Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp5269667rwb; Tue, 17 Jan 2023 11:17:23 -0800 (PST) X-Google-Smtp-Source: AMrXdXvX201JTrKhNP5pd8bF2v3eU7rZkil+IoaGLCzjdMlvxGl9R+1ansHVaehbI8FvO82g+PzE X-Received: by 2002:a17:90a:ad07:b0:226:ba10:14e9 with SMTP id r7-20020a17090aad0700b00226ba1014e9mr4650428pjq.12.1673983043662; Tue, 17 Jan 2023 11:17:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673983043; cv=none; d=google.com; s=arc-20160816; b=JSi67bpazskg67Tvx2x1IR8jJng5RNYpFV1QLuKvNaHL1gVrTuRkc+JLT7NZnd/p6z hbxD9ReVVZhVd6qThhmxtktYI/dyK74NIwT0/4Jj6JqTTf39lkaNHrP+0ftUv4dAi1so 71aW5cPGy7RljTJCe/e4gTMYEWuX4PXIbSF5l35mjL6ULwngXb3DFSwSJwmGUFR95o3n rT76aSI6s54w6lvIe4n1jbEF/5pdOuRCsREUfPiNWX8K0N8joGFtBicy8/4jC4whOa4Q qDkTgmgxw3zIjqsEjXHGKXNr1WF5ZiVoFAU3hVGQS+pw0O02I72piczvK7dEvc9U39ZT OlCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Q0fpJFz+uumjj7KE/lorb8wR6u11JYG6vZ+zsVfls5E=; b=QxgpCo7FUu3yY9t6Y0H8u5QChLJSsMdf6h1HXh69Loz+OYLGU9iO6HYzCsifdPRQ71 vTL/nWLsZAvJ3tvpbv9N/rohadQFi5fuCdKiWrsHe/ZFR/bxM1Yz99vGbNoJR9Z5l3ye pS6kGadgRJ0OiGBYKbAxhJ5eNthsOHZaSGXlbG5btRHrX0Ny6WwSbgyAAwej1XGOU27F pLvizURINl/+hmzvNieUoFqKpQidILiZYEYsTbX0GuCFJuXDt7cc2+sbp0VeWFeaFA7C wKD//NVLt+wkrOPnK+Euai9SqzEQuZCKfue+okl7O18qHlUz6eByk65YUCgtEPzo95Rg Ahsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=VBrRf9pT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ob5-20020a17090b390500b00229a89f4db0si2301840pjb.153.2023.01.17.11.17.05; Tue, 17 Jan 2023 11:17:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=VBrRf9pT; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232454AbjAQTPV (ORCPT + 99 others); Tue, 17 Jan 2023 14:15:21 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38028 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233914AbjAQSyX (ORCPT ); Tue, 17 Jan 2023 13:54:23 -0500 Received: from mail-pj1-x102d.google.com (mail-pj1-x102d.google.com [IPv6:2607:f8b0:4864:20::102d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5A4F45A342 for ; Tue, 17 Jan 2023 10:18:06 -0800 (PST) Received: by mail-pj1-x102d.google.com with SMTP id w4-20020a17090ac98400b002186f5d7a4cso38095537pjt.0 for ; Tue, 17 Jan 2023 10:18:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Q0fpJFz+uumjj7KE/lorb8wR6u11JYG6vZ+zsVfls5E=; b=VBrRf9pTr/4IPYNmGourNvutyd/ceeVLNpGDPjYtcjudgwi8bWs3X2fID1pp4T6P9x kCxV6g3thz6inwVNXqUomT28JPS2ASsErK+GnX32+XdchqM1ZA9rZp1L54MNryjAKc2D 3Y8dbKLBCXTr72HwAJPkq9mYKDdLlO9Ww4JA9vgJ+ariun+1gAwsRGjIgOetyIN/lKC8 pBlvSQCFm1kfkCg1oJ0Gp9WU//JwlAYAoqDqvoUs0678SECg+yGXEuLIzQdsvAU9uMH/ hlHBXvoF3ljJyon0Q4DggoJ1vVF1vkwaLkoZSDQW6aEmLBQARFMreCm7uLanSV6HKBfZ 0xCg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Q0fpJFz+uumjj7KE/lorb8wR6u11JYG6vZ+zsVfls5E=; b=yGizgE/UqrPTJnwAM0B7Pgg9a+U9yBk6SE+X/1Po2fk/SaapYqAwKHBLHcUVo8dphI K4i7sFWJx9/1IojaQUxFigL0g/w7LWqkg8sNmSRr3XgM2flZbYBryj8alE/nxdhpF6yc S8hV25i8CnYmXzDUG70rn2MlVaDUOaf429izW7byrI0WAgQZFakW+JI8VrDM4KGU3rYg 94OWb/f1GDiXLSoBOLLv411wuSiRBy1XuJfDVu3t7sTyu8/Eny5admLXEno3ATlfQcsf tuIQDDTmCp1ZJcG4ti0n6JOzh13x4hZC2rDt03octF4zK2eKDJujgF9fvlWPnY0b8hOr 6QGQ== X-Gm-Message-State: AFqh2kqpHfC0loi6tk3KbTQ2TvRzj0w+JJoBC4LZ8m6VoNNl0pvJ1Y1B gEuzyP+fgeLl7goxv0w3LiPtRxWnnmzpLYGdU4o9qQ== X-Received: by 2002:a17:90a:c784:b0:227:202b:8eaa with SMTP id gn4-20020a17090ac78400b00227202b8eaamr359677pjb.147.1673979476682; Tue, 17 Jan 2023 10:17:56 -0800 (PST) MIME-Version: 1.0 References: <20230110170848.3022682-1-trix@redhat.com> In-Reply-To: <20230110170848.3022682-1-trix@redhat.com> From: Nick Desaulniers Date: Tue, 17 Jan 2023 10:17:45 -0800 Message-ID: Subject: Re: [PATCH v3] crypto: ccp: initialize 'error' variable to zero To: Tom Rix Cc: brijesh.singh@amd.com, thomas.lendacky@amd.com, john.allen@amd.com, herbert@gondor.apana.org.au, davem@davemloft.net, nathan@kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jan 10, 2023 at 9:09 AM Tom Rix wrote: > > Clang static analysis reports this problem > drivers/crypto/ccp/sev-dev.c:1347:3: warning: 3rd function call > argument is an uninitialized value [core.CallAndMessage] > dev_err(sev->dev, "SEV: failed to INIT error %#x, rc %d\n", > ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > __sev_platform_init_locked() can return without setting the > error parameter, causing the dev_err() to report a garbage > value. > > Fixes: 200664d5237f ("crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support") > Signed-off-by: Tom Rix Thanks for the patch! Reviewed-by: Nick Desaulniers > --- > v2 cleanup commit log > v3 cleanup commit log > --- > drivers/crypto/ccp/sev-dev.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/crypto/ccp/sev-dev.c b/drivers/crypto/ccp/sev-dev.c > index 56998bc579d6..643cccc06a0b 100644 > --- a/drivers/crypto/ccp/sev-dev.c > +++ b/drivers/crypto/ccp/sev-dev.c > @@ -1307,7 +1307,7 @@ EXPORT_SYMBOL_GPL(sev_issue_cmd_external_user); > void sev_pci_init(void) > { > struct sev_device *sev = psp_master->sev_data; > - int error, rc; > + int error = 0, rc; > > if (!sev) > return; > -- > 2.27.0 > > -- Thanks, ~Nick Desaulniers