Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp663522rdg; Wed, 11 Oct 2023 01:46:03 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF42+AgKFx+PJYDYjj3vPSjBXfdKj9/w2alwj5Gbp1KbZufVBidikqQrl7haO1yM8WEKIL+ X-Received: by 2002:a17:90a:d718:b0:27d:853:9109 with SMTP id y24-20020a17090ad71800b0027d08539109mr603858pju.20.1697013962771; Wed, 11 Oct 2023 01:46:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697013962; cv=none; d=google.com; s=arc-20160816; b=06Q5lUGyTEroYQ7iWwhkAvLhOHf3kpGGbyNPfNheTWM30pbT5+Ek3CMpFFcjuOmJdM Qod9++KEacOGPlVrL6Bk2H8xhbhPkpS9uwNhA3kjOzzUs/gAIxy1R9iBfkHVQq3c5xXq e1j+rajy4ZN7W7+xA3mZstfP848nzxnDqgL6bQPAXsLTXBq8o0ONf4Lvycii73+/rx7B G126qYC7sxvmgIsk8f8qfL4hfUdfZduUlqSkSush8JRspd4Wl7nEIfqwczDiOa/4P84h EzxMivBdfcoAnOKbrO3nq83vrEpfXhfqOwKGHyNunxQK0EeFXODpAWiqVGaJLTVLWQQY bZ5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=WWsp2lZYjNABdfJu4pN0mVKmqaG1Tm315z3OevtQvHU=; fh=nK/B2gIzvYPsKU0sJgdKEVdz5eoE00hHt727sEimwsQ=; b=XHmauicNaDYmkyuqAr8Lhh3NF+jaPrdBLIR89XB4xJLrFVriyDdKsWxGliwGDvNm1D N9VYZZPSaekP6AkARUMWTO0EG+sD6soei07VhqeF5FlWb3laEYw0R8fhulaM5TXar0w0 Jn3XdBa5NBiRjdsWLvieYcGiqj12jFjBRniTuU1SH2XkSvoPAc3XHhFewnSo44HStTfA eSYc1eakIZgx61aV+pQQKMkos1npUiQFc7bzXS84pd3+zNJNyOUXStd/0pmtoyxlDNyg Cf8LS1yBhBMlhqcC5j14h6q95lAFTm8ql/H3j1DLEYbDJwf8sASSkQ5svrclnO2LEa8+ 02qg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@posteo.net header.s=2017 header.b="fPB/cjVY"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=posteo.net Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id ip10-20020a17090b314a00b00263eb5054f2si14499930pjb.105.2023.10.11.01.46.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Oct 2023 01:46:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@posteo.net header.s=2017 header.b="fPB/cjVY"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=posteo.net Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 3BC7380E0A26; Wed, 11 Oct 2023 01:46:00 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345483AbjJKIpp (ORCPT + 99 others); Wed, 11 Oct 2023 04:45:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39866 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230496AbjJKIph (ORCPT ); Wed, 11 Oct 2023 04:45:37 -0400 Received: from mout01.posteo.de (mout01.posteo.de [185.67.36.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 07413B6 for ; Wed, 11 Oct 2023 01:45:35 -0700 (PDT) Received: from submission (posteo.de [185.67.36.169]) by mout01.posteo.de (Postfix) with ESMTPS id 77CBA24002A for ; Wed, 11 Oct 2023 10:45:34 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=posteo.net; s=2017; t=1697013934; bh=HoFGL1O1u5jeH2eaAc/NSgPYTeO+yRIjCCiIYzJbT6w=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version: Content-Transfer-Encoding:From; b=fPB/cjVYgK9Fdfzt2+GmxUYKzlWxtsNpfGkoBdJ6va1ELOt/MEEsTHthx0gQpyMSo 3zPVMDIwaZEtIgVLdIrk58uwS+fijwmAVPtz+GVbwkLaZdGOIpk29OPBI6qPFTVYd3 TxBGn065nSqNGh9CH3RqMtRKWBzmxpQYZ95MOSZAQySq6vAfEzf70PorNtyG6KXonQ PDoGFhSQrTzN6b+H5yKQpKAHwdaUcNKProTXIZHetLMHaHZp6yQ4y0mQxbaQxH5c87 9sqhmlTKLqcIUa9Swp75a1Uoe4f1Hs2hiyV7G2XbxmbWXZkMP/hfW5ZvBO+zjU5eC+ MZaPwYHEsusbA== Received: from customer (localhost [127.0.0.1]) by submission (posteo.de) with ESMTPSA id 4S55vK1M9Pz6tw0; Wed, 11 Oct 2023 10:45:33 +0200 (CEST) From: Mark O'Donovan To: linux-kernel@vger.kernel.org Cc: linux-nvme@lists.infradead.org, sagi@grimberg.me, hch@lst.de, axboe@kernel.dk, kbusch@kernel.org, hare@suse.de, Mark O'Donovan Subject: [PATCH 2/2 RESEND] nvme-auth: set explanation code for failure2 msgs Date: Wed, 11 Oct 2023 08:45:12 +0000 Message-Id: <20231011084512.1835614-2-shiftee@posteo.net> In-Reply-To: <20231011084512.1835614-1-shiftee@posteo.net> References: <20231011084512.1835614-1-shiftee@posteo.net> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=2.7 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 11 Oct 2023 01:46:00 -0700 (PDT) X-Spam-Level: ** Some error cases were not setting an auth-failure-reason-code-explanation. This means an AUTH_Failure2 message will be sent with an explanation value of 0 which is a reserved value. Signed-off-by: Mark O'Donovan Reviewed-by: Hannes Reinecke --- v1->v2: Set failure explanation in a single place if the error handling code has not already done so. --- drivers/nvme/host/auth.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/nvme/host/auth.c b/drivers/nvme/host/auth.c index e1a98647c3a2..9556cfc4f5f3 100644 --- a/drivers/nvme/host/auth.c +++ b/drivers/nvme/host/auth.c @@ -839,6 +839,8 @@ static void nvme_queue_auth_work(struct work_struct *work) } fail2: + if (chap->status == 0) + chap->status = NVME_AUTH_DHCHAP_FAILURE_FAILED; dev_dbg(ctrl->device, "%s: qid %d send failure2, status %x\n", __func__, chap->qid, chap->status); tl = nvme_auth_set_dhchap_failure2_data(ctrl, chap); -- 2.39.2