lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <18f3296d-e5d4-4d76-51f8-a40d0ceaa20e@canonical.com>
Date:   Tue, 7 Aug 2018 15:14:07 +0100
From:   Colin Ian King <colin.king@...onical.com>
To:     Brian Foster <bfoster@...hat.com>, darrick.wong@...cle.com,
        linux-xfs@...r.kernel.org,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: re: xfs: cancel dfops on xfs_defer_finish() error

Hi,

Recent commit 82ff27bc52a88cb5cc400bfa64e210d3ec8dfebd ("xfs: automatic
dfops buffer relogging") removed the assignment of variable error:

-       error = xfs_defer_bjoin(tp->t_dfops, bp);
        if (error) {
                xfs_trans_bhold_release(tp, bp);
                xfs_trans_brelse(tp, bp);


.. the removal of the assignment leads to dead code on the following if
statement as error is always zero at this point.  Not sure if that was
intended, but it tripped a static analysis warning from CoverityScan.


364        xfs_trans_bhold(tp, bp);

   const: At condition error, the value of error must be equal to 0.
   dead_error_condition: The condition error cannot be true.

365        if (error) {
   CID 1472288 (#1 of 1): Logically dead code (DEADCODE)
   dead_error_begin: Execution cannot reach this statement:
xfs_trans_bhold_release(tp,....


366                xfs_trans_bhold_release(tp, bp);
367                xfs_trans_brelse(tp, bp);
368                goto error1;
369        }

Colin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