Bug 176929 - NPTL: File's st_ctime and st_mtime are not updated when mmap'ed memory is changed.
Summary: NPTL: File's st_ctime and st_mtime are not updated when mmap'ed memory is cha...
Status: CLOSED DUPLICATE of bug 173226
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: kernel
Version: 4.0
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
: ---
Assignee: Kernel Maintainer List
QA Contact: Brian Brock
URL: http://nptl.bullopensource.org/Tests/...
Whiteboard:
Keywords:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-01-04 15:05 UTC by Tony Reix
Modified: 2007-11-30 22:07 UTC (History)
0 users

(edit)
Clone Of:
(edit)
Last Closed: 2006-01-17 18:53:02 UTC


Attachments (Terms of Use)

Description Tony Reix 2006-01-04 15:05:25 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; fr; rv:1.7.8) Gecko/20050524 Fedora/1.0.4-4 Firefox/1.0.4

Description of problem:
OPTS test:
mmap/14-1.c
This test checks that the st_mtime and st_ctime fields of a file are updated when the file is mmap'ed and the corresponding memory is changed.

Details are available at:
http://nptl.bullopensource.org/Tests/results/report.php
Browse: (TC2) 2xi686HT - RHAS4u2 Run 1,2,3

See:
http://nptl.bullopensource.org/Tests/results/detailed.php?run_id=10&testcase_id=3435

Version-Release number of selected component (if applicable):
Unmodified RHEL4u2

How reproducible:
Always

Steps to Reproduce:
Use OPTS.
(Used version was:  OPTS cvs repository on Nov 14, 2005)

Actual Results:  See:
http://nptl.bullopensource.org/Tests/results/detailed.php?run_id=10&testcase_id=3435

Additional info:

Comment 1 Tony Reix 2006-01-04 16:00:12 UTC
Use the 3 (correct !) URLS:

http://nptl.bullopensource.org/Tests/TC2/report.php#problems

http://nptl.bullopensource.org/Tests/results/run-browse.php
     Click the "Browse" button of : (TC2) 2xi686HT - RHAS4u2 Run 3
     You can also select 2 runs and click the "Compare Selected" button.


Comment 2 Jason Baron 2006-01-17 18:53:02 UTC
agreed, this is violation of the spec. We already have this open as bz #173226.

*** This bug has been marked as a duplicate of 173226 ***


Note You need to log in before you can comment on or make changes to this bug.