lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4790C80B.4090505@nortel.com>
Date:	Fri, 18 Jan 2008 09:38:51 -0600
From:	"Chris Friesen" <cfriesen@...tel.com>
To:	davids@...master.com
CC:	torvalds@...ux-foundation.org,
	Johannes Weiner <hannes@...urebad.de>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	clameter@....com, penberg@...helsinki.fi
Subject: Re: Why is the kfree() argument const?

David Schwartz wrote:

> 2) The 'kfree' operation changes the logical state of the object pointed to,
> as the object goes from existent to non-existent.

I don't think that kfree() itself changes the state of the object.  It 
doesn't call a destructor or anything like that, so the object itself 
must be "inert" before the call to kfree().  That is, at the time of the 
kfree() call the system must have ensured that the object will no longer 
be used by anything.

The call to kfree() is simply bookkeeping--allowing that memory to be 
reused by other parts of the kernel.

> 3) It is most useful for 'kfree' to be non-const because destroying an
> object through a const pointer can easily be done in error. One of the
> reasons you provide a const pointer is because you need the function you
> pass the pointer to not to modify the object. Since this is an unusual
> operation that could be an error, it is logical to force the person doing it
> to clearly indicate that he knows the pointer is const and that he knows it
> is right anyway.

I have a certain amount of sympathy for this view...it's a fairly 
painless way to reduce the likelihood of errors.  At the same time, I 
don't think I've ever run into this problem myself--is it really all 
that common?

Chris
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