aboutsummaryrefslogtreecommitdiff
path: root/net/ceph/messenger_v2.c
AgeCommit message (Expand)AuthorFilesLines
10 dayslibceph: prevent potential out-of-bounds reads in handle_auth_done()ziming zhang1-0/+2
2025-12-03Merge tag 'printk-for-6.19' of git://git.kernel.org/pub/scm/linux/kernel/git/...Linus Torvalds1-4/+2
2025-11-27ceph: fix crash in process_v2_sparse_read() for encrypted directoriesViacheslav Dubeyko1-4/+7
2025-11-19libceph: Switch to use %ptSpAndy Shevchenko1-4/+2
2025-10-08libceph: add empty check to ceph_con_get_out_msg()Max Kellermann1-2/+1
2025-10-08libceph: pass the message pointer instead of loading con->out_msgMax Kellermann1-80/+88
2025-10-08libceph: Use HMAC-SHA256 library instead of crypto_shashEric Biggers1-55/+22
2025-07-04libceph: Rename hmac_sha256() to ceph_hmac_sha256()Eric Biggers1-6/+6
2024-03-06libceph: init the cursor when preparing sparse read in msgr2Xiubo Li1-0/+3
2024-02-07libceph: just wait for more data to be available on the socketXiubo Li1-2/+2
2023-10-27libceph: stop checking crypto_shash_alignmaskEric Biggers1-4/+0
2023-08-24libceph: do not include crypto/algapi.hHerbert Xu1-1/+1
2023-08-22libceph: support sparse reads on msgr2 secure codepathJeff Layton1-10/+110
2023-08-22libceph: new sparse_read op, support sparse reads on msgr2 crc codepathJeff Layton1-9/+158
2023-07-13libceph: harden msgr2.1 frame segment length checksIlya Dryomov1-15/+26
2023-06-27libceph: Partially revert changes to support MSG_SPLICE_PAGESDavid Howells1-18/+70
2023-06-24ceph: Use sendmsg(MSG_SPLICE_PAGES) rather than sendpage()David Howells1-72/+19
2023-02-03libceph: use bvec_set_page to initialize bvecsChristoph Hellwig1-17/+11
2022-11-25use less confusing names for iov_iter direction initializersAl Viro1-7/+7
2022-10-04libceph: drop last_piece flag from ceph_msg_data_cursorJeff Layton1-1/+1
2022-03-01libceph: drop else branches in prepare_read_data{,_cont}Jeff Layton1-6/+2
2022-02-02libceph: optionally use bounce buffer on recv path in crc modeIlya Dryomov1-14/+44
2022-02-02libceph: make recv path in secure mode work the same as send pathIlya Dryomov1-62/+154
2022-01-15mm: allow !GFP_KERNEL allocations for kvmallocMichal Hocko1-1/+1
2021-01-04libceph: zero out session key and connection secretIlya Dryomov1-19/+26
2020-12-28libceph: align session_key and con_secret to 16 bytesIlya Dryomov1-2/+10
2020-12-28libceph: fix auth_signature buffer allocation in secure modeIlya Dryomov1-1/+2
2020-12-17Merge tag 'ceph-for-5.11-rc1' of git://github.com/ceph/ceph-clientLinus Torvalds1-0/+3443
2020-12-14libceph, ceph: implement msgr2.1 protocol (crc and secure modes)Ilya Dryomov1-0/+3443