lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4EDCF6CF.6020902@linutronix.de>
Date:	Mon, 05 Dec 2011 17:52:31 +0100
From:	Sebastian Andrzej Siewior <bigeasy@...utronix.de>
To:	Alan Stern <stern@...land.harvard.edu>
CC:	Shimrit Malichi <smalichi@...eaurora.org>,
	Tatyana Brokhman <tlinder@...eaurora.org>,
	USB list <linux-usb@...r.kernel.org>,
	Kernel development list <linux-kernel@...r.kernel.org>,
	target-devel@...r.kernel.org
Subject: Re: [RFC] UASP on target

On 12/05/2011 05:10 PM, Alan Stern wrote:

> Evidently you were able to find enough information about the target
> framework to write a driver using it.  Can you tell us where this
> information is?  It hasn't been easy to locate.

Hehe. Well, I've been told that the target framework has everything one
needs to get it done so I've been digging in the code. First I tried to
come up with an easy setup where I can use it. _This_ was already hard
to get done for someone who is not familiar with scsi. Once I had all
pieces together I wrote this [0].With this information I know more or
less how that thing works or should work.
So at this point I understood that I need to comeup with somethin like
tcm_loop or tcm_vhost. Looking at the host side of the uas driver it is
using SAS as the protocol and nothing special if you ignore "struct iu"
for a moment.
Then I found the python script in Documentation/target which creates you 
a skeleton driver. So I used this and started hacking. First I took
the usb descriptors and looked what happens after I connected the
dummy_hcd driver/gadget. I received a usb command message. So now I try 
to wire it up in target. I look at the loopback/vhost_scsi for some
inspiration. Other than that I have no additional information....

[0] http://article.gmane.org/gmane.linux.scsi.target.devel/654

> Alan Stern

Sebastian
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