1. 04 4月, 2016 1 次提交
  2. 27 1月, 2016 1 次提交
  3. 25 11月, 2014 1 次提交
  4. 26 4月, 2013 1 次提交
  5. 30 3月, 2013 3 次提交
    • C
      SUNRPC: Consider qop when looking up pseudoflavors · 83523d08
      Chuck Lever 提交于
      The NFSv4 SECINFO operation returns a list of security flavors that
      the server supports for a particular share.  An NFSv4 client is
      supposed to pick a pseudoflavor it supports that corresponds to one
      of the flavors returned by the server.
      
      GSS flavors in this list have a GSS tuple that identify a specific
      GSS pseudoflavor.
      
      Currently our client ignores the GSS tuple's "qop" value.  A
      matching pseudoflavor is chosen based only on the OID and service
      value.
      
      So far this omission has not had much effect on Linux.  The NFSv4
      protocol currently supports only one qop value: GSS_C_QOP_DEFAULT,
      also known as zero.
      
      However, if an NFSv4 server happens to return something other than
      zero in the qop field, our client won't notice.  This could cause
      the client to behave in incorrect ways that could have security
      implications.
      Signed-off-by: NChuck Lever <chuck.lever@oracle.com>
      Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
      83523d08
    • C
      SUNRPC: Load GSS kernel module by OID · f783288f
      Chuck Lever 提交于
      The current GSS mech switch can find and load GSS pseudoflavor
      modules by name ("krb5") or pseudoflavor number ("390003"), but
      cannot find GSS modules by GSS tuple:
      
        [ "1.2.840.113554.1.2.2", GSS_C_QOP_DEFAULT, RPC_GSS_SVC_NONE ]
      
      This is important when dealing with a SECINFO request.  A SECINFO
      reply contains a list of flavors the server supports for the
      requested export, but GSS flavors also have a GSS tuple that maps
      to a pseudoflavor (like 390003 for krb5).
      
      If the GSS module that supports the OID in the tuple is not loaded,
      our client is not able to load that module dynamically to support
      that pseudoflavor.
      
      Add a way for the GSS mech switch to load GSS pseudoflavor support
      by OID before searching for the pseudoflavor that matches the OID
      and service.
      Signed-off-by: NChuck Lever <chuck.lever@oracle.com>
      Cc: David Howells <dhowells@redhat.com>
      Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
      f783288f
    • C
      SUNRPC: Define rpcsec_gss_info structure · fb15b26f
      Chuck Lever 提交于
      The NFSv4 SECINFO procedure returns a list of security flavors.  Any
      GSS flavor also has a GSS tuple containing an OID, a quality-of-
      protection value, and a service value, which specifies a particular
      GSS pseudoflavor.
      
      For simplicity and efficiency, I'd like to return each GSS tuple
      from the NFSv4 SECINFO XDR decoder and pass it straight into the RPC
      client.
      
      Define a data structure that is visible to both the NFS client and
      the RPC client.  Take structure and field names from the relevant
      standards to avoid confusion.
      Signed-off-by: NChuck Lever <chuck.lever@oracle.com>
      Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
      fb15b26f
  6. 16 4月, 2012 1 次提交
  7. 12 3月, 2012 1 次提交
    • T
      SUNRPC: Fix a few sparse warnings · 09acfea5
      Trond Myklebust 提交于
      net/sunrpc/svcsock.c:412:22: warning: incorrect type in assignment
      (different address spaces)
       - svc_partial_recvfrom now takes a struct kvec, so the variable
         save_iovbase needs to be an ordinary (void *)
      
      Make a bunch of variables in net/sunrpc/xprtsock.c static
      
      Fix a couple of "warning: symbol 'foo' was not declared. Should it be
      static?" reports.
      
      Fix a couple of conflicting function declarations.
      Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
      09acfea5
  8. 16 7月, 2011 1 次提交
  9. 07 6月, 2011 1 次提交
  10. 07 4月, 2011 1 次提交
    • T
      Revert "net/sunrpc: Use static const char arrays" · 0867659f
      Trond Myklebust 提交于
      This reverts commit 411b5e05.
      
      Olga Kornievskaia reports:
      
      Problem: linux client mounting linux server using rc4-hmac-md5
      enctype. gssd fails with create a context after receiving a reply from
      the server.
      
      Diagnose: putting printout statements in the server kernel and
      kerberos libraries revealed that client and server derived different
      integrity keys.
      
      Server kernel code was at fault due the the commit
      
      [aglo@skydive linux-pnfs]$ git show 411b5e05
      
      Trond: The problem is that since it relies on virt_to_page(), you cannot
      call sg_set_buf() for data in the const section.
      Reported-by: NOlga Kornievskaia <aglo@citi.umich.edu>
      Signed-off-by: NTrond Myklebust <Trond.Myklebust@netapp.com>
      Cc: stable@kernel.org	[2.6.36+]
      0867659f
  11. 12 3月, 2011 1 次提交
  12. 08 3月, 2011 1 次提交
  13. 26 10月, 2010 1 次提交
  14. 13 9月, 2010 1 次提交
  15. 15 5月, 2010 16 次提交
  16. 19 12月, 2009 1 次提交
  17. 10 7月, 2008 1 次提交
  18. 18 11月, 2007 1 次提交
  19. 18 7月, 2007 1 次提交
  20. 11 7月, 2007 1 次提交
  21. 04 2月, 2007 1 次提交
  22. 06 12月, 2006 2 次提交