lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <he2zo2ct4zkv34iiakp7zjzgdbl2n7nj3w7c3dlldvegbs6vxd@zyqrpczadamc>
Date: Thu, 8 Jan 2026 19:57:59 +0800
From: Hao Li <hao.li@...ux.dev>
To: Harry Yoo <harry.yoo@...cle.com>
Cc: akpm@...ux-foundation.org, vbabka@...e.cz, andreyknvl@...il.com, 
	cl@...two.org, dvyukov@...gle.com, glider@...gle.com, hannes@...xchg.org, 
	linux-mm@...ck.org, mhocko@...nel.org, muchun.song@...ux.dev, rientjes@...gle.com, 
	roman.gushchin@...ux.dev, ryabinin.a.a@...il.com, shakeel.butt@...ux.dev, 
	surenb@...gle.com, vincenzo.frascino@....com, yeoreum.yun@....com, tytso@....edu, 
	adilger.kernel@...ger.ca, linux-ext4@...r.kernel.org, linux-kernel@...r.kernel.org, 
	cgroups@...r.kernel.org
Subject: Re: [PATCH V5 8/8] mm/slab: place slabobj_ext metadata in unused
 space within s->size

On Thu, Jan 08, 2026 at 07:44:47PM +0900, Harry Yoo wrote:
> On Thu, Jan 08, 2026 at 05:52:27PM +0800, Hao Li wrote:
> > On Thu, Jan 08, 2026 at 05:41:00PM +0900, Harry Yoo wrote:
> > > On Thu, Jan 08, 2026 at 01:52:09PM +0800, Hao Li wrote:
> > > > On Mon, Jan 05, 2026 at 05:02:30PM +0900, Harry Yoo wrote:
> > > > > When a cache has high s->align value and s->object_size is not aligned
> > > > > to it, each object ends up with some unused space because of alignment.
> > > > > If this wasted space is big enough, we can use it to store the
> > > > > slabobj_ext metadata instead of wasting it.
> > > > 
> > > > Hi, Harry,
> > > 
> > > Hi Hao,
> > > 
> > > > When we save obj_ext in s->size space, it seems that slab_ksize() might
> > > > be missing the corresponding handling.
> > > 
> > > Oops.
> > > 
> > > > It still returns s->size, which could cause callers of slab_ksize()
> > > > to see unexpected data (i.e. obj_ext), or even overwrite the obj_ext data.
> > > 
> > > Yes indeed.
> > > Great point, thanks!
> > > 
> > > I'll fix it by checking if the slab has obj_exts within the object
> > > layout and returning s->object_size if so.
> > 
> > Makes sense - I think there's one more nuance worth capturing.
> > slab_ksize() seems to compute the maximum safe size by applying layout
> > constraints from most-restrictive to least-restrictive:
> > redzones/poison/KASAN clamp it to object_size, tail metadata
> > (SLAB_TYPESAFE_BY_RCU / SLAB_STORE_USER) clamps it to inuse, and only
> > when nothing metadata lives does it return s->size.
> 
> Waaaait, SLAB_TYPESAFE_BY_RCU isn't the only case where we put freelist
> pointer after the object.
> 
> What about caches with constructor?
> We do place it after object, but slab_ksize() may return s->size? 

That's a really good question - thanks for calling it out. I took
another look at the code, and the comment for ksize() notes that it's
only meant to be used with kmalloc()-family allocations; those objects
don't have a ctor pointer. So as long as callers stick to that contract,
I think we should be fine and don't need to worry too much about this
case.

-- 
Thanks,
Hao

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