public inbox for gcc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug analyzer/112975] New: -Wanalyzer-tainted-allocation-size false positive seen in Linux kernel's drivers/xen/privcmd.c
@ 2023-12-12  0:03 dmalcolm at gcc dot gnu.org
  2023-12-12  0:13 ` [Bug analyzer/112975] " dmalcolm at gcc dot gnu.org
                   ` (5 more replies)
  0 siblings, 6 replies; 7+ messages in thread
From: dmalcolm at gcc dot gnu.org @ 2023-12-12  0:03 UTC (permalink / raw)
  To: gcc-bugs

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=112975

            Bug ID: 112975
           Summary: -Wanalyzer-tainted-allocation-size false positive seen
                    in Linux kernel's drivers/xen/privcmd.c
           Product: gcc
           Version: unknown
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: analyzer
          Assignee: dmalcolm at gcc dot gnu.org
          Reporter: dmalcolm at gcc dot gnu.org
            Blocks: 106358
  Target Milestone: ---

In file included from drivers/xen/privcmd.c:15:
In function ‘kcalloc’,
    inlined from ‘privcmd_ioctl_dm_op’ at drivers/xen/privcmd.c:640:10:
./include/linux/slab.h:645:16: warning: use of attacker-controlled value as
allocation size without upper-bounds checking [CWE-789]
[-Wanalyzer-tainted-allocation-size]
  645 |         return kmalloc_array(n, size, flags | __GFP_ZERO);
      |                ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  ‘privcmd_ioctl’: events 1-4
    |
    |drivers/xen/privcmd.c:834:13:
    |  834 | static long privcmd_ioctl(struct file *file,
    |      |             ^~~~~~~~~~~~~
    |      |             |
    |      |             (1) entry to ‘privcmd_ioctl’
    |......
    |  840 |         switch (cmd) {
    |      |         ~~~~~~
    |      |         |
    |      |         (2) following ‘case 1069061:’ branch...
    |......
    |  857 |         case IOCTL_PRIVCMD_DM_OP:
    |      |         ~~~~ 
    |      |         |
    |      |         (3) ...to here
    |  858 |                 ret = privcmd_ioctl_dm_op(file, udata);
    |      |                       ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    |      |                       |
    |      |                       (4) calling ‘privcmd_ioctl_dm_op’ from
‘privcmd_ioctl’
    |
    +--> ‘privcmd_ioctl_dm_op’: events 5-12
           |
           |  615 | static long privcmd_ioctl_dm_op(struct file *file, void
__user *udata)
           |      |             ^~~~~~~~~~~~~~~~~~~
           |      |             |
           |      |             (5) entry to ‘privcmd_ioctl_dm_op’
           |......
           |  627 |         if (copy_from_user(&kdata, udata, sizeof(kdata)))
           |      |            ~ 
           |      |            |
           |      |            (6) following ‘false’ branch (when ‘n == 0’)...
           |......
           |  631 |         if (data->domid != DOMID_INVALID && data->domid !=
kdata.dom)
           |      |         ~~   
           |      |         |
           |      |         (7) ...to here
           |......
           |  634 |         if (kdata.num == 0)
           |      |            ~ 
           |      |            |
           |      |            (8) following ‘false’ branch...
           |......
           |  637 |         if (kdata.num > privcmd_dm_op_max_num)
           |      |         ~~ ~ 
           |      |         |  |
           |      |         |  (10) following ‘false’ branch...
           |      |         (9) ...to here
           |......
           |  640 |         kbufs = kcalloc(kdata.num, sizeof(*kbufs),
GFP_KERNEL);
           |      |         ~~~~~   ~
           |      |         |       |
           |      |         |       (12) inlined call to ‘kcalloc’ from
‘privcmd_ioctl_dm_op’
           |      |         (11) ...to here
           |
           +--> ‘kcalloc’: event 13
                  |
                  |./include/linux/slab.h:645:16:
                  |  645 |         return kmalloc_array(n, size, flags |
__GFP_ZERO);
                  |      |               
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                  |      |                |
                  |      |                (13) use of attacker-controlled value
as allocation size without upper-bounds checking
                  |

...when the value is checked at (10).


Referenced Bugs:

https://gcc.gnu.org/bugzilla/show_bug.cgi?id=106358
[Bug 106358] [meta-bug] tracker bug for building the Linux kernel with
-fanalyzer

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2024-03-22 15:03 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-12-12  0:03 [Bug analyzer/112975] New: -Wanalyzer-tainted-allocation-size false positive seen in Linux kernel's drivers/xen/privcmd.c dmalcolm at gcc dot gnu.org
2023-12-12  0:13 ` [Bug analyzer/112975] " dmalcolm at gcc dot gnu.org
2024-02-15 19:57 ` [Bug analyzer/112975] [14 Regression] " dmalcolm at gcc dot gnu.org
2024-03-04 13:04 ` rguenth at gcc dot gnu.org
2024-03-07 20:53 ` law at gcc dot gnu.org
2024-03-22 14:59 ` cvs-commit at gcc dot gnu.org
2024-03-22 15:03 ` dmalcolm at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).