[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [v2 3/3] xsm: properly handle error from XSM init


  • To: "Daniel P. Smith" <dpsmith@xxxxxxxxxxxxxxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Tue, 31 May 2022 09:10:16 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bZ+euNN5l2t86xNwjY4BHVGDgJbhWVlfAUToXePuX20=; b=AYD9hcNGdKCTqbFkEzBWaDyw88MUG2+hLRKd81Y/O6M+WDoVzG1LbfXHPQkx1SUpZdKPWjnLXIGNK0X2dkbeup39dmNSpmno3vkqyWCt2jUdrV+iQHcyFGNKEEnqFKv9azr9rK4Xgm3WJIxdcEIAIVa0IKzOEmePb5bicv3D0PdUQb0H1Qj4/kG9zR5NATFNe77XuK4ejFEzruqcqxA0q4aX+QffHS5RCyAMJcqD3XclRkXYpxSs2oPJ0R6kKz1fewtRPFhM3U43C8GlwyUwo8OgZFRBKkxx2cwRJ//AVtoy0fpEr2ecgxDPi+XUOXDbbO65rRB5otsXj1D1GISZbw==
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bZ+euNN5l2t86xNwjY4BHVGDgJbhWVlfAUToXePuX20=; b=FLH+dGLZLJPN7dNE/dLTgfeDdDRhIULY3tVh/r1LAhOmls9QWTG7e5dnUPZyC79LgL07LgUHkccNLQi3+StZOD8uoKw2HaKQ0WOXSviYVJH9BhqdrxXOomZHBOJa73+KN2bpPzXRR5/G58VpY8OjTgj6/UQO2pP+Xb51qW8M4aACAx85TyqT5L0cYn+0bjy5gZrGkKlBYUnWfGaidgsdkN7QwQE0AoQmiLVJwTRblrhBMUUf+ja0DQsKeDVic3DF9uhR7fw+dMU1XtvJmr81UFJUbM9yr2zj6XWfWOALEuBZxB0vNA6lSWtb8x8At9AkovFmH+n++lC8zEBq1AlEtQ==
  • Arc-seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=DfYH4WdIMrH4vDhwTJWs/NqWoDArOjSqws4bTZaJDj3ixDmqyNY2Ey//3yPdB2ZDOh7Ezm1C3dll/kIUzqz07EnCW50G018yrn/FvVdJydHyjgzSyS57mKvmkC+uFHUmEuPezsigCibzviKoZXMRTmwq43VgugxbkUgbETrCc2nqdK2P9NkFRY5mRVOXbt8D0no3eusUdXorUZCgv2o51JNVb/dFRu0e7q7L0/7s+f8FTeR82UsZu3uvJKM5DSijGLS/P3L93npSGH99ux5Sag0VfpsLjCYXkyeKv7wgV/C0krCEMdVlrC0/iFa+aXFtslihuGdMNm69I3H4dRacmw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kc56nxQAZGqwi7/2iiOeySzkdasRUVXZ0QGEauUKCLnoud2N/OGDHr0qWtcX+RShwqv64SvHtfOSvuZJt/upNXiUzOuYLxxBlLwWHGjphzdpgA5Bhk+gKf1Pm4T5x081nxTCpmBuHHF7FtRi7SEHgF3TTpliz41D+UPa0DMJq9zHxSko3jl1FYjzBhoLbFn3mo9gOPJvXVWL7JYDsX4v65d9T1k0HTbj2Z+l0rm8Z0mg2s/NDyu2Dxod8ZrgBEpAFSLrsjFQE3z13LbKioQpmhQIjjdEwbT0k+6+hkdd/3YH0Yub5wAmqkKJxktOZvcBO0gjONMi/Zbx4xi1JIRj3Q==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, "scott.davis@xxxxxxxxxx" <scott.davis@xxxxxxxxxx>, "christopher.clark@xxxxxxxxxx" <christopher.clark@xxxxxxxxxx>, "jandryuk@xxxxxxxxx" <jandryuk@xxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
  • Delivery-date: Tue, 31 May 2022 09:10:34 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYdHZ7mUVqfmYJ+0G1eO3EqIdC6q04s42A
  • Thread-topic: [v2 3/3] xsm: properly handle error from XSM init

Hi Daniel,

> On 31 May 2022, at 03:39, Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx> 
> wrote:
> 
> This commit is to move towards providing a uniform interface across
> architectures to initialize the XSM framework. Specifically, it provides a
> common handling of initialization failure by providing the printing of a
> warning message.
> 
> For Arm, xsm_dt_init() was tailored to have an Arm specific expansion of the
> return values. This expansion added a value to reflect whether the security
> supported XSM policy module was the enforcing policy module. This was then 
> used
> to determine if a warning message would be printed. Despite this expansion,
> like x86, Arm does not address any XSM initialization errors that may have
> occurred.
> 
> Signed-off-by: Daniel P. Smith <dpsmith@xxxxxxxxxxxxxxxxxxxx>

For the arm part:
Reviewed-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>

Cheers
Bertrand





 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.