Skip to content
Snippets Groups Projects
  1. Nov 13, 2007
  2. Nov 12, 2007
    • J. Bruce Fields's avatar
      nfsd4: recheck for secure ports in fh_verify · 6fa02839
      J. Bruce Fields authored
      
      As with commit 7fc90ec9 ("knfsd: nfsd:
      call nfsd_setuser() on fh_compose(), fix nfsd4 permissions problem")
      this is a case where we need to redo a security check in fh_verify()
      even though the filehandle already has an associated dentry--if the
      filehandle was created by fh_compose() in an earlier operation of the
      nfsv4 compound, then we may not have done these checks yet.
      
      Without this fix it is possible, for example, to traverse from an export
      without the secure ports requirement to one with it in a single
      compound, and bypass the secure port check on the new export.
      
      While we're here, fix up some minor style problems and change a printk()
      to a dprintk(), to make it harder for random unprivileged users to spam
      the logs.
      
      Signed-off-by: default avatarJ. Bruce Fields <bfields@citi.umich.edu>
      Reviewed-By: default avatarNeilBrown <neilb@suse.de>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      6fa02839
    • J. Bruce Fields's avatar
      knfsd: fix spurious EINVAL errors on first access of new filesystem · ac8587dc
      J. Bruce Fields authored
      
      The v2/v3 acl code in nfsd is translating any return from fh_verify() to
      nfserr_inval.  This is particularly unfortunate in the case of an
      nfserr_dropit return, which is an internal error meant to indicate to
      callers that this request has been deferred and should just be dropped
      pending the results of an upcall to mountd.
      
      Thanks to Roland <devzero@web.de> for bug report and data collection.
      
      Cc: Roland <devzero@web.de>
      Acked-by: default avatarAndreas Gruenbacher <agruen@suse.de>
      Signed-off-by: default avatarJ. Bruce Fields <bfields@citi.umich.edu>
      Reviewed-By: default avatarNeilBrown <neilb@suse.de>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      ac8587dc
    • Roland McGrath's avatar
      core dump: remain dumpable · 00ec99da
      Roland McGrath authored
      
      The coredump code always calls set_dumpable(0) when it starts (even
      if RLIMIT_CORE prevents any core from being dumped).  The effect of
      this (via task_dumpable) is to make /proc/pid/* files owned by root
      instead of the user, so the user can no longer examine his own
      process--in a case where there was never any privileged data to
      protect.  This affects e.g. auxv, environ, fd; in Fedora (execshield)
      kernels, also maps.  In practice, you can only notice this when a
      debugger has requested PTRACE_EVENT_EXIT tracing.
      
      set_dumpable was only used in do_coredump for synchronization and not
      intended for any security purpose.  (It doesn't secure anything that wasn't
      already unsecured when a process dies by SIGTERM instead of SIGQUIT.)
      
      This changes do_coredump to check the core_waiters count as the means of
      synchronization, which is sufficient.  Now we leave the "dumpable" bits alone.
      
      Signed-off-by: default avatarRoland McGrath <roland@redhat.com>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      00ec99da
  3. Nov 10, 2007
    • Jeff Layton's avatar
      [CIFS] fix oops on second mount to same server when null auth is used · 9b8f5f57
      Jeff Layton authored
      
      When a share is mounted using no username, cifs_mount sets
      volume_info.username as a NULL pointer, and the sesInfo userName as an
      empty string. The volume_info.username is passed to a couple of other
      functions to see if there is an existing unc or tcp connection that can
      be used. These functions assume that the username will be a valid
      string that can be passed to strncmp. If the pointer is NULL, then the
      kernel will oops if there's an existing session to which the string
      can be compared.
      
      This patch changes cifs_mount to set volume_info.username to an empty
      string in this situation, which prevents the oops and should make it
      so that the comparison to other null auth sessions match.
      
      Signed-off-by: default avatarJeff Layton <jlayton@redhat.com>
      Signed-off-by: default avatarSteve French <sfrench@us.ibm.com>
      9b8f5f57
  4. Nov 09, 2007
    • Steve French's avatar
      [CIFS] Fix stale mode after readdir when cifsacl specified · a6f8de3d
      Steve French authored
      
      When mounted with cifsacl mount option, readdir can not
      instantiate the inode with the estimated mode based on the ACL
      for each file since we have not queried for the ACL for
      each of these files yet.  So set the refresh time to zero
      for these inodes so that the next stat will cause the client
      to go to the server for the ACL info so we can build the estimated
      mode (this means we also will issue an extra QueryPathInfo if
      the stat happens within 1 second, but this is trivial compared to
      the time required to open/getacl/close for each).
      
      ls -l is slower when cifsacl mount option is specified, but
      displays correct mode information.
      
      Signed-off-by: default avatarShirish Pargaonkar <shirishp@us.ibm.com>
      Signed-off-by: default avatarSteve French <sfrench@us.ibm.com>
      a6f8de3d
  5. Nov 08, 2007
  6. Nov 07, 2007
  7. Nov 06, 2007
  8. Nov 05, 2007
  9. Nov 03, 2007
  10. Nov 02, 2007
  11. Nov 01, 2007
  12. Oct 31, 2007
  13. Oct 30, 2007
Loading