From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dan Carpenter Subject: [PATCH 2/2] bpf: sockmap, potential uninitialized return in __sock_map_ctx_update_elem() Date: Fri, 18 May 2018 10:58:50 +0300 Message-ID: <20180518075850.GA28335@mwanda> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Daniel Borkmann , netdev@vger.kernel.org, kernel-janitors@vger.kernel.org To: Alexei Starovoitov , John Fastabend Return-path: Received: from aserp2130.oracle.com ([141.146.126.79]:48602 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752061AbeERH7Y (ORCPT ); Fri, 18 May 2018 03:59:24 -0400 Content-Disposition: inline Sender: netdev-owner@vger.kernel.org List-ID: Smatch complains that "err" might be uninitialized. That seems possible. Anyway we can just return zero. Fixes: e5cd3abcb31a ("bpf: sockmap, refactor sockmap routines to work with hashmap") Signed-off-by: Dan Carpenter diff --git a/kernel/bpf/sockmap.c b/kernel/bpf/sockmap.c index c6de1393df63..6298adb3162a 100644 --- a/kernel/bpf/sockmap.c +++ b/kernel/bpf/sockmap.c @@ -1821,7 +1821,7 @@ static int __sock_map_ctx_update_elem(struct bpf_map *map, list_add_tail(&e->list, &psock->maps); } write_unlock_bh(&sock->sk_callback_lock); - return err; + return 0; out_free: kfree(e); smap_release_sock(psock, sock);