This bug was fixed in the package linux - 2.6.32-40.87
---
linux (2.6.32-40.87) lucid-proposed; urgency=low
[Herton R. Krzesinski]
* Release Tracking Bug
- LP: #947375
[ Upstream Kernel Changes ]
* IB/mlx4: pass SMP vendor-specific attribute MADs to firmware
- LP:
Tested and verified working for Lucid -proposed i386 2.6.32-40.87
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/719691
Title:
ecryptfs returns EINVAL rather than EISDIR on read() on directory
To
The commit for this issue in Lucid is an early application of a commit
that will be coming in via upstream stable (2.6.32.58). As such it is
not subject to the standard bug verification process.
** Tags added: verification-done-lucid
** Changed in: linux (Ubuntu Lucid)
Assignee:
** Branch linked: lp:ubuntu/lucid-proposed/linux-ec2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/719691
Title:
ecryptfs returns EINVAL rather than EISDIR on read() on directory
To manage
SRU Justification:
Impact: Read on an ecryptfs directory should return EISDIR if not
supported however currently EINVAL is being returned rather than
EISDIR.
Fix: With this patch a .read operation for ecryptfs directories is
connected up to generic_read_dir() which then performs the correct
** Also affects: linux (Ubuntu Lucid)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Lucid)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Linus released this fix in 2.6.38-rc6. Thanks Andy!
** Also affects: ecryptfs
Importance: Undecided
Status: New
** Changed in: ecryptfs
Status: New = Fix Released
** Changed in: ecryptfs
Assignee: (unassigned) = Tyler Hicks (tyhicks)
--
You received this bug notification
Tested the x86_64 kernel on a Lucid box (unfortunately, didn't have
access to the Karmic box that problem was originally produced on) and
can confirm that on the stock kernel, the problem is present, and on
your patched kernel, the problem is resolved.
Sweet turnaround on that, Andy -- a patch
This bug was fixed in the package linux - 2.6.38-4.31
---
linux (2.6.38-4.31) natty; urgency=low
[ Andy Whitcroft ]
* add in bugs closed by upstream patches pulled in by rebases
* rebase to 795abaf1e4e188c4171e3cd3dbb11a9fcacaf505
* [Config] enable CONFIG_VSX to allow use of
** Description changed:
Binary package hint: linux-generic
When using ecryptfs (the filesystem used for encrypted home directories
on Ubuntu by default), attempts to read(2)/read(3) from an open()ed
directory return EINVAL, rather than EISDIR. This causes, for example,
grep to spit
** Package changed: linux-meta (Ubuntu) = linux (Ubuntu)
** Changed in: linux (Ubuntu)
Status: New = Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/719691
Title:
ecryptfs returns
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = Andy Whitcroft (apw)
** Changed in: linux (Ubuntu)
Status: Triaged = In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Confirmed that this behaviour is present. Seems that ecryptfs is not
using the common directory read. Looks to be simple to fix, will spin a
patch for testing.
** Changed in: linux (Ubuntu)
Importance: Undecided = Low
--
You received this bug notification because you are a member of Ubuntu
Ok I think this is easy to fix. I have a patch for this and applied it
to a recent Natty kernel for testing. Could you test the kernels below
and confirm they work for you. Kernels are at the URL below:
http://people.canonical.com/~apw/lp719691-natty/
Please report back here. Thanks.
--
14 matches
Mail list logo