kernel-fxtec-pro1x/fs/ceph
Jeff Layton c42c61e982 ceph: fix potential race in ceph_check_caps
[ Upstream commit dc3da0461cc4b76f2d0c5b12247fcb3b520edbbf ]

Nothing ensures that session will still be valid by the time we
dereference the pointer. Take and put a reference.

In principle, we should always be able to get a reference here, but
throw a warning if that's ever not the case.

Signed-off-by: Jeff Layton <jlayton@kernel.org>
Signed-off-by: Ilya Dryomov <idryomov@gmail.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2020-10-01 13:14:47 +02:00
..
acl.c
addr.c
cache.c
cache.h
caps.c ceph: fix potential race in ceph_check_caps 2020-10-01 13:14:47 +02:00
ceph_frag.c
debugfs.c
dir.c
export.c ceph: return ceph_mdsc_do_request() errors from __get_parent() 2020-04-29 16:31:10 +02:00
file.c ceph: don't allow setlease on cephfs 2020-09-09 19:04:23 +02:00
inode.c ceph: ensure we have a new cap before continuing in fill_inode 2020-10-01 13:14:31 +02:00
ioctl.c
ioctl.h
Kconfig
locks.c
Makefile
mds_client.c ceph: fix potential mdsc use-after-free crash 2020-09-03 11:24:22 +02:00
mds_client.h
mdsmap.c
quota.c
snap.c
strings.c
super.c ceph: canonicalize server path in place 2020-04-13 10:45:12 +02:00
super.h ceph: canonicalize server path in place 2020-04-13 10:45:12 +02:00
xattr.c