lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 29 Nov 2023 13:47:53 +0900
From:   Namjae Jeon <linkinjeon@...nel.org>
To:     Zongmin Zhou <zhouzongmin@...inos.cn>
Cc:     sfrench@...ba.org, senozhatsky@...omium.org, tom@...pey.com,
        linux-cifs@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] ksmbd: initialize ar to NULL

2023-11-29 12:31 GMT+09:00, Zongmin Zhou <zhouzongmin@...inos.cn>:
> Friendly ping. I think this patch was forgotten.
Sorry for not sharing it, I have merged it into another patch from
you("ksmbd: prevent memory leak on error return").

Thanks.
>
> Best regards!
>
> On 2023/11/20 10:39, Zongmin Zhou wrote:
>> Initialize ar to NULL to avoid the case of aux_size will be false,
>> and kfree(ar) without ar been initialized will be unsafe.
>> But kfree(NULL) is safe.
>>
>> Signed-off-by: Zongmin Zhou<zhouzongmin@...inos.cn>
>> Acked-by: Namjae Jeon <linkinjeon@...nel.org>
>> ---
>>   fs/smb/server/ksmbd_work.c | 2 +-
>>   1 file changed, 1 insertion(+), 1 deletion(-)
>>
>> diff --git a/fs/smb/server/ksmbd_work.c b/fs/smb/server/ksmbd_work.c
>> index 44bce4c56daf..2510b9f3c8c1 100644
>> --- a/fs/smb/server/ksmbd_work.c
>> +++ b/fs/smb/server/ksmbd_work.c
>> @@ -106,7 +106,7 @@ static inline void __ksmbd_iov_pin(struct ksmbd_work
>> *work, void *ib,
>>   static int __ksmbd_iov_pin_rsp(struct ksmbd_work *work, void *ib, int
>> len,
>>   			       void *aux_buf, unsigned int aux_size)
>>   {
>> -	struct aux_read *ar;
>> +	struct aux_read *ar = NULL;
>>   	int need_iov_cnt = 1;
>>
>>   	if (aux_size) {
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