chtls.h 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. /*
  2. * Copyright (c) 2018 Chelsio Communications, Inc.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License version 2 as
  6. * published by the Free Software Foundation.
  7. */
  8. #ifndef __CHTLS_H__
  9. #define __CHTLS_H__
  10. #include <crypto/aes.h>
  11. #include <crypto/algapi.h>
  12. #include <crypto/hash.h>
  13. #include <crypto/sha.h>
  14. #include <crypto/authenc.h>
  15. #include <crypto/ctr.h>
  16. #include <crypto/gf128mul.h>
  17. #include <crypto/internal/aead.h>
  18. #include <crypto/null.h>
  19. #include <crypto/internal/skcipher.h>
  20. #include <crypto/aead.h>
  21. #include <crypto/scatterwalk.h>
  22. #include <crypto/internal/hash.h>
  23. #include <linux/tls.h>
  24. #include <net/tls.h>
  25. #include "t4fw_api.h"
  26. #include "t4_msg.h"
  27. #include "cxgb4.h"
  28. #include "cxgb4_uld.h"
  29. #include "l2t.h"
  30. #include "chcr_algo.h"
  31. #include "chcr_core.h"
  32. #include "chcr_crypto.h"
  33. #define MAX_IVS_PAGE 256
  34. #define TLS_KEY_CONTEXT_SZ 64
  35. #define CIPHER_BLOCK_SIZE 16
  36. #define GCM_TAG_SIZE 16
  37. #define KEY_ON_MEM_SZ 16
  38. #define AEAD_EXPLICIT_DATA_SIZE 8
  39. #define TLS_HEADER_LENGTH 5
  40. #define SCMD_CIPH_MODE_AES_GCM 2
  41. /* Any MFS size should work and come from openssl */
  42. #define TLS_MFS 16384
  43. #define RSS_HDR sizeof(struct rss_header)
  44. #define TLS_WR_CPL_LEN \
  45. (sizeof(struct fw_tlstx_data_wr) + sizeof(struct cpl_tx_tls_sfo))
  46. enum {
  47. CHTLS_KEY_CONTEXT_DSGL,
  48. CHTLS_KEY_CONTEXT_IMM,
  49. CHTLS_KEY_CONTEXT_DDR,
  50. };
  51. enum {
  52. CHTLS_LISTEN_START,
  53. CHTLS_LISTEN_STOP,
  54. };
  55. /* Flags for return value of CPL message handlers */
  56. enum {
  57. CPL_RET_BUF_DONE = 1, /* buffer processing done */
  58. CPL_RET_BAD_MSG = 2, /* bad CPL message */
  59. CPL_RET_UNKNOWN_TID = 4 /* unexpected unknown TID */
  60. };
  61. #define LISTEN_INFO_HASH_SIZE 32
  62. #define RSPQ_HASH_BITS 5
  63. struct listen_info {
  64. struct listen_info *next; /* Link to next entry */
  65. struct sock *sk; /* The listening socket */
  66. unsigned int stid; /* The server TID */
  67. };
  68. enum {
  69. T4_LISTEN_START_PENDING,
  70. T4_LISTEN_STARTED
  71. };
  72. enum csk_flags {
  73. CSK_CALLBACKS_CHKD, /* socket callbacks have been sanitized */
  74. CSK_ABORT_REQ_RCVD, /* received one ABORT_REQ_RSS message */
  75. CSK_TX_MORE_DATA, /* sending ULP data; don't set SHOVE bit */
  76. CSK_TX_WAIT_IDLE, /* suspend Tx until in-flight data is ACKed */
  77. CSK_ABORT_SHUTDOWN, /* shouldn't send more abort requests */
  78. CSK_ABORT_RPL_PENDING, /* expecting an abort reply */
  79. CSK_CLOSE_CON_REQUESTED,/* we've sent a close_conn_req */
  80. CSK_TX_DATA_SENT, /* sent a TX_DATA WR on this connection */
  81. CSK_TX_FAILOVER, /* Tx traffic failing over */
  82. CSK_UPDATE_RCV_WND, /* Need to update rcv window */
  83. CSK_RST_ABORTED, /* outgoing RST was aborted */
