From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-yb1-f172.google.com (mail-yb1-f172.google.com [209.85.219.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9A10F312819 for ; Wed, 27 Aug 2025 15:53:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756310036; cv=none; b=S/no0+ZQydF2ibQ9sN+bnzHYAvR6KtXmynDhKTcLSPmRIdWnJ7WrNRfRR7OYpyOL+8q3jCUg4UNGJdfNYBVQE8OMVGQXdtLS35rGqf/pD9jO7ZylVgKhbl46+xCjuv0wjmDRjSCt1rOBQzmJGnObX7IvKh6hPk65J30o/MYNZ+U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1756310036; c=relaxed/simple; bh=rPRgzNL4bPU/i06ENpnBmYg7okrE/jti2fQ3NNQNN/k=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=XJ6GlkRnAl84nrZRYofJHsYx8M1GEnR5mN3PAoR66rcvGnsQs5Jz5y0M8dvoGMMVuF+JVRMrb0ZRvpF4tSLTk3217RXB8If7tv7PH4xf0SquANTFOIeRv7LUZXHeGaCp189iDJrpWZWSR3m1fDeyle/nhGxzKGN5iAnorJzFzQg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=ABCkNteq; arc=none smtp.client-ip=209.85.219.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="ABCkNteq" Received: by mail-yb1-f172.google.com with SMTP id 3f1490d57ef6-e953dca529dso3755257276.1 for ; Wed, 27 Aug 2025 08:53:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1756310033; x=1756914833; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=B/qzcyKs6Sijhx5eKCyG5tFaY81xPaszktH0lekGR70=; b=ABCkNteqLXfCGdjKgKM9lDf03vVvC4lo1sGzIWUVq3qgqtkW2ypd1tjq9CrIvrotiM icN4vI72pUo0O8gksb8wrKchjzLVwiHc4Cp/9O/Yv6Be/jDfWOfLeHNBBm+ZTY4UBgwi 1Lv0YZpyA3/HINzQvkbhvCOiaNOrN/dRhp5HCNYEOIfJS7f3kUo1IPnITNjen3NowhCY Tx06fPZRy0+a/BivcaJfiXMLlLWvoywRGE6S710qIJ9nFiEJS7jY2MCA3JT+j7+d8wkT m2GJZST3sqAaoHN0f1igNIvbGr0kzkZFHuBMnP3Z5hBsfwa/WXvD+9YiU+9oE6bE4F0B rSjA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1756310033; x=1756914833; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=B/qzcyKs6Sijhx5eKCyG5tFaY81xPaszktH0lekGR70=; b=ct8nPX2mgL6LQiY7+7/94/38EyriJjLyUDDaEuHZfXvSm8I2vqH9SByvKi0ieLhVF6 Z3eNtUWO0gO62GSiG7/lZGne4hdTDVfPmyelLdBUAFZHDxw1zePZ1E78bM/J3H3Gtc/U zjZBfrkLGQtGVQuLCzAwqnsMfIwvYTcUzGNvYikcW5389mNMH70hkItuMPAWUJlVqCTs ey265COkOhLiztEdYyjCAFNnl22zMFTAr0+2GVnyRkumUgtqAMwHJj2ZHnb/Hy762n3P DaJaYZaFKGheU2tldV94f4MzLh/UMMCcJYTgQ4aVJnSqDoEhgYaM/MAR5r7Dbamf9t04 M7hQ== X-Forwarded-Encrypted: i=1; AJvYcCV++MuIeC5BZAvPiblaiBbtplGfWEpjQ63TuUMzorAlYgpYP9Yin/J9e436UKTPYW72C+H1iUs=@vger.kernel.org X-Gm-Message-State: AOJu0YwmJyvmEKxl4MhQ7dyi8JHb0ig1GB0wcpVQChA3vXBqBH+RNU9N wh+laXN8bmpuHyWvLPfqX/8C/ciYM4LkOqrZh1SrGKe0PelMF4HYR3CR X-Gm-Gg: ASbGncvkYnjmwlfY9hmLQf1sWqBxA1aBa/64bfr2wOuK2uhxJe179Ga9q1R8Ixwq0Js b/47K74Fe8pv7ykWmKJVq3V+j3RYJsxWJVZcixyU2FW5jSZS+O1Mrbvzm6jjWplAgE2QUXJjF+i llmc/5CBsaGeOxgcxn5BVZE08hJvLCkJiCJs3jJGxKx6+l0bfwYxZdLO37c/BumphxxSPzs2CPj p2NtfyrBwnctMBWTmDABgAwP43nfzfoCDQICYxj5Z9i5kZw8LLXT3EnIVsw1dcq8n8d5oJAxdfK pnug/XKH8jpzhzN0T94HI4sHfBGofPn0xUgQ4VrAimu6WCtj//h48RnArA0Z33k+hnlq5nrtyTi KMtb1EuPSFOs5zfo6C5TU X-Google-Smtp-Source: AGHT+IFi/iqZpJwwzKG+M4wgE8yl3I7LL7c/NHnmTZbcZeU6bJ3CFVNaD01OqVDTpOePjhtobh+hHg== X-Received: by 2002:a05:690c:6b0e:b0:71c:bf3:afc1 with SMTP id 00721157ae682-71fdc2ee8e9mr223586807b3.17.1756310033406; Wed, 27 Aug 2025 08:53:53 -0700 (PDT) Received: from localhost ([2a03:2880:25ff:70::]) by smtp.gmail.com with ESMTPSA id 956f58d0204a3-5f65a223d29sm3137456d50.5.2025.08.27.08.53.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Aug 2025 08:53:52 -0700 (PDT) From: Daniel Zahka To: Donald Hunter , Jakub Kicinski , "David S. Miller" , Eric Dumazet , Paolo Abeni , Simon Horman , Jonathan Corbet , Andrew Lunn Cc: Saeed Mahameed , Leon Romanovsky , Tariq Toukan , Boris Pismenny , Kuniyuki Iwashima , Willem de Bruijn , David Ahern , Neal Cardwell , Patrisious Haddad , Raed Salem , Jianbo Liu , Dragos Tatulea , Rahul Rameshbabu , Stanislav Fomichev , =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , Alexander Lobakin , Kiran Kella , Jacob Keller , netdev@vger.kernel.org Subject: [PATCH net-next v9 10/19] psp: track generations of device key Date: Wed, 27 Aug 2025 08:53:27 -0700 Message-ID: <20250827155340.2738246-11-daniel.zahka@gmail.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20250827155340.2738246-1-daniel.zahka@gmail.com> References: <20250827155340.2738246-1-daniel.zahka@gmail.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Jakub Kicinski There is a (somewhat theoretical in absence of multi-host support) possibility that another entity will rotate the key and we won't know. This may lead to accepting packets with matching SPI but which used different crypto keys than we expected. The PSP Architecture specification mentions that an implementation should track device key generation when device keys are managed by the NIC. Some PSP implementations may opt to include this key generation state in decryption metadata each time a device key is used to decrypt a packet. If that is the case, that key generation counter can also be used when policy checking a decrypted skb against a psp_assoc. This is an optional feature that is not explicitly part of the PSP spec, but can provide additional security in the case where an attacker may have the ability to force key rotations faster than rekeying can occur. Since we're tracking "key generations" more explicitly now, maintain different lists for associations from different generations. This way we can catch stale associations (the user space should listen to rotation notifications and change the keys). Drivers can "opt out" of generation tracking by setting the generation value to 0. Reviewed-by: Willem de Bruijn Signed-off-by: Jakub Kicinski Signed-off-by: Daniel Zahka --- Notes: v1: - https://lore.kernel.org/netdev/20240510030435.120935-9-kuba@kernel.org/ include/net/psp/types.h | 10 ++++++++++ net/psp/psp.h | 1 + net/psp/psp_main.c | 6 +++++- net/psp/psp_nl.c | 10 ++++++++++ net/psp/psp_sock.c | 16 ++++++++++++++++ 5 files changed, 42 insertions(+), 1 deletion(-) diff --git a/include/net/psp/types.h b/include/net/psp/types.h index f93ad0e6c04f..ec218747ced0 100644 --- a/include/net/psp/types.h +++ b/include/net/psp/types.h @@ -50,8 +50,12 @@ struct psp_dev_config { * @lock: instance lock, protects all fields * @refcnt: reference count for the instance * @id: instance id + * @generation: current generation of the device key * @config: current device configuration * @active_assocs: list of registered associations + * @prev_assocs: associations which use old (but still usable) + * device key + * @stale_assocs: associations which use a rotated out key * * @rcu: RCU head for freeing the structure */ @@ -67,13 +71,19 @@ struct psp_dev { u32 id; + u8 generation; + struct psp_dev_config config; struct list_head active_assocs; + struct list_head prev_assocs; + struct list_head stale_assocs; struct rcu_head rcu; }; +#define PSP_GEN_VALID_MASK 0x7f + /** * struct psp_dev_caps - PSP device capabilities */ diff --git a/net/psp/psp.h b/net/psp/psp.h index defd3e3fd5e7..0f34e1a23fdd 100644 --- a/net/psp/psp.h +++ b/net/psp/psp.h @@ -27,6 +27,7 @@ int psp_sock_assoc_set_rx(struct sock *sk, struct psp_assoc *pas, int psp_sock_assoc_set_tx(struct sock *sk, struct psp_dev *psd, u32 version, struct psp_key_parsed *key, struct netlink_ext_ack *extack); +void psp_assocs_key_rotated(struct psp_dev *psd); static inline void psp_dev_get(struct psp_dev *psd) { diff --git a/net/psp/psp_main.c b/net/psp/psp_main.c index a1ae3c8920c3..98ad8c85b58e 100644 --- a/net/psp/psp_main.c +++ b/net/psp/psp_main.c @@ -72,6 +72,8 @@ psp_dev_create(struct net_device *netdev, mutex_init(&psd->lock); INIT_LIST_HEAD(&psd->active_assocs); + INIT_LIST_HEAD(&psd->prev_assocs); + INIT_LIST_HEAD(&psd->stale_assocs); refcount_set(&psd->refcnt, 1); mutex_lock(&psp_devs_lock); @@ -125,7 +127,9 @@ void psp_dev_unregister(struct psp_dev *psd) xa_store(&psp_devs, psd->id, NULL, GFP_KERNEL); mutex_unlock(&psp_devs_lock); - list_for_each_entry_safe(pas, next, &psd->active_assocs, assocs_list) + list_splice_init(&psd->active_assocs, &psd->prev_assocs); + list_splice_init(&psd->prev_assocs, &psd->stale_assocs); + list_for_each_entry_safe(pas, next, &psd->stale_assocs, assocs_list) psp_dev_tx_key_del(psd, pas); rcu_assign_pointer(psd->main_netdev->psp_dev, NULL); diff --git a/net/psp/psp_nl.c b/net/psp/psp_nl.c index 1b1d08fce637..8aaca62744c3 100644 --- a/net/psp/psp_nl.c +++ b/net/psp/psp_nl.c @@ -230,6 +230,7 @@ int psp_nl_key_rotate_doit(struct sk_buff *skb, struct genl_info *info) struct psp_dev *psd = info->user_ptr[0]; struct genl_info ntf_info; struct sk_buff *ntf, *rsp; + u8 prev_gen; int err; rsp = psp_nl_reply_new(info); @@ -249,10 +250,19 @@ int psp_nl_key_rotate_doit(struct sk_buff *skb, struct genl_info *info) goto err_free_ntf; } + /* suggest the next gen number, driver can override */ + prev_gen = psd->generation; + psd->generation = (prev_gen + 1) & PSP_GEN_VALID_MASK; + err = psd->ops->key_rotate(psd, info->extack); if (err) goto err_free_ntf; + WARN_ON_ONCE((psd->generation && psd->generation == prev_gen) || + psd->generation & ~PSP_GEN_VALID_MASK); + + psp_assocs_key_rotated(psd); + nlmsg_end(ntf, (struct nlmsghdr *)ntf->data); genlmsg_multicast_netns(&psp_nl_family, dev_net(psd->main_netdev), ntf, 0, PSP_NLGRP_USE, GFP_KERNEL); diff --git a/net/psp/psp_sock.c b/net/psp/psp_sock.c index 66abf160e16c..d74c86437e9b 100644 --- a/net/psp/psp_sock.c +++ b/net/psp/psp_sock.c @@ -60,6 +60,7 @@ struct psp_assoc *psp_assoc_create(struct psp_dev *psd) pas->psd = psd; pas->dev_id = psd->id; + pas->generation = psd->generation; psp_dev_get(psd); refcount_set(&pas->refcnt, 1); @@ -248,6 +249,21 @@ int psp_sock_assoc_set_tx(struct sock *sk, struct psp_dev *psd, return err; } +void psp_assocs_key_rotated(struct psp_dev *psd) +{ + struct psp_assoc *pas, *next; + + /* Mark the stale associations as invalid, they will no longer + * be able to Rx any traffic. + */ + list_for_each_entry_safe(pas, next, &psd->prev_assocs, assocs_list) + pas->generation |= ~PSP_GEN_VALID_MASK; + list_splice_init(&psd->prev_assocs, &psd->stale_assocs); + list_splice_init(&psd->active_assocs, &psd->prev_assocs); + + /* TODO: we should inform the sockets that got shut down */ +} + void psp_twsk_init(struct inet_timewait_sock *tw, const struct sock *sk) { struct psp_assoc *pas = psp_sk_assoc(sk); -- 2.47.3