Received: by 2002:a05:6a10:6d25:0:0:0:0 with SMTP id gq37csp1880473pxb; Mon, 13 Sep 2021 07:26:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxTZ+t5be7IZSydTznAoKOF24SxZAS743TljE2astX/sD143nBsR56Zk7+Z5HboboRaK4HD X-Received: by 2002:a05:6638:50f:: with SMTP id i15mr10069773jar.79.1631543203257; Mon, 13 Sep 2021 07:26:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631543203; cv=none; d=google.com; s=arc-20160816; b=pyqaHkWm5CmNSWXNXNB1+t4mtG/31/XQzsXA+QZzUVoCSC4s52KFY7mCvjgKHnNuA0 1nqYBg9mWJnd5QBN7EjJsXJ5e7nE7Jct8XbKn7SWwVH7n7fsgYaLCEROqWeBHe1L9cF2 1LdnYSIwFTQ5y4mxSViiR9itCTAatgscaVDloLsUu4kommJyIAlXN9LaBeeBywdDaaXn ShI9ujFObWnWf8qOozCxtYIWNXRmOwnm83du3s087dli9XjhcNCWxT5tjN/G5PXrtDZB 7ultnCcvYGFgnQLvXmbx4iM3JDKo4pUbDxUzi1Pk810lqPZJSpFr/lqE38kInEDzKbXW f5vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BrBSZPVYzdYdMwxqNtc3gvtyewv0EqLCqa85UkdEVa8=; b=mvB9kN5Cmv7+pJ0k8A8heXWsDn6UsHDg1TnT9r8tCnq6611dzu2BwP9fSDA5VWp7uR +ECZSTMIG1Ki3HW4xIyEcWL1UEdzpebS554M5Zpr3k0FMVqhdG0TCWKT0lp3ogAMwar5 9s2HHFcdovTxJH4kBa/7I0rZ/RTorMgFC1hX+7v8qjDEFNRhZaaYPuYz+CmupBJwbJ5U 0hVcKizu6Qrb+c4SWJGhsmzSrmimwgvY0P/h+46tyORCyXaBEP74LopCJVKs8MhI3U94 iFh7mlwVLN+UCC0LwMfNy+N89Q8PNvrez9EzB8MlN6nEx9gmDVSPGyZKf6mN94xUz4bX lGVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oZ43CbFg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n6si7816257ilk.152.2021.09.13.07.26.30; Mon, 13 Sep 2021 07:26:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oZ43CbFg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346420AbhIMOY2 (ORCPT + 99 others); Mon, 13 Sep 2021 10:24:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:42230 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345752AbhIMOUG (ORCPT ); Mon, 13 Sep 2021 10:20:06 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E08C2604D1; Mon, 13 Sep 2021 13:46:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631540785; bh=22+iNXGyu0eCwAJ2X0a28d6/ghXFmPsf4AF7qIF8heo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oZ43CbFgnDAO1hoaF6p+4go7i3usMnhMJorZwJPHshJ22S5xOUtUFA/igq/gp2gTJ ZISV2iZ+AODBOu/x/321n9ZPJKvVj6vGb1bglM/FW2TiyyKb65ieTCNCSpmkA02TOf coF50Jas8M0JdPW6YlWmqhH5WmwuSXEloaIKFo8k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Harald Freudenberger , Vasily Gorbik , Sasha Levin Subject: [PATCH 5.14 026/334] s390/zcrypt: fix wrong offset index for APKA master key valid state Date: Mon, 13 Sep 2021 15:11:20 +0200 Message-Id: <20210913131114.294360428@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210913131113.390368911@linuxfoundation.org> References: <20210913131113.390368911@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Harald Freudenberger [ Upstream commit 8617bb74006252cb2286008afe7d6575a6425857 ] Tests showed a mismatch between what the CCA tool reports about the APKA master key state and what's displayed by the zcrypt dd in sysfs. After some investigation, we found out that the documentation which was the source for the zcrypt dd implementation lacks the listing of 3 fields. So this patch now moves the evaluation of the APKA master key state to the correct offset. Signed-off-by: Harald Freudenberger Signed-off-by: Vasily Gorbik Signed-off-by: Sasha Levin --- drivers/s390/crypto/zcrypt_ccamisc.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/s390/crypto/zcrypt_ccamisc.c b/drivers/s390/crypto/zcrypt_ccamisc.c index bc34bedf9db8..6a3c2b460965 100644 --- a/drivers/s390/crypto/zcrypt_ccamisc.c +++ b/drivers/s390/crypto/zcrypt_ccamisc.c @@ -1724,10 +1724,10 @@ static int fetch_cca_info(u16 cardnr, u16 domain, struct cca_info *ci) rlen = vlen = PAGE_SIZE/2; rc = cca_query_crypto_facility(cardnr, domain, "STATICSB", rarray, &rlen, varray, &vlen); - if (rc == 0 && rlen >= 10*8 && vlen >= 240) { - ci->new_apka_mk_state = (char) rarray[7*8]; - ci->cur_apka_mk_state = (char) rarray[8*8]; - ci->old_apka_mk_state = (char) rarray[9*8]; + if (rc == 0 && rlen >= 13*8 && vlen >= 240) { + ci->new_apka_mk_state = (char) rarray[10*8]; + ci->cur_apka_mk_state = (char) rarray[11*8]; + ci->old_apka_mk_state = (char) rarray[12*8]; if (ci->old_apka_mk_state == '2') memcpy(&ci->old_apka_mkvp, varray + 208, 8); if (ci->cur_apka_mk_state == '2') -- 2.30.2