Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4033813ybp; Mon, 7 Oct 2019 02:03:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqx9z6+wKHIy5SNvMCk5o40umplKydoYWh0WVpljY7M5se7Y35/7cel9fMy+NzfY1NzaB8+p X-Received: by 2002:aa7:c614:: with SMTP id h20mr27265629edq.209.1570438983471; Mon, 07 Oct 2019 02:03:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570438983; cv=none; d=google.com; s=arc-20160816; b=h24FfMBlPNVPHnbkTEeUAF7AWYn1yaiLKyWOH2G46vIL73jDhrCbKfhRt+rBsH0MiS duWUFVSOm1LIt7QClR7nMk0gnWlNrKNhn8drktMetckQ0jDyh90vtJ9G8KdCGHMfEUPY 3AwF0zI7S/i0KNGJE55FNoDbnBKY71GDs9c2u4swlPvU0szBgkXX79He33EfoLNFvuc0 q7q6Fv9HsXbK+B8TtZJKtDVC93oC1fDHK+cSk9+7FFD8LXLJkmz7cpOy+EEGA0MhafOU vajnvYIvhVkKD746S2daXRI801fB/I+WXplyYTALfr2EL9wxbZecyBMEaI+ywTEtvP24 SEpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=bXlqJ63e6LUpN8n6tn96qpQIMttI/LHCSLhxx+auGzE=; b=wjpCwGWX6TDmCClGB5OmlSoHpCPV1LbQ4h+2cJ2GCArJg923cee9yEsypxvBL9bEwT EEN5VjZomcE91Mtd6mHJJIt1Adqn+EQ1Pch6XMCH8d//k8vESLRFBo4YJfZUpdooZsF6 GethtN5o09xAqRkP9E9AmYb6bWKgkgkNrFEyXhz3wl6olKEKlz7jPyy6BuvVDm5xYJmg guMR6WUFn1C9knVDiEclrONAJcQwU3PaQgg/0ZxcHzsuDHPf5wTcsyGI7KjNYM6g/HfR 3IAkBJoIjHt3zbF4Nl1kDtZLfIeVaELwOgMVCIxVpEt9+9qAK6hj8k6AgW0Mk0Ndgz8h Oidw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=TvdiuuCb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b47si8516821edc.45.2019.10.07.02.02.38; Mon, 07 Oct 2019 02:03:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=TvdiuuCb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727401AbfJGJC0 (ORCPT + 99 others); Mon, 7 Oct 2019 05:02:26 -0400 Received: from mo4-p01-ob.smtp.rzone.de ([85.215.255.53]:10957 "EHLO mo4-p01-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727262AbfJGJC0 (ORCPT ); Mon, 7 Oct 2019 05:02:26 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1570438944; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From: X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender; bh=bXlqJ63e6LUpN8n6tn96qpQIMttI/LHCSLhxx+auGzE=; b=TvdiuuCbNeRCjxXEdE7Iz7qwSkGhiun7mmwvbgfBZJ9E4VTq858X2ACxYyEG4OzHun UUdf1nYD6ujDYxKOs4S7tSU4L7vRxvQ3S3YxIUuYB9QNakuYgLjKSftIKSQYpR9ZBkn1 hbuSFSJzpljF+DgarZShjRyXi4J0cwBKvpsL0QvhnQIYxXk8ZNE4Tgg3IV1t/o+DmytP idR/4USLNpUz7X7AcysCpvPN/Gy1HmSpNYua2OvVQHJf9WC9YFf03V/NR/pYxpZFdy/z rnxmpfM35+NBEmwm//eH+6QbGsZEP+uDJNjIx4rPaYh0uVKonJAfgu9AyEg+nbOWoEW9 QrhQ== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xmwdNnzGHXPbI/SfP6I9" X-RZG-CLASS-ID: mo00 Received: from tauon.chronox.de by smtp.strato.de (RZmta 44.28.0 DYNA|AUTH) with ESMTPSA id I003a5v978xJybi (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (curve secp521r1 with 521 ECDH bits, eq. 15360 bits RSA)) (Client did not present a certificate); Mon, 7 Oct 2019 10:59:19 +0200 (CEST) From: Stephan Mueller To: Hans de Goede Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , Herbert Xu , Ard Biesheuvel , linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, Arvind Sankar Subject: Re: [PATCH 5.4 regression fix] x86/boot: Provide memzero_explicit Date: Mon, 07 Oct 2019 10:59:19 +0200 Message-ID: <65461301.CAtk0GNLiE@tauon.chronox.de> In-Reply-To: <20191007085501.23202-1-hdegoede@redhat.com> References: <20191007085501.23202-1-hdegoede@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Montag, 7. Oktober 2019, 10:55:01 CEST schrieb Hans de Goede: Hi Hans, > The purgatory code now uses the shared lib/crypto/sha256.c sha256 > implementation. This needs memzero_explicit, implement this. > > Reported-by: Arvind Sankar > Fixes: 906a4bb97f5d ("crypto: sha256 - Use get/put_unaligned_be32 to get > input, memzero_explicit") Signed-off-by: Hans de Goede > > --- > arch/x86/boot/compressed/string.c | 5 +++++ > 1 file changed, 5 insertions(+) > > diff --git a/arch/x86/boot/compressed/string.c > b/arch/x86/boot/compressed/string.c index 81fc1eaa3229..511332e279fe 100644 > --- a/arch/x86/boot/compressed/string.c > +++ b/arch/x86/boot/compressed/string.c > @@ -50,6 +50,11 @@ void *memset(void *s, int c, size_t n) > return s; > } > > +void memzero_explicit(void *s, size_t count) > +{ > + memset(s, 0, count); May I ask how it is guaranteed that this memset is not optimized out by the compiler, e.g. for stack variables? > +} > + > void *memmove(void *dest, const void *src, size_t n) > { > unsigned char *d = dest; Ciao Stephan