Re: Help needed with Coverity - How to remove tainted_data_argument?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




----- Original Message -----
> From: "Niels de Vos" <ndevos@xxxxxxxxxx>
> To: "Atin Mukherjee" <amukherj@xxxxxxxxxx>
> Cc: "Gluster Devel" <gluster-devel@xxxxxxxxxxx>
> Sent: Wednesday, December 17, 2014 2:21:50 PM
> Subject: Re:  Help needed with Coverity - How to remove tainted_data_argument?
> 
> On Wed, Dec 17, 2014 at 01:54:09PM +0530, Atin Mukherjee wrote:
> > 
> > 
> > On 12/17/2014 01:01 PM, Lalatendu Mohanty wrote:
> > > On 12/17/2014 12:56 PM, Krishnan Parthasarathi wrote:
> > >> I was looking into a Coverity issue (CID 1228603) in GlusterFS.
> > >> I sent a patch[1] before I fully understood why this was an issue.
> > >> After searching around in the internet for explanations, I identified
> > >> that
> > >> the core issue was that a character buffer, storing parts of a file
> > >> (external I/O),
> > >> was marked tainted. This taint spread wherever the buffer was used.
> > >> This seems
> > >> acceptable in the context of static analysis. How do we indicate to
> > >> Coverity that
> > >> the 'taint' would cause no harm as speculated?
> > >>
> > >> [1] - Coverity fix attempt: http://review.gluster.org/#/c/9286/
> > >> [2] - CID 1228603:  Use of untrusted scalar value  (TAINTED_SCALAR):
> > >>        glusterd-utils.c: 2131 in glusterd_readin_file()
> > >>
> > >> thanks,
> > >> kp
> > >> _______________________________________________
> > >> Gluster-devel mailing list
> > >> Gluster-devel@xxxxxxxxxxx
> > >> http://supercolony.gluster.org/mailman/listinfo/gluster-devel
> > > KP,
> > > 
> > > We can mark the CID in Coverity scan website that it is not an issue
> > > (i.e. as designed) and it would stop reporting it as a bug.
> > Question is whether coverity will stop reporting on such occurrences in
> > other places in future, my guess is no. Idea is to make coverity
> > understand that this pattern should not be reported further.
> 
> This pattern can be dangerous. I think we need to review all occurences
> and mark each occurence as 'intentional' or 'not a bug' if the usage is
> safe. The unsafe occurences would receive a patch.

+1. We should analyse each occurrence, there could be a potential unsafe usage
as well.

> 
> Niels
> 
> _______________________________________________
> Gluster-devel mailing list
> Gluster-devel@xxxxxxxxxxx
> http://supercolony.gluster.org/mailman/listinfo/gluster-devel
> 
_______________________________________________
Gluster-devel mailing list
Gluster-devel@xxxxxxxxxxx
http://supercolony.gluster.org/mailman/listinfo/gluster-devel




[Index of Archives]     [Gluster Users]     [Ceph Users]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux