cifs: smb2pdu: Fix potential NULL pointer dereference
tcon->ses is being dereferenced before it is null checked, hence
there is a potential null pointer dereference.
Fix this by moving the pointer dereference after tcon->ses has
been properly null checked.
Addresses-Coverity-ID: 1467426 ("Dereference before null check")
Fixes: 93012bf984
("cifs: add server->vals->header_preamble_size")
Signed-off-by: Gustavo A. R. Silva <garsilva@embeddedor.com>
Reviewed-by: Aurelien Aptel <aaptel@suse.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
This commit is contained in:
parent
8837c70d53
commit
c0953f2ed5
|
@ -3454,7 +3454,7 @@ static int
|
||||||
build_qfs_info_req(struct kvec *iov, struct cifs_tcon *tcon, int level,
|
build_qfs_info_req(struct kvec *iov, struct cifs_tcon *tcon, int level,
|
||||||
int outbuf_len, u64 persistent_fid, u64 volatile_fid)
|
int outbuf_len, u64 persistent_fid, u64 volatile_fid)
|
||||||
{
|
{
|
||||||
struct TCP_Server_Info *server = tcon->ses->server;
|
struct TCP_Server_Info *server;
|
||||||
int rc;
|
int rc;
|
||||||
struct smb2_query_info_req *req;
|
struct smb2_query_info_req *req;
|
||||||
unsigned int total_len;
|
unsigned int total_len;
|
||||||
|
@ -3464,6 +3464,8 @@ build_qfs_info_req(struct kvec *iov, struct cifs_tcon *tcon, int level,
|
||||||
if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
|
if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
|
||||||
return -EIO;
|
return -EIO;
|
||||||
|
|
||||||
|
server = tcon->ses->server;
|
||||||
|
|
||||||
rc = smb2_plain_req_init(SMB2_QUERY_INFO, tcon, (void **) &req,
|
rc = smb2_plain_req_init(SMB2_QUERY_INFO, tcon, (void **) &req,
|
||||||
&total_len);
|
&total_len);
|
||||||
if (rc)
|
if (rc)
|
||||||
|
|
Loading…
Reference in New Issue