Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1876749rwb; Fri, 2 Dec 2022 02:20:29 -0800 (PST) X-Google-Smtp-Source: AA0mqf6WIJGWgQJN8JaeOzsR4jER8ky9+Dxgctk1moZRWY68IiJlaUxIcHaOKvNbAJurgh5V1eHk X-Received: by 2002:a05:6402:206b:b0:46a:d5ed:e066 with SMTP id bd11-20020a056402206b00b0046ad5ede066mr29604809edb.335.1669976428871; Fri, 02 Dec 2022 02:20:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669976428; cv=none; d=google.com; s=arc-20160816; b=dHEidu7p19YWp7z/s6mvHY1AhlvdhQDjkK4hE55efu/EkSYZeqaEVF3kQ4dYYV0sV2 brsz73rquMLVIwNoDJlwa5wlzqHVJOQdNSr8wS7ZKkOiCUcWp2BsuG3NRntp9T8UGCTB H8tWf9LZaI6ebvrU+laNYsWSaJ/J3wwkR6z3AhGrVYv6EJqb16xIVEFpBulBUs2HyGLZ HgPaEdw8ZU+Z7NKWv9WoGZRn9UDUzXXqdeKFHshS6VqMYM6goK/zYWDHq209FYETwlR5 sdpIMUXWkVYL0RCEU5RQ6kxedbMH65KY7uaXWzEmrk+5PPISGxf6ce7iQ/ZGxiZC1UzH xyjQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=sv5dPSvmIeVXM0w0QUAULltT2iSUN7bgdbMiyMOg7hI=; b=w/hbFCAIvIyWpNE+Kq/riGuzGsjI2agVrfNn5zaFhI8F8FKAFyh6+CrUAnDAbukoeS voQe8b/cbDw5+bGAulMjHFoTosKjk8bOqjEMe+HO8LsXYWafC01eixM4s8qRCJKwbbf3 FRhlVyVXKMCIennaf7+D5fCVG0AoN25KcSh1epYdSvlxwmeXmz+9FZbyhx7Q7bO1Y0pZ sISn+YLTAwZdhm85aHfysgxCkHEfox1XpPykBrobz5et4B8LhvA5CHZPqickAHqDo00p rZ+S6axcoc9u1GyHOhIc0PaaLZDeXGG46LhCbMn1Ji19oomeJwqARk3MsjNXIqBQx+Uv wy8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d1-20020a50ea81000000b0045938ab7129si5695809edo.330.2022.12.02.02.20.05; Fri, 02 Dec 2022 02:20:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232480AbiLBKTZ (ORCPT + 99 others); Fri, 2 Dec 2022 05:19:25 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58588 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233196AbiLBKTZ (ORCPT ); Fri, 2 Dec 2022 05:19:25 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84EF6CCED0; Fri, 2 Dec 2022 02:19:24 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1p138O-003CBV-E7; Fri, 02 Dec 2022 18:19:09 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Fri, 02 Dec 2022 18:19:08 +0800 Date: Fri, 2 Dec 2022 18:19:08 +0800 From: Herbert Xu To: Nikolaus Voss Cc: Horia Geanta , Pankaj Gupta , Gaurav Jain , "David S. Miller" , Ahmad Fatoum , David Gstir , Steffen Trumtrar , Nikolaus Voss , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3] crypto: caam: blob_gen.c: warn if key is insecure Message-ID: References: <20221121141929.2E36427E9@mail.steuer-voss.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221121141929.2E36427E9@mail.steuer-voss.de> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Mon, Nov 21, 2022 at 03:12:41PM +0100, Nikolaus Voss wrote: > If CAAM is not in "trusted" or "secure" state, a fixed non-volatile key > is used instead of the unique device key. This is the default mode of > operation without secure boot (HAB). In this scenario, CAAM encrypted > blobs should be used only for testing but not in a production > environment, so issue a warning. > > Signed-off-by: Nikolaus Voss > > --- > CHANGES > ======= > v2: make warning more verbose, correct register, style fixes > v3: fix sparse warning "dereference of noderef expression" > by using ioread32() to dereference iomem pointer > > drivers/crypto/caam/blob_gen.c | 9 +++++++++ > drivers/crypto/caam/regs.h | 3 +++ > 2 files changed, 12 insertions(+) Patch applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt