[PATCH v2 0/8] memset security handling
Stephen Hemminger
stephen at networkplumber.org
Thu Nov 14 02:52:14 CET 2024
This series handles memset related bugs indentified by PVS Studio.
The root cause is that Gcc and other compilers are free to
optimize away memset called before free.
Most of the places memset was being used like this were bogus;
probably some developer debug habit, and can be safely
removed.
Stephen Hemminger (8):
eal: introduce new secure memory fill
eal: add new secure free function
crypto/qat: force zero of keys
crypto/qat: fix size calculation for memset
crypto/qat: use secure memset
bus/uacce: remove memset before free
compress/octeontx: remove unnecessary memset
test: remove unneeded memset
app/test/test_cmdline_cirbuf.c | 2 --
drivers/bus/uacce/uacce.c | 1 -
drivers/compress/octeontx/otx_zip.c | 1 -
drivers/compress/octeontx/otx_zip_pmd.c | 2 --
drivers/crypto/qat/qat_asym.c | 5 +----
drivers/crypto/qat/qat_sym_session.c | 27 +++++++++++-----------
lib/eal/common/rte_malloc.c | 30 ++++++++++++++++++++-----
lib/eal/include/rte_malloc.h | 18 +++++++++++++++
lib/eal/include/rte_string_fns.h | 27 ++++++++++++++++++++++
lib/eal/version.map | 3 +++
10 files changed, 87 insertions(+), 29 deletions(-)
--
2.45.2
More information about the dev
mailing list