  84. CSK_TLS_HANDSHK, /* TLS Handshake */
  85. CSK_CONN_INLINE, /* Connection on HW */
  86. };
  87. enum chtls_cdev_state {
  88. CHTLS_CDEV_STATE_UP = 1
  89. };
  90. struct listen_ctx {
  91. struct sock *lsk;
  92. struct chtls_dev *cdev;
  93. struct sk_buff_head synq;
  94. u32 state;
  95. };
  96. struct key_map {
  97. unsigned long *addr;
  98. unsigned int start;
  99. unsigned int available;
  100. unsigned int size;
  101. spinlock_t lock; /* lock for key id request from map */
  102. } __packed;
  103. struct tls_scmd {
  104. u32 seqno_numivs;
  105. u32 ivgen_hdrlen;
  106. };
  107. struct chtls_dev {
  108. struct tls_device tlsdev;
  109. struct list_head list;
  110. struct cxgb4_lld_info *lldi;
  111. struct pci_dev *pdev;
  112. struct listen_info *listen_hash_tab[LISTEN_INFO_HASH_SIZE];
  113. spinlock_t listen_lock; /* lock for listen list */
  114. struct net_device **ports;
  115. struct tid_info *tids;
  116. unsigned int pfvf;
  117. const unsigned short *mtus;
  118. struct idr hwtid_idr;
  119. struct idr stid_idr;
  120. spinlock_t idr_lock ____cacheline_aligned_in_smp;
  121. struct net_device *egr_dev[NCHAN * 2];
  122. struct sk_buff *rspq_skb_cache[1 << RSPQ_HASH_BITS];
  123. struct sk_buff *askb;
  124. struct sk_buff_head deferq;
  125. struct work_struct deferq_task;
  126. struct list_head list_node;
  127. struct list_head rcu_node;
  128. struct list_head na_node;
  129. unsigned int send_page_order;
  130. int max_host_sndbuf;
  131. struct key_map kmap;
  132. unsigned int cdev_state;
  133. };
  134. struct chtls_hws {
  135. struct sk_buff_head sk_recv_queue;
  136. u8 txqid;
  137. u8 ofld;
  138. u16 type;
  139. u16 rstate;
  140. u16 keyrpl;
  141. u16 pldlen;
  142. u16 rcvpld;
  143. u16 compute;
  144. u16 expansion;
  145. u16 keylen;
  146. u16 pdus;
  147. u16 adjustlen;
  148. u16 ivsize;
  149. u16 txleft;
  150. u32 mfs;
  151. s32 txkey;
  152. s32 rxkey;
  153. u32 fcplenmax;
  154. u32 copied_seq;
  155. u64 tx_seq_no;
  156. struct tls_scmd scmd;
  157. struct tls12_crypto_info_aes_gcm_128 crypto_info;
  158. };
  159. struct chtls_sock {
  160. struct sock *sk;
  161. struct chtls_dev *cdev;
  162. struct l2t_entry *l2t_entry; /* pointer to the L2T entry */
  163. struct net_device *egress_dev; /* TX_CHAN for act open retry */
  164. struct sk_buff_head txq;
  165. struct sk_buff *wr_skb_head;
  166. struct sk_buff *wr_skb_tail;
  167. struct sk_buff *ctrl_skb_cache;
  168. struct sk_buff *txdata_skb_cache; /* abort path messages */
  169. struct kref kref;
  170. unsigned long flags;
  171. u32 opt2;
  172. u32 wr_credits;
  173. u32 wr_unacked;
  174. u32 wr_max_credits;
  175. u32 wr_nondata;
  176. u32 hwtid; /* TCP Control Block ID */
  177. u32 txq_idx;
  178. u32 rss_qid;
  179. u32 tid;
  180. u32 idr;
  181. u32 mss;
  182. u32 ulp_mode;
  183. u32 tx_chan;
  184. u32 rx_chan;
  185. u32 sndbuf;
  186. u32 txplen_max;
  187. u32 mtu_idx; /* MTU table index */
  188. u32 smac_idx;
  189. u8 port_id;
  190. u8 tos;
  191. u16 resv2;
  192. u32 delack_mode;
  193. u32 delack_seq;
  194. void *passive_reap_next; /* placeholder for passive */
  195. struct chtls_hws tlshws;
  196. struct synq {
  197. struct sk_buff *next;
  198. struct sk_buff *prev;
  199. } synq;
  200. struct listen_ctx *listen_ctx;
  201. };
  202. struct tls_hdr {
  203. u8 type;
  204. u16 version;
  205. u16 length;
  206. } __packed;
  207. struct tlsrx_cmp_hdr {
  208. u8 type;
  209. u16 version;
  210. u16 length;
  211. u64 tls_seq;
  212. u16 reserved1;
  213. u8 res_to_mac_error;
  214. } __packed;
  215. /* res_to_mac_error fields */
  216. #define TLSRX_HDR_PKT_INT_ERROR_S 4
  217. #define TLSRX_HDR_PKT_INT_ERROR_M 0x1
  218. #define TLSRX_HDR_PKT_INT_ERROR_V(x) \
  219. ((x) << TLSRX_HDR_PKT_INT_ERROR_S)
  220. #define TLSRX_HDR_PKT_INT_ERROR_G(x) \
  221. (((x) >> TLSRX_HDR_PKT_INT_ERROR_S) & TLSRX_HDR_PKT_INT_ERROR_M)
  222. #define TLSRX_HDR_PKT_INT_ERROR_F TLSRX_HDR_PKT_INT_ERROR_V(1U)
  223. #define TLSRX_HDR_PKT_SPP_ERROR_S 3
  224. #define TLSRX_HDR_PKT_SPP_ERROR_M 0x1
  225. #define TLSRX_HDR_PKT_SPP_ERROR_V(x) ((x) << TLSRX_HDR_PKT_SPP_ERROR)
  226. #define TLSRX_HDR_PKT_SPP_ERROR_G(x) \
  227. (((x) >> TLSRX_HDR_PKT_SPP_ERROR_S) & TLSRX_HDR_PKT_SPP_ERROR_M)
  228. #define TLSRX_HDR_PKT_SPP_ERROR_F TLSRX_HDR_PKT_SPP_ERROR_V(1U)
  229. #define TLSRX_HDR_PKT_CCDX_ERROR_S 2
  230. #define TLSRX_HDR_PKT_CCDX_ERROR_M 0x1
  231. #define TLSRX_HDR_PKT_CCDX_ERROR_V(x) ((x) << TLSRX_HDR_PKT_CCDX_ERROR_S)
  232. #define TLSRX_HDR_PKT_CCDX_ERROR_G(x) \
  233. (((x) >> TLSRX_HDR_PKT_CCDX_ERROR_S) & TLSRX_HDR_PKT_CCDX_ERROR_M)
  234. #define TLSRX_HDR_PKT_CCDX_ERROR_F TLSRX_HDR_PKT_CCDX_ERROR_V(1U)
  235. #define TLSRX_HDR_PKT_PAD_ERROR_S 1
  236. #define TLSRX_HDR_PKT_PAD_ERROR_M 0x1
  237. #define TLSRX_HDR_PKT_PAD_ERROR_V(x) ((x) << TLSRX_HDR_PKT_PAD_ERROR_S)
  238. #define TLSRX_HDR_PKT_PAD_ERROR_G(x) \
  239. (((x) >> TLSRX_HDR_PKT_PAD_ERROR_S) & TLSRX_HDR_PKT_PAD_ERROR_M)
  240. #define TLSRX_HDR_PKT_PAD_ERROR_F TLSRX_HDR_PKT_PAD_ERROR_V(1U)
  241. #define TLSRX_HDR_PKT_MAC_ERROR_S 0
  242. #define TLSRX_HDR_PKT_MAC_ERROR_M 0x1
  243. #define TLSRX_HDR_PKT_MAC_ERROR_V(x) ((x) << TLSRX_HDR_PKT_MAC_ERROR)
  244. #define TLSRX_HDR_PKT_MAC_ERROR_G(x) \
  245. (((x) >> S_TLSRX_HDR_PKT_MAC_ERROR_S) & TLSRX_HDR_PKT_MAC_ERROR_M)
  246. #define TLSRX_HDR_PKT_MAC_ERROR_F TLSRX_HDR_PKT_MAC_ERROR_V(1U)
  247. #define TLSRX_HDR_PKT_ERROR_M 0x1F
  248. #define CONTENT_TYPE_ERROR 0x7F
  249. struct ulp_mem_rw {
  250. __be32 cmd;
  251. __be32 len16; /* command length */
  252. __be32 dlen; /* data length in 32-byte units */
  253. __be32 lock_addr;
  254. };
  255. struct tls_key_wr {
  256. __be32 op_to_compl;
  257. __be32 flowid_len16;
  258. __be32 ftid;
  259. u8 reneg_to_write_rx;
  260. u8 protocol;
  261. __be16 mfs;
  262. };
  263. struct tls_key_req {
  264. struct tls_key_wr wr;
  265. struct ulp_mem_rw req;
  266. struct ulptx_idata sc_imm;
  267. };
  268. /*
  269. * This lives in skb->cb and is used to chain WRs in a linked list.
  270. */
  271. struct wr_skb_cb {
  272. struct l2t_skb_cb l2t; /* reserve space for l2t CB */
  273. struct sk_buff *next_wr; /* next write request */
  274. };
  275. /* Per-skb backlog handler. Run when a socket's backlog is processed. */
  276. struct blog_skb_cb {
  277. void (*backlog_rcv)(struct sock *sk, struct sk_buff *skb);
  278. struct chtls_dev *cdev;
  279. };
  280. /*
  281. * Similar to tcp_skb_cb but with ULP elements added to support TLS,
  282. * etc.
  283. */
  284. struct ulp_skb_cb {
  285. struct wr_skb_cb wr; /* reserve space for write request */
  286. u16 flags; /* TCP-like flags */
  287. u8 psh;
  288. u8 ulp_mode; /* ULP mode/submode of sk_buff */
  289. u32 seq; /* TCP sequence number */
  290. union { /* ULP-specific fields */
  291. struct {
  292. u8 type;
  293. u8 ofld;
  294. u8 iv;
  295. } tls;
  296. } ulp;
  297. };
  298. #define ULP_SKB_CB(skb) ((struct ulp_skb_cb *)&((skb)->cb[0]))
  299. #define BLOG_SKB_CB(skb) ((struct blog_skb_cb *)(skb)->cb)
  300. /*
  301. * Flags for ulp_skb_cb.flags.
  302. */
  303. enum {
  304. ULPCB_FLAG_NEED_HDR = 1 << 0, /* packet needs a TX_DATA_WR header */
  305. ULPCB_FLAG_NO_APPEND = 1 << 1, /* don't grow this skb */
  306. ULPCB_FLAG_BARRIER = 1 << 2, /* set TX_WAIT_IDLE after sending */
  307. ULPCB_FLAG_HOLD = 1 << 3, /* skb not ready for Tx yet */
  308. ULPCB_FLAG_COMPL = 1 << 4, /* request WR completion */
  309. ULPCB_FLAG_URG = 1 << 5, /* urgent data */
  310. ULPCB_FLAG_TLS_HDR = 1 << 6, /* payload with tls hdr */
  311. ULPCB_FLAG_NO_HDR = 1 << 7, /* not a ofld wr */
  312. };
  313. /* The ULP mode/submode of an skbuff */
  314. #define skb_ulp_mode(skb) (ULP_SKB_CB(skb)->ulp_mode)
  315. #define TCP_PAGE(sk) (sk->sk_frag.page)
  316. #define TCP_OFF(sk) (sk->sk_frag.offset)
  317. static inline struct chtls_dev *to_chtls_dev(struct tls_device *tlsdev)
  318. {
  319. return container_of(tlsdev, struct chtls_dev, tlsdev);
  320. }
  321. static inline void csk_set_flag(struct chtls_sock *csk,
  322. enum csk_flags flag)
  323. {
  324. __set_bit(flag, &csk->flags);
  325. }
  326. static inline void csk_reset_flag(struct chtls_sock *csk,
  327. enum csk_flags flag)
  328. {
  329. __clear_bit(flag, &csk->flags);
  330. }
  331. static inline bool csk_conn_inline(const struct chtls_sock *csk)
  332. {
  333. return test_bit(CSK_CONN_INLINE, &csk->flags);
  334. }
  335. static inline int csk_flag(const struct sock *sk, enum csk_flags flag)
  336. {
  337. struct chtls_sock *csk = rcu_dereference_sk_user_data(sk);
  338. if (!csk_conn_inline(csk))
  339. return 0;
  340. return test_bit(flag, &csk->flags);
  341. }
  342. static inline int csk_flag_nochk(const struct chtls_sock *csk,
  343. enum csk_flags flag)
  344. {
  345. return test_bit(flag, &csk->flags);
  346. }
  347. static inline void *cplhdr(struct sk_buff *skb)
  348. {
  349. return skb->data;
  350. }
  351. static inline int is_neg_adv(unsigned int status)
  352. {
  353. return status == CPL_ERR_RTX_NEG_ADVICE ||
  354. status == CPL_ERR_KEEPALV_NEG_ADVICE ||
  355. status == CPL_ERR_PERSIST_NEG_ADVICE;
  356. }
  357. static inline void process_cpl_msg(void (*fn)(struct sock *, struct sk_buff *),
  358. struct sock *sk,
  359. struct sk_buff *skb)
  360. {
  361. skb_reset_mac_header(skb);
  362. skb_reset_network_header(skb);
  363. skb_reset_transport_header(skb);
  364. bh_lock_sock(sk);
  365. if (unlikely(sock_owned_by_user(sk))) {
  366. BLOG_SKB_CB(skb)->backlog_rcv = fn;
  367. __sk_add_backlog(sk, skb);
  368. } else {
  369. fn(sk, skb);
  370. }
  371. bh_unlock_sock(sk);
  372. }
  373. static inline void chtls_sock_free(struct kref *ref)
  374. {
  375. struct chtls_sock *csk = container_of(ref, struct chtls_sock,
  376. kref);
  377. kfree(csk);
  378. }
  379. static inline void __chtls_sock_put(const char *fn, struct chtls_sock *csk)
  380. {
  381. kref_put(&csk->kref, chtls_sock_free);
  382. }
  383. static inline void __chtls_sock_get(const char *fn,
  384. struct chtls_sock *csk)
  385. {
  386. kref_get(&csk->kref);
  387. }
  388. static inline void send_or_defer(struct sock *sk, struct tcp_sock *tp,
  389. struct sk_buff *skb, int through_l2t)
  390. {
  391. struct chtls_sock *csk = rcu_dereference_sk_user_data(sk);
  392. if (through_l2t) {
  393. /* send through L2T */
  394. cxgb4_l2t_send(csk->egress_dev, skb, csk->l2t_entry);
  395. } else {
  396. /* send directly */
  397. cxgb4_ofld_send(csk->egress_dev, skb);
  398. }
  399. }
  400. typedef int (*chtls_handler_func)(struct chtls_dev *, struct sk_buff *);
  401. extern chtls_handler_func chtls_handlers[NUM_CPL_CMDS];
  402. void chtls_install_cpl_ops(struct sock *sk);
  403. int chtls_init_kmap(struct chtls_dev *cdev, struct cxgb4_lld_info *lldi);
  404. void chtls_listen_stop(struct chtls_dev *cdev, struct sock *sk);
  405. int chtls_listen_start(struct chtls_dev *cdev, struct sock *sk);
  406. void chtls_close(struct sock *sk, long timeout);
  407. int chtls_disconnect(struct sock *sk, int flags);
  408. void chtls_shutdown(struct sock *sk, int how);
  409. void chtls_destroy_sock(struct sock *sk);
  410. int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size);
  411. int chtls_recvmsg(struct sock *sk, struct msghdr *msg,
  412. size_t len, int nonblock, int flags, int *addr_len);
  413. int chtls_sendpage(struct sock *sk, struct page *page,
  414. int offset, size_t size, int flags);
  415. int send_tx_flowc_wr(struct sock *sk, int compl,
  416. u32 snd_nxt, u32 rcv_nxt);
  417. void chtls_tcp_push(struct sock *sk, int flags);
  418. int chtls_push_frames(struct chtls_sock *csk, int comp);
  419. int chtls_set_tcb_tflag(struct sock *sk, unsigned int bit_pos, int val);
  420. int chtls_setkey(struct chtls_sock *csk, u32 keylen, u32 mode);
  421. void skb_entail(struct sock *sk, struct sk_buff *skb, int flags);
  422. unsigned int keyid_to_addr(int start_addr, int keyid);
  423. void free_tls_keyid(struct sock *sk);
  424. #endif