Received: by 2002:a05:6a10:6d25:0:0:0:0 with SMTP id gq37csp1853491pxb; Mon, 13 Sep 2021 06:59:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzy7OXSCqcYf9g02ADGeTzjGY8ih9A/xG3fcdxKMvv2bnE1ikB4kD/qdg5mObHmBUvnMMl3 X-Received: by 2002:a17:906:468a:: with SMTP id a10mr12847750ejr.523.1631541565448; Mon, 13 Sep 2021 06:59:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631541565; cv=none; d=google.com; s=arc-20160816; b=H09E+W4lSj9nPYGqXU4Bcg6v98wz7LLaey6jSaGAKLr7xWK4zAIS0skU2sfGPWtKcl 0W5dmQ2xSNzmgWqvBZVPITG3TcLwfNdLN4AYVdpnfm1nfN4/S81gV/lu4a7fJnTwcCHw WX1L34UgmHNT4ZhFY2lwEszLe2rv6+Vllv2b/ssM5Q9DnemkjsF5z8YBl+pT3PMdE4NM RD85b0j1Nw7yqyaJ4JK50NN6r2CI6vFN27/4FddwrudbEN6fVsbzaHKkfcwyqzygYPJW 4tSM9GAqdQU6d8q7SJLYETAnxTlkfjeNTsmq/qfkTXq4tbRyOG8qEV01xtAO0+jNVbpE lBEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=sR+BcSeAFwQesR0oK/NU4GC0S4ISNPlAlqNQoJtEW4Q=; b=iJVOyvlxXeSNAQxgw8u9SUJHb42YjlSft613vZ64qOzjwTdZaXnJ1pK1iYFYrUCpZG DkXhi1hVqZR8JiDPOY3XONIJ+vubZME/kQA+h5OBFqRZKN83uSTQhGSVTC3lDgxB1pJI acC4/vjCSwFYfHVK8MHAflgt6+/IXy8OwCAB6ldu5x4cvxGa1FLhqXxbAsL9ac2ZSI3H TMGgi8XIdolfAP4hBXWzSK3kQUODo4iNfpJAn3rzGIe3r8m5OI9noV5QiKFJgjOqCyE0 jmIXIzSQvbjOEdnqvHDiJZ6otdEFGCylyWUvTP5/HYqjx7z70rdU5Bv6NZnmS1WLxznY b0/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Y62K0ycr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p31si10464122edb.554.2021.09.13.06.59.01; Mon, 13 Sep 2021 06:59:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Y62K0ycr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245188AbhIMN5y (ORCPT + 99 others); Mon, 13 Sep 2021 09:57:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:34746 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245484AbhIMNym (ORCPT ); Mon, 13 Sep 2021 09:54:42 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7226060698; Mon, 13 Sep 2021 13:35:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631540117; bh=YJJ4ExQGkPUrZyQ7xYfyygR2fz3tqJMbXkqJ1hKH7GE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Y62K0ycrypECxktX5svJrGCkwBE0ijT3LHcBD7/nVH7cOe9fi95yPg7/Pov9lwC2O rV2xCv36x7047PYZLYlc4u3rsCFEUPw6S4OIxJaBGJKjdhAJVZghAYggkXrejoElnI nAWQFT1nAEpeNnAtxKTnKV+8P59C6zaj90e9uueE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Harald Freudenberger , Vasily Gorbik , Sasha Levin Subject: [PATCH 5.13 026/300] s390/zcrypt: fix wrong offset index for APKA master key valid state Date: Mon, 13 Sep 2021 15:11:27 +0200 Message-Id: <20210913131110.200301160@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913131109.253835823@linuxfoundation.org> References: <20210913131109.253835823@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Harald Freudenberger [ Upstream commit 8617bb74006252cb2286008afe7d6575a6425857 ] Tests showed a mismatch between what the CCA tool reports about the APKA master key state and what's displayed by the zcrypt dd in sysfs. After some investigation, we found out that the documentation which was the source for the zcrypt dd implementation lacks the listing of 3 fields. So this patch now moves the evaluation of the APKA master key state to the correct offset. Signed-off-by: Harald Freudenberger Signed-off-by: Vasily Gorbik Signed-off-by: Sasha Levin --- drivers/s390/crypto/zcrypt_ccamisc.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/s390/crypto/zcrypt_ccamisc.c b/drivers/s390/crypto/zcrypt_ccamisc.c index d68c0ed5e0dd..f5d0212fb4fe 100644 --- a/drivers/s390/crypto/zcrypt_ccamisc.c +++ b/drivers/s390/crypto/zcrypt_ccamisc.c @@ -1724,10 +1724,10 @@ static int fetch_cca_info(u16 cardnr, u16 domain, struct cca_info *ci) rlen = vlen = PAGE_SIZE/2; rc = cca_query_crypto_facility(cardnr, domain, "STATICSB", rarray, &rlen, varray, &vlen); - if (rc == 0 && rlen >= 10*8 && vlen >= 240) { - ci->new_apka_mk_state = (char) rarray[7*8]; - ci->cur_apka_mk_state = (char) rarray[8*8]; - ci->old_apka_mk_state = (char) rarray[9*8]; + if (rc == 0 && rlen >= 13*8 && vlen >= 240) { + ci->new_apka_mk_state = (char) rarray[10*8]; + ci->cur_apka_mk_state = (char) rarray[11*8]; + ci->old_apka_mk_state = (char) rarray[12*8]; if (ci->old_apka_mk_state == '2') memcpy(&ci->old_apka_mkvp, varray + 208, 8); if (ci->cur_apka_mk_state == '2') -- 2.30.2