1
2
3
4
5
6
7#include <linux/kernel.h>
8#include <linux/module.h>
9#include <linux/skbuff.h>
10#include <linux/socket.h>
11#include <linux/hash.h>
12#include <linux/in.h>
13#include <linux/net.h>
14#include <linux/ip.h>
15#include <linux/tcp.h>
16#include <net/ipv6.h>
17#include <net/transp_v6.h>
18#include <net/tcp.h>
19#include <net/tls.h>
20
21#include "chtls.h"
22#include "chtls_cm.h"
23
24#define DRV_NAME "chtls"
25
26
27
28
29
30static LIST_HEAD(cdev_list);
31static DEFINE_MUTEX(cdev_mutex);
32
33static DEFINE_MUTEX(notify_mutex);
34static RAW_NOTIFIER_HEAD(listen_notify_list);
35static struct proto chtls_cpl_prot, chtls_cpl_protv6;
36struct request_sock_ops chtls_rsk_ops, chtls_rsk_opsv6;
37static uint send_page_order = (14 - PAGE_SHIFT < 0) ? 0 : 14 - PAGE_SHIFT;
38
39static void register_listen_notifier(struct notifier_block *nb)
40{
41 mutex_lock(¬ify_mutex);
42 raw_notifier_chain_register(&listen_notify_list, nb);
43 mutex_unlock(¬ify_mutex);
44}
45
46static void unregister_listen_notifier(struct notifier_block *nb)
47{
48 mutex_lock(¬ify_mutex);
49 raw_notifier_chain_unregister(&listen_notify_list, nb);
50 mutex_unlock(¬ify_mutex);
51}
52
53static int listen_notify_handler(struct notifier_block *this,
54 unsigned long event, void *data)
55{
56 struct chtls_listen *clisten;
57 int ret = NOTIFY_DONE;
58
59 clisten = (struct chtls_listen *)data;
60
61 switch (event) {
62 case CHTLS_LISTEN_START:
63 ret = chtls_listen_start(clisten->cdev, clisten->sk);
64 kfree(clisten);
65 break;
66 case CHTLS_LISTEN_STOP:
67 chtls_listen_stop(clisten->cdev, clisten->sk);
68 kfree(clisten);
69 break;
70 }
71 return ret;
72}
73
74static struct notifier_block listen_notifier = {
75 .notifier_call = listen_notify_handler
76};
77
78static int listen_backlog_rcv(struct sock *sk, struct sk_buff *skb)
79{
80 if (likely(skb_transport_header(skb) != skb_network_header(skb)))
81 return tcp_v4_do_rcv(sk, skb);
82 BLOG_SKB_CB(skb)->backlog_rcv(sk, skb);
83 return 0;
84}
85
86static int chtls_start_listen(struct chtls_dev *cdev, struct sock *sk)
87{
88 struct chtls_listen *clisten;
89
90 if (sk->sk_protocol != IPPROTO_TCP)
91 return -EPROTONOSUPPORT;
92
93 if (sk->sk_family == PF_INET &&
94 LOOPBACK(inet_sk(sk)->inet_rcv_saddr))
95 return -EADDRNOTAVAIL;
96
97 sk->sk_backlog_rcv = listen_backlog_rcv;
98 clisten = kmalloc(sizeof(*clisten), GFP_KERNEL);
99 if (!clisten)
100 return -ENOMEM;
101 clisten->cdev = cdev;
102 clisten->sk = sk;
103 mutex_lock(¬ify_mutex);
104 raw_notifier_call_chain(&listen_notify_list,
105 CHTLS_LISTEN_START, clisten);
106 mutex_unlock(¬ify_mutex);
107 return 0;
108}
109
110static void chtls_stop_listen(struct chtls_dev *cdev, struct sock *sk)
111{
112 struct chtls_listen *clisten;
113
114 if (sk->sk_protocol != IPPROTO_TCP)
115 return;
116
117 clisten = kmalloc(sizeof(*clisten), GFP_KERNEL);
118 if (!clisten)
119 return;
120 clisten->cdev = cdev;
121 clisten->sk = sk;
122 mutex_lock(¬ify_mutex);
123 raw_notifier_call_chain(&listen_notify_list,
124 CHTLS_LISTEN_STOP, clisten);
125 mutex_unlock(¬ify_mutex);
126}
127
128static int chtls_inline_feature(struct tls_toe_device *dev)
129{
130 struct net_device *netdev;
131 struct chtls_dev *cdev;
132 int i;
133
134 cdev = to_chtls_dev(dev);
135
136 for (i = 0; i < cdev->lldi->nports; i++) {
137 netdev = cdev->ports[i];
138 if (netdev->features & NETIF_F_HW_TLS_RECORD)
139 return 1;
140 }
141 return 0;
142}
143
144static int chtls_create_hash(struct tls_toe_device *dev, struct sock *sk)
145{
146 struct chtls_dev *cdev = to_chtls_dev(dev);
147
148 if (sk->sk_state == TCP_LISTEN)
149 return chtls_start_listen(cdev, sk);
150 return 0;
151}
152
153static void chtls_destroy_hash(struct tls_toe_device *dev, struct sock *sk)
154{
155 struct chtls_dev *cdev = to_chtls_dev(dev);
156
157 if (sk->sk_state == TCP_LISTEN)
158 chtls_stop_listen(cdev, sk);
159}
160
161static void chtls_free_uld(struct chtls_dev *cdev)
162{
163 int i;
164
165 tls_toe_unregister_device(&cdev->tlsdev);
166 kvfree(cdev->kmap.addr);
167 idr_destroy(&cdev->hwtid_idr);
168 for (i = 0; i < (1 << RSPQ_HASH_BITS); i++)
169 kfree_skb(cdev->rspq_skb_cache[i]);
170 kfree(cdev->lldi);
171 kfree_skb(cdev->askb);
172 kfree(cdev);
173}
174
175static inline void chtls_dev_release(struct kref *kref)
176{
177 struct tls_toe_device *dev;
178 struct chtls_dev *cdev;
179 struct adapter *adap;
180
181 dev = container_of(kref, struct tls_toe_device, kref);
182 cdev = to_chtls_dev(dev);
183
184
185 adap = pci_get_drvdata(cdev->pdev);
186 atomic_set(&adap->chcr_stats.tls_pdu_tx, 0);
187 atomic_set(&adap->chcr_stats.tls_pdu_rx, 0);
188
189 chtls_free_uld(cdev);
190}
191
192static void chtls_register_dev(struct chtls_dev *cdev)
193{
194 struct tls_toe_device *tlsdev = &cdev->tlsdev;
195
196 strlcpy(tlsdev->name, "chtls", TLS_TOE_DEVICE_NAME_MAX);
197 strlcat(tlsdev->name, cdev->lldi->ports[0]->name,
198 TLS_TOE_DEVICE_NAME_MAX);
199 tlsdev->feature = chtls_inline_feature;
200 tlsdev->hash = chtls_create_hash;
201 tlsdev->unhash = chtls_destroy_hash;
202 tlsdev->release = chtls_dev_release;
203 kref_init(&tlsdev->kref);
204 tls_toe_register_device(tlsdev);
205 cdev->cdev_state = CHTLS_CDEV_STATE_UP;
206}
207
208static void process_deferq(struct work_struct *task_param)
209{
210 struct chtls_dev *cdev = container_of(task_param,
211 struct chtls_dev, deferq_task);
212 struct sk_buff *skb;
213
214 spin_lock_bh(&cdev->deferq.lock);
215 while ((skb = __skb_dequeue(&cdev->deferq)) != NULL) {
216 spin_unlock_bh(&cdev->deferq.lock);
217 DEFERRED_SKB_CB(skb)->handler(cdev, skb);
218 spin_lock_bh(&cdev->deferq.lock);
219 }
220 spin_unlock_bh(&cdev->deferq.lock);
221}
222
223static int chtls_get_skb(struct chtls_dev *cdev)
224{
225 cdev->askb = alloc_skb(sizeof(struct tcphdr), GFP_KERNEL);
226 if (!cdev->askb)
227 return -ENOMEM;
228
229 skb_put(cdev->askb, sizeof(struct tcphdr));
230 skb_reset_transport_header(cdev->askb);
231 memset(cdev->askb->data, 0, cdev->askb->len);
232 return 0;
233}
234
235static void *chtls_uld_add(const struct cxgb4_lld_info *info)
236{
237 struct cxgb4_lld_info *lldi;
238 struct chtls_dev *cdev;
239 int i, j;
240
241 cdev = kzalloc(sizeof(*cdev), GFP_KERNEL);
242 if (!cdev)
243 goto out;
244
245 lldi = kzalloc(sizeof(*lldi), GFP_KERNEL);
246 if (!lldi)
247 goto out_lldi;
248
249 if (chtls_get_skb(cdev))
250 goto out_skb;
251
252 *lldi = *info;
253 cdev->lldi = lldi;
254 cdev->pdev = lldi->pdev;
255 cdev->tids = lldi->tids;
256 cdev->ports = lldi->ports;
