Blame SOURCES/acl-2.2.52-setfacl-restore-initialize.patch

766e90
From eb123384d1e4001b62a578ec1df53aa23016aed3 Mon Sep 17 00:00:00 2001
766e90
From: Andreas Gruenbacher <agruenba@redhat.com>
766e90
Date: Fri, 17 Mar 2017 10:17:01 +0100
766e90
Subject: [PATCH] setfacl --restore: Silence valgrind
766e90
766e90
Valgrind complains that setfacl --restore triggers uninitialized memory
766e90
accesses to cmd->c_tag and cmd->c_perm of CMD_REMOVE_ACL commands in
766e90
do_set (http://savannah.nongnu.org/bugs/?50566).  In this case, the
766e90
uninitialized memory accesses have no effect.  Silence valgrind by
766e90
initializing cmd->c_tag and cmd->c_perm anyway.
766e90
766e90
Upstream-commit: 33f01b5d5bd98fceee0ba46cdbddb60b36fc650e
766e90
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
766e90
---
766e90
 setfacl/sequence.c | 9 ++++++++-
766e90
 1 file changed, 8 insertions(+), 1 deletion(-)
766e90
766e90
diff --git a/setfacl/sequence.c b/setfacl/sequence.c
766e90
index a418b23..5ed182e 100644
766e90
--- a/setfacl/sequence.c
766e90
+++ b/setfacl/sequence.c
766e90
@@ -29,7 +29,14 @@ cmd_t
766e90
 cmd_init(
766e90
 	void)
766e90
 {
766e90
-	return (cmd_t)malloc(sizeof(struct cmd_obj));
766e90
+	cmd_t cmd;
766e90
+
766e90
+	cmd = malloc(sizeof(struct cmd_obj));
766e90
+	if (cmd) {
766e90
+		cmd->c_tag = ACL_UNDEFINED_TAG;
766e90
+		cmd->c_perm = 0;
766e90
+	}
766e90
+	return cmd;
766e90
 }
766e90
 
766e90
 
766e90
-- 
766e90
2.9.4
766e90