Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp980579ybc; Tue, 12 Nov 2019 12:13:20 -0800 (PST) X-Google-Smtp-Source: APXvYqxIWapdPR+EqpJOx8YHgYy44DwVJzHpOzX+6bTamsKPkC0oZ1Rv63Bl4BQQTf1zUnCfNX9N X-Received: by 2002:a17:907:2061:: with SMTP id qp1mr30973807ejb.43.1573589600098; Tue, 12 Nov 2019 12:13:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573589600; cv=none; d=google.com; s=arc-20160816; b=xdSLrc5gyV5tXA7saX8erzg7pFSoaJ4RMX47gfHu3D89/oTiw6o7qvHcXtbojDVfoV yovc+v2CPEMCVBkqLPSXvWyF1kjmER1RQSYHyMC4wFoHPoXYv7nD8lz5h8SJWELIXBmh LjbAqbsIZ8Kystp0eOaaGghLc4zcjK5+427dK04uHAgYH15jmFM6MGxVb8PSpnMp55F2 ydn6EM7iQTibhb0k9UDoebGMdEXP5j2TDklBJ/nUDfL+8xylI1Yq9HN4BVXPpLRRg+gO wXo+uyY43BeE6bdWJ7zdpXChMRyUSbPVjhAjCIerj+/1mzzaTUNtn8w1SOXpnA7QDC1i BIfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=kb6t3iIEPpyPCXSjvA2TdUVDzhiKnOForHSvazCOeIM=; b=Xy0xkoTCA+5DdTTeV3udVytqY9bXrdk9k2bnbZWQxkLxl4xuOW0Iej0zZtMoNKy+Oi W/Ce+IqRLNEfK15H0hOYZpiRV1Tvw5xgeikkJmRz3L8kTWOxOVkw6sFHC0+yDiVSjmaw Z9Pz79gkiZ+ozVOU7giBbTOiRavMIz677Ii6olb/1hJrMdWdM3Crnvw8QGdXiXAn5O8P breLfqZ/34eavtdsXtoK/1h0z3xhiP3Wf9n/3o7ARTC77cx1SijrtsIfSiGZ1XFNuFRk kYvq6jZGKpp69s759Zw/aYk4MD7iRJQY82Y/rv6z1EJihQh0WzerstI2CAqbQ+AGtGXq vM1Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g13si14860082eda.292.2019.11.12.12.12.53; Tue, 12 Nov 2019 12:13:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727112AbfKLUMO (ORCPT + 99 others); Tue, 12 Nov 2019 15:12:14 -0500 Received: from shards.monkeyblade.net ([23.128.96.9]:48940 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727046AbfKLUMJ (ORCPT ); Tue, 12 Nov 2019 15:12:09 -0500 Received: from localhost (unknown [IPv6:2601:601:9f00:1e2::d71]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 5411D154D2510; Tue, 12 Nov 2019 12:12:09 -0800 (PST) Date: Mon, 11 Nov 2019 22:05:29 -0800 (PST) Message-Id: <20191111.220529.1787748247936127753.davem@redhat.com> To: colin.king@canonical.com Cc: jon.maloy@ericsson.com, ying.xue@windreiver.com, tuong.t.lien@dektech.com.au, netdev@vger.kernel.org, tipc-discussion@lists.sourceforge.net, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH][next] tipc: fix update of the uninitialized variable err From: David Miller In-Reply-To: <20191111123334.68401-1-colin.king@canonical.com> References: <20191111123334.68401-1-colin.king@canonical.com> X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Tue, 12 Nov 2019 12:12:09 -0800 (PST) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin King Date: Mon, 11 Nov 2019 12:33:34 +0000 > From: Colin Ian King > > Variable err is not uninitialized and hence can potentially contain > any garbage value. This may cause an error when logical or'ing the > return values from the calls to functions crypto_aead_setauthsize or > crypto_aead_setkey. Fix this by setting err to the return of > crypto_aead_setauthsize rather than or'ing in the return into the > uninitialized variable > > Addresses-Coverity: ("Uninitialized scalar variable") > Fixes: fc1b6d6de220 ("tipc: introduce TIPC encryption & authentication") > Signed-off-by: Colin Ian King Applied.