Maxim, I think this might be from your patches
Mike
---------- Forwarded message ----------
From: <[email protected]>
Date: 23 November 2014 14:11
Subject: New Defects reported by Coverity Scan for ODP
To: [email protected]
Hi,
Please find the latest report on new defect(s) introduced to ODP found with
Coverity Scan.
4 new defect(s) introduced to ODP found with Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 4 of 4 defect(s)
** CID 83058: Buffer not null terminated (BUFFER_SIZE_WARNING)
/platform/linux-generic/odp_packet_io.c: 207 in odp_pktio_open()
** CID 83059: Dereference null return value (NULL_RETURNS)
/platform/linux-generic/odp_packet_io.c: 171 in odp_pktio_open()
/platform/linux-generic/odp_packet_io.c: 182 in odp_pktio_open()
/platform/linux-generic/odp_packet_io.c: 192 in odp_pktio_open()
** CID 83060: Buffer not null terminated (BUFFER_SIZE_WARNING)
/platform/linux-generic/odp_packet_io.c: 505 in odp_pktio_set_mtu()
** CID 83061: Buffer not null terminated (BUFFER_SIZE_WARNING)
/platform/linux-generic/odp_packet_io.c: 535 in odp_pktio_mtu()
________________________________________________________________________________________________________
*** CID 83058: Buffer not null terminated (BUFFER_SIZE_WARNING)
/platform/linux-generic/odp_packet_io.c: 207 in odp_pktio_open()
201 unlock_entry(pktio_entry);
202 free_pktio_entry(id);
203 ODP_ERR("Unable to init any I/O type.\n");
204 return ODP_PKTIO_INVALID;
205
206 done:
>>> CID 83058: Buffer not null terminated (BUFFER_SIZE_WARNING)
>>> Calling strncpy with a maximum size argument of 16 bytes on
destination array "pktio_entry->s.name" of size 16 bytes might leave the
destination string unterminated.
207 strncpy(pktio_entry->s.name, dev, IFNAMSIZ);
208 unlock_entry(pktio_entry);
209 return id;
210 }
211
212 int odp_pktio_close(odp_pktio_t id)
________________________________________________________________________________________________________
*** CID 83059: Dereference null return value (NULL_RETURNS)
/platform/linux-generic/odp_packet_io.c: 171 in odp_pktio_open()
165 /* if successful, alloc_pktio_entry() returns with the
entry locked */
166
167 pktio_entry = get_entry(id);
168
169 ODP_DBG("ODP_PKTIO_USE_FANOUT: %d\n", fanout);
170 if (getenv("ODP_PKTIO_DISABLE_SOCKET_MMAP") == NULL) {
>>> CID 83059: Dereference null return value (NULL_RETURNS)
>>> Dereferencing a null pointer "pktio_entry".
171 pktio_entry->s.type = ODP_PKTIO_TYPE_SOCKET_MMAP;
172 res =
setup_pkt_sock_mmap(&pktio_entry->s.pkt_sock_mmap, dev,
173 pool, fanout);
174 if (res != -1) {
175 ODP_DBG("IO type:
ODP_PKTIO_TYPE_SOCKET_MMAP\n");
176 goto done;
/platform/linux-generic/odp_packet_io.c: 182 in odp_pktio_open()
176 goto done;
177 }
178 close_pkt_sock_mmap(&pktio_entry->s.pkt_sock_mmap);
179 }
180
181 if (getenv("ODP_PKTIO_DISABLE_SOCKET_MMSG") == NULL) {
>>> CID 83059: Dereference null return value (NULL_RETURNS)
>>> Dereferencing a null pointer "pktio_entry".
182 pktio_entry->s.type = ODP_PKTIO_TYPE_SOCKET_MMSG;
183 res = setup_pkt_sock(&pktio_entry->s.pkt_sock, dev,
pool);
184 if (res != -1) {
185 ODP_DBG("IO type:
ODP_PKTIO_TYPE_SOCKET_MMSG\n");
186 goto done;
187 }
/platform/linux-generic/odp_packet_io.c: 192 in odp_pktio_open()
186 goto done;
187 }
188 close_pkt_sock(&pktio_entry->s.pkt_sock);
189 }
190
191 if (getenv("ODP_PKTIO_DISABLE_SOCKET_BASIC") == NULL) {
>>> CID 83059: Dereference null return value (NULL_RETURNS)
>>> Dereferencing a null pointer "pktio_entry".
192 pktio_entry->s.type = ODP_PKTIO_TYPE_SOCKET_BASIC;
193 res = setup_pkt_sock(&pktio_entry->s.pkt_sock, dev,
pool);
194 if (res != -1) {
195 ODP_DBG("IO type:
ODP_PKTIO_TYPE_SOCKET_BASIC\n");
196 goto done;
197 }
________________________________________________________________________________________________________
*** CID 83060: Buffer not null terminated (BUFFER_SIZE_WARNING)
/platform/linux-generic/odp_packet_io.c: 505 in odp_pktio_set_mtu()
499
500 if (entry->s.pkt_sock_mmap.sockfd)
501 sockfd = entry->s.pkt_sock_mmap.sockfd;
502 else
503 sockfd = entry->s.pkt_sock.sockfd;
504
>>> CID 83060: Buffer not null terminated (BUFFER_SIZE_WARNING)
>>> Calling strncpy with a maximum size argument of 16 bytes on
destination array "ifr.ifr_ifrn.ifrn_name" of size 16 bytes might leave the
destination string unterminated.
505 strncpy(ifr.ifr_name, entry->s.name, IFNAMSIZ);
506 ifr.ifr_mtu = mtu;
507
508 ret = ioctl(sockfd, SIOCSIFMTU, (caddr_t)&ifr);
509 if (ret < 0) {
510 ODP_DBG("ioctl SIOCSIFMTU error\n");
________________________________________________________________________________________________________
*** CID 83061: Buffer not null terminated (BUFFER_SIZE_WARNING)
/platform/linux-generic/odp_packet_io.c: 535 in odp_pktio_mtu()
529
530 if (entry->s.pkt_sock_mmap.sockfd)
531 sockfd = entry->s.pkt_sock_mmap.sockfd;
532 else
533 sockfd = entry->s.pkt_sock.sockfd;
534
>>> CID 83061: Buffer not null terminated (BUFFER_SIZE_WARNING)
>>> Calling strncpy with a maximum size argument of 16 bytes on
destination array "ifr.ifr_ifrn.ifrn_name" of size 16 bytes might leave the
destination string unterminated.
535 strncpy(ifr.ifr_name, entry->s.name, IFNAMSIZ);
536
537 ret = ioctl(sockfd, SIOCGIFMTU, &ifr);
538 if (ret < 0) {
539 ODP_DBG("ioctl SIOCGIFMTU error\n");
540 return -1;
541 }
542
543 return ifr.ifr_mtu;
________________________________________________________________________________________________________
To view the defects in Coverity Scan visit,
http://scan.coverity.com/projects/2925?tab=overview
To unsubscribe from the email notification for new defects,
http://scan5.coverity.com/cgi-bin/unsubscribe.py
--
*Mike Holmes*
Linaro Sr Technical Manager
LNG - ODP
_______________________________________________
lng-odp mailing list
[email protected]
http://lists.linaro.org/mailman/listinfo/lng-odp