lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A54DD14.8050100@vlnb.net>
Date:	Wed, 08 Jul 2009 21:53:24 +0400
From:	Vladislav Bolkhovitin <vst@...b.net>
To:	linux-kernel@...r.kernel.org, linux-scsi@...r.kernel.org,
	scst-devel <scst-devel@...ts.sourceforge.net>
CC:	James Smart <James.Smart@...lex.Com>
Subject: [ANNOUNCE]: SCST Target driver support for Emulex lpfc FC/FCoE adapters

Hi All,

I'm glad to announce that SCST target driver support for Emulex lpfc 
FC/FCoE adapters has been created and linked to the SCST project. Thanks 
to the Emulex team for putting this together.

The driver allows for lpfc adapters to be placed in initiator and/or 
target mode. Those in initiator mode will continue to function with the 
SCSI subsystem as usual. A lpfc_scst helper module is then loaded that 
binds that target mode adapters with the SCST subsystem for use as FCP 
targets. NPIV is also supported, allowing virtual ports to be created 
with individual SCST target instances bound to them.

The lpfc SCST driver kit is part of the lpfcxxxx SourceForge project 
located at https://sourceforge.net/projects/lpfcxxxx. You can find its 
README and HOWTO in http://lpfcxxxx.sourceforge.net/README and 
http://lpfcxxxx.sourceforge.net/HOWTO.lpfc correspondingly.

SCST page of the Emulex lpfc target driver located at 
http://scst.sourceforge.net/target_emulex.html.

Vlad
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