/// Find a use after free. //# Values of variables may imply that some //# execution paths are not possible, resulting in false positives. //# Another source of false positives are macros such as //# SCTP_DBG_OBJCNT_DEC that do not actually evaluate their argument /// // Confidence: Moderate // Copyright: (C) 2010-2012 Nicolas Palix. GPLv2. // Copyright: (C) 2010-2012 Julia Lawall, INRIA/LIP6. GPLv2. // Copyright: (C) 2010-2012 Gilles Muller, INRIA/LiP6. GPLv2. // URL: http://coccinelle.lip6.fr/ // Comments: // Options: --no-includes --include-headers virtual org virtual report @free@ expression E; position p1; @@ ( * kfree@p1(E) | * kzfree@p1(E) ) @print expression@ constant char [] c; expression free.E,E2; type T; position p; identifier f; @@ ( f(...,c,...,(T)E@p,...) | E@p == E2 | E@p != E2 | E2 == E@p | E2 != E@p | !E@p | E@p || ... ) @sz@ expression free.E; position p; @@ sizeof(<+...E@p...+>) @loop exists@ expression E; identifier l; position ok; @@ while (1) { ... ( * kfree@ok(E) | * kzfree@ok(E) ) ... when != break; when != goto l; when forall } @r exists@ expression free.E, subE<=free.E, E2; expression E1; iterator iter; statement S; position free.p1!=loop.ok,p2!={print.p,sz.p}; @@ ( * kfree@p1(E,...) | * kzfree@p1(E,...) ) ... ( iter(...,subE,...) S // no use | list_remove_head(E1,subE,...) | subE = E2 | subE++ | ++subE | --subE | subE-- | &subE | BUG(...) | BUG_ON(...) | return_VALUE(...) | return_ACPI_STATUS(...) | E@p2 // bad use ) @script:python depends on org@ p1 << free.p1; p2 << r.p2; @@ cocci.print_main("kfree",p1) cocci.print_secs("ref",p2) @script:python depends on report@ p1 << free.p1; p2 << r.p2; @@ msg = "ERROR: reference preceded by free on line %s" % (p1[0].line) coccilib.report.print_report(p2[0],msg) t-next.git/tree/drivers/usb/dwc3/debug.h?id=19ca2c8fecb1592d623fe5e82d6796f8d446268d'>treecommitdiff
path: root/drivers/usb/dwc3/debug.h
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2017-01-24 12:21:51 -0800
committerLinus Torvalds <torvalds@linux-foundation.org>2017-01-24 12:21:51 -0800
commit19ca2c8fecb1592d623fe5e82d6796f8d446268d (patch)
tree0756e115d125846f46b302085307768f069434a1 /drivers/usb/dwc3/debug.h
parenta4685d2f58e2230d4e27fb2ee581d7ea35e5d046 (diff)
parent880a38547ff08715ce4f1daf9a4bb30c87676e68 (diff)
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace
Pull namespace fix from Eric Biederman: "This has a single brown bag fix. The possible deadlock with dec_pid_namespaces that I had thought was fixed earlier turned out only to have been moved. So instead of being cleaver this change takes ucounts_lock with irqs disabled. So dec_ucount can be used from any context without fear of deadlock. The items accounted for dec_ucount and inc_ucount are all comparatively heavy weight objects so I don't exepct this will have any measurable performance impact" * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace: userns: Make ucounts lock irq-safe
Diffstat (limited to 'drivers/usb/dwc3/debug.h')