From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7DF47EB64D7 for ; Fri, 30 Jun 2023 15:30:17 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229522AbjF3PaQ (ORCPT ); Fri, 30 Jun 2023 11:30:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42972 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233112AbjF3P3q (ORCPT ); Fri, 30 Jun 2023 11:29:46 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C60C24686 for ; Fri, 30 Jun 2023 08:28:04 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8F45961784 for ; Fri, 30 Jun 2023 15:27:35 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 84CB6C433C8; Fri, 30 Jun 2023 15:27:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1688138855; bh=/32iJiR/JK8rPYdrc3L2HvX+BSz7BOGH7Jc+j9XCXqM=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=JJdkc7/f8p4psfPzcSEu+LXpoACMuF5/v4KU9T+Tih3MP7jpCrTTGCzMnhR6j54a1 +1IIYgLYssmBDYLEQEIdU+4Q6v6BFR6E3M3YTyCABm6e/m0bI75lftAyHBwW9L3rF3 km48drFOkHQa0p62/RQwHZQ9WsJVfNJjtHwamUQ9dQ19h+BJ80OWrXy60QDniQXUKj V7WhpCvZiD1s+9jQ8txtZ9NEgdbWwC6/Xde2Ga2u26qQyEorfKDMu3FTqdbBIH2elx DHu/wDqXVIZscmkydAz9MiSDO9tXt5+0LlUFXo7KCYe+/1YU2uU5JfPr7jXYVrpspj 9es5pG3tDdp3w== Date: Fri, 30 Jun 2023 08:27:33 -0700 From: Jakub Kicinski To: Ard Biesheuvel Cc: Alexander Potapenko , Tetsuo Handa , Boris Pismenny , John Fastabend , herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, syzkaller-bugs@googlegroups.com, syzbot , Eric Biggers , Aviad Yehezkel , Daniel Borkmann , netdev@vger.kernel.org, "David S. Miller" , Eric Dumazet , Paolo Abeni Subject: Re: [PATCH] net: tls: enable __GFP_ZERO upon tls_init() Message-ID: <20230630082733.4250175b@kernel.org> In-Reply-To: References: <0000000000008a7ae505aef61db1@google.com> <20200911170150.GA889@sol.localdomain> <59e1d5c0-aedb-7b5b-f37f-0c20185d7e9b@I-love.SAKURA.ne.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Fri, 30 Jun 2023 17:16:06 +0200 Ard Biesheuvel wrote: > Note that this is the *input* scatterlist containing the AAD > (additional authenticated data) and the crypto input, and so there is > definitely a bug here that shouldn't be papered over by zero'ing the > allocation. Noob question, it's not the tag / AAD, right? We definitely don't init that..