lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <0CC518FE-47B0-4A32-B682-1CA5F7CBAC2F@kernel.crashing.org>
Date:	Fri, 26 Oct 2007 04:42:28 -0500
From:	Kumar Gala <galak@...nel.crashing.org>
To:	Trond Myklebust <Trond.Myklebust@...app.com>
Cc:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	nfs@...ts.sourceforge.net, neilb@...e.de, bfields@...ldses.org,
	chuck.lever@...cle.com
Subject: Re: LTP ustat01 test fails on NFSROOT


On Oct 25, 2007, at 12:59 PM, Trond Myklebust wrote:

> Could you please try the following patch?
>
> Cheers
>   Trond
> --------------------------------- CUT HERE  
> -----------------------------
> From: Trond Myklebust <Trond.Myklebust@...app.com>
> Date: Thu, 25 Oct 2007 13:56:10 -0400
> NFS: Fix the ustat() regression
>
> Since 2.6.18, the superblock sb->s_root has been a dummy dentry with a
> dummy inode. This breaks ustat(), which actually uses sb->s_root in a
> vfstat() call.
>
> Fix this by making the s_root a dummy alias to the directory inode  
> that was
> used when creating the superblock.
>
> Signed-off-by: Trond Myklebust <Trond.Myklebust@...app.com>
> ---
>
>  fs/nfs/getroot.c |   81 +++++++++++++++++ 
> +------------------------------------
>  1 files changed, 27 insertions(+), 54 deletions(-)

Any reason not to send this to Linus as a bug fix for 2.6.24 (and  
possibly stable)?

- k
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