Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp6685675iob; Wed, 11 May 2022 03:10:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJySqIcPU40g8NatneQ1nLH2/F0DnpewF4iaiNfdypPNLqnOO624IH2xEZ1HedwCCITfCqeH X-Received: by 2002:a05:6402:17c1:b0:428:8016:d98d with SMTP id s1-20020a05640217c100b004288016d98dmr21358351edy.5.1652263808679; Wed, 11 May 2022 03:10:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652263808; cv=none; d=google.com; s=arc-20160816; b=YEFiQxHfN9kI+ivCYinRHuWXOVKI+8MNeklfZIeYFiGwPb7yR3T71RZpAh45uTkbvo g6JGV8AGuZumxjAEmjgwvxZC2ibREPY1c5pGDo5kh2T8XhgPtGVR9gC30Ldb60RhZAyN i3KZxxfH1E3SzvTJwflO3f1KGIzC01Sl98ljpGZXNi43XuXeAi3z7Ef0xLhU7qnVNtV1 iu0ppYjCab3QUAAKdWKFLVFdBLgho2Ma/cuT8EBai9EXM5y2IcKjY50GouzyNXwZIOJr CuXOE/5hCckUbHPWbJ+9fRZfBz8ShGiB7sFGzvVW2Qg7/Rg5VWTwMVjcDZtWVh6gW+CE a4xA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:user-agent:references:in-reply-to :subject:cc:to:from:date:content-transfer-encoding:mime-version :dkim-signature; bh=b61SMv0bFODH/rp8TEr3jqYYatPz0nmQ29+8vMTWiog=; b=se5PmpmFy/g5IeBW9g6gATvzlaOkwjSDVAsWK8127N3keTSp7bTWkYD1YA2BsM5Lsm Hl1mwWUi6ShHsp+dF8uRsrc5EYn2UEwVwGWZKd6hVneoO1vxXf6dhZWszsu8+kqioDGb U3urxE8ckgvrmRkkHitHplWaW3Jbx+FEke7jzJJc+AOZu1RiBnDynAHq43gq78nvpv13 YoHxONCBbpcyaccQwrUKvFpDUu+d+3/X/yHKC3YpVc7Xn2y4GDztQhoLFqTvK2r1K7JS 0D9leSnJ6awoXrwQHD6BA5gzWXYtoCYt8XdYiJ0cZLwcK8l6VDmPlA7R0wv429TKQ0G+ eBrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=NcEOIfcN; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c19-20020a056402121300b00423e3c24930si2000892edw.27.2022.05.11.03.09.38; Wed, 11 May 2022 03:10:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=NcEOIfcN; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231172AbiEKJV0 (ORCPT + 99 others); Wed, 11 May 2022 05:21:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58658 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229947AbiEKJVX (ORCPT ); Wed, 11 May 2022 05:21:23 -0400 Received: from ssl.serverraum.org (ssl.serverraum.org [IPv6:2a01:4f8:151:8464::1:2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 686BB1AD88; Wed, 11 May 2022 02:21:19 -0700 (PDT) Received: from ssl.serverraum.org (web.serverraum.org [172.16.0.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ssl.serverraum.org (Postfix) with ESMTPSA id 7123622246; Wed, 11 May 2022 11:21:15 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2016061301; t=1652260877; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=b61SMv0bFODH/rp8TEr3jqYYatPz0nmQ29+8vMTWiog=; b=NcEOIfcNFgPC02aVTJxzaSNXKu3nkXtZTvT6pfn73v+TFPhVxAD+9tG9kxZX7zbHpu6807 k4NhhxDz3aI+Jz4vKIsdb2p9dDxCqHmX0AkXOHVzBswgCtJaExNQiwF/04tdwNUryx+etb k/IJ7nKKtqiuEEgKLTgPBGK/DSunx/0= MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Wed, 11 May 2022 11:21:15 +0200 From: Michael Walle To: Pankaj Gupta Cc: Ahmad Fatoum , Horia Geanta , Herbert Xu , "David S. Miller" , kernel@pengutronix.de, James Bottomley , Jarkko Sakkinen , Mimi Zohar , David Howells , James Morris , Eric Biggers , "Serge E. Hallyn" , Jan Luebbe , David Gstir , Richard Weinberger , Franck Lenormand , Matthias Schiffer , Sumit Garg , linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether CAAM supports blob encap/decap In-Reply-To: References: <20220506062553.1068296-1-a.fatoum@pengutronix.de> <20220506062553.1068296-4-a.fatoum@pengutronix.de> <5e7c0b3c9bc285f1cf9f7b20f055aa376e1688cc.camel@pengutronix.de> User-Agent: Roundcube Webmail/1.4.13 Message-ID: <232eb799dbbd341c305e911f85341409@walle.cc> X-Sender: michael@walle.cc X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi, Am 2022-05-11 11:16, schrieb Pankaj Gupta: >> -----Original Message----- >> From: Ahmad Fatoum >> Sent: Monday, May 9, 2022 6:34 PM >> To: Pankaj Gupta ; Horia Geanta >> ; Herbert Xu ; >> David S. >> Miller >> Cc: kernel@pengutronix.de; Michael Walle ; James >> Bottomley ; Jarkko Sakkinen ; >> Mimi >> Zohar ; David Howells ; >> James >> Morris ; Eric Biggers ; Serge >> E. >> Hallyn ; Jan Luebbe ; David >> Gstir >> ; Richard Weinberger ; Franck >> Lenormand ; Matthias Schiffer >> ; Sumit Garg >> ; >> linux-integrity@vger.kernel.org; keyrings@vger.kernel.org; linux- >> crypto@vger.kernel.org; linux-kernel@vger.kernel.org; linux-security- >> module@vger.kernel.org >> Subject: Re: [EXT] [PATCH v9 3/7] crypto: caam - determine whether >> CAAM >> supports blob encap/decap >> >> Caution: EXT Email >> >> Hello Pankaj, >> >> On Mon, 2022-05-09 at 12:39 +0000, Pankaj Gupta wrote: >> > > - if (ctrlpriv->era < 10) >> > > + comp_params = rd_reg32(&ctrl->perfmon.comp_parms_ls); >> > > + ctrlpriv->blob_present = !!(comp_params & CTPR_LS_BLOB); >> > > + >> > > + if (ctrlpriv->era < 10) { >> > > rng_vid = (rd_reg32(&ctrl->perfmon.cha_id_ls) & >> > > CHA_ID_LS_RNG_MASK) >> >> > > CHA_ID_LS_RNG_SHIFT; >> > >> > Check for AES CHAs for Era < 10, should be added. >> >> Do I need this? I only do this check for Era >= 10, because apparently >> there are >> Layerscape non-E processors that indicate BLOB support via >> CTPR_LS_BLOB, but >> fail at runtime. Are there any Era < 10 SoCs that are similarly >> broken? >> > > For non-E variants, it might happen that Blob protocol is enabled, but > number of AES CHA are zero. > If the output of below expression is > 0, then only blob_present > should be marked present or true. > For era > 10, you handled. But for era < 10, please add the below code. Are there any CAAMs which can be just enabled partially for era < 10? I didn't found anything. To me it looks like the non-export controlled CAAM is only available for era >= 10. For era < 10, the CAAM is either fully featured there or it is not available at all and thus the node is removed in the bootloader (at least that is the case for layerscape). -michael