Details
Description
Coverity complaint #111697 Untrusted value as argument
250 }
|
6. Condition (__ret = __wt_buf_init(session, buf, bufsize)) != 0, taking false branch.
|
251 WT_RET(__wt_buf_init(session, buf, bufsize));
|
7. tainted_data_argument: Calling function __wt_read taints argument buf->mem. [show details]
|
8. Condition (__ret = __wt_read(session, block->fh, offset, size, buf->mem)) != 0, taking false branch.
|
252 WT_RET(__wt_read(session, block->fh, offset, size, buf->mem));
|
253 buf->size = size;
|
254
|
255 /*
|
256 * We incrementally read through the structure before doing a checksum,
|
257 * do little- to big-endian handling early on, and then select from the
|
258 * original or swapped structure as needed.
|
259 */
|
260 blk = WT_BLOCK_HEADER_REF(buf->mem);
|
261 __wt_block_header_byteswap_copy(blk, &swap);
|
9. Condition swap.checksum == checksum, taking true branch.
|
262 if (swap.checksum == checksum) {
|
263 blk->checksum = 0;
|
10. Condition (swap.flags & 1U) != 0, taking true branch.
|
|
CID 111697 (#1 of 1): Untrusted value as argument (TAINTED_SCALAR)
|
11. tainted_data: Passing tainted variable buf->mem to a tainted sink. (The function pointer resolves to __wt_checksum_sw.) [show details]
|