Received: by 2002:a05:7412:1e0b:b0:fc:a2b0:25d7 with SMTP id kr11csp1105683rdb; Fri, 16 Feb 2024 05:42:55 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUfwCBGHtRIg0SsHPOWdpl8gTU7pu4Dvx2bDJ0hVuON9jEgvUmQR0VVTusFJjsYJbLKExbgsUf2WeC6SjZ4uYNfQGv0I0snXtYGpZm5Ug== X-Google-Smtp-Source: AGHT+IFMQJ/6oFovZYxoobH53wNi5Glho0kdryQRW9wVowyrx420j5XV32J9V6hcbbVZkGRUpogE X-Received: by 2002:a05:6512:2808:b0:511:9f0d:633f with SMTP id cf8-20020a056512280800b005119f0d633fmr4691320lfb.14.1708090975410; Fri, 16 Feb 2024 05:42:55 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708090975; cv=pass; d=google.com; s=arc-20160816; b=CPPFDuWwzGWeVWzuWtE4SPw7M0H4NfME9/3OQAi/Oy/e77Ix2jvdcQoAVLXUySzgeR FcENAJi+tZyHhc+dZVdMTwRGxqNqVEwr/p7kSN1DoRNL7+gp745NambYGn/ADNEVpehC CCm8QQ2J2lIm8EHPIHJUK048KTIPT2XCMYIsikNKY/nNW1tpRJJL2PeKBQisybr5SLDM I+RZLRyD5qh0ZCOhobbGscP2Z4LEg0v6JrDITJseGqTMYlGMK23+1SE+KNDTLkD0jtmZ MVJfwZo1ER3TUh+nUhxB3mnVYVa8RnMsxDrnVRsSgqO5we3yoPpa1ZOdwwjg5/7LO6I4 YtQw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:references:in-reply-to:subject:cc:to:from:message-id :date:dkim-signature:dkim-signature:dkim-signature:dkim-signature; bh=oWKVT6MP9Iw/z/Qb4mW3R2ZKCf+JaMkfekuPwkQqq7M=; fh=RqxIMMcaeRnN77Z9NTXByeZt27maI508uueYtXjeQS8=; b=mp2qBj26vXzE24QO4rL9WVjf+BKinpemd71dYt8nmoqld2zMKa/lvirUMXQS+pUKCi U1JuPBv4+a37yLl4p98rYszCrz6jBKY38jJOGonlJH4YoceCfNq3AbpkSVBfAOI2fWKg ifNBElIb35kBjef+cOS/rRruezcePK/1CvmeWEXJCr0DUYhEt2cfIj1FCmzVWQIh4/Ui VfP98xnc+hMdDgiwVXSOMn3gNIRwxd9YCehWNLPk+vOYrpxu4JuKdUBJ4W6IMYaZWb9X Kl5qpb2kl13yHzfhs4ndSpG9z+ruKyZhsfFkNVFsznBF1oU2qTvV7IZokegIQRpM3hj7 mMrA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=CnwSHGIs; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=Mt5EAkEd; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; arc=pass (i=1 spf=pass spfdomain=suse.de dkim=pass dkdomain=suse.de dkim=pass dkdomain=suse.de dmarc=pass fromdomain=suse.de); spf=pass (google.com: domain of linux-kernel+bounces-68655-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68655-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id ca6-20020a170906a3c600b00a3df1ee0c65si317882ejb.286.2024.02.16.05.42.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 16 Feb 2024 05:42:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-68655-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=CnwSHGIs; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=Mt5EAkEd; dkim=neutral (no key) header.i=@suse.de header.s=susede2_ed25519; arc=pass (i=1 spf=pass spfdomain=suse.de dkim=pass dkdomain=suse.de dkim=pass dkdomain=suse.de dmarc=pass fromdomain=suse.de); spf=pass (google.com: domain of linux-kernel+bounces-68655-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-68655-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 039891F24C3B for ; Fri, 16 Feb 2024 13:42:55 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 68A6C12B179; Fri, 16 Feb 2024 13:42:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b="CnwSHGIs"; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b="qipQblEm"; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b="Mt5EAkEd"; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b="KSekgtLT" Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7CEFB1292C0 for ; Fri, 16 Feb 2024 13:42:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=195.135.223.130 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708090965; cv=none; b=n7RJ8vLHZkl3LiS247KtJM3GYQjNMqAjblSXkKSu7l9LtqbN3M0OddlODbnwfJmkIiXvYd3k799rra/zI7iZ/j5aR/lMfFB0cknkQtUy4+QwrfO/B/wQWwmbd6BwDX9UzQMtUOH8RI32pUobZ9eRUUwmBgvIZWcrDX5AmDiTxxc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708090965; c=relaxed/simple; bh=dZ7uyX0cOG51833LkJDLHdsQYohwWy62FEueYA6oTbQ=; h=Date:Message-ID:From:To:Cc:Subject:In-Reply-To:References: MIME-Version:Content-Type; b=n27S8H1RrOFcSZ63o6wLHCvUUqoXW0cfwHnmG07ZNLkZiPlUUxM1WD0kUdzuTHrdpMCb/D0YiTIZsGodfpYlxQ9wx9AWqbju4slrUTWOf3uvS81T9+FtKWfmHyiqmTYL/L0P/3NhOIh3dUZ+GC4NFHszix/mDZxisXVfPcq5ugM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=suse.de; spf=pass smtp.mailfrom=suse.de; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b=CnwSHGIs; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b=qipQblEm; dkim=pass (1024-bit key) header.d=suse.de header.i=@suse.de header.b=Mt5EAkEd; dkim=permerror (0-bit key) header.d=suse.de header.i=@suse.de header.b=KSekgtLT; arc=none smtp.client-ip=195.135.223.130 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=suse.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.de Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 7AC1D220B0; Fri, 16 Feb 2024 13:42:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1708090960; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=oWKVT6MP9Iw/z/Qb4mW3R2ZKCf+JaMkfekuPwkQqq7M=; b=CnwSHGIsJyXgHLtt350E2mUlItnG4ACLlE3Au78hIm8bJd4b3rvA10P6MIgPmqey0Xja4u KjET5JDK7cQJiSJF5v1gpzZtzMe3ZD9uTdg3zHQPuy2N+KIa7Sfv3MfavBmZdy0BkKYJh8 NpRrBDgZCLya7MQsKkMBk/34Zp98XXM= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1708090960; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=oWKVT6MP9Iw/z/Qb4mW3R2ZKCf+JaMkfekuPwkQqq7M=; b=qipQblEmzqUh4k9zN7fNor9pvtzrDx7GPfWWIHvF3o/4PlBUCMkPlNfQeGtIgN5QxfwF84 mt0AHsQpaExR+3AA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1708090958; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=oWKVT6MP9Iw/z/Qb4mW3R2ZKCf+JaMkfekuPwkQqq7M=; b=Mt5EAkEdYDNPWwckMAG52AP8TbEC02pFgWG0i8SGI5sGEO5zrWUYRWXZgyT5S2Fpd9cWjm zRHVewPTRQNjCVklt2CbnO/XNdtxm48YkVE6SI37LWKS5cI3Z1c8EALCikh/8xHDshqquQ GisdI8IyoxPOSEIsqIGG6EOGnn4U7Kw= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1708090958; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=oWKVT6MP9Iw/z/Qb4mW3R2ZKCf+JaMkfekuPwkQqq7M=; b=KSekgtLTaBXSYETZ/UbCW9FXoFI/z286dDERw9+FVWTkndVQnCeMKSboHeI9wg0In/Ij5r YuMfWsRaHPUY3eBA== Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 2A59F13A39; Fri, 16 Feb 2024 13:42:38 +0000 (UTC) Received: from dovecot-director2.suse.de ([10.150.64.162]) by imap1.dmz-prg2.suse.org with ESMTPSA id ko8ECU5mz2VcKQAAD6G6ig (envelope-from ); Fri, 16 Feb 2024 13:42:38 +0000 Date: Fri, 16 Feb 2024 14:42:37 +0100 Message-ID: <87eddcikz6.wl-tiwai@suse.de> From: Takashi Iwai To: "Michael S. Tsirkin" Cc: Aiswarya Cyriac , jasowang@redhat.com, perex@perex.cz, tiwai@suse.com, linux-kernel@vger.kernel.org, alsa-devel@alsa-project.org, virtualization@lists.linux-foundation.org, virtio-dev@lists.oasis-open.org, Anton Yakovlev , coverity-bot Subject: Re: [v4 PATCH] ALSA: virtio: Fix "Coverity: virtsnd_kctl_tlv_op(): Uninitialized variables" warning. In-Reply-To: <20240216062630-mutt-send-email-mst@kernel.org> References: <20240216100643.688590-1-aiswarya.cyriac@opensynergy.com> <20240216062630-mutt-send-email-mst@kernel.org> User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/27.2 Mule/6.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII Authentication-Results: smtp-out1.suse.de; dkim=pass header.d=suse.de header.s=susede2_rsa header.b=Mt5EAkEd; dkim=pass header.d=suse.de header.s=susede2_ed25519 header.b=KSekgtLT X-Spamd-Result: default: False [-0.81 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; BAYES_HAM(-3.00)[100.00%]; TAGGED_RCPT(0.00)[coverity-bot]; MIME_GOOD(-0.10)[text/plain]; RCVD_COUNT_THREE(0.00)[3]; DKIM_SIGNED(0.00)[suse.de:s=susede2_rsa,suse.de:s=susede2_ed25519]; DKIM_TRACE(0.00)[suse.de:+]; MX_GOOD(-0.01)[]; RCPT_COUNT_SEVEN(0.00)[11]; MID_CONTAINS_FROM(1.00)[]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; SUSPICIOUS_RECIPS(1.50)[] X-Rspamd-Server: rspamd1.dmz-prg2.suse.org X-Spam-Score: -0.81 X-Rspamd-Queue-Id: 7AC1D220B0 X-Spam-Level: X-Spam-Flag: NO X-Spamd-Bar: / On Fri, 16 Feb 2024 