Message ID | 20230726191556.41714-1-hare@suse.de (mailing list archive) |
---|---|
Headers | show |
Series | net/tls: fixes for NVMe-over-TLS | expand |
Hello: This series was applied to netdev/net-next.git (main) by Jakub Kicinski <kuba@kernel.org>: On Wed, 26 Jul 2023 21:15:50 +0200 you wrote: > Hi all, > > here are some small fixes to get NVMe-over-TLS up and running. > The first set are just minor modifications to have MSG_EOR handled > for TLS, but the second set implements the ->read_sock() callback > for tls_sw. > The ->read_sock() callbacks return -EIO when encountering any TLS > Alert message, but as that's the default behaviour anyway I guess > we can get away with it. > > [...] Here is the summary with links: - [1/6] net/tls: handle MSG_EOR for tls_sw TX flow https://git.kernel.org/netdev/net-next/c/e22e358bbeb3 - [2/6] net/tls: handle MSG_EOR for tls_device TX flow https://git.kernel.org/netdev/net-next/c/c004b0e00c94 - [3/6] selftests/net/tls: add test for MSG_EOR https://git.kernel.org/netdev/net-next/c/8790c6a4f54d - [4/6] net/tls: Use tcp_read_sock() instead of ops->read_sock() https://git.kernel.org/netdev/net-next/c/11863c6d440d - [5/6] net/tls: split tls_rx_reader_lock https://git.kernel.org/netdev/net-next/c/f9ae3204fb45 - [6/6] net/tls: implement ->read_sock() https://git.kernel.org/netdev/net-next/c/662fbcec32f4 You are awesome, thank you!