lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <ZNYMQPCbsqxOtFur@vergenet.net> Date: Fri, 11 Aug 2023 12:24:00 +0200 From: Simon Horman <horms@...nel.org> To: Hannes Reinecke <hare@...e.de> Cc: Christoph Hellwig <hch@....de>, Sagi Grimberg <sagi@...mberg.me>, Keith Busch <kbusch@...nel.org>, linux-nvme@...ts.infradead.org, Jakub Kicinski <kuba@...nel.org>, Eric Dumazet <edumazet@...gle.com>, Paolo Abeni <pabeni@...hat.com>, netdev@...r.kernel.org Subject: Re: [PATCH 11/17] nvmet: make TCP sectype settable via configfs On Thu, Aug 10, 2023 at 05:06:24PM +0200, Hannes Reinecke wrote: ... > +static ssize_t nvmet_addr_tsas_store(struct config_item *item, > + const char *page, size_t count) > +{ > + struct nvmet_port *port = to_nvmet_port(item); > + u8 treq = nvmet_port_disc_addr_treq_mask(port); Hi Hannes, treq appears to be unused in this function. > + u8 sectype; > + int i; > + > + if (nvmet_is_port_enabled(port, __func__)) > + return -EACCES; > + > + if (port->disc_addr.trtype != NVMF_TRTYPE_TCP) > + return -EINVAL; > + > + for (i = 0; i < ARRAY_SIZE(nvmet_addr_tsas_tcp); i++) { > + if (sysfs_streq(page, nvmet_addr_tsas_tcp[i].name)) { > + sectype = nvmet_addr_tsas_tcp[i].type; > + goto found; > + } > + } > + > + pr_err("Invalid value '%s' for tsas\n", page); > + return -EINVAL; > + > +found: > + nvmet_port_init_tsas_tcp(port, sectype); > + return count; > +} ...
Powered by blists - more mailing lists