[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230614062212.73288-1-hare@suse.de>
Date: Wed, 14 Jun 2023 08:22:08 +0200
From: Hannes Reinecke <hare@...e.de>
To: Christoph Hellwig <hch@....de>
Cc: Sagi Grimberg <sagi@...mberg.me>,
Keith Busch <kbusch@...nel.org>,
linux-nvme@...ts.infradead.org,
Jakub Kicinski <kuba@...nel.org>,
netdev@...r.kernel.org,
Hannes Reinecke <hare@...e.de>
Subject: [PATCHv4 0/4] net/tls: fixes for NVMe-over-TLS
Hi all,
here are some small fixes to get NVMe-over-TLS up and running.
The first thre are just minor modifications to have MSG_EOR handled
for TLS (and adding a test for it), but the last implements the
->read_sock() callback for tls_sw and I guess could do with some
reviews.
It does work with my NVMe-TLS test harness, but what do I know :-)
As usual, comments and reviews are welcome.
Changes to the original submission:
- Add a testcase for MSG_EOR handling
Changes to v2:
- Bail out on conflicting message flags
- Rework flag handling
Changes to v3:
- Return -EINVAL on conflicting flags
- Rebase on top of net-next
Hannes Reinecke (4):
net/tls: handle MSG_EOR for tls_sw TX flow
net/tls: handle MSG_EOR for tls_device TX flow
selftests/net/tls: add test for MSG_EOR
net/tls: implement ->read_sock()
net/tls/tls.h | 2 +
net/tls/tls_device.c | 25 ++++++++--
net/tls/tls_main.c | 2 +
net/tls/tls_sw.c | 78 ++++++++++++++++++++++++++++++-
tools/testing/selftests/net/tls.c | 11 +++++
5 files changed, 111 insertions(+), 7 deletions(-)
--
2.35.3
Powered by blists - more mailing lists