1. 04 3月, 2010 1 次提交
  2. 20 2月, 2010 1 次提交
  3. 09 2月, 2010 1 次提交
    • J
      Revert "nfsd4: fix error return when pseudoroot missing" · 260c64d2
      J. Bruce Fields 提交于
      Commit f39bde24 fixed the error return from PUTROOTFH in the
      case where there is no pseudofilesystem.
      
      This is really a case we shouldn't hit on a correctly configured server:
      in the absence of a root filehandle, there's no point accepting version
      4 NFS rpc calls at all.
      
      But the shared responsibility between kernel and userspace here means
      the kernel on its own can't eliminate the possiblity of this happening.
      And we have indeed gotten this wrong in distro's, so new client-side
      mount code that attempts to negotiate v4 by default first has to work
      around this case.
      
      Therefore when commit f39bde24 arrived at roughly the same
      time as the new v4-default mount code, which explicitly checked only for
      the previous error, the result was previously fine mounts suddenly
      failing.
      
      We'll fix both sides for now: revert the error change, and make the
      client-side mount workaround more robust.
      Signed-off-by: NJ. Bruce Fields <bfields@citi.umich.edu>
      260c64d2
  4. 07 2月, 2010 3 次提交
  5. 07 1月, 2010 1 次提交
  6. 21 12月, 2009 1 次提交
  7. 20 12月, 2009 1 次提交
  8. 17 12月, 2009 2 次提交
  9. 16 12月, 2009 9 次提交
  10. 15 12月, 2009 5 次提交
  11. 26 11月, 2009 1 次提交
    • J
      nfsd: simplify fh_verify access checks · 864f0f61
      J. Bruce Fields 提交于
      All nfsd security depends on the security checks in fh_verify, and
      especially on nfsd_setuser().
      
      It therefore bothers me that the nfsd_setuser call may be made from
      three different places, depending on whether the filehandle has already
      been mapped to a dentry, and on whether subtreechecking is in force.
      
      Instead, make an unconditional call in fh_verify(), so it's trivial to
      verify that the call always occurs.
      
      That leaves us with a redundant nfsd_setuser() call in the subtreecheck
      case--it needs the correct user set earlier in order to check execute
      permissions on the path to this filehandle--but I'm willing to accept
      that minor inefficiency in the subtreecheck case in return for more
      straightforward permission checking.
      Signed-off-by: NJ. Bruce Fields <bfields@citi.umich.edu>
      864f0f61
  12. 15 11月, 2009 1 次提交
  13. 14 11月, 2009 1 次提交
  14. 06 11月, 2009 1 次提交
  15. 05 11月, 2009 1 次提交
    • P
      nfsd: register NFS_ACL with rpcbind · 1b7e0403
      Peter Staubach 提交于
      Modify the NFS server to register the NFS_ACL services with the rpcbind
      daemon.  This allows the client to ping for the existence of the NFS_ACL
      support via commands such as "rpcinfo -t <server> nfs_acl".
      
      This patch also modifies the NFS_ACL support so that responses to
      version 2 NULLPROC requests can be made.
      
      The changelog for the patch which turned off this functionality
      mentioned something about not registering the NFS_ACL as being part of
      some tradition.  I can't find this tradition and the only other
      implementation which supports NFS_ACL does register them with the
      rpcbind daemon.
      Signed-off-by: NPeter Staubach <staubach@redhat.com>
      Signed-off-by: NJ. Bruce Fields <bfields@citi.umich.edu>
      1b7e0403
  16. 28 10月, 2009 3 次提交
  17. 02 10月, 2009 1 次提交
  18. 29 9月, 2009 4 次提交
  19. 24 9月, 2009 1 次提交
  20. 23 9月, 2009 1 次提交