[linux-nvme:nvme-6.14 29/35] drivers/nvme/host/auth.c:742:2-3: Unneeded semicolon
kernel test robot
lkp at intel.com
Sun Jan 12 11:40:15 PST 2025
tree: git://git.infradead.org/nvme.git nvme-6.14
head: 6d84dae9af94be43bb71d24353aef102fd0744da
commit: b68527338ba3882e43bae078c1bd4de0f55c6ce3 [29/35] nvme-tcp: request secure channel concatenation
config: arc-randconfig-r054-20250112 (https://download.01.org/0day-ci/archive/20250113/202501130310.A2dr9hU5-lkp@intel.com/config)
compiler: arc-elf-gcc (GCC) 13.2.0
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp at intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202501130310.A2dr9hU5-lkp@intel.com/
cocci warnings: (new ones prefixed by >>)
>> drivers/nvme/host/auth.c:742:2-3: Unneeded semicolon
drivers/nvme/host/auth.c:751:2-3: Unneeded semicolon
vim +742 drivers/nvme/host/auth.c
699
700 static int nvme_auth_secure_concat(struct nvme_ctrl *ctrl,
701 struct nvme_dhchap_queue_context *chap)
702 {
703 u8 *psk, *digest, *tls_psk;
704 struct key *tls_key;
705 size_t psk_len;
706 int ret = 0;
707
708 if (!chap->sess_key) {
709 dev_warn(ctrl->device,
710 "%s: qid %d no session key negotiated\n",
711 __func__, chap->qid);
712 return -ENOKEY;
713 }
714
715 if (chap->qid) {
716 dev_warn(ctrl->device,
717 "qid %d: secure concatenation not supported on I/O queues\n",
718 chap->qid);
719 return -EINVAL;
720 }
721 ret = nvme_auth_generate_psk(chap->hash_id, chap->sess_key,
722 chap->sess_key_len,
723 chap->c1, chap->c2,
724 chap->hash_len, &psk, &psk_len);
725 if (ret) {
726 dev_warn(ctrl->device,
727 "%s: qid %d failed to generate PSK, error %d\n",
728 __func__, chap->qid, ret);
729 return ret;
730 }
731 dev_dbg(ctrl->device,
732 "%s: generated psk %*ph\n", __func__, (int)psk_len, psk);
733
734 ret = nvme_auth_generate_digest(chap->hash_id, psk, psk_len,
735 ctrl->opts->subsysnqn,
736 ctrl->opts->host->nqn, &digest);
737 if (ret) {
738 dev_warn(ctrl->device,
739 "%s: qid %d failed to generate digest, error %d\n",
740 __func__, chap->qid, ret);
741 goto out_free_psk;
> 742 };
743 dev_dbg(ctrl->device, "%s: generated digest %s\n",
744 __func__, digest);
745 ret = nvme_auth_derive_tls_psk(chap->hash_id, psk, psk_len, digest, &tls_psk);
746 if (ret) {
747 dev_warn(ctrl->device,
748 "%s: qid %d failed to derive TLS psk, error %d\n",
749 __func__, chap->qid, ret);
750 goto out_free_digest;
751 };
752
753 tls_key = nvme_tls_psk_refresh(ctrl->opts->keyring, ctrl->opts->host->nqn,
754 ctrl->opts->subsysnqn, chap->hash_id,
755 tls_psk, psk_len, digest);
756 if (IS_ERR(tls_key)) {
757 ret = PTR_ERR(tls_key);
758 dev_warn(ctrl->device,
759 "%s: qid %d failed to insert generated key, error %d\n",
760 __func__, chap->qid, ret);
761 tls_key = NULL;
762 }
763 kfree_sensitive(tls_psk);
764 if (ctrl->opts->tls_key)
765 nvme_auth_revoke_tls_key(ctrl);
766 ctrl->opts->tls_key = tls_key;
767 out_free_digest:
768 kfree_sensitive(digest);
769 out_free_psk:
770 kfree_sensitive(psk);
771 return ret;
772 }
773
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
More information about the Linux-nvme
mailing list