Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3090863ybt; Mon, 29 Jun 2020 15:07:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzNycrA67OSqlqtP2n9smN2CDOUnbBUK13RBm7PJGbhxAKAXWdx/iwGeOBxE0dcDbsbwWaO X-Received: by 2002:a05:6402:1655:: with SMTP id s21mr18695310edx.289.1593468427014; Mon, 29 Jun 2020 15:07:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593468427; cv=none; d=google.com; s=arc-20160816; b=ByOXbaeR3J2xWI8svJ+C2o8+bt689QargDk6dVEK5tz+WWd+9RzZ3urmQ/yUZVGfan WI8RjwI167JBZNmEwALdjO1wnw7+xKLn4u+AcgmMI5Th4h8g4etYH/Z6Pj9ygpRYUuyK hhN0rHtsmn6anT9tuy57StCo1TEqd7dPSWV0A3Y99emFtuGLDNS7V9xyFUzOtaXZEWj6 7KcHu9zEyWnf9CJrdb61C/0aYiR6hs8BfrxOIhx9xXrk3D+4OlZjsUWxVi1j/22L+Ycp WimMS1XB+01aXEj+sJoUi32f8RTaKqgiv+l36TT1F5CGOEQEZ2n3uzzLYhjdzWvAaJ1I xSCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=30Yds1TSAB1XymknGM4y5zHLXDWJofZJdyjcoFTuovk=; b=Q+NiIdYusXAWP89qh61x9EZGjdsdmZWGCfDB1OZVmz7VH9UA8/jQy4g8z7nRa1o89K hva2Lp8ULiaOlJUzGpA6kabgB31xNTWM/yv7Mfd+qUf5YpxSXYGKj80jeEzLSCCDsWA3 PlkAAa/fyRTQTHLVi57AF+vyLPHNYJbkLD/HcQEr1UkE9++huvOT58NjhaBCTTy9wG1k e0ddDUh2LGUI8bg2tilrimL8vo3Dfh8G+9/QfI1jYk7WfDrb2J5HdJDOBsMkn+nrjMGT cvFzKO3gXTvjw59+nrhn+sd3OWKpiqPBF3j26aXHe8W4P46ZEBRhRpMdH3dXRJZkkdKL /dvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QQfsjHEp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id mb18si549788ejb.384.2020.06.29.15.06.43; Mon, 29 Jun 2020 15:07:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QQfsjHEp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404682AbgF2WFl (ORCPT + 99 others); Mon, 29 Jun 2020 18:05:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:56762 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726151AbgF2SfT (ORCPT ); Mon, 29 Jun 2020 14:35:19 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 11381247BB; Mon, 29 Jun 2020 15:21:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593444120; bh=Fo58XYYbLg0fR3AnA2QeKF2c5Xegrf9NXglg4qyGSC8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QQfsjHEp8luhvfypCXXlcjytwztzMcm0KfId9l1dhjl45CmRKg5dEV8nT6AIfnOJB NpjN/fNVv3NaQEehMC55b2xLv22LKes8nofvHY9ACoaEsFIQImPH7+k8NI0LqYha9Y k5oM4nhBARToeYZw4NXhZz965kP07Eg3gfTDfzVE= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Waiman Long , Michal Hocko , David Howells , Jarkko Sakkinen , James Morris , "Serge E. Hallyn" , Joe Perches , Matthew Wilcox , David Rientjes , Johannes Weiner , Dan Carpenter , "Jason A . Donenfeld" , Andrew Morton , Linus Torvalds , Greg Kroah-Hartman Subject: [PATCH 5.7 230/265] mm/slab: use memzero_explicit() in kzfree() Date: Mon, 29 Jun 2020 11:17:43 -0400 Message-Id: <20200629151818.2493727-231-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629151818.2493727-1-sashal@kernel.org> References: <20200629151818.2493727-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.7-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.7.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.7.7-rc1 X-KernelTest-Deadline: 2020-07-01T15:14+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Waiman Long commit 8982ae527fbef170ef298650c15d55a9ccd33973 upstream. The kzfree() function is normally used to clear some sensitive information, like encryption keys, in the buffer before freeing it back to the pool. Memset() is currently used for buffer clearing. However unlikely, there is still a non-zero probability that the compiler may choose to optimize away the memory clearing especially if LTO is being used in the future. To make sure that this optimization will never happen, memzero_explicit(), which is introduced in v3.18, is now used in kzfree() to future-proof it. Link: http://lkml.kernel.org/r/20200616154311.12314-2-longman@redhat.com Fixes: 3ef0e5ba4673 ("slab: introduce kzfree()") Signed-off-by: Waiman Long Acked-by: Michal Hocko Cc: David Howells Cc: Jarkko Sakkinen Cc: James Morris Cc: "Serge E. Hallyn" Cc: Joe Perches Cc: Matthew Wilcox Cc: David Rientjes Cc: Johannes Weiner Cc: Dan Carpenter Cc: "Jason A . Donenfeld" Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/slab_common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/slab_common.c b/mm/slab_common.c index 9e72ba2241750..37d48a56431d0 100644 --- a/mm/slab_common.c +++ b/mm/slab_common.c @@ -1726,7 +1726,7 @@ void kzfree(const void *p) if (unlikely(ZERO_OR_NULL_PTR(mem))) return; ks = ksize(mem); - memset(mem, 0, ks); + memzero_explicit(mem, ks); kfree(mem); } EXPORT_SYMBOL(kzfree); -- 2.25.1