From: Danilo Krummrich <dakr@kernel.org>
To: Andrew Morton <akpm@linux-foundation.org>
Cc: cl@linux.com, penberg@kernel.org, rientjes@google.com,
iamjoonsoo.kim@lge.com, vbabka@suse.cz, roman.gushchin@linux.dev,
42.hyeyoo@gmail.com, linux-kernel@vger.kernel.org,
linux-mm@kvack.org
Subject: Re: [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO
Date: Wed, 31 Jul 2024 02:02:39 +0200 [thread overview]
Message-ID: <Zql_H4g9wJxmJkQJ@pollux.localdomain> (raw)
In-Reply-To: <20240730133540.66e215082a513509c0d8649c@linux-foundation.org>
On Tue, Jul 30, 2024 at 01:35:40PM -0700, Andrew Morton wrote:
> On Tue, 30 Jul 2024 21:42:06 +0200 Danilo Krummrich <dakr@kernel.org> wrote:
>
> > Properly document that if __GFP_ZERO logic is requested, callers must
> > ensure that, starting with the initial memory allocation, every
> > subsequent call to this API for the same memory allocation is flagged
> > with __GFP_ZERO. Otherwise, it is possible that __GFP_ZERO is not fully
> > honored by this API.
> >
> > ...
> >
> > --- a/include/linux/slab.h
> > +++ b/include/linux/slab.h
> > @@ -733,6 +733,14 @@ static inline __alloc_size(1, 2) void *kmalloc_array_noprof(size_t n, size_t siz
> > * @new_n: new number of elements to alloc
> > * @new_size: new size of a single member of the array
> > * @flags: the type of memory to allocate (see kmalloc)
> > + *
> > + * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
> > + * initial memory allocation, every subsequent call to this API for the same
> > + * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
> > + * __GFP_ZERO is not fully honored by this API.
> > + *
> > + * In any case, the contents of the object pointed to are preserved up to the
> > + * lesser of the new and old sizes.
> > */
> > static inline __realloc_size(2, 3) void * __must_check krealloc_array_noprof(void *p,
> > size_t new_n,
> > diff --git a/mm/slab_common.c b/mm/slab_common.c
> > index cff602cedf8e..faa13f42b111 100644
> > --- a/mm/slab_common.c
> > +++ b/mm/slab_common.c
> > @@ -1301,11 +1301,17 @@ __do_krealloc(const void *p, size_t new_size, gfp_t flags)
> > * @new_size: how many bytes of memory are required.
> > * @flags: the type of memory to allocate.
> > *
> > - * The contents of the object pointed to are preserved up to the
> > - * lesser of the new and old sizes (__GFP_ZERO flag is effectively ignored).
> > * If @p is %NULL, krealloc() behaves exactly like kmalloc(). If @new_size
> > * is 0 and @p is not a %NULL pointer, the object pointed to is freed.
> > *
> > + * If __GFP_ZERO logic is requested, callers must ensure that, starting with the
> > + * initial memory allocation, every subsequent call to this API for the same
> > + * memory allocation is flagged with __GFP_ZERO. Otherwise, it is possible that
> > + * __GFP_ZERO is not fully honored by this API.
> > + *
> > + * In any case, the contents of the object pointed to are preserved up to the
> > + * lesser of the new and old sizes.
> > + *
> > * Return: pointer to the allocated memory or %NULL in case of error
> > */
> > void *krealloc_noprof(const void *p, size_t new_size, gfp_t flags)
>
> In both cases, we're saying "callers should do X". I think it would be
> better to say "this implementation does A, hence callers should do X".
> Tell people what's going on.
Sounds reasonable, I'll add an explanation here and in the fixup series for
vrealloc() / kvrealloc().
>
> eg, "if krealloc is expanding an existing allocation, the newly-added
> memory will be uninitialized unless the caller used __GFP_ZERO". Or
> something like that.
>
> I assume that if the caller actually touches the uninitialized memory,
> KASAN will warn?
For the case that is fixed in patch 1 of this series, no. KASAN can't detect
this.
As you say, the memory is just uninitialized (not poisoned), where it should
have been zeroed instead.
next prev parent reply other threads:[~2024-07-31 0:02 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-07-30 19:42 [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Danilo Krummrich
2024-07-30 19:42 ` [PATCH 2/2] mm: krealloc: clarify valid usage of __GFP_ZERO Danilo Krummrich
2024-07-30 20:35 ` Andrew Morton
2024-07-31 0:02 ` Danilo Krummrich [this message]
2024-07-30 20:31 ` [PATCH 1/2] mm: krealloc: consider spare memory for __GFP_ZERO Andrew Morton
2024-07-30 21:06 ` Vlastimil Babka
2024-07-30 21:14 ` Vlastimil Babka
2024-07-30 23:54 ` Danilo Krummrich
2024-07-31 14:30 ` Vlastimil Babka
2024-07-31 14:31 ` Vlastimil Babka
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Zql_H4g9wJxmJkQJ@pollux.localdomain \
--to=dakr@kernel.org \
--cc=42.hyeyoo@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=cl@linux.com \
--cc=iamjoonsoo.kim@lge.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=penberg@kernel.org \
--cc=rientjes@google.com \
--cc=roman.gushchin@linux.dev \
--cc=vbabka@suse.cz \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox