On 2/18/2016 12:01 PM, Ian Campbell wrote:
On Wed, 2016-02-17 at 16:02 -0800, scan-ad...@coverity.com wrote:
Hi,
Please find the latest report on new defect(s) introduced to XenProject
found with Coverity Scan.
1 new defect(s) introduced to XenProject found with Coverity Scan.
4 defect(s), reported by Coverity Scan earlier, were marked fixed in the
recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 1 of 1 defect(s)
** CID 1353192: Uninitialized variables (UNINIT)
/xen/arch/x86/hvm/event.c: 176 in hvm_event_breakpoint()
This appears to have been introduced by:
commit
557c7873f35aa39bd84977b28948457b1b342f92
Author: Corneliu ZUZU <czuzu@bitdef
ender.com>
Date: Mon Feb 15 14:14:16 2016 +0100
x86: merge 2 hvm_event_... functions into 1
This patch merges almost identical functions hvm_event_int3 and
hvm_event_single_step into a single function called
hvm_event_breakpoint.
Also fixes event.c file header comment in the process.
Signed-off-by: Corneliu ZUZU < cz...@bitdefender.com >
Acked-by: Razvan Cojocaru < rcojoc...@bitdefender.com >
Acked-by: Jan Beulich < jbeul...@suse.com >
hvm_event_breakpoint calls hvm_event_traps(&req) and if sync is true that
ors some bits into req->flags which was never initialised.
_________________________________________________________________________
_______________________________
*** CID 1353192: Uninitialized variables (UNINIT)
/xen/arch/x86/hvm/event.c: 176 in hvm_event_breakpoint()
170
171 int hvm_event_breakpoint(unsigned long rip,
172 enum hvm_event_breakpoint_type type)
173 {
174 struct vcpu *curr = current;
175 struct arch_domain *ad = &curr->domain->arch;
CID 1353192: Uninitialized variables (UNINIT)
Declaring variable "req" without initializer.
176 vm_event_request_t req;
177
178 switch ( type )
179 {
180 case HVM_EVENT_SOFTWARE_BREAKPOINT:
181 if ( !ad->monitor.software_breakpoint_enabled )
_________________________________________________________________________
_______________________________
To view the defects in Coverity Scan visit, https://scan.coverity.com/pro
jects/xenproject?tab=overview
To manage Coverity Scan email notifications for
"ian.campb...@citrix.com", click https://scan.coverity.com/subscriptions/
edit?email=ian.campbell%40citrix.com&token=1ce0fc428b9f94f66fd8d1ecf6cbb7
6a
Sorry, my bad, I didn't know struct-initialization using labels sets all
the other fields to zero.
Shall I submit a fix for this issue?
Corneliu.
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel