From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([208.118.235.92]:37350) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Sp78Q-00078n-SU for qemu-devel@nongnu.org; Wed, 11 Jul 2012 20:19:59 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Sp78P-0004Ks-Ql for qemu-devel@nongnu.org; Wed, 11 Jul 2012 20:19:58 -0400 Received: from mail-pb0-f45.google.com ([209.85.160.45]:50928) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Sp78P-0004KL-G5 for qemu-devel@nongnu.org; Wed, 11 Jul 2012 20:19:57 -0400 Received: by mail-pb0-f45.google.com with SMTP id ro12so2944755pbb.4 for ; Wed, 11 Jul 2012 17:19:57 -0700 (PDT) From: Ronnie Sahlberg Date: Thu, 12 Jul 2012 10:19:38 +1000 Message-Id: <1342052378-18900-2-git-send-email-ronniesahlberg@gmail.com> In-Reply-To: <1342052378-18900-1-git-send-email-ronniesahlberg@gmail.com> References: <1342052378-18900-1-git-send-email-ronniesahlberg@gmail.com> Subject: [Qemu-devel] [PATCH] SCSI: rd/wr/vr-protect !=0 is an error List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: pbonzini@redhat.com, qemu-devel@nongnu.org Cc: Ronnie Sahlberg The QEMU SCSI emulation does not support protection information, so any READ/WRITE/VERIFY commands that has the protect bits set to non-zero should fail with ILLEGAL_REQUEST/INVALID_FIELD_IN_CDB >>From SCSI SBC : If the logical unit does not support protection information, then the device server should terminate the command with CHECK CONDITION status with the sense key set to ILLEGAL REQUEST and the additional sense code set to INVALID FIELD IN CDB. Signed-off-by: Ronnie Sahlberg --- hw/scsi-disk.c | 6 ++++++ 1 files changed, 6 insertions(+), 0 deletions(-) diff --git a/hw/scsi-disk.c b/hw/scsi-disk.c index 34336b1..b2f3c0c 100644 --- a/hw/scsi-disk.c +++ b/hw/scsi-disk.c @@ -1555,6 +1555,9 @@ static int32_t scsi_send_command(SCSIRequest *req, uint8_t *buf) case READ_16: len = r->req.cmd.xfer / s->qdev.blocksize; DPRINTF("Read (sector %" PRId64 ", count %d)\n", r->req.cmd.lba, len); + if (r->req.cmd.buf[1] & 0xe0) { + goto fail; + } if (r->req.cmd.lba > s->qdev.max_lba) { goto illegal_lba; } @@ -1575,6 +1578,9 @@ static int32_t scsi_send_command(SCSIRequest *req, uint8_t *buf) DPRINTF("Write %s(sector %" PRId64 ", count %d)\n", (command & 0xe) == 0xe ? "And Verify " : "", r->req.cmd.lba, len); + if (r->req.cmd.buf[1] & 0xe0) { + goto fail; + } if (r->req.cmd.lba > s->qdev.max_lba) { goto illegal_lba; } -- 1.7.3.1