Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp2170983pxu; Sat, 17 Oct 2020 14:20:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxoNRVGEnVZlp8ptGR54CDMRlcfMz/bmtkMPV+fHKNIlyJ4E+vKEN5KJ2YK8p+kAV58+y9N X-Received: by 2002:a17:906:c7d9:: with SMTP id dc25mr10049761ejb.482.1602969622321; Sat, 17 Oct 2020 14:20:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602969622; cv=none; d=google.com; s=arc-20160816; b=jw3MAnJILadHUNxzumIpzptah2fpr9j2y+CLzvKCUICWfxyFHpLoqjhxDO9eXEvbv5 8pZuXpV6/NPKuUPPZHGxpNTW3nrzrJZ6XkKokHTG7A/mu8+SimlaDgXU7pQesZvWt3MT Y+ZXzQ8OlBnay+LXhPambjysV2hp7WeFH8t504X28GkLiSYNVkM9ukJSkMr8PfANdazv +I/C7qp4R3Ee98V1me+dlVf4UDifmGt75eiRtBXk1BIlURiqTXOVK8Kl34DRGD07Zbrb uU6x0JfB8mCAsoD5OMrlTbnTcJwCXlu6fkNgKZ7QbG4Ouzfr1dY7TBBjlzRrkcC7Q3Vr MhtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date; bh=qgZi7BXi7k0gYt1Nphjh4AiWyQuptwac6se64ZLJMyE=; b=ZIAzEaFqtHfUG+YAqQ9X3lQvCwyz1cgD+kjd8l9TMiV/Cn6m1LuAtLgUjvhIzWSx2N 50S1pKJA+Zhs3OuXVq7+lE//uFDPDU/953Ff4SZXXwDXG4JnZSlYaFLQhy/hDLyQt6dl Sy+lpLOQbuK+qeGDX6lV0C3/RX039vOjgylqqqTnmpSZLwra/GW6WRLTXP0BxiITDVox QNvOUlpJI4oy5TRiXexvTVA7L2o4M7vfK+v1FNgLOQebBwTC5KfR7S6aKKvaW+CEkJ7z RL+DuXrMDZKG5h+/RlVfGV+x0FV0be0Ki+6nh2kTr0/1Xo/7n2t57iCS3c5NKOf3WEEl Nc8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k25si5234183ejk.10.2020.10.17.14.19.48; Sat, 17 Oct 2020 14:20:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2439499AbgJQVRl (ORCPT + 99 others); Sat, 17 Oct 2020 17:17:41 -0400 Received: from mail2-relais-roc.national.inria.fr ([192.134.164.83]:60995 "EHLO mail2-relais-roc.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2439460AbgJQVRk (ORCPT ); Sat, 17 Oct 2020 17:17:40 -0400 X-IronPort-AV: E=Sophos;i="5.77,388,1596492000"; d="scan'208";a="473121993" Received: from abo-173-121-68.mrs.modulonet.fr (HELO hadrien) ([85.68.121.173]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 17 Oct 2020 23:17:33 +0200 Date: Sat, 17 Oct 2020 23:17:33 +0200 (CEST) From: Julia Lawall X-X-Sender: jll@hadrien To: Denis Efremov cc: Alexander Popov , cocci@systeme.lip6.fr, linux-kernel@vger.kernel.org Subject: Re: [Cocci] [PATCH v8] coccinelle: api: add kfree_mismatch script In-Reply-To: <20201016085442.23299-1-efremov@linux.com> Message-ID: References: <20200605204237.85055-1-efremov@linux.com> <20201016085442.23299-1-efremov@linux.com> User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 16 Oct 2020, Denis Efremov wrote: > Check that alloc and free types of functions match each other. > > Signed-off-by: Denis Efremov Applied, thanks. > --- > Changes in v2: > - Lines are limited to 80 characters where possible > - Confidence changed from High to Medium because of > fs/btrfs/send.c:1119 false-positive > - __vmalloc_area_node() explicitly excluded from analysis > instead of !(file in "mm/vmalloc.c") condition > Changes in v3: > - prints style in org && report modes changed for python2 > Changes in v4: > - missing msg argument to print_todo fixed > Changes in v5: > - fix position p in kfree rule > - move @kok and @v positions in choice rule after the arguments > - remove kvmalloc suggestions > Changes in v6: > - more asterisks added in context mode > - second @kok added to the choice rule > Changes in v7: > - file renamed to kfree_mismatch.cocci > - python function relevant() removed > - additional rule for filtering free positions added > - btrfs false-positive fixed > - confidence level changed to high > - kvfree_switch rule added > - names for