[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200804141035.46671.paul.moore@hp.com>
Date: Mon, 14 Apr 2008 10:35:46 -0400
From: Paul Moore <paul.moore@...com>
To: "Denis V. Lunev" <den@...nvz.org>
Cc: davem@...emloft.net, herbert@...dor.apana.org.au,
netdev@...r.kernel.org
Subject: Re: [PATCH 1/1 net-2.6.26] [XFRM]: Compilation warnings in xfrm_user.c.
On Monday 14 April 2008 9:03:39 am Denis V. Lunev wrote:
> When CONFIG_SECURITY_NETWORK_XFRM is undefined the following warnings
> appears: net/xfrm/xfrm_user.c: In function 'xfrm_add_pol_expire':
> net/xfrm/xfrm_user.c:1576: warning: 'ctx' may be used uninitialized
> in this function net/xfrm/xfrm_user.c: In function 'xfrm_get_policy':
> net/xfrm/xfrm_user.c:1340: warning: 'ctx' may be used uninitialized
> in this function (security_xfrm_policy_alloc is noop for the case).
>
> It seems that they are result of the commit
> 03e1ad7b5d871d4189b1da3125c2f12d1b5f7d0b
>
> Signed-off-by: Denis V. Lunev <den@...nvz.org>
> ---
> net/xfrm/xfrm_user.c | 8 ++++----
> 1 files changed, 4 insertions(+), 4 deletions(-)
>
> diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
> index b822b56..1810f56 100644
> --- a/net/xfrm/xfrm_user.c
> +++ b/net/xfrm/xfrm_user.c
> @@ -1343,14 +1343,14 @@ static int xfrm_get_policy(struct sk_buff
> *skb, struct nlmsghdr *nlh, if (err)
> return err;
>
> + ctx = NULL;
> if (rt) {
> struct xfrm_user_sec_ctx *uctx = nla_data(rt);
>
> err = security_xfrm_policy_alloc(&ctx, uctx);
> if (err)
> return err;
> - } else
> - ctx = NULL;
> + }
> xp = xfrm_policy_bysel_ctx(type, p->dir, &p->sel, ctx,
> delete, &err);
> security_xfrm_policy_free(ctx);
Thanks for catching this, I was focusing more on the runtime issues with
the else statement and forgot about compile time issues. I wonder if
it would be better to fix this in the dummy function for
security_xfrm_policy_alloc()? It seems cleaner to me.
--
paul moore
linux @ hp
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists