Searched hist:"52 ee04330f585d1b5bc40442f07df07248fa3aee" (Results 1 – 5 of 5) sorted by relevance
/openbmc/linux/fs/nfsd/ |
H A D | vfs.h | diff 52ee04330f585d1b5bc40442f07df07248fa3aee Fri Jun 20 10:52:21 CDT 2014 J. Bruce Fields <bfields@redhat.com> nfsd: let nfsd_symlink assume null-terminated data
Currently nfsd_symlink has a weird hack to serve callers who don't null-terminate symlink data: it looks ahead at the next byte to see if it's zero, and copies it to a new buffer to null-terminate if not.
That means callers don't have to null-terminate, but they *do* have to ensure that the byte following the end of the data is theirs to read.
That's a bit subtle, and the NFSv4 code actually got this wrong.
So let's just throw out that code and let callers pass null-terminated strings; we've already fixed them to do that.
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
|
H A D | nfsproc.c | diff 52ee04330f585d1b5bc40442f07df07248fa3aee Fri Jun 20 10:52:21 CDT 2014 J. Bruce Fields <bfields@redhat.com> nfsd: let nfsd_symlink assume null-terminated data
Currently nfsd_symlink has a weird hack to serve callers who don't null-terminate symlink data: it looks ahead at the next byte to see if it's zero, and copies it to a new buffer to null-terminate if not.
That means callers don't have to null-terminate, but they *do* have to ensure that the byte following the end of the data is theirs to read.
That's a bit subtle, and the NFSv4 code actually got this wrong.
So let's just throw out that code and let callers pass null-terminated strings; we've already fixed them to do that.
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
|
H A D | nfs3proc.c | diff 52ee04330f585d1b5bc40442f07df07248fa3aee Fri Jun 20 10:52:21 CDT 2014 J. Bruce Fields <bfields@redhat.com> nfsd: let nfsd_symlink assume null-terminated data
Currently nfsd_symlink has a weird hack to serve callers who don't null-terminate symlink data: it looks ahead at the next byte to see if it's zero, and copies it to a new buffer to null-terminate if not.
That means callers don't have to null-terminate, but they *do* have to ensure that the byte following the end of the data is theirs to read.
That's a bit subtle, and the NFSv4 code actually got this wrong.
So let's just throw out that code and let callers pass null-terminated strings; we've already fixed them to do that.
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
|
H A D | nfs4proc.c | diff 52ee04330f585d1b5bc40442f07df07248fa3aee Fri Jun 20 10:52:21 CDT 2014 J. Bruce Fields <bfields@redhat.com> nfsd: let nfsd_symlink assume null-terminated data
Currently nfsd_symlink has a weird hack to serve callers who don't null-terminate symlink data: it looks ahead at the next byte to see if it's zero, and copies it to a new buffer to null-terminate if not.
That means callers don't have to null-terminate, but they *do* have to ensure that the byte following the end of the data is theirs to read.
That's a bit subtle, and the NFSv4 code actually got this wrong.
So let's just throw out that code and let callers pass null-terminated strings; we've already fixed them to do that.
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
|
H A D | vfs.c | diff 52ee04330f585d1b5bc40442f07df07248fa3aee Fri Jun 20 10:52:21 CDT 2014 J. Bruce Fields <bfields@redhat.com> nfsd: let nfsd_symlink assume null-terminated data
Currently nfsd_symlink has a weird hack to serve callers who don't null-terminate symlink data: it looks ahead at the next byte to see if it's zero, and copies it to a new buffer to null-terminate if not.
That means callers don't have to null-terminate, but they *do* have to ensure that the byte following the end of the data is theirs to read.
That's a bit subtle, and the NFSv4 code actually got this wrong.
So let's just throw out that code and let callers pass null-terminated strings; we've already fixed them to do that.
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
|