Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp2394973rwb; Fri, 20 Jan 2023 02:17:43 -0800 (PST) X-Google-Smtp-Source: AMrXdXuahNhIVgndAA1KSq/ij3rswA/rxE/Nx8BR2Rx8Odp8BV/+8U7M/c94FL7ysHILL3573EkU X-Received: by 2002:a62:150f:0:b0:58d:b5bd:e4fe with SMTP id 15-20020a62150f000000b0058db5bde4femr16019740pfv.13.1674209863719; Fri, 20 Jan 2023 02:17:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674209863; cv=none; d=google.com; s=arc-20160816; b=bEcMt76FQ1fe7J15o/kNEUgIHkX189yRXmKIlaBoK3iL+kWmW/tdvZm2DX6S7es+D8 4g+8JYPtzhGjTGeW1dxLKnYEbCGBhgCBPW363s9+WFisT5bHoMwaM7z81G1Uz/btdt/t s1p8MmnkIIjcRQm/Eje70P4pyj2lcfQFNnsNBBsaYuHL7DrFGFvJLIpjrF4uSjgEPNx9 OQs9XFJlx9sa6dRNI+e01XP2FZobvKmS+D4fKKHxP0etx3RcmKuqtXKaAAPboXkghmnn Dd/6EUKx4k35+km9hdfoE7u69QdEbXd3HnNV+zJJWMnQSvsqwz9VTZs1Tfa0rlJoLxVM hWQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=q3/KswKUeBCcEY8xX5Z05/naHOuIY4PVX385X0umH9A=; b=lS1rpgQdOj0k1XRVDAHsPrLr0fT3sbd7Xde/XUqv+oQU5qPirLGTzZRcZoqcVb7RAs zWla75fAEb+pKjW/0zsb0G1aqlXJ74Q3yDC5lXY0sLwnV1HFdSJACq1t3gdhxvCJHDa/ sF2HwUCIIRdOMYiKTiEcVvNC8pm7afZhBlTtwmVurIABaRVfeheb+8BskoPuKH1/hHGH PGZjLuCFDZvbhXixxRK/ZuoPtSLUHnUKyNHtll4RSk3ICotEuUXVZwccakR1pSoUqAO/ pSGqaIgb+jZqPtSlq0FIO6LUMxDBpowKJJ76sOgaqjnF5oCbELHoXCYR7l/W5+jgPRfJ qwNA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h16-20020a056a00231000b005825460a640si43697290pfh.366.2023.01.20.02.17.24; Fri, 20 Jan 2023 02:17:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229629AbjATKJA (ORCPT + 99 others); Fri, 20 Jan 2023 05:09:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54800 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229494AbjATKI7 (ORCPT ); Fri, 20 Jan 2023 05:08:59 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 63E9E8B32A; Fri, 20 Jan 2023 02:08:57 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1pIoKC-002B4r-5s; Fri, 20 Jan 2023 18:08:45 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Fri, 20 Jan 2023 18:08:44 +0800 Date: Fri, 20 Jan 2023 18:08:44 +0800 From: Herbert Xu To: Tom Rix Cc: brijesh.singh@amd.com, thomas.lendacky@amd.com, john.allen@amd.com, davem@davemloft.net, nathan@kernel.org, ndesaulniers@google.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev Subject: Re: [PATCH v3] crypto: ccp: initialize 'error' variable to zero Message-ID: References: <20230110170848.3022682-1-trix@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230110170848.3022682-1-trix@redhat.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jan 10, 2023 at 12:08:48PM -0500, Tom Rix wrote: > Clang static analysis reports this problem > drivers/crypto/ccp/sev-dev.c:1347:3: warning: 3rd function call > argument is an uninitialized value [core.CallAndMessage] > dev_err(sev->dev, "SEV: failed to INIT error %#x, rc %d\n", > ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > __sev_platform_init_locked() can return without setting the > error parameter, causing the dev_err() to report a garbage > value. > > Fixes: 200664d5237f ("crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support") > Signed-off-by: Tom Rix > --- > v2 cleanup commit log > v3 cleanup commit log > --- > drivers/crypto/ccp/sev-dev.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) I think error should be removed completely on top of https://patchwork.kernel.org/project/linux-crypto/patch/20230110191201.29666-1-jarkko@profian.com/ Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt