* [PATCH net-next 0/4] tls: rx: follow-ups to NoPad
@ 2022-07-09 2:52 Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 1/4] tls: fix spelling of MIB Jakub Kicinski
` (4 more replies)
0 siblings, 5 replies; 6+ messages in thread
From: Jakub Kicinski @ 2022-07-09 2:52 UTC (permalink / raw)
To: davem
Cc: netdev, edumazet, pabeni, borisp, john.fastabend, maximmi, tariqt,
Jakub Kicinski
A few fixes for issues spotted by Maxim.
Jakub Kicinski (4):
tls: fix spelling of MIB
tls: rx: add counter for NoPad violations
tls: rx: fix the NoPad getsockopt
selftests: tls: add test for NoPad getsockopt
Documentation/networking/tls.rst | 4 +++
include/uapi/linux/snmp.h | 3 +-
net/tls/tls_main.c | 9 +++---
net/tls/tls_proc.c | 3 +-
net/tls/tls_sw.c | 4 ++-
tools/testing/selftests/net/tls.c | 51 +++++++++++++++++++++++++++++++
6 files changed, 66 insertions(+), 8 deletions(-)
--
2.36.1
^ permalink raw reply [flat|nested] 6+ messages in thread
* [PATCH net-next 1/4] tls: fix spelling of MIB
2022-07-09 2:52 [PATCH net-next 0/4] tls: rx: follow-ups to NoPad Jakub Kicinski
@ 2022-07-09 2:52 ` Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 2/4] tls: rx: add counter for NoPad violations Jakub Kicinski
` (3 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: Jakub Kicinski @ 2022-07-09 2:52 UTC (permalink / raw)
To: davem
Cc: netdev, edumazet, pabeni, borisp, john.fastabend, maximmi, tariqt,
Jakub Kicinski
MIN -> MIB
Fixes: 88527790c079 ("tls: rx: add sockopt for enabling optimistic decrypt with TLS 1.3")
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
---
include/uapi/linux/snmp.h | 2 +-
net/tls/tls_proc.c | 2 +-
net/tls/tls_sw.c | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/include/uapi/linux/snmp.h b/include/uapi/linux/snmp.h
index 1c9152add663..fd83fb9e525a 100644
--- a/include/uapi/linux/snmp.h
+++ b/include/uapi/linux/snmp.h
@@ -344,7 +344,7 @@ enum
LINUX_MIB_TLSRXDEVICE, /* TlsRxDevice */
LINUX_MIB_TLSDECRYPTERROR, /* TlsDecryptError */
LINUX_MIB_TLSRXDEVICERESYNC, /* TlsRxDeviceResync */
- LINUX_MIN_TLSDECRYPTRETRY, /* TlsDecryptRetry */
+ LINUX_MIB_TLSDECRYPTRETRY, /* TlsDecryptRetry */
__LINUX_MIB_TLSMAX
};
diff --git a/net/tls/tls_proc.c b/net/tls/tls_proc.c
index 1246e52b48f6..ede9df13c398 100644
--- a/net/tls/tls_proc.c
+++ b/net/tls/tls_proc.c
@@ -20,7 +20,7 @@ static const struct snmp_mib tls_mib_list[] = {
SNMP_MIB_ITEM("TlsRxDevice", LINUX_MIB_TLSRXDEVICE),
SNMP_MIB_ITEM("TlsDecryptError", LINUX_MIB_TLSDECRYPTERROR),
SNMP_MIB_ITEM("TlsRxDeviceResync", LINUX_MIB_TLSRXDEVICERESYNC),
- SNMP_MIB_ITEM("TlsDecryptRetry", LINUX_MIN_TLSDECRYPTRETRY),
+ SNMP_MIB_ITEM("TlsDecryptRetry", LINUX_MIB_TLSDECRYPTRETRY),
SNMP_MIB_SENTINEL
};
diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c
index 09370f853031..e12846d1871a 100644
--- a/net/tls/tls_sw.c
+++ b/net/tls/tls_sw.c
@@ -1596,7 +1596,7 @@ static int decrypt_skb_update(struct sock *sk, struct sk_buff *skb,
if (unlikely(darg->zc && prot->version == TLS_1_3_VERSION &&
darg->tail != TLS_RECORD_TYPE_DATA)) {
darg->zc = false;
- TLS_INC_STATS(sock_net(sk), LINUX_MIN_TLSDECRYPTRETRY);
+ TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSDECRYPTRETRY);
return decrypt_skb_update(sk, skb, dest, darg);
}
--
2.36.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCH net-next 2/4] tls: rx: add counter for NoPad violations
2022-07-09 2:52 [PATCH net-next 0/4] tls: rx: follow-ups to NoPad Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 1/4] tls: fix spelling of MIB Jakub Kicinski
@ 2022-07-09 2:52 ` Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 3/4] tls: rx: fix the NoPad getsockopt Jakub Kicinski
` (2 subsequent siblings)
4 siblings, 0 replies; 6+ messages in thread
From: Jakub Kicinski @ 2022-07-09 2:52 UTC (permalink / raw)
To: davem
Cc: netdev, edumazet, pabeni, borisp, john.fastabend, maximmi, tariqt,
Jakub Kicinski
As discussed with Maxim add a counter for true NoPad violations.
This should help deployments catch unexpected padded records vs
just control records which always need re-encryption.
https://lore.kernel.org/all/b111828e6ac34baad9f4e783127eba8344ac252d.camel@nvidia.com/
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
---
Documentation/networking/tls.rst | 4 ++++
include/uapi/linux/snmp.h | 1 +
net/tls/tls_proc.c | 1 +
net/tls/tls_sw.c | 2 ++
4 files changed, 8 insertions(+)
diff --git a/Documentation/networking/tls.rst b/Documentation/networking/tls.rst
index 7a6643836e42..658ed3a71e1b 100644
--- a/Documentation/networking/tls.rst
+++ b/Documentation/networking/tls.rst
@@ -282,3 +282,7 @@ TLS implementation exposes the following per-namespace statistics
number of RX records which had to be re-decrypted due to
``TLS_RX_EXPECT_NO_PAD`` mis-prediction. Note that this counter will
also increment for non-data records.
+
+- ``TlsRxNoPadViolation`` -
+ number of data RX records which had to be re-decrypted due to
+ ``TLS_RX_EXPECT_NO_PAD`` mis-prediction.
diff --git a/include/uapi/linux/snmp.h b/include/uapi/linux/snmp.h
index fd83fb9e525a..4d7470036a8b 100644
--- a/include/uapi/linux/snmp.h
+++ b/include/uapi/linux/snmp.h
@@ -345,6 +345,7 @@ enum
LINUX_MIB_TLSDECRYPTERROR, /* TlsDecryptError */
LINUX_MIB_TLSRXDEVICERESYNC, /* TlsRxDeviceResync */
LINUX_MIB_TLSDECRYPTRETRY, /* TlsDecryptRetry */
+ LINUX_MIB_TLSRXNOPADVIOL, /* TlsRxNoPadViolation */
__LINUX_MIB_TLSMAX
};
diff --git a/net/tls/tls_proc.c b/net/tls/tls_proc.c
index ede9df13c398..68982728f620 100644
--- a/net/tls/tls_proc.c
+++ b/net/tls/tls_proc.c
@@ -21,6 +21,7 @@ static const struct snmp_mib tls_mib_list[] = {
SNMP_MIB_ITEM("TlsDecryptError", LINUX_MIB_TLSDECRYPTERROR),
SNMP_MIB_ITEM("TlsRxDeviceResync", LINUX_MIB_TLSRXDEVICERESYNC),
SNMP_MIB_ITEM("TlsDecryptRetry", LINUX_MIB_TLSDECRYPTRETRY),
+ SNMP_MIB_ITEM("TlsRxNoPadViolation", LINUX_MIB_TLSRXNOPADVIOL),
SNMP_MIB_SENTINEL
};
diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c
index e12846d1871a..68d79ee48a56 100644
--- a/net/tls/tls_sw.c
+++ b/net/tls/tls_sw.c
@@ -1596,6 +1596,8 @@ static int decrypt_skb_update(struct sock *sk, struct sk_buff *skb,
if (unlikely(darg->zc && prot->version == TLS_1_3_VERSION &&
darg->tail != TLS_RECORD_TYPE_DATA)) {
darg->zc = false;
+ if (!darg->tail)
+ TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSRXNOPADVIOL);
TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSDECRYPTRETRY);
return decrypt_skb_update(sk, skb, dest, darg);
}
--
2.36.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCH net-next 3/4] tls: rx: fix the NoPad getsockopt
2022-07-09 2:52 [PATCH net-next 0/4] tls: rx: follow-ups to NoPad Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 1/4] tls: fix spelling of MIB Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 2/4] tls: rx: add counter for NoPad violations Jakub Kicinski
@ 2022-07-09 2:52 ` Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 4/4] selftests: tls: add test for " Jakub Kicinski
2022-07-12 5:50 ` [PATCH net-next 0/4] tls: rx: follow-ups to NoPad patchwork-bot+netdevbpf
4 siblings, 0 replies; 6+ messages in thread
From: Jakub Kicinski @ 2022-07-09 2:52 UTC (permalink / raw)
To: davem
Cc: netdev, edumazet, pabeni, borisp, john.fastabend, maximmi, tariqt,
Jakub Kicinski
Maxim reports do_tls_getsockopt_no_pad() will
always return an error. Indeed looks like refactoring
gone wrong - remove err and use value.
