Re: [PATCH][SMB3 client] minor coverity fix for unitialized MBZ ACL fields

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Add another two places that coverity pointed out (in cifs_open and
_cifsFileInfo_put) with similar issue. trivial fix.


On Fri, Oct 14, 2022 at 7:26 PM Steve French <smfrench@xxxxxxxxx> wrote:
>
> ---------- Forwarded message ---------
> From: Steve French <smfrench@xxxxxxxxx>
> Date: Fri, Oct 14, 2022 at 7:25 PM
> Subject: Re: [PATCH][SMB3 client] minor coverity fix for unitialized
> MBZ ACL fields
> To: CIFS <linux-cifs@xxxxxxxxxxxxxxx>
> Cc: Paulo Alcantara <pc@xxxxxx>
>
>
> And one more similar one (although probably more minor)
>
>     cifs: lease key is uninitialized in smb1 paths
>
>     It is cleaner to set lease key to zero in the places where leases are not
>     supported (smb1 can not return lease keys so the field was uninitialized).
>
>     Addresses-Coverity: 1513994 ("Uninitialized scalar variable")
>
> See attached.
>
>
> On Fri, Oct 14, 2022 at 6:57 PM Steve French <smfrench@xxxxxxxxx> wrote:
> >
> > smb3: must initialize two ACL struct fields to zero
> >
> > Coverity spotted that we were not initalizing Stbz1 and Stbz2 to
> > zero in create_sd_buf.
> >
> > Addresses-Coverity: 1513848 ("Uninitialized scalar variable")
> >
> > See attached
> >
> > --
> > Thanks,
> >
> > Steve
>
>
>
> --
> Thanks,
>
> Steve
>
>
> --
> Thanks,
>
> Steve



-- 
Thanks,

Steve
From 65d51ce29a854c9091649c8e0076d007f269309d Mon Sep 17 00:00:00 2001
From: Steve French <stfrench@xxxxxxxxxxxxx>
Date: Fri, 14 Oct 2022 20:00:32 -0500
Subject: [PATCH] cifs: lease key is uninitialized in two additional functions
 when smb1

cifs_open and _cifsFileInfo_put also end up with lease_key uninitialized
in smb1 mounts.  It is cleaner to set lease key to zero in these
places where leases are not supported (smb1 can not return lease keys
so the field was uninitialized).

Addresses-Coverity: 1514207 ("Uninitialized scalar variable")
Addresses-Coverity: 1514331 ("Uninitialized scalar variable")
Reviewed-by: Paulo Alcantara (SUSE) <pc@xxxxxx>
Signed-off-by: Steve French <stfrench@xxxxxxxxxxxxx>
---
 fs/cifs/file.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/fs/cifs/file.c b/fs/cifs/file.c
index dcec1690312b..f6ffee514c34 100644
--- a/fs/cifs/file.c
+++ b/fs/cifs/file.c
@@ -489,7 +489,7 @@ void _cifsFileInfo_put(struct cifsFileInfo *cifs_file,
 	struct cifsInodeInfo *cifsi = CIFS_I(inode);
 	struct super_block *sb = inode->i_sb;
 	struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
-	struct cifs_fid fid;
+	struct cifs_fid fid = {};
 	struct cifs_pending_open open;
 	bool oplock_break_cancelled;
 
@@ -571,7 +571,7 @@ int cifs_open(struct inode *inode, struct file *file)
 	void *page;
 	const char *full_path;
 	bool posix_open_ok = false;
-	struct cifs_fid fid;
+	struct cifs_fid fid = {};
 	struct cifs_pending_open open;
 	struct cifs_open_info_data data = {};
 
-- 
2.34.1


[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux