mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-10-24 18:32:29 +00:00
There are a couple of tests which could possibly be confused by extremely large numbers appearing in 'xdr' packets. I think the closest to an exploit you could get would be writing random data from a free page into a file - i.e. leak data out of kernel space. I'm fairly sure they cannot be used for remote compromise. Signed-off-by: Neil Brown <neilb@suse.de> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org> |
||
|---|---|---|
| .. | ||
| auth.h | ||
| cache.h | ||
| const.h | ||
| debug.h | ||
| export.h | ||
| interface.h | ||
| nfsd.h | ||
| nfsfh.h | ||
| state.h | ||
| stats.h | ||
| syscall.h | ||
| xdr3.h | ||
| xdr4.h | ||
| xdr.h | ||