There is a static checker warning here because we're taking a "size"
from the user which is in the 1-XATTR_SIZE_MAX range and we're assuming
it's large enough to hold a sizeof(struct cifs_ntsd). This doesn't
cause a buffer overflow or anything, we just end up sending an invalid
sized command to the server. The server checks for that in
CIFSSMBGetCIFSACL() and rejects it.
Signed-off-by: Dan Carpenter <[hidden email]>
Not tested. Please review this one carefully.