* [PATCH v3 0/6] Bug fixes for net/handshake
@ 2023-05-11 15:46 Chuck Lever
2023-05-11 15:47 ` [PATCH v3 1/6] net/handshake: Remove unneeded check from handshake_dup() Chuck Lever
` (7 more replies)
0 siblings, 8 replies; 9+ messages in thread
From: Chuck Lever @ 2023-05-11 15:46 UTC (permalink / raw)
To: netdev; +Cc: kernel-tls-handshake, dan.carpenter, chuck.lever
Please consider these for merge via net-next.
Paolo observed that there is a possible leak of sock->file. I
haven't looked into that yet, but it seems to be separate from
the fixes in this series, so no need to hold these up.
Changes since v2:
- Address Paolo comment regarding handshake_dup()
Changes since v1:
- Rework "Fix handshake_dup() ref counting"
- Unpin sock->file when a handshake is cancelled
---
Chuck Lever (6):
net/handshake: Remove unneeded check from handshake_dup()
net/handshake: Fix handshake_dup() ref counting
net/handshake: Fix uninitialized local variable
net/handshake: handshake_genl_notify() shouldn't ignore @flags
net/handshake: Unpin sock->file if a handshake is cancelled
net/handshake: Enable the SNI extension to work properly
Documentation/netlink/specs/handshake.yaml | 4 ++++
Documentation/networking/tls-handshake.rst | 5 +++++
include/net/handshake.h | 1 +
include/uapi/linux/handshake.h | 1 +
net/handshake/handshake.h | 1 +
net/handshake/netlink.c | 12 +++++-------
net/handshake/request.c | 4 ++++
net/handshake/tlshd.c | 8 ++++++++
8 files changed, 29 insertions(+), 7 deletions(-)
--
Chuck Lever
^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCH v3 1/6] net/handshake: Remove unneeded check from handshake_dup()
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
@ 2023-05-11 15:47 ` Chuck Lever
2023-05-11 15:47 ` [PATCH v3 2/6] net/handshake: Fix handshake_dup() ref counting Chuck Lever
` (6 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Chuck Lever @ 2023-05-11 15:47 UTC (permalink / raw)
To: netdev; +Cc: kernel-tls-handshake, dan.carpenter, chuck.lever
From: Chuck Lever <chuck.lever@oracle.com>
handshake_req_submit() now verifies that the socket has a file.
Fixes: 3b3009ea8abb ("net/handshake: Create a NETLINK service for handling handshake requests")
Reviewed-by: Simon Horman <simon.horman@corigine.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
net/handshake/netlink.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/net/handshake/netlink.c b/net/handshake/netlink.c
index 35c9c445e0b8..7ec8a76c3c8a 100644
--- a/net/handshake/netlink.c
+++ b/net/handshake/netlink.c
@@ -99,9 +99,6 @@ static int handshake_dup(struct socket *sock)
struct file *file;
int newfd;
- if (!sock->file)
- return -EBADF;
-
file = get_file(sock->file);
newfd = get_unused_fd_flags(O_CLOEXEC);
if (newfd < 0) {
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH v3 2/6] net/handshake: Fix handshake_dup() ref counting
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
2023-05-11 15:47 ` [PATCH v3 1/6] net/handshake: Remove unneeded check from handshake_dup() Chuck Lever
@ 2023-05-11 15:47 ` Chuck Lever
2023-05-11 15:48 ` [PATCH v3 3/6] net/handshake: Fix uninitialized local variable Chuck Lever
` (5 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Chuck Lever @ 2023-05-11 15:47 UTC (permalink / raw)
To: netdev; +Cc: kernel-tls-handshake, dan.carpenter, chuck.lever
From: Chuck Lever <chuck.lever@oracle.com>
If get_unused_fd_flags() fails, we ended up calling fput(sock->file)
twice.
Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Suggested-by: Paolo Abeni <pabeni@redhat.com>
Fixes: 3b3009ea8abb ("net/handshake: Create a NETLINK service for handling handshake requests")
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
net/handshake/netlink.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/net/handshake/netlink.c b/net/handshake/netlink.c
index 7ec8a76c3c8a..f5dc170689d9 100644
--- a/net/handshake/netlink.c
+++ b/net/handshake/netlink.c
@@ -139,15 +139,16 @@ int handshake_nl_accept_doit(struct sk_buff *skb, struct genl_info *info)
goto out_complete;
}
err = req->hr_proto->hp_accept(req, info, fd);
- if (err)
+ if (err) {
+ fput(sock->file);
goto out_complete;
+ }
trace_handshake_cmd_accept(net, req, req->hr_sk, fd);
return 0;
out_complete:
handshake_complete(req, -EIO, NULL);
- fput(sock->file);
out_status:
trace_handshake_cmd_accept_err(net, req, NULL, err);
return err;
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH v3 3/6] net/handshake: Fix uninitialized local variable
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
2023-05-11 15:47 ` [PATCH v3 1/6] net/handshake: Remove unneeded check from handshake_dup() Chuck Lever
2023-05-11 15:47 ` [PATCH v3 2/6] net/handshake: Fix handshake_dup() ref counting Chuck Lever
@ 2023-05-11 15:48 ` Chuck Lever
2023-05-11 15:48 ` [PATCH v3 4/6] net/handshake: handshake_genl_notify() shouldn't ignore @flags Chuck Lever
` (4 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Chuck Lever @ 2023-05-11 15:48 UTC (permalink / raw)
To: netdev; +Cc: kernel-tls-handshake, dan.carpenter, chuck.lever
From: Chuck Lever <chuck.lever@oracle.com>
trace_handshake_cmd_done_err() simply records the pointer in @req,
so initializing it to NULL is sufficient and safe.
Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Fixes: 3b3009ea8abb ("net/handshake: Create a NETLINK service for handling handshake requests")
Reviewed-by: Simon Horman <simon.horman@corigine.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
net/handshake/netlink.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/handshake/netlink.c b/net/handshake/netlink.c
index f5dc170689d9..16a4bde648ba 100644
--- a/net/handshake/netlink.c
+++ b/net/handshake/netlink.c
@@ -157,8 +157,8 @@ int handshake_nl_accept_doit(struct sk_buff *skb, struct genl_info *info)
int handshake_nl_done_doit(struct sk_buff *skb, struct genl_info *info)
{
struct net *net = sock_net(skb->sk);
+ struct handshake_req *req = NULL;
struct socket *sock = NULL;
- struct handshake_req *req;
int fd, status, err;
if (GENL_REQ_ATTR_CHECK(info, HANDSHAKE_A_DONE_SOCKFD))
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH v3 4/6] net/handshake: handshake_genl_notify() shouldn't ignore @flags
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
` (2 preceding siblings ...)
2023-05-11 15:48 ` [PATCH v3 3/6] net/handshake: Fix uninitialized local variable Chuck Lever
@ 2023-05-11 15:48 ` Chuck Lever
2023-05-11 15:49 ` [PATCH v3 5/6] net/handshake: Unpin sock->file if a handshake is cancelled Chuck Lever
` (3 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Chuck Lever @ 2023-05-11 15:48 UTC (permalink / raw)
To: netdev; +Cc: kernel-tls-handshake, dan.carpenter, chuck.lever
From: Chuck Lever <chuck.lever@oracle.com>
Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Fixes: 3b3009ea8abb ("net/handshake: Create a NETLINK service for handling handshake requests")
Reviewed-by: Simon Horman <simon.horman@corigine.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
net/handshake/netlink.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/handshake/netlink.c b/net/handshake/netlink.c
index 16a4bde648ba..1086653e1fad 100644
--- a/net/handshake/netlink.c
+++ b/net/handshake/netlink.c
@@ -48,7 +48,7 @@ int handshake_genl_notify(struct net *net, const struct handshake_proto *proto,
proto->hp_handler_class))
return -ESRCH;
- msg = genlmsg_new(GENLMSG_DEFAULT_SIZE, GFP_KERNEL);
+ msg = genlmsg_new(GENLMSG_DEFAULT_SIZE, flags);
if (!msg)
return -ENOMEM;
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH v3 5/6] net/handshake: Unpin sock->file if a handshake is cancelled
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
` (3 preceding siblings ...)
2023-05-11 15:48 ` [PATCH v3 4/6] net/handshake: handshake_genl_notify() shouldn't ignore @flags Chuck Lever
@ 2023-05-11 15:49 ` Chuck Lever
2023-05-11 15:49 ` [PATCH v3 6/6] net/handshake: Enable the SNI extension to work properly Chuck Lever
` (2 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Chuck Lever @ 2023-05-11 15:49 UTC (permalink / raw)
To: netdev; +Cc: kernel-tls-handshake, dan.carpenter, chuck.lever
From: Chuck Lever <chuck.lever@oracle.com>
If user space never calls DONE, sock->file's reference count remains
elevated. Enable sock->file to be freed eventually in this case.
