lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1256070725.2223.1.camel@warcraft>
Date:	Tue, 20 Oct 2009 21:32:05 +0100
From:	Scott James Remnant <scott@...ntu.com>
To:	Dave Airlie <airlied@...il.com>
Cc:	Kay Sievers <kay.sievers@...y.org>, Greg KH <greg@...ah.com>,
	"Eric W. Biederman" <ebiederm@...ssion.com>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	linux-kernel@...r.kernel.org, Ingo Molnar <mingo@...e.hu>
Subject: Re: [bug] /etc/profile: line 30: /dev/null: Permission denied
 (Was: Re: [PATCH] Remove broken by design and by implementation devtmpfs 
 maintenance disaster)

On Mon, 2009-09-21 at 12:59 +1000, Dave Airlie wrote:

> On Mon, Sep 21, 2009 at 2:14 AM, Kay Sievers <kay.sievers@...y.org> wrote:
> > Distros ship these matches for forever. It's a modprobe.conf blacklist entry
> > that's needed, or better disable thew floppy in the BIOS, if there isn't one
> > to use.
> >
> 
> The patch only went into the kernel last release or maybe one before,
> and it came from Ubuntu's kernel
> 
This was the patch that fixed the missing MODALIAS strings for the PNP
subsystem, right?

(It also happened, at the same time, to fix the fact that the floppy
 module wasn't getting loaded for people who *had* floppy drives.)

The fact the floppy module takes 30s to give up and decide you don't
have a drive is very arguably a bug in the module.  And the fact your
boot waits for it is very arguably a bug in your boot ;)

Scott
-- 
Scott James Remnant
scott@...ntu.com

Download attachment "signature.asc" of type "application/pgp-signature" (198 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