Coverity-updates archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

New Defects reported by Coverity Scan for NetBSD-amd64-kernel



Hi,

Please find the latest report on new defect(s) introduced to NetBSD-amd64-kernel found with Coverity Scan.

127 new defect(s) introduced to NetBSD-amd64-kernel found with Coverity Scan.
41 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.

New defect(s) Reported-by: Coverity Scan
Showing 20 of 127 defect(s)


** CID 1428660:  Error handling issues  (CHECKED_RETURN)
/sys/dev/pci/agp_sis.c: 90 in agp_sis_attach()


________________________________________________________________________________________________________
*** CID 1428660:  Error handling issues  (CHECKED_RETURN)
/sys/dev/pci/agp_sis.c: 90 in agp_sis_attach()
84     	if (ssc == NULL) {
85     		aprint_error(": can't allocate chipset-specific softc\n");
86     		return ENOMEM;
87     	}
88     	sc->as_methods = &agp_sis_methods;
89     	sc->as_chipc = ssc;
>>>     CID 1428660:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "pci_get_capability" without checking return value (as is done elsewhere 45 out of 53 times).
90     	pci_get_capability(pa->pa_pc, pa->pa_tag, PCI_CAP_AGP, &sc->as_capoff,
91     	    NULL);
92     
93     	if (agp_map_aperture(pa, sc, AGP_APBASE) != 0) {
94     		aprint_error(": can't map aperture\n");
95     		free(ssc, M_AGP);

** CID 1428659:  Null pointer dereferences  (FORWARD_NULL)
/sys/netipsec/ipsec.c: 498 in ipsec_getpolicybysock()


________________________________________________________________________________________________________
*** CID 1428659:  Null pointer dereferences  (FORWARD_NULL)
/sys/netipsec/ipsec.c: 498 in ipsec_getpolicybysock()
492     		currsp = pcbsp->sp_out;
493     		break;
494     	}
495     	KASSERT(currsp != NULL);
496     
497     	if (pcbsp->priv) {			/* when privilieged socket */
>>>     CID 1428659:  Null pointer dereferences  (FORWARD_NULL)
>>>     Dereferencing null pointer "currsp".
498     		switch (currsp->policy) {
499     		case IPSEC_POLICY_BYPASS:
500     		case IPSEC_POLICY_IPSEC:
501     			KEY_SP_REF(currsp);
502     			sp = currsp;
503     			break;

** CID 1428658:  Insecure data handling  (TAINTED_SCALAR)


________________________________________________________________________________________________________
*** CID 1428658:  Insecure data handling  (TAINTED_SCALAR)
/sys/kern/core_elf32.c: 419 in coredump_note_auxv()
413     	if ((error = proc_getauxv(l->l_proc, &kauxv, &len)) != 0)
414     		return error;
415     
416     	ELFNAMEEND(coredump_savenote)(ns, ELF_NOTE_NETBSD_CORE_AUXV,
417     	    ELF_NOTE_NETBSD_CORE_NAME, kauxv, len);
418     	
>>>     CID 1428658:  Insecure data handling  (TAINTED_SCALAR)
>>>     Passing tainted variable "kauxv" to a tainted sink.
419     	kmem_free(kauxv, len);
420     	return 0;
421     }
422     
423     static int
424     ELFNAMEEND(coredump_notes)(struct lwp *l, struct note_state *ns)

** CID 1428657:  Uninitialized variables  (UNINIT)
/sys/dev/pad/pad.c: 390 in pad_open()


________________________________________________________________________________________________________
*** CID 1428657:  Uninitialized variables  (UNINIT)
/sys/dev/pad/pad.c: 390 in pad_open()
384     		error = fd_clone(fp, fd, flags, &pad_fileops, sc);
385     		KASSERT(error == EMOVEFD);
386     	}	
387     	sc->sc_open = 1;
388     	mutex_exit(&padconfig);
389     
>>>     CID 1428657:  Uninitialized variables  (UNINIT)
>>>     Using uninitialized value "error".
390     	return error;
391     bad:
392     	mutex_exit(&padconfig);
393     	return ENXIO;
394     }
395     

