On Thu, 14 Jul 2022 at 11:16, Christoph Lameter <cl@xxxxxxxxx> wrote: > > On Wed, 13 Jul 2022, Marco Elver wrote: > > > We shouldn't crash, so it should be WARN(), but also returning > > PAGE_SIZE is bad. The intuition behind returning 0 is to try and make > > the buggy code cause less harm to the rest of the kernel. > > > > >From [1]: > > > > > Similarly, if you are able to tell if the passed pointer is not a > > > valid object some other way, you can do something better - namely, > > > return 0. The intuition here is that the caller has a pointer to an > > > invalid object, and wants to use ksize() to determine its size, and > > > most likely access all those bytes. Arguably, at that point the kernel > > > is already in a degrading state. But we can try to not let things get > > > worse by having ksize() return 0, in the hopes that it will stop > > > corrupting more memory. It won't work in all cases, but should avoid > > > things like "s = ksize(obj); touch_all_bytes(obj, s)" where the size > > > bounds the memory accessed corrupting random memory. > > "in the hopes that it will stop corrupting memory"!!!??? > > Do a BUG() then and definitely stop all chances of memory corruption. Fair enough. Well, I'd also prefer to just kill the kernel. But some people don't like that and want the option to continue running. So a WARN() gives that option, and just have to boot the kernel with panic_on_warn to kill it. There are other warnings in the kernel where we'd better kill the kernel as the chances of corrupting memory are pretty damn high if we hit them. And I still don't quite see why the case here is any more or less special. If the situation here is exceedingly rare, let's try BUG() and see what breaks?