#11125: nfs-utils-2.3.3
-------------------------+-----------------------
 Reporter:  bdubbs       |       Owner:  bdubbs
     Type:  enhancement  |      Status:  assigned
 Priority:  normal       |   Milestone:  8.4
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:
 Keywords:               |
-------------------------+-----------------------

Comment (by bdubbs):

 tcp-wrappers.m4: Only look for TCP wrappers lib when requested

     TCP wrappers is a pretty old and obsolete technology.  The
     support has be terminated in current distro release, so
     only require the library to exist when asked for via the
     --with-tcp-wrappers

     statd: fix use-after-free in monitor list if insertion fails

     If nsm_insert_monitored_host() fails while saving the record to
     stable storage, we can't just assume the entry was new. Existing
     records must be removed from the list before being freed.

     nfsd: track when the user explicitly requested version 4.0

     Since both 'rpc.nfsd -V4' and 'rpc.nfsd -V4.0' alter bit 0 in
 'minorversset'
     and 'minorvers', it's not possible to know whether the user explicitly
     requested version 4.0 or not.  Add another variable 'force4dot0' to
 track
     when the user explicitly requested version 4.0 so that we can write
 '4.0'
     to /proc/fs/nfsd/versions on kernel versions 4.11 and higher.  On
 earlier
     kernels, we'll still write '4' as in the past.

     nfsd: allow verson 4.0 to be enabled/disabled via nfs.conf

     The nfs.conf file has a 'vers4.0' parameter, but nfsd doesn't
     currently check it.

     rpc.gssd: fix typo checking "__NR_setresuid32" instead of
 "__NR_setresgid32

     rpc.gssd: truncates 32-bit UIDs/GIDs to 16 bits architectures.

     utils/gssd_proc.c uses SYS_setresuid and SYS_setresgid in
     change_identity when it should use SYS_setresuid32 and
     SYS_setresgid32 instead. This causes it to truncate
     UIDs/GIDs > 65536.

     Fixes: https://bugs.launchpad.net/ubuntu/+source/nfs-
 utils/+bug/1779962
     Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1595927

     Fixed typo in nfsmount.conf

     Revert "gssd.c: Remomved a couple of warning errors"

     Added back the 'm' character which cause memory to be
     allocated for the string convertions.

     nfsstat: fix typo causing --mounts unrecognized option

     nfs-utils: Fix minor memory leaks before return.

     nfs-utils: Spelling fixes
     Fix some typos in the nfs.conf related code

     nfs-utils: Add config setting to nfsconf cli tool

     Use the new conf_write() function to add setting and
     unsetting of config file values to the cli tool

     nfs-utils: Add config file writing function

     Adds a function to nfsconf handling to write a single config
     entry, creating the file and section headers as required.

     nfs-utils: swap xlog_err for less fatal version

     Use of xlog_err is immediately fatal, switch to using
     xlog(L_ERROR, ...) instead so that the error handling and
     cleanup mechanisms can operate properly

     nfs-utils: Fix comparison check for subsection headers

     When comparing two config section headers it incorrectly
     handled matching section names where only one had a
     subsection value

     nfs-utils: Ignore empty lines in config

     The test for empty lines didn't ignore whitespace properly

     nfsdcltrack: getopt_long() fails on a non x86_64 archs

     getopt_long() returns an int, not char, which
     matters on non-x86_64 archs since a char is
     signed on x86_64 arch but unsigned on other
     archs.

     nfs-utils: Fix a minor memory leak in generate_mount_unit and
 generate_target

     Free allocated memory for path before return.

     exports: document change to "insecure" export option

     We're changing the kernel to allow gss requests from high ports even
     when "secure" is set.

     If the change gets backported to distro kernels, the kernel version
 may
     be an imperfect predictor of the behavior, but I think it's the best
 we
     can do.

     nfs(5): update clientaddr value options

     Document the use of IPv4/IPv6_ANY address as values to the clientaddr
     as a way to tell the server that the client does not want delegations.

     Add check of clientaddr argument

     If the NFS client administrator supplies the clientaddr mount
     option, it should be either a special value of either IPv4/IPv6
     any address or one of the machine's network addresses. Otherwise,
     warn the administrator about the use of an arbitrary value for
     the clientaddr value.