** CID 1428656:  Null pointer dereferences  (FORWARD_NULL)
/sys/dev/usb/ohci.c: 1792 in ohci_rem_ed()


________________________________________________________________________________________________________
*** CID 1428656:  Null pointer dereferences  (FORWARD_NULL)
/sys/dev/usb/ohci.c: 1792 in ohci_rem_ed()
1786     		;
1787     	KASSERT(p != NULL);
1788     
1789     	usb_syncmem(&sed->dma, sed->offs + offsetof(ohci_ed_t, ed_nexted),
1790     	    sizeof(sed->ed.ed_nexted),
1791     	    BUS_DMASYNC_POSTWRITE | BUS_DMASYNC_POSTREAD);
>>>     CID 1428656:  Null pointer dereferences  (FORWARD_NULL)
>>>     Dereferencing null pointer "p".
1792     	p->next = sed->next;
1793     	p->ed.ed_nexted = sed->ed.ed_nexted;
1794     	usb_syncmem(&p->dma, p->offs + offsetof(ohci_ed_t, ed_nexted),
1795     	    sizeof(p->ed.ed_nexted),
1796     	    BUS_DMASYNC_PREWRITE | BUS_DMASYNC_PREREAD);
1797     }

** CID 1428655:  Error handling issues  (CHECKED_RETURN)
/sys/dev/pci/agp_intel.c: 131 in agp_intel_attach()


________________________________________________________________________________________________________
*** CID 1428655:  Error handling issues  (CHECKED_RETURN)
/sys/dev/pci/agp_intel.c: 131 in agp_intel_attach()
125     	if (pci_find_device(&isc->vga_pa, agp_intel_vgamatch) == 0) {
126     		aprint_normal(": using generic initialization for Intel AGP\n");
127     		aprint_normal_dev(sc->as_dev, "");
128     		isc->chiptype = CHIP_INTEL;
129     	}
130     
>>>     CID 1428655:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "pci_get_capability" without checking return value (as is done elsewhere 45 out of 53 times).
131     	pci_get_capability(pa->pa_pc, pa->pa_tag, PCI_CAP_AGP, &sc->as_capoff,
132     	    NULL);
133     
134     	if (agp_map_aperture(pa, sc, AGP_APBASE) != 0) {
135     		aprint_error(": can't map aperture\n");
136     		free(isc, M_AGP);

** CID 1428654:  Null pointer dereferences  (FORWARD_NULL)
/sys/netinet6/ip6_forward.c: 271 in ip6_forward()


________________________________________________________________________________________________________
*** CID 1428654:  Null pointer dereferences  (FORWARD_NULL)
/sys/netinet6/ip6_forward.c: 271 in ip6_forward()
265     	 * ipsec6_proces_packet will send the packet using ip6_output 
266     	 */
267     	if (needipsec) {
268     		int s = splsoftnet();
269     		error = ipsec6_process_packet(m, sp->req);
270     		splx(s);
>>>     CID 1428654:  Null pointer dereferences  (FORWARD_NULL)
>>>     Comparing "mcopy" to null implies that "mcopy" might be null.
271     		if (mcopy)
272     			goto freecopy;
273     	}
274     #endif   
275     
276     	/*

** CID 1428653:  Insecure data handling  (TAINTED_SCALAR)
/sys/netsmb/smb_subr.c: 393 in dup_sockaddr_copyin()


________________________________________________________________________________________________________
*** CID 1428653:  Insecure data handling  (TAINTED_SCALAR)
/sys/netsmb/smb_subr.c: 393 in dup_sockaddr_copyin()
387     		return EINVAL;
388     
389     	/* Don't let the user overfeed us.  */
390     	usalen = MIN(usalen, sizeof(struct sockaddr_storage));
391     
392     	/* Copy the buffer in from userland.  */
>>>     CID 1428653:  Insecure data handling  (TAINTED_SCALAR)
>>>     Assigning: "ksa" = "smb_memdupin", which taints "ksa".
393     	ksa = smb_memdupin(usa, usalen);
394     	if (ksa == NULL)
395     		return ENOMEM;
396     
397     	/* Make sure the user's idea of sa_len is reasonable.  */
398     	if (ksa->sa_len > usalen) {

