-
Notifications
You must be signed in to change notification settings - Fork 697
fabrics: fix concat during connect-all #3035
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
During nvme connect-all, if a discovery log page record reports the sectype as anything other than NVMF_TCP_SECTYPE_NONE in nvmf_connect_disc_entry(), it then assumes that tls should be default set for the same. But this holds true only for configured PSK TLS connections alone and not generated PSK TLS (i.e. secure channel concat) connections since both concat and tls flags are meant to be mutually exclusive. Fix the same. Signed-off-by: Martin George <marting@netapp.com>
|
I think the Something like this here: if (e->trtype == NVMF_TRTYPE_TCP &&
e->tsas.tcp.sectype != NVMF_TCP_SECTYPE_NONE &&
!cfg->tls)
c->cfg.tls = true;If we check the command line for |
Yes, I agree. This code snippet at nvmf_connect_disc_entry() is really unwarranted IMO. But anyways...
This won't help because That's the reason I made this fix in nvmf_add_ctrl() itself in the above commit, and not in nvmf_connect_disc_entry(). |
|
Or should we just do away with the current code snippet of enabling What do you say? |
|
There was already some changes on this condition:
After reading up on the BTW, I think we should add a blktests for this scenario. |
Then why not go with the current fix itself in the above commit at d1377a7? That way, we retain the existing check of default enabling |
|
I was digging more into this, and looks like there is a simple solution for this issue. For configured PSK, the |
This reverts commit d1377a7.
During nvme connect-all, if a discovery log page record reports the sectype as anything other than NVMF_TCP_SECTYPE_NONE in nvmf_connect_disc_entry(), it then assumes that --tls should be default set for the same. But this holds true only for configured PSK TLS alone and not for generated PSK TLS. For generated PSK TLS connections using --concat (i.e. secure channel concat), this would lead to connection failures since both --tls and --concat are not to be invoked together. Fix this by distinguishing the two through their respective treq values and setting the appropriate --tls or --concat flags for each. Signed-off-by: Martin George <marting@netapp.com>
|
@hreinecke - Could you please share your comments on this? |
During nvme connect-all, if a discovery log page record reports the sectype as anything other than NVMF_TCP_SECTYPE_NONE in nvmf_connect_disc_entry(), it then assumes that tls should be default set for the same. But this holds true only for configured PSK TLS connections alone and not generated PSK TLS (i.e. secure channel concat) connections since both concat and tls flags are meant to be mutually exclusive. Fix the same.
Fixes: #3034