Received: by 10.223.185.116 with SMTP id b49csp1015929wrg; Tue, 20 Feb 2018 11:41:10 -0800 (PST) X-Google-Smtp-Source: AH8x226voSYIbW7sY5NnRRSWFs6fV8XgaAjlMMEJt+HIQRJ5WhhBMCClS39Rn3Nimh24Tgd4zym6 X-Received: by 10.99.126.17 with SMTP id z17mr579274pgc.218.1519155670662; Tue, 20 Feb 2018 11:41:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519155670; cv=none; d=google.com; s=arc-20160816; b=pB3RzOWeSSJjs9mX+5cWbP4m4jCa3YQNmJOFUAR1peF0xZ9VYpGYkEStLQDwNffOwT G8KK7S8r7ZU7H8y2lfwckjjUQBCoXhtpFMIF0lRxzb3jbhlm4kBtpa1AUIlilmU0Q+uN qy+FIpIMQYgVzUFFz1GncsCEXjSFBWeE4m48bxOi7ktscrzvF805OheNETJh64KugqzS kbsWwhpc08WT9sSlOU7/vDXMgQfGCMb3xJt7O2tCzx2z8kkQMtcmTGSbxG/AlESx/t3H w01Yv/wEMBVVFJvWgYT7nl9fX3nMu0iRDxTRHP9XquhCQdtjz1UKZ//374xB9O4KzL0Y j6BQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=n8fVEY1XRDqu59MsPy+ikaHg40xtGxL/CoBNSY6Apyg=; b=fIcKrKl+vq+H1kHm0fXpnsNUmQHEODXFO6tlcQ52iLJbAkM+WQjj81UZt7z8mHrSUs 2JsZaqeC6kM37LEIlS6VCcuCSDtIMiEHtVE0aigaafEy321I9SF5LNqGX8KMiLHTpMzR jRC2l/GBT/Zjnk9QPPSmmYJa7RzifxV8wegquMl8mKThASm1Y/UuhxM0sEUYC/zZVylP MJGkEFzX/tSo7WA3gDgVCGVSdG4MmtGMb1CuAw4lzY/rQ1a557001I20wulbw4wT4XSj pSm8drAyZYYbsOjifhVkhgEs2h53N8utWg+Mgut/Ioe7rTHk7ZTMO9v8Pp35d1wupeyu 7zPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x1si2282156pgv.124.2018.02.20.11.40.56; Tue, 20 Feb 2018 11:41:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753198AbeBTTiq (ORCPT + 99 others); Tue, 20 Feb 2018 14:38:46 -0500 Received: from mx-rz-3.rrze.uni-erlangen.de ([131.188.11.22]:58223 "EHLO mx-rz-3.rrze.uni-erlangen.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752928AbeBTTil (ORCPT ); Tue, 20 Feb 2018 14:38:41 -0500 Received: from mx-rz-3.rrze.uni-erlangen.de (mx-rz-3.rrze.uni-erlangen.de [IPv6:2001:638:a000:1025::16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx-rz-3.rrze.uni-erlangen.de (Postfix) with ESMTPS id 3zm9Sq2q2Lz20SJ; Tue, 20 Feb 2018 20:20:59 +0100 (CET) Authentication-Results: mx-rz-3.rrze.uni-erlangen.de; dkim=none reason="no signature"; dkim-adsp=none (unprotected policy); dkim-atps=neutral X-Virus-Scanned: amavisd-new at boeck1.rrze.uni-erlangen.de (RRZE) X-RRZE-Flag: Not-Spam X-RRZE-Submit-IP: 2003:d5:3d7:8b00:25dd:6ce4:6608:2c3f Received: from fau.de (p200300D503D78B0025DD6CE466082C3F.dip0.t-ipconnect.de [IPv6:2003:d5:3d7:8b00:25dd:6ce4:6608:2c3f]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: U2FsdGVkX1+YzoyUvK+8Z53a+88Eb0F5jMz5S9pDYrU=) by smtp-auth.uni-erlangen.de (Postfix) with ESMTPSA id 3zm9Sm0bsYz1yJt; Tue, 20 Feb 2018 20:20:56 +0100 (CET) From: Jonas Rabenstein To: Jonas Rabenstein , Scott Bauer , Jonathan Derrick , Jens Axboe Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] block: sed-opal: fix response string extraction Date: Tue, 20 Feb 2018 20:20:38 +0100 Message-Id: <20180220192039.3912-1-jonas.rabenstein@studium.uni-erlangen.de> X-Mailer: git-send-email 2.13.6 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Tokens are prefixed by a variable length of bytes. If a bytestring is not stored in an tiny or short atom, we have to skip more than one byte in order to have the actual bytes not prefixed by the bytes describing the actual length of the string. Signed-off-by: Jonas Rabenstein --- block/sed-opal.c | 26 +++++++++++++++++++++++--- 1 file changed, 23 insertions(+), 3 deletions(-) diff --git a/block/sed-opal.c b/block/sed-opal.c index 525506bed399..33052d0111de 100644 --- a/block/sed-opal.c +++ b/block/sed-opal.c @@ -876,6 +876,9 @@ static int response_parse(const u8 *buf, size_t length, static size_t response_get_string(const struct parsed_resp *resp, int n, const char **store) { + u8 skip; + const struct opal_resp_tok *token; + *store = NULL; if (!resp) { pr_debug("Response is NULL\n"); @@ -888,13 +891,30 @@ static size_t response_get_string(const struct parsed_resp *resp, int n, return 0; } - if (resp->toks[n].type != OPAL_DTA_TOKENID_BYTESTRING) { + token = &resp->toks[n]; + if (token->type != OPAL_DTA_TOKENID_BYTESTRING) { pr_debug("Token is not a byte string!\n"); return 0; } - *store = resp->toks[n].pos + 1; - return resp->toks[n].len - 1; + switch (token->width) { + case OPAL_WIDTH_TINY: + case OPAL_WIDTH_SHORT: + skip = 1; + break; + case OPAL_WIDTH_MEDIUM: + skip = 2; + break; + case OPAL_WIDTH_LONG: + skip = 4; + break; + default: + pr_debug("Token has invalid width!\n"); + return 0; + } + + *store = token->pos + skip; + return token->len - skip; } static u64 response_get_u64(const struct parsed_resp *resp, int n) -- 2.13.6