Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp761519ybt; Wed, 17 Jun 2020 13:18:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbF8qcdmyWZO1sDB+ruxCzNASgQf8+ydrOYKAmjoshtinoNaE7GqsPzYAl1DQqsQaHnqb5 X-Received: by 2002:a17:906:7498:: with SMTP id e24mr873894ejl.174.1592425080983; Wed, 17 Jun 2020 13:18:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592425080; cv=none; d=google.com; s=arc-20160816; b=hz2nCFUdD/TrJ/AWqZFEF7tyMC+KPTexpIilseUjyv/NgpTdP9sMNLeg4d9Fdm+mLe CCuwUkbcgBlxH05cQkUucw1bUMTYCO/9kDExk2BQMz0Vsi/V3PlKGrSXbB9O0YjsdvSz o9vxGeenvgGvBZhYDFvGFUf4NUoP3M2ZV8Eycc05+sUL8904j9QQE9yVSo9pKHNknohH babMkD4Y4UgW70QPSe+XWpBNQfsZkNpwc5SqeFUfuOPNEeCIUM5FJm0Rwz3lFWR46vzf X0+0f/bKXu17ftSnZj07mJNJcpSaZ512gSgmoVwKFZmz8beB7zG18tGrpBWNzPW3L1tR XJKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=0UptcgWP941kAcL7IUoUXSdAwJgR6YQTPB31WXt1EZE=; b=CG5h4FVIC78UKvM7g5nmrZTncNXT0LEUfzOEcg1JU+VicMGUWti8W7FZjrcjTcNdue fvPFT2rjZDkFPDnnGjEu1PVSqGxqyHhoxhXlCqY28tykU4DsGI80ls+pfgH1VMbpubuH C1SL7sB2BPDAY/gqPwPgwKqJ7QDtUz/XhbN4tXPcg4uEkGp5MoclY1cXoOxRWCrOLMly FHzv89eowY4HWupcTX+mxhwllqeO9b27E88dvmjTBHaUtAnaTc8wdRRLDQHXt7xZrtfz z12IxXyDefIlFEnd5h9YljQ/9m6X7mgmD7+EFAK/PmqQr+XwyX24nFyiYacr7q84q4rr szKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m8si216498ejq.294.2020.06.17.13.17.38; Wed, 17 Jun 2020 13:18:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726954AbgFQUPL (ORCPT + 99 others); Wed, 17 Jun 2020 16:15:11 -0400 Received: from mail3-relais-sop.national.inria.fr ([192.134.164.104]:16901 "EHLO mail3-relais-sop.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726597AbgFQUPJ (ORCPT ); Wed, 17 Jun 2020 16:15:09 -0400 X-IronPort-AV: E=Sophos;i="5.73,523,1583190000"; d="scan'208";a="351904443" Received: from abo-173-121-68.mrs.modulonet.fr (HELO hadrien) ([85.68.121.173]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Jun 2020 22:15:07 +0200 Date: Wed, 17 Jun 2020 22:15:07 +0200 (CEST) From: Julia Lawall X-X-Sender: jll@hadrien To: Denis Efremov cc: linux-kernel@vger.kernel.org, Kees Cook , cocci@systeme.lip6.fr Subject: Re: [Cocci] [PATCH] coccinelle: misc: add array_size_dup script to detect missed overlow checks In-Reply-To: Message-ID: References: <20200615102045.4558-1-efremov@linux.com> <202006151123.3C2CB7782@keescook> <4dd9c371-0c37-a4bb-e957-3848cb1a13ff@embeddedor.com> User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 17 Jun 2020, Julia Lawall wrote: > > > On Wed, 17 Jun 2020, Denis Efremov wrote: > > > > > > > > > Awesome! I'll take a look into this. :) > > > > > Here is another script for your #83 ticket. > > Currently, it issues 598 warnings. > > > > // SPDX-License-Identifier: GPL-2.0-only > > /// > > /// Check for missing overflow checks in allocation functions. > > /// Low confidence because it's pointless to check for overflow > > /// relatively small allocations. > > /// > > // Confidence: Low > > // Copyright: (C) 2020 Denis Efremov ISPRAS > > // Options: --no-includes --include-headers > > > > virtual patch > > virtual context > > virtual org > > virtual report > > > > @depends on patch@ > > expression E1, E2, E3, E4, size; > > @@ > > > > ( > > - size = E1 * E2; > > + size = array_size(E1, E2); > > | > > - size = E1 * E2 * E3; > > + size = array3_size(E1, E2, E3); > > | > > - size = E1 * E2 + E3; > > + size = struct_size(E1, E2, E3); > > Should the arguments be checked to see if they have something to do with > arrays and structures? Sorry for the noise, I see that this comment makes no sense. julia > > > ) > > ... when != size = E4 > > when != size += E4 > > when != size -= E4 > > when != size *= E4 > > Here you can have a metavariable > > assignment operator aop; > > and then say size aop E4 > > It doesn't really look like an assignment any more, but it could be a > little safer. > > julia > > > when != &size > > \(kmalloc\|krealloc\|kzalloc\|kzalloc_node\| > > vmalloc\|vzalloc\|vzalloc_node\| > > kvmalloc\|kvzalloc\|kvzalloc_node\| > > sock_kmalloc\| > > f2fs_kmalloc\|f2fs_kzalloc\|f2fs_kvmalloc\|f2fs_kvzalloc\| > > devm_kmalloc\|devm_kzalloc\) > > (..., size, ...) > > > > @r depends on !patch@ > > expression E1, E2, E3, E4, size; > > position p; > > @@ > > > > ( > > * size = E1 * E2;@p > > | > > * size = E1 * E2 * E3;@p > > | > > * size = E1 * E2 + E3;@p > > ) > > ... when != size = E4 > > when != size += E4 > > when != size -= E4 > > when != size *= E4 > > when != &size > > * \(kmalloc\|krealloc\|kzalloc\|kzalloc_node\| > > vmalloc\|vzalloc\|vzalloc_node\| > > kvmalloc\|kvzalloc\|kvzalloc_node\| > > sock_kmalloc\| > > f2fs_kmalloc\|f2fs_kzalloc\|f2fs_kvmalloc\|f2fs_kvzalloc\| > > devm_kmalloc\|devm_kzalloc\) > > (..., size, ...) > > > > @script:python depends on report@ > > p << r.p; > > @@ > > > > coccilib.report.print_report(p[0], "WARNING: missing overflow check") > > > > @script:python depends on org@ > > p << r.p; > > @@ > > > > coccilib.org.print_todo(p[0], "WARNING: missing overflow check") > > _______________________________________________ > > Cocci mailing list > > Cocci@systeme.lip6.fr > > https://systeme.lip6.fr/mailman/listinfo/cocci > > > _______________________________________________ > Cocci mailing list > Cocci@systeme.lip6.fr > https://systeme.lip6.fr/mailman/listinfo/cocci >