[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: New Defects reported by Coverity Scan for XenProject
On 24.01.2021 11:35, scan-admin@xxxxxxxxxxxx wrote: > *** CID 1472394: Concurrent data access violations (MISSING_LOCK) > /xen/drivers/passthrough/x86/hvm.c: 1054 in pci_clean_dpci_irq() > 1048 list_for_each_entry_safe ( digl, tmp, &pirq_dpci->digl_list, > list ) > 1049 { > 1050 list_del(&digl->list); > 1051 xfree(digl); > 1052 } > 1053 /* Note the pirq is now unbound. */ >>>> CID 1472394: Concurrent data access violations (MISSING_LOCK) >>>> Accessing "pirq_dpci->flags" without holding lock "domain.event_lock". >>>> Elsewhere, "hvm_pirq_dpci.flags" is accessed with "domain.event_lock" held >>>> 10 out of 11 times. > 1054 pirq_dpci->flags = 0; > 1055 > 1056 return pt_pirq_softirq_active(pirq_dpci) ? -ERESTART : 0; > 1057 } The only (indirect) caller of this function is ... > 1059 int arch_pci_clean_pirqs(struct domain *d) ... this one, which very clearly acquires the lock in question. Does anyone have any idea what misleads Coverity here in its conclusion, and hence possibly what may silence this? Jan
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |