Searched hist:"876 c553cb41026cb6ad3cef970a35e5f69c42a25" (Results 1 – 3 of 3) sorted by relevance
/openbmc/linux/fs/nfsd/ |
H A D | xdr4.h | diff 876c553cb41026cb6ad3cef970a35e5f69c42a25 Tue Jul 26 01:45:30 CDT 2022 Jeff Layton <jlayton@kernel.org> NFSD: verify the opened dentry after setting a delegation
Between opening a file and setting a delegation on it, someone could rename or unlink the dentry. If this happens, we do not want to grant a delegation on the open.
On a CLAIM_NULL open, we're opening by filename, and we may (in the non-create case) or may not (in the create case) be holding i_rwsem when attempting to set a delegation. The latter case allows a race.
After getting a lease, redo the lookup of the file being opened and validate that the resulting dentry matches the one in the open file description.
To properly redo the lookup we need an rqst pointer to pass to nfsd_lookup_dentry(), so make sure that is available.
Signed-off-by: Jeff Layton <jlayton@kernel.org> Signed-off-by: NeilBrown <neilb@suse.de> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
|
H A D | nfs4proc.c | diff 876c553cb41026cb6ad3cef970a35e5f69c42a25 Tue Jul 26 01:45:30 CDT 2022 Jeff Layton <jlayton@kernel.org> NFSD: verify the opened dentry after setting a delegation
Between opening a file and setting a delegation on it, someone could rename or unlink the dentry. If this happens, we do not want to grant a delegation on the open.
On a CLAIM_NULL open, we're opening by filename, and we may (in the non-create case) or may not (in the create case) be holding i_rwsem when attempting to set a delegation. The latter case allows a race.
After getting a lease, redo the lookup of the file being opened and validate that the resulting dentry matches the one in the open file description.
To properly redo the lookup we need an rqst pointer to pass to nfsd_lookup_dentry(), so make sure that is available.
Signed-off-by: Jeff Layton <jlayton@kernel.org> Signed-off-by: NeilBrown <neilb@suse.de> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
|
H A D | nfs4state.c | diff 876c553cb41026cb6ad3cef970a35e5f69c42a25 Tue Jul 26 01:45:30 CDT 2022 Jeff Layton <jlayton@kernel.org> NFSD: verify the opened dentry after setting a delegation
Between opening a file and setting a delegation on it, someone could rename or unlink the dentry. If this happens, we do not want to grant a delegation on the open.
On a CLAIM_NULL open, we're opening by filename, and we may (in the non-create case) or may not (in the create case) be holding i_rwsem when attempting to set a delegation. The latter case allows a race.
After getting a lease, redo the lookup of the file being opened and validate that the resulting dentry matches the one in the open file description.
To properly redo the lookup we need an rqst pointer to pass to nfsd_lookup_dentry(), so make sure that is available.
Signed-off-by: Jeff Layton <jlayton@kernel.org> Signed-off-by: NeilBrown <neilb@suse.de> Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
|