Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp2957136rdg; Mon, 16 Oct 2023 23:12:32 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGhpq6GotAO/2RGEh+WmXbQAq7n+pjU/RdYVMUSaScwEYEXtCQavgUEl3/0U0Z8KqD3W+jc X-Received: by 2002:a05:6870:7908:b0:1ea:e36:70d9 with SMTP id hg8-20020a056870790800b001ea0e3670d9mr1355845oab.20.1697523151890; Mon, 16 Oct 2023 23:12:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697523151; cv=none; d=google.com; s=arc-20160816; b=xtuBK57L4VcrYCtb9Ppw9GrOu02d14aaDgIvq9m9eLCXE9bPBqXG2WuOb/HRVmdgNA nDAQtb6SVRghljYk0q25XDxzh+VpeeFjHUONe3csgNQ9cDllHx35cpCDGWLLYUnBA/ZK gjoPekXh9SVB4dr/WPa7LXTq5UFw6GZgk/Sy6kNK31vC+H6HZEgYUGjAMfwWBY0xtIeK QfDi490gA6d5P6zhhHohOOkmjLCQebam6n0K0zmX10o0WxMc/gmroSF0zEZjIAMyPaBI AyhJwL02jRQVUFLRP+Bl1XWJbHct/NdF7rzd8CKs8Rmg+0gD9DPyNeNRPOv3YCGLxn1K 8jzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=vm35Z2nXf+oPVr2umNHbmMG57DF5rQor8aRwdfXsRjI=; fh=SVYrABBKrId2tQKsNN1NGL/1iQSOjZSC/BO8irKEOI4=; b=G1wmkeab7DmUIO+5xWE/95a5hj8iMUfj45rtYBNDgdYuaqSHg7n9IrATqIoN8KUKNl KwKrafDK52Y+NFNDgc6rPqMnaOnngnL6wUD4Z7sQdY8jyMAY3thHg5BJPEGSizDg/jRu vnUTUFI9wYNIPi2LGrvvFMlA6eOIx1r1gpRo4P6Neo6UjKM9SUBZJ9Z/9Y9RiAffOai2 2RiakXeUnUVXYDiHYWV1mSqUZJWnzCqcAUWIkCtHtO+HQOf01QUPmDb1xXWVuOoUL03C yWkFapmzuc+TCX3Cky5rGRQpUnw3EuWyxIuG/BVwnwTzBAQ5Az2ggwUrRwxPHGTdAZNN +Xaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id l65-20020a639144000000b0057884435a71si1001294pge.396.2023.10.16.23.12.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Oct 2023 23:12:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 35A5280BA977; Mon, 16 Oct 2023 23:12:28 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234440AbjJQGMW (ORCPT + 99 others); Tue, 17 Oct 2023 02:12:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58818 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234399AbjJQGMV (ORCPT ); Tue, 17 Oct 2023 02:12:21 -0400 Received: from verein.lst.de (verein.lst.de [213.95.11.211]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4E4A4B6 for ; Mon, 16 Oct 2023 23:12:19 -0700 (PDT) Received: by verein.lst.de (Postfix, from userid 2407) id 6C2A468BFE; Tue, 17 Oct 2023 08:12:15 +0200 (CEST) Date: Tue, 17 Oct 2023 08:12:15 +0200 From: Christoph Hellwig To: Mark O'Donovan Cc: linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org, sagi@grimberg.me, hch@lst.de, axboe@kernel.dk, kbusch@kernel.org, hare@suse.de, Akash Appaiah Subject: Re: [PATCH v3 2/3] nvme-auth: use transformed key size to create resp Message-ID: <20231017061215.GB8454@lst.de> References: <20231016225857.3085234-1-shiftee@posteo.net> <20231016225857.3085234-3-shiftee@posteo.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231016225857.3085234-3-shiftee@posteo.net> User-Agent: Mutt/1.5.17 (2007-11-01) X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Mon, 16 Oct 2023 23:12:28 -0700 (PDT) > +struct nvme_dhchap_key *nvme_auth_transform_key(struct nvme_dhchap_key *key, char *nqn) Please avoid the overly long line. > + key_len = sizeof(*key) + key->len; struct_size again. And maybe add a helper to calculate the size for a key instea dof duplicating it. > + transformed_key = kmemdup(key, key_len, GFP_KERNEL); > return transformed_key ? transformed_key : ERR_PTR(-ENOMEM); Nit, but I find the ? : syntax very confusing when not used in things like macros or argument lines. A if (!transformed_key) return ERR_PTR(-ENOMEM); return transformed_key; is a bit longer, but much easier to read. > } > hmac_name = nvme_auth_hmac_name(key->hash); > @@ -257,7 +258,7 @@ u8 *nvme_auth_transform_key(struct nvme_dhchap_key *key, char *nqn) > > key_tfm = crypto_alloc_shash(hmac_name, 0, 0); > if (IS_ERR(key_tfm)) > - return (u8 *)key_tfm; > + return (void *)key_tfm; This should (already in the original code) use ERR_CAST instead. > + transformed_key = nvme_auth_transform_key(ctrl->host_key, ctrl->hostnqn); Please avoid the overly long line here as well. > +struct nvme_dhchap_key *nvme_auth_transform_key(struct nvme_dhchap_key *key, char *nqn); ... and here.