On 13/03/14 17:19, Dario Faggioli wrote:
> On gio, 2014-03-13 at 17:05 +0000, Ian Jackson wrote:
>> scan-admin@coverity.com writes ("New Defects reported by Coverity Scan for XenProject"):
>> ___________________________
>>> *** CID 1191885:  Dereference after null check  (FORWARD_NULL)
>>> /tools/misc/xen-mfndump.c: 401 in main()
>>> 400         xch = xc_interface_open(0, 0, 0);
>>>>>>     CID 1191885:  Dereference after null check  (FORWARD_NULL)
>>>>>>     Comparing "xch" to null implies that "xch" might be null.
>>> 401         if ( !xch )
>>> 402         {
>>> 403             ERROR("Failed to open an xc handler");
>>
>> This complaint is accurate.  ERROR uses xch.  (This is IMO not a
>> security problem.)
>>
> I think Andrew sent a patch (and its v2 also) about it already:
> http://www.gossamer-threads.com/lists/xen/devel/320397


Indeed I have - it has suitable acks and is pending committing now.

~Andrew