All of lore.kernel.org
 help / color / mirror / Atom feed
* [cifs:for-next 3/12] fs/cifs/connect.c:3435:7: warning: Value stored to 'nodfs' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
@ 2022-05-22 16:33 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2022-05-22 16:33 UTC (permalink / raw)
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 22423 bytes --]

CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-cifs(a)vger.kernel.org
CC: samba-technical(a)lists.samba.org
TO: Enzo Matsumiya <ematsumiya@suse.de>
CC: Steve French <stfrench@microsoft.com>
CC: "Paulo Alcantara (SUSE)" <pc@cjr.nz>

tree:   git://git.samba.org/sfrench/cifs-2.6.git for-next
head:   35a2b533a261e2e43542df902bd9757a1deebfd5
commit: 421ef3d56513b2ff02e563623688cb6ab4977c4f [3/12] cifs: don't call cifs_dfs_query_info_nonascii_quirk() if nodfs was set
:::::: branch date: 11 hours ago
:::::: commit date: 2 days ago
config: x86_64-randconfig-c007 (https://download.01.org/0day-ci/archive/20220523/202205230053.4oXVlsI4-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project b369762beb70dfef22c7e793aed79b94d7dc0757)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        git remote add cifs git://git.samba.org/sfrench/cifs-2.6.git
        git fetch --no-tags cifs for-next
        git checkout 421ef3d56513b2ff02e563623688cb6ab4977c4f
        # save the config file
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 clang-analyzer 