position variables changed to @a (alloc) and @f (free) > Changes in v8: > - kzfree() replaced with kfree_sensitive() > - "position f != free.fok;" simplified to "position f;" in patch > and kvfree_switch rules > > scripts/coccinelle/api/kfree_mismatch.cocci | 229 ++++++++++++++++++++ > 1 file changed, 229 insertions(+) > create mode 100644 scripts/coccinelle/api/kfree_mismatch.cocci > > diff --git a/scripts/coccinelle/api/kfree_mismatch.cocci b/scripts/coccinelle/api/kfree_mismatch.cocci > new file mode 100644 > index 000000000000..843b794fac7b > --- /dev/null > +++ b/scripts/coccinelle/api/kfree_mismatch.cocci > @@ -0,0 +1,229 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/// > +/// Check that kvmalloc'ed memory is freed by kfree functions, > +/// vmalloc'ed by vfree functions and kvmalloc'ed by kvfree > +/// functions. > +/// > +// Confidence: High > +// Copyright: (C) 2020 Denis Efremov ISPRAS > +// Options: --no-includes --include-headers > +// > + > +virtual patch > +virtual report > +virtual org > +virtual context > + > +@alloc@ > +expression E, E1; > +position kok, vok; > +@@ > + > +( > + if (...) { > + ... > + E = \(kmalloc\|kzalloc\|krealloc\|kcalloc\| > + kmalloc_node\|kzalloc_node\|kmalloc_array\| > + kmalloc_array_node\|kcalloc_node\)(...)@kok > + ... > + } else { > + ... > + E = \(vmalloc\|vzalloc\|vmalloc_user\|vmalloc_node\| > + vzalloc_node\|vmalloc_exec\|vmalloc_32\| > + vmalloc_32_user\|__vmalloc\|__vmalloc_node_range\| > + __vmalloc_node\)(...)@vok > + ... > + } > +| > + E = \(kmalloc\|kzalloc\|krealloc\|kcalloc\|kmalloc_node\|kzalloc_node\| > + kmalloc_array\|kmalloc_array_node\|kcalloc_node\)(...)@kok > + ... when != E = E1 > + when any > + if (E == NULL) { > + ... > + E = \(vmalloc\|vzalloc\|vmalloc_user\|vmalloc_node\| > + vzalloc_node\|vmalloc_exec\|vmalloc_32\| > + vmalloc_32_user\|__vmalloc\|__vmalloc_node_range\| > + __vmalloc_node\)(...)@vok > + ... > + } > +) > + > +@free@ > +expression E; > +position fok; > +@@ > + > + E = \(kvmalloc\|kvzalloc\|kvcalloc\|kvzalloc_node\|kvmalloc_node\| > + kvmalloc_array\)(...) > + ... > + kvfree(E)@fok > + > +@vfree depends on !patch@ > +expression E; > +position a != alloc.kok; > +position f != free.fok; > +@@ > + > +* E = \(kmalloc\|kzalloc\|krealloc\|kcalloc\|kmalloc_node\| > +* kzalloc_node\|kmalloc_array\|kmalloc_array_node\| > +* kcalloc_node\)(...)@a > + ... when != if (...) { ... E = \(vmalloc\|vzalloc\|vmalloc_user\|vmalloc_node\|vzalloc_node\|vmalloc_exec\|vmalloc_32\|vmalloc_32_user\|__vmalloc\|__vmalloc_node_range\|__vmalloc_node\)(...); ... } > + when != is_vmalloc_addr(E) > + when any > +* \(vfree\|vfree_atomic\|kvfree\)(E)@f > + > +@depends on patch exists@ > +expression E; > +position a != alloc.kok; > +position f != free.fok; > +@@ > + > + E = \(kmalloc\|kzalloc\|krealloc\|kcalloc\|kmalloc_node\| > + kzalloc_node\|kmalloc_array\|kmalloc_array_node\| > + kcalloc_node\)(...)@a > + ... when != if (...) { ... E = \(vmalloc\|vzalloc\|vmalloc_user\|vmalloc_node\|vzalloc_node\|vmalloc_exec\|vmalloc_32\|vmalloc_32_user\|__vmalloc\|__vmalloc_node_range\|__vmalloc_node\)(...); ... } > + when != is_vmalloc_addr(E) > + when any > +- \(vfree\|vfree_atomic\|kvfree\)(E)@f > ++ kfree(E) > + > +@kfree depends on !patch@ > +expression E; > +position a != alloc.vok; > +position f != free.fok; > +@@ > + > +* E = \(vmalloc\|vzalloc\|vmalloc_user\|vmalloc_node\|vzalloc_node\| > +* vmalloc_exec\|vmalloc_32\|vmalloc_32_user\|__vmalloc\| > +* __vmalloc_node_range\|__vmalloc_node\)(...)@a > + ... when != is_vmalloc_addr(E) > + when any > +* \(kfree\|kfree_sensitive\|kvfree\)(E)@f > + > +@depends on patch exists@ > +expression E; > +position a != alloc.vok; > +position f != free.fok; > +@@ > + > + E = \(vmalloc\|vzalloc\|vmalloc_user\|vmalloc_node\|vzalloc_node\| > + vmalloc_exec\|vmalloc_32\|vmalloc_32_user\|__vmalloc\| > + __vmalloc_node_range\|__vmalloc_node\)(...)@a > + ... when != is_vmalloc_addr(E) > + when any > +- \(kfree\|kvfree\)(E)@f > ++ vfree(E) > + > +@kvfree depends on !patch@ > +expression E; > +position a, f; > +@@ > + > +* E = \(kvmalloc\|kvzalloc\|kvcalloc\|kvzalloc_node\|kvmalloc_node\| > +* kvmalloc_array\)(...)@a > + ... when != is_vmalloc_addr(E) > + when any > +* \(kfree\|kfree_sensitive\|vfree\|vfree_atomic\)(E)@f > + > +@depends on patch exists@ > +expression E; > +@@ > + > + E = \(kvmalloc\|kvzalloc\|kvcalloc\|kvzalloc_node\|kvmalloc_node\| > + kvmalloc_array\)(...) > + ... when != is_vmalloc_addr(E) > + when any > +- \(kfree\|vfree\)(E) > ++ kvfree(E) > + > +@kvfree_switch depends on !patch@ > +expression alloc.E; > +position f; > +@@ > + > + ... when != is_vmalloc_addr(E) > + when any > +* \(kfree\|kfree_sensitive\|vfree\|vfree_atomic\)(E)@f > + > +@depends on patch exists@ > +expression alloc.E; > +position f; > +@@ > + > + ... when != is_vmalloc_addr(E) > + when any > +( > +- \(kfree\|vfree\)(E)@f > ++ kvfree(E) > +| > +- kfree_sensitive(E)@f > ++ kvfree_sensitive(E) > +) > + > +@script: python depends on report@ > +a << vfree.a; > +f << vfree.f; > +@@ > + > +msg = "WARNING kmalloc is used to allocate this memory at line %s" % (a[0].line) > +coccilib.report.print_report(f[0], msg) > + > +@script: python depends on org@ > +a << vfree.a; > +f << vfree.f; > +@@ > + > +msg = "WARNING kmalloc is used to allocate this memory at line %s" % (a[0].line) > +coccilib.org.print_todo(f[0], msg) > + > +@script: python depends on report@ > +a << kfree.a; > +f << kfree.f; > +@@ > + > +msg = "WARNING vmalloc is used to allocate this memory at line %s" % (a[0].line) > +coccilib.report.print_report(f[0], msg) > + > +@script: python depends on org@ > +a << kfree.a; > +f << kfree.f; > +@@ > + > +msg = "WARNING vmalloc is used to allocate this memory at line %s" % (a[0].line) > +coccilib.org.print_todo(f[0], msg) > + > +@script: python depends on report@ > +a << kvfree.a; > +f << kvfree.f; > +@@ > + > +msg = "WARNING kvmalloc is used to allocate this memory at line %s" % (a[0].line) > +coccilib.report.print_report(f[0], msg) > + > +@script: python depends on org@ > +a << kvfree.a; > +f << kvfree.f; > +@@ > + > +msg = "WARNING kvmalloc is used to allocate this memory at line %s" % (a[0].line) > +coccilib.org.print_todo(f[0], msg) > + > +@script: python depends on report@ > +ka << alloc.kok; > +va << alloc.vok; > +f << kvfree_switch.f; > +@@ > + > +msg = "WARNING kmalloc (line %s) && vmalloc (line %s) are used to allocate this memory" % (ka[0].line, va[0].line) > +coccilib.report.print_report(f[0], msg) > + > +@script: python depends on org@ > +ka << alloc.kok; > +va << alloc.vok; > +f << kvfree_switch.f; > +@@ > + > +msg = "WARNING kmalloc (line %s) && vmalloc (line %s) are used to allocate this memory" % (ka[0].line, va[0].line) > +coccilib.org.print_todo(f[0], msg) > + > -- > 2.26.2 > > _______________________________________________ > Cocci mailing list > Cocci@systeme.lip6.fr > https://systeme.lip6.fr/mailman/listinfo/cocci >