On 10/9/18 10:07 PM, Gustavo A. R. Silva wrote: > There is a potential execution path in which variable *resp_buftype* > is passed as an argument to function free_rsp_buf(), in which is used > without being properly initialized previously. > > Fix this by initializing variable *resp_buftype* to -1 in order to > avoid unpredictable or unintended results. > > Addresses-Coverity-ID: 1472116 ("Uninitialized scalar variable") > Fixes: 1473971 ("Uninitialized scalar variable") ugh... sorry, the line above is wrong... I'll send v2 shotly. Thanks -- Gustavo