<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src-test2/sys/nfsserver, branch releng/5.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src-test2/atom?h=releng%2F5.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/'/>
<updated>2002-12-05T16:58:11Z</updated>
<entry>
<title>In the NFSv3 `fsinfo' procedure reply, don't claim that we support</title>
<updated>2002-12-05T16:58:11Z</updated>
<author>
<name>Ian Dowse</name>
<email>iedowse@FreeBSD.org</email>
</author>
<published>2002-12-05T16:58:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=2f07688e8216d6fbff570ee8a083459765a77e12'/>
<id>urn:sha1:2f07688e8216d6fbff570ee8a083459765a77e12</id>
<content type='text'>
32k read and write operations on datagram sockets when in fact we
reject requests larger than 16k. It must be the case that virtually
all clients use data sizes of 16k or less for UDP transport (FreeBSD's
client defaults to 8k and never exceeds 16k), as this bug has been
present ever since NFSv3 support was added.

Reported by:	Senthil &lt;lihtnes78@netscape.net&gt;
Reviewed by:	dillon
Approved by:	re
MFC-after:	1 week
</content>
</entry>
<entry>
<title>Permit MAC policies to instrument the access control decisions for</title>
<updated>2002-11-04T15:13:36Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2002-11-04T15:13:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=e5e820fd1f9a5d788798072f1d2a60f7cc798f70'/>
<id>urn:sha1:e5e820fd1f9a5d788798072f1d2a60f7cc798f70</id>
<content type='text'>
system accounting configuration and for nfsd server thread attach.
Policies might use this to protect the integrity or confidentiality
of accounting data, limit the ability to turn on or off accounting,
as well as to prevent inappropriately labeled threads from becoming nfs
server threads.

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title> - Introduce a new macro, since that's what nfs loves, called</title>
<updated>2002-10-31T22:35:03Z</updated>
<author>
<name>Jeff Roberson</name>
<email>jeff@FreeBSD.org</email>
</author>
<published>2002-10-31T22:35:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=24b50116ed85e7e1e7da0e22db99ebc425c19d12'/>
<id>urn:sha1:24b50116ed85e7e1e7da0e22db99ebc425c19d12</id>
<content type='text'>
   nfsm_srvpathsiz.  This macro plucks a length out of an rpc request and
   verifies that its size does not exceed NFS_MAXPATHLEN.  If it does
   it generates an ENAMETOOLONG response.
 - Use this macro, and the existing nfsm_srvnamsiz macro in two places
   where we deal with paths passed in by the client.

This fixes a linux interoperability bug.  Linux was sending oversized path
components which would cause us to ignore the request all together.  This
causes linux to hang indefinitly while it waits for a response.  This
could still happen in other cases where we error out with EBADRPC.

Sponsored by:	Isilon Systems, Inc.
Reviewed by:	alfred, fabbri@isilon.com, neal@isilon.com
</content>
</entry>
<entry>
<title>Set the NOMACCHECK flag for namei()'s generated by the NFS server code.</title>
<updated>2002-10-19T21:27:40Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2002-10-19T21:27:40Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=94998f80fe7f08b817644f95639f0cd530e403a9'/>
<id>urn:sha1:94998f80fe7f08b817644f95639f0cd530e403a9</id>
<content type='text'>
We currently don't enforce protections on NFS-originated VOP's.

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
</content>
</entry>
<entry>
<title>Correct a problem wherein NFS servers running NFSv2 would not return</title>
<updated>2002-10-03T21:50:37Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2002-10-03T21:50:37Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=60cfb7c64a4b3f4d41431819519d8efbc708b345'/>
<id>urn:sha1:60cfb7c64a4b3f4d41431819519d8efbc708b345</id>
<content type='text'>
certain classes of failure responses to the client during a failed
remove operation.

Submitted by:	Ian Dowse &lt;iedowse@maths.tcd.ie&gt;
</content>
</entry>
<entry>
<title> - Use incore() instead of gbincore() so we don't have to acquire the</title>
<updated>2002-09-25T02:39:39Z</updated>
<author>
<name>Jeff Roberson</name>
<email>jeff@FreeBSD.org</email>
</author>
<published>2002-09-25T02:39:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=d3b85e1c8b39cc3a629e386a7d342a90667c4e9d'/>
<id>urn:sha1:d3b85e1c8b39cc3a629e386a7d342a90667c4e9d</id>
<content type='text'>
   vnode interlock.
</content>
</entry>
<entry>
<title>Use m_length() instead of home-rolled versions.</title>
<updated>2002-09-18T19:44:14Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2002-09-18T19:44:14Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=7ed60de837dd3ba6d41120d9f469c5635281ae94'/>
<id>urn:sha1:7ed60de837dd3ba6d41120d9f469c5635281ae94</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Make the V2 errno translation more resistent to new errnos.</title>
<updated>2002-08-21T19:28:44Z</updated>
<author>
<name>Poul-Henning Kamp</name>
<email>phk@FreeBSD.org</email>
</author>
<published>2002-08-21T19:28:44Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=f5cd3d67fe0c5ed47e8945d7dfb0874c6de02e83'/>
<id>urn:sha1:f5cd3d67fe0c5ed47e8945d7dfb0874c6de02e83</id>
<content type='text'>
</content>
</entry>
<entry>
<title> - Replace v_flag with v_iflag and v_vflag</title>
<updated>2002-08-04T10:29:36Z</updated>
<author>
<name>Jeff Roberson</name>
<email>jeff@FreeBSD.org</email>
</author>
<published>2002-08-04T10:29:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=e6e370a7fe930e04cec38bcc2e06be127ed7ee02'/>
<id>urn:sha1:e6e370a7fe930e04cec38bcc2e06be127ed7ee02</id>
<content type='text'>
 - v_vflag is protected by the vnode lock and is used when synchronization
   with VOP calls is needed.
 - v_iflag is protected by interlock and is used for dealing with vnode
   management issues.  These flags include X/O LOCK, FREE, DOOMED, etc.
 - All accesses to v_iflag and v_vflag have either been locked or marked with
   mp_fixme's.
 - Many ASSERT_VOP_LOCKED calls have been added where the locking was not
   clear.
 - Many functions in vfs_subr.c were restructured to provide for stronger
   locking.

Idea stolen from:	BSD/OS
</content>
</entry>
<entry>
<title>Oops, another unused arg to nfssvc_nfsd().  *blush*</title>
<updated>2002-07-24T23:10:34Z</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>2002-07-24T23:10:34Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src-test2/commit/?id=c86e55f6f0b414743fb39156931985f4d01f0880'/>
<id>urn:sha1:c86e55f6f0b414743fb39156931985f4d01f0880</id>
<content type='text'>
Submitted by:	jake
</content>
</entry>
</feed>