Reported-by: Maxim Mikityanskiy <maximmi@nvidia.com>
Fixes: 88527790c079 ("tls: rx: add sockopt for enabling optimistic decrypt with TLS 1.3")
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
---
net/tls/tls_main.c | 9 ++++-----
1 file changed, 4 insertions(+), 5 deletions(-)
diff --git a/net/tls/tls_main.c b/net/tls/tls_main.c
index f3d9dbfa507e..f71b46568112 100644
--- a/net/tls/tls_main.c
+++ b/net/tls/tls_main.c
@@ -539,8 +539,7 @@ static int do_tls_getsockopt_no_pad(struct sock *sk, char __user *optval,
int __user *optlen)
{
struct tls_context *ctx = tls_get_ctx(sk);
- unsigned int value;
- int err, len;
+ int value, len;
if (ctx->prot_info.version != TLS_1_3_VERSION)
return -EINVAL;
@@ -551,12 +550,12 @@ static int do_tls_getsockopt_no_pad(struct sock *sk, char __user *optval,
return -EINVAL;
lock_sock(sk);
- err = -EINVAL;
+ value = -EINVAL;
if (ctx->rx_conf == TLS_SW || ctx->rx_conf == TLS_HW)
value = ctx->rx_no_pad;
release_sock(sk);
- if (err)
- return err;
+ if (value < 0)
+ return value;
if (put_user(sizeof(value), optlen))
return -EFAULT;
--
2.36.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* [PATCH net-next 4/4] selftests: tls: add test for NoPad getsockopt
2022-07-09 2:52 [PATCH net-next 0/4] tls: rx: follow-ups to NoPad Jakub Kicinski
` (2 preceding siblings ...)
2022-07-09 2:52 ` [PATCH net-next 3/4] tls: rx: fix the NoPad getsockopt Jakub Kicinski
@ 2022-07-09 2:52 ` Jakub Kicinski
2022-07-12 5:50 ` [PATCH net-next 0/4] tls: rx: follow-ups to NoPad patchwork-bot+netdevbpf
4 siblings, 0 replies; 6+ messages in thread
From: Jakub Kicinski @ 2022-07-09 2:52 UTC (permalink / raw)
To: davem
Cc: netdev, edumazet, pabeni, borisp, john.fastabend, maximmi, tariqt,
Jakub Kicinski
Make sure setsockopt / getsockopt behave as expected.
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
---
tools/testing/selftests/net/tls.c | 51 +++++++++++++++++++++++++++++++
1 file changed, 51 insertions(+)
diff --git a/tools/testing/selftests/net/tls.c b/tools/testing/selftests/net/tls.c
index e71ec5846be9..dc26aae0feb0 100644
--- a/tools/testing/selftests/net/tls.c
+++ b/tools/testing/selftests/net/tls.c
@@ -1674,6 +1674,57 @@ TEST(keysizes) {
close(cfd);
}
+TEST(no_pad) {
+ struct tls12_crypto_info_aes_gcm_256 tls12;
+ int ret, fd, cfd, val;
+ socklen_t len;
+ bool notls;
+
+ memset(&tls12, 0, sizeof(tls12));
+ tls12.info.version = TLS_1_3_VERSION;
+ tls12.info.cipher_type = TLS_CIPHER_AES_GCM_256;
+
+ ulp_sock_pair(_metadata, &fd, &cfd, ¬ls);
+
+ if (notls)
+ exit(KSFT_SKIP);
+
+ ret = setsockopt(fd, SOL_TLS, TLS_TX, &tls12, sizeof(tls12));
+ EXPECT_EQ(ret, 0);
+
+ ret = setsockopt(cfd, SOL_TLS, TLS_RX, &tls12, sizeof(tls12));
+ EXPECT_EQ(ret, 0);
+
+ val = 1;
+ ret = setsockopt(cfd, SOL_TLS, TLS_RX_EXPECT_NO_PAD,
+ (void *)&val, sizeof(val));
+ EXPECT_EQ(ret, 0);
+
+ len = sizeof(val);
+ val = 2;
+ ret = getsockopt(cfd, SOL_TLS, TLS_RX_EXPECT_NO_PAD,
+ (void *)&val, &len);
+ EXPECT_EQ(ret, 0);
+ EXPECT_EQ(val, 1);
+ EXPECT_EQ(len, 4);
+
+ val = 0;
+ ret = setsockopt(cfd, SOL_TLS, TLS_RX_EXPECT_NO_PAD,
+ (void *)&val, sizeof(val));
+ EXPECT_EQ(ret, 0);
+
+ len = sizeof(val);
+ val = 2;
+ ret = getsockopt(cfd, SOL_TLS, TLS_RX_EXPECT_NO_PAD,
+ (void *)&val, &len);
+ EXPECT_EQ(ret, 0);
+ EXPECT_EQ(val, 0);
+ EXPECT_EQ(len, 4);
+
+ close(fd);
+ close(cfd);
+}
+
TEST(tls_v6ops) {
struct tls_crypto_info_keys tls12;
struct sockaddr_in6 addr, addr2;
--
2.36.1
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [PATCH net-next 0/4] tls: rx: follow-ups to NoPad
2022-07-09 2:52 [PATCH net-next 0/4] tls: rx: follow-ups to NoPad Jakub Kicinski
` (3 preceding siblings ...)
2022-07-09 2:52 ` [PATCH net-next 4/4] selftests: tls: add test for " Jakub Kicinski
@ 2022-07-12 5:50 ` patchwork-bot+netdevbpf
4 siblings, 0 replies; 6+ messages in thread
From: patchwork-bot+netdevbpf @ 2022-07-12 5:50 UTC (permalink / raw)
To: Jakub Kicinski
Cc: davem, netdev, edumazet, pabeni, borisp, john.fastabend, maximmi,
tariqt
Hello:
This series was applied to netdev/net-next.git (master)
by Jakub Kicinski <kuba@kernel.org>:
On Fri, 8 Jul 2022 19:52:51 -0700 you wrote:
> A few fixes for issues spotted by Maxim.
>
> Jakub Kicinski (4):
> tls: fix spelling of MIB
> tls: rx: add counter for NoPad violations
> tls: rx: fix the NoPad getsockopt
> selftests: tls: add test for NoPad getsockopt
>
> [...]
Here is the summary with links:
- [net-next,1/4] tls: fix spelling of MIB
https://git.kernel.org/netdev/net-next/c/1090c1ea2208
- [net-next,2/4] tls: rx: add counter for NoPad violations
https://git.kernel.org/netdev/net-next/c/bb56cea9abd8
- [net-next,3/4] tls: rx: fix the NoPad getsockopt
https://git.kernel.org/netdev/net-next/c/57128e98c33d
- [net-next,4/4] selftests: tls: add test for NoPad getsockopt
https://git.kernel.org/netdev/net-next/c/1d55f2031385
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2022-07-12 5:50 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-07-09 2:52 [PATCH net-next 0/4] tls: rx: follow-ups to NoPad Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 1/4] tls: fix spelling of MIB Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 2/4] tls: rx: add counter for NoPad violations Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 3/4] tls: rx: fix the NoPad getsockopt Jakub Kicinski
2022-07-09 2:52 ` [PATCH net-next 4/4] selftests: tls: add test for " Jakub Kicinski
2022-07-12 5:50 ` [PATCH net-next 0/4] tls: rx: follow-ups to NoPad patchwork-bot+netdevbpf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).