Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
E
etercifs
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
etersoft
etercifs
Commits
11b13a28
Commit
11b13a28
authored
May 12, 2011
by
Pavel Shilovsky
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Bugfixes for 2.6.32
Fix memory over bound bug in cifs_parse_mount_options + stable updates
parent
2f8b9a12
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
10 additions
and
9 deletions
+10
-9
connect.c
sources/2.6.32/connect.c
+4
-3
inode.c
sources/2.6.32/inode.c
+6
-6
No files found.
sources/2.6.32/connect.c
View file @
11b13a28
...
...
@@ -801,8 +801,7 @@ static int
cifs_parse_mount_options
(
char
*
options
,
const
char
*
devname
,
struct
smb_vol
*
vol
)
{
char
*
value
;
char
*
data
;
char
*
value
,
*
data
,
*
end
;
unsigned
int
temp_len
,
i
,
j
;
char
separator
[
2
];
short
int
override_uid
=
-
1
;
...
...
@@ -845,6 +844,7 @@ cifs_parse_mount_options(char *options, const char *devname,
if
(
!
options
)
return
1
;
end
=
options
+
strlen
(
options
);
if
(
strncmp
(
options
,
"sep="
,
4
)
==
0
)
{
if
(
options
[
4
]
!=
0
)
{
separator
[
0
]
=
options
[
4
];
...
...
@@ -909,6 +909,7 @@ cifs_parse_mount_options(char *options, const char *devname,
the only illegal character in a password is null */
if
((
value
[
temp_len
]
==
0
)
&&
(
value
+
temp_len
<
end
)
&&
(
value
[
temp_len
+
1
]
==
separator
[
0
]))
{
/* reinsert comma */
value
[
temp_len
]
=
separator
[
0
];
...
...
@@ -2523,7 +2524,7 @@ try_mount_again:
remote_path_check:
/* check if a whole path (including prepath) is not remote */
if
(
!
rc
&&
cifs_sb
->
prepathlen
&&
tcon
)
{
if
(
!
rc
&&
tcon
)
{
/* build_path_to_root works only when we have a valid tcon */
full_path
=
cifs_build_path_to_root
(
cifs_sb
);
if
(
full_path
==
NULL
)
{
...
...
sources/2.6.32/inode.c
View file @
11b13a28
...
...
@@ -692,8 +692,10 @@ struct inode *cifs_root_iget(struct super_block *sb, unsigned long ino)
rc
=
cifs_get_inode_info
(
&
inode
,
full_path
,
NULL
,
sb
,
xid
,
NULL
);
if
(
!
inode
)
return
ERR_PTR
(
-
ENOMEM
);
if
(
!
inode
)
{
inode
=
ERR_PTR
(
rc
);
goto
out
;
}
if
(
rc
&&
cifs_sb
->
tcon
->
ipc
)
{
cFYI
(
1
,
(
"ipc connection - fake read inode"
));
...
...
@@ -704,13 +706,11 @@ struct inode *cifs_root_iget(struct super_block *sb, unsigned long ino)
inode
->
i_uid
=
cifs_sb
->
mnt_uid
;
inode
->
i_gid
=
cifs_sb
->
mnt_gid
;
}
else
if
(
rc
)
{
kfree
(
full_path
);
_FreeXid
(
xid
);
iget_failed
(
inode
);
return
ERR_PTR
(
rc
);
inode
=
ERR_PTR
(
rc
);
}
out:
kfree
(
full_path
);
/* can not call macro FreeXid here since in a void func
* TODO: This is no longer true
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment