Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp6212556ybv; Tue, 18 Feb 2020 12:07:58 -0800 (PST) X-Google-Smtp-Source: APXvYqzXUn0nXnvQSSanG+mTNUXMym0b96EuVKGL0zOF0ZklHLmzBsQwNzXuq30jW93qIdKhzfs5 X-Received: by 2002:aca:1a05:: with SMTP id a5mr2416771oia.97.1582056478228; Tue, 18 Feb 2020 12:07:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582056478; cv=none; d=google.com; s=arc-20160816; b=Ngeqpi9X3gA5Ij+IUo17lPJ+Moqn8BNFgnsoG/ebumMKC9E/P4AF1k8+E/18Axr4o5 HJVB0hXc6LM0wpIpInB+tibnBX8EK5bi5pDlWtbYjZbsRklrFcNf0+NjfSwY6csxxSoZ +l7mDICTpxUA7cnsygFA8l5AI3ul/41Mi/rZFP9pn8HfvPgSvN6p+YLnkqcaN+Kp6dzJ qacvLLvsqqNXYg1+PXRg5tzQBtqxrF0ZfUJDlxXVGoCgLzQNBgKcoTAroWaTvmbAG8gW CdZaDaBgaeF4OmsQNjlH23r9ALA3HATqNslJVNBl2eN+R6KY/bHzjiC1jsWyOWh9QtsM UiFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=owAY+lYAFoQ/Vd63Yi4OaVRi/wu4rp6LtLbzkcvFbcs=; b=DwDp3+oSpXQ5b9cAyqbmcgayywbSx0Q8xHdxXswslID3ZDm5cRfaLFYUZwtfi9Jn0F bYnYIAlw6TKcIcwoMbitoebrIr+EYldcXDHCC+u5p4dtjAo1i5HH6UYoHNeHKk21RKeJ 6QugnMBNwNlQfBy15r0yUFuTVyFd+51D3PqkRLhFYE87+3Zar4jfgzQ7/LK5KBhqsfWJ vh8b5HBJR9IGeO7wdMms+B8u64JAsDAZWZsBBpVbVEQxABJ7n4pMGjAqGxhLsAxmHVxL zU4BmTvBfpVuLkXqBnq6ATCgVyHVagJdLb5BdiZGMDyEkMSwoqh1KZGjNfwei3CpGpfg iHWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=p6SGSzlp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z22si2222894otq.94.2020.02.18.12.07.46; Tue, 18 Feb 2020 12:07:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=p6SGSzlp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728284AbgBRT6r (ORCPT + 99 others); Tue, 18 Feb 2020 14:58:47 -0500 Received: from mail.kernel.org ([198.145.29.99]:36610 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727906AbgBRT6p (ORCPT ); Tue, 18 Feb 2020 14:58:45 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A697D24125; Tue, 18 Feb 2020 19:58:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582055925; bh=VlYFbi8R93NZ9MLjbFG8aNwqFw6eH/NfQOSq89lK47Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=p6SGSzlpgKfY/jGyPrOwXRrMLNgI8WfnIQjdj2w0rePmUxUZL9L8bof2yUJco4OFA WibSeljLZK7UhI0S2VZ81ohep/G2jsrIYiwQrKb2iQGOifT/01rGeJT+D1pSM564rl QZnNfLF8tXqcDhsqsqCXT6HdYAOSOo7mtWRnoq3Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Cornelia Huck , Christian Borntraeger , Vasily Gorbik Subject: [PATCH 5.4 33/66] s390/uv: Fix handling of length extensions Date: Tue, 18 Feb 2020 20:55:00 +0100 Message-Id: <20200218190431.133878860@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200218190428.035153861@linuxfoundation.org> References: <20200218190428.035153861@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christian Borntraeger commit 27dc0700c3be7c681cea03c5230b93d02f623492 upstream. The query parameter block might contain additional information and can be extended in the future. If the size of the block does not suffice we get an error code of rc=0x100. The buffer will contain all information up to the specified size and the hypervisor/guest simply do not need the additional information as they do not know about the new data. That means that we can (and must) accept rc=0x100 as success. Cc: stable@vger.kernel.org Reviewed-by: Cornelia Huck Fixes: 5abb9351dfd9 ("s390/uv: introduce guest side ultravisor code") Signed-off-by: Christian Borntraeger Signed-off-by: Vasily Gorbik Signed-off-by: Greg Kroah-Hartman --- arch/s390/boot/uv.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/arch/s390/boot/uv.c +++ b/arch/s390/boot/uv.c @@ -15,7 +15,8 @@ void uv_query_info(void) if (!test_facility(158)) return; - if (uv_call(0, (uint64_t)&uvcb)) + /* rc==0x100 means that there is additional data we do not process */ + if (uv_call(0, (uint64_t)&uvcb) && uvcb.header.rc != 0x100) return; if (test_bit_inv(BIT_UVC_CMD_SET_SHARED_ACCESS, (unsigned long *)uvcb.inst_calls_list) &&