Bugzilla – Full Text Bug Listing |
Summary: | Integer overflow in ByteTagList | ||
---|---|---|---|
Product: | ns-3 | Reporter: | xnuvtv |
Component: | network | Assignee: | ns-bugs <ns-bugs> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | l.salameh, tomh |
Priority: | P5 | ||
Version: | ns-3-dev | ||
Hardware: | All | ||
OS: | All | ||
See Also: | https://www.nsnam.org/bugzilla/show_bug.cgi?id=2308 | ||
Attachments: | Patch that fixes m_used variable type. |
Description
xnuvtv
2015-02-19 17:19:54 UTC
Created attachment 1972 [details]
Patch that fixes m_used variable type.
We can make this change, but before we do so, I am curious how this is arising in practice. What circumstances of tag use cause m_used to grow beyond uint16_t size? I observed that in our current test suite, m_used never exceeds 5000. We ought to understand the use cases that lead to this, and whether there needs to be some benchmarking of the tag search procedure, or a test put in place for packets with large tag buffers. Regarding my question about what triggers this, we have seen accumulation of byte tags in bug 2308. I pushed the fix in commit 12287:8e753a484600 |