--- [EMAIL PROTECTED] wrote:

> On Tue, 09 Jan 2007 11:02:35 PST, Amit Choudhary said:
> > Correct. And doing kfree(x); x=NULL; is not hiding that. These issues can 
> > still be debugged by
> > using the slab debugging options. One other benefit of doing this is that 
> > if someone tries to
> > access the same memory again using the variable 'x', then he will get an 
> > immediate crash.


What did you understand when I wrote that "if you access the same memory again 
using the variable
'x"?

Using variable 'x' means using variable 'x' and not variable 'y'.


 And
> the
> > problem can be solved immediately, without using the slab debugging 
> > options. I do not yet
> > understand how doing this hides the bugs, obfuscates the code, etc. because 
> > I haven't seen an
> > example yet, but only blanket statements.
> 
> char *broken() {
>       char *x, *y;
>       x = kmalloc(100);
>       y = x;
>       kfree(x);
>       x = NULL;
>       return y;
> }
> 
> Setting x to NULL doesn't do anything to fix the *real* bug here, because
> the problematic reference is held in y, not x.  


Did I ever say that it fixes that kind of bug?


>So you never get a crash
> because somebody dereferences x.
> 


Dereferencing 'x' means dereferencing 'x' and not dereferencing 'y'.

-Amit

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to