This is a note to let you know that I've just added the patch titled

    vfs: don't BUG_ON() if following a /proc fd pseudo-symlink

to the 3.8-stable tree which can be found at:
    
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     vfs-don-t-bug_on-if-following-a-proc-fd-pseudo-symlink.patch
and it can be found in the queue-3.8 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <[email protected]> know about it.


>From 7b54c165a0c012edbaeaa73c5c87cb73721eb580 Mon Sep 17 00:00:00 2001
From: Linus Torvalds <[email protected]>
Date: Fri, 8 Mar 2013 09:03:07 -0800
Subject: vfs: don't BUG_ON() if following a /proc fd pseudo-symlink
 results in a symlink

From: Linus Torvalds <[email protected]>

commit 7b54c165a0c012edbaeaa73c5c87cb73721eb580 upstream.

It's "normal" - it can happen if the file descriptor you followed was
opened with O_NOFOLLOW.

Reported-by: Dave Jones <[email protected]>
Cc: Al Viro <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
 fs/namei.c |    2 --
 1 file changed, 2 deletions(-)

--- a/fs/namei.c
+++ b/fs/namei.c
@@ -693,8 +693,6 @@ void nd_jump_link(struct nameidata *nd,
        nd->path = *path;
        nd->inode = nd->path.dentry->d_inode;
        nd->flags |= LOOKUP_JUMPED;
-
-       BUG_ON(nd->inode->i_op->follow_link);
 }
 
 static inline void put_link(struct nameidata *nd, struct path *link, void 
*cookie)


Patches currently in stable-queue which might be from 
[email protected] are

queue-3.8/ipc-don-t-allocate-a-copy-larger-than-max.patch
queue-3.8/dmi_scan-fix-missing-check-for-_dmi_-signature-in-smbios_present.patch
queue-3.8/vfs-don-t-bug_on-if-following-a-proc-fd-pseudo-symlink.patch
queue-3.8/ipc-fix-potential-oops-when-src-msg-4k-w-msg_copy.patch
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to