[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [for-4.15] Re: [PATCH XENSTORE v1 00/10] Code analysis fixes


  • To: Julien Grall <julien@xxxxxxx>, Norbert Manthey <nmanthey@xxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Mon, 1 Mar 2021 19:39:37 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=K57017YMNXRpO3MY3QcSzcXK9lKnE84DB0+wh2OlDw0=; b=SEQj2Z6dgj7ehvMri7tALddPhmVOBuMUTqXl5TFSrebkRlVwHjj0TVUnaXfk6Wo89UtiuRsuOk+uFzzm2m235+2jpwgomYNk/nglE2DBN3V/RxfMOvUbo3129h2bRGj79tl0YYv4XpLpTL+88WrYMbwFW3l8mHl5A883rvN1j++P95s1oPrrRp/s/1doaPF9miE1AJhrbVvRfQRk6HKijeVUw8ZM+sQIhnULX7f2tIdQ9k8gMK/AGay6aV03usfzN28vbvHlNcQrK+NSFJrDjBYtCwaVn6+4AOxnIx5ir8IsPd8Vu22lAsMKFIEZf2apnxROd0pB/aLSXtTD1TKF2g==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eDSQUeUvRZcKDJZPHLTMt+QPCNEiXuiZ7RFK6MnC7faI7Rg4BlYYeQSl/4Twtp/5FlRUxf4XLmUzImxQFHZtEqxc8f7ogJI5l0pGkQd/1lWT5PMPJ4W3mXn16hJymIZiTfuFLuD0AbIQdEHbkZ83jFa2m3VBoPR2VhJrt0FPqp5cNJtNNcXreLuVLSMpsYCbv1/s3yqdIQf2Q/nysJWDPv2K9Te7NE1sIM4oZWsP26xhbn6Ct4E/dviT+L2nnB2TvZzgzQv0JhNogDViTqczjznVpoOYtVwkCWlX3Twxt6/hxvCx3XZvQ1qbRt0BmeeR+fTtpYdGj7Iu31K9XwaYnA==
  • Authentication-results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Ian Jackson <iwj@xxxxxxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, Julien Grall <jgrall@xxxxxxxxxxxx>, Michael Kurth <mku@xxxxxxxxx>
  • Delivery-date: Mon, 01 Mar 2021 19:40:13 +0000
  • Ironport-sdr: y5ld+cTLDv8A7u1j6WCrYBQrAknbR4MrSxkz4noFOBdjeqao9TjJSeoZ98xqyS5NRRD/9O0SjN ztF1IC5tjvXTMo/hGrqWrO9qXffPDfAXPqXGM66jI55w9va00A/Ju5ZJkvmhW3/Ti8Nac6c3Co t1S0Ghr7SfKYxzsqXFZBy47LXVhJxOSKXyIqD3lF9hmkeQNGjaLkxZNdg/12fwIVqO/kj7KTR4 2W1zK1Su3OejiPOroj1gUREGAKkOMtyYrSDCd4j6JJMc2X9x85F/IdcPtOuopUIcOb/tNEBsQo aJA=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 01/03/2021 18:01, Julien Grall wrote:
> Hi,
>
> I have tagged the e-mail with 4.15 as I think we likely want some of
> the patches to be in the next release.
>
> As a minimum, we get the following:
>   - patch #7: xenstore: handle do_mkdir and do_rm failure
>   - patch #8: xenstore: add missing NULL check
>   - patch #10: xs: add error handling
>
> The first two add missing NULL check in runtime code in XenStored. The
> 3rd one adds a missing NULL check in xs_is_domain_introduced() in
> libxenstore (can be used at runtime by xenpaging at least).
>
> In addition to that, I would like to consider patch #3: xenstore:
> check formats of trace. It is allowing the compiler to check the
> format printf for trace(). This should be low-risk.
>
> For the rest is a mix of silencing coverity and potential errors
> either at init or in a standalone binaries.
>
> The init ones would be useful (patch #1, #5, #9) for Xenstored
> LiveUpdate as they would be potential triggered when upgrading the
> binary. But I am not sure whether we consider LiveUpdate supported.
>
> Any thoughts?

Live Update is a headline feature, even if only tech preview.

I'd say that all bugfixes are fair game, and low risk.  All these fixes
(other than the evtchn one which has an outstanding question) look to be
reasonable to take.  They're all simple and obvious fixes pointed out by
static analysis.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.