[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251114045850.1898865-1-alistair.francis@wdc.com>
Date: Fri, 14 Nov 2025 14:58:46 +1000
From: alistair23@...il.com
To: kbusch@...nel.org,
axboe@...nel.dk,
hch@....de,
sagi@...mberg.me,
hare@...e.de,
kch@...dia.com,
linux-nvme@...ts.infradead.org
Cc: linux-kernel@...r.kernel.org,
alistair23@...il.com,
Alistair Francis <alistair.francis@....com>
Subject: [PATCH v3 0/4] Support PSK reauthentication (REPLACETLSPSK)
From: Alistair Francis <alistair.francis@....com>
Allow userspace on the host to trigger a reauth (REPLACETLSPSK) from
sysfs. This will replace the PSK for the admin queue when using
a secure concat connection.
This can be done by writing 0 to the `tls_configured_key` sysfs file,
for example something like this
```shell
echo 0 > /sys/devices/virtual/nvme-fabrics/ctl/nvme0/tls_configured_key
```
`tls_configured_key` will only appear for concat connections as that is
all that is supported.
Reading `tls_configured_key` will return the current configured key, which
changes after each REPLACETLSPSK operation.
This series also include some fixes for the NVMe target code to ensure
this works against a Linux NVMe target.
v3:
- Only trigger if a 0 is written to `tls_configured_key`
- Add documentation
Alistair Francis (4):
nvmet-tcp: Don't error if TLS is enabed on a reset
nvmet-tcp: Don't free SQ on authentication success
nvme: Expose the tls_configured sysfs for secure concat connections
nvme: Allow reauth from sysfs
Documentation/ABI/testing/sysfs-nvme | 13 ++++++++++
drivers/nvme/host/sysfs.c | 36 ++++++++++++++++++++++++--
drivers/nvme/target/auth.c | 4 +--
drivers/nvme/target/core.c | 2 +-
drivers/nvme/target/fabrics-cmd-auth.c | 12 ++++-----
drivers/nvme/target/nvmet.h | 4 +--
6 files changed, 58 insertions(+), 13 deletions(-)
create mode 100644 Documentation/ABI/testing/sysfs-nvme
--
2.51.1
Powered by blists - more mailing lists