Reported-by: Jakub Kacinski <kuba@kernel.org>
Fixes: 3b3009ea8abb ("net/handshake: Create a NETLINK service for handling handshake requests")
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
net/handshake/handshake.h | 1 +
net/handshake/request.c | 4 ++++
2 files changed, 5 insertions(+)
diff --git a/net/handshake/handshake.h b/net/handshake/handshake.h
index 4dac965c99df..8aeaadca844f 100644
--- a/net/handshake/handshake.h
+++ b/net/handshake/handshake.h
@@ -31,6 +31,7 @@ struct handshake_req {
struct list_head hr_list;
struct rhash_head hr_rhash;
unsigned long hr_flags;
+ struct file *hr_file;
const struct handshake_proto *hr_proto;
struct sock *hr_sk;
void (*hr_odestruct)(struct sock *sk);
diff --git a/net/handshake/request.c b/net/handshake/request.c
index 94d5cef3e048..d78d41abb3d9 100644
--- a/net/handshake/request.c
+++ b/net/handshake/request.c
@@ -239,6 +239,7 @@ int handshake_req_submit(struct socket *sock, struct handshake_req *req,
}
req->hr_odestruct = req->hr_sk->sk_destruct;
req->hr_sk->sk_destruct = handshake_sk_destruct;
+ req->hr_file = sock->file;
ret = -EOPNOTSUPP;
net = sock_net(req->hr_sk);
@@ -334,6 +335,9 @@ bool handshake_req_cancel(struct sock *sk)
return false;
}
+ /* Request accepted and waiting for DONE */
+ fput(req->hr_file);
+
out_true:
trace_handshake_cancel(net, req, sk);
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH v3 6/6] net/handshake: Enable the SNI extension to work properly
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
` (4 preceding siblings ...)
2023-05-11 15:49 ` [PATCH v3 5/6] net/handshake: Unpin sock->file if a handshake is cancelled Chuck Lever
@ 2023-05-11 15:49 ` Chuck Lever
2023-05-12 8:30 ` [PATCH v3 0/6] Bug fixes for net/handshake patchwork-bot+netdevbpf
2023-05-25 5:20 ` patchwork-bot+netdevbpf
7 siblings, 0 replies; 9+ messages in thread
From: Chuck Lever @ 2023-05-11 15:49 UTC (permalink / raw)
To: netdev; +Cc: kernel-tls-handshake, dan.carpenter, chuck.lever
From: Chuck Lever <chuck.lever@oracle.com>
Enable the upper layer protocol to specify the SNI peername. This
avoids the need for tlshd to use a DNS lookup, which can return a
hostname that doesn't match the incoming certificate's SubjectName.
Fixes: 2fd5532044a8 ("net/handshake: Add a kernel API for requesting a TLSv1.3 handshake")
Reviewed-by: Simon Horman <simon.horman@corigine.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
Documentation/netlink/specs/handshake.yaml | 4 ++++
Documentation/networking/tls-handshake.rst | 5 +++++
include/net/handshake.h | 1 +
include/uapi/linux/handshake.h | 1 +
net/handshake/tlshd.c | 8 ++++++++
5 files changed, 19 insertions(+)
diff --git a/Documentation/netlink/specs/handshake.yaml b/Documentation/netlink/specs/handshake.yaml
index 614f1a585511..6d89e30f5fd5 100644
--- a/Documentation/netlink/specs/handshake.yaml
+++ b/Documentation/netlink/specs/handshake.yaml
@@ -68,6 +68,9 @@ attribute-sets:
type: nest
nested-attributes: x509
multi-attr: true
+ -
+ name: peername
+ type: string
-
name: done
attributes:
@@ -105,6 +108,7 @@ operations:
- auth-mode
- peer-identity
- certificate
+ - peername
-
name: done
doc: Handler reports handshake completion
diff --git a/Documentation/networking/tls-handshake.rst b/Documentation/networking/tls-handshake.rst
index a2817a88e905..6f5ea1646a47 100644
--- a/Documentation/networking/tls-handshake.rst
+++ b/Documentation/networking/tls-handshake.rst
@@ -53,6 +53,7 @@ fills in a structure that contains the parameters of the request:
struct socket *ta_sock;
tls_done_func_t ta_done;
void *ta_data;
+ const char *ta_peername;
unsigned int ta_timeout_ms;
key_serial_t ta_keyring;
key_serial_t ta_my_cert;
@@ -71,6 +72,10 @@ instantiated a struct file in sock->file.
has completed. Further explanation of this function is in the "Handshake
Completion" sesction below.
+The consumer can provide a NUL-terminated hostname in the @ta_peername
+field that is sent as part of ClientHello. If no peername is provided,
+the DNS hostname associated with the server's IP address is used instead.
+
The consumer can fill in the @ta_timeout_ms field to force the servicing
handshake agent to exit after a number of milliseconds. This enables the
socket to be fully closed once both the kernel and the handshake agent
diff --git a/include/net/handshake.h b/include/net/handshake.h
index 3352b1ab43b3..2e26e436e85f 100644
--- a/include/net/handshake.h
+++ b/include/net/handshake.h
@@ -24,6 +24,7 @@ struct tls_handshake_args {
struct socket *ta_sock;
tls_done_func_t ta_done;
void *ta_data;
+ const char *ta_peername;
unsigned int ta_timeout_ms;
key_serial_t ta_keyring;
key_serial_t ta_my_cert;
diff --git a/include/uapi/linux/handshake.h b/include/uapi/linux/handshake.h
index 1de4d0b95325..3d7ea58778c9 100644
--- a/include/uapi/linux/handshake.h
+++ b/include/uapi/linux/handshake.h
@@ -44,6 +44,7 @@ enum {
HANDSHAKE_A_ACCEPT_AUTH_MODE,
HANDSHAKE_A_ACCEPT_PEER_IDENTITY,
HANDSHAKE_A_ACCEPT_CERTIFICATE,
+ HANDSHAKE_A_ACCEPT_PEERNAME,
__HANDSHAKE_A_ACCEPT_MAX,
HANDSHAKE_A_ACCEPT_MAX = (__HANDSHAKE_A_ACCEPT_MAX - 1)
diff --git a/net/handshake/tlshd.c b/net/handshake/tlshd.c
index fcbeb63b4eb1..b735f5cced2f 100644
--- a/net/handshake/tlshd.c
+++ b/net/handshake/tlshd.c
@@ -31,6 +31,7 @@ struct tls_handshake_req {
int th_type;
unsigned int th_timeout_ms;
int th_auth_mode;
+ const char *th_peername;
key_serial_t th_keyring;
key_serial_t th_certificate;
key_serial_t th_privkey;
@@ -48,6 +49,7 @@ tls_handshake_req_init(struct handshake_req *req,
treq->th_timeout_ms = args->ta_timeout_ms;
treq->th_consumer_done = args->ta_done;
treq->th_consumer_data = args->ta_data;
+ treq->th_peername = args->ta_peername;
treq->th_keyring = args->ta_keyring;
treq->th_num_peerids = 0;
treq->th_certificate = TLS_NO_CERT;
@@ -214,6 +216,12 @@ static int tls_handshake_accept(struct handshake_req *req,
ret = nla_put_u32(msg, HANDSHAKE_A_ACCEPT_MESSAGE_TYPE, treq->th_type);
if (ret < 0)
goto out_cancel;
+ if (treq->th_peername) {
+ ret = nla_put_string(msg, HANDSHAKE_A_ACCEPT_PEERNAME,
+ treq->th_peername);
+ if (ret < 0)
+ goto out_cancel;
+ }
if (treq->th_timeout_ms) {
ret = nla_put_u32(msg, HANDSHAKE_A_ACCEPT_TIMEOUT, treq->th_timeout_ms);
if (ret < 0)
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH v3 0/6] Bug fixes for net/handshake
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
` (5 preceding siblings ...)
2023-05-11 15:49 ` [PATCH v3 6/6] net/handshake: Enable the SNI extension to work properly Chuck Lever
@ 2023-05-12 8:30 ` patchwork-bot+netdevbpf
2023-05-25 5:20 ` patchwork-bot+netdevbpf
7 siblings, 0 replies; 9+ messages in thread
From: patchwork-bot+netdevbpf @ 2023-05-12 8:30 UTC (permalink / raw)
To: Chuck Lever; +Cc: netdev, kernel-tls-handshake, dan.carpenter, chuck.lever
Hello:
This series was applied to netdev/net-next.git (main)
by David S. Miller <davem@davemloft.net>:
On Thu, 11 May 2023 11:46:39 -0400 you wrote:
> Please consider these for merge via net-next.
>
> Paolo observed that there is a possible leak of sock->file. I
> haven't looked into that yet, but it seems to be separate from
> the fixes in this series, so no need to hold these up.
>
> Changes since v2:
> - Address Paolo comment regarding handshake_dup()
>
> [...]
Here is the summary with links:
- [v3,1/6] net/handshake: Remove unneeded check from handshake_dup()
https://git.kernel.org/netdev/net-next/c/b16d76fe9a27
- [v3,2/6] net/handshake: Fix handshake_dup() ref counting
https://git.kernel.org/netdev/net-next/c/2200c1a87074
- [v3,3/6] net/handshake: Fix uninitialized local variable
https://git.kernel.org/netdev/net-next/c/7301034026d0
- [v3,4/6] net/handshake: handshake_genl_notify() shouldn't ignore @flags
https://git.kernel.org/netdev/net-next/c/e36a93e1723e
- [v3,5/6] net/handshake: Unpin sock->file if a handshake is cancelled
https://git.kernel.org/netdev/net-next/c/f921bd41001c
- [v3,6/6] net/handshake: Enable the SNI extension to work properly
https://git.kernel.org/netdev/net-next/c/eefca7ec5142
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH v3 0/6] Bug fixes for net/handshake
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
` (6 preceding siblings ...)
2023-05-12 8:30 ` [PATCH v3 0/6] Bug fixes for net/handshake patchwork-bot+netdevbpf
@ 2023-05-25 5:20 ` patchwork-bot+netdevbpf
7 siblings, 0 replies; 9+ messages in thread
From: patchwork-bot+netdevbpf @ 2023-05-25 5:20 UTC (permalink / raw)
To: Chuck Lever; +Cc: netdev, kernel-tls-handshake, dan.carpenter, chuck.lever
Hello:
This series was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:
On Thu, 11 May 2023 11:46:39 -0400 you wrote:
> Please consider these for merge via net-next.
>
> Paolo observed that there is a possible leak of sock->file. I
> haven't looked into that yet, but it seems to be separate from
> the fixes in this series, so no need to hold these up.
>
> Changes since v2:
> - Address Paolo comment regarding handshake_dup()
>
> [...]
Here is the summary with links:
- [v3,1/6] net/handshake: Remove unneeded check from handshake_dup()
https://git.kernel.org/netdev/net/c/a095326e2c0f
- [v3,2/6] net/handshake: Fix handshake_dup() ref counting
https://git.kernel.org/netdev/net/c/7ea9c1ec66bc
- [v3,3/6] net/handshake: Fix uninitialized local variable
https://git.kernel.org/netdev/net/c/7afc6d0a107f
- [v3,4/6] net/handshake: handshake_genl_notify() shouldn't ignore @flags
https://git.kernel.org/netdev/net/c/fc490880e39d
- [v3,5/6] net/handshake: Unpin sock->file if a handshake is cancelled
https://git.kernel.org/netdev/net/c/1ce77c998f04
- [v3,6/6] net/handshake: Enable the SNI extension to work properly
https://git.kernel.org/netdev/net/c/26fb5480a27d
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2023-05-25 5:20 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-05-11 15:46 [PATCH v3 0/6] Bug fixes for net/handshake Chuck Lever
2023-05-11 15:47 ` [PATCH v3 1/6] net/handshake: Remove unneeded check from handshake_dup() Chuck Lever
2023-05-11 15:47 ` [PATCH v3 2/6] net/handshake: Fix handshake_dup() ref counting Chuck Lever
2023-05-11 15:48 ` [PATCH v3 3/6] net/handshake: Fix uninitialized local variable Chuck Lever
2023-05-11 15:48 ` [PATCH v3 4/6] net/handshake: handshake_genl_notify() shouldn't ignore @flags Chuck Lever
2023-05-11 15:49 ` [PATCH v3 5/6] net/handshake: Unpin sock->file if a handshake is cancelled Chuck Lever
2023-05-11 15:49 ` [PATCH v3 6/6] net/handshake: Enable the SNI extension to work properly Chuck Lever
2023-05-12 8:30 ` [PATCH v3 0/6] Bug fixes for net/handshake patchwork-bot+netdevbpf
2023-05-25 5:20 ` patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox