Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2265861imj; Sun, 10 Feb 2019 23:06:22 -0800 (PST) X-Google-Smtp-Source: AHgI3Ibs+kOp5BGFpsJnOpL38SDgzg8gqmicsX/bLHwTo4vMI2hsrTej29pjR0/YkvJBwS4NfHR2 X-Received: by 2002:a63:9246:: with SMTP id s6mr1738795pgn.349.1549868782672; Sun, 10 Feb 2019 23:06:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549868782; cv=none; d=google.com; s=arc-20160816; b=lU+/7nuW2igAHqACmX0ssNYCrJ3wkI7A9ISVsbDOAq4HVvyPj0Kl8ppMhVCkDKSvxT 5RctzV09jpNT6WqUB04ubK39CPhJCa3QgfZEPwrwEmq2B490Kf2g2zPAQcmrJKfHaQVe /YADOd79yniWwMSYXyT1af1ka41+sS88kifp/vgH8TIuPHJ5MlqECg41OnnFSeNu35cc l1yan9eDacKdsxMFeGzS3StGWJAYpUrIw1cV0xsdbeEVwUesWl5GxaGXPGprSVyEIQQK 0afGCcfUkIMT0sgj6th+JWt2gH1F/ga5LsMmPpLUE1GfTaYMTxhmS5KuYwjJL7iJVbj1 8nTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:message-id :mime-version:subject:cc:to:from:date; bh=ADAZVSe7zwtkx8n1C/+UsWEbI/JqlNlFy2094npTx6M=; b=O1Ya0wrQeP5Fj39DT4vIwIPGd8/ogVUUWm1uLaE0V5Bg/LRXeImITpKhnfVNEhx6+u vCcC+gYxi8SOU1OLXb7d3+nl0Npi8+Hvwgi3US9ktdoL4X5JopEpQB5qy/uTr/MlQmAR TC1HNfHxu/GQCy1jVH4Ve5j2qNXhv6/zZ+fbN4wT5mr8M+ttcyYzhJkM0I+v9nRJaAqN NflJJjL/ZYbSDG8p6hefbFO/YEo3FcjoUI9kUajh1kYsWT7Wf4Y+er3JZJ8//mtq0Kz5 FnGdAHaR0sIDnK/k5MNVQVmNrUpbaJTBckZ3BqzgcjtEzghoTraqG7BdJGqEOvXoo8Vt 35EA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l3si7896277pgp.285.2019.02.10.23.06.05; Sun, 10 Feb 2019 23:06:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726140AbfBKHEn (ORCPT + 99 others); Mon, 11 Feb 2019 02:04:43 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:43794 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725939AbfBKHEn (ORCPT ); Mon, 11 Feb 2019 02:04:43 -0500 Received: from pps.filterd (m0098419.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x1B6x2rh123244 for ; Mon, 11 Feb 2019 02:04:42 -0500 Received: from e06smtp07.uk.ibm.com (e06smtp07.uk.ibm.com [195.75.94.103]) by mx0b-001b2d01.pphosted.com with ESMTP id 2qk33jjxg2-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 11 Feb 2019 02:04:41 -0500 Received: from localhost by e06smtp07.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 11 Feb 2019 07:04:39 -0000 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp07.uk.ibm.com (192.168.101.137) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Mon, 11 Feb 2019 07:04:38 -0000 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x1B74bUw65732852 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 11 Feb 2019 07:04:37 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 33C0E52052; Mon, 11 Feb 2019 07:04:37 +0000 (GMT) Received: from mschwideX1 (unknown [9.145.44.247]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTP id 01E245204E; Mon, 11 Feb 2019 07:04:36 +0000 (GMT) Date: Mon, 11 Feb 2019 08:04:36 +0100 From: Martin Schwidefsky To: Linus Torvalds Cc: linux-kernel , linux-s390 , Heiko Carstens Subject: [GIT PULL] s390 patches for 5.0 #3 X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 X-TM-AS-GCONF: 00 x-cbid: 19021107-0028-0000-0000-000003470502 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19021107-0029-0000-0000-000024051EB8 Message-Id: <20190211080436.13c3504f@mschwideX1> Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-02-11_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902110054 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, please pull s390 fixes for 5.0-rc7 The following changes since commit f17b5f06cb92ef2250513a1e154c47b78df07d40: Linux 5.0-rc4 (2019-01-27 15:18:05 -0800) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux.git tags/s390-5.0-3 for you to fetch changes up to 614db26954ff08fa8e92b04100e31ebc04b817cf: Revert "s390/pci: remove bit_lock usage in interrupt handler" (2019-02-07 11:56:29 +0100) ---------------------------------------------------------------- s390 update with bug fixes for 5.0-rc6 - Fix specification exception on z196 during ap probe - A fix for suspend-to-disk, the VMAP stack patch broke the swsusp_arch_suspend function - The EMC CKD ioctl of the dasd driver needs an additional size check for user space data - Revert an incorrect patch for the PCI base code that removed a bit lock that turned out to be required after all ---------------------------------------------------------------- Harald Freudenberger (1): s390/zcrypt: fix specification exception on z196 during ap probe Martin Schwidefsky (1): s390/suspend: fix stack setup in swsusp_arch_suspend Sebastian Ott (1): Revert "s390/pci: remove bit_lock usage in interrupt handler" Stefan Haberland (1): s390/dasd: fix using offset into zero size array error arch/s390/kernel/swsusp.S | 4 ++-- arch/s390/pci/pci.c | 4 +++- drivers/s390/block/dasd_eckd.c | 8 ++++++++ drivers/s390/crypto/ap_bus.c | 3 ++- 4 files changed, 15 insertions(+), 4 deletions(-) diff --git a/arch/s390/kernel/swsusp.S b/arch/s390/kernel/swsusp.S index 537f97f..b6796e6 100644 --- a/arch/s390/kernel/swsusp.S +++ b/arch/s390/kernel/swsusp.S @@ -30,10 +30,10 @@ .section .text ENTRY(swsusp_arch_suspend) lg %r1,__LC_NODAT_STACK - aghi %r1,-STACK_FRAME_OVERHEAD stmg %r6,%r15,__SF_GPRS(%r1) + aghi %r1,-STACK_FRAME_OVERHEAD stg %r15,__SF_BACKCHAIN(%r1) - lgr %r1,%r15 + lgr %r15,%r1 /* Store FPU registers */ brasl %r14,save_fpu_regs diff --git a/arch/s390/pci/pci.c b/arch/s390/pci/pci.c index a966d7b..4266a4d 100644 --- a/arch/s390/pci/pci.c +++ b/arch/s390/pci/pci.c @@ -382,7 +382,9 @@ static void zpci_irq_handler(struct airq_struct *airq) if (ai == -1UL) break; inc_irq_stat(IRQIO_MSI); + airq_iv_lock(aibv, ai); generic_handle_irq(airq_iv_get_data(aibv, ai)); + airq_iv_unlock(aibv, ai); } } } @@ -408,7 +410,7 @@ int arch_setup_msi_irqs(struct pci_dev *pdev, int nvec, int type) zdev->aisb = aisb; /* Create adapter interrupt vector */ - zdev->aibv = airq_iv_create(msi_vecs, AIRQ_IV_DATA); + zdev->aibv = airq_iv_create(msi_vecs, AIRQ_IV_DATA | AIRQ_IV_BITLOCK); if (!zdev->aibv) return -ENOMEM; diff --git a/drivers/s390/block/dasd_eckd.c b/drivers/s390/block/dasd_eckd.c index 4e7b55a..6e294b4 100644 --- a/drivers/s390/block/dasd_eckd.c +++ b/drivers/s390/block/dasd_eckd.c @@ -4469,6 +4469,14 @@ static int dasd_symm_io(struct dasd_device *device, void __user *argp) usrparm.psf_data &= 0x7fffffffULL; usrparm.rssd_result &= 0x7fffffffULL; } + /* at least 2 bytes are accessed and should be allocated */ + if (usrparm.psf_data_len < 2) { + DBF_DEV_EVENT(DBF_WARNING, device, + "Symmetrix ioctl invalid data length %d", + usrparm.psf_data_len); + rc = -EINVAL; + goto out; + } /* alloc I/O data area */ psf_data = kzalloc(usrparm.psf_data_len, GFP_KERNEL | GFP_DMA); rssd_result = kzalloc(usrparm.rssd_result_len, GFP_KERNEL | GFP_DMA); diff --git a/drivers/s390/crypto/ap_bus.c b/drivers/s390/crypto/ap_bus.c index 48ea000..5a69974 100644 --- a/drivers/s390/crypto/ap_bus.c +++ b/drivers/s390/crypto/ap_bus.c @@ -248,7 +248,8 @@ static inline int ap_test_config(unsigned int *field, unsigned int nr) static inline int ap_test_config_card_id(unsigned int id) { if (!ap_configuration) /* QCI not supported */ - return 1; + /* only ids 0...3F may be probed */ + return id < 0x40 ? 1 : 0; return ap_test_config(ap_configuration->apm, id); }