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@intel.com>


clang-analyzer warnings: (new ones prefixed by >>)
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1590:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(&tcp_ses->dstaddr, &ctx->dstaddr,
           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1593:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(tcp_ses->client_guid, ctx->client_guid,
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1593:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(tcp_ses->client_guid, ctx->client_guid,
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:1934:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(desc, "cifs:a:%pI4", &sa->sin_addr.s_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1934:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(desc, "cifs:a:%pI4", &sa->sin_addr.s_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1938:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(desc, "cifs:a:%pI6c", &sa6->sin6_addr.s6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1938:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(desc, "cifs:a:%pI6c", &sa6->sin6_addr.s6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:1957:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(desc, "cifs:d:%s", ses->domainName);
                   ^~~~~~~
   fs/cifs/connect.c:1957:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(desc, "cifs:d:%s", ses->domainName);
                   ^~~~~~~
   fs/cifs/connect.c:2139:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(ses->ip_addr, "%pI6", &addr6->sin6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2139:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(ses->ip_addr, "%pI6", &addr6->sin6_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2141:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   sprintf(ses->ip_addr, "%pI4", &addr->sin_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2141:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
                   sprintf(ses->ip_addr, "%pI4", &addr->sin_addr);
                   ^~~~~~~
   fs/cifs/connect.c:2190:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ses->chans[0].signkey, ses->smb3signingkey,
           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   fs/cifs/connect.c:2190:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ses->chans[0].signkey, ses->smb3signingkey,
           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
>> fs/cifs/connect.c:3435:7: warning: Value stored to 'nodfs' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
           bool nodfs = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_DFS;
                ^~~~~   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   fs/cifs/connect.c:3435:7: note: Value stored to 'nodfs' during its initialization is never read
           bool nodfs = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_DFS;
                ^~~~~   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   fs/cifs/connect.c:3844:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
                   strcpy(bcc_ptr, tree);
                   ^~~~~~
   fs/cifs/connect.c:3844:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
                   strcpy(bcc_ptr, tree);
                   ^~~~~~
   fs/cifs/connect.c:3847:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
           strcpy(bcc_ptr, "?????");
           ^~~~~~
   fs/cifs/connect.c:3847:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
           strcpy(bcc_ptr, "?????");
           ^~~~~~
   Suppressed 88 warnings (87 in non-user code, 1 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   93 warnings generated.
   include/linux/skbuff.h:2319:2: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
           WRITE_ONCE(next->prev, prev);
           ^
   include/asm-generic/rwonce.h:61:2: note: expanded from macro 'WRITE_ONCE'
           __WRITE_ONCE(x, val);                                           \
           ^
   include/asm-generic/rwonce.h:55:30: note: expanded from macro '__WRITE_ONCE'
           *(volatile typeof(x) *)&(x) = (val);                            \
                                       ^
   net/tipc/bearer.c:614:15: note: Assuming 'b' is non-null
           if (unlikely(!b || !test_bit(0, &b->up)))
                        ^
   include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
   # define unlikely(x)    __builtin_expect(!!(x), 0)
                                               ^
   net/tipc/bearer.c:614:15: note: Left side of '||' is false
           if (unlikely(!b || !test_bit(0, &b->up)))
                        ^
   net/tipc/bearer.c:614:6: note: Assuming the condition is false
           if (unlikely(!b || !test_bit(0, &b->up)))
               ^
   include/linux/compiler.h:78:22: note: expanded from macro 'unlikely'
   # define unlikely(x)    __builtin_expect(!!(x), 0)
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~
   net/tipc/bearer.c:614:2: note: Taking false branch
           if (unlikely(!b || !test_bit(0, &b->up)))
           ^
   net/tipc/bearer.c:616:29: note: Assuming 'skb' is not equal to 'xmitq'
           skb_queue_walk_safe(xmitq, skb, tmp) {
                                      ^
   include/linux/skbuff.h:3771:8: note: expanded from macro 'skb_queue_walk_safe'
                        skb != (struct sk_buff *)(queue);                          \
                        ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/tipc/bearer.c:616:2: note: Loop condition is true.  Entering loop body
           skb_queue_walk_safe(xmitq, skb, tmp) {
           ^
   include/linux/skbuff.h:3770:3: note: expanded from macro 'skb_queue_walk_safe'
                   for (skb = (queue)->next, tmp = skb->next;                      \
                   ^
   net/tipc/bearer.c:617:9: note: Calling 'buf_msg'
                   hdr = buf_msg(skb);
                         ^~~~~~~~~~~~
   net/tipc/msg.h:202:2: note: Returning without writing to 'skb->..next'
           return (struct tipc_msg *)skb->data;
           ^
   net/tipc/bearer.c:617:9: note: Returning from 'buf_msg'
                   hdr = buf_msg(skb);
                         ^~~~~~~~~~~~
   net/tipc/bearer.c:616:29: note: Assuming 'skb' is not equal to 'xmitq'
           skb_queue_walk_safe(xmitq, skb, tmp) {
                                      ^
   include/linux/skbuff.h:3771:8: note: expanded from macro 'skb_queue_walk_safe'
                        skb != (struct sk_buff *)(queue);                          \
                        ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   net/tipc/bearer.c:616:2: note: Loop condition is true.  Entering loop body
           skb_queue_walk_safe(xmitq, skb, tmp) {
           ^
   include/linux/skbuff.h:3770:3: note: expanded from macro 'skb_queue_walk_safe'
                   for (skb = (queue)->next, tmp = skb->next;                      \
                   ^
   net/tipc/bearer.c:620:3: note: Calling '__skb_dequeue'
                   __skb_dequeue(xmitq);
                   ^~~~~~~~~~~~~~~~~~~~
   include/linux/skbuff.h:2334:6: note: 'skb' is non-null
           if (skb)
               ^~~
   include/linux/skbuff.h:2334:2: note: Taking true branch
           if (skb)
           ^
   include/linux/skbuff.h:2335:3: note: Calling '__skb_unlink'
                   __skb_unlink(skb, list);
                   ^~~~~~~~~~~~~~~~~~~~~~~
   include/linux/skbuff.h:2315:2: note: Left side of '||' is false
           WRITE_ONCE(list->qlen, list->qlen - 1);
           ^
   include/asm-generic/rwonce.h:60:2: note: expanded from macro 'WRITE_ONCE'
           compiletime_assert_rwonce_type(x);                              \
           ^
   include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
           compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long),  \

vim +/nodfs +3435 fs/cifs/connect.c

a6b5058fafdf50 Aurelien Aptel    2016-05-25  3421  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3422  /*
56c762eb9bee33 Paulo Alcantara   2018-11-14  3423   * Check if path is remote (e.g. a DFS share). Return -EREMOTE if it is,
56c762eb9bee33 Paulo Alcantara   2018-11-14  3424   * otherwise 0.
56c762eb9bee33 Paulo Alcantara   2018-11-14  3425   */
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3426  static int is_path_remote(struct mount_ctx *mnt_ctx)
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3427  {
1daaae8fa4afe3 Jeff Layton       2012-03-21  3428  	int rc;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3429  	struct cifs_sb_info *cifs_sb = mnt_ctx->cifs_sb;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3430  	struct TCP_Server_Info *server = mnt_ctx->server;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3431  	unsigned int xid = mnt_ctx->xid;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3432  	struct cifs_tcon *tcon = mnt_ctx->tcon;
c88f7dcd6d6429 Paulo Alcantara   2021-11-03  3433  	struct smb3_fs_context *ctx = mnt_ctx->fs_ctx;
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3434  	char *full_path;
421ef3d56513b2 Enzo Matsumiya    2022-05-18 @3435  	bool nodfs = cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_DFS;
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3436  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3437  	if (!server->ops->is_path_accessible)
56c762eb9bee33 Paulo Alcantara   2018-11-14  3438  		return -EOPNOTSUPP;
1dfd18d0571231 Sachin Prabhu     2015-06-16  3439  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3440  	/*
56c762eb9bee33 Paulo Alcantara   2018-11-14  3441  	 * cifs_build_path_to_root works only when we have a valid tcon
56c762eb9bee33 Paulo Alcantara   2018-11-14  3442  	 */
3fa1c6d1b8f5c3 Ronnie Sahlberg   2020-12-09  3443  	full_path = cifs_build_path_to_root(ctx, cifs_sb, tcon,
56c762eb9bee33 Paulo Alcantara   2018-11-14  3444  					    tcon->Flags & SMB_SHARE_IS_IN_DFS);
56c762eb9bee33 Paulo Alcantara   2018-11-14  3445  	if (full_path == NULL)
56c762eb9bee33 Paulo Alcantara   2018-11-14  3446  		return -ENOMEM;
724d9f1cfba0cb Pavel Shilovsky   2011-05-05  3447  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3448  	cifs_dbg(FYI, "%s: full_path: %s\n", __func__, full_path);
^1da177e4c3f41 Linus Torvalds    2005-04-16  3449  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3450  	rc = server->ops->is_path_accessible(xid, tcon, cifs_sb,
56c762eb9bee33 Paulo Alcantara   2018-11-14  3451  					     full_path);
a2809d0e16963f Eugene Korenevsky 2022-01-14  3452  #ifdef CONFIG_CIFS_DFS_UPCALL
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3453  	if (nodfs) {
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3454  		if (rc == -EREMOTE)
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3455  			rc = -EOPNOTSUPP;
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3456  		goto out;
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3457  	}
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3458  
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3459  	/* path *might* exist with non-ASCII characters in DFS root
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3460  	 * try again with full path (only if nodfs is not set) */
a2809d0e16963f Eugene Korenevsky 2022-01-14  3461  	if (rc == -ENOENT && is_tcon_dfs(tcon))
a2809d0e16963f Eugene Korenevsky 2022-01-14  3462  		rc = cifs_dfs_query_info_nonascii_quirk(xid, tcon, cifs_sb,
a2809d0e16963f Eugene Korenevsky 2022-01-14  3463  							full_path);
a2809d0e16963f Eugene Korenevsky 2022-01-14  3464  #endif
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3465  	if (rc != 0 && rc != -EREMOTE)
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3466  		goto out;
^1da177e4c3f41 Linus Torvalds    2005-04-16  3467  
56c762eb9bee33 Paulo Alcantara   2018-11-14  3468  	if (rc != -EREMOTE) {
56c762eb9bee33 Paulo Alcantara   2018-11-14  3469  		rc = cifs_are_all_path_components_accessible(server, xid, tcon,
ce465bf94b70f0 Ronnie Sahlberg   2019-07-11  3470  			cifs_sb, full_path, tcon->Flags & SMB_SHARE_IS_IN_DFS);
56c762eb9bee33 Paulo Alcantara   2018-11-14  3471  		if (rc != 0) {
a0a3036b81f1f6 Joe Perches       2020-04-14  3472  			cifs_server_dbg(VFS, "cannot query dirs between root and final path, enabling CIFS_MOUNT_USE_PREFIX_PATH\n");
56c762eb9bee33 Paulo Alcantara   2018-11-14  3473  			cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_USE_PREFIX_PATH;
56c762eb9bee33 Paulo Alcantara   2018-11-14  3474  			rc = 0;
56c762eb9bee33 Paulo Alcantara   2018-11-14  3475  		}
b618f001a20e44 Steve French      2015-11-03  3476  	}
592fafe644bf3a Steve French      2015-11-03  3477  
421ef3d56513b2 Enzo Matsumiya    2022-05-18  3478  out:
56c762eb9bee33 Paulo Alcantara   2018-11-14  3479  	kfree(full_path);
56c762eb9bee33 Paulo Alcantara   2018-11-14  3480  	return rc;
d00c28de55a69d Jeff Layton       2010-04-24  3481  }
1bfe73c258addc Igor Mammedov     2009-04-01  3482  

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2022-05-22 16:33 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-22 16:33 [cifs:for-next 3/12] fs/cifs/connect.c:3435:7: warning: Value stored to 'nodfs' during its initialization is never read [clang-analyzer-deadcode.DeadStores] kernel test robot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.