Re: [PATCH 05/11] xfsprogs: xfs_mdrestore: check bad read count in perform_restore

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/2/15 11:59 PM, Dave Chinner wrote:
> On Wed, Dec 02, 2015 at 10:54:19PM -0600, Eric Sandeen wrote:
>> On 12/2/15 5:19 AM, Vivek Trivedi wrote:
>>> fix error reported by coverity - Integer overflowed argument
>>>
>>> also, add print incase of invalid read count to get more debug
>>> information.
>>>
>>> Signed-off-by: Vivek Trivedi <t.vivek@xxxxxxxxxxx>
>>> ---
>>>  mdrestore/xfs_mdrestore.c |    4 ++++
>>>  1 file changed, 4 insertions(+)
>>>
>>> diff --git a/mdrestore/xfs_mdrestore.c b/mdrestore/xfs_mdrestore.c
>>> index 5764616..a87a091 100644
>>> --- a/mdrestore/xfs_mdrestore.c
>>> +++ b/mdrestore/xfs_mdrestore.c
>>> @@ -93,6 +93,10 @@ perform_restore(
>>>  	block_index = (__be64 *)((char *)metablock + sizeof(xfs_metablock_t));
>>>  	block_buffer = (char *)metablock + block_size;
>>>  
>>> +	if (block_size < sizeof(tmb))
>>> +		fatal("bad read count, block_size: %d, tmb size %d\n",
>>> +				block_size, sizeof(tmb));
>>> +
>>
>> block_size is block_size = 1 << tmb.mb_blocklog; where mb_blocklog is
>> always metablock->mb_blocklog = BBSHIFT;, so block_size is always 512.
>>
>> On the other hand, sizeof(tmb) is simply 8.
>>
>> There seems to be no possible path for this to be a problem, so it hardly
>> seems worth the printf.
>>
>> Would an ASSERT(block_size >= sizeof(tmb)) make coverity happy?
> 
> Just ignoring this coverity warning would be more appropriate, i
> think.

Or that ... FWIW this one does not even show up in the coverity scan project
as an issue.

-Eric

> Cheers,
> 
> Dave.
> 

_______________________________________________
xfs mailing list
xfs@xxxxxxxxxxx
http://oss.sgi.com/mailman/listinfo/xfs



[Index of Archives]     [Linux XFS Devel]     [Linux Filesystem Development]     [Filesystem Testing]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux