mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-26 01:30:54 +07:00
0ba7536d5d
There are a couple of tests which could possibly be confused by extremely large numbers appearing in 'xdr' packets. I think the closest to an exploit you could get would be writing random data from a free page into a file - i.e. leak data out of kernel space. I'm fairly sure they cannot be used for remote compromise. Signed-off-by: Neil Brown <neilb@suse.de> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@osdl.org> |
||
---|---|---|
.. | ||
auth.h | ||
cache.h | ||
const.h | ||
debug.h | ||
export.h | ||
interface.h | ||
nfsd.h | ||
nfsfh.h | ||
state.h | ||
stats.h | ||
syscall.h | ||
xdr3.h | ||
xdr4.h | ||
xdr.h |