diff options
author | Dave Barach <dave@barachs.net> | 2020-02-17 09:13:26 -0500 |
---|---|---|
committer | Andrew Yourtchenko <ayourtch@gmail.com> | 2020-08-12 15:59:46 +0000 |
commit | 18d2d6bd4a2c968707e912356a0ee02496fba2fc (patch) | |
tree | 47d60d947c26ed3538366b88fcb327fe8377d9a4 /src/vnet/session | |
parent | 84918d25541ee1173beda281554544cd168b7e65 (diff) |
misc: fix coverity warnings
Add an ALWAYS_ASSERT (...) macro, to (a) shut up coverity, and (b)
check the indicated condition in production images.
As in:
p = hash_get(...);
ALWAYS_ASSERT(p) /* was ASSERT(p) */
elt = pool_elt_at_index(pool, p[0]);
This may not be the best way to handle a specific case, but failure to
check return values at all followed by e.g. a pointer dereference
isn't ok.
Type: fix
Ticket: VPP-1837
Signed-off-by: Dave Barach <dave@barachs.net>
Change-Id: Ia97c641cefcfb7ea7d77ea5a55ed4afea0345acb
(cherry picked from commit 47d41ad62c5d6008e72d2e9c137cf8f49ca86353)
Diffstat (limited to 'src/vnet/session')
-rw-r--r-- | src/vnet/session/application_worker.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/vnet/session/application_worker.c b/src/vnet/session/application_worker.c index c45679735b9..f4321edb09f 100644 --- a/src/vnet/session/application_worker.c +++ b/src/vnet/session/application_worker.c @@ -467,7 +467,7 @@ app_worker_get_listen_segment_manager (app_worker_t * app, { uword *smp; smp = hash_get (app->listeners_table, listen_session_get_handle (listener)); - ASSERT (smp != 0); + ALWAYS_ASSERT (smp != 0); return segment_manager_get (*smp); } |