Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

whna: add HNA6 support #1

Open
cl4u2 opened this issue Jul 5, 2012 · 0 comments
Open

whna: add HNA6 support #1

cl4u2 opened this issue Jul 5, 2012 · 0 comments

Comments

@cl4u2
Copy link
Member

cl4u2 commented Jul 5, 2012

Add support for IPv6

zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739703 (#1 of 1): Missing varargs init or cleanup (VARARGS)
At (4): va_end was not called for "ap2".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739679 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (24): Variable "fd" going out of scope leaks the storage it points to.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739696 (#1 of 1): Time of check time of use (TOCTOU)
At (1): Calling function "stat(char const * restrict,
                               struct stat * restrict)"
        to perform check on "fileName".
At (4): Calling function "fopen(char const * restrict,
                                char const * restrict)"
        that uses "fileName" after a check function. This can cause a
        time-of-check, time-of-use race condition.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739645 (#1 of 1): Explicit null dereferenced (FORWARD_NULL)
At (18): Passing null pointer "&gw_best->originator.v4" to function
         "ip4cmp(struct in_addr const *, struct in_addr const *)", which
         dereferences it.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739627 (#1 of 1): Copy-paste error (COPY_PASTE_ERROR)
"lat" in "pos->lat" looks like a copy-paste error.
Should it say "lon" instead?

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739668 (#1 of 1): Out-of-bounds write (OVERRUN)
At (10): Overrunning array of 64 bytes at byte offset 64 by dereferencing
         pointer "psSatPrn".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739669 (#1 of 1): Out-of-bounds write (OVERRUN)
At (11): Overrunning array of 64 bytes at byte offset 64 by dereferencing
         pointer "psSatInfo".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739674 (#1 of 1): Printf format string issue (PW.BAD_PRINTF_FORMAT_STRING)
At (1): invalid format string conversion

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:
    CID 739665 (#1 of 1): Argument cannot be negative (NEGATIVE_RETURNS)
    At (17): "ifp->olsr_socket" is passed to a parameter that cannot be negative.

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:

    CID 739610 (#1 of 1): Incorrect sizeof expression (BAD_SIZEOF)
    Taking the size of pointer parameter "lower_border_ip" is suspicious.

    CID 739611 (#1 of 1): Incorrect sizeof expression (BAD_SIZEOF)
    Taking the size of pointer parameter "upper_border_ip" is suspicious.

    CID 739692 (#1 of 2): Wrong sizeof argument (SIZEOF_MISMATCH)
    Passing argument "lower_border_ip" of type "union olsr_ip_addr *" and argument "8UL /* sizeof (lower_border_ip) */" to function "memset(void *, int, size_t)" is suspicious. Did you intend to use "sizeof(*lower_border_ip)" instead of "sizeof (lower_border_ip)" ?

    CID 739692 (#2 of 2): Wrong sizeof argument (SIZEOF_MISMATCH)
    Passing argument "upper_border_ip" of type "union olsr_ip_addr *" and argument "8UL /* sizeof (upper_border_ip) */" to function "memset(void *, int, size_t)" is suspicious. Did you intend to use "sizeof(*upper_border_ip)" instead of "sizeof (upper_border_ip)" ?

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:

    CID 739683 (#1 of 1): Resource leak (RESOURCE_LEAK)
    At (14): Variable "net_msg" going out of scope leaks the storage it points to.

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:

    CID 739643 (#1 of 1): Division or modulo by zero (DIVIDE_BY_ZERO)
    At (29): In expression "bat_val * 100 / bat_max", division by expression "bat_max" which may be zero has undefined behavior.

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:

    CID 739685 (#1 of 1): Resource leak (RESOURCE_LEAK)
    At (8): Handle variable "sock" going out of scope leaks the handle.

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739671 (#1 of 1): Printf format string issue (PW.BAD_PRINTF_FORMAT_STRING)
At (1): invalid format string conversion

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739704 (#1 of 1): Argument cannot be negative (NEGATIVE_RETURNS)
At (7): "fd" is passed to a parameter that cannot be negative.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739637 (#1 of 1): Logically dead code (DEADCODE)
Execution cannot reach this expression ""false"" inside statement
"pudError(false, "Received w...".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739680 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (32): Variable "fd" going out of scope leaks the storage it points to.

CID 739697 (#1 of 1): Time of check time of use (TOCTOU)
At (1): Calling function "stat(char const * restrict,
                               struct stat * restrict)"
        to perform check on "fileName".
At (4): Calling function "fopen(char const * restrict,
                                char const * restrict)"
        that uses "fileName" after a check function. This can cause a
        time-of-check, time-of-use race condition.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:

    CID 739613 (#1 of 1): Buffer not null terminated (BUFFER_SIZE_WARNING)
    At (6): Calling strncpy with a maximum size argument of 16 bytes on destination array "t->if_name" of size 16 bytes might leave the destination string unterminated.

    CID 739614 (#1 of 3): Buffer not null terminated (BUFFER_SIZE_WARNING)
    At (4): Calling strncpy with a maximum size argument of 16 bytes on destination array "p4.name" of size 16 bytes might leave the destination string unterminated.

    CID 739614 (#2 of 3): Buffer not null terminated (BUFFER_SIZE_WARNING)
    At (4): Calling strncpy with a maximum size argument of 16 bytes on destination array "p6.name" of size 16 bytes might leave the destination string unterminated.

    CID 739614 (#3 of 3): Buffer not null terminated (BUFFER_SIZE_WARNING)
    At (5): Calling strncpy with a maximum size argument of 16 bytes on destination array "ifr.ifr_ifrn.ifrn_name" of size 16 bytes might leave the destination string unterminated.

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:

    CID 739622 (#1 of 1): Unchecked return value (CHECKED_RETURN)
    At (8): Calling function "inet_pton(int, char const * restrict, void * restrict)" without checking return value (as is done elsewhere 22 out of 25 times).

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
    Coverity:

    CID 739686 (#1 of 3): Resource leak (RESOURCE_LEAK)
    At (8): Handle variable "fd" going out of scope leaks the handle.

    CID 739686: Resource leak (RESOURCE_LEAK)
    At (12): Handle variable "fd" going out of scope leaks the handle.

    CID 739686: Resource leak (RESOURCE_LEAK)
    At (14): Handle variable "fd" going out of scope leaks the handle.

    Signed-off-by: Henning Rogge <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739615 (#1 of 1): Truncated stdio return value (CHAR_IO)
Assigning the return value of "fgetc(FILE *)" to char "EthTapSpoofState"
truncates its value.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739657 (#1 of 1): Argument cannot be negative (NEGATIVE_RETURNS)
At (12): "listeningSkfd" is passed to a parameter that cannot be negative.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739667 (#1 of 1): Dereference null return value (NULL_RETURNS)
At (31): Dereferencing a null pointer "bestIntf".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739658 (#1 of 1): Argument cannot be negative (NEGATIVE_RETURNS)
At (5): "client_socket" is passed to a parameter that cannot be negative.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739676 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (18): Handle variable "client_socket" going out of scope leaks the
handle.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739678 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (24): Handle variable "fd" going out of scope leaks the handle.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739689 (#1 of 1): Wrong sizeof argument (SIZEOF_MISMATCH)
  Passing argument "ip" of type "union olsr_ip_addr *" and argument
  "8UL /* sizeof (ip) */" to function "memset(void *, int, size_t)" is
  suspicious. Did you intend to use "sizeof(*ip)" instead of "sizeof (ip)"?

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739618 (#1 of 1): Unchecked return value (CHECKED_RETURN)
At (4): Calling function "fcntl(fd, 4, 1)" without checking return value.
        This library function may fail and return an error code.
At (5): No check of the return value of "fcntl(fd, 4, 1)".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739644 (#1 of 1): Dereference after null check (FORWARD_NULL)At (11): Passing null pointer "add_hosts" to function "fclose(FILE *)", which dereferences it.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739633 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression "127" inside statement
  "tmp->len = ((len_of_name > ...".
  (The condition "len_of_name > 127U" cannot be true.)

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Since it's used as a string.

Coverity:
CID 739693 (#1 of 1): String not null terminated (STRING_NULL)
At (2): Function "fread(void * restrict, size_t, size_t, FILE * restrict)"
        does not terminate string "*uuid".
At (4): Passing unterminated string "uuid" to "strchr(char const *, int)",
        which expects a null-terminated string.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739629 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression ""auto"" inside statement
  "v4 = (autoV4 ? "auto" : "s");".
CID 739630 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression ""auto"" inside statement
  "v6 = (autoV6 ? "auto" : "s");".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739666 (#1 of 1): Array compared against 0 (NO_EFFECT)
  Comparing an array to null is not useful: "linkpath != NULL".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739612 (#1 of 1): Buffer not null terminated (BUFFER_SIZE)
At (5): Calling strncpy with a source string whose length (4 chars) is
        greater than or equal to the size argument (4) will fail to
        null-terminate "hello->head".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739631 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression ""enable"" inside statement
  "BmfPError("Could not %s mul...".
CID 739632 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression ""disable"" inside statement
  "BmfPError("Could not %s mul...".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739659 (#1 of 1): Argument cannot be negative (NEGATIVE_RETURNS)
At (7): "capturingSkfd" is passed to a parameter that cannot be negative.
CID 739660 (#1 of 1): Argument cannot be negative (NEGATIVE_RETURNS)
At (8): "electionSkfd" is passed to a parameter that cannot be negative.
CID 739661 (#1 of 1): Argument cannot be negative (NEGATIVE_RETURNS)
At (9): "helloSkfd" is passed to a parameter that cannot be negative.

