diff options
author | Ronnie Sahlberg <lsahlber@redhat.com> | 2018-06-08 05:21:18 +0200 |
---|---|---|
committer | Steve French <stfrench@microsoft.com> | 2018-06-08 06:39:41 +0200 |
commit | 9d874c36552afbd08778687aeaff24a8a7260f20 (patch) | |
tree | 0fab42a276b8045ecb1f96112ed1c4ca7d21508a /fs/cifs/link.c | |
parent | smb3: do not allow insecure cifs mounts when using smb3 (diff) | |
download | linux-9d874c36552afbd08778687aeaff24a8a7260f20.tar.xz linux-9d874c36552afbd08778687aeaff24a8a7260f20.zip |
cifs: fix a buffer leak in smb2_query_symlink
This leak was introduced in 91cb74f5142c14dd921ab2d064b7b128054f9fae and caused us
to leak one small buffer for every symlink query.
Signed-off-by: Ronnie Sahlberg <lsahlber@redhat.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
Diffstat (limited to 'fs/cifs/link.c')
-rw-r--r-- | fs/cifs/link.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/fs/cifs/link.c b/fs/cifs/link.c index 889a840172eb..de41f96aba49 100644 --- a/fs/cifs/link.c +++ b/fs/cifs/link.c @@ -421,7 +421,8 @@ smb3_query_mf_symlink(unsigned int xid, struct cifs_tcon *tcon, return -ENOMEM; } - rc = SMB2_open(xid, &oparms, utf16_path, &oplock, pfile_info, NULL); + rc = SMB2_open(xid, &oparms, utf16_path, &oplock, pfile_info, NULL, + NULL); if (rc) goto qmf_out_open_fail; @@ -478,7 +479,8 @@ smb3_create_mf_symlink(unsigned int xid, struct cifs_tcon *tcon, oparms.fid = &fid; oparms.reconnect = false; - rc = SMB2_open(xid, &oparms, utf16_path, &oplock, NULL, NULL); + rc = SMB2_open(xid, &oparms, utf16_path, &oplock, NULL, NULL, + NULL); if (rc) { kfree(utf16_path); return rc; |