1. 21 9月, 2019 2 次提交
  2. 16 9月, 2019 1 次提交
  3. 06 9月, 2019 4 次提交
  4. 29 8月, 2019 2 次提交
  5. 16 8月, 2019 1 次提交
  6. 04 8月, 2019 4 次提交
  7. 26 7月, 2019 4 次提交
  8. 14 7月, 2019 1 次提交
  9. 03 7月, 2019 1 次提交
  10. 11 6月, 2019 2 次提交
  11. 31 5月, 2019 4 次提交
  12. 26 5月, 2019 2 次提交
  13. 04 5月, 2019 1 次提交
  14. 02 5月, 2019 1 次提交
  15. 03 4月, 2019 1 次提交
  16. 24 3月, 2019 6 次提交
  17. 14 3月, 2019 1 次提交
    • Y
      nfs: Fix NULL pointer dereference of dev_name · 5c72ca3b
      Yao Liu 提交于
      [ Upstream commit 80ff00172407e0aad4b10b94ef0816fc3e7813cb ]
      
      There is a NULL pointer dereference of dev_name in nfs_parse_devname()
      
      The oops looks something like:
      
        BUG: unable to handle kernel NULL pointer dereference at 0000000000000000
        ...
        RIP: 0010:nfs_fs_mount+0x3b6/0xc20 [nfs]
        ...
        Call Trace:
         ? ida_alloc_range+0x34b/0x3d0
         ? nfs_clone_super+0x80/0x80 [nfs]
         ? nfs_free_parsed_mount_data+0x60/0x60 [nfs]
         mount_fs+0x52/0x170
         ? __init_waitqueue_head+0x3b/0x50
         vfs_kern_mount+0x6b/0x170
         do_mount+0x216/0xdc0
         ksys_mount+0x83/0xd0
         __x64_sys_mount+0x25/0x30
         do_syscall_64+0x65/0x220
         entry_SYSCALL_64_after_hwframe+0x49/0xbe
      
      Fix this by adding a NULL check on dev_name
      Signed-off-by: NYao Liu <yotta.liu@ucloud.cn>
      Signed-off-by: NAnna Schumaker <Anna.Schumaker@Netapp.com>
      Signed-off-by: NSasha Levin <sashal@kernel.org>
      5c72ca3b
  18. 13 2月, 2019 1 次提交
    • C
      NFS: nfs_compare_mount_options always compare auth flavors. · 8c642d71
      Chris Perl 提交于
      [ Upstream commit 594d1644cd59447f4fceb592448d5cd09eb09b5e ]
      
      This patch removes the check from nfs_compare_mount_options to see if a
      `sec' option was passed for the current mount before comparing auth
      flavors and instead just always compares auth flavors.
      
      Consider the following scenario:
      
      You have a server with the address 192.168.1.1 and two exports /export/a
      and /export/b.  The first export supports `sys' and `krb5' security, the
      second just `sys'.
      
      Assume you start with no mounts from the server.
      
      The following results in EIOs being returned as the kernel nfs client
      incorrectly thinks it can share the underlying `struct nfs_server's:
      
      $ mkdir /tmp/{a,b}
      $ sudo mount -t nfs -o vers=3,sec=krb5 192.168.1.1:/export/a /tmp/a
      $ sudo mount -t nfs -o vers=3          192.168.1.1:/export/b /tmp/b
      $ df >/dev/null
      df: ‘/tmp/b’: Input/output error
      Signed-off-by: NChris Perl <cperl@janestreet.com>
      Signed-off-by: NAnna Schumaker <Anna.Schumaker@Netapp.com>
      Signed-off-by: NSasha Levin <sashal@kernel.org>
      8c642d71
  19. 07 2月, 2019 1 次提交