lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 24 Mar 2014 09:52:30 +0100
From:	Sedat Dilek <>
To:	Linus Torvalds <>
Cc:	Al Viro <>,
	Linux Kernel Mailing List <>,
	linux-fsdevel <>
Subject: Re: [git pull] vfs fixes

On Sun, Mar 23, 2014 at 6:01 PM, Linus Torvalds
<> wrote:
> On Sun, Mar 23, 2014 at 9:45 AM, Al Viro <> wrote:
>> It's easier to skip checking the overflow on prepend() of "\0" in the
>> beginning of the whole thing and just let the next operation to fail.
>> That's where the corner case comes from.
> Ok, I'll buy the first four commits. Let's wait for Sedat's report on the rest.
>                   Linus


I have tested w/ Al's patch from [1].

AFAICS this changes are now updated in vfs.git#for-linus branch as

commit 9d25fe7e232b ("switch mnt_hash to hlist").

I had a 2nd trouble w/ the old code, installing a Debian package
resulted also in a freeze.
This now works.

The LTP test is still running... and my -5 kernel with Al's fix seems
to hit the 700+ KiB barrier in my logs.

$ LC_ALL=C ls -l /opt/ltp/runltp-log_3.14.0-rc7-[0-9]*-iniza-small.txt
-rw-r--r-- 1 root root  733184 Mar 23 09:51
-rw-r--r-- 1 root root  822533 Mar 24 09:51
-rw-r--r-- 1 root root 1142248 Mar 23 11:44

[ NOTE ]
-66: vanilla Linus-tree
-4: -66 plus old vfs-fixes
-5: -66 plus old vfs-fixes plus Al's fix from [1]

If you like give the usual credits.

- Sedat -

P.S.: [Off-topic] With vanilla -66 kernel I have some OOPS in the
oom[1..5] tests of LTP. Whom to adress? mm-folks?

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists