Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1177089rwb; Thu, 8 Dec 2022 07:35:36 -0800 (PST) X-Google-Smtp-Source: AA0mqf7h9PwKPAm8Cc/k5BOCJHsBB4Kh3HoOC19wZhjxOkc1uxJiqrALgIywIWhuuUvm1LxHeXOG X-Received: by 2002:a17:903:481:b0:189:809e:3956 with SMTP id jj1-20020a170903048100b00189809e3956mr53960406plb.121.1670513736201; Thu, 08 Dec 2022 07:35:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670513736; cv=none; d=google.com; s=arc-20160816; b=UZuyhxlJL/CMRz9jful3Hw5lyHg7pQgqnE8/8HCO3haBXSXjUTv5AVdT8aDCLrVmbs THwESrEHyLNSyk8s/YPIX0fU+shjwYVr26QoV/GIPW7HYFkL2SxVGY+YibTfGqZUOCKx 5/XyZMrlxWukjfAoA6waS3zXUHcwB+xhMlA7x/kZ7omyvQR+Uo2qrkVAfG75IiC/qkAf WjPmX2CUPtMuXY6AEK8OEigbY8ZsVy6w0roLhEqxOqz2WAQlpBvJZIcIyhsbg71YmF7M l2DrBuxS+AcmFKu2uDGM2DzFwcaFYNOICUrlhPSyqoF6HrHEY43ttYSJjul5bSgcG0DD T5FA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=McUcVZf8XH51UCd3i4rVTe2d4UW4gv1nKuCyqSvUWMk=; b=zZYMG70a6/9YTE7VBrPjKZTnYYVNcYPV8iA5WW22Aj/JzrUL6d/128hISiR3G+i2yD qNtshk0qHQbm5EFws6Eqb61h6K2wgNo3AkKYf1gOwmsCInA0y1WGGwj/g8fUydoQ3Sqw l2SLyGlMbqTinbsxPdbvW2E68xmQ4Ovo2uSUIudLyjRqmScBTT3dictUy5mFNSS/CX7H 422hUqQJ6YcUjHtWjZ0xSsn/0i8zNeAM2CziwzFyQfs7KKG7o+ExhbHk3ZT8tdC01Et6 /walJby6D3zw3SWP4eQX9Jg6h+jTvk+0WIVRwSqChbP+Nkv/cVR6AemM6uJE/sMiJJ2d ThSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m8-20020a056a00080800b005779f520683si3566742pfk.200.2022.12.08.07.35.14; Thu, 08 Dec 2022 07:35:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229947AbiLHP2c (ORCPT + 99 others); Thu, 8 Dec 2022 10:28:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45336 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229501AbiLHP2b (ORCPT ); Thu, 8 Dec 2022 10:28:31 -0500 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6CD0A11A02 for ; Thu, 8 Dec 2022 07:28:29 -0800 (PST) Received: from ptz.office.stw.pengutronix.de ([2a0a:edc0:0:900:1d::77] helo=[127.0.0.1]) by metis.ext.pengutronix.de with esmtp (Exim 4.92) (envelope-from ) id 1p3Iov-0000UU-7x; Thu, 08 Dec 2022 16:28:21 +0100 Message-ID: Date: Thu, 8 Dec 2022 16:27:51 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.0 Subject: Re: [PATCH] crypto: caam: blob_gen.c: fix CAAM io mem access Content-Language: en-US To: Nikolaus Voss , Horia Geanta , Pankaj Gupta , Gaurav Jain , Herbert Xu , "David S. Miller" , David Gstir , Steffen Trumtrar , Nikolaus Voss Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org References: <20221205075839.050FF27BD@mail.steuer-voss.de> From: Ahmad Fatoum In-Reply-To: <20221205075839.050FF27BD@mail.steuer-voss.de> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 2a0a:edc0:0:900:1d::77 X-SA-Exim-Mail-From: a.fatoum@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-crypto@vger.kernel.org X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 05.12.22 08:58, Nikolaus Voss wrote: > IO memory access has to be done with accessors defined in caam/regs.h > as there are little-endian architectures with a big-endian CAAM unit. > > Fixes ("crypto: caam: blob_gen.c: warn if key is insecure") @Herbert, is there a stable commit revision Nikolaus could reference here? > Signed-off-by: Nikolaus Voss LGTM. Reviewed-by: Ahmad Fatoum > --- > drivers/crypto/caam/blob_gen.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/crypto/caam/blob_gen.c b/drivers/crypto/caam/blob_gen.c > index 1f65df489847..f46b161d2cda 100644 > --- a/drivers/crypto/caam/blob_gen.c > +++ b/drivers/crypto/caam/blob_gen.c > @@ -104,7 +104,7 @@ int caam_process_blob(struct caam_blob_priv *priv, > } > > ctrlpriv = dev_get_drvdata(jrdev->parent); > - moo = FIELD_GET(CSTA_MOO, ioread32(&ctrlpriv->ctrl->perfmon.status)); > + moo = FIELD_GET(CSTA_MOO, rd_reg32(&ctrlpriv->ctrl->perfmon.status)); > if (moo != CSTA_MOO_SECURE && moo != CSTA_MOO_TRUSTED) > dev_warn(jrdev, > "using insecure test key, enable HAB to use unique device key!\n"); -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |