[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4233 [Tor Client]: Exact addition/summation and memory allocation



#4233: Exact addition/summation and memory allocation
---------------------------+------------------------------------------------
 Reporter:  mansour        |          Owner:                    
     Type:  enhancement    |         Status:  needs_review      
 Priority:  normal         |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor Client     |        Version:                    
 Keywords:  small-feature  |         Parent:                    
   Points:                 |   Actualpoints:                    
---------------------------+------------------------------------------------
Changes (by nickm):

  * milestone:  Tor: 0.2.3.x-final => Tor: 0.2.4.x-final


Comment:

 So, the thing about asserting on a tor_malloc(0) seems wrong to me. A sum
 that could overflow to 0 could as easily overflow to 1, with equally poor
 consequences.

 Safe addition is a good idea; the overflow criteria here are wrong for our
 case, though, since we treat any value above SIZE_T_CEILING as a probable
 underflow.

 The varargs approach seems error-prone to me, since it can't be
 typechecked, and seems prone to doing weird things in cases where the
 arguments have any type besides size_t.  (For example, in the single
 example you give, the value "1" will get passed to the variadic function
 as an "int," which is signed and potentially smaller than size_t.

 Since only one case (and that a safe one) is actually protected by this
 patch series, I'm going to defer it to the 0.2.4.x merge window.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4233#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs