> -----Original Message-----
> From: Rahul Lakkireddy [mailto:rahul.lakkireddy at chelsio.com]
> Sent: Tuesday, July 19, 2016 9:16 AM
> To: Mcnamara, John <john.mcnamara at intel.com>; dev at dpdk.org
> Cc: Kumar Sanghvi <kumaras at chelsio.com>; Nirranjan Kirubaharan
> <nirranjan at chelsio.com>; Arjun V <arjun at chelsio.com>
> Subject: Re: DPDK Coverity issue 127559
> 
> Hi all,
> 
> > 907         if (err)
> > 908                 goto out;
> > 909
> > >>>     CID 127559:    (TAINTED_SCALAR)
> > >>>     Assigning: "p" = "(u32 *)buf". Both are now tainted.
> > 910         for (p = (u32 *)buf; !err && aligned_len; aligned_len -= 4,
> p++) {
> > 911                 err = eeprom_wr_phys(adapter, aligned_offset, *p);
> > 912                 aligned_offset += 4;
> > 913         }
> > 914
> > 915         if (!err)
> >
> 
> I'm not an expert in Coverity and am having trouble understanding what the
> defect is and need some clarification.  Is it telling me that "buf"
> is being used without doing lower and upper bounds check?


Hi,

There is a lot more context when you view the defect through the Coverity web 
interface.

Basically it is saying that the data in buf comes from the user ("is tainted") 
and as such can't be trusted. Usually you need to provide some bound, or other, 
checks to protect against/untaint the data. However, in this case it looks like 
the data is coming from an eeprom rather than a "user" so it is probably a 
false positive.

However, you should look at the full context online and decide for yourself. 
Then update the status in the Coverity interface and add a comment on your 
decision.

John



Reply via email to