** CID 1428652:  Insecure data handling  (TAINTED_SCALAR)


________________________________________________________________________________________________________
*** CID 1428652:  Insecure data handling  (TAINTED_SCALAR)
/sys/miscfs/procfs/procfs_auxv.c: 61 in procfs_doauxv()
55     	if (uio->uio_offset < bufsize)
56     		error = uiomove((char *)buffer + uio->uio_offset,
57     		    bufsize - uio->uio_offset, uio);
58     	else
59     		error = 0;
60     
>>>     CID 1428652:  Insecure data handling  (TAINTED_SCALAR)
>>>     Passing tainted variable "buffer" to a tainted sink.
61     	kmem_free(buffer, bufsize);
62     	return error;
63     }
64     
65     int
66     procfs_validauxv(struct lwp *l, struct mount *mp)
67     {
68     	return l != NULL && l->l_proc != NULL && l->l_proc->p_execsw != NULL;

** CID 1428651:  Integer handling issues  (BAD_SHIFT)
/sys/kern/subr_vmem.c: 409 in bt_freehead_toalloc()


________________________________________________________________________________________________________
*** CID 1428651:  Integer handling issues  (BAD_SHIFT)
/sys/kern/subr_vmem.c: 409 in bt_freehead_toalloc()
403     	const vmem_size_t qsize = size >> vm->vm_quantum_shift;
404     	int idx = SIZE2ORDER(qsize);
405     
406     	KASSERT(size != 0 && qsize != 0);
407     	KASSERT((size & vm->vm_quantum_mask) == 0);
408     
>>>     CID 1428651:  Integer handling issues  (BAD_SHIFT)
>>>     In expression "1UL << idx", shifting by a negative amount has undefined behavior.  The shift amount, "idx", is -1.
409     	if (strat == VM_INSTANTFIT && ORDER2SIZE(idx) != qsize) {
410     		idx++;
411     		/* check too large request? */
412     	}
413     	KASSERT(idx >= 0);
414     	KASSERT(idx < VMEM_MAXORDER);

** CID 1428650:  Memory - illegal accesses  (OVERRUN)
/sys/kern/kern_sysctl.c: 2480 in sysctl_log_add()


________________________________________________________________________________________________________
*** CID 1428650:  Memory - illegal accesses  (OVERRUN)
/sys/kern/kern_sysctl.c: 2480 in sysctl_log_add()
2474     
2475     	/*
2476     	 * stuff name in, then namelen, then node type, and finally,
2477     	 * the version for non-node nodes.
2478     	 */
2479     	for (i = 0; i < namelen; i++)
>>>     CID 1428650:  Memory - illegal accesses  (OVERRUN)
>>>     Overrunning array "name" of 12 4-byte elements at element index 12 (byte offset 48) using index "i" (which evaluates to 12).
2480     		log->log_num[--log->log_left] = name[i];
2481     	log->log_num[--log->log_left] = namelen;
2482     	log->log_num[--log->log_left] = SYSCTL_TYPE(node->sysctl_flags);
2483     	if (log->log_num[log->log_left] != CTLTYPE_NODE)
2484     		log->log_num[--log->log_left] = node->sysctl_ver;
2485     	else

** CID 1428649:  Null pointer dereferences  (FORWARD_NULL)
/sys/kern/subr_autoconf.c: 1402 in config_devalloc()


________________________________________________________________________________________________________
*** CID 1428649:  Null pointer dereferences  (FORWARD_NULL)
/sys/kern/subr_autoconf.c: 1402 in config_devalloc()
1396     	} else {
1397     		dev = dev_private;
1398     #ifdef DIAGNOSTIC
1399     		printf("%s has not been converted to device_t\n", cd->cd_name);
1400     #endif
1401     	}
>>>     CID 1428649:  Null pointer dereferences  (FORWARD_NULL)
>>>     Dereferencing null pointer "dev".
1402     	dev->dv_class = cd->cd_class;
1403     	dev->dv_cfdata = cf;
1404     	dev->dv_cfdriver = cd;
1405     	dev->dv_cfattach = ca;
1406     	dev->dv_activity_count = 0;
1407     	dev->dv_activity_handlers = NULL;

** CID 1428648:  Null pointer dereferences  (FORWARD_NULL)
/sys/kern/exec_elf.c: 245 in elf64_copyargs()


________________________________________________________________________________________________________
*** CID 1428648:  Null pointer dereferences  (FORWARD_NULL)
/sys/kern/exec_elf.c: 245 in elf64_copyargs()
239     
240     	vlen = (a - ai) * sizeof(ai[0]);
241     
242     	KASSERT(vlen <= sizeof(ai));
243     
244     	char *path = l->l_proc->p_path;
>>>     CID 1428648:  Null pointer dereferences  (FORWARD_NULL)
>>>     Dereferencing null pointer "execname".
245     	execname->a_v = (uintptr_t)(*stackp + vlen);
246     	len = strlen(path) + 1;
247     	if ((error = copyout(path, (*stackp + vlen), len)) != 0)
248     		return error;
249     	len = ALIGN(len);
250     

** CID 1428647:    (TAINTED_SCALAR)
/sys/dev/i2c/ihidev.c: 421 in ihidev_hid_command()
/sys/dev/i2c/ihidev.c: 421 in ihidev_hid_command()
/sys/dev/i2c/ihidev.c: 428 in ihidev_hid_command()
/sys/dev/i2c/ihidev.c: 428 in ihidev_hid_command()


________________________________________________________________________________________________________
*** CID 1428647:    (TAINTED_SCALAR)
/sys/dev/i2c/ihidev.c: 421 in ihidev_hid_command()
415     		tmprep = kmem_zalloc(report_len, KM_NOSLEEP);
416     
417     		/* type 3 id 8: 22 00 38 02 23 00 */
418     		res = iic_exec(sc->sc_tag, I2C_OP_READ_WITH_STOP, sc->sc_addr,
419     		    &cmd, cmdlen, tmprep, report_len, flags);
420     
>>>     CID 1428647:    (TAINTED_SCALAR)
>>>     Performing a byte swapping operation on "tmprep" implies that it came from an external source, and is therefore tainted.
421     		d = tmprep[0] | tmprep[1] << 8;
422     		if (d != report_len) {
423     			DPRINTF(("%s: response size %d != expected length %d\n",
424     			    sc->sc_dev.dv_xname, d, report_len));
425     		}
426     
/sys/dev/i2c/ihidev.c: 421 in ihidev_hid_command()
415     		tmprep = kmem_zalloc(report_len, KM_NOSLEEP);
416     
417     		/* type 3 id 8: 22 00 38 02 23 00 */
418     		res = iic_exec(sc->sc_tag, I2C_OP_READ_WITH_STOP, sc->sc_addr,
419     		    &cmd, cmdlen, tmprep, report_len, flags);
420     
>>>     CID 1428647:    (TAINTED_SCALAR)
>>>     Performing a byte swapping operation on "tmprep" implies that it came from an external source, and is therefore tainted.
421     		d = tmprep[0] | tmprep[1] << 8;
422     		if (d != report_len) {
423     			DPRINTF(("%s: response size %d != expected length %d\n",
424     			    sc->sc_dev.dv_xname, d, report_len));
425     		}
426     
/sys/dev/i2c/ihidev.c: 428 in ihidev_hid_command()
422     		if (d != report_len) {
423     			DPRINTF(("%s: response size %d != expected length %d\n",
424     			    sc->sc_dev.dv_xname, d, report_len));
425     		}
426     
427     		if (report_id_len == 2)
>>>     CID 1428647:    (TAINTED_SCALAR)
>>>     Performing a byte swapping operation on "tmprep" implies that it came from an external source, and is therefore tainted.
428     			d = tmprep[2] | tmprep[3] << 8;
429     		else
430     			d = tmprep[2];
431     
432     		if (d != rreq->id) {
433     			DPRINTF(("%s: response report id %d != %d\n",
/sys/dev/i2c/ihidev.c: 428 in ihidev_hid_command()
422     		if (d != report_len) {
423     			DPRINTF(("%s: response size %d != expected length %d\n",
424     			    sc->sc_dev.dv_xname, d, report_len));
425     		}
426     
427     		if (report_id_len == 2)
>>>     CID 1428647:    (TAINTED_SCALAR)
>>>     Performing a byte swapping operation on "tmprep" implies that it came from an external source, and is therefore tainted.
428     			d = tmprep[2] | tmprep[3] << 8;
429     		else
430     			d = tmprep[2];
431     
432     		if (d != rreq->id) {
433     			DPRINTF(("%s: response report id %d != %d\n",

