From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4C83EECAAD5 for ; Tue, 6 Sep 2022 12:38:21 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237610AbiIFMiU (ORCPT ); Tue, 6 Sep 2022 08:38:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48712 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239822AbiIFMiT (ORCPT ); Tue, 6 Sep 2022 08:38:19 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 98D1B2983F; Tue, 6 Sep 2022 05:38:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 373E46150F; Tue, 6 Sep 2022 12:38:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6EEB3C433D6; Tue, 6 Sep 2022 12:38:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662467897; bh=0vHsV5HC+l1IsaFdtMuDEtBLZW+5drwFHn/b6WUSBFg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=C7EVwfeWliv+TmYW0Q2xyZsPL+0vPbALYlgyeneap+E1265wKlj3qm9lxRKCgksIE 1r+SJis0Yaq3UNDvAyABlbqROnon0/luM+VxTwVXiBZJ04A1dPyccObpf0BMRwCOrS e9q3+TdZuGx4P6g9TLyxR8bXruUhj33HDvjfxPWVAeO2htTENhaqGzUEDOLHWHNMyU wJVOoWgM1qUCPnv0924wt3HFfxY9C0ZfSpxq+Si/bQEX2Mmp1mogc+KhSifDBvvCpA fjVTdDz+OWfnbzNlQ1ymCUBUYGO+5porc5cUxe3fiGCX8KHnHF4auPzSbzIP9zsW4K xjnPXBQpnUGZw== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 322BD404A1; Tue, 6 Sep 2022 09:38:15 -0300 (-03) Date: Tue, 6 Sep 2022 09:38:15 -0300 From: Arnaldo Carvalho de Melo To: Zixuan Tan Cc: Arnaldo Carvalho de Melo , Namhyung Kim , Peter Zijlstra , Ingo Molnar , Mark Rutland , Alexander Shishkin , Jiri Olsa , linux-perf-users , linux-kernel Subject: Re: [PATCH] perf/genelf: Switch deprecated openssl MD5_* functions to new EVP API Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Url: http://acmel.wordpress.com Precedence: bulk List-ID: X-Mailing-List: linux-perf-users@vger.kernel.org Em Tue, Sep 06, 2022 at 09:33:35AM -0300, Arnaldo Carvalho de Melo escreveu: > Em Tue, Sep 06, 2022 at 05:40:24PM +0800, Zixuan Tan escreveu: > > Hi Arnaldo, are there any updates? > > Trying to apply it manually: Done. Thanks. - Arnaldo > ⬢[acme@toolbox perf-urgent]$ am > Applying: perf/genelf: Switch deprecated openssl MD5_* functions to new EVP API > error: corrupt patch at line 31 > Patch failed at 0001 perf/genelf: Switch deprecated openssl MD5_* functions to new EVP API > hint: Use 'git am --show-current-patch=diff' to see the failed patch > When you have resolved this problem, run "git am --continue". > If you prefer to skip this patch, run "git am --skip" instead. > To restore the original branch and stop patching, run "git am --abort". > ⬢[acme@toolbox perf-urgent]$ git am --abort > ⬢[acme@toolbox perf-urgent]$ > ⬢[acme@toolbox perf-urgent]$ patch -p1 < ~/wb/1.patch > patching file tools/perf/util/genelf.c > patch: **** malformed patch at line 141: const void *code, size_t csize) > > ⬢[acme@toolbox perf-urgent]$ > > ⬢[acme@toolbox perf-urgent]$ tail -30 ~/wb/1.patch > #endif > @@ -142,15 +139,20 @@ gen_build_id(struct buildid_note *note, > static void > gen_build_id(struct buildid_note *note, unsigned long load_addr, > const void *code, size_t csize) > { > - MD5_CTX context; > + EVP_MD_CTX *mdctx; > > if (sizeof(note->build_id) < 16) > errx(1, "build_id too small for MD5"); > > - MD5_Init(&context); > - MD5_Update(&context, &load_addr, sizeof(load_addr)); > - MD5_Update(&context, code, csize); > - MD5_Final((unsigned char *)note->build_id, &context); > + mdctx = EVP_MD_CTX_new(); > + if (!mdctx) > + errx(2, "failed to create EVP_MD_CTX"); > + > + EVP_DigestInit_ex(mdctx, EVP_md5(), NULL); > + EVP_DigestUpdate(mdctx, &load_addr, sizeof(load_addr)); > + EVP_DigestUpdate(mdctx, code, csize); > + EVP_DigestFinal_ex(mdctx, (unsigned char *)note->build_id, NULL); > + EVP_MD_CTX_free(mdctx); > } > #endif > > -- > 2.34.1 > ⬢[acme@toolbox perf-urgent]$ > > > Thanks, > > - Zixuan > > > > On Sat, Aug 27, 2022 at 2:32 AM Namhyung Kim wrote: > > > > > > Hello, > > > > > > On Fri, Aug 26, 2022 at 10:22 AM Zixuan Tan wrote: > > > > > > > > On Fri, Aug 26, 2022 at 4:17 AM Arnaldo Carvalho de Melo > > > > wrote: > > > > > > > > > > Em Fri, Aug 26, 2022 at 01:00:58AM +0800, Zixuan Tan escreveu: > > > > > > Switch to the flavored EVP API like in test-libcrypto.c, and remove the > > > > > > bad gcc #pragma. > > > > > > > > > > > > Inspired-By: 5b245985a6de ("tools build: Switch to new openssl API for > > > > > > test-libcrypto") > > > > > > > > > > How did you test the end result? Can you please describe step by step? > > > > > > > > > > Also please consider adding a 'perf test' entry to make sure this > > > > > doesn't regress. > > > > > > > > Sorry but I don't get what you mean, what results do I need to test? > > > > > > > > These EVP_* APIs are just replacements for the deprecated MD5_* APIs in > > > > openssl v3 [1][2]. With the same input, they produce the same MD5 digest. > > > > > > > > And this patch just does the migration work for the upgrade and does not > > > > change the logic of the code. so...what should I test? > > > > > > Yeah, I understand that this merely changes the MD5 APIs. > > > While it's good to have a test case for the genelf code, I don't think > > > it belongs to this patch. So, > > > > > > Acked-by: Namhyung Kim > > > > > > > > > > > > > > Links: > > > > [1] https://www.openssl.org/docs/man3.0/man3/MD5.html > > > > [2] https://stackoverflow.com/questions/69806220/advice-needed-for-migration-of-low-level-openssl-api-to-high-level-openssl-apis > > -- > > - Arnaldo -- - Arnaldo