[PATCHv9 0/6] net/tls: fixes for NVMe-over-TLS
patchwork-bot+netdevbpf at kernel.org
patchwork-bot+netdevbpf at kernel.org
Thu Jul 27 20:30:25 PDT 2023
Hello:
This series was applied to netdev/net-next.git (main)
by Jakub Kicinski <kuba at kernel.org>:
On Wed, 26 Jul 2023 21:15:50 +0200 you wrote:
> Hi all,
>
> here are some small fixes to get NVMe-over-TLS up and running.
> The first set are just minor modifications to have MSG_EOR handled
> for TLS, but the second set implements the ->read_sock() callback
> for tls_sw.
> The ->read_sock() callbacks return -EIO when encountering any TLS
> Alert message, but as that's the default behaviour anyway I guess
> we can get away with it.
>
> [...]
Here is the summary with links:
- [1/6] net/tls: handle MSG_EOR for tls_sw TX flow
https://git.kernel.org/netdev/net-next/c/e22e358bbeb3
- [2/6] net/tls: handle MSG_EOR for tls_device TX flow
https://git.kernel.org/netdev/net-next/c/c004b0e00c94
- [3/6] selftests/net/tls: add test for MSG_EOR
https://git.kernel.org/netdev/net-next/c/8790c6a4f54d
- [4/6] net/tls: Use tcp_read_sock() instead of ops->read_sock()
https://git.kernel.org/netdev/net-next/c/11863c6d440d
- [5/6] net/tls: split tls_rx_reader_lock
https://git.kernel.org/netdev/net-next/c/f9ae3204fb45
- [6/6] net/tls: implement ->read_sock()
https://git.kernel.org/netdev/net-next/c/662fbcec32f4
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
More information about the Linux-nvme
mailing list