Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp149795pxb; Fri, 29 Oct 2021 07:24:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxIeOpW8Sb01e2/dWrX6snqfmNYxCNNJIJ61BMGufgF8vR9GqfQC5aQatzeQVg6/C3F9/j4 X-Received: by 2002:a92:7f0e:: with SMTP id a14mr7705582ild.215.1635517493418; Fri, 29 Oct 2021 07:24:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635517493; cv=none; d=google.com; s=arc-20160816; b=iCkFFczeCEa165YC0TNJYABHl45YnzzCGLIwzVDLP3FgtwHwoQgJlEwmUM/accXLX6 a8psWfrbh4rBEvSoinOu9UZVE+V4wZl02OsMo0k6aU0IPKNP9TJKTjbi7k6zpb1xSdaI IBIGiJl6akqen+2Bg9UiHYWRI0/udC/MtvW2OjkWyC8V8X2k4JBW/tuNtq00EdMPSfMx cEkNaK2++xnPjsjx6xHpEz1Wqvcrm1FGTh5xuf8npWoHj1Nfuwdi+6s246vho0JH7TeY dQHGN9YS2lw/u0a8yK6TfTBKLDYAaUai2y9iRR6hP1Bb0YxOEVVQWjChy5aB6gHTI4Q0 ibxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=ZWEwn6xxH9thjtW69prVFZ20jiDIdEX/mAl5N86y5gs=; b=w2D8RGwPZYCBJu8t4MxRQronG1bUtJp+omJ9Pq/i3FR7h7tLnlh+6+5bcNuCmng3du jsJTU2QyDRP55mfOVskutBfTeGvgrq6ZQP3XAzNGa29uSFP7Q9YOZV7li8HdfI5h/Vv7 WbqRnHX6sx+OjmwpeEIP2/uQ7MI1BnAZRZ83uN/kOVBwdXJlZbUR2MmnZso8yil1Ff+0 I+h7NmrlM8Y265FzlW+dGuwXhPPirZtn9obzW9FaatWzw5E30dze2AVHXZKzWeMojte0 lSkmcQ1jB8QPhbmh+/yrcOaD1QYALDFT0rzy/K2k2SAjRTC3PQJ8xqbvsT8SZ+kfvBxt BO3w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@denx.de header.s=phobos-20191101 header.b=zQ6qmJoF; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d5si1432908ioe.100.2021.10.29.07.23.57; Fri, 29 Oct 2021 07:24:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@denx.de header.s=phobos-20191101 header.b=zQ6qmJoF; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230495AbhJ2O0X (ORCPT + 99 others); Fri, 29 Oct 2021 10:26:23 -0400 Received: from phobos.denx.de ([85.214.62.61]:50100 "EHLO phobos.denx.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230036AbhJ2O0X (ORCPT ); Fri, 29 Oct 2021 10:26:23 -0400 Received: from [IPv6:::1] (p578adb1c.dip0.t-ipconnect.de [87.138.219.28]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: marex@denx.de) by phobos.denx.de (Postfix) with ESMTPSA id 5D71F835BF; Fri, 29 Oct 2021 16:23:52 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=denx.de; s=phobos-20191101; t=1635517433; bh=ZWEwn6xxH9thjtW69prVFZ20jiDIdEX/mAl5N86y5gs=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=zQ6qmJoFsbPLo4fNjIbKsn7lCU5pFd4Y+8R5ranowo4Nxmas9/BVTJiCfFUc9Vyh3 hyAYHqJu5yndLGFMzAldklvksqkCdo4lAuL8oqscb8d/0+j8BQ/EtyaYROLCSOXkU4 zmZeeAm8fxHrLRtp8QxPEa1tp2roO99pUmRUBIxpOO6camEULH5Q+SMQASl9l2jB0g gRAnVQ32ftQYow2aLiU4szUBz9eX1n2b4oiau9TeOlvmvRUQ3PIZ+Jp+IxpF8PK7Ev BEyy+eT/r0COf5T/gWGoWQHV0YZu00+3FS6PYaY5XkpUk5JeZUBQkuH9c+CaLuPX36 sv5H18B800xYg== Subject: Re: [PATCH 4/8] crypto: stm32/cryp - fix race condition To: Nicolas Toromanoff , Herbert Xu , "David S . Miller" , Maxime Coquelin , Alexandre Torgue Cc: linux-crypto@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org References: <20211029135454.4383-1-nicolas.toromanoff@foss.st.com> <20211029135454.4383-5-nicolas.toromanoff@foss.st.com> From: Marek Vasut Message-ID: <1ec60d9c-1ab4-8a92-1c6d-8093232ca039@denx.de> Date: Fri, 29 Oct 2021 16:23:51 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 MIME-Version: 1.0 In-Reply-To: <20211029135454.4383-5-nicolas.toromanoff@foss.st.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Virus-Scanned: clamav-milter 0.103.2 at phobos.denx.de X-Virus-Status: Clean Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 10/29/21 3:54 PM, Nicolas Toromanoff wrote: > Erase key before finalizing request. > Fixes: 9e054ec21ef8 ("crypto: stm32 - Support for STM32 CRYP crypto module") Can you be a bit more specific in your commit messages ? That applies to the entire patchset. It is absolutely impossible to tell what race is fixed here or why it is fixed by exactly this change. This applies to the entire series. And while I am at it, does the CRYP finally pass at least the most basic kernel boot time crypto tests or does running those still overwrite kernel memory and/or completely crash or lock up the machine ?