Hello Steve French,
This is a semi-automatic email about new static checker warnings.
The patch 88627148400e: "fix encryption error checks on mount" from
Sep 22, 2015, leads to the following Smatch complaint:
fs/cifs/smb2pdu.c:948 SMB2_tcon()
warn: variable dereferenced before check 'tcon' (see line 926)
fs/cifs/smb2pdu.c
922 if (tcon && tcon->bad_network_name)
^^^^
Old code assumes "tcon" can be NULL.
923 return -ENOENT;
924
925 if ((tcon->seal) &&
^^^^^^^^^^
Patch adds unchecked dereference.
926 ((ses->server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)
== 0)) {
927 cifs_dbg(VFS, "encryption requested but no server
support");
928 return -EOPNOTSUPP;
929 }
930
931 unc_path = kmalloc(MAX_SHARENAME_LENGTH * 2, GFP_KERNEL);
932 if (unc_path == NULL)
933 return -ENOMEM;
934
935 unc_path_len = cifs_strtoUTF16(unc_path, tree, strlen(tree),
cp) + 1;
936 unc_path_len *= 2;
937 if (unc_path_len < 2) {
938 kfree(unc_path);
939 return -EINVAL;
940 }
941
942 rc = small_smb2_init(SMB2_TREE_CONNECT, tcon, (void **) &req);
943 if (rc) {
944 kfree(unc_path);
945 return rc;
946 }
947
948 if (tcon == NULL) {
^^^^^^^^^^^^
Another check for NULL.
949 /* since no tcon, smb2_init can not do this, so do here
*/
950 req->hdr.SessionId = ses->Suid;
regards,
dan carpenter
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html