12:27:48 +0100, Michael S. Tsirkin wrote: > > On Fri, Feb 16, 2024 at 11:06:43AM +0100, Aiswarya Cyriac wrote: > > This commit fixes the following warning when building virtio_snd driver. > > > > " > > *** CID 1583619: Uninitialized variables (UNINIT) > > sound/virtio/virtio_kctl.c:294 in virtsnd_kctl_tlv_op() > > 288 > > 289 break; > > 290 } > > 291 > > 292 kfree(tlv); > > 293 > > vvv CID 1583619: Uninitialized variables (UNINIT) > > vvv Using uninitialized value "rc". > > 294 return rc; > > 295 } > > 296 > > 297 /** > > 298 * virtsnd_kctl_get_enum_items() - Query items for the ENUMERATED element type. > > 299 * @snd: VirtIO sound device. > > " > > > > This warning is caused by the absence of the "default" branch in the > > switch-block, and is a false positive because the kernel calls > > virtsnd_kctl_tlv_op() only with values for op_flag processed in > > this block. > > > > Also, this commit unifies the cleanup path for all possible control > > paths in the callback function. > > > > Signed-off-by: Anton Yakovlev > > Signed-off-by: Aiswarya Cyriac > > Reported-by: coverity-bot > > Addresses-Coverity-ID: 1583619 ("Uninitialized variables") > > Fixes: d6568e3de42d ("ALSA: virtio: add support for audio controls") > > > > > --- > > sound/virtio/virtio_kctl.c | 19 +++++++++++++++---- > > 1 file changed, 15 insertions(+), 4 deletions(-) > > > > diff --git a/sound/virtio/virtio_kctl.c b/sound/virtio/virtio_kctl.c > > index 0c6ac74aca1e..7aa79c05b464 100644 > > --- a/sound/virtio/virtio_kctl.c > > +++ b/sound/virtio/virtio_kctl.c > > @@ -253,8 +253,8 @@ static int virtsnd_kctl_tlv_op(struct snd_kcontrol *kcontrol, int op_flag, > > > > tlv = kzalloc(size, GFP_KERNEL); > > if (!tlv) { > > - virtsnd_ctl_msg_unref(msg); > > - return -ENOMEM; > > + rc = -ENOMEM; > > + goto on_msg_unref; > > } > > > > sg_init_one(&sg, tlv, size); > > @@ -281,14 +281,25 @@ static int virtsnd_kctl_tlv_op(struct snd_kcontrol *kcontrol, int op_flag, > > hdr->hdr.code = > > cpu_to_le32(VIRTIO_SND_R_CTL_TLV_COMMAND); > > > > - if (copy_from_user(tlv, utlv, size)) > > + if (copy_from_user(tlv, utlv, size)) { > > rc = -EFAULT; > > - else > > + goto on_msg_unref; > > + } else { > > rc = virtsnd_ctl_msg_send(snd, msg, &sg, NULL, false); > > + } > > > > break; > > + default: > > + rc = -EINVAL; > > + /* We never get here - we listed all values for op_flag */ > > + WARN_ON(1); > > + goto on_msg_unref; > > } > > + kfree(tlv); > > + return rc; > > > > +on_msg_unref: > > + virtsnd_ctl_msg_unref(msg); > > kfree(tlv); > > > > return rc; > > I don't really like adding code for a false-positive but ALSA > maintainers seem to like this. If yes, this seems like as good > a way as any to do it. Err, no, you misunderstood the situation. I took the v1 patch quickly because: - It was with Anton's SOB, who is another maintainer of the driver - I assumed you lost interest in this driver since you haven't reacted to the previous patches for long time - The change there was small and simple enough Now, it grows unnecessarily large, and yet you complained. Why should I take it, then? This is a subtle cosmetic issue that isn't worth for wasting too much time and energy. If we want to shut up the compile warning, and this is a case where it can't happen, just put the "default:" to the existing case. If you want to be user-friendly, put some comment. That's all. It'll be a one-liner. OTOH, if we do care and want to catch any potential logical mistake, you can put WARN(). But, this doesn't have to go out as an error. Simply putting WARN() for the default and going through would work, too. Or we can keep this lengthy changes if we want, too. So, I really don't mind which way to fix as long as it works correctly (and doesn't look too ugly). Please make agreement among you guys, and resubmit if needed. thanks, Takashi