<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/kgssapi, branch releng/11.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F11.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F11.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2016-05-03T22:05:03Z</updated>
<entry>
<title>kgssapi: insignificant spelling fix.</title>
<updated>2016-05-03T22:05:03Z</updated>
<author>
<name>Pedro F. Giffuni</name>
<email>pfg@FreeBSD.org</email>
</author>
<published>2016-05-03T22:05:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=696efc839c323ab3198b6449031e7a61663e5376'/>
<id>urn:sha1:696efc839c323ab3198b6449031e7a61663e5376</id>
<content type='text'>
No functional change.
</content>
</entry>
<entry>
<title>kgssapi: Don't leak memory in error cases</title>
<updated>2016-04-26T18:11:45Z</updated>
<author>
<name>Conrad Meyer</name>
<email>cem@FreeBSD.org</email>
</author>
<published>2016-04-26T18:11:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=be0edef16363eb4e1c92b35cd54d89ef8f695eb0'/>
<id>urn:sha1:be0edef16363eb4e1c92b35cd54d89ef8f695eb0</id>
<content type='text'>
Reported by:	Coverity
CIDs:		1007046, 1007047, 1007048
Sponsored by:	EMC / Isilon Storage Division
</content>
</entry>
<entry>
<title>sys: extend use of the howmany() macro when available.</title>
<updated>2016-04-26T15:38:17Z</updated>
<author>
<name>Pedro F. Giffuni</name>
<email>pfg@FreeBSD.org</email>
</author>
<published>2016-04-26T15:38:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=55e0987aea18d0b97fc0444c7678cbca1c7761d0'/>
<id>urn:sha1:55e0987aea18d0b97fc0444c7678cbca1c7761d0</id>
<content type='text'>
We have a howmany() macro in the &lt;sys/param.h&gt; header that is
convenient to re-use as it makes things easier to read.
</content>
</entry>
<entry>
<title>kgssapi(4): Don't allow user-provided arguments to overrun stack buffer</title>
<updated>2016-04-20T05:02:13Z</updated>
<author>
<name>Conrad Meyer</name>
<email>cem@FreeBSD.org</email>
</author>
<published>2016-04-20T05:02:13Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9d77679a40beb77abbb5c17a01d14577a3e24c59'/>
<id>urn:sha1:9d77679a40beb77abbb5c17a01d14577a3e24c59</id>
<content type='text'>
An over-long path argument to gssd_syscall could overrun the stack sockaddr_un
buffer.  Fix gssd_syscall to not permit that.

If an over-long path is provided, gssd_syscall now returns EINVAL.

It looks like PRIV_NFS_DAEMON isn't granted anywhere, so my best guess is that
this is likely only triggerable by root.

Reported by:	Coverity
CID:		1006751
Sponsored by:	EMC / Isilon Storage Division
</content>
</entry>
<entry>
<title>Cleanup unnecessary semicolons from the kernel.</title>
<updated>2016-04-10T23:07:00Z</updated>
<author>
<name>Pedro F. Giffuni</name>
<email>pfg@FreeBSD.org</email>
</author>
<published>2016-04-10T23:07:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=74b8d63dcc17c07d8cb21e13f6db517698efd49f'/>
<id>urn:sha1:74b8d63dcc17c07d8cb21e13f6db517698efd49f</id>
<content type='text'>
Found with devel/coccinelle.
</content>
</entry>
<entry>
<title>kcrypto_aes: Use separate sessions for AES and SHA1</title>
<updated>2016-02-02T00:14:51Z</updated>
<author>
<name>Conrad Meyer</name>
<email>cem@FreeBSD.org</email>
</author>
<published>2016-02-02T00:14:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=92deafc3a3a9fb9221c49e574db99571b8080a9f'/>
<id>urn:sha1:92deafc3a3a9fb9221c49e574db99571b8080a9f</id>
<content type='text'>
Some hardware supports AES acceleration but not SHA1, e.g., AES-NI
extensions.  It is useful to have accelerated AES even if SHA1 must be
software.

Suggested by:	asomers
Reviewed by:	asomers, dfr
Sponsored by:	EMC / Isilon Storage Division
Differential Revision:	https://reviews.freebsd.org/D5146
</content>
</entry>
<entry>
<title>Unset the gss kernel state when gssd exits</title>
<updated>2016-01-01T17:06:16Z</updated>
<author>
<name>Josh Paetzel</name>
<email>jpaetzel@FreeBSD.org</email>
</author>
<published>2016-01-01T17:06:16Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=21d7e927b51f507d8deb1dce3ae05b1bb19dbb04'/>
<id>urn:sha1:21d7e927b51f507d8deb1dce3ae05b1bb19dbb04</id>
<content type='text'>
When gssd exits it leaves the kernel state set by
gssd_syscall().  nfsd sees this and waits endlessly
in an unkillable state for gssd to come back.  If you
had acidentally started gssd then stopped it, then
started nfsd you'd be in a bad way until you either
restarted gssd or rebooted the system.  This change
fixes that by setting the kernel state to "" when
gssd exits.
Reviewed by:	rmacklem
MFC after:	1 week
Sponsored by:	iXsystems
</content>
</entry>
<entry>
<title>Avoid dynamic syscall overhead for statically compiled modules.</title>
<updated>2014-10-26T19:42:44Z</updated>
<author>
<name>Mateusz Guzik</name>
<email>mjg@FreeBSD.org</email>
</author>
<published>2014-10-26T19:42:44Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e015b1ab0a428e65297e44471d257d7eb589b383'/>
<id>urn:sha1:e015b1ab0a428e65297e44471d257d7eb589b383</id>
<content type='text'>
The kernel tracks syscall users so that modules can safely unregister them.

But if the module is not unloadable or was compiled into the kernel, there is
no need to do this.

Achieve this by adding SY_THR_STATIC_KLD macro which expands to SY_THR_STATIC
during kernel build and 0 otherwise.

Reviewed by:	kib (previous version)
MFC after:	2 weeks
</content>
</entry>
<entry>
<title>Add support for host-based (Kerberos 5 service principal) initiator</title>
<updated>2013-07-09T01:05:28Z</updated>
<author>
<name>Rick Macklem</name>
<email>rmacklem@FreeBSD.org</email>
</author>
<published>2013-07-09T01:05:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=88a2437a65c25b7a03a75dca3c5f9ceb648bf6c8'/>
<id>urn:sha1:88a2437a65c25b7a03a75dca3c5f9ceb648bf6c8</id>
<content type='text'>
credentials to the kernel rpc. Modify the NFSv4 client to add
support for the gssname and allgssname mount options to use this
capability. Requires the gssd daemon to be running with the "-h" option.

Reviewed by:	jhb
</content>
</entry>
<entry>
<title>Isilon reported that sec=krb5p NFS mounts had a problem when m_len == 0</title>
<updated>2013-05-01T22:07:55Z</updated>
<author>
<name>Rick Macklem</name>
<email>rmacklem@FreeBSD.org</email>
</author>
<published>2013-05-01T22:07:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=58217793a290b3de9c742e3c1ac22f14b9ccbd6f'/>
<id>urn:sha1:58217793a290b3de9c742e3c1ac22f14b9ccbd6f</id>
<content type='text'>
for the last mbuf of the list with an encrypted message. This patch replaces
the KASSERT() with code that handles this case.

Reported by:	john.gemignani@isilon.com
Reviewed by:	jhb
MFC after:	2 weeks
</content>
</entry>
</feed>