** CID 1428646:  Null pointer dereferences  (FORWARD_NULL)
/sys/kern/kern_exec.c: 883 in execve_dovmcmds()


________________________________________________________________________________________________________
*** CID 1428646:  Null pointer dereferences  (FORWARD_NULL)
/sys/kern/kern_exec.c: 883 in execve_dovmcmds()
877     		vcp = &epp->ep_vmcmds.evs_cmds[i];
878     		if (vcp->ev_flags & VMCMD_RELATIVE) {
879     			KASSERTMSG(base_vcp != NULL,
880     			    "%s: relative vmcmd with no base", __func__);
881     			KASSERTMSG((vcp->ev_flags & VMCMD_BASE) == 0,
882     			    "%s: illegal base & relative vmcmd", __func__);
>>>     CID 1428646:  Null pointer dereferences  (FORWARD_NULL)
>>>     Dereferencing null pointer "base_vcp".
883     			vcp->ev_addr += base_vcp->ev_addr;
884     		}
885     		error = (*vcp->ev_proc)(l, vcp);
886     		if (error)
887     			DUMPVMCMDS(epp, i, error);
888     		if (vcp->ev_flags & VMCMD_BASE)

** CID 1428645:  Memory - corruptions  (NEGATIVE_RETURNS)
/sys/dev/pci/if_wm.c: 7365 in wm_send_common_locked()


________________________________________________________________________________________________________
*** CID 1428645:  Memory - corruptions  (NEGATIVE_RETURNS)
/sys/dev/pci/if_wm.c: 7365 in wm_send_common_locked()
7359     
7360     		/*
7361     		 * Set up the command byte on the last descriptor of
7362     		 * the packet.  If we're in the interrupt delay window,
7363     		 * delay the interrupt.
7364     		 */
>>>     CID 1428645:  Memory - corruptions  (NEGATIVE_RETURNS)
>>>     Using variable "lasttx" as an index to array "txq->txq_descs_u->sctxu_txdescs".
7365     		txq->txq_descs[lasttx].wtx_cmdlen |=
7366     		    htole32(WTX_CMD_EOP | WTX_CMD_RS);
7367     
7368     		/*
7369     		 * If VLANs are enabled and the packet has a VLAN tag, set
7370     		 * up the descriptor to encapsulate the packet for us.

** CID 1428644:  Null pointer dereferences  (REVERSE_INULL)
/sys/arch/x86/pci/amdzentemp.c: 170 in amdzentemp_attach()


________________________________________________________________________________________________________
*** CID 1428644:  Null pointer dereferences  (REVERSE_INULL)
/sys/arch/x86/pci/amdzentemp.c: 170 in amdzentemp_attach()
164     bad:
165     	if (sc->sc_sme != NULL) {
166     		sysmon_envsys_destroy(sc->sc_sme);
167     		sc->sc_sme = NULL;
168     	}
169     
>>>     CID 1428644:  Null pointer dereferences  (REVERSE_INULL)
>>>     Null-checking "sc->sc_sensor" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
170     	if (sc->sc_sensor != NULL) {
171     		kmem_free(sc->sc_sensor, sc->sc_sensor_len);
172     		sc->sc_sensor = NULL;
173     	}
174     }
175     

** CID 1428643:  Error handling issues  (CHECKED_RETURN)
/sys/dev/pckbport/pms.c: 240 in pmsattach()


________________________________________________________________________________________________________
*** CID 1428643:  Error handling issues  (CHECKED_RETURN)
/sys/dev/pckbport/pms.c: 240 in pmsattach()
234     	cmd[0] = PMS_DEV_DISABLE;
235     	res = pckbport_poll_cmd(pa->pa_tag, pa->pa_slot, cmd, 1, 0, NULL, 0);
236     	if (res)
237     		aprint_error("pmsattach: disable error\n");
238     	pckbport_slot_enable(sc->sc_kbctag, sc->sc_kbcslot, 0);
239     
>>>     CID 1428643:  Error handling issues  (CHECKED_RETURN)
>>>     Calling "kthread_create" without checking return value (as is done elsewhere 57 out of 66 times).
240     	kthread_create(PRI_NONE, 0, NULL, pms_reset_thread, sc,
241     	    &sc->sc_event_thread, "%s", device_xname(sc->sc_dev));
242     
243     	if (!pmf_device_register(self, pms_suspend, pms_resume))
244     		aprint_error_dev(self, "couldn't establish power handler\n");
245     }

** CID 1428642:  Integer handling issues  (BAD_SHIFT)
/sys/kern/subr_vmem.c: 934 in vmem_init()


________________________________________________________________________________________________________
*** CID 1428642:  Integer handling issues  (BAD_SHIFT)
/sys/kern/subr_vmem.c: 934 in vmem_init()
928     	vm->vm_flags = flags;
929     	vm->vm_nfreetags = 0;
930     	LIST_INIT(&vm->vm_freetags);
931     	strlcpy(vm->vm_name, name, sizeof(vm->vm_name));
932     	vm->vm_quantum_mask = quantum - 1;
933     	vm->vm_quantum_shift = SIZE2ORDER(quantum);
>>>     CID 1428642:  Integer handling issues  (BAD_SHIFT)
>>>     In expression "1UL << vm->vm_quantum_shift", shifting by a negative amount has undefined behavior.  The shift amount, "vm->vm_quantum_shift", is -1.
934     	KASSERT(ORDER2SIZE(vm->vm_quantum_shift) == quantum);
935     	vm->vm_importfn = importfn;
936     	vm->vm_releasefn = releasefn;
937     	vm->vm_arg = arg;
938     	vm->vm_nbusytag = 0;
939     	vm->vm_size = 0;

** CID 1428641:  Memory - illegal accesses  (NEGATIVE_RETURNS)
/sys/uvm/uvm_physseg.c: 1167 in uvm_physseg_seg_alloc_from_slab()


________________________________________________________________________________________________________
*** CID 1428641:  Memory - illegal accesses  (NEGATIVE_RETURNS)
/sys/uvm/uvm_physseg.c: 1167 in uvm_physseg_seg_alloc_from_slab()
1161     		 */
1162     		KASSERT(uvm.page_init_done != true);
1163     
1164     		uvm_physseg_t upmp = uvm_physseg_get_prev(upm);
1165     		KASSERT(upmp != UVM_PHYSSEG_TYPE_INVALID);
1166     
>>>     CID 1428641:  Memory - illegal accesses  (NEGATIVE_RETURNS)
>>>     Using variable "upmp" as an index to array "vm_physmem".
1167     		seg->ext = HANDLE_TO_PHYSSEG_NODE(upmp)->ext;
1168     
1169     		KASSERT(seg->ext != NULL);
1170     	}
1171     
1172     	/* We allocate enough for this segment */


________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRb2JZfDAOAZcqzsy8LMBKBj0qtSICo2DZNjmmsVjYof54PahgUQ7xLRwU5wjlAON3Q-3D_XWm3CUIFU8ffmjzuNhQ8cIHoQgXzXkm61Fmjr59D05Ud8CmvNgYmlqRwvlj8Q-2BaL9gKYL-2B-2BrFAZE2-2BtpxO9BN-2FhtsrfUXkeFblqeyC6frF6ugAD7AplhFat4Lx0uFOFelDLO3rvmIfZbj1eT-2FUgZQz6-2Fvt9ZmNwYKqBiwc8dmTEO5oQB9kspRgtRON91ez-2F2ab7zf1VarJGT-2BEm05EftXt50bbpr4y304XpAhhnLjzE-3D

To manage Coverity Scan email notifications for "coverity-updates%netbsd.org@localhost", click https://u2389337.ct.sendgrid.net/wf/click?upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRbVDbis712qZDP-2FA8y06Nq4m7U7Yoel-2F6MYPxol7ToiLwYIjoNbVQOCAwEeTNJofEDwTlN0JRhKMyijhpnAObR-2FlLVG-2Fr3EBKWgiICNdX1HPA6Ws0-2F1wHBf2tG9AnMDB8g-3D_XWm3CUIFU8ffmjzuNhQ8cIHoQgXzXkm61Fmjr59D05Ud8CmvNgYmlqRwvlj8Q-2BaL9gKYL-2B-2BrFAZE2-2BtpxO9BNxlnMnUM7kZiNDi4sLHw9L-2FafuPS9STy9y8-2B5ndkWCCqfhin4SaiG32Nlj6ltZODmf-2FUcbDT6JSuN9Y1YajqwErUkk0SuiubYg6fM6Hi9xoSIOUmw2L0tEmmDU7UImJ8y-2BfCa1PTzyv6BhAo6tTwhsM-3D



Home | Main Index | Thread Index | Old Index