On Mon, Jun 26, 2006 at 12:59:21AM +0200, Eric Sesterhenn / Snakebyte wrote:
> * Mikael Pettersson ([email protected]) wrote:
> > On Wed, 21 Jun 2006 23:28:17 +0200, Eric Sesterhenn wrote:
> > > this fixes coverity id #554. since serial table
> > > is defines as serial_table[SERIAL_TTY_MINORS] we
> > > should make sure we dont acess with an index
> > > of SERIAL_TTY_MINORS.
> > >
> > > Signed-off-by: Eric Sesterhenn <[email protected]>
> > >
> > > --- linux-2.6.17-git2/drivers/usb/serial/usb-serial.c.orig 2006-06-21 23:24:07.000000000 +0200
> > > +++ linux-2.6.17-git2/drivers/usb/serial/usb-serial.c 2006-06-21 23:25:12.000000000 +0200
> > > @@ -83,7 +83,7 @@ static struct usb_serial *get_free_seria
> > >
> > > good_spot = 1;
> > > for (j = 1; j <= num_ports-1; ++j)
> > > - if ((i+j >= SERIAL_TTY_MINORS) || (serial_table[i+j])) {
> > > + if ((i+j >= SERIAL_TTY_MINORS-1)||(serial_table[i+j])) {
> > > good_spot = 0;
> > > i += j;
> > > break;
> >
> > Where is the access coverity complained about? If it's the serial_table[i+j]
> > quoted above, then the original code is OK since i+j < SERIAL_TTY_MINORS is
> > an invariant in that subexpression.
> >
> > And the other accesses to serial_table[] in get_free_serial() are also only
> > done when the index is < SERIAL_TTY_MINORS.
>
> guess i was too quick on that one, sorry. Here is the coverity
> report for completeness.
>
> Event assignment: Assigning "1" to "j"
> Also see events: [overrun-local]
> At conditional (11): "j <= (num_ports - 1)" taking true path
> At conditional (16): "j <= (num_ports - 1)" taking true path
>
> 85 for (j = 1; j <= num_ports-1; ++j)
>
> Event overrun-local: Overrun of static array "serial_table" of size 255
> at position 255 with index variable "(i + j)"
> Also see events: [assignment]
> At conditional (12): "(i + j) >= 255" taking true path
> At conditional (17): "(i + j) >= 255" taking false path
>
> 86 if ((i+j >= SERIAL_TTY_MINORS) ||
> (serial_table[i+j])) {
> 87 good_spot = 0;
> 88 i += j;
> 89 break;
> 90 }
So, what does this mean? That coverity is broken, yet again?
I'm getting very tired of these false positives from them, it is getting
so that I can't trust the output of the tool at all :(
thanks,
greg k-h
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]