On Fri, Mar 21, 2025 at 05:34:16AM -0400, Mark Johnston wrote:
M> On Fri, Mar 21, 2025 at 01:56:01AM -0700, Gleb Smirnoff wrote:
M> > On Thu, Mar 20, 2025 at 07:52:19PM +0000, Bjoern A. Zeeb wrote:
M> > B> He's hitting a ... somewhere in i915kms.ko (here's the two instances I
M> > B> have):
M> > B> REDZONE: Buffer underflow detected. 16 bytes corrupted before 
0xfffffe089bc65000 (262148 bytes allocated).
M> > B> REDZONE: Buffer underflow detected. 16 bytes corrupted before 
0xfffffe08a7e70000 (262148 bytes allocated).
M> > 
M> > I looked a bit into the problem and it actually seems very trivial to me.
M> > Please re-check my observations.
M> > 
M> > A contigmalloc(9) allocation doesn't get redzone protection, see 
kern_malloc.c.
M> > But free(9) always does contigmalloc check.  This makes deprecation of
M> > contigfree(9) incompatible with redzone(9). And looks like
M> > 19df0c5abcb9d4e951e610b6de98d4d8a00bd5f9 is our first bump into this sad 
fact.
M> 
M> Can we not just add redzone padding to contigmalloc() allocations?

I was about to suggest that, but was afraid it is too naive :) But
if that works, why not?  We probably should document that for
contigmalloc() the redzone would provide protection of the virtual
space, but not the physical.

M> Compile-tested patch below:

Why do you increase the size with redzone_size_ntor() before passing
it to redzone_setup()? Other calls to redzone_setup() don't do that.
My reading is that argument to redzone_setup() shall be exactly the
amount of bytes requested by the malloc KPI user. If you pass
increased value, the canaries will be written after a gap.

-- 
Gleb Smirnoff

Reply via email to