Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp561798yba; Wed, 15 May 2019 06:14:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqwIsp5Wt9BLxPveaVYuFmA6Z2UddPF8HNRv0NCZpxZ5tvOTUJFalcgASzVtowXjYsnUNVTZ X-Received: by 2002:aa7:9159:: with SMTP id 25mr15982416pfi.64.1557926074341; Wed, 15 May 2019 06:14:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557926074; cv=none; d=google.com; s=arc-20160816; b=MVryrn/iXxfGBNvtdBlJX3cNjAbLrkVLPZRJYmt0hMSJK2gP79hZZlnnFm4e9KMTNZ jUPYRzRnqxd7babvyiaoenlM8oKh6kt3NEWzqhXhwV2CSz26ZgoLDU19WKnP3YxKbOIK 1ZF0UOxkfUpcR6Ka9jDdONKr0ioENl/DuOKOMdMoGcu67P49+nM3UWgW1Ka6gSXHoQwL BAfaDdQE6b5wMVW9//S2n8bhQf7CMzRgVmgq49qwHCBkk57jcjWM87N19KLykAmQBpXL PbqEuFJo/SnS33OqR1NNcy8OKXUObQHdSHMt62k7tFsdjDoLB6Br0F0uEJtvBWZTKwJI 5UfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=OtWEIp3xyvqNPsaOc9gwMWvoHO3gz0pZdcvw6KkCuKs=; b=UPiGZpWEw8YouFGXT9sNAa+dkCC2trp3b1wIGeHKwIChk+z6tY8H3FA3EcXUic8c1Z pD6skjYhdN1kNKOaq8IDNo9jnGxEM3rdVgfXuPOkguvGRkxnH8p9DNME6nEJosFKr7LZ XDhVirWa02vOtsFQOreyvL65Bg/oIvckyqXzrxb/MGDbYELbr/tKNtzT32BBJuSOaszZ pGGfDubOMl7pfR4Awoa3O7ERC3Ig+Keju8/UkPvPgwkzJC3sN+qYlYae8OflyXuC2ySt Giz5jlFX7iZbuhw/wCrWAcQE2/BuehknRLqG2WEfpXK7DiZn/yZe5OIJhU5vlW4IJHh9 LTAg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l143si2155997pfd.173.2019.05.15.06.14.20; Wed, 15 May 2019 06:14:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727218AbfEONN2 (ORCPT + 99 others); Wed, 15 May 2019 09:13:28 -0400 Received: from metis.ext.pengutronix.de ([85.220.165.71]:37751 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726752AbfEONN2 (ORCPT ); Wed, 15 May 2019 09:13:28 -0400 Received: from dude.hi.pengutronix.de ([2001:67c:670:100:1d::7]) by metis.ext.pengutronix.de with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1hQtio-0003ZP-W7; Wed, 15 May 2019 15:13:26 +0200 Received: from sha by dude.hi.pengutronix.de with local (Exim 4.92) (envelope-from ) id 1hQtin-0005xZ-QQ; Wed, 15 May 2019 15:13:25 +0200 From: Sascha Hauer To: linux-crypto@vger.kernel.org Cc: =?UTF-8?q?Horia=20Geant=C4=83?= , kernel@pengutronix.de, Sascha Hauer Subject: [PATCH] crypto: caam: print debugging hex dumps after unmapping Date: Wed, 15 May 2019 15:13:24 +0200 Message-Id: <20190515131324.22793-1-s.hauer@pengutronix.de> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::7 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org The debugging hex dumps in skcipher_encrypt_done() and skcipher_decrypt_done() are printed while the request is still DMA mapped. This results in bogus hex dumps with things like mixtures between plain text and cipher text. Unmap first before printing. Signed-off-by: Sascha Hauer --- drivers/crypto/caam/caamalg.c | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-) diff --git a/drivers/crypto/caam/caamalg.c b/drivers/crypto/caam/caamalg.c index 3e23d4b2cce2..a992ff56fd15 100644 --- a/drivers/crypto/caam/caamalg.c +++ b/drivers/crypto/caam/caamalg.c @@ -1009,15 +1009,6 @@ static void skcipher_encrypt_done(struct device *jrdev, u32 *desc, u32 err, if (err) caam_jr_strstatus(jrdev, err); -#ifdef DEBUG - print_hex_dump(KERN_ERR, "dstiv @"__stringify(__LINE__)": ", - DUMP_PREFIX_ADDRESS, 16, 4, req->iv, - edesc->src_nents > 1 ? 100 : ivsize, 1); -#endif - caam_dump_sg(KERN_ERR, "dst @" __stringify(__LINE__)": ", - DUMP_PREFIX_ADDRESS, 16, 4, req->dst, - edesc->dst_nents > 1 ? 100 : req->cryptlen, 1); - skcipher_unmap(jrdev, edesc, req); /* @@ -1028,6 +1019,15 @@ static void skcipher_encrypt_done(struct device *jrdev, u32 *desc, u32 err, scatterwalk_map_and_copy(req->iv, req->dst, req->cryptlen - ivsize, ivsize, 0); +#ifdef DEBUG + print_hex_dump(KERN_ERR, "dstiv @"__stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 4, req->iv, + edesc->src_nents > 1 ? 100 : ivsize, 1); +#endif + caam_dump_sg(KERN_ERR, "dst @" __stringify(__LINE__)": ", + DUMP_PREFIX_ADDRESS, 16, 4, req->dst, + edesc->dst_nents > 1 ? 100 : req->cryptlen, 1); + kfree(edesc); skcipher_request_complete(req, err); @@ -1049,6 +1049,8 @@ static void skcipher_decrypt_done(struct device *jrdev, u32 *desc, u32 err, if (err) caam_jr_strstatus(jrdev, err); + skcipher_unmap(jrdev, edesc, req); + #ifdef DEBUG print_hex_dump(KERN_ERR, "dstiv @"__stringify(__LINE__)": ", DUMP_PREFIX_ADDRESS, 16, 4, req->iv, ivsize, 1); @@ -1057,7 +1059,6 @@ static void skcipher_decrypt_done(struct device *jrdev, u32 *desc, u32 err, DUMP_PREFIX_ADDRESS, 16, 4, req->dst, edesc->dst_nents > 1 ? 100 : req->cryptlen, 1); - skcipher_unmap(jrdev, edesc, req); kfree(edesc); skcipher_request_complete(req, err); -- 2.20.1