From patchwork Thu Apr 18 13:39:02 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gilad Ben-Yossef X-Patchwork-Id: 162493 Delivered-To: patch@linaro.org Received: by 2002:a02:c6d8:0:0:0:0:0 with SMTP id r24csp762544jan; Thu, 18 Apr 2019 06:41:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqxIGq83i5j/xEAaiQETFy/nfxuak0NSeErMEqLk14TMlw/cM4MrxgX4Z5lyx77wphjlrF8P X-Received: by 2002:a17:902:e183:: with SMTP id cd3mr79782627plb.233.1555594917217; Thu, 18 Apr 2019 06:41:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555594917; cv=none; d=google.com; s=arc-20160816; b=cvBATVj2MRoZACcc0OjO/CxLpDhEraSkJ/lUfvoaZB8kxSH17njPGm7nV9kIEP39sB ULcXhGFJFHxCoZGp/4PoM1al+ff8Netf1cUrXzXtv7fNDDVI5rR1CyluzaRhoyDdzoZ9 ppHJe961h6mXuhZhfMdIYlX1g8qPt/xiypdtAVDJx2iQWW9GoHc6wG5M22Da2tH8I9hh lYvPDeINK5jpA3o5Y9d/s/nmPO+3TkKrdmMKXzC+YkyzKmsjBjcmXjpTsSSJs9rxQqem TAiSwKM4QQvwrxhY/0/p8rNYxF0BWG5SZhcAoZRvXPASIyPdTWbLWUmBfSEmacM9wG3w jZBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=csrECCfVu3zxeskLL/s5BUMKlkqF4YQY9itdP1pmJ0U=; b=M5GPjFlZAIUf+licbe3fDMfTiOHsVwLCfpLLBC+pCHBqbQlm1WcyepYxui5opEtzui Yu7QELvTm4ZRakGpt/s8DFNiEIo5JhzR8/GalwrRHZWwyynm7NpDIc26+ngmqGP/+/i3 e0toV3tRHuvCHpvY15AXanIJUHrxGoXvVKGljgW94uMleKcMAtyTmtoZQuX0t0EfRjHK BHjzm8HOGcZ4szATwGUzcrongqRImn3U78JKsZs5Iz/eGmZI3pA/qVz8EssjKROMZLLL U5I+4eJs8E+HmplBqOhu9fsVpScAgklIMNdAdCKOrazdPPkd4BW0sU+DBsxhk6rAvNbP S3cw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x6si1932788pga.310.2019.04.18.06.41.56; Thu, 18 Apr 2019 06:41:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389247AbfDRNlz (ORCPT + 14 others); Thu, 18 Apr 2019 09:41:55 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:33726 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389226AbfDRNlz (ORCPT ); Thu, 18 Apr 2019 09:41:55 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 22A9C80D; Thu, 18 Apr 2019 06:41:55 -0700 (PDT) Received: from e110176-lin.kfn.arm.com (e110176-lin.kfn.arm.com [10.50.4.178]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 7A9193F5AF; Thu, 18 Apr 2019 06:41:53 -0700 (PDT) From: Gilad Ben-Yossef To: Herbert Xu , "David S. Miller" Cc: Ofir Drang , stable@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 27/35] crypto: ccree: use correct internal state sizes for export Date: Thu, 18 Apr 2019 16:39:02 +0300 Message-Id: <20190418133913.9122-28-gilad@benyossef.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418133913.9122-1-gilad@benyossef.com> References: <20190418133913.9122-1-gilad@benyossef.com> MIME-Version: 1.0 Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org We were computing the size of the import buffer based on the digest size but the 318 and 224 byte variants use 512 and 256 bytes internal state sizes respectfully, thus causing the import buffer to overrun. Fix it by using the right sizes. Signed-off-by: Gilad Ben-Yossef Cc: stable@vger.kernel.org # v4.19+ --- drivers/crypto/ccree/cc_hash.