[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1428674403.3377.4.camel@stressinduktion.org>
Date: Fri, 10 Apr 2015 16:00:03 +0200
From: Hannes Frederic Sowa <hannes@...essinduktion.org>
To: Stephan Mueller <smueller@...onox.de>
Cc: Daniel Borkmann <daniel@...earbox.net>, mancha <mancha1@...o.com>,
tytso@....edu, linux-kernel@...r.kernel.org,
linux-crypto@...r.kernel.org, herbert@...dor.apana.org.au,
dborkman@...hat.com
Subject: Re: [BUG/PATCH] kernel RNG and its secrets
On Fr, 2015-04-10 at 15:25 +0200, Stephan Mueller wrote:
> I would like to bring up that topic again as I did some more analyses:
>
> For testing I used the following code:
>
> static inline void memset_secure(void *s, int c, size_t n)
> {
> memset(s, c, n);
> BARRIER
> }
>
> where BARRIER is defined as:
>
> (1) __asm__ __volatile__("" : "=r" (s) : "0" (s));
>
> (2) __asm__ __volatile__("": : :"memory");
>
> (3) __asm__ __volatile__("" : "=r" (s) : "0" (s) : "memory");
Hm, I wonder a little bit...
Could you quickly test if you replace (s) with (n) just for the fun of
it? I don't know if we should ask clang people about that, at least it
is their goal to be as highly compatible with gcc inline asm.
Thanks for looking into this!
Bye,
Hannes
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists