Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5004ybp; Thu, 3 Oct 2019 09:23:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqxZ/iAnSjHVa5hrwGc8z01ZQLu25Cp5bclDibEjzXHmaDNfRGg083mDg97xFPlrOmuBJUKY X-Received: by 2002:a17:906:1c03:: with SMTP id k3mr8375586ejg.32.1570119811844; Thu, 03 Oct 2019 09:23:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570119811; cv=none; d=google.com; s=arc-20160816; b=TvQdzV0mMJI3tcMixTxwsBvzQpjK2eSC1zSRoD5IcAa8HyCljRrU9MlR+W8oTD9nzY xGP/l3lUZO6TJJfbafJwccUUgGZCaODLHDmtqwhjtWwHiZCxejk8ZVkprTLqgxcBZjD/ 73gqQohgQBa3U6ecP+uFPMbqDUIxZXOhWJAPgMf+b/JoX0HzrAtYX86PGvNFf/lZRUY9 tB1nusMZdBzgGq4MJBHQ2woUTW2PWHAYdDU38speToEdmByTDVKUV6vFnstcR/UpiIzy Br6dqc6TVAVRLzTcvr8oEOhgSFULuicM6POu5V3fkteAUDWgprgT3KGZCjVG+rZYJTDG HVXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=TK/8752wJOXVjBEz4IzNfNJgTJQ9cH37qxuH9eWkR7o=; b=YLaL3KA8DuocvuePQrbaQxFV/2BLagFSTjCzYiFp0sq2dUreGqTkxSyIoJCP0ctBR2 Z9QXUtQv0nogFmdI6gmOfjAP2+C9c7l5CYWCJhSt5xO650ao2nKGtLbCxftClOOynlRP EDqdc0aUHodE0y1t/qIdoelEmGUAmn7ssIFUJDG0+kHNfgdLdK0VbCLMakd+UUcvRx3T LLK7RisPnZFI9BrnoI/8nymwc/6vSVKXfQJghpWJpqNphnKQjrlTh0DDKV3pr5l8hFth 9ociCOBDMdXfSS9ZoFq1Dr9bIjVBVvOg2v6+mnX4tGkSykB2TfaRCgCW+4GTJlLZTfPw kTJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Bk7jPfPb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g38si1848657edg.127.2019.10.03.09.23.06; Thu, 03 Oct 2019 09:23:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Bk7jPfPb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390130AbfJCQVX (ORCPT + 99 others); Thu, 3 Oct 2019 12:21:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:49544 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387531AbfJCQVU (ORCPT ); Thu, 3 Oct 2019 12:21:20 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 078BA2054F; Thu, 3 Oct 2019 16:21:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570119679; bh=o9aX2bau2Ui2FjhVZKIimH8ZL1iyt0Febi4Bh0UHciM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Bk7jPfPbQ+/Y6MQlJdcmk406yv2E+7qDhgxcwS2mbjkFf0f1eElpPXyNEF7XmhN6+ 1PWi3Zw83STdEGvC1Jv3IkS6V2zt7QEwPHns5BifZR+xL/fQr1riOawm4NJ23y9uct BkyVtVwIi5Yq+YVjNIFKbg5UBIOwsjsAP1MB+rPU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Martin Wilck , Ales Novak , Shane Seymour , "Martin K. Petersen" Subject: [PATCH 4.19 151/211] scsi: scsi_dh_rdac: zero cdb in send_mode_select() Date: Thu, 3 Oct 2019 17:53:37 +0200 Message-Id: <20191003154522.384695311@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154447.010950442@linuxfoundation.org> References: <20191003154447.010950442@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Martin Wilck commit 57adf5d4cfd3198aa480e7c94a101fc8c4e6109d upstream. cdb in send_mode_select() is not zeroed and is only partially filled in rdac_failover_get(), which leads to some random data getting to the device. Users have reported storage responding to such commands with INVALID FIELD IN CDB. Code before commit 327825574132 was not affected, as it called blk_rq_set_block_pc(). Fix this by zeroing out the cdb first. Identified & fix proposed by HPE. Fixes: 327825574132 ("scsi_dh_rdac: switch to scsi_execute_req_flags()") Cc: stable@vger.kernel.org Link: https://lore.kernel.org/r/20190904155205.1666-1-martin.wilck@suse.com Signed-off-by: Martin Wilck Acked-by: Ales Novak Reviewed-by: Shane Seymour Signed-off-by: Martin K. Petersen Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/device_handler/scsi_dh_rdac.c | 2 ++ 1 file changed, 2 insertions(+) --- a/drivers/scsi/device_handler/scsi_dh_rdac.c +++ b/drivers/scsi/device_handler/scsi_dh_rdac.c @@ -546,6 +546,8 @@ static void send_mode_select(struct work spin_unlock(&ctlr->ms_lock); retry: + memset(cdb, 0, sizeof(cdb)); + data_size = rdac_failover_get(ctlr, &list, cdb); RDAC_LOG(RDAC_LOG_FAILOVER, sdev, "array %s, ctlr %d, "