lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060731000359.GB23220@kroah.com>
Date:	Sun, 30 Jul 2006 17:03:59 -0700
From:	Greg KH <greg@...ah.com>
To:	Laurent Riffard <laurent.riffard@...e.fr>
Cc:	ajwade@...001346162bf9-cm0011ae8cd564.cpe.net.cable.rogers.com,
	Andrew Morton <akpm@...l.org>, andrew.j.wade@...il.com,
	linux-kernel@...r.kernel.org
Subject: Re: Kubuntu's udev broken with 2.6.18-rc2-mm1

On Sun, Jul 30, 2006 at 04:01:43PM +0200, Laurent Riffard wrote:
> In this situation, udev (version 096 here) is unable to create these
> device files (/dev/full, /dev/kmem, /dev/kmsg, etc.). /dev/null does
> exist (with wrong permissions) because it has been created by the
> initrd script.

Something's really broken with that version of udev then, because the
094 version I have running here works just fine with these symlinks.

> In order to get back the device files, I have to run the following
> command:
> # for f in /sys/class/mem/*/uevent; do echo 1 > $f; done

Ah, ok, it sounds like it's not a bug in udev itself, but rather a bug
in the way your distro does it's initialization of udev, at boot.  I
suggest you file a bug with them, as they are known for doing this a bit
differently than any other distro (and different from how the udev
developers recommend), so they can fix it.  It's probably just a shell
script issue.

thanks,

greg k-h
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