Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp891706rwb; Fri, 18 Nov 2022 09:34:43 -0800 (PST) X-Google-Smtp-Source: AA0mqf7/HdyBtdt8eJsi0sUzA+PQbT2uJyBXrzRIfgnCJGJtNHQehjJTH8eR2ejEvwsY4qkesFDn X-Received: by 2002:a17:90b:3c45:b0:20a:db08:8a8a with SMTP id pm5-20020a17090b3c4500b0020adb088a8amr14622400pjb.141.1668792882976; Fri, 18 Nov 2022 09:34:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668792882; cv=none; d=google.com; s=arc-20160816; b=JxiUspFXXXT2YGkozJ0si4gzpClN6oG+UZHM0R9UK2Nx2hEekMUmx6ylO8ok3ABnFH RUxqXoYpfy6cxruVWeGXkC6uS7I60+53TUhoGp7cmmOfoHIGqgBFtcV6n1wZoHidJXQu BNRjwMyHU2GS0/I8wOLgRoTljm3GC/qHYZGA7h+ZrRzIEPRm6NCvzPIMJmaL5GbCecXl Nhb3N8QQXvlenreqgPeWBtmqBAkSIqtxj/SNrQHQtustgErlEWi+EK+iYgGhMAnmPMo2 pJtlDU9PqlnA/ibjbpqexTvJyb2kORWJUAgXgCqu3FV/iAms/b8mSwlxladAfPjmKPyz WRDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=aBnx0UjYWHFOugieo61rxhK1NYH631ucDHVcVLIUyL0=; b=jH4F+iJpx+jgkSZZnKYe5sqyCQEYjODkEUIEB2l10wMPsltyaapoNPcki+KYol9n6G GQbA8jsTgayBxWOxPIF5CBeVYJOf1swxVFQU0cSbBN+QgAf2vgfSNkR0FHurMxfnd695 ctq9/jRo2lJf9GLVWVYzeEsZZC7FXDp+PVLSq2jTI2k0tUpUmofkgs7cpvecXLKXwlAL w7wtk+znxqHqYw3P05eo5zJ5YUMXg2lpAFMhZnuLwOPrUHwPwwrz/XAK2T5LdyeQmY69 xmOdLyEZcKdCMkbmcEzVLGvKLoVwwa99hFSPfKQtaH638gWhJ6MIOTdFzJYkyhPxOMsw eDQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=WqAvU1Rz; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u14-20020a63790e000000b00477341c0e62si1480890pgc.721.2022.11.18.09.34.21; Fri, 18 Nov 2022 09:34:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=WqAvU1Rz; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242343AbiKRRVo (ORCPT + 99 others); Fri, 18 Nov 2022 12:21:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55488 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235215AbiKRRVl (ORCPT ); Fri, 18 Nov 2022 12:21:41 -0500 Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 743392F03B for ; Fri, 18 Nov 2022 09:21:40 -0800 (PST) Received: by mail-ed1-x52d.google.com with SMTP id x2so8087478edd.2 for ; Fri, 18 Nov 2022 09:21:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=aBnx0UjYWHFOugieo61rxhK1NYH631ucDHVcVLIUyL0=; b=WqAvU1Rz4ZqPy5A/GuoUURtSueLb1U75hDmzuJQSQcSGGPvOMXDbrJiBv1zQoxR2ng m6bCObZMlesyHfvEoZR+F3T0wm9Sp/mYgq3/tcOZf2UY1o9SLVOvdQaJjMtjjc+3GU+w yERgh668hu6omxoIsL35BMNBSLSkzpjjY3zKqVuh4E8vjoHQ0O0Hz8hSQDRQm3ciHEaN YPL04IirxV6bb1xVhzjVNO/ZxeWUEx2VjSOc13duauvYdh7p2UwmzCCny1YjnzVp6MX1 RUgzhkYcX4FwUOjQo2fT+ow5At6cN9xRX5ytBlUYWgJcAgLDYwwpQcpZZWz6FlE2ylZl 9vFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=aBnx0UjYWHFOugieo61rxhK1NYH631ucDHVcVLIUyL0=; b=Yy0/yevXTMx7wToVgDkisK8vBJvRdsNjjUkJENxkT0gfovlavf6h0XliIpyjsMP+jQ X/Qw1PXVdBo+4ZcSEwsLYz7buOiMquu2wlmBLsQ1s3ehf5e3y4MQi0tcImzw+XqxLuaB gQrVYpPLvEYXq4Z1aAoIZyTd83hsANvMsN87K+q0WQL6pZWe+aLVbJLEFOcrslYlsqP1 pQrGqoqO8+/4q6ZihNAE6pfuo2VjHoXrwjArQ4KdpBbSzeb7zZjHfjbqZi/XDsw82Q90 VMqmDqQ7zHaA4YH7WBsdxZ0JaarOzf+OH/GRhTpP5Zf5Rj4/7v2xSCqXR1h16C6e3BvI jAnQ== X-Gm-Message-State: ANoB5pneIxgDtXDHDjel6f5qXPq5dQEoY9uFxnPUOGz4S2iM9DWPtx9L Aj031anspsR1xLLKenuhu+jqNjL31e+BaBhgy80vbAFaCFA= X-Received: by 2002:aa7:c04f:0:b0:45c:f13b:4b96 with SMTP id k15-20020aa7c04f000000b0045cf13b4b96mr7013650edo.129.1668792098642; Fri, 18 Nov 2022 09:21:38 -0800 (PST) MIME-Version: 1.0 References: <20221118090220.398819-1-ebiggers@kernel.org> In-Reply-To: <20221118090220.398819-1-ebiggers@kernel.org> From: Sami Tolvanen Date: Fri, 18 Nov 2022 09:21:02 -0800 Message-ID: Subject: Re: [PATCH 0/11] crypto: CFI fixes To: Eric Biggers Cc: linux-crypto@vger.kernel.org, x86@kernel.org, linux-arm-kernel@lists.infradead.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, Nov 18, 2022 at 1:04 AM Eric Biggers wrote: > > This series fixes some crashes when CONFIG_CFI_CLANG (Control Flow > Integrity) is enabled, with the new CFI implementation that was merged > in 6.1 and is supported on x86. Some of them were unconditional > crashes, while others depended on whether the compiler optimized out the > indirect calls or not. This series also simplifies some code that was > intended to work around limitations of the old CFI implementation and is > unnecessary for the new CFI implementation. > > Eric Biggers (11): > crypto: x86/aegis128 - fix crash with CFI enabled > crypto: x86/aria - fix crash with CFI enabled > crypto: x86/nhpoly1305 - eliminate unnecessary CFI wrappers > crypto: x86/sha1 - fix possible crash with CFI enabled > crypto: x86/sha256 - fix possible crash with CFI enabled > crypto: x86/sha512 - fix possible crash with CFI enabled > crypto: x86/sm3 - fix possible crash with CFI enabled > crypto: arm64/nhpoly1305 - eliminate unnecessary CFI wrapper > crypto: arm64/sm3 - fix possible crash with CFI enabled > crypto: arm/nhpoly1305 - eliminate unnecessary CFI wrapper > Revert "crypto: shash - avoid comparing pointers to exported functions > under CFI" Thanks for the patches, Eric! These look good to me. Reviewed-by: Sami Tolvanen Sami