On Wed, 10 Sep 2014 07:05:40 +0200 (CEST) Jiri Kosina <jkosina@xxxxxxx> wrote: > > > --- a/mm/slab.c > > > +++ b/mm/slab.c > > > @@ -3612,7 +3612,7 @@ void kfree(const void *objp) > > > > > > trace_kfree(_RET_IP_, objp); > > > > > > - if (unlikely(ZERO_OR_NULL_PTR(objp))) > > > + if (unlikely(ZERO_OR_NULL_PTR(objp) || IS_ERR(objp))) > > > return; > > > > kfree() is quite a hot path to which this will add overhead. And we > > have (as far as we know) no code which will actually use this at > > present. > > We obviously don't, as such code will be causing explosions. This is meant > as a prevention of problems such as the one that has just been fixed in > ext4. Well. I bet there exist sites which can pass an ERR_PTR to kfree but haven't been know to do so yet because errors are rare. Your patch would fix all those by magic, but is it worth the overhead? This is the sort of error which a static checker could find. I wonder if any of them do so. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>