[PATCH v2 0/8] memset security handling

Stephen Hemminger stephen at networkplumber.org
Thu Nov 14 02:52:14 CET 2024


This series handles memset related bugs indentified by PVS Studio.
The root cause is that Gcc and other compilers are free to
optimize away memset called before free.

Most of the places memset was being used like this were bogus;
probably some developer debug habit, and can be safely
removed.

Stephen Hemminger (8):
  eal: introduce new secure memory fill
  eal: add new secure free function
  crypto/qat: force zero of keys
  crypto/qat: fix size calculation for memset
  crypto/qat: use secure memset
  bus/uacce: remove memset before free
  compress/octeontx: remove unnecessary memset
  test: remove unneeded memset

 app/test/test_cmdline_cirbuf.c          |  2 --
 drivers/bus/uacce/uacce.c               |  1 -
 drivers/compress/octeontx/otx_zip.c     |  1 -
 drivers/compress/octeontx/otx_zip_pmd.c |  2 --
 drivers/crypto/qat/qat_asym.c           |  5 +----
 drivers/crypto/qat/qat_sym_session.c    | 27 +++++++++++-----------
 lib/eal/common/rte_malloc.c             | 30 ++++++++++++++++++++-----
 lib/eal/include/rte_malloc.h            | 18 +++++++++++++++
 lib/eal/include/rte_string_fns.h        | 27 ++++++++++++++++++++++
 lib/eal/version.map                     |  3 +++
 10 files changed, 87 insertions(+), 29 deletions(-)

-- 
2.45.2



More information about the dev mailing list