cifs: check kmalloc before use
commitpull/10/head126c97f4d0
upstream. The kmalloc was not being checked - if it fails issue a warning and return -ENOMEM to the caller. Signed-off-by: Nicholas Mc Guire <hofrat@osadl.org> Fixes:b8da344b74
("cifs: dynamic allocation of ntlmssp blob") Signed-off-by: Steve French <stfrench@microsoft.com> Reviewed-by: Pavel Shilovsky <pshilov@microsoft.com> cc: Stable <stable@vger.kernel.org>` Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
parent
cba34b9407
commit
d5f2790a7a
|
@ -398,6 +398,12 @@ int build_ntlmssp_auth_blob(unsigned char **pbuffer,
|
||||||
goto setup_ntlmv2_ret;
|
goto setup_ntlmv2_ret;
|
||||||
}
|
}
|
||||||
*pbuffer = kmalloc(size_of_ntlmssp_blob(ses), GFP_KERNEL);
|
*pbuffer = kmalloc(size_of_ntlmssp_blob(ses), GFP_KERNEL);
|
||||||
|
if (!*pbuffer) {
|
||||||
|
rc = -ENOMEM;
|
||||||
|
cifs_dbg(VFS, "Error %d during NTLMSSP allocation\n", rc);
|
||||||
|
*buflen = 0;
|
||||||
|
goto setup_ntlmv2_ret;
|
||||||
|
}
|
||||||
sec_blob = (AUTHENTICATE_MESSAGE *)*pbuffer;
|
sec_blob = (AUTHENTICATE_MESSAGE *)*pbuffer;
|
||||||
|
|
||||||
memcpy(sec_blob->Signature, NTLMSSP_SIGNATURE, 8);
|
memcpy(sec_blob->Signature, NTLMSSP_SIGNATURE, 8);
|
||||||
|
|
Loading…
Reference in New Issue