     Remove a number of stringop-overflow warnings

     umich_ldap.c:1128:3: warning: 'strncat' specified bound 128
             equals destination size [-Wstringop-overflow=]

     umich_ldap.c:1130:3: warning: 'strncat' specified bound 128
             equals destination size [-Wstringop-overflow=]

     idmapd.c:313:2: warning: 'strncat' specified bound 4096
             equals destination size [-Wstringop-overflow=]

     Remove a number of stringop-truncation warnings

     client.c:486:3: warning: strncpy destination unchanged after
             copying no bytes [-Wstringop-truncation]

     file.c:99:2: warning: strncpy specified bound 4096
             equals destination size [-Wstringop-truncation]

     v4root.c:95:2: warning: strncpy specified bound 1025
             equals destination size [-Wstringop-truncation]

     sm-notify.c:572:3: warning: strncpy specified bound 1025
             equals destination size [-Wstringop-truncation]

     nfs4mount.c:221:3: warning: strncpy specified bound 1024
             equals destination size [-Wstringop-truncation]

     nfsmount.c:831:2: warning: strncpy specified bound 256
             equals destination size [-Wstringop-truncation]

     gssd.c: Remomved a couple of warning errors

     gssd.c:291:7: error: ISO C does not support the 'm' scanf flag
     [-Werror=format=]

     gssd.c:291:7: error: format '%s' expects argument of type 'char *',
 but
     argument 4 has type 'char **' [-Werror=format=]

     Removed format expects argument of type errors
     {{{
     idmapd.c: In function 'getfield':
     idmapd.c:936:4: error: format '%o' expects argument of type 'unsigned
     int *', but argument 3 has type 'int *' [-Werror=format=]
         if ((n = sscanf(bp, "\\%03o", &val)) != 1)
     }}}

     nfsidmap.c: In function 'key_invalidate':
     nfsidmap.c:322:3: error: format '%x' expects argument of type
 'unsigned
     int *', but argument 3 has type 'key_serial_t *' [-Werror=format=]
        sscanf(buf, "%x", &key);

     Removed ISO C does not support the '%m' gnu_printf format errors

     nfsstat.c: In function 'mounts':
     nfsstat.c:1016:3: error: ISO C does not support the '%m' gnu_printf
     format [-Werror=format=]
        fprintf(stderr, "Warning: %s: %m\n", name);
        ^
     nfsstat.c: In function 'get_stats':
     nfsstat.c:1093:6: error: ISO C does not support the '%m' gnu_printf
     format [-Werror=format=]
           label, file);

     statd.c: In function 'set_nlm_port':
     statd.c:235:5: error: ISO C does not support the '%m' gnu_printf
 format
     [-Werror=format=]
          name_p, type);
          ^
     statd.c:238:3: error: ISO C does not support the '%m' gnu_printf
 format
     [-Werror=format=]
        fprintf(stderr, "%s: failed to open %s: %m\n", name_p, pathbuf);

     xtab.c: Removed overflow in implicit constant conversion errors

     xtab.c: In function 'xtab_read':
     xtab.c:60:4: error: overflow in implicit constant conversion
     [-Werror=overflow]
         exp->m_xtabent = 1;
         ^
     xtab.c:61:4: error: overflow in implicit constant conversion
     [-Werror=overflow]
         exp->m_mayexport = 1;

     Fixed format overflow warnings in mountd and nfsd

     rpcgen: Only compile the command when configured.

     Only compile and use the internal rpcgen
     when required via the --with-rpcgen flag

     It is strongly suggested to use the rpcgen from
     the new created rpcsvc-proto package be used.

     gssd: Add "srchost=" upcall parameter

     The callback client used by NFSv4.0 servers to send CB calls has to
     use a source principal that is the same as the target principal
     that the client used to establish the forward channel.

     In multi-homed server set-ups, the domain part of the principal's
     hostname may not be the same as server's DNS domain. So gssd can
     no longer assume that. The kernel can scrape that domain off the
     forward channel's principal and pass that up to gssd.

     This patch adds a new parameter, "srchost", to the kernel upcall.
     When the kernel presents this new parameter in an upcall, gssd will
     use it, along with the "service" parameter, to construct the service
     principal for the keytab lookup.

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/11125#comment:2>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to