-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ben Kevan wrote:
> On Friday 02 November 2007 09:54:56 am Randall R Schulz wrote:
>> On Wednesday 31 October 2007 09:08, Randall R Schulz wrote:
>>> Hi,
>>>
>>> <https://bugzilla.novell.com/show_bug.cgi?id=336669>
>>>
>>> ...
>> <https://bugzilla.novell.com/show_bug.cgi?id=336669#c32>
>>
>> -==--==--==--==--==--==--==--==--==--==--==--==--==--==--==--==-
>> [PATCH] reiserfs: bad unlock in reiserfs_xattr_get
>>
>> ...
>>
>> This is what I was looking for. I've found a bug where if getxattr() is
>> called with either a NULL buffer (common) or a too small buffer (not
>> common), it incorrectly unlocks the mutex, despite it not having been
>> locked.
>>
>> I've checked in a patch to the CVS tree.
>> -==--==--==--==--==--==--==--==--==--==--==--==--==--==--==--==-
>>
>>
>> Hurrah!
>>
>> How long might it take to get a new kernel release out???
>>
>>
>> Waiting with bated breath...
>>
>> Randall Schulz
> 
> Don't see the same issue in 2.6.23 :o) .. 
> 
> Have you tried applying the patch? 

It wouldn't be in vanilla 2.6.23, but it would be in the CVS HEAD kernel
based on 2.6.23.

Today's KOTD kernel[1,2] should have the fix included. This is the tree
that will eventually be the update kernel.

- -Jeff

[1] ftp://ftp.suse.com/pub/projects/kernel/kotd/SL103_BRANCH

- --
Jeff Mahoney
SUSE Labs
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4-svn0 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org

iD8DBQFHLIJ9LPWxlyuTD7IRAklKAJ0SgKw83kHf9FRKW6cwPJPATW9W8QCeNljT
PUVtWKe9wWiQyLik1JJ+lyI=
=LDeH
-----END PGP SIGNATURE-----
-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to