Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp4308446rwb; Tue, 6 Sep 2022 05:53:51 -0700 (PDT) X-Google-Smtp-Source: AA6agR7rmgt+Tp4rtdKH35BE2MK0op2QWu2JImCTr/a3+2kuV3XJzH24jV92XNNozAKQJjpEDCjv X-Received: by 2002:a05:6402:42d3:b0:435:2c49:313d with SMTP id i19-20020a05640242d300b004352c49313dmr46969266edc.86.1662468830804; Tue, 06 Sep 2022 05:53:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662468830; cv=none; d=google.com; s=arc-20160816; b=cXrtYpMOFxP3HLJ9RfIdIsD1RxZGkXfKmB8HqJcblOTpIpaj3jocfcT6sLmqjPw9Fk NN+wkNliLqFAA03jAX5fBvsY23ci7icwytpN64WJSqCkMF08SGko8gPQuq7EgLh7w1sG aMaEMfS8q/EL185UK3fgreF4HceyjqAJwPk2wmxHdPe6dOXKmQhgEW2mZPzRTtKeJNNi zBDGGiXli2D/XVhO8nCTyjThoPTAxQ6Rn9D4kdjTiGGpvXXiTE4FTszM+g4iASUVQ5do oiCWamVGjvm6n8OLz2pi8qIEgP4nqP10R74mMELR2LnjdJ73yFZUjJ4GHoWKSRve0AXt zakA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=MIjdCepheK7VWxQ0KI9hVyBBEn9S1/3cHyxmF4KgfI0=; b=FQqCB9bVBVamrSeEx8sPZSelmkToHFLxnRdI72YENDi5l2fC/dYgEB7n7Aic28HGI7 C+3fziNb6Bu1r7+cKhJLSSGWGtKu0SBaud50ZIFXNc2lHu7bVFbNcHgc+uVmE2E0M4VF a+AuPBcVdbX8B930GTNjmX80BQRbGRd3tNV70StXClzInET6dd3wD+B0aERa6OFFs8XA GG0gm7GtJocddZsvWPm8AtLleApnj747PwT1G6nrA3mjf0n0NN6an4zwli3sknyUm56s R8TQnu1UA2eejaPHXlRCESB7ltIaiDgtV/dnU3FBJm+t3B5KC1U03fpa3+6rIoD+4GsI VDWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="KzWNL/Vb"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w25-20020a170906385900b00744aad5a1a6si8044161ejc.250.2022.09.06.05.53.25; Tue, 06 Sep 2022 05:53:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="KzWNL/Vb"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237809AbiIFMdy (ORCPT + 99 others); Tue, 6 Sep 2022 08:33:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40548 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239862AbiIFMdn (ORCPT ); Tue, 6 Sep 2022 08:33:43 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5D358B2; Tue, 6 Sep 2022 05:33:41 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 0A907B818B2; Tue, 6 Sep 2022 12:33:40 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6C28EC433B5; Tue, 6 Sep 2022 12:33:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662467618; bh=TOw4i+zSEWP18jCONNnvc9ReNz5EICyN8XHogc8vug8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KzWNL/VbbpROG99u2d8tHGLLrFhiqz/UWnXhbu4gCHGDFOiRro0d9mWafVF2Im/hw GOti6WXwgrpfg0QXabBfta+JA94ZQkq9fDQJ5b7Z7qaS//2xjDVHR/39sMzNGSUklV WrKAmeLDBhsrbBLLL6VBT3DZ5ihUjUusYOaUHM43fqccrx3arr9/VBCfWUl9tGYOEX IdJi2s7fUl/W3XEVgcaIQ+APXKY0ZSba0PiPgVe8BMNx7YWNu+Vgxh96wpLj7b6lZb IGA2fZAtxKgMhT/gke31r/HUx/rwFMA2gqsYjVvl6OenBB9nphTdJFtVzqdvjq78cp S2I530qnZI7Mw== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id D965E404A1; Tue, 6 Sep 2022 09:33:35 -0300 (-03) Date: Tue, 6 Sep 2022 09:33:35 -0300 From: Arnaldo Carvalho de Melo To: Zixuan Tan Cc: Arnaldo Carvalho de Melo , Namhyung Kim , Peter Zijlstra , Ingo Molnar , Mark Rutland , Alexander Shishkin , Jiri Olsa , linux-perf-users , linux-kernel Subject: Re: [PATCH] perf/genelf: Switch deprecated openssl MD5_* functions to new EVP API Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Url: http://acmel.wordpress.com X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Tue, Sep 06, 2022 at 05:40:24PM +0800, Zixuan Tan escreveu: > Hi Arnaldo, are there any