This generated a new Coverity warning in the latest run:
CID 458333: Null pointer dereferences (REVERSE_INULL)
/lnet/utils/lnetconfig/liblnetconfig.c: 955 in infra_ping_nid():
949 id.pid = LNET_PID_ANY;
950
951 id.nid = libcfs_str2nid(token);
952 if (id.nid == LNET_NID_ANY) {
953 snprintf(err_str, sizeof(err_str),
954 "\"cannot parse NID '%s'\"",
CID 458333: Null pointer dereferences (REVERSE_INULL)
Null-checking "token" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
955 token ? token : "NULL");
956 rc = LUSTRE_CFG_RC_BAD_PARAM;
957 cYAML_build_error(rc, seq_no, MANAGE_CMD,
958 oper, err_str, err_rc);
959 continue;
960 }
This generated a new Coverity warning in the latest run:
CID 458333: Null pointer dereferences (REVERSE_INULL)
/lnet/utils/lnetconfig/liblnetconfig.c: 955 in infra_ping_nid():
CID 458333: Null pointer dereferences (REVERSE_INULL)
Null-checking "token" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.