From 7942b09232918abf60e91baa8f111e67e9e2de20 Mon Sep 17 00:00:00 2001 From: Zhong Jinghua Date: Wed, 6 Sep 2023 20:19:32 +0800 Subject: [PATCH 1/3] scsi: scsi_device_gets returns failure when the module is NULL. hulk inclusion category: bugfix bugzilla: 189103, https://gitee.com/openeuler/kernel/issues/I7YWV4 CVE: NA -------------------------------- when module is NULL, try_module_get return true. But it would be better to return failure in scsi_device_get. Signed-off-by: Zhong Jinghua --- drivers/scsi/scsi.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/scsi/scsi.c b/drivers/scsi/scsi.c index f561caabc771..1a81c8198e44 100644 --- a/drivers/scsi/scsi.c +++ b/drivers/scsi/scsi.c @@ -522,11 +522,15 @@ EXPORT_SYMBOL(scsi_report_opcode); */ int scsi_device_get(struct scsi_device *sdev) { + struct module *module; + if (sdev->sdev_state == SDEV_DEL || sdev->sdev_state == SDEV_CANCEL) goto fail; if (!get_device(&sdev->sdev_gendev)) goto fail; - if (!try_module_get(sdev->host->hostt->module)) + + module = sdev->host->hostt->module; + if (!module || !try_module_get(module)) goto fail_put_device; return 0; -- Gitee From 23b6845d8d8fd34d232c8a8a36dfca4a2dc91922 Mon Sep 17 00:00:00 2001 From: Li Lingfeng Date: Wed, 6 Sep 2023 20:19:33 +0800 Subject: [PATCH 2/3] scsi: don't fail if hostt->module is NULL hulk inclusion category: bugfix bugzilla: 189103, https://gitee.com/openeuler/kernel/issues/I7YWV4 CVE: NA -------------------------------- If CONFIG_SCSI_VIRTIO is set as "y", sdev->host->hostt->module will be NULL, which means scsi device can't be probed normally. Fix the problem by adding a member in struct Scsi_Host to record whether the module is builtin. Fixes: 3f4659e76aa3 ("[Huawei] scsi: scsi_device_gets returns failure when the module is NULL.") Signed-off-by: Li Lingfeng Signed-off-by: Zhong Jinghua --- drivers/scsi/hosts.c | 3 +++ drivers/scsi/scsi.c | 2 +- include/scsi/scsi_host.h | 2 ++ 3 files changed, 6 insertions(+), 1 deletion(-) diff --git a/drivers/scsi/hosts.c b/drivers/scsi/hosts.c index d664c4650b2d..0553ad4571df 100644 --- a/drivers/scsi/hosts.c +++ b/drivers/scsi/hosts.c @@ -477,6 +477,9 @@ struct Scsi_Host *scsi_host_alloc(struct scsi_host_template *sht, int privsize) if (sht->virt_boundary_mask) shost->virt_boundary_mask = sht->virt_boundary_mask; + if (!sht->module) + shost->is_builtin = true; + device_initialize(&shost->shost_gendev); dev_set_name(&shost->shost_gendev, "host%d", shost->host_no); shost->shost_gendev.bus = &scsi_bus_type; diff --git a/drivers/scsi/scsi.c b/drivers/scsi/scsi.c index 1a81c8198e44..9e21ef4e0971 100644 --- a/drivers/scsi/scsi.c +++ b/drivers/scsi/scsi.c @@ -530,7 +530,7 @@ int scsi_device_get(struct scsi_device *sdev) goto fail; module = sdev->host->hostt->module; - if (!module || !try_module_get(module)) + if ((!module && !sdev->host->is_builtin) || !try_module_get(module)) goto fail_put_device; return 0; diff --git a/include/scsi/scsi_host.h b/include/scsi/scsi_host.h index 19f595b6a5ca..3a996be67fe5 100644 --- a/include/scsi/scsi_host.h +++ b/include/scsi/scsi_host.h @@ -698,6 +698,8 @@ struct Scsi_Host { */ struct device *dma_dev; + bool is_builtin; + KABI_RESERVE(1) KABI_RESERVE(2) KABI_RESERVE(3) -- Gitee From 5b9a0fded18b8ab87df3be114b3cef00e24742c3 Mon Sep 17 00:00:00 2001 From: Li Lingfeng Date: Wed, 6 Sep 2023 20:19:34 +0800 Subject: [PATCH 3/3] scsi: fix kabi broken in struct Scsi_Host hulk inclusion category: bugfix bugzilla: 189103, https://gitee.com/openeuler/kernel/issues/I7YWV4 CVE: NA -------------------------------- This broken caused by adding "is_builtin". Fix kabi broken in struct Scsi_Host. Signed-off-by: Li Lingfeng Signed-off-by: Zhong Jinghua --- include/scsi/scsi_host.h | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/include/scsi/scsi_host.h b/include/scsi/scsi_host.h index 3a996be67fe5..161d3d078ec9 100644 --- a/include/scsi/scsi_host.h +++ b/include/scsi/scsi_host.h @@ -698,9 +698,7 @@ struct Scsi_Host { */ struct device *dma_dev; - bool is_builtin; - - KABI_RESERVE(1) + KABI_USE(1, bool is_builtin) KABI_RESERVE(2) KABI_RESERVE(3) KABI_RESERVE(4) -- Gitee