<feed xmlns='http://www.w3.org/2005/Atom'>
<title>pm24.git/include/linux/sunrpc, branch v2.6.15</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://git.kobert.dev/pm24.git/atom?h=v2.6.15</id>
<link rel='self' href='https://git.kobert.dev/pm24.git/atom?h=v2.6.15'/>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/'/>
<updated>2005-11-07T15:53:48Z</updated>
<entry>
<title>[PATCH] knfsd: Fix some minor sign problems in nfsd/xdr</title>
<updated>2005-11-07T15:53:48Z</updated>
<author>
<name>NeilBrown</name>
<email>neilb@cse.unsw.edu.au</email>
</author>
<published>2005-11-07T09:00:26Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=0ba7536d5d47e4ecf2259a80b207158dc4e711eb'/>
<id>urn:sha1:0ba7536d5d47e4ecf2259a80b207158dc4e711eb</id>
<content type='text'>
There are a couple of tests which could possibly be confused by extremely
large numbers appearing in 'xdr' packets.  I think the closest to an exploit
you could get would be writing random data from a free page into a file - i.e.
 leak data out of kernel space.

I'm fairly sure they cannot be used for remote compromise.

Signed-off-by: Neil Brown &lt;neilb@suse.de&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>RPCSEC_GSS: krb5 cleanup</title>
<updated>2005-10-19T06:19:47Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:55:23Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=a0857d03b21fa54653c9d2fe7a315381176015b4'/>
<id>urn:sha1:a0857d03b21fa54653c9d2fe7a315381176015b4</id>
<content type='text'>
 Remove some senseless wrappers.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>RPCSEC_GSS remove all qop parameters</title>
<updated>2005-10-19T06:19:47Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:55:18Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=00fd6e14255fe7a249315746386d640bc4e9e758'/>
<id>urn:sha1:00fd6e14255fe7a249315746386d640bc4e9e758</id>
<content type='text'>
 Not only are the qop parameters that are passed around throughout the gssapi
 unused by any currently implemented mechanism, but there appears to be some
 doubt as to whether they will ever be used.  Let's just kill them off for now.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>RPCSEC_GSS: Add support for privacy to krb5 rpcsec_gss mechanism.</title>
<updated>2005-10-19T06:19:46Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:55:13Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=14ae162c24d985593d5b19437d7f3d8fd0062b59'/>
<id>urn:sha1:14ae162c24d985593d5b19437d7f3d8fd0062b59</id>
<content type='text'>
 Add support for privacy to the krb5 rpcsec_gss mechanism.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>RPCSEC_GSS: krb5 pre-privacy cleanup</title>
<updated>2005-10-19T06:19:45Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:55:08Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=bfa91516b57483fc9c81d8d90325fd2c3c16ac48'/>
<id>urn:sha1:bfa91516b57483fc9c81d8d90325fd2c3c16ac48</id>
<content type='text'>
 The code this was originally derived from processed wrap and mic tokens using
 the same functions.  This required some contortions, and more would be required
 with the addition of xdr_buf's, so it's better to separate out the two code
 paths.

 In preparation for adding privacy support, remove the last vestiges of the
 old wrap token code.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>RPCSEC_GSS: cleanup au_rslack calculation</title>
<updated>2005-10-19T06:19:44Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:54:53Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=24b2605becc10ca63c4c30808fa59a8abbf68727'/>
<id>urn:sha1:24b2605becc10ca63c4c30808fa59a8abbf68727</id>
<content type='text'>
 Various xdr encode routines use au_rslack to guess where the reply argument
 will end up, so we can set up the xdr_buf to recieve data into the right place
 for zero copy.

 Currently we calculate the au_rslack estimate when we check the verifier.
 Normally this only depends on the verifier size.  In the integrity case we add
 a few bytes to allow for a length and sequence number.

 It's a bit simpler to calculate only the verifier size when we check the
 verifier, and delay the full calculation till we unwrap.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>SUNRPC: Provide a callback to allow free pages allocated during xdr encoding</title>
<updated>2005-10-19T06:19:43Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:54:43Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=ead5e1c26fdcd969cf40c49cb0589d56879d240d'/>
<id>urn:sha1:ead5e1c26fdcd969cf40c49cb0589d56879d240d</id>
<content type='text'>
 For privacy, we need to allocate pages to store the encrypted data (passed
 in pages can't be used without the risk of corrupting data in the page cache).
 So we need a way to free that memory after the request has been transmitted.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>SUNRPC: Add support for privacy to generic gss-api code.</title>
<updated>2005-10-19T06:19:42Z</updated>
<author>
<name>J. Bruce Fields</name>
<email>bfields@fieldses.org</email>
</author>
<published>2005-10-13T20:54:37Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=293f1eb551a77fe5c8956a559a3c0baea95cd9bc'/>
<id>urn:sha1:293f1eb551a77fe5c8956a559a3c0baea95cd9bc</id>
<content type='text'>
 Add support for privacy to generic gss-api code.  This is dead code until we
 have both a mechanism that supports privacy and code in the client or server
 that uses it.

 Signed-off-by: J. Bruce Fields &lt;bfields@citi.umich.edu&gt;
 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>RPC: allow call_encode() to delay transmission of an RPC call.</title>
<updated>2005-10-18T21:20:11Z</updated>
<author>
<name>Trond Myklebust</name>
<email>Trond.Myklebust@netapp.com</email>
</author>
<published>2005-10-18T21:20:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=5e5ce5be6f0161d2a069a4f8a1154fe639c5c02f'/>
<id>urn:sha1:5e5ce5be6f0161d2a069a4f8a1154fe639c5c02f</id>
<content type='text'>
 Currently, call_encode will cause the entire RPC call to abort if it returns
 an error. This is unnecessarily rigid, and gets in the way of attempts
 to allow the NFSv4 layer to order RPC calls that carry sequence ids.

 Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
</content>
</entry>
<entry>
<title>Revert "[PATCH] RPC,NFS: new rpc_pipefs patch"</title>
<updated>2005-09-23T16:39:00Z</updated>
<author>
<name>Trond Myklebust</name>
<email>Trond.Myklebust@netapp.com</email>
</author>
<published>2005-09-23T15:08:25Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=f134585a7343d71f9be7f0cf97e2145f21dd10c6'/>
<id>urn:sha1:f134585a7343d71f9be7f0cf97e2145f21dd10c6</id>
<content type='text'>
This reverts 17f4e6febca160a9f9dd4bdece9784577a2f4524 commit.
</content>
</entry>
</feed>
