In the context of a CB_NOTIFY callback, we may not have easy access to
a svc_export. nfsd will not currently grant a delegation on a the V4 root
however, so this should be safe.

Signed-off-by: Jeff Layton <[email protected]>
---
 fs/nfsd/nfs4xdr.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c
index 
9a463f9c8a67704d90d1551b7de59e4e89a2a81d..d1eba4bd8be243022f89f6ac58067c5469a8feba
 100644
--- a/fs/nfsd/nfs4xdr.c
+++ b/fs/nfsd/nfs4xdr.c
@@ -3027,7 +3027,7 @@ static __be32 nfsd4_encode_fattr4_change(struct 
xdr_stream *xdr,
 {
        const struct svc_export *exp = args->exp;
 
-       if (unlikely(exp->ex_flags & NFSEXP_V4ROOT)) {
+       if (exp && unlikely(exp->ex_flags & NFSEXP_V4ROOT)) {
                u32 flush_time = convert_to_wallclock(exp->cd->flush_time);
 
                if (xdr_stream_encode_u32(xdr, flush_time) != XDR_UNIT)

-- 
2.51.0


Reply via email to