** CID 182185: Memory - illegal accesses (UNINIT)
** CID 182184: Memory - illegal accesses (UNINIT)
** CID 182183: (UNINIT)
** CID 182182: Memory - illegal accesses (UNINIT)
** CID 182181: Memory - illegal accesses (UNINIT)
** CID 182180: Uninitialized variables (UNINIT)
** CID 182179: Null pointer dereferences (REVERSE_INULL)
** CID 182178: Uninitialized variables (UNINIT)
** CID 182177: Uninitialized variables (UNINIT)
Change-Id: I33e043572db493eef58d85c5096ceac5a7d41c7a
Signed-off-by: Dave Wallace <dwallacelf@gmail.com>
const char *func_str;
ssize_t size = 0;
u32 sid = vcom_sid_from_fd (fd);
const char *func_str;
ssize_t size = 0;
u32 sid = vcom_sid_from_fd (fd);
+ int rv = 0, i, total = 0;
if ((errno = -vcom_init ()))
return -1;
if ((errno = -vcom_init ()))
return -1;
const char *func_str;
ssize_t size = 0, total = 0;
u32 sid = vcom_sid_from_fd (fd);
const char *func_str;
ssize_t size = 0, total = 0;
u32 sid = vcom_sid_from_fd (fd);
/*
* Use [f]printf() instead of clib_warning() to prevent recursion SIGSEGV.
/*
* Use [f]printf() instead of clib_warning() to prevent recursion SIGSEGV.
if (((domain == AF_INET) || (domain == AF_INET6)) &&
((sock_type == SOCK_STREAM) || (sock_type == SOCK_DGRAM)))
{
if (((domain == AF_INET) || (domain == AF_INET6)) &&
((sock_type == SOCK_STREAM) || (sock_type == SOCK_DGRAM)))
{
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
rv = -1;
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
rv = -1;
if (sid != INVALID_SESSION_ID)
{
if (sid != INVALID_SESSION_ID)
{
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
size = -1;
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
size = -1;
if (sid != INVALID_SESSION_ID)
{
if (sid != INVALID_SESSION_ID)
{
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
size = -1;
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
size = -1;
int rv;
const char *func_str = __func__;
u32 sid = vcom_sid_from_fd (fd);
int rv;
const char *func_str = __func__;
u32 sid = vcom_sid_from_fd (fd);
- u32 buflen = (u32) * optlen;
+ u32 buflen = optlen ? (u32) * optlen : 0;
if ((errno = -vcom_init ()))
return -1;
if ((errno = -vcom_init ()))
return -1;
{
vppcom_endpt_t ep;
u8 src_addr[sizeof (struct sockaddr_in6)];
{
vppcom_endpt_t ep;
u8 src_addr[sizeof (struct sockaddr_in6)];
+ memset (&ep, 0, sizeof (ep));
ep.ip = src_addr;
func_str = "vppcom_session_accept";
ep.ip = src_addr;
func_str = "vppcom_session_accept";
if (sid != INVALID_SESSION_ID)
{
if (sid != INVALID_SESSION_ID)
{
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
rv = -1;
clib_warning ("LDP<%d>: LDP-TBD", getpid ());
errno = ENOSYS;
rv = -1;
int maxevents, int timeout, const sigset_t * sigmask)
{
const char *func_str;
int maxevents, int timeout, const sigset_t * sigmask)
{
const char *func_str;
double time_to_wait = (double) 0;
double time_out, now = 0;
u32 vep_idx = vcom_sid_from_fd (epfd);
double time_to_wait = (double) 0;
double time_out, now = 0;
u32 vep_idx = vcom_sid_from_fd (epfd);