From nobody Mon Feb 9 20:31:23 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org ARC-Seal: i=1; a=rsa-sha256; t=1574749164; cv=none; d=zohomail.com; s=zohoarc; b=k5TMFY1TwToFbSoVVRtoaVyjhUX/4TzqSRJ7F0wpwNBWrtEFgyXHt+Cetg38BFQK1WFbvVI1i8FuCwHukiQ3b6HoKAF4dY99rGGFF1zynqELxR+OtjDjl/06yatn58xhDoze4GPLb9cBJbu0y85l36bimCl3PCosfmbZipT8W6g= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1574749164; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=3H7ya6IWdqagP1A8CxaB0BpK4JQs3Do/PhBO1gfcCDE=; b=BHXPB8y8/FL+tNV5ocWBUCIkmqaGWFQ+hNRug7YVGXvrbpJBHobulj+SMSFROAE8iPk/jd9w6gEeeKnMCUjvSFsXx0E5dHKbRJ+epM20vUTzxV0Bn5h07KGvv4NDljmMx1uOprTwmxzn9Z3589mkT3ybNUbH3sb8IyHE2vyywoI= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1574749164466465.5100992845545; Mon, 25 Nov 2019 22:19:24 -0800 (PST) Received: from localhost ([::1]:50436 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1iZUC2-0001e6-UP for importer@patchew.org; Tue, 26 Nov 2019 01:19:22 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:59890) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1iZU8y-0007N4-KI for qemu-devel@nongnu.org; Tue, 26 Nov 2019 01:16:13 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1iZTvJ-0004Pj-EP for qemu-devel@nongnu.org; Tue, 26 Nov 2019 01:02:06 -0500 Received: from bilbo.ozlabs.org ([203.11.71.1]:42401 helo=ozlabs.org) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1iZTvJ-0004Na-3H; Tue, 26 Nov 2019 01:02:05 -0500 Received: by ozlabs.org (Postfix, from userid 1007) id 47MYFf24d4z9sRV; Tue, 26 Nov 2019 17:01:57 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gibson.dropbear.id.au; s=201602; t=1574748118; bh=6nijnx83CIQx6smDHZhFj8k2OJ6X4c5LVR42ACAGZd0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Z5059nwb27Uc4WlsET2gHPFa5d3mWr1zoc5zP74n/XWz1pNs6Cuiy/UdTuk3HZmtm ljeuonGdJrTAfc65PMMvpAsgxjCJ84b1Pt86slnMg2P9nb4Lo75hxbZ3H28N4sU4BP 8Q2M/QDGtQdXODjD9KxQxRePbLXWQ2WGU9M6oAOM= From: David Gibson To: peter.maydell@linaro.org Subject: [PULL 8/8] ppc/spapr_events: fix potential NULL pointer dereference in rtas_event_log_dequeue Date: Tue, 26 Nov 2019 17:01:51 +1100 Message-Id: <20191126060151.729845-9-david@gibson.dropbear.id.au> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191126060151.729845-1-david@gibson.dropbear.id.au> References: <20191126060151.729845-1-david@gibson.dropbear.id.au> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] [fuzzy] X-Received-From: 203.11.71.1 X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: lvivier@redhat.com, PanNengyuan , qemu-devel@nongnu.org, groug@kaod.org, qemu-ppc@nongnu.org, clg@kaod.org, Euler Robot , David Gibson Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Content-Type: text/plain; charset="utf-8" From: PanNengyuan This fixes coverity issues 68911917: 360 CID 68911917: (NULL_RETURNS) 361. dereference: Dereferencing "source", which is known to be "NULL". 361 if (source->mask & event_mask) { 362 break; 363 } Reported-by: Euler Robot Signed-off-by: PanNengyuan Message-Id: <1574685291-38176-1-git-send-email-pannengyuan@huawei.com> Signed-off-by: David Gibson --- hw/ppc/spapr_events.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hw/ppc/spapr_events.c b/hw/ppc/spapr_events.c index 0e4c19523a..e355e000d0 100644 --- a/hw/ppc/spapr_events.c +++ b/hw/ppc/spapr_events.c @@ -358,6 +358,7 @@ static SpaprEventLogEntry *rtas_event_log_dequeue(Spapr= MachineState *spapr, rtas_event_log_to_source(spapr, spapr_event_log_entry_type(entry)); =20 + g_assert(source); if (source->mask & event_mask) { break; } --=20 2.23.0