CID 739656 (#6 of 14): Argument cannot be negative (NEGATIVE_RETURNS)
At (7): "capturingSkfd" is passed to a parameter that cannot be negative.
CID 739656 (#9 of 14): Argument cannot be negative (NEGATIVE_RETURNS)
At (7): "electionSkfd" is passed to a parameter that cannot be negative.
CID 739656 (#10 of 14): Argument cannot be negative (NEGATIVE_RETURNS)
At (7): "helloSkfd" is passed to a parameter that cannot be negative.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739616 (#1 of 2): Unchecked return value (CHECKED_RETURN)
At (8): Calling function "inet_pton(int, char const * restrict,
                                    void * restrict)" without checking
        return value (as is done elsewhere 23 out of 25 times).
At (9): No check of the return value of "inet_pton(2, "224.0.0.2",
        &mc_settings.imr_multiaddr.s_addr)".

CID 739616 (#2 of 2): Unchecked return value (CHECKED_RETURN)
At (7): Calling function "inet_pton(int, char const * restrict,
                                    void * restrict)" without checking
        return value (as is done elsewhere 23 out of 25 times).
At (8): No check of the return value of "inet_pton(10, "ff02::2",
        &mc6_settings.ipv6mr_multiaddr.__in6_u.__u6_addr8)".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739617 (#1 of 1): Unchecked return value (CHECKED_RETURN)
At (7): Calling function "sendto(walker->helloSkfd, (char const *)hello,
        25UL, 0, (struct sockaddr *)&dest, 16U)" without checking return
        value. This library function may fail and return an error code.
At (8): No check of the return value of "sendto(walker->helloSkfd, (
        char const *)hello, 25UL, 0, (struct sockaddr *)&dest, 16U)".

CID 739617 (#2 of 2): Unchecked return value (CHECKED_RETURN)
At (7): Calling function "sendto(walker->helloSkfd, (char const *)hello,
        25UL, 0, (struct sockaddr *)&dest6, 28U)" without checking
        return value. This library function may fail and return an error
        code.
At (8): No check of the return value of "sendto(walker->helloSkfd, (
        char const *)hello, 25UL, 0, (struct sockaddr *)&dest6, 28U)".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739634 (#1 of 1): Dead default in switch (DEADCODE)
  Execution cannot reach this statement "default:".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
CID 739656 (#1 of 4): Argument cannot be negative (NEGATIVE_RETURNS)
At (7): "encapsulatingSkfd" is passed to a parameter that cannot be
        negative.
CID 739656 (#2 of 4): Argument cannot be negative (NEGATIVE_RETURNS)
At (9): "encapsulatingSkfd" is passed to a parameter that cannot be
        negative.
CID 739656 (#3 of 4): Argument cannot be negative (NEGATIVE_RETURNS)
At (12): "capturingSkfd" is passed to a parameter that cannot be
         negative.
CID 739656 (#4 of 4): Argument cannot be negative (NEGATIVE_RETURNS)
At (11): "encapsulatingSkfd" is passed to a parameter that cannot be
         negative.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739635 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression ""disable"" inside statement
  "pudError(true, "Could not %...".

CID 739636: Logically dead code (DEADCODE)
  Execution cannot reach this expression ""enable"" inside statement
  "pudError(true, "Could not %...".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739681 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (21): Variable "walker" going out of scope leaks the storage it points to.
At (22): Variable "mess" going out of scope leaks the storage it points to.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739639 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression "97" inside statement
  "v4 = (autoV4 ? 97 : 115);".
CID 739640 (#1 of 1): Logically dead code (DEADCODE)
  Execution cannot reach this expression "97" inside statement
  "v6 = (autoV6 ? 97 : 115);".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739670 (#1 of 1): Out-of-bounds access (OVERRUN)
At (46): Overrunning struct type in_addr of 4 bytes by passing it to a
         function which accesses it at byte offset 15 using argument
         "16UL".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739682 (#1 of 2): Resource leak (RESOURCE_LEAK)
At (84): Variable "in" going out of scope leaks the storage it points to.
CID 739682 (#2 of 2): Resource leak (RESOURCE_LEAK)
At (89): Variable "in" going out of scope leaks the storage it points to.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739688 (#1 of 1): Dereference before null check (REVERSE_INULL)
Null-checking "in->cnf" suggests that it may be null, but it has already
been dereferenced on all paths leading to the check.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739684 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (6): Variable "apm_procfile" going out of scope leaks the storage it
        points to.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739687 (#1 of 1): Resource leak (RESOURCE_LEAK)
At (16): Variable "oc" going out of scope leaks the storage it points to.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739652 (#1 of 1): Explicit null dereferenced (FORWARD_NULL)
At (88): Dereferencing null pointer "info_head".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739653 (#1 of 1): Explicit null dereferenced (FORWARD_NULL)
At (11): Passing null pointer "last_ip" to function
         "calculate_border_flag(void *, void *)", which dereferences it.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739695 (#1 of 1): Use of untrusted scalar value (TAINTED_SCALAR)
At (23): Using tainted variable "bat_max" as the divisor in
         "bat_val * 100 / bat_max".

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739649 (#1 of 1): Dereference after null check (FORWARD_NULL)
At (5): Passing null pointer "dest" to function
        "strncpy(char * restrict, char const * restrict, size_t)", which
        dereferences it.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739655 (#1 of 1): Dereference after null check (FORWARD_NULL)
At (8): Passing null pointer "&branding->cmb_sig" to function
        "memcpy(void * restrict, void const * restrict, size_t)", which
        dereferences it.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
CID 739624 (#1 of 1): Unchecked return value (CHECKED_RETURN)
At (34): Calling function "ipc_init()" without checking return value. It wraps a library function that may fail and return an error code.
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 742357 (#1 of 1): Incorrect sizeof expression (BAD_SIZEOF)
Taking the size of arithmetic expression "512 + 1" is suspicious.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 742358 (#1 of 1): Copy into fixed size buffer (STRING_OVERFLOW)
At (1): You might overrun the 255 byte fixed-size string "title" by
        copying the return value of "ip_to_string(union olsr_ip_addr *)"
        without checking the length.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 742359 (#1 of 1): Copy into fixed size buffer (STRING_OVERFLOW)
At (2): You might overrun the 10 byte fixed-size string "tmp" by copying
        the return value of "g_locale_to_utf8(gchar const *, gssize,
        gsize *, gsize *, GError **)" without checking the length.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Nov 15, 2012
Coverity:
CID 739690 (#1 of 1): Extra sizeof expression (SIZEOF_MISMATCH)
Adding "4UL /* sizeof (haddr->v4) */" to pointer "haddr" of
type "union olsr_ip_addr *" is suspicious because adding an integral
value to this pointer automatically scales that value by the size,
16 bytes, of the pointed-to type, "union olsr_ip_addr". Most likely,
"sizeof (haddr->v4)" is extraneous and should be replaced with 1.

CID 739691 (#1 of 1): Extra sizeof expression (SIZEOF_MISMATCH)
Adding "4UL /* sizeof (haddr->v4) */" to pointer "haddr" of
type "union olsr_ip_addr *" is suspicious because adding an integral
value to this pointer automatically scales that value by the size,
16 bytes, of the pointed-to type, "union olsr_ip_addr". Most likely,
"sizeof (haddr->v4)" is extraneous and should be replaced with 1.

Signed-off-by: Ferry Huberts <[email protected]>
zioproto pushed a commit that referenced this issue Feb 20, 2013
CID 739626 (#1 of 2): Operands don't affect result (CONSTANT_EXPRESSION_RESULT)
CID 739626 (#2 of 2): Operands don't affect result (CONSTANT_EXPRESSION_RESULT)
gabri94 pushed a commit to gabri94/olsrd that referenced this issue Apr 28, 2016
==12076==ERROR: LeakSanitizer: detected memory leaks

Direct leak of 7 byte(s) in 1 object(s) allocated from:
    #0 0x499bba in __interceptor_malloc (/home/ferry/vcs/nbs/nbsolsrd/olsrd+0x499bba)
    ninuxorg#1 0x5784cd in get_string_token src/cfgparser/oscan.lex:92
    ninuxorg#2 0x578ef7 in yylex src/cfgparser/oscan.lex:185
    ninuxorg#3 0x5699c4 in yyparse src/cfgparser/oparse.c:1686
    ninuxorg#4 0x55e322 in olsrd_parse_cnf src/cfgparser/olsrd_conf.c:158
    ninuxorg#5 0x4edf56 in olsrmain_load_config src/main.c:281
    ninuxorg#6 0x4ee5e6 in main src/main.c:386
    #7 0x7fd24079757f in __libc_start_main (/lib64/libc.so.6+0x2057f)

SUMMARY: AddressSanitizer: 7 byte(s) leaked in 1 allocation(s).

Signed-off-by: Ferry Huberts <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant