From: Colin King <colin.king@xxxxxxxxxxxxx> Date: Fri, 7 Apr 2017 08:57:23 +0100 > From: Colin Ian King <colin.king@xxxxxxxxxxxxx> > > There is a path where ibmr is null and ret has not been initialized > and hence a pr_warn message is printing an uninitialized value in > ret. Fix this by initializing ret to zero. > > Detected by CoverityScan, CID#1357946 ("Uninitialized scalar variable") > > Signed-off-by: Colin Ian King <colin.king@xxxxxxxxxxxxx> These are exactly the kinds of CoverityScan fixes I really do not want to see. Initializing ret to zero is not going to fix the problem. This function gets error pointers back from the functions that are used to obtain the ibmr pointer. Therefore if there is a problem ibmr won't be NULL, it will be an error pointer. Therefore, the real problem is that the code isn't checking if ibmr encodes error value. -- To unsubscribe from this list: send the line "unsubscribe kernel-janitors" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html