[PATCH 13/17] nvme-tcp: reset after recovery for secure concatenation
Sagi Grimberg
sagi at grimberg.me
Sun Apr 7 14:49:01 PDT 2024
On 18/03/2024 17:03, Hannes Reinecke wrote:
> From: Hannes Reinecke <hare at suse.de>
>
> With TP8018 a new key will be generated from the DH-HMAC-CHAP
> protocol after reset or recovery, but we need to start over
> to establish a new TLS connection with the new keys.
>
> Signed-off-by: Hannes Reinecke <hare at suse.de>
> ---
> drivers/nvme/host/tcp.c | 20 ++++++++++++++++++++
> 1 file changed, 20 insertions(+)
>
> diff --git a/drivers/nvme/host/tcp.c b/drivers/nvme/host/tcp.c
> index 94152ded123a..3811ee9cd040 100644
> --- a/drivers/nvme/host/tcp.c
> +++ b/drivers/nvme/host/tcp.c
> @@ -2219,6 +2219,22 @@ static void nvme_tcp_reconnect_or_remove(struct nvme_ctrl *ctrl)
> }
> }
>
> +static bool nvme_tcp_reset_for_secure_concat(struct nvme_ctrl *ctrl)
> +{
> + if (!ctrl->opts->concat)
> + return false;
> + /*
> + * If a key has been generated and TLS has not been enabled
> + * reset the queue to start TLS handshake.
> + */
> + if (ctrl->opts->tls_key && !ctrl->tls_key) {
> + dev_info(ctrl->device, "Reset to enable TLS with generated PSK\n");
> + nvme_reset_ctrl(ctrl);
> + return true;
> + }
> + return false;
> +}
> +
> static void nvme_tcp_revoke_generated_tls_key(struct nvme_ctrl *ctrl)
> {
> if (!ctrl->opts->concat)
> @@ -2321,6 +2337,9 @@ static void nvme_tcp_reconnect_ctrl_work(struct work_struct *work)
> if (nvme_tcp_setup_ctrl(ctrl, false))
> goto requeue;
>
> + if (nvme_tcp_reset_for_secure_concat(ctrl))
> + return;
> +
> dev_info(ctrl->device, "Successfully reconnected (%d attempt)\n",
> ctrl->nr_reconnects);
>
> @@ -2396,6 +2415,7 @@ static void nvme_reset_ctrl_work(struct work_struct *work)
> if (nvme_tcp_setup_ctrl(ctrl, false))
> goto out_fail;
>
> + nvme_tcp_reset_for_secure_concat(ctrl);
This is really strange. I'd imagine that this would be needed only if
the derived psk expired no?
More information about the Linux-nvme
mailing list