I don't mind reviewing this, but it does appear to change behaviour significantly from existing code. Does this fix a reported bug? The linux cifs kernel driver, like some other network clients, allows partial option matching to ease usability for users of other platforms (e.g. "pass" or "passwd" or "password" are intentionally all accepted since we match on the first four bytes of that keyword). Is there a way to get that to work with your patchset. I worry that some users will be confused that their mount options won't work if this is taken. On Wed, Mar 14, 2012 at 2:18 PM, Jeff Layton <jlayton@xxxxxxxxxx> wrote: > On Wed, 14 Mar 2012 14:17:26 -0400 (EDT) > Sachin Prabhu <sprabhu@xxxxxxxxxx> wrote: > >> Thanks Scott, >> >> Steve/Jeff, can I get your comments on this patch please. >> >> Sachin Prabhu >> > > Does it address the oops that we saw with Scott's patch? Here's what I > wrote when I hit that oops before. > > ----------------------------[snip]--------------------------- > > Finally got around to trying this out and I get the following oops when > mounting a share with these options: > > sec=krb5i,multises,noauto > > general protection fault: 0000 [#1] SMP > last sysfs file: /sys/devices/virtual/bdi/cifs-1/uevent > CPU 0 > Modules linked in: cifs nfsd lockd nfs_acl exportfs rpcsec_gss_krb5 auth_rpcgss des_generic sunrpc ipv6 microcode i2c_piix4 i2c_core virtio_net joydev virtio_balloon virtio_blk virtio_pci virtio_ring virtio [last unloaded: mperf] > > Pid: 1542, comm: mount.cifs Not tainted 2.6.35-0.2.rc3.git0.fc14.x86_64 #1 / > RIP: 0010:[<ffffffff8123728c>] [<ffffffff8123728c>] strchr+0x14/0x1d > RSP: 0018:ffff880039a65bd8 EFLAGS: 00010246 > RAX: 7365735f626d735f RBX: 0000000000000000 RCX: ffff88003cb4d041 > RDX: ffff880039a65c6d RSI: 0000000000000025 RDI: 7365735f626d735f > RBP: ffff880039a65bd8 R08: 000000000000002c R09: 000000000000002c > R10: 00000000000080d0 R11: ffffffff8113bc6c R12: ffff88003cb4d041 > R13: ffffffffa0219d40 R14: 0000000000000000 R15: 7365735f626d735f > FS: 00007f1fbcba6720(0000) GS:ffff880004600000(0000) knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b > CR2: 0000000001a31818 CR3: 000000003a287000 CR4: 00000000000006f0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > Process mount.cifs (pid: 1542, threadinfo ffff880039a64000, task ffff880039adc8a0) > Stack: > ffff880039a65c48 ffffffff8123b1ee ffff88003a18b990 ffff880039a65cd8 > <0> ffff88003cb4d041 ffffffff8111cd42 ffffffffa0202f86 7365735f626d735f > <0> ffff88003997de30 ffff88003997de30 ffff88003cc94840 00000000ffffffff > Call Trace: > [<ffffffff8123b1ee>] match_token+0x4b/0x1a8 > [<ffffffff8111cd42>] ? __kmalloc+0x17c/0x18e > [<ffffffffa0202f86>] ? cifs_mount+0x639/0x1737 [cifs] > [<ffffffffa0202c11>] cifs_mount+0x2c4/0x1737 [cifs] > [<ffffffffa01f5aa4>] ? cifs_get_sb+0x110/0x2e4 [cifs] > [<ffffffffa01f5b00>] cifs_get_sb+0x16c/0x2e4 [cifs] > [<ffffffff8112c946>] vfs_kern_mount+0xbd/0x19b > [<ffffffff8112ca8c>] do_kern_mount+0x4d/0xed > [<ffffffff8114368a>] do_mount+0x776/0x7ed > [<ffffffff811128aa>] ? alloc_pages_current+0xa7/0xca > [<ffffffff81143789>] sys_mount+0x88/0xc2 > [<ffffffff81009c32>] system_call_fastpath+0x16/0x1b > Code: 14 84 c0 74 0e 48 ff c7 48 ff c6 48 ff ca 48 85 d2 75 e1 31 c0 c9 c3 55 48 89 f8 48 89 e5 eb 0b 84 d2 75 04 31 c0 eb 0a 48 ff c0 <8a> 10 40 38 f2 75 ee c9 c3 55 48 89 f8 48 89 e5 eb 03 48 ff c0 > RIP [<ffffffff8123728c>] strchr+0x14/0x1d > RSP <ffff880039a65bd8> > ---[ end trace 50d173d44b64b1d9 ]--- > > It's crashing in this match_token() call: > > gdb) list *(cifs_mount+0x2c4) > 0xdcf7 is in cifs_mount (fs/cifs/connect.c:1094). > 1089 while ((data = strsep(&options, separator)) != NULL) { > 1090 if (!*data) > 1091 continue; > 1092 if ((value = strchr(data, '=')) != NULL) > 1093 *value++ = '\0'; > 1094 switch (match_token(data, cifs_mount_options, args)) { > 1095 case Opt_user_xattr: > 1096 vol->no_xattr = 0; > 1097 break; > 1098 case Opt_nouser_xattr: > (gdb) quit > > -- > Jeff Layton <jlayton@xxxxxxxxxx> -- Thanks, Steve -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html