updates? Trying to apply it manually: ⬢[acme@toolbox perf-urgent]$ am Applying: perf/genelf: Switch deprecated openssl MD5_* functions to new EVP API error: corrupt patch at line 31 Patch failed at 0001 perf/genelf: Switch deprecated openssl MD5_* functions to new EVP API hint: Use 'git am --show-current-patch=diff' to see the failed patch When you have resolved this problem, run "git am --continue". If you prefer to skip this patch, run "git am --skip" instead. To restore the original branch and stop patching, run "git am --abort". ⬢[acme@toolbox perf-urgent]$ git am --abort ⬢[acme@toolbox perf-urgent]$ ⬢[acme@toolbox perf-urgent]$ patch -p1 < ~/wb/1.patch patching file tools/perf/util/genelf.c patch: **** malformed patch at line 141: const void *code, size_t csize) ⬢[acme@toolbox perf-urgent]$ ⬢[acme@toolbox perf-urgent]$ tail -30 ~/wb/1.patch #endif @@ -142,15 +139,20 @@ gen_build_id(struct buildid_note *note, static void gen_build_id(struct buildid_note *note, unsigned long load_addr, const void *code, size_t csize) { - MD5_CTX context; + EVP_MD_CTX *mdctx; if (sizeof(note->build_id) < 16) errx(1, "build_id too small for MD5"); - MD5_Init(&context); - MD5_Update(&context, &load_addr, sizeof(load_addr)); - MD5_Update(&context, code, csize); - MD5_Final((unsigned char *)note->build_id, &context); + mdctx = EVP_MD_CTX_new(); + if (!mdctx) + errx(2, "failed to create EVP_MD_CTX"); + + EVP_DigestInit_ex(mdctx, EVP_md5(), NULL); + EVP_DigestUpdate(mdctx, &load_addr, sizeof(load_addr)); + EVP_DigestUpdate(mdctx, code, csize); + EVP_DigestFinal_ex(mdctx, (unsigned char *)note->build_id, NULL); + EVP_MD_CTX_free(mdctx); } #endif -- 2.34.1 ⬢[acme@toolbox perf-urgent]$ > Thanks, > - Zixuan > > On Sat, Aug 27, 2022 at 2:32 AM Namhyung Kim wrote: > > > > Hello, > > > > On Fri, Aug 26, 2022 at 10:22 AM Zixuan Tan wrote: > > > > > > On Fri, Aug 26, 2022 at 4:17 AM Arnaldo Carvalho de Melo > > > wrote: > > > > > > > > Em Fri, Aug 26, 2022 at 01:00:58AM +0800, Zixuan Tan escreveu: > > > > > Switch to the flavored EVP API like in test-libcrypto.c, and remove the > > > > > bad gcc #pragma. > > > > > > > > > > Inspired-By: 5b245985a6de ("tools build: Switch to new openssl API for > > > > > test-libcrypto") > > > > > > > > How did you test the end result? Can you please describe step by step? > > > > > > > > Also please consider adding a 'perf test' entry to make sure this > > > > doesn't regress. > > > > > > Sorry but I don't get what you mean, what results do I need to test? > > > > > > These EVP_* APIs are just replacements for the deprecated MD5_* APIs in > > > openssl v3 [1][2]. With the same input, they produce the same MD5 digest. > > > > > > And this patch just does the migration work for the upgrade and does not > > > change the logic of the code. so...what should I test? > > > > Yeah, I understand that this merely changes the MD5 APIs. > > While it's good to have a test case for the genelf code, I don't think > > it belongs to this patch. So, > > > > Acked-by: Namhyung Kim > > > > > > > > > > Links: > > > [1] https://www.openssl.org/docs/man3.0/man3/MD5.html > > > [2] https://stackoverflow.com/questions/69806220/advice-needed-for-migration-of-low-level-openssl-api-to-high-level-openssl-apis -- - Arnaldo