257 cdev->mtus = lldi->mtus;
258 cdev->tids = lldi->tids;
259 cdev->pfvf = FW_VIID_PFN_G(cxgb4_port_viid(lldi->ports[0]))
260 << FW_VIID_PFN_S;
261
262 for (i = 0; i < (1 << RSPQ_HASH_BITS); i++) {
263 unsigned int size = 64 - sizeof(struct rsp_ctrl) - 8;
264
265 cdev->rspq_skb_cache[i] = __alloc_skb(size,
266 gfp_any(), 0,
267 lldi->nodeid);
268 if (unlikely(!cdev->rspq_skb_cache[i]))
269 goto out_rspq_skb;
270 }
271
272 idr_init(&cdev->hwtid_idr);
273 INIT_WORK(&cdev->deferq_task, process_deferq);
274 spin_lock_init(&cdev->listen_lock);
275 spin_lock_init(&cdev->idr_lock);
276 cdev->send_page_order = min_t(uint, get_order(32768),
277 send_page_order);
278 cdev->max_host_sndbuf = 48 * 1024;
279
280 if (lldi->vr->key.size)
281 if (chtls_init_kmap(cdev, lldi))
282 goto out_rspq_skb;
283
284 mutex_lock(&cdev_mutex);
285 list_add_tail(&cdev->list, &cdev_list);
286 mutex_unlock(&cdev_mutex);
287
288 return cdev;
289out_rspq_skb:
290 for (j = 0; j < i; j++)
291 kfree_skb(cdev->rspq_skb_cache[j]);
292 kfree_skb(cdev->askb);
293out_skb:
294 kfree(lldi);
295out_lldi:
296 kfree(cdev);
297out:
298 return NULL;
299}
300
301static void chtls_free_all_uld(void)
302{
303 struct chtls_dev *cdev, *tmp;
304
305 mutex_lock(&cdev_mutex);
306 list_for_each_entry_safe(cdev, tmp, &cdev_list, list) {
307 if (cdev->cdev_state == CHTLS_CDEV_STATE_UP) {
308 list_del(&cdev->list);
309 kref_put(&cdev->tlsdev.kref, cdev->tlsdev.release);
310 }
311 }
312 mutex_unlock(&cdev_mutex);
313}
314
315static int chtls_uld_state_change(void *handle, enum cxgb4_state new_state)
316{
317 struct chtls_dev *cdev = handle;
318
319 switch (new_state) {
320 case CXGB4_STATE_UP:
321 chtls_register_dev(cdev);
322 break;
323 case CXGB4_STATE_DOWN:
324 break;
325 case CXGB4_STATE_START_RECOVERY:
326 break;
327 case CXGB4_STATE_DETACH:
328 mutex_lock(&cdev_mutex);
329 list_del(&cdev->list);
330 mutex_unlock(&cdev_mutex);
331 kref_put(&cdev->tlsdev.kref, cdev->tlsdev.release);
332 break;
333 default:
334 break;
335 }
336 return 0;
337}
338
339static struct sk_buff *copy_gl_to_skb_pkt(const struct pkt_gl *gl,
340 const __be64 *rsp,
341 u32 pktshift)
342{
343 struct sk_buff *skb;
344
345
346
347
348
349 skb = alloc_skb(gl->tot_len + sizeof(struct cpl_pass_accept_req)
350 - pktshift, GFP_ATOMIC);
351 if (unlikely(!skb))
352 return NULL;
353 __skb_put(skb, gl->tot_len + sizeof(struct cpl_pass_accept_req)
354 - pktshift);
355
356 skb_copy_to_linear_data(skb, rsp, sizeof(struct cpl_rx_pkt));
357 skb_copy_to_linear_data_offset(skb, sizeof(struct cpl_pass_accept_req)
358 , gl->va + pktshift,
359 gl->tot_len - pktshift);
360
361 return skb;
362}
363
364static int chtls_recv_packet(struct chtls_dev *cdev,
365 const struct pkt_gl *gl, const __be64 *rsp)
366{
367 unsigned int opcode = *(u8 *)rsp;
368 struct sk_buff *skb;
369 int ret;
370
371 skb = copy_gl_to_skb_pkt(gl, rsp, cdev->lldi->sge_pktshift);
372 if (!skb)
373 return -ENOMEM;
374
375 ret = chtls_handlers[opcode](cdev, skb);
376 if (ret & CPL_RET_BUF_DONE)
377 kfree_skb(skb);
378
379 return 0;
380}
381
382static int chtls_recv_rsp(struct chtls_dev *cdev, const __be64 *rsp)
383{
384 unsigned long rspq_bin;
385 unsigned int opcode;
386 struct sk_buff *skb;
387 unsigned int len;
388 int ret;
389
390 len = 64 - sizeof(struct rsp_ctrl) - 8;
391 opcode = *(u8 *)rsp;
392
393 rspq_bin = hash_ptr((void *)rsp, RSPQ_HASH_BITS);
394 skb = cdev->rspq_skb_cache[rspq_bin];
395 if (skb && !skb_is_nonlinear(skb) &&
396 !skb_shared(skb) && !skb_cloned(skb)) {
397 refcount_inc(&skb->users);
398 if (refcount_read(&skb->users) == 2) {
399 __skb_trim(skb, 0);
400 if (skb_tailroom(skb) >= len)
401 goto copy_out;
402 }
403 refcount_dec(&skb->users);
404 }
405 skb = alloc_skb(len, GFP_ATOMIC);
406 if (unlikely(!skb))
407 return -ENOMEM;
408
409copy_out:
410 __skb_put(skb, len);
411 skb_copy_to_linear_data(skb, rsp, len);
412 skb_reset_network_header(skb);
413 skb_reset_transport_header(skb);
414 ret = chtls_handlers[opcode](cdev, skb);
415
416 if (ret & CPL_RET_BUF_DONE)
417 kfree_skb(skb);
418 return 0;
419}
420
421static void chtls_recv(struct chtls_dev *cdev,
422 struct sk_buff **skbs, const __be64 *rsp)
423{
424 struct sk_buff *skb = *skbs;
425 unsigned int opcode;
426 int ret;
427
428 opcode = *(u8 *)rsp;
429
430 __skb_push(skb, sizeof(struct rss_header));
431 skb_copy_to_linear_data(skb, rsp, sizeof(struct rss_header));
432
433 ret = chtls_handlers[opcode](cdev, skb);
434 if (ret & CPL_RET_BUF_DONE)
435 kfree_skb(skb);
436}
437
438static int chtls_uld_rx_handler(void *handle, const __be64 *rsp,
439 const struct pkt_gl *gl)
440{
441 struct chtls_dev *cdev = handle;
442 unsigned int opcode;
443 struct sk_buff *skb;
444
445 opcode = *(u8 *)rsp;
446
447 if (unlikely(opcode == CPL_RX_PKT)) {
448 if (chtls_recv_packet(cdev, gl, rsp) < 0)
449 goto nomem;
450 return 0;
451 }
452
453 if (!gl)
454 return chtls_recv_rsp(cdev, rsp);
455
456#define RX_PULL_LEN 128
457 skb = cxgb4_pktgl_to_skb(gl, RX_PULL_LEN, RX_PULL_LEN);
458 if (unlikely(!skb))
459 goto nomem;
460 chtls_recv(cdev, &skb, rsp);
461 return 0;
462
463nomem:
464 return -ENOMEM;
465}
466
467static int do_chtls_getsockopt(struct sock *sk, char __user *optval,
468 int __user *optlen)
469{
470 struct tls_crypto_info crypto_info = { 0 };
471
472 crypto_info.version = TLS_1_2_VERSION;
473 if (copy_to_user(optval, &crypto_info, sizeof(struct tls_crypto_info)))
474 return -EFAULT;
475 return 0;
476}
477
478static int chtls_getsockopt(struct sock *sk, int level, int optname,
479 char __user *optval, int __user *optlen)
480{
481 struct tls_context *ctx = tls_get_ctx(sk);
482
483 if (level != SOL_TLS)
484 return ctx->sk_proto->getsockopt(sk, level,
485 optname, optval, optlen);
486
487 return do_chtls_getsockopt(sk, optval, optlen);
488}
489
490static int do_chtls_setsockopt(struct sock *sk, int optname,
491 sockptr_t optval, unsigned int optlen)
492{
493 struct tls_crypto_info *crypto_info, tmp_crypto_info;
494 struct chtls_sock *csk;
495 int keylen;
496 int cipher_type;
497 int rc = 0;
498
499 csk = rcu_dereference_sk_user_data(sk);
500
501 if (sockptr_is_null(optval) || optlen < sizeof(*crypto_info)) {
502 rc = -EINVAL;
503 goto out;
504 }
505
506 rc = copy_from_sockptr(&tmp_crypto_info, optval, sizeof(*crypto_info));
507 if (rc) {
508 rc = -EFAULT;
509 goto out;
510 }
511
512
513 if (tmp_crypto_info.version != TLS_1_2_VERSION) {
514 rc = -ENOTSUPP;
515 goto out;
516 }
517
518 crypto_info = (struct tls_crypto_info *)&csk->tlshws.crypto_info;
519
520
521
522
523 switch (tmp_crypto_info.cipher_type) {
524 case TLS_CIPHER_AES_GCM_128: {
525
526 crypto_info[0] = tmp_crypto_info;
527
528 rc = copy_from_sockptr_offset((char *)crypto_info +
529 sizeof(*crypto_info),
530 optval, sizeof(*crypto_info),
531 sizeof(struct tls12_crypto_info_aes_gcm_128)
532 - sizeof(*crypto_info));
533
534 if (rc) {
535 rc = -EFAULT;
536 goto out;
537 }
538
539 keylen = TLS_CIPHER_AES_GCM_128_KEY_SIZE;
540 cipher_type = TLS_CIPHER_AES_GCM_128;
541 break;
542 }
543 case TLS_CIPHER_AES_GCM_256: {
544 crypto_info[0] = tmp_crypto_info;
545 rc = copy_from_sockptr_offset((char *)crypto_info +
546 sizeof(*crypto_info),
547 optval, sizeof(*crypto_info),
548 sizeof(struct tls12_crypto_info_aes_gcm_256)
549 - sizeof(*crypto_info));
550
551 if (rc) {
552 rc = -EFAULT;
553 goto out;
554 }
555
556 keylen = TLS_CIPHER_AES_GCM_256_KEY_SIZE;
557 cipher_type = TLS_CIPHER_AES_GCM_256;
558 break;
559 }
560 default:
561 rc = -EINVAL;
562 goto out;
563 }
564 rc = chtls_setkey(csk, keylen, optname, cipher_type);
565out:
566 return rc;
567}
568
569static int chtls_setsockopt(struct sock *sk, int level, int optname,
570 sockptr_t optval, unsigned int optlen)
571{
572 struct tls_context *ctx = tls_get_ctx(sk);
573
574 if (level != SOL_TLS)
575 return ctx->sk_proto->setsockopt(sk, level,
576 optname, optval, optlen);
577
578 return do_chtls_setsockopt(sk, optname, optval, optlen);
579}
580
581static struct cxgb4_uld_info chtls_uld_info = {
582 .name = DRV_NAME,
583 .nrxq = MAX_ULD_QSETS,
584 .ntxq = MAX_ULD_QSETS,
585 .rxq_size = 1024,
586 .add = chtls_uld_add,
587 .state_change = chtls_uld_state_change,
588 .rx_handler = chtls_uld_rx_handler,
589};
590
591void chtls_install_cpl_ops(struct sock *sk)
592{
593 if (sk->sk_family == AF_INET)
594 sk->sk_prot = &chtls_cpl_prot;
595 else
596 sk->sk_prot = &chtls_cpl_protv6;
597}
598
599static void __init chtls_init_ulp_ops(void)
600{
601 chtls_cpl_prot = tcp_prot;
602 chtls_init_rsk_ops(&chtls_cpl_prot, &chtls_rsk_ops,
603 &tcp_prot, PF_INET);
604 chtls_cpl_prot.close = chtls_close;
605 chtls_cpl_prot.disconnect = chtls_disconnect;
606 chtls_cpl_prot.destroy = chtls_destroy_sock;
607 chtls_cpl_prot.shutdown = chtls_shutdown;
608 chtls_cpl_prot.sendmsg = chtls_sendmsg;
609 chtls_cpl_prot.sendpage = chtls_sendpage;
610 chtls_cpl_prot.recvmsg = chtls_recvmsg;
611 chtls_cpl_prot.setsockopt = chtls_setsockopt;
612 chtls_cpl_prot.getsockopt = chtls_getsockopt;
613#if IS_ENABLED(CONFIG_IPV6)
614 chtls_cpl_protv6 = chtls_cpl_prot;
615 chtls_init_rsk_ops(&chtls_cpl_protv6, &chtls_rsk_opsv6,
616 &tcpv6_prot, PF_INET6);
617#endif
618}
619
620static int __init chtls_register(void)
621{
622 chtls_init_ulp_ops();
623 register_listen_notifier(&listen_notifier);
624 cxgb4_register_uld(CXGB4_ULD_TLS, &chtls_uld_info);
625 return 0;
626}
627
628static void __exit chtls_unregister(void)
629{
630 unregister_listen_notifier(&listen_notifier);
631 chtls_free_all_uld();
632 cxgb4_unregister_uld(CXGB4_ULD_TLS);
633}
634
635module_init(chtls_register);
636module_exit(chtls_unregister);
637
638MODULE_DESCRIPTION("Chelsio TLS Inline driver");
639MODULE_LICENSE("GPL");
640MODULE_AUTHOR("Chelsio Communications");
641MODULE_VERSION(CHTLS_DRV_VERSION);
642