Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp229541rwe; Fri, 26 Aug 2022 04:06:27 -0700 (PDT) X-Google-Smtp-Source: AA6agR5HxwHjny/mbn4RUXY5yiTZ0NaR2um5+a29aAeYqZW+o7u/o3jb2KW7VjaFPoemZ4CQaJKG X-Received: by 2002:a17:907:728d:b0:731:8396:ea86 with SMTP id dt13-20020a170907728d00b007318396ea86mr5144405ejc.361.1661511986753; Fri, 26 Aug 2022 04:06:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661511986; cv=none; d=google.com; s=arc-20160816; b=c2h9o4PDhEdrEAbIj1R5ltsx92BlJZIwR+TTydu2z7R2EALilQ55Q0GvmyxpxNBQQ9 yDr8+qTxgHO13p48wP+vfJWU3g3pl0Q4lKXJNx9x84vPKXoksmXd+HVW17VyamIWZTtv TZcOBVCu2JLr/TpvWTk58hiIqI3lD57hUrYQyf+BFgzGpiUL3ffuR9PD+M0CHJZGL43G G32LBuZH57wTvZdzHn77qdU45zkMY85dOu02hACUbREui6q5uTqQc5KXcHFq+9CCePsS imvccNGPoE8Pr/yN0cTRcqL2jFlokWr3hKnmJMKopwJaLM3wnm45tZp0Ztm8bAkFSfHF qwUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=lGb0HJP9kje7Sfdqus8poabyaJ8px0KVnPxmKfaaQPE=; b=xkomdyhkScYRso/Xy+wZU6KOaYa8lVqZkckNPBwIwo6qlgfUe8OHB357JE0ud145wl nCJk9g6SpnOi4wgpflAiSLB+K9a6/yzF6iQP3bf3R0Z4HIaFES3ra9pwPt+wRrRvzKlB nxOBxl6pcgCRnxsrIV+K02rAoILy/2rlcGZuPImNPTBXTT6E5yUqAC4kEkqHGqcrrPzf tmyg9E4GRBvshrACNrshwC28ujJk0RUMxDtNGGzh46edQu25HE5dy7NKFoAumlME39+d ewsT/sKGc52rb6DaYz1qFuRsH6Iyggf4saSePx+RwioWLdCIV8C/j+FDtxEq3PrfGF14 XxHw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a13-20020a509e8d000000b00445e56cf473si1038903edf.124.2022.08.26.04.05.58; Fri, 26 Aug 2022 04:06:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343625AbiHZLE5 (ORCPT + 99 others); Fri, 26 Aug 2022 07:04:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47820 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343592AbiHZLEd (ORCPT ); Fri, 26 Aug 2022 07:04:33 -0400 Received: from fornost.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 287A41CB0E; Fri, 26 Aug 2022 04:04:11 -0700 (PDT) Received: from gwarestrin.arnor.me.apana.org.au ([192.168.103.7]) by fornost.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1oRX87-00FQ0f-3T; Fri, 26 Aug 2022 21:04:04 +1000 Received: by gwarestrin.arnor.me.apana.org.au (sSMTP sendmail emulation); Fri, 26 Aug 2022 19:04:02 +0800 Date: Fri, 26 Aug 2022 19:04:02 +0800 From: Herbert Xu To: Jacky Li Cc: Brijesh Singh , Tom Lendacky , John Allen , "David S. Miller" , Marc Orr , Alper Gun , Peter Gonda , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 0/2] Improve error handling during INIT_EX file initialization Message-ID: References: <20220816193209.4057566-1-jackyli@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220816193209.4057566-1-jackyli@google.com> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Aug 16, 2022 at 07:32:07PM +0000, Jacky Li wrote: > Currently the PSP initialization fails when the INIT_EX file is missing > or invalid, while the initialization continues when the OS fails to > write the INIT_EX file. This series handles both cases in a more robust > way by resolving the file read error as well as throwing the write error > to the caller. > --- > Changelog since v1: > - refactor around __sev_init_ex_locked() and fix format. > > Jacky Li (2): > crypto: ccp - Initialize PSP when reading psp data file failed > crypto: ccp - Fail the PSP initialization when writing psp data file > failed > > .../virt/kvm/x86/amd-memory-encryption.rst | 5 +- > drivers/crypto/ccp/sev-dev.c | 62 +++++++++++-------- > 2 files changed, 39 insertions(+), 28 deletions(-) > > -- > 2.37.1.595.g718a3a8f04-goog All applied. Thanks. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt