<< "failed to create socket: " << cpp_strerror(err);
return oss.str();
}
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(&address, 0, sizeof(struct sockaddr_un));
address.sun_family = AF_UNIX;
snprintf(address.sun_path, sizeof(address.sun_path),
ldout(m_cct, 5) << "entry start" << dendl;
while (true) {
struct pollfd fds[2];
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(fds, 0, sizeof(fds));
fds[0].fd = m_sock_fd;
fds[0].events = POLLIN | POLLRDBAND;
//printf("name '%s' port '%s'\n", tok, port_str);
+ // FIPS zeroization audit 20191115: this memset is fine.
memset(&hint, 0, sizeof(hint));
hint.ai_family = AF_UNSPEC;
hint.ai_socktype = SOCK_STREAM;
string host(m[2].first, m[2].second);
string port(m[3].first, m[3].second);
addrinfo hints;
+ // FIPS zeroization audit 20191115: this memset is fine.
memset(&hints, 0, sizeof(hints));
hints.ai_family = PF_UNSPEC;
addrinfo *res;
<< "failed to create socket: " << cpp_strerror(err);
return oss.str();
}
+ // FIPS zeroization audit 20191115: this memset is fine.
memset(&address, 0, sizeof(struct sockaddr_un));
address.sun_family = AF_UNIX;
snprintf(address.sun_path, sizeof(address.sun_path),
ldout(m_cct, 5) << "entry start" << dendl;
while (true) {
struct pollfd fds[2];
+ // FIPS zeroization audit 20191115: this memset is fine.
memset(fds, 0, sizeof(fds));
fds[0].fd = m_sock_fd;
fds[0].events = POLLIN | POLLRDBAND;
}
struct sockaddr_un address;
+ // FIPS zeroization audit 20191115: this memset is fine.
memset(&address, 0, sizeof(struct sockaddr_un));
address.sun_family = AF_UNIX;
snprintf(address.sun_path, sizeof(address.sun_path), "%s", path.c_str());
ceph_assert(_raw);
ceph_assert(l <= unused_tail_length());
char* c = _raw->data + _off + _len;
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(c, 0, l);
_len += l;
return _len + _off;
{
if (crc_reset)
_raw->invalidate_crc();
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(c_str(), 0, _len);
}
ceph_assert(o+l <= _len);
if (crc_reset)
_raw->invalidate_crc();
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(c_str()+o, 0, l);
}
push_back(std::move(bp));
}
-
int buffer::list::read_file(const char *fn, std::string *error)
{
}
struct stat st;
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(&st, 0, sizeof(st));
if (::fstat(fd, &st) < 0) {
int err = errno;
f->dump_string("error", "syntax error: 'config get <var>'");
} else {
char buf[4096];
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(buf, 0, sizeof(buf));
char *tmp = buf;
int r = _conf.get_val(var.c_str(), &tmp, sizeof(buf));
* null-terminated. */
return -ENAMETOOLONG;
}
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(buf, 0, len);
return prctl(PR_GET_NAME, buf);
}
if (csz) {
p.csz = csz;
p.cache = (T**) ::operator new(csz * sizeof(T*));
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(p.cache, 0, csz * sizeof(T*));
}
locks.push_back(&p.lock);
return errno;
char data[1024*128];
// TODO: compressing filesystems would require random data
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(data, 0x42, sizeof(data));
for (off_t off = 0; off < len; off += sizeof(data)) {
if (off + static_cast<off_t>(sizeof(data)) > len)
}
char addr_buf[64];
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(addr_buf, 0, sizeof(addr_buf));
inet_ntop(family, ns_rr_rdata(rr), addr_buf, sizeof(addr_buf));
if (!addr->parse(addr_buf)) {
uint16_t priority = ns_get16(rdata); rdata += NS_INT16SZ;
rdata += NS_INT16SZ; // weight
uint16_t port = ns_get16(rdata); rdata += NS_INT16SZ;
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(full_target, 0, sizeof(full_target));
ns_name_uncompress(ns_msg_base(handle), ns_msg_end(handle),
rdata, full_target, sizeof(full_target));
lockdep_dout(1) << "lockdep start" << dendl;
if (!free_ids_inited) {
free_ids_inited = true;
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset((void*) &free_ids[0], 255, sizeof(free_ids));
}
}
held.clear();
lock_names.clear();
lock_ids.clear();
+ // FIPS zeroization audit 20191115: these memsets are not security related.
memset((void*)&follows[0][0], 0, current_maxid * MAX_LOCKS/8);
memset((void*)&follows_bt[0][0], 0, sizeof(BackTrace*) * current_maxid * MAX_LOCKS);
}
if (--refs == 0) {
if (p != lock_names.end()) {
// reset dependency ordering
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset((void*)&follows[id][0], 0, MAX_LOCKS/8);
for (unsigned i=0; i<current_maxid; ++i) {
delete follows_bt[id][i];
}
static void sanitize_object_contents (bench_data *data, size_t length) {
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(data->object_contents, 'z', length);
}
vector<snapid_t> prior_parent_snaps; // before parent_since
SnapRealmInfo() {
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(&h, 0, sizeof(h));
}
SnapRealmInfo(inodeno_t ino_, snapid_t created_, snapid_t seq_, snapid_t current_parent_since_) {
+ // FIPS zeroization audit 20191115: this memset is not security related.
memset(&h, 0, sizeof(h));
h.ino = ino_;
h.created = created_;