cppcheck: Work around some cppcheck 2.15.0 redundantInitialization warnings
cppcheck-2.15.0 has apparently broadened when it throws a warning about redundant initialization to include some cases where we have an initializer for some fields, but then set other fields in the function body. This is arguably a false positive: although we are technically overwriting the zero-initialization the compiler supplies for fields not explicitly initialized, this sort of construct makes sense when there are some fields we know at the top of the function where the initializer is, but others that require more complex calculation. That said, in the two places this shows up, it's pretty easy to work around. The results are arguably slightly clearer than what we had, since they move the parts of the initialization closer together. So do that rather than having ugly suppressions or dealing with the tedious process of reporting a cppcheck false positive. Signed-off-by: David Gibson <david@gibson.dropbear.id.au> Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
This commit is contained in:
parent
afedc2412e
commit
748ef4cd6e
2 changed files with 6 additions and 7 deletions
3
pasta.c
3
pasta.c
|
@ -427,12 +427,12 @@ static int pasta_netns_quit_timer(void)
|
||||||
*/
|
*/
|
||||||
void pasta_netns_quit_init(const struct ctx *c)
|
void pasta_netns_quit_init(const struct ctx *c)
|
||||||
{
|
{
|
||||||
union epoll_ref ref = { .type = EPOLL_TYPE_NSQUIT_INOTIFY };
|
|
||||||
struct epoll_event ev = { .events = EPOLLIN };
|
struct epoll_event ev = { .events = EPOLLIN };
|
||||||
int flags = O_NONBLOCK | O_CLOEXEC;
|
int flags = O_NONBLOCK | O_CLOEXEC;
|
||||||
struct statfs s = { 0 };
|
struct statfs s = { 0 };
|
||||||
bool try_inotify = true;
|
bool try_inotify = true;
|
||||||
int fd = -1, dir_fd;
|
int fd = -1, dir_fd;
|
||||||
|
union epoll_ref ref;
|
||||||
|
|
||||||
if (c->mode != MODE_PASTA || c->no_netns_quit || !*c->netns_base)
|
if (c->mode != MODE_PASTA || c->no_netns_quit || !*c->netns_base)
|
||||||
return;
|
return;
|
||||||
|
@ -463,6 +463,7 @@ void pasta_netns_quit_init(const struct ctx *c)
|
||||||
ref.type = EPOLL_TYPE_NSQUIT_TIMER;
|
ref.type = EPOLL_TYPE_NSQUIT_TIMER;
|
||||||
} else {
|
} else {
|
||||||
close(dir_fd);
|
close(dir_fd);
|
||||||
|
ref.type = EPOLL_TYPE_NSQUIT_INOTIFY;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (fd > FD_REF_MAX)
|
if (fd > FD_REF_MAX)
|
||||||
|
|
10
udp.c
10
udp.c
|
@ -773,16 +773,14 @@ int udp_tap_handler(const struct ctx *c, uint8_t pif,
|
||||||
int udp_sock_init(const struct ctx *c, int ns, sa_family_t af,
|
int udp_sock_init(const struct ctx *c, int ns, sa_family_t af,
|
||||||
const void *addr, const char *ifname, in_port_t port)
|
const void *addr, const char *ifname, in_port_t port)
|
||||||
{
|
{
|
||||||
union udp_listen_epoll_ref uref = { .port = port };
|
union udp_listen_epoll_ref uref = {
|
||||||
|
.pif = ns ? PIF_SPLICE : PIF_HOST,
|
||||||
|
.port = port,
|
||||||
|
};
|
||||||
int r4 = FD_REF_MAX + 1, r6 = FD_REF_MAX + 1;
|
int r4 = FD_REF_MAX + 1, r6 = FD_REF_MAX + 1;
|
||||||
|
|
||||||
ASSERT(!c->no_udp);
|
ASSERT(!c->no_udp);
|
||||||
|
|
||||||
if (ns)
|
|
||||||
uref.pif = PIF_SPLICE;
|
|
||||||
else
|
|
||||||
uref.pif = PIF_HOST;
|
|
||||||
|
|
||||||
if (af == AF_UNSPEC && c->ifi4 && c->ifi6) {
|
if (af == AF_UNSPEC && c->ifi4 && c->ifi6) {
|
||||||
int s;
|
int s;
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue