Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp6143416ybx; Mon, 11 Nov 2019 04:36:54 -0800 (PST) X-Google-Smtp-Source: APXvYqxSAgQ7V16dzge/3lMOlN9q7zbBBAtSTO4khcS/Kl9ckSUBrtTxU0YDvNMXPZFnSsgX/kMQ X-Received: by 2002:a05:6402:184e:: with SMTP id v14mr23463684edy.138.1573475814333; Mon, 11 Nov 2019 04:36:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573475814; cv=none; d=google.com; s=arc-20160816; b=Z/rvhy8x3O69sc8pTVTrhDEm5iI6Sb6475rTMqXTS3Iey5rlP8f697whu6QyDpQ5eG 4uxgjkUUOYqUP8x3SDF5Q0k6XDTLVdrNswMGdOfw5/SKRswm4kD1iug7vO0Ftze4e+T3 0TAcDZ7oE0l2BocYOJlg2fenYKaDcQ61obddxuckBhcNBZ+Sq55I7mslqXvGVPEjp0nn PMOaQLszXdbuWGAAKJBAVmdclwl8/5tavs97WF5pQzzUfhOfgWLlN14SgViNtC8ieQS8 tP7EToc/3T53gAY2RJ++b8qh3ImN6wyfLe1jWadhuew4PQvtC4YwkpmjbAsB9rLG8O11 4WXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=44dcLOS+rlkje1KCeU3hY8+kGuPYQHup57f7/Fhh/pE=; b=UigqdokX79IhK7hg5DchT6vuSbQUSqXpjXT+S1gaUdLtmD7qH7+glNZBKmRxd45aMt 7Olvx0ha5OjXfhltLJ+xPVHTVgXzjsCcsBSw0PvQ5hJ4FG429lj2VRb3S14TZIYBe6Af LMhibRmzIanKBkxsV0tf12XQCn6920Ju9IJAxcx/nhE3JOvGDkExb6Rl00WeMn9kD+Nb tIFD+/Zbezki2xwoNwPt1fBSJ/JgGSAlI7OLh8wFyUVUDoJZma8ra67C2dyB62dNhkW+ 7KCD15kEHWe4kurAz3wF7atExqNYfIGTh/YqmL8GEn8HtFRFkg5IMmCqaRLKq/Spf+hr nJ/w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h6si8548820ejt.227.2019.11.11.04.36.30; Mon, 11 Nov 2019 04:36:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727041AbfKKMdl (ORCPT + 99 others); Mon, 11 Nov 2019 07:33:41 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:48237 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726843AbfKKMdl (ORCPT ); Mon, 11 Nov 2019 07:33:41 -0500 Received: from 1.general.cking.uk.vpn ([10.172.193.212] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1iU8sx-0000T0-6M; Mon, 11 Nov 2019 12:33:35 +0000 From: Colin King To: Jon Maloy , Ying Xue , "David S . Miller" , Tuong Lien , netdev@vger.kernel.org, tipc-discussion@lists.sourceforge.net Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH][next] tipc: fix update of the uninitialized variable err Date: Mon, 11 Nov 2019 12:33:34 +0000 Message-Id: <20191111123334.68401-1-colin.king@canonical.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King Variable err is not uninitialized and hence can potentially contain any garbage value. This may cause an error when logical or'ing the return values from the calls to functions crypto_aead_setauthsize or crypto_aead_setkey. Fix this by setting err to the return of crypto_aead_setauthsize rather than or'ing in the return into the uninitialized variable Addresses-Coverity: ("Uninitialized scalar variable") Fixes: fc1b6d6de220 ("tipc: introduce TIPC encryption & authentication") Signed-off-by: Colin Ian King --- net/tipc/crypto.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/tipc/crypto.c b/net/tipc/crypto.c index 05f7ca76e8ce..990a872cec46 100644 --- a/net/tipc/crypto.c +++ b/net/tipc/crypto.c @@ -463,7 +463,7 @@ static int tipc_aead_init(struct tipc_aead **aead, struct tipc_aead_key *ukey, break; } - err |= crypto_aead_setauthsize(tfm, TIPC_AES_GCM_TAG_SIZE); + err = crypto_aead_setauthsize(tfm, TIPC_AES_GCM_TAG_SIZE); err |= crypto_aead_setkey(tfm, ukey->key, keylen); if (unlikely(err)) { crypto_free_aead(tfm); -- 2.20.1