[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1739484594-23512-1-git-send-email-longli@microsoft.com>
Date: Thu, 13 Feb 2025 14:09:54 -0800
From: Long Li <longli@...rosoft.com>
To: <stable@...r.kernel.org>
Cc: linux-hyperv@...r.kernel.org,
linux-kernel@...r.kernel.org,
Long Li <longli@...rosoft.com>,
stable@...nel.org,
"Martin K. Petersen" <martin.petersen@...cle.com>
Subject: [PATCH 5.4.y] scsi: storvsc: Set correct data length for sending SCSI command without payload
In StorVSC, payload->range.len is used to indicate if this SCSI command
carries payload. This data is allocated as part of the private driver data
by the upper layer and may get passed to lower driver uninitialized.
For example, the SCSI error handling mid layer may send TEST_UNIT_READY or
REQUEST_SENSE while reusing the buffer from a failed command. The private
data section may have stale data from the previous command.
If the SCSI command doesn't carry payload, the driver may use this value as
is for communicating with host, resulting in possible corruption.
Fix this by always initializing this value.
Fixes: be0cf6ca301c ("scsi: storvsc: Set the tablesize based on the information given by the host")
Cc: stable@...nel.org
Tested-by: Roman Kisel <romank@...ux.microsoft.com>
Reviewed-by: Roman Kisel <romank@...ux.microsoft.com>
Reviewed-by: Michael Kelley <mhklinux@...look.com>
Signed-off-by: Long Li <longli@...rosoft.com>
Link: https://lore.kernel.org/r/1737601642-7759-1-git-send-email-longli@linuxonhyperv.com
Signed-off-by: Martin K. Petersen <martin.petersen@...cle.com>
(cherry picked from commit 87c4b5e8a6b65189abd9ea5010ab308941f964a4)
---
drivers/scsi/storvsc_drv.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/scsi/storvsc_drv.c b/drivers/scsi/storvsc_drv.c
index 44f4e10..ffba2c3 100644
--- a/drivers/scsi/storvsc_drv.c
+++ b/drivers/scsi/storvsc_drv.c
@@ -1639,6 +1639,7 @@ static int storvsc_queuecommand(struct Scsi_Host *host, struct scsi_cmnd *scmnd)
length = scsi_bufflen(scmnd);
payload = (struct vmbus_packet_mpb_array *)&cmd_request->mpb;
payload_sz = sizeof(cmd_request->mpb);
+ payload->range.len = 0;
if (sg_count) {
if (sg_count > MAX_PAGE_BUFFER_COUNT) {
--
1.8.3.1
Powered by blists - more mailing lists