2 * sparse/check_get_user_overflow.c
4 * Copyright (C) 2010 Dan Carpenter.
6 * Licensed under the Open Software License version 1.1
11 * Looks for integers that we get from the user which can be attacked
12 * with an integer overflow.
17 #include "smatch_slist.h"
25 static void match_condition(struct expression
*expr
)
27 struct smatch_state
*left_max_true
= NULL
;
28 struct smatch_state
*left_max_false
= NULL
;
29 struct smatch_state
*right_max_true
= NULL
;
30 struct smatch_state
*right_max_false
= NULL
;
32 struct smatch_state
*left_min_true
= NULL
;
33 struct smatch_state
*left_min_false
= NULL
;
34 struct smatch_state
*right_min_true
= NULL
;
35 struct smatch_state
*right_min_false
= NULL
;
41 case SPECIAL_UNSIGNED_LT
:
42 case SPECIAL_UNSIGNED_LTE
:
43 left_max_true
= &capped
;
44 right_max_false
= &capped
;
45 right_min_true
= &capped
;
46 left_min_false
= &capped
;
50 case SPECIAL_UNSIGNED_GT
:
51 case SPECIAL_UNSIGNED_GTE
:
52 left_max_false
= &capped
;
53 right_max_true
= &capped
;
54 left_min_true
= &capped
;
55 right_min_false
= &capped
;
58 left_max_true
= &capped
;
59 right_max_true
= &capped
;
60 left_min_true
= &capped
;
61 right_min_true
= &capped
;
63 case SPECIAL_NOTEQUAL
:
64 left_max_false
= &capped
;
65 right_max_false
= &capped
;
66 left_min_false
= &capped
;
67 right_min_false
= &capped
;
73 if (get_state_expr(my_max_id
, expr
->left
)) {
74 set_true_false_states_expr(my_max_id
, expr
->left
, left_max_true
, left_max_false
);
75 set_true_false_states_expr(my_min_id
, expr
->left
, left_min_true
, left_min_false
);
77 if (get_state_expr(my_max_id
, expr
->right
)) {
78 set_true_false_states_expr(my_max_id
, expr
->right
, right_max_true
, right_max_false
);
79 set_true_false_states_expr(my_min_id
, expr
->right
, right_min_true
, right_min_false
);
83 static void match_normal_assign(struct expression
*expr
)
85 if (get_state_expr(my_max_id
, expr
->left
)) {
86 set_state_expr(my_max_id
, expr
->left
, &capped
);
87 set_state_expr(my_min_id
, expr
->left
, &capped
);
91 static void match_assign(struct expression
*expr
)
95 name
= get_macro_name(expr
->pos
);
96 if (!name
|| strcmp(name
, "get_user") != 0) {
97 match_normal_assign(expr
);
100 name
= get_variable_from_expr(expr
->right
, NULL
);
101 if (!name
|| strcmp(name
, "__val_gu") != 0)
103 set_state_expr(my_max_id
, expr
->left
, &user_data
);
104 set_state_expr(my_min_id
, expr
->left
, &user_data
);
109 static void check_expr(struct expression
*expr
)
117 sm
= get_sm_state_expr(my_max_id
, expr
);
118 if (sm
&& slist_has_state(sm
->possible
, &user_data
)) {
119 if (!get_absolute_max(expr
, &val
) || val
> 20000)
123 sm
= get_sm_state_expr(my_min_id
, expr
);
124 if (sm
&& slist_has_state(sm
->possible
, &user_data
)) {
125 if (!get_absolute_min(expr
, &val
) || val
< -20000)
129 if (!overflow
&& !underflow
)
132 name
= get_variable_from_expr(expr
, NULL
);
133 if (overflow
&& underflow
)
134 sm_msg("warn: check for integer over/underflow '%s'", name
);
136 sm_msg("warn: check for integer underflow '%s'", name
);
138 sm_msg("warn: check for integer overflow '%s'", name
);
141 set_state_expr(my_max_id
, expr
, &capped
);
142 set_state_expr(my_min_id
, expr
, &capped
);
145 static void match_binop(struct expression
*expr
)
153 if (expr
->op
== SPECIAL_RIGHTSHIFT
)
155 if (expr
->op
== SPECIAL_LEFTSHIFT
)
158 check_expr(expr
->left
);
159 check_expr(expr
->right
);
162 void check_get_user_overflow(int id
)
164 if (option_project
!= PROJ_KERNEL
)
167 add_hook(&match_condition
, CONDITION_HOOK
);
168 add_hook(&match_assign
, ASSIGNMENT_HOOK
);
169 add_hook(&match_binop
, BINOP_HOOK
);
172 void check_get_user_overflow2(int id
)