lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 8 Jan 2014 20:15:48 +0000 From: "Nicholas A. Bellinger" <nab@...erainc.com> To: target-devel <target-devel@...r.kernel.org> Cc: linux-scsi <linux-scsi@...r.kernel.org>, linux-kernel <linux-kernel@...r.kernel.org>, "Martin K. Petersen" <martin.petersen@...cle.com>, Christoph Hellwig <hch@....de>, Hannes Reinecke <hare@...e.de>, Sagi Grimberg <sagig@...lanox.com>, Or Gerlitz <ogerlitz@...lanox.com>, Nicholas Bellinger <nab@...ux-iscsi.org> Subject: [PATCH 05/14] target/spc: Add protection bit to standard INQUIRY output From: Nicholas Bellinger <nab@...ux-iscsi.org> This patch updates spc_emulate_inquiry_std() to set the PROTECT bit when DIF emulation is enabled by the backend device. Cc: Martin K. Petersen <martin.petersen@...cle.com> Cc: Christoph Hellwig <hch@....de> Cc: Hannes Reinecke <hare@...e.de> Cc: Sagi Grimberg <sagig@...lanox.com> Cc: Or Gerlitz <ogerlitz@...lanox.com> Signed-off-by: Nicholas Bellinger <nab@...ux-iscsi.org> --- drivers/target/target_core_spc.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/drivers/target/target_core_spc.c b/drivers/target/target_core_spc.c index 021c3f4..6b06f01 100644 --- a/drivers/target/target_core_spc.c +++ b/drivers/target/target_core_spc.c @@ -100,6 +100,11 @@ spc_emulate_inquiry_std(struct se_cmd *cmd, unsigned char *buf) */ if (dev->dev_attrib.emulate_3pc) buf[5] |= 0x8; + /* + * Set Protection (PROTECT) bit when DIF has been enabled. + */ + if (dev->dev_attrib.pi_prot_type) + buf[5] |= 0x1; buf[7] = 0x2; /* CmdQue=1 */ -- 1.7.10.4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists