linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] mm: kfence: Fix false positives on big endian
@ 2023-05-05  3:51 Michael Ellerman
  2023-05-05  7:14 ` Alexander Potapenko
                   ` (2 more replies)
  0 siblings, 3 replies; 9+ messages in thread
From: Michael Ellerman @ 2023-05-05  3:51 UTC (permalink / raw)
  To: glider, elver, akpm, zhangpeng.00; +Cc: linux-kernel, linux-mm, linuxppc-dev

Since commit 1ba3cbf3ec3b ("mm: kfence: improve the performance of
__kfence_alloc() and __kfence_free()"), kfence reports failures in
random places at boot on big endian machines.

The problem is that the new KFENCE_CANARY_PATTERN_U64 encodes the
address of each byte in its value, so it needs to be byte swapped on big
endian machines.

The compiler is smart enough to do the le64_to_cpu() at compile time, so
there is no runtime overhead.

Fixes: 1ba3cbf3ec3b ("mm: kfence: improve the performance of __kfence_alloc() and __kfence_free()")
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
---
 mm/kfence/kfence.h | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/mm/kfence/kfence.h b/mm/kfence/kfence.h
index 2aafc46a4aaf..392fb273e7bd 100644
--- a/mm/kfence/kfence.h
+++ b/mm/kfence/kfence.h
@@ -29,7 +29,7 @@
  * canary of every 8 bytes is the same. 64-bit memory can be filled and checked
  * at a time instead of byte by byte to improve performance.
  */
-#define KFENCE_CANARY_PATTERN_U64 ((u64)0xaaaaaaaaaaaaaaaa ^ (u64)(0x0706050403020100))
+#define KFENCE_CANARY_PATTERN_U64 ((u64)0xaaaaaaaaaaaaaaaa ^ (u64)(le64_to_cpu(0x0706050403020100)))
 
 /* Maximum stack depth for reports. */
 #define KFENCE_STACK_DEPTH 64
-- 
2.40.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2023-05-19  6:30 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-05-05  3:51 [PATCH] mm: kfence: Fix false positives on big endian Michael Ellerman
2023-05-05  7:14 ` Alexander Potapenko
2023-05-05  7:43 ` Marco Elver
2023-05-05 11:56   ` Michael Ellerman
2023-05-05 16:02 ` David Laight
2023-05-17 22:20   ` Andrew Morton
2023-05-19  5:14     ` Michael Ellerman
2023-05-19  6:29       ` Benjamin Gray
2023-05-19  5:40     ` Christophe Leroy

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox