This is a note to let you know that I've just added the patch titled
vfs: don't BUG_ON() if following a /proc fd pseudo-symlink
to the 3.8-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
vfs-don-t-bug_on-if-following-a-proc-fd-pseudo-symlink.patch
and it can be found in the queue-3.8 subdirectory.
If you, or anyone else, feels it should not be added to the stable tree,
please let <[email protected]> know about it.
>From 7b54c165a0c012edbaeaa73c5c87cb73721eb580 Mon Sep 17 00:00:00 2001
From: Linus Torvalds <[email protected]>
Date: Fri, 8 Mar 2013 09:03:07 -0800
Subject: vfs: don't BUG_ON() if following a /proc fd pseudo-symlink
results in a symlink
From: Linus Torvalds <[email protected]>
commit 7b54c165a0c012edbaeaa73c5c87cb73721eb580 upstream.
It's "normal" - it can happen if the file descriptor you followed was
opened with O_NOFOLLOW.
Reported-by: Dave Jones <[email protected]>
Cc: Al Viro <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
---
fs/namei.c | 2 --
1 file changed, 2 deletions(-)
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -693,8 +693,6 @@ void nd_jump_link(struct nameidata *nd,
nd->path = *path;
nd->inode = nd->path.dentry->d_inode;
nd->flags |= LOOKUP_JUMPED;
-
- BUG_ON(nd->inode->i_op->follow_link);
}
static inline void put_link(struct nameidata *nd, struct path *link, void
*cookie)
Patches currently in stable-queue which might be from
[email protected] are
queue-3.8/ipc-don-t-allocate-a-copy-larger-than-max.patch
queue-3.8/dmi_scan-fix-missing-check-for-_dmi_-signature-in-smbios_present.patch
queue-3.8/vfs-don-t-bug_on-if-following-a-proc-fd-pseudo-symlink.patch
queue-3.8/ipc-fix-potential-oops-when-src-msg-4k-w-msg_copy.patch
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html