Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp147285imb; Thu, 28 Feb 2019 19:04:04 -0800 (PST) X-Google-Smtp-Source: APXvYqwUIWAgaFUFDNG0ufnKrndkFaaIpVvFS4jMYE7XALYmIvtExWxNqamt4qPCcTO5UDgTmVYz X-Received: by 2002:a63:1105:: with SMTP id g5mr2601753pgl.322.1551409444702; Thu, 28 Feb 2019 19:04:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551409444; cv=none; d=google.com; s=arc-20160816; b=lLdk+aKoo32Sabl463hBNN91xkmOKPaZjjhrlsaE+jlGTeR4bls+E8CLqgTzw91m9a QeQJCPnkevvGJNUQCxkrYU1tMvabfGvjGdICVJC6mMgHSF3sDjpkGIm0HAPFfLYtbnz4 ZGPpOnbTHRyNYu6QXR6Dethyv9gGCGnemkwFtYmjiP1rx4q/Rpw8pukneF/Owc29AdCm qYwsH4TOGiNsmRqG+ZXxjX+ARSo+Wn6SH5VWn87FcngXNv9uHDDWgBtpCWguatVJFL4R ptXS4Q5pWo3RnTSehirr7qoz0gpaTDz2juZMf1IOelCm+46qJ5adI5371CRzvyCqkfY3 rUJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date; bh=IRvwF6eQyOS682vpTT2OQ43fMJLCnE4d+Ds1Mxg6k10=; b=oUvNgK5ggWQoY6ct8TbkvKXp4XOkKooerQo9WwUcSw1wVa/Xtsi3tUIciVBCO6c+CX C7cqJJFzxs4qUXsVmXyCg78sCtHBE4gN01nbNBe46DRMmL3kUp0A7+rZlT2x/j+8iZvR qFt+A27WAIGa/jqwH2e3nl6Lz97KYxnl8/2YwhjTBKvYgLap0RfvZbUpHkuLRPEdTNq5 yxap4T9/C5MBbWQN/H61juPxNMcUe/jlbqZzAQB6IZpRZvwpTuga8Z0DXOK1jmOwHg5h s2vlgyJZIMifVMmiIKzY3Jki5UBKQ9fiLmH/VnYyQp8q67/QEwgw5DUXddvKPh9gxBXt S34w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x33si19477647pga.130.2019.02.28.19.03.48; Thu, 28 Feb 2019 19:04:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731747AbfCACeQ (ORCPT + 99 others); Thu, 28 Feb 2019 21:34:16 -0500 Received: from orcrist.hmeau.com ([104.223.48.154]:51904 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725896AbfCACeQ (ORCPT ); Thu, 28 Feb 2019 21:34:16 -0500 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtps (Exim 4.89 #2 (Debian)) id 1gzY03-0007Aw-OZ; Fri, 01 Mar 2019 10:34:11 +0800 Received: from herbert by gondobar with local (Exim 4.89) (envelope-from ) id 1gzY01-0003Ha-BG; Fri, 01 Mar 2019 10:34:09 +0800 Date: Fri, 1 Mar 2019 10:34:09 +0800 From: Herbert Xu To: David Howells , Mimi Zohar , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v5 04/10] crypto: akcipher - new verify API for public key algorithms Message-ID: <20190301023409.e2zgemssjjrrty4t@gondor.apana.org.au> References: <20190228183923.5klzwli5zmeew54j@altlinux.org> <20190224060828.2527-5-vt@altlinux.org> <20190224060828.2527-1-vt@altlinux.org> <14843.1551377934@warthog.procyon.org.uk> <17533.1551380529@warthog.procyon.org.uk> <20190228190741.fv2qxwwtlpdffhwq@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190228190741.fv2qxwwtlpdffhwq@altlinux.org> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 28, 2019 at 10:07:42PM +0300, Vitaly Chikunov wrote: > David, > > On Thu, Feb 28, 2019 at 07:02:09PM +0000, David Howells wrote: > > | > It's not clear that sig->digest is guaranteed to be kmalloc memory. > > > > Well, public_key_signature_free() will go bang if it's not kfree'able. > > Well, I had similar argument, FYI: > > | On Fri, Feb 01, 2019 at 10:09:23AM +0300, Vitaly Chikunov wrote: > | > On Fri, Feb 01, 2019 at 02:26:55PM +0800, Herbert Xu wrote: > | > > > | > > It's not clear that sig->digest is guaranteed to be kmalloc memory. > | > > In any case, it's best not to mix unrelated changes in a single > | > > patch. So please keep the kmalloc on output and then copy > | > > sig->digest into it and put output into the SG list. > | > > | > It is not guaranteed that sig->s will be kmalloc memory either. (Except > | > we know it for sure like we know the same about sig->digest). > | > > | > You can see in public_key_signature_free() that both fields are kfree'd > | > together. > | > > | > So, I don't understand why we should treat sig->digest differently than > | > sig->s. > | > > | > I was just removing kmalloc'ed output as crypto_akcipher_verify() does > | > not need any output anymore. So, it's not some sort of mixing unrelated > | > changes, from my point of view. > > But then I thought Herbert knows better and implemented his suggestion. > > Now I have contradictory requests from two maintainers. My main point is to not include unrelated changes into your patch. If you want to eliminate the copy that's fine, but please do it in a separate patch. Cheers, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt