This generated a new Coverity warning in the latest run:
CID 458333: Null pointer dereferences (REVERSE_INULL)
/lnet/utils/lnetconfig/liblnetconfig.c: 955 in infra_ping_nid():
949 id.pid = LNET_PID_ANY;
950
951 id.nid = libcfs_str2nid(token);
952 if (id.nid == LNET_NID_ANY) {
953 snprintf(err_str, sizeof(err_str),
954 "\"cannot parse NID '%s'\"",
CID 458333: Null pointer dereferences (REVERSE_INULL)
Null-checking "token" suggests that it may be null, but it has already been dereferenced on all paths leading to the check.
955 token ? token : "NULL");
956 rc = LUSTRE_CFG_RC_BAD_PARAM;
957 cYAML_build_error(rc, seq_no, MANAGE_CMD,
958 oper, err_str, err_rc);
959 continue;
960 }
"Oleg Drokin <green@whamcloud.com>" merged in patch https://review.whamcloud.com/c/fs/lustre-release/+/58623/
Subject:
LU-18751lnet: test lnetctl fault reset directlyProject: fs/lustre-release
Branch: master
Current Patch Set:
Commit: 66b196a022349f05f365744ecec7fafe8833fe2d