From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 2E0A5C4332F for ; Fri, 18 Nov 2022 09:53:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=dD+4RU7GVfoGA9ncOgfqRO5z3D2An1CU9xwGAE4EyDU=; b=PdIJsrkZo2JisG mdG+Hh5h9jc/RccFDu/YGHb2Q1xzcw6b6WLE6RrDXPEZiv9kKKIjWZXs40JhOe3s70Z5A703mJR3t 1zSXarcf/HKq/KAplbA6mb/xCLg8wKvfXL19j+CLJgnaBzBkK/Ss5RhP9SeVDet/TMX6zBCpaHVWz GgPaUcaK9ZpE23MeeP+r+RrjIGt0uxY8VUIoKxzkdOwZMOtopOWOOUqsIyXPpLRyfjJ/zyWnqrBF1 pym6D0e2n96j1Q/MOYoLwMj6kwzycBL7/KYplHmHMNRE3UF8BlHjHr6CiqJe7mUEnYdTTSBN6qfiJ eQ4FZSvDYY2hpaE7npQg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1ovy2V-003F4W-Hb; Fri, 18 Nov 2022 09:52:03 +0000 Received: from desiato.infradead.org ([2001:8b0:10b:1:d65d:64ff:fe57:4e05]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1ovy2T-003F3C-NJ for linux-arm-kernel@bombadil.infradead.org; Fri, 18 Nov 2022 09:52:01 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=desiato.20200630; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=+8jFeHfK53thFHUSFDBWh9hINMWFzglzAMyQx5Fn604=; b=UiAa1e2z+A7Oht8yNnwtAZDVxB tgU1GB2uJeLMog/5VKd5aEKsSyZ9cXRDofLwZwAxFIE7jOGi8LCVT8xFq8FV4noTJOBXCGGIa1qpd V9WwBIfIp4H3VwpV1WbGwdvbC2/HdSgAaPhOc7cwXg57lOELX85d8HUI2cVdcFzeNCBXcMKe9cLy5 91pH4YzH6Z6k8wotndDLNPPwJO4uFFsDFilIBz/0vDjoPeUAA/GwZ3SX8H/8bosgrfn3lugRx7V9A VHvgjkcIZmGL0bQue53v0YMYWunvYLO7bmbFD3Tk2jyLs3n8b3XFb6P+3MxyBAPxojPmUOLFU91B1 5nwakhqg==; Received: from j130084.upc-j.chello.nl ([24.132.130.84] helo=noisy.programming.kicks-ass.net) by desiato.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1ovy2Q-001wM9-Ru; Fri, 18 Nov 2022 09:51:59 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 6DFF5300244; Fri, 18 Nov 2022 10:51:58 +0100 (CET) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id 4FDE8201A1023; Fri, 18 Nov 2022 10:51:58 +0100 (CET) Date: Fri, 18 Nov 2022 10:51:58 +0100 From: Peter Zijlstra To: Eric Biggers Cc: linux-crypto@vger.kernel.org, x86@kernel.org, linux-arm-kernel@lists.infradead.org, Sami Tolvanen Subject: Re: [PATCH 0/11] crypto: CFI fixes Message-ID: References: <20221118090220.398819-1-ebiggers@kernel.org> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20221118090220.398819-1-ebiggers@kernel.org> X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Fri, Nov 18, 2022 at 01:02:09AM -0800, Eric Biggers wrote: > This series fixes some crashes when CONFIG_CFI_CLANG (Control Flow > Integrity) is enabled, with the new CFI implementation that was merged > in 6.1 and is supported on x86. Some of them were unconditional > crashes, while others depended on whether the compiler optimized out the > indirect calls or not. This series also simplifies some code that was > intended to work around limitations of the old CFI implementation and is > unnecessary for the new CFI implementation. > > Eric Biggers (11): > crypto: x86/aegis128 - fix crash with CFI enabled > crypto: x86/aria - fix crash with CFI enabled > crypto: x86/nhpoly1305 - eliminate unnecessary CFI wrappers > crypto: x86/sha1 - fix possible crash with CFI enabled > crypto: x86/sha256 - fix possible crash with CFI enabled > crypto: x86/sha512 - fix possible crash with CFI enabled > crypto: x86/sm3 - fix possible crash with CFI enabled > crypto: arm64/nhpoly1305 - eliminate unnecessary CFI wrapper > crypto: arm64/sm3 - fix possible crash with CFI enabled > crypto: arm/nhpoly1305 - eliminate unnecessary CFI wrapper > Revert "crypto: shash - avoid comparing pointers to exported functions > under CFI" These all look good. They will hoever conflict with the alignment cleanups/changes we've got in tip/x86/core, but there's no helping that I support. Acked-by: Peter Zijlstra (Intel) _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel