summaryrefslogtreecommitdiffstats
path: root/MAINTAINERS
diff options
context:
space:
mode:
authorHarald Freudenberger <freude@linux.ibm.com>2024-04-25 16:29:48 +0200
committerAlexander Gordeev <agordeev@linux.ibm.com>2024-05-01 11:52:54 +0200
commit7bbe449d0bdb68892cc67e9f5f1bfa106a3588d5 (patch)
treea616fa35db511d26a52e03e0a3f538cb43dba97c /MAINTAINERS
parentda5658320bc962634c36ece6052c5a543493e3cf (diff)
downloadlinux-7bbe449d0bdb68892cc67e9f5f1bfa106a3588d5.tar.gz
linux-7bbe449d0bdb68892cc67e9f5f1bfa106a3588d5.tar.bz2
linux-7bbe449d0bdb68892cc67e9f5f1bfa106a3588d5.zip
s390/paes: Reestablish retry loop in paes
With commit ed6776c96c60 ("s390/crypto: remove retry loop with sleep from PAES pkey invocation") the retry loop to retry derivation of a protected key from a secure key has been removed. This was based on the assumption that theses retries are not needed any more as proper retries are done in the zcrypt layer. However, tests have revealed that there exist some cases with master key change in the HSM and immediately (< 1 second) attempt to derive a protected key from a secure key with exact this HSM may eventually fail. The low level functions in zcrypt_ccamisc.c and zcrypt_ep11misc.c detect and report this temporary failure and report it to the caller as -EBUSY. The re-established retry loop in the paes implementation catches exactly this -EBUSY and eventually may run some retries. Fixes: ed6776c96c60 ("s390/crypto: remove retry loop with sleep from PAES pkey invocation") Signed-off-by: Harald Freudenberger <freude@linux.ibm.com> Reviewed-by: Ingo Franzki <ifranzki@linux.ibm.com> Reviewed-by: Holger Dengler <dengler@linux.ibm.com> Signed-off-by: Alexander Gordeev <agordeev@linux.ibm.com>
Diffstat (limited to 'MAINTAINERS')
0 files changed, 0 insertions, 0 deletions