[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20100225.073729.174987294.davem@davemloft.net>
Date: Thu, 25 Feb 2010 07:37:29 -0800 (PST)
From: David Miller <davem@...emloft.net>
To: roel.kluin@...il.com
Cc: herbert@...dor.apana.org.au, mikpe@...uu.se,
linux-crypto@...r.kernel.org, akpm@...ux-foundation.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH] sha: prevent removal of memset as dead store in
sha1_update()
From: roel kluin <roel.kluin@...il.com>
Date: Thu, 25 Feb 2010 16:31:36 +0100
> On Thu, Feb 25, 2010 at 4:17 PM, David Miller <davem@...emloft.net> wrote:
>> From: Roel Kluin <roel.kluin@...il.com>
>> Date: Thu, 25 Feb 2010 16:10:27 +0100
>>
>>> Due to optimization A call to memset() may be removed as a dead store when
>>> the buffer is not used after its value is overwritten.
>>>
>>> Signed-off-by: Roel Kluin <roel.kluin@...il.com>
>>
>> Solution is wrong and overkill in my mind.
>>
>> It's overkill because the whole reason it's using a stack buffer is to
>> avoid the overhead of a kmalloc() call.
>>
>> And it's wrong because the reason the memset() is there seems to be
>> to clear out key information that might exist kernel stack so that
>> it's more difficult for rogue code to get at things.
>
> If the memset is optimized away then the clear out does not occur. Do you
> know a different way to fix this?
Not offhand. Maybe we can make some external helper function for the
crypto layer that just does the memset, but is not visible from any of
the call sites. GCC doesn't know the side effects, so it can't
elide the call to that helper function.
That could be subverted by whole-program-optimizations but
currently that really isn't something to worry about.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists