Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp3243107pxb; Mon, 1 Nov 2021 10:21:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwoBjCaiKBsOHq1PrPjv9GVTy4OGlVZUyrBcKDpnSXD/vnwZpF3yXCs7hs/XPkwpWitac1B X-Received: by 2002:a05:6e02:216e:: with SMTP id s14mr3851879ilv.247.1635787309261; Mon, 01 Nov 2021 10:21:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635787309; cv=none; d=google.com; s=arc-20160816; b=RBaeQ3fLxw/GCxmEeVf0ALufoPx1WUmsvWWziFn90/PeYq5iWhhQA5RQneT8ofC3zg 2S40Hp+k7H7XeyeKGHy1BdQhPk9FOUNk5wW/tZlP2cdh4iKSJ3J81TqOUQw6uM1qA1ft ibKt/a5oxKXPCo2QvIcNnn8igvNRQNOyURW3bdTu5Cyhkg+K5YdEi1330lsbzRPrfFpI F6c90c9PSx0hMH03htW5QgKr+nFYcgdQJOAdwYzW9Flwoe8i9re0okNTSdvI5Ldd8LtH 6+elW1uV4yHpRqP5yGM1t3LEdwIp/tmxuT0lEGjxckqGEcZp3amVcp4KJDJUPvgH3lDj OTzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=u6e4WOpk0Gy7k+VMHluWLZb26ejBKbKlf2/TYAs8po4=; b=ZQsgmg8ejlFVyctxKJJaRHfb4raJFLEDT6GZR1KS/IeuUVoZCisiwv4yG0lsg0Xuwc NsOJ05Y+JIg9fp8HZelqAbApsP6gnc7w/yCxFePMCq10pU1DwylZ+f+0vDUoInSj/k85 7s1718IkptDleUN9gbt285/aDW1F7RKZ1oHRY0yFsT6KmNhsJoJuBBQoTcw3TsMArcwd IG7NSjosvB6rU6ujaujUH+x5A3ev1k/f0ehWyPZcFnRsSouJI+RVXrnCO0Ark8XadaIH +bV4uViLqmZs5St86sEl3dr+tVZi3AzId/Y3OINkcDqgzWOn9L7zJrdprfA1uYzFhRzn ZUnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=BKgqPaMH; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m20si28736418jaj.97.2021.11.01.10.21.38; Mon, 01 Nov 2021 10:21:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=BKgqPaMH; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231383AbhKARYJ (ORCPT + 99 others); Mon, 1 Nov 2021 13:24:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230438AbhKARYG (ORCPT ); Mon, 1 Nov 2021 13:24:06 -0400 Received: from mail-pl1-x64a.google.com (mail-pl1-x64a.google.com [IPv6:2607:f8b0:4864:20::64a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3E19DC061767 for ; Mon, 1 Nov 2021 10:21:33 -0700 (PDT) Received: by mail-pl1-x64a.google.com with SMTP id w4-20020a1709029a8400b00138e222b06aso6242870plp.12 for ; Mon, 01 Nov 2021 10:21:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=u6e4WOpk0Gy7k+VMHluWLZb26ejBKbKlf2/TYAs8po4=; b=BKgqPaMHRJGeKmUWiAD/GTjyUCq6ZoB6wM35BJjt1Y1W9YMbdRpdHKbyT+4/7LmLln 3Wc8eZV2yFc8bJ5jzFrDaU5oFyVW8djSSPys2zr9o6NGtntRnLp8HWXBf5M3QqwT/6/+ CHGJ5mTOcQiCIhyqOnRPZ9UzAPzKYyW610MC/5FzuloqOLsUzGjqHfysYE4CyXI54r+F rsetY1DT6Ioafw8nRII6DnT5ISBkuoYCrxscvyM7BbCW6XNO7WP04FzKadJAlxsVF8g9 pEKFKoTTse8KhgwVx4rgasQ7gdDTny4FAoA/wglYW3GY+CPFAVAnf4eBdSeKmF3WPkwy fQDg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=u6e4WOpk0Gy7k+VMHluWLZb26ejBKbKlf2/TYAs8po4=; b=XRlI0KU7qH0wzckLoCXYHipumhNQd74ADcLwL++lz9xKKyJStjCP5HVGaXWNGaBVmB L+nYn7TzkSBhO98HXl6feOly6hpV+TERO2GCSsfv20umrZMvFyO6TIzZAewHimjoXk2Z 9pE/VuiWAzIEwkXPdfLie1C4oM+ZiNZWHXH/bdyGcOYerLjOGUqG8OJsLAXhWOszHEa5 SQ2Ebl87hPEXFIPzkQniQZemv2XpXOKjLrBpy3Hvv9tkNWKNY9MPuDJ3uU9oEigAQiZ0 Z2ElvETcuQwhfj3eKuH7KAPPtkng3mSZIKfvHY4cTTG8laNrhU7/1aA7C4IaVC4hZQIV XK1A== X-Gm-Message-State: AOAM533T/WMIRWKycdsVmy0XiVt3BW0+STrB/fPElkjSBNIYb5+IbDRg ZCPyW+tNXMi27qVQxDADmr65q37niLs= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:204:98c4:afe5:ed9f:d0db]) (user=pgonda job=sendgmr) by 2002:a05:6a00:1311:b0:455:c1f8:4637 with SMTP id j17-20020a056a00131100b00455c1f84637mr29809939pfu.83.1635787292659; Mon, 01 Nov 2021 10:21:32 -0700 (PDT) Date: Mon, 1 Nov 2021 10:21:24 -0700 In-Reply-To: <20211101172127.3060453-1-pgonda@google.com> Message-Id: <20211101172127.3060453-2-pgonda@google.com> Mime-Version: 1.0 References: <20211101172127.3060453-1-pgonda@google.com> X-Mailer: git-send-email 2.33.1.1089.g2158813163f-goog Subject: [PATCH V2 1/4] crypto: ccp - Fix SEV_INIT error logging on init From: Peter Gonda To: thomas.lendacky@amd.com Cc: Peter Gonda , Marc Orr , David Rientjes , Brijesh Singh , Joerg Roedel , Herbert Xu , John Allen , "David S. Miller" , Paolo Bonzini , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Currently only the firmware error code is printed. This is incomplete and also incorrect as error cases exists where the firmware is never called and therefore does not set an error code. This change zeros the firmware error code in case the call does not get that far and prints the return code for non firmware errors. Signed-off-by: Peter Gonda Reviewed-by: Marc Orr Acked-by: David Rientjes Acked-by: Tom Lendacky Cc: Tom Lendacky Cc: Brijesh Singh Cc: Marc Orr Cc: Joerg Roedel Cc: Herbert Xu Cc: David Rientjes Cc: John Allen Cc: "David S. Miller" Cc: Paolo Bonzini Cc: linux-crypto@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- drivers/crypto/ccp/sev-dev.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/crypto/ccp/sev-dev.c b/drivers/crypto/ccp/sev-dev.c index 2ecb0e1f65d8..ec89a82ba267 100644 --- a/drivers/crypto/ccp/sev-dev.c +++ b/drivers/crypto/ccp/sev-dev.c @@ -1065,7 +1065,7 @@ void sev_pci_init(void) { struct sev_device *sev = psp_master->sev_data; struct page *tmr_page; - int error, rc; + int error = 0, rc; if (!sev) return; @@ -1104,7 +1104,8 @@ void sev_pci_init(void) } if (rc) { - dev_err(sev->dev, "SEV: failed to INIT error %#x\n", error); + dev_err(sev->dev, "SEV: failed to INIT error %#x, rc %d\n", + error, rc); return; } -- 2.33.1.1089.g2158813163f-goog