• S
    Fixing Coverity errors for FTS component. · df5460ea
    Shoaib Lari 提交于
    This commit fixes the following Coverity errors.
    
    ftsfilerep.c: 129923 (for fts.c), 160618, 160637, 160639
    ftsprobe.c: 129898
    primary_mirror_mode.c: 160714 (for ftsprobe.c)
    ftssan.c: 160620, 160636, 160638, 157330
    
    The individual Coverity warnings are described below
    
    ftsfilerep.c
    ============
    CID 129923
    ----------
    The Coverity error is reported in fts.c.  However, the fix is in ftsfilerep.c.
    
    In function probePublishUpdate(), function FtsGetPairStateFilerep() will return
    FILEREP_SENTINEL if the segements are in inconsistent state.  This value is
    passed to transition() as the stateOld parameter.  The function transition()
    calls FtsTransitionFilerep() with this value of stateOld.
    
    FtsTransitionFilerep() uses stateOld to index the state_machine_filerep array.
    However, this causes the following warning from Coverity.
    
    Out-of-bounds access (OVERRUN)
    overrun-call: Overrunning callee's array of size 3 by passing argument stateOld
    (which evaluates to 4) in call to transition.
    
    There is an Assert in FtsTransitionFilerep() to check the validity of stateOld.
    However, production code is compiled without Assert, so this is a possible error
    condition at runtime.
    
    The fix is to log an error when an invalid stateOld value is passed to
    FtsTranstionFilerep() and return without indexing the array.
    
    CID 160618
    ----------
    Added missing break in FtsResolveStateFilerep() for FILEREP_PUS_MUS and
    FILEREP_PUR_MUR cases.
    
    CID 160637
    ----------
    The IS_VALID_OLD_STATE_FILEREP(state) macro is defined as:
    
        (state >= FILEREP_PUS_MUS && state <= FILEREP_PUC_MDX)
    
    where the FILEREP_* states are enums starting at 0.
    
    The macro is called with state defined as uint32.  This results in the following
    Coverity warning.
    
    Macro compares unsigned to 0 (NO_EFFECT)
    unsigned_compare: This greater-than-or-equal-to-zero comparison of an unsigned
    value is always true. stateOld >= FILEREP_PUS_MUS
    
    I have modified the macro definition to:
    
        ((unsigned int)(state) <= FILEREP_PUC_MDX)
    
    160639
    ------
    The IS_VALID_NEW_STATE_FILEREP(state) macro is defined as:
    
        (state >= FILEREP_PUS_MUS && state < FILEREP_SENTINEL)
    
    where the FILEREP_* states are enums starting at 0.
    
    The macro is called with state defined as uint32.  This results in the following
    Coverity warning.
    
    Macro compares unsigned to 0 (NO_EFFECT)
    unsigned_compare: This greater-than-or-equal-to-zero comparison of an unsigned
    value is always true. pairState->stateNew >= FILEREP_PUS_MUS.
    
    I have modified the macro definition to:
    
        ((unsigned int)(state) < FILEREP_SENTINEL)
    
    ftsprobe.c
    ==========
    
    CID 129898
    ----------
    In function probeTimeout(), we have:
    
    unint64 elapsed_ms = ...;
    
    if (elapsed_ms > gp_fts_probe_timeout * 1000)
      ...
    
    gp_fts_probe_timout is defined as an int.  Therefore, we get the following
    Coverity error:
    
    Unintentional integer overflow (OVERFLOW_BEFORE_WIDEN)
    overflow_before_widen: Potentially overflowing expression gp_fts_probe_timeout *
    1000 with type int (32 bits, signed) is evaluated using 32-bit arithmetic, and
    then used in a context that expects an expression of type uint64 (64 bits,
    unsigned).
    
    I have casted gp_fts_probe_timout to uint64 to resolve this.
    
    primary_mirror_mode.c
    =====================
    
    CID 160714
    ----------
    Function probeProcessResponse() in ftsprobe.c reads a network packet to process
    probe response from the segments.  The fault field from the packet is passed to
    getFaultType() in primary_mirror_mode.c to index the labels array.  Therefore,
    we get the following warning from Coverity.
    
    Use of untrusted scalar value (TAINTED_SCALAR)
    tainted_data: Passing tainted variable fault to a tainted sink.
    
    I resolved this my making sure that the faultType is within the dimension
    of the labels array before using the faultType as an index.
    
    ftssan.c
    =========
    
    CID 160620
    ----------
    Added missing break in FtsResolveStateSAN() for the SAN_PU_MU case.
    
    CID 160636
    ----------
    The IS_VALID_NEW_STATE_SN(state) macro is defined as:
    
        (state >= SAN_PU_MU && state < SAN_SENTINEL)
    
    where the SAN_* states are enums starting at 0.
    
    The macro is called with state defined as uint32.  This results in the following
    Coverity warning.
    
    Macro compares unsigned to 0 (NO_EFFECT)
    unsigned_compare: This greater-than-or-equal-to-zero comparison of an unsigned
    value is always true. pairState->stateNew >= SAN_PU_MU.
    
    I have modified the macro definition to:
    
        ((unsigned int)(state) < SAN_SENTINEL)
    
    CID 160638
    -----------
    The IS_VALID_OLD_STATE_SAN(state) macro is defined as:
    
        (state >= SAN_PU_MU && state <= SAN_PU_MD)
    
    where the SAN_* states are enums starting at 0.
    
    The macro is called with state defined as uint32.  This results in the following
    Coverity warning.
    
    Macro compares unsigned to 0 (NO_EFFECT)
    unsigned_compare: This greater-than-or-equal-to-zero comparison of an unsigned
    value is always true. stateOld >= SAN_PU_MU.
    
    I have modified the macro definition to:
    
        ((unsigned int)(state) <= SAN_PU_MD)
    
    CID 157330
    ----------
    
    The mountMaintenanceForMpid() function sets the gphome_env variable to
    getenv("GPHOME").  The gphome_env variable is used as a file path in a command
    string that is passed to the system() OS call.  This results in the following
    warning from Coverity.
    
    Use of untrusted string value (TAINTED_STRING)
    tainted_string: Passing tainted string cmd to system, which cannot accept
    tainted data.
    
    I resolved this by using the execlp() system call instead of system() as
    recommended in
    https://www.securecoding.cert.org/confluence/pages/viewpage.action?pageId=2130132.
    
    To use execlp(), individual arguments have to be built as separate characters
    strings.
    df5460ea
primary_mirror_mode.c 82.6 KB