* Fwd: New Defects reported by Coverity Scan for Linux
@ 2017-11-27 13:22 Richard Weinberger
2017-11-27 14:19 ` Andrea Adami
0 siblings, 1 reply; 3+ messages in thread
From: Richard Weinberger @ 2017-11-27 13:22 UTC (permalink / raw)
To: andrea.adami; +Cc: linux-mtd
Andrea,
please check. The same pattern seems to be used more than once in this driver.
Thanks,
//richard
---------- Weitergeleitete Nachricht ----------
Betreff: New Defects reported by Coverity Scan for Linux
Datum: Montag, 27. November 2017, 08:49:21 CET
Von: scan-admin@coverity.com
An: richard@nod.at
Hi,
Please find the latest report on new defect(s) introduced to Linux, under
component 'Drivers-MTD', found with Coverity Scan.
1 new defect(s) introduced to Linux, under component 'Drivers-MTD', found
with Coverity Scan.
344 defect(s), reported by Coverity Scan earlier, were marked fixed in the
recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 1 of 1 defect(s)
** CID 1424016: Integer handling issues (OVERFLOW_BEFORE_WIDEN)
/drivers/mtd/parsers/sharpslpart.c: 195 in sharpsl_nand_init_ftl()
________________________________________________________________________________________________________
*** CID 1424016: Integer handling issues (OVERFLOW_BEFORE_WIDEN)
/drivers/mtd/parsers/sharpslpart.c: 195 in sharpsl_nand_init_ftl()
189 /* initialize ftl->log2phy */
190 for (i = 0; i < ftl->logmax; i++)
191 ftl->log2phy[i] = UINT_MAX;
192
193 /* create physical-logical table */
194 for (block_num = 0; block_num < phymax; block_num++) {
>>> CID 1424016: Integer handling issues (OVERFLOW_BEFORE_WIDEN)
>>> Potentially overflowing expression "block_num * mtd->erasesize" with
type "unsigned int" (32 bits, unsigned) is evaluated using 32-bit arithmetic,
and then used in a context that expects an expression of type "loff_t" (64
bits, signed).
195 block_adr = block_num * mtd->erasesize;
196
197 if (mtd_block_isbad(mtd, block_adr))
198 continue;
199
200 if (sharpsl_nand_read_oob(mtd, block_adr, oob))
________________________________________________________________________________________________________
To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/
wf/click?
upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRZILrCyVW9WQLwr7wR5iGubla-2BOU6Se2Euumsa1bPpOJg-3D-3D_p9c2Pq5BRWXelYclnUuZY8l3SYc-2FPJtx2STX-2BpF5A6td-2FPvSZFHfZnIH7Pkuotsj40dgSYlEHnY3fa8hwUfXcZx2zIMi9ygf9fvrncbz9LZ035WDZixEDGKJm-2BkA-2FlNNw4vjG8qChO-2Fsn3KGwsVc2B46OlL-2BawwYWOieMWWWlm44I8px-2BoB-2BuIPoEApB2C1WKE6DZ0qI9OL3nk2Lf6cdMA-3D-3D
To manage Coverity Scan email notifications for "richard@nod.at", click
https://u2389337.ct.sendgrid.net/wf/click?
upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRbVDbis712qZDP-2FA8y06Nq4PW1q5HE7hT0R7FQopI50uMi-2FXxBV9hqQbIHwUk8i5vtfR-2BsAt7Vmc5VhhK-2BFpW3LXtshV-2BNRMG6fEVAWxE0JubBijVgPqNmrGAZeWjyxZKc-3D_p9c2Pq5BRWXelYclnUuZY8l3SYc-2FPJtx2STX-2BpF5A6td-2FPvSZFHfZnIH7PkuotsjtjhWtoA3IVRL5bV1R9qiwG4cqA-2FKu4HHy-2FY11gvyLcPSbxHkMq75abGzuiZVVK-2BoMEddCyVJkKCXyuwR33GIGAu-2F-2BxMohkiXZLfEkTEF4Cq4rSxCKccF8nqIWYFGjwP7kzyOHAH5cWC2z4YWNyegGg-3D-3D
-------------------------------------------------------------
^ permalink raw reply [flat|nested] 3+ messages in thread* Re: New Defects reported by Coverity Scan for Linux 2017-11-27 13:22 Fwd: New Defects reported by Coverity Scan for Linux Richard Weinberger @ 2017-11-27 14:19 ` Andrea Adami 2017-11-27 14:23 ` Richard Weinberger 0 siblings, 1 reply; 3+ messages in thread From: Andrea Adami @ 2017-11-27 14:19 UTC (permalink / raw) To: Richard Weinberger; +Cc: linux-mtd On Mon, Nov 27, 2017 at 2:22 PM, Richard Weinberger <richard@nod.at> wrote: > Andrea, > > please check. The same pattern seems to be used more than once in this driver. > > Thanks, > //richard Hello, I acked the patch v2, considering 2 occurrences: https://lkml.org/lkml/2017/11/8/567 I thought that was enough, what should I do now? Thanks Andrea P.S. Neverthless, imho it is impposible to overflow with the numbers we are using: + for (block_num = 0; block_num < phymax; block_num++) { + block_adr = block_num * mtd->erasesize; #define SHARPSL_FTL_PART_SIZE (7 * SZ_1M) for pxa25x : nand: 128 MiB, SLC, erase size: 16 KiB, page size: 512, OOB size: 16 FTL blocks: 448 physical = 24 reserved + 424 logical max block_adr = 447 * 16384 for pxa27x nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64 FTL blocks: 56 physical = 4 reserved + 52 logical max block_adr = 55 * 131072 > > ---------- Weitergeleitete Nachricht ---------- > > Betreff: New Defects reported by Coverity Scan for Linux > Datum: Montag, 27. November 2017, 08:49:21 CET > Von: scan-admin@coverity.com > An: richard@nod.at > > > > Hi, > > Please find the latest report on new defect(s) introduced to Linux, under > component 'Drivers-MTD', found with Coverity Scan. > > 1 new defect(s) introduced to Linux, under component 'Drivers-MTD', found > with Coverity Scan. > 344 defect(s), reported by Coverity Scan earlier, were marked fixed in the > recent build analyzed by Coverity Scan. > > New defect(s) Reported-by: Coverity Scan > Showing 1 of 1 defect(s) > > > ** CID 1424016: Integer handling issues (OVERFLOW_BEFORE_WIDEN) > /drivers/mtd/parsers/sharpslpart.c: 195 in sharpsl_nand_init_ftl() > > > ________________________________________________________________________________________________________ > *** CID 1424016: Integer handling issues (OVERFLOW_BEFORE_WIDEN) > /drivers/mtd/parsers/sharpslpart.c: 195 in sharpsl_nand_init_ftl() > 189 /* initialize ftl->log2phy */ > 190 for (i = 0; i < ftl->logmax; i++) > 191 ftl->log2phy[i] = UINT_MAX; > 192 > 193 /* create physical-logical table */ > 194 for (block_num = 0; block_num < phymax; block_num++) { >>>> CID 1424016: Integer handling issues (OVERFLOW_BEFORE_WIDEN) >>>> Potentially overflowing expression "block_num * mtd->erasesize" with > type "unsigned int" (32 bits, unsigned) is evaluated using 32-bit arithmetic, > and then used in a context that expects an expression of type "loff_t" (64 > bits, signed). > 195 block_adr = block_num * mtd->erasesize; > 196 > 197 if (mtd_block_isbad(mtd, block_adr)) > 198 continue; > 199 > 200 if (sharpsl_nand_read_oob(mtd, block_adr, oob)) > > > ________________________________________________________________________________________________________ > To view the defects in Coverity Scan visit, https://u2389337.ct.sendgrid.net/ > wf/click? > upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRZILrCyVW9WQLwr7wR5iGubla-2BOU6Se2Euumsa1bPpOJg-3D-3D_p9c2Pq5BRWXelYclnUuZY8l3SYc-2FPJtx2STX-2BpF5A6td-2FPvSZFHfZnIH7Pkuotsj40dgSYlEHnY3fa8hwUfXcZx2zIMi9ygf9fvrncbz9LZ035WDZixEDGKJm-2BkA-2FlNNw4vjG8qChO-2Fsn3KGwsVc2B46OlL-2BawwYWOieMWWWlm44I8px-2BoB-2BuIPoEApB2C1WKE6DZ0qI9OL3nk2Lf6cdMA-3D-3D > > To manage Coverity Scan email notifications for "richard@nod.at", click > https://u2389337.ct.sendgrid.net/wf/click? > upn=08onrYu34A-2BWcWUl-2F-2BfV0V05UPxvVjWch-2Bd2MGckcRbVDbis712qZDP-2FA8y06Nq4PW1q5HE7hT0R7FQopI50uMi-2FXxBV9hqQbIHwUk8i5vtfR-2BsAt7Vmc5VhhK-2BFpW3LXtshV-2BNRMG6fEVAWxE0JubBijVgPqNmrGAZeWjyxZKc-3D_p9c2Pq5BRWXelYclnUuZY8l3SYc-2FPJtx2STX-2BpF5A6td-2FPvSZFHfZnIH7PkuotsjtjhWtoA3IVRL5bV1R9qiwG4cqA-2FKu4HHy-2FY11gvyLcPSbxHkMq75abGzuiZVVK-2BoMEddCyVJkKCXyuwR33GIGAu-2F-2BxMohkiXZLfEkTEF4Cq4rSxCKccF8nqIWYFGjwP7kzyOHAH5cWC2z4YWNyegGg-3D-3D > > > ------------------------------------------------------------- ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: New Defects reported by Coverity Scan for Linux 2017-11-27 14:19 ` Andrea Adami @ 2017-11-27 14:23 ` Richard Weinberger 0 siblings, 0 replies; 3+ messages in thread From: Richard Weinberger @ 2017-11-27 14:23 UTC (permalink / raw) To: Andrea Adami; +Cc: linux-mtd Am Montag, 27. November 2017, 15:19:20 CET schrieb Andrea Adami: > On Mon, Nov 27, 2017 at 2:22 PM, Richard Weinberger <richard@nod.at> wrote: > > Andrea, > > > > please check. The same pattern seems to be used more than once in this > > driver. > > > > Thanks, > > //richard > > Hello, > I acked the patch v2, considering 2 occurrences: > > https://lkml.org/lkml/2017/11/8/567 > > I thought that was enough, what should I do now? Okay, I thought this is a new issue. Then let's keep this patch. I'll send it to Linus. Thanks, //richard ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2017-11-27 14:23 UTC | newest] Thread overview: 3+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-11-27 13:22 Fwd: New Defects reported by Coverity Scan for Linux Richard Weinberger 2017-11-27 14:19 ` Andrea Adami 2017-11-27 14:23 ` Richard Weinberger
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox