CC: [email protected]
CC: [email protected]
BCC: [email protected]
CC: [email protected]
CC: [email protected]
TO: Enzo Matsumiya <[email protected]>
CC: Steve French <[email protected]>
CC: "Paulo Alcantara (SUSE)" <[email protected]>

tree:   git://git.samba.org/sfrench/cifs-2.6.git for-next
head:   35a2b533a261e2e43542df902bd9757a1deebfd5
commit: 421ef3d56513b2ff02e563623688cb6ab4977c4f [3/12] cifs: don't call 
cifs_dfs_query_info_nonascii_quirk() if nodfs was set
:::::: branch date: 11 hours ago
:::::: commit date: 2 days ago
config: x86_64-randconfig-c007 
(https://download.01.org/0day-ci/archive/20220523/[email protected]/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 
b369762beb70dfef22c7e793aed79b94d7dc0757)
reproduce (this is a W=1 build):
        wget 
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O 
~/bin/make.cross
        chmod +x ~/bin/make.cross
        git remote add cifs git://git.samba.org/sfrench/cifs-2.6.git
        git fetch --no-tags cifs for-next
        git checkout 421ef3d56513b2ff02e563623688cb6ab4977c4f
        # save the config file
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 
clang-analyzer 

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <[email protected]>


clang-analyzer warnings: (new ones prefixed by >>)
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro 
'__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1590:2: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(&tcp_ses->dstaddr, &ctx->dstaddr,
           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro 
'__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro 
'__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1593:3: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(tcp_ses->client_guid, ctx->client_guid,
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro 
'__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro 
'__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1593:3: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
                   memcpy(tcp_ses->client_guid, ctx->client_guid,
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro 
'__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro 
'__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1934:3: warning: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(desc, "cifs:a:%pI4", &sa->sin_addr.s_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1934:3: note: Call to function 'sprintf' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'sprintf_s' in case of C11
                   sprintf(desc, "cifs:a:%pI4", &sa->sin_addr.s_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1938:3: warning: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(desc, "cifs:a:%pI6c", &sa6->sin6_addr.s6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1938:3: note: Call to function 'sprintf' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'sprintf_s' in case of C11
                   sprintf(desc, "cifs:a:%pI6c", &sa6->sin6_addr.s6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1957:3: warning: Call to function 'sprintf' is insecure as 
it does not provide bounding of the memory buffer or security checks introduced 
in the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(desc, "cifs:d:%s", ses->domainName);
                   ^~~~~~~
   fs/cifs/connect.c:1957:3: note: Call to function 'sprintf' is insecure as it 
does not provide bounding of the memory buffer or security checks introduced in 
the C11 standard. Replace with analogous functions that support length 
arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(desc, "cifs:d:%s", ses->domainName);
                   ^~~~~~~
   fs/cifs/connect.c:2139:3: warning: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(ses->ip_addr, "%pI6", &addr6->sin6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2139:3: note: Call to function 'sprintf' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'sprintf_s' in case of C11
                   sprintf(ses->ip_addr, "%pI6", &addr6->sin6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2141:3: warning: Call to function 'sprintf' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(ses->ip_addr, "%pI4", &addr->sin_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2141:3: note: Call to function 'sprintf' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'sprintf_s' in case of C11
                   sprintf(ses->ip_addr, "%pI4", &addr->sin_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2190:2: warning: Call to function 'memcpy' is insecure as 
it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memcpy_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ses->chans[0].signkey, ses->smb3signingkey,
           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro 
'__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro 
'__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:2190:2: note: Call to function 'memcpy' is insecure as it 
does not provide security checks introduced in the C11 standard. Replace with 
analogous functions that support length arguments or provides boundary checks 
such as 'memcpy_s' in case of C11
           memcpy(ses->chans[0].signkey, ses->smb3signingkey,
           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro 
'__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro 
'__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
>> fs/cifs/connect.c:3435:7: warning: Value stored to 'nodfs' during its 
>> initialization is never read [clang-analyzer-deadcode.DeadStores]
           bool nodfs = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_DFS;
                ^~~~~   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   fs/cifs/connect.c:3435:7: note: Value stored to 'nodfs' during its 
initialization is never read
           bool nodfs = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_DFS;
                ^~~~~   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   fs/cifs/connect.c:3844:3: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(bcc_ptr, tree);
                   ^~~~~~
   fs/cifs/connect.c:3844:3: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
                   strcpy(bcc_ptr, tree);
                   ^~~~~~
   fs/cifs/connect.c:3847:2: warning: Call to function 'strcpy' is insecure as 
it does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(bcc_ptr, "?????");
           ^~~~~~
   fs/cifs/connect.c:3847:2: note: Call to function 'strcpy' is insecure as it 
does not provide bounding of the memory buffer. Replace unbounded copy 
functions with analogous functions that support length arguments such as 
'strlcpy'. CWE-119
           strcpy(bcc_ptr, "?????");
           ^~~~~~
   Suppressed 88 warnings (87 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   93 warnings generated.
   include/linux/skbuff.h:2319:2: warning: Dereference of null pointer 
[clang-analyzer-core.NullDereference]
           WRITE_ONCE(next->prev, prev);
           ^
   include/asm-generic/rwonce.h:61:2: note: expanded from macro 'WRITE_ONCE'
           __WRITE_ONCE(x, val);                                           \
           ^
   include/asm-generic/rwonce.h:55:30: note: expanded from macro '__WRITE_ONCE'
           *(volatile typeof(x) *)&(x) = (val);                            \
                                       ^
   net/tipc/bearer.c:614:15: note: Assuming 'b' is non-null
           if (unlikely(!b || !test_bit(0, &b->up)))
                        ^
   include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
   # define unlikely(x)    __builtin_expect(!!(x), 0)
                                               ^
   net/tipc/bearer.c:614:15: note: Left side of '||' is false
           if (unlikely(!b || !test_bit(0, &b->up)))
                        ^
   net/tipc/bearer.c:614:6: note: Assuming the condition is false
           if (unlikely(!b || !test_bit(0, &b->up)))
               ^
   include/linux/compiler.h:78:22: note: expanded from macro 'unlikely'
   # define unlikely(x)    __builtin_expect(!!(x), 0)
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~
   net/tipc/bearer.c:614:2: note: Taking false branch
           if (unlikely(!b || !test_bit(0, &b->up)))
           ^
   net/tipc/bearer.c:616:29: note: Assuming 'skb' is not equal to 'xmitq'
           skb_queue_walk_safe(xmitq, skb, tmp) {
                                      ^
   include/linux/skbuff.h:3771:8: note: expanded from macro 
'skb_queue_walk_safe'
                        skb != (struct sk_buff *)(queue);                       
   \
                        ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/tipc/bearer.c:616:2: note: Loop condition is true.  Entering loop body
           skb_queue_walk_safe(xmitq, skb, tmp) {
           ^
   include/linux/skbuff.h:3770:3: note: expanded from macro 
'skb_queue_walk_safe'
                   for (skb = (queue)->next, tmp = skb->next;                   
   \
                   ^
   net/tipc/bearer.c:617:9: note: Calling 'buf_msg'
                   hdr = buf_msg(skb);
                         ^~~~~~~~~~~~
   net/tipc/msg.h:202:2: note: Returning without writing to 'skb->..next'
           return (struct tipc_msg *)skb->data;
           ^
   net/tipc/bearer.c:617:9: note: Returning from 'buf_msg'
                   hdr = buf_msg(skb);
                         ^~~~~~~~~~~~
   net/tipc/bearer.c:616:29: note: Assuming 'skb' is not equal to 'xmitq'
           skb_queue_walk_safe(xmitq, skb, tmp) {
                                      ^
   include/linux/skbuff.h:3771:8: note: expanded from macro 
'skb_queue_walk_safe'
                        skb != (struct sk_buff *)(queue);                       
   \
                        ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/tipc/bearer.c:616:2: note: Loop condition is true.  Entering loop body
           skb_queue_walk_safe(xmitq, skb, tmp) {
           ^
   include/linux/skbuff.h:3770:3: note: expanded from macro 
'skb_queue_walk_safe'
                   for (skb = (queue)->next, tmp = skb->next;                   
   \
                   ^
   net/tipc/bearer.c:620:3: note: Calling '__skb_dequeue'
                   __skb_dequeue(xmitq);
                   ^~~~~~~~~~~~~~~~~~~~
   include/linux/skbuff.h:2334:6: note: 'skb' is non-null
           if (skb)
               ^~~
   include/linux/skbuff.h:2334:2: note: Taking true branch
           if (skb)
           ^
   include/linux/skbuff.h:2335:3: note: Calling '__skb_unlink'
                   __skb_unlink(skb, list);
                   ^~~~~~~~~~~~~~~~~~~~~~~
   include/linux/skbuff.h:2315:2: note: Left side of '||' is false
           WRITE_ONCE(list->qlen, list->qlen - 1);
           ^
   include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
           compiletime_assert_rwonce_type(x);                              \
           ^
   include/asm-generic/rwonce.h:36:21: note: expanded from macro 
'compiletime_assert_rwonce_type'
           compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long 
long),  \

vim +/nodfs +3435 fs/cifs/connect.c

a6b5058fafdf50 Aurelien Aptel    2016-05-25  3421  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3422  /*
56c762eb9bee33 Paulo Alcantara   2018-11-14  3423   * Check if path is remote 
(e.g. a DFS share). Return -EREMOTE if it is,
56c762eb9bee33 Paulo Alcantara   2018-11-14  3424   * otherwise 0.
56c762eb9bee33 Paulo Alcantara   2018-11-14  3425   */
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3426  static int 
is_path_remote(struct mount_ctx *mnt_ctx)
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3427  {
1daaae8fa4afe3 Jeff Layton       2012-03-21  3428       int rc;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3429       struct cifs_sb_info 
*cifs_sb = mnt_ctx->cifs_sb;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3430       struct TCP_Server_Info 
*server = mnt_ctx->server;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3431       unsigned int xid = 
mnt_ctx->xid;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3432       struct cifs_tcon *tcon 
= mnt_ctx->tcon;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3433       struct smb3_fs_context 
*ctx = mnt_ctx->fs_ctx;
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3434       char *full_path;
421ef3d56513b2 Enzo Matsumiya    2022-05-18 @3435       bool nodfs = 
cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_DFS;
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3436  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3437       if 
(!server->ops->is_path_accessible)
56c762eb9bee33 Paulo Alcantara   2018-11-14  3438               return 
-EOPNOTSUPP;
1dfd18d0571231 Sachin Prabhu     2015-06-16  3439  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3440       /*
56c762eb9bee33 Paulo Alcantara   2018-11-14  3441        * 
cifs_build_path_to_root works only when we have a valid tcon
56c762eb9bee33 Paulo Alcantara   2018-11-14  3442        */
3fa1c6d1b8f5c3 Ronnie Sahlberg   2020-12-09  3443       full_path = 
cifs_build_path_to_root(ctx, cifs_sb, tcon,
56c762eb9bee33 Paulo Alcantara   2018-11-14  3444                               
            tcon->Flags & SMB_SHARE_IS_IN_DFS);
56c762eb9bee33 Paulo Alcantara   2018-11-14  3445       if (full_path == NULL)
56c762eb9bee33 Paulo Alcantara   2018-11-14  3446               return -ENOMEM;
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3447  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3448       cifs_dbg(FYI, "%s: 
full_path: %s\n", __func__, full_path);
^1da177e4c3f41 Linus Torvalds    2005-04-16  3449  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3450       rc = 
server->ops->is_path_accessible(xid, tcon, cifs_sb,
56c762eb9bee33 Paulo Alcantara   2018-11-14  3451                               
             full_path);
a2809d0e16963f Eugene Korenevsky 2022-01-14  3452  #ifdef CONFIG_CIFS_DFS_UPCALL
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3453       if (nodfs) {
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3454               if (rc == 
-EREMOTE)
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3455                       rc = 
-EOPNOTSUPP;
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3456               goto out;
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3457       }
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3458  
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3459       /* path *might* exist 
with non-ASCII characters in DFS root
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3460        * try again with full 
path (only if nodfs is not set) */
a2809d0e16963f Eugene Korenevsky 2022-01-14  3461       if (rc == -ENOENT && 
is_tcon_dfs(tcon))
a2809d0e16963f Eugene Korenevsky 2022-01-14  3462               rc = 
cifs_dfs_query_info_nonascii_quirk(xid, tcon, cifs_sb,
a2809d0e16963f Eugene Korenevsky 2022-01-14  3463                               
                        full_path);
a2809d0e16963f Eugene Korenevsky 2022-01-14  3464  #endif
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3465       if (rc != 0 && rc != 
-EREMOTE)
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3466               goto out;
^1da177e4c3f41 Linus Torvalds    2005-04-16  3467  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3468       if (rc != -EREMOTE) {
56c762eb9bee33 Paulo Alcantara   2018-11-14  3469               rc = 
cifs_are_all_path_components_accessible(server, xid, tcon,
ce465bf94b70f0 Ronnie Sahlberg   2019-07-11  3470                       
cifs_sb, full_path, tcon->Flags & SMB_SHARE_IS_IN_DFS);
56c762eb9bee33 Paulo Alcantara   2018-11-14  3471               if (rc != 0) {
a0a3036b81f1f6 Joe Perches       2020-04-14  3472                       
cifs_server_dbg(VFS, "cannot query dirs between root and final path, enabling 
CIFS_MOUNT_USE_PREFIX_PATH\n");
56c762eb9bee33 Paulo Alcantara   2018-11-14  3473                       
cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_USE_PREFIX_PATH;
56c762eb9bee33 Paulo Alcantara   2018-11-14  3474                       rc = 0;
56c762eb9bee33 Paulo Alcantara   2018-11-14  3475               }
b618f001a20e44 Steve French      2015-11-03  3476       }
592fafe644bf3a Steve French      2015-11-03  3477  
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3478  out:
56c762eb9bee33 Paulo Alcantara   2018-11-14  3479       kfree(full_path);
56c762eb9bee33 Paulo Alcantara   2018-11-14  3480       return rc;
d00c28de55a69d Jeff Layton       2010-04-24  3481  }
1bfe73c258addc Igor Mammedov     2009-04-01  3482  

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
_______________________________________________
kbuild mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to