This is a note to let you know that I've just added the patch titled vfs: don't BUG_ON() if following a /proc fd pseudo-symlink to the 3.8-stable tree which can be found at: http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary The filename of the patch is: vfs-don-t-bug_on-if-following-a-proc-fd-pseudo-symlink.patch and it can be found in the queue-3.8 subdirectory. If you, or anyone else, feels it should not be added to the stable tree, please let <stable@xxxxxxxxxxxxxxx> know about it. >From 7b54c165a0c012edbaeaa73c5c87cb73721eb580 Mon Sep 17 00:00:00 2001 From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx> Date: Fri, 8 Mar 2013 09:03:07 -0800 Subject: vfs: don't BUG_ON() if following a /proc fd pseudo-symlink results in a symlink From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx> commit 7b54c165a0c012edbaeaa73c5c87cb73721eb580 upstream. It's "normal" - it can happen if the file descriptor you followed was opened with O_NOFOLLOW. Reported-by: Dave Jones <davej@xxxxxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Signed-off-by: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx> Signed-off-by: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx> --- fs/namei.c | 2 -- 1 file changed, 2 deletions(-) --- a/fs/namei.c +++ b/fs/namei.c @@ -693,8 +693,6 @@ void nd_jump_link(struct nameidata *nd, nd->path = *path; nd->inode = nd->path.dentry->d_inode; nd->flags |= LOOKUP_JUMPED; - - BUG_ON(nd->inode->i_op->follow_link); } static inline void put_link(struct nameidata *nd, struct path *link, void *cookie) Patches currently in stable-queue which might be from torvalds@xxxxxxxxxxxxxxxxxxxx are queue-3.8/ipc-don-t-allocate-a-copy-larger-than-max.patch queue-3.8/dmi_scan-fix-missing-check-for-_dmi_-signature-in-smbios_present.patch queue-3.8/vfs-don-t-bug_on-if-following-a-proc-fd-pseudo-symlink.patch queue-3.8/ipc-fix-potential-oops-when-src-msg-4k-w-msg_copy.patch -- To unsubscribe from this list: send the line "unsubscribe stable" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html