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) -- 2.21.0 diff --git a/drivers/crypto/ccree/cc_hash.c b/drivers/crypto/ccree/cc_hash.c index 940101fee68e..36e9fb4141f8 100644 --- a/drivers/crypto/ccree/cc_hash.c +++ b/drivers/crypto/ccree/cc_hash.c @@ -1633,7 +1633,7 @@ static struct cc_hash_template driver_hash[] = { .setkey = cc_hash_setkey, .halg = { .digestsize = SHA224_DIGEST_SIZE, - .statesize = CC_STATE_SIZE(SHA224_DIGEST_SIZE), + .statesize = CC_STATE_SIZE(SHA256_DIGEST_SIZE), }, }, .hash_mode = DRV_HASH_SHA224, @@ -1660,7 +1660,7 @@ static struct cc_hash_template driver_hash[] = { .setkey = cc_hash_setkey, .halg = { .digestsize = SHA384_DIGEST_SIZE, - .statesize = CC_STATE_SIZE(SHA384_DIGEST_SIZE), + .statesize = CC_STATE_SIZE(SHA512_DIGEST_SIZE), }, }, .hash_mode = DRV_HASH_SHA384, From patchwork Thu Apr 18 13:39:04 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gilad Ben-Yossef X-Patchwork-Id: 162495 Delivered-To: patch@linaro.org Received: by 2002:a02:c6d8:0:0:0:0:0 with SMTP id r24csp762742jan; Thu, 18 Apr 2019 06:42:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqwG+VH5mXo6GKhaS2Qmwihz6c+WA2V88KZzXjfQKrV4CTam7w0hfG2IbZ7jD0YztfjonMfi X-Received: by 2002:a65:5cc7:: with SMTP id b7mr44949006pgt.206.1555594928792; Thu, 18 Apr 2019 06:42:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555594928; cv=none; d=google.com; s=arc-20160816; b=XvUrXK1wft0wO3W6zcC4KcEY0H23qB8pr763kjP82xKz8Xu2bJ1+nAX+OYOCMpnuG8 XIbs2QgwFsnSkT1PKRtatKxS45Xqe1W9SymuiIS3M2f7bvPclBjBOMFoIGfHRQkijKbE G8acl7bRdxoSCkVXAoCXGbWmu0C/xoi8AlFbLgzAdM64Y+OsLxsoN44XyJQMwSuZXlrW K3B8HnPlXVMGqJjn3Snq130BQqJExTG9EOGb/rYSBMXVy5WgzQr5taBms4LgEhpaEFsc KuFr6PykoBrMUJGr8MLqotWG9L0GUhMS8tBlE95w4thEDomOI5HmS8kVTcs32eJjrrT2 88fw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=qI+XqKLmP9DMufDWk/E18zAnZBQb47rMXwJNsb3jaAk=; b=hx2nM0kEayRnB05heK8LvQ5jPjIPEaoz4sg1mZpOjRdbH2nwgi3+o0iQQq9eiCBf1o fZv96OxNcsXNNMJR1zm8DUSOhafQIpfTJSfObsWz0nq0/jeYJ7gJl/491dNtnRzUH4lS 3OWIIgNPIv9QHccJF2U83j0Bz8hXljkvSDScWLuE52PRRW8PnPYeQs3KrQ2QDl+4TZ7j MUGzfSi0fTS71Bq9Zcku0qUnbvxV7hn6a5eUg8NwvOeemop5AhUWpLCtquZWPtvtYvQE SReLWOjE17MXt1+WWwPmKd4/CPfP0jVMx+CjNgqBzgvAnr1aYmMnVDiENo4vCLOmQVKU XJtg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j36si2280644plb.210.2019.04.18.06.42.08; Thu, 18 Apr 2019 06:42:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389467AbfDRNmH (ORCPT + 14 others); Thu, 18 Apr 2019 09:42:07 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:33742 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389071AbfDRNmH (ORCPT ); Thu, 18 Apr 2019 09:42:07 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id AB32380D; Thu, 18 Apr 2019 06:42:06 -0700 (PDT) Received: from e110176-lin.kfn.arm.com (e110176-lin.kfn.arm.com [10.50.4.178]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 0EE6D3F5AF; Thu, 18 Apr 2019 06:42:04 -0700 (PDT) From: Gilad Ben-Yossef To: Herbert Xu , "David S. Miller" Cc: Ofir Drang , stable@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 29/35] crypto: ccree: don't map MAC key on stack Date: Thu, 18 Apr 2019 16:39:04 +0300 Message-Id: <20190418133913.9122-30-gilad@benyossef.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418133913.9122-1-gilad@benyossef.com> References: <20190418133913.9122-1-gilad@benyossef.com> MIME-Version: 1.0 Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org The MAC hash key might be passed to us on stack. Copy it to a slab buffer before mapping to gurantee proper DMA mapping. Signed-off-by: Gilad Ben-Yossef Cc: stable@vger.kernel.org # v4.19+ --- drivers/crypto/ccree/cc_hash.c | 24 +++++++++++++++++++++--- 1 file changed, 21 insertions(+), 3 deletions(-) -- 2.21.0 diff --git a/drivers/crypto/ccree/cc_hash.c b/drivers/crypto/ccree/cc_hash.c index 36e9fb4141f8..a6abe4e3bb0e 100644 --- a/drivers/crypto/ccree/cc_hash.c +++ b/drivers/crypto/ccree/cc_hash.c @@ -69,6 +69,7 @@ struct cc_hash_alg { struct hash_key_req_ctx { u32 keylen; dma_addr_t key_dma_addr; + u8 *key; }; /* hash per-session context */ @@ -742,13 +743,20 @@ static int cc_hash_setkey(struct crypto_ahash *ahash, const u8 *key, ctx->key_params.keylen = keylen; ctx->key_params.key_dma_addr = 0; ctx->is_hmac = true; + ctx->key_params.key = NULL; if (keylen) { + ctx->key_params.key = kmemdup(key, keylen, GFP_KERNEL); + if (!ctx->key_params.key) + return -ENOMEM; + ctx->key_params.key_dma_addr = - dma_map_single(dev, (void *)key, keylen, DMA_TO_DEVICE); + dma_map_single(dev, (void *)ctx->key_params.key, keylen, + DMA_TO_DEVICE); if (dma_mapping_error(dev, ctx->key_params.key_dma_addr)) { dev_err(dev, "Mapping key va=0x%p len=%u for DMA failed\n", - key, keylen); + ctx->key_params.key, keylen); + kzfree(ctx->key_params.key); return -ENOMEM; } dev_dbg(dev, "mapping key-buffer: key_dma_addr=%pad keylen=%u\n", @@ -899,6 +907,9 @@ static int cc_hash_setkey(struct crypto_ahash *ahash, const u8 *key, dev_dbg(dev, "Unmapped key-buffer: key_dma_addr=%pad keylen=%u\n", &ctx->key_params.key_dma_addr, ctx->key_params.keylen); } + + kzfree(ctx->key_params.key); + return rc; } @@ -925,11 +936,16 @@ static int cc_xcbc_setkey(struct crypto_ahash *ahash, ctx->key_params.keylen = keylen; + ctx->key_params.key = kmemdup(key, keylen, GFP_KERNEL); + if (!ctx->key_params.key) + return -ENOMEM; + ctx->key_params.key_dma_addr = - dma_map_single(dev, (void *)key, keylen, DMA_TO_DEVICE); + dma_map_single(dev, ctx->key_params.key, keylen, DMA_TO_DEVICE); if (dma_mapping_error(dev, ctx->key_params.key_dma_addr)) { dev_err(dev, "Mapping key va=0x%p len=%u for DMA failed\n", key, keylen); + kzfree(ctx->key_params.key); return -ENOMEM; } dev_dbg(dev, "mapping key-buffer: key_dma_addr=%pad keylen=%u\n", @@ -981,6 +997,8 @@ static int cc_xcbc_setkey(struct crypto_ahash *ahash, dev_dbg(dev, "Unmapped key-buffer: key_dma_addr=%pad keylen=%u\n", &ctx->key_params.key_dma_addr, ctx->key_params.keylen); + kzfree(ctx->key_params.key); + return rc; } From patchwork Thu Apr 18 13:39:09 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gilad Ben-Yossef X-Patchwork-Id: 162500 Delivered-To: patch@linaro.org Received: by 2002:a02:c6d8:0:0:0:0:0 with SMTP id r24csp763267jan; Thu, 18 Apr 2019 06:42:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqzrSqZjbAXbEAriVUM0Tq+uFpsim3+aUzSasubjqs5gRlwdD+tosPOirQvm6xi9B9x8GzPX X-Received: by 2002:a62:14c3:: with SMTP id 186mr97457056pfu.21.1555594959066; Thu, 18 Apr 2019 06:42:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555594959; cv=none; d=google.com; s=arc-20160816; b=J7yJCoL4oNW+z90WvRkAEgU7lGb0CBhDYtVGOCX7gY9aCFCkBwRAALSnI56u25LoET FZB47vxsTbNsDYzgk4phcRmyo6fXjGvlf2RdRZD/6CpvpL6Gv/WeFDhuHcmqfc9qgNC/ KdJQH71i1wm/V0HVKoEGaqvzND0g0uUq5RgJ6vxWwEof7Mog+1MHvUGhnhzhDs0MytbQ RQwVb/L9yK3Mv2tinjTZFmzfVTDTEoBd6JgESoRPtu2LRepncA5+OQVda8sCNQC5/ydf ifG54rDhDVXBWWteLKj6B4JfE/ZdvZuHfV5jkPPS/+9jTIx6K+hWmY6uSjoGwOHDxLBj maIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=e8uPONe+8HkpiZiQcNdctbOGFKDDfUjdu2VE+3R7oWU=; b=qaX//Pu3McJe7lm2XfK7X4TaFzyJe9yOGS/ZZBH6laj/+JDizqE6tkaC4T8GCt6p7Z 5ft9pWDwSmVu40Pt+IfESB/2eIPaQ2WvrQeERapvEjcLEvJOA2yDNrz22EVWZueepLQ8 4NDpi/zG2P5XWBB2bTcUAL1hoFX9UDVzSg+JPIljNi4LpuDxoBCqpk8cNwIo46vaHopr Fv2bM9SDf408w4twvQIr1mn9JWFWaTkW+d37F6noRFSXZPItzG35FMY60nTeUe4/alkP 1I6SjnRaBztbU/JZYuRSWvLBXIrbYne4uGP1nER+AkJeQp2RAFMFrmZ65StK8lYz52T+ QKQQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h73si2410180pfj.220.2019.04.18.06.42.38; Thu, 18 Apr 2019 06:42:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389512AbfDRNmg (ORCPT + 14 others); Thu, 18 Apr 2019 09:42:36 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:33806 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389054AbfDRNmf (ORCPT ); Thu, 18 Apr 2019 09:42:35 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 63EBE1688; Thu, 18 Apr 2019 06:42:35 -0700 (PDT) Received: from e110176-lin.kfn.arm.com (e110176-lin.kfn.arm.com [10.50.4.178]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BBE623F5AF; Thu, 18 Apr 2019 06:42:33 -0700 (PDT) From: Gilad Ben-Yossef To: Herbert Xu , "David S. Miller" Cc: Ofir Drang , stable@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 34/35] crypto: ccree: add function to handle cryptocell tee fips error Date: Thu, 18 Apr 2019 16:39:09 +0300 Message-Id: <20190418133913.9122-35-gilad@benyossef.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418133913.9122-1-gilad@benyossef.com> References: <20190418133913.9122-1-gilad@benyossef.com> MIME-Version: 1.0 Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org From: Ofir Drang Adds function that checks if cryptocell tee fips error occurred and in such case triggers system error through kernel panic. Change fips function to use this new routine. Signed-off-by: Ofir Drang Signed-off-by: Gilad Ben-Yossef Cc: stable@vger.kernel.org # v4.19+ --- drivers/crypto/ccree/cc_fips.c | 23 +++++++++++++++-------- drivers/crypto/ccree/cc_fips.h | 2 ++ 2 files changed, 17 insertions(+), 8 deletions(-) -- 2.21.0 diff --git a/drivers/crypto/ccree/cc_fips.c b/drivers/crypto/ccree/cc_fips.c index 4a67248f5625..5ad3ffb7acaa 100644 --- a/drivers/crypto/ccree/cc_fips.c +++ b/drivers/crypto/ccree/cc_fips.c @@ -70,20 +70,28 @@ static inline void tee_fips_error(struct device *dev) dev_err(dev, "TEE reported error!\n"); } +/* + * This function check if cryptocell tee fips error occurred + * and in such case triggers system error + */ +void cc_tee_handle_fips_error(struct cc_drvdata *p_drvdata) +{ + struct device *dev = drvdata_to_dev(p_drvdata); + + if (!cc_get_tee_fips_status(p_drvdata)) + tee_fips_error(dev); +} + /* Deferred service handler, run as interrupt-fired tasklet */ static void fips_dsr(unsigned long devarg) { struct cc_drvdata *drvdata = (struct cc_drvdata *)devarg; - struct device *dev = drvdata_to_dev(drvdata); - u32 irq, state, val; + u32 irq, val; irq = (drvdata->irq & (CC_GPR0_IRQ_MASK)); if (irq) { - state = cc_ioread(drvdata, CC_REG(GPR_HOST)); - - if (state != (CC_FIPS_SYNC_TEE_STATUS | CC_FIPS_SYNC_MODULE_OK)) - tee_fips_error(dev); + cc_tee_handle_fips_error(drvdata); } /* after verifing that there is nothing to do, @@ -111,8 +119,7 @@ int cc_fips_init(struct cc_drvdata *p_drvdata) dev_dbg(dev, "Initializing fips tasklet\n"); tasklet_init(&fips_h->tasklet, fips_dsr, (unsigned long)p_drvdata); - if (!cc_get_tee_fips_status(p_drvdata)) - tee_fips_error(dev); + cc_tee_handle_fips_error(p_drvdata); return 0; } diff --git a/drivers/crypto/ccree/cc_fips.h b/drivers/crypto/ccree/cc_fips.h index 2c287faf10ff..fc33eeb4d566 100644 --- a/drivers/crypto/ccree/cc_fips.h +++ b/drivers/crypto/ccree/cc_fips.h @@ -18,6 +18,7 @@ int cc_fips_init(struct cc_drvdata *p_drvdata); void cc_fips_fini(struct cc_drvdata *drvdata); void fips_handler(struct cc_drvdata *drvdata); void cc_set_ree_fips_status(struct cc_drvdata *drvdata, bool ok); +void cc_tee_handle_fips_error(struct cc_drvdata *p_drvdata); #else /* CONFIG_CRYPTO_FIPS */ @@ -30,6 +31,7 @@ static inline void cc_fips_fini(struct cc_drvdata *drvdata) {} static inline void cc_set_ree_fips_status(struct cc_drvdata *drvdata, bool ok) {} static inline void fips_handler(struct cc_drvdata *drvdata) {} +static inline void cc_tee_handle_fips_error(struct cc_drvdata *p_drvdata) {} #endif /* CONFIG_CRYPTO_FIPS */