|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [bug report] xen/scsifront: harden driver against malicious backend
Hello Juergen Gross,
This is a semi-automatic email about new static checker warnings.
The patch 6d1c2f48f3fc: "xen/scsifront: harden driver against
malicious backend" from Apr 28, 2022, leads to the following Smatch
complaint:
drivers/scsi/xen-scsifront.c:746 scsifront_sdev_configure()
warn: variable dereferenced before check 'info' (see line 743)
drivers/scsi/xen-scsifront.c
738 static int scsifront_sdev_configure(struct scsi_device *sdev)
739 {
740 struct vscsifrnt_info *info = shost_priv(sdev->host);
741 int err;
742
743 if (info->host_active == STATE_ERROR)
^^^^^^^^^^^^^^^^^
The patch assumes that shost_priv() can't return NULL
744 return -EIO;
745
746 if (info && current == info->curr) {
^^^^
But the old code assumes it can. Probably info can't be NULL and this
check can be deleted?
747 err = xenbus_printf(XBT_NIL, info->dev->nodename,
748 info->dev_state_path, "%d",
XenbusStateConnected);
749 if (err) {
750 xenbus_dev_error(info->dev, err,
751 "%s: writing dev_state_path", __func__);
752 return err;
753 }
754 }
755
756 return 0;
757 }
regards,
dan carpenter
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |