Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp40208ybt; Tue, 16 Jun 2020 15:57:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzTTUgklodnoCqe0VsktCDcOTCEyuAM456x4TvOzVa5aEK7uDPlpLiat7qWVbkVyEAPXCzV X-Received: by 2002:a17:906:cede:: with SMTP id si30mr5027804ejb.315.1592348258767; Tue, 16 Jun 2020 15:57:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592348258; cv=none; d=google.com; s=arc-20160816; b=wYtiiq3N4+JeWyYRBwVu4/PdyPdrmjbRm72TWvACTimVhmzrN45ldwejF9upoNtqJM HeD796CgdugYZn8yZDEmEDpOTDxM8TPCG3C9g73CLUSvHT+g5eKmI9MfgAA1pbkv2mrl 3zVTiy/ZbOA/4qR6wy7QMriINIWYSZpvMKTs1mxNS+4WfXBOgh9Fqz3Frsese1sTZw89 TJ8f6F0w3Mvt0hypyt0u9mJl7Q3Le+IG6D0g/+86Aik9F7UZ+fiUYlk2ALZQ2iwRDQOO n0WxWu17slYWoP3e2bEVHN7Ia/MkAw/UJwgMPTtKMT60O/MIy2MSEs7dY8Y8VGbGM7Fh HgDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Zmvxp6TcklTF5tZHdIjURz6zaQoJfhp55XSlQEQbRBQ=; b=ANT+QgaIpBwoK9qunhbWnmyGPhXykx0Y6C50MnvcU1AiVxbFfHfZQ+Xr+uUFSCTcex 01eyHPSvUx2kg6VdGCGnGJwQdaO3zakJyGPiUNjZYuHVnjXcIwNJi28ti1lQavu3A2a7 uqKNJzd47VJXgMlRr8no4dVKpG3gTi9ju4fniBUNChe4xvhn55VxyzHaHTsNYJc6BZFB 8b1tyMbDw3Qo1YXp6h24Mkn+DttrBROUicIC6LfIE+gKk6HN33WPap/REAwBE9FQnVPS XXP+iuIuAHM4OZrf809T0hfp7ZCddLQ+BJX3JTdbsmBaYNxk/zcP6XDhEEUC8HLIKfdR 4kVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=XHfi2r83; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v3si11862756edy.518.2020.06.16.15.57.09; Tue, 16 Jun 2020 15:57:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=XHfi2r83; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726519AbgFPWyh (ORCPT + 99 others); Tue, 16 Jun 2020 18:54:37 -0400 Received: from aserp2120.oracle.com ([141.146.126.78]:55828 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725901AbgFPWyg (ORCPT ); Tue, 16 Jun 2020 18:54:36 -0400 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 05GMl5uh191571; Tue, 16 Jun 2020 22:54:27 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=corp-2020-01-29; bh=Zmvxp6TcklTF5tZHdIjURz6zaQoJfhp55XSlQEQbRBQ=; b=XHfi2r836QGJbY2pb+IHV8UwTlHhIeA1V8Dg2/Log+JAp2Ye4WofBcW2KOqkNULm7M3H ATpM2OLgDQe5XG6K6HY7ztoLiLvIzHLuOHLH8eVNoTVPhzDyOC1lBzxjDUggJBrCyG07 G697HRQ2MY85AWBah5rFvQYT9sk/4LmdZnrSRkEcp3liTfFQ7Ooaxr7UaSb3iUQ1LFQ4 p+Tgv1PfC0OBf7Mh1KsehSwHcMheEfE9EgH5kAqhNLjJX8y/V7MU48fODynBo617Jlnu eQBNz+gPfVyWUDSLjtXNTmLG33Uc6qtFHVMerKA6Zifgs0mbRSoMU37Ba1rfiAnGelBW Ug== Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71]) by aserp2120.oracle.com with ESMTP id 31q65jr6ye-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 16 Jun 2020 22:54:27 +0000 Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1]) by aserp3030.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 05GMr54r145209; Tue, 16 Jun 2020 22:54:27 GMT Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by aserp3030.oracle.com with ESMTP id 31q66m9sxw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 16 Jun 2020 22:54:26 +0000 Received: from abhmp0007.oracle.com (abhmp0007.oracle.com [141.146.116.13]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id 05GMsPkl029460; Tue, 16 Jun 2020 22:54:26 GMT Received: from localhost.localdomain (/73.243.10.6) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 16 Jun 2020 15:54:25 -0700 From: William Kucharski To: linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton Subject: [PATCH] mm: ksize() should silently accept a NULL pointer Date: Tue, 16 Jun 2020 16:54:09 -0600 Message-Id: <20200616225409.4670-1-william.kucharski@oracle.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9654 signatures=668680 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 adultscore=0 phishscore=0 mlxscore=0 bulkscore=0 malwarescore=0 mlxlogscore=884 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2006160157 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9654 signatures=668680 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 clxscore=1011 lowpriorityscore=0 malwarescore=0 cotscore=-2147483648 suspectscore=0 bulkscore=0 mlxlogscore=903 mlxscore=0 impostorscore=0 priorityscore=1501 phishscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2006160156 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Other mm routines such as kfree() and kzfree() silently do the right thing if passed a NULL pointer, so ksize() should do the same. Signed-off-by: William Kucharski --- mm/slab_common.c | 14 +++++--------- 1 file changed, 5 insertions(+), 9 deletions(-) diff --git a/mm/slab_common.c b/mm/slab_common.c index 9e72ba224175..2bff01ad94d8 100644 --- a/mm/slab_common.c +++ b/mm/slab_common.c @@ -1660,10 +1660,9 @@ static __always_inline void *__do_krealloc(const void *p, size_t new_size, gfp_t flags) { void *ret; - size_t ks = 0; + size_t ks; - if (p) - ks = ksize(p); + ks = ksize(p); if (ks >= new_size) { p = kasan_krealloc((void *)p, new_size, flags); @@ -1723,10 +1722,9 @@ void kzfree(const void *p) size_t ks; void *mem = (void *)p; - if (unlikely(ZERO_OR_NULL_PTR(mem))) - return; ks = ksize(mem); - memset(mem, 0, ks); + if (ks) + memset(mem, 0, ks); kfree(mem); } EXPORT_SYMBOL(kzfree); @@ -1749,8 +1747,6 @@ size_t ksize(const void *objp) { size_t size; - if (WARN_ON_ONCE(!objp)) - return 0; /* * We need to check that the pointed to object is valid, and only then * unpoison the shadow memory below. We use __kasan_check_read(), to @@ -1764,7 +1760,7 @@ size_t ksize(const void *objp) * We want to perform the check before __ksize(), to avoid potentially * crashing in __ksize() due to accessing invalid metadata. */ - if (unlikely(objp == ZERO_SIZE_PTR) || !__kasan_check_read(objp, 1)) + if (unlikely(ZERO_OR_NULL_PTR(objp)) || !__kasan_check_read(objp, 1)) return 0; size = __ksize(objp); -- 2.26.2