Following is reported by coverity in bug
1061528:
187 __dirty_no_modify_ret(dirty);
CID
1061528 (#1 of 1): Out-of-bounds access (OVERRUN)53. overrun-buffer-arg: Overrunning array "dinoc->di_pad" of 6 bytes by passing it to a function which accesses it at byte offset 15 using argument "16UL".
188 memset(dinoc->di_pad, 0, 16);
It seems that di_pad here should be di_pad2, as sekharan pointed out.
Signed-off-by: Li Zhong <zhong@linux.vnet.ibm.com>
Reviewed-by: Rich Johnston <rjohnston@sgi.com>
Signed-off-by: Rich Johnston <rjohnston@sgi.com>
}
for (i = 0; i < 16; i++) {
- if (dinoc->di_pad[i] != 0) {
+ if (dinoc->di_pad2[i] != 0) {
__dirty_no_modify_ret(dirty);
- memset(dinoc->di_pad, 0, 16);
+ memset(dinoc->di_pad2, 0, 16);
break;
}
}