XFS filesystem. Our friendly Suse engineer (thanks, Roberto!) told me that it's a regression in the kernel. A *NEW* XFS filesystem created under this kernel mounted under both 4.4.131 and the older 4.4.126. The biggest fix with this kernel is that now we have a file for speculative store bypass. If you cat it (/sys/devices/system/cpu/vulnerabilities/spec_store_bypass) you get "Not Affected". So I don't think waiting for the fix will significantly harm anyone's system security... If anyone cares, our ticket is SR101165092091 Ted Rodriguez-Bell Wells Fargo Mainframe and Midrange Services [email protected]<mailto:[email protected]> Company policy requires: This message may contain confidential and/or privileged information. If you are not the addressee or authorized to receive this for the addressee, you must not use, copy, disclose, or take any action based on this message or any information herein. If you have received this message in error, please advise the sender immediately by reply e-mail and delete this message. Thank you for your cooperation. _____________________________________________ ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390 ---------------------------------------------------------------------- For more information on Linux on System z, visit http://wiki.linuxvm.org/
