chtls_main.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584
  1. /*
  2. * Copyright (c) 2018 Chelsio Communications, Inc.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License version 2 as
  6. * published by the Free Software Foundation.
  7. *
  8. * Written by: Atul Gupta (atul.gupta@chelsio.com)
  9. */
  10. #include <linux/kernel.h>
  11. #include <linux/module.h>
  12. #include <linux/skbuff.h>
  13. #include <linux/socket.h>
  14. #include <linux/hash.h>
  15. #include <linux/in.h>
  16. #include <linux/net.h>
  17. #include <linux/ip.h>
  18. #include <linux/tcp.h>
  19. #include <net/tcp.h>
  20. #include <net/tls.h>
  21. #include "chtls.h"
  22. #include "chtls_cm.h"
  23. #define DRV_NAME "chtls"
  24. /*
  25. * chtls device management
  26. * maintains a list of the chtls devices
  27. */
  28. static LIST_HEAD(cdev_list);
  29. static DEFINE_MUTEX(cdev_mutex);
  30. static DEFINE_MUTEX(cdev_list_lock);
  31. static DEFINE_MUTEX(notify_mutex);
  32. static RAW_NOTIFIER_HEAD(listen_notify_list);
  33. static struct proto chtls_cpl_prot;
  34. struct request_sock_ops chtls_rsk_ops;
  35. static uint send_page_order = (14 - PAGE_SHIFT < 0) ? 0 : 14 - PAGE_SHIFT;
  36. static void register_listen_notifier(struct notifier_block *nb)
  37. {
  38. mutex_lock(&notify_mutex);
  39. raw_notifier_chain_register(&listen_notify_list, nb);
  40. mutex_unlock(&notify_mutex);
  41. }
  42. static void unregister_listen_notifier(struct notifier_block *nb)
  43. {
  44. mutex_lock(&notify_mutex);
  45. raw_notifier_chain_unregister(&listen_notify_list, nb);
  46. mutex_unlock(&notify_mutex);
  47. }
  48. static int listen_notify_handler(struct notifier_block *this,
  49. unsigned long event, void *data)
  50. {
  51. struct chtls_dev *cdev;
  52. struct sock *sk;
  53. int ret;
  54. sk = data;
  55. ret = NOTIFY_DONE;
  56. switch (event) {
  57. case CHTLS_LISTEN_START:
  58. case CHTLS_LISTEN_STOP:
  59. mutex_lock(&cdev_list_lock);
  60. list_for_each_entry(cdev, &cdev_list, list) {
  61. if (event == CHTLS_LISTEN_START)
  62. ret = chtls_listen_start(cdev, sk);
  63. else
  64. chtls_listen_stop(cdev, sk);
  65. }
  66. mutex_unlock(&cdev_list_lock);
  67. break;
  68. }
  69. return ret;
  70. }
  71. static struct notifier_block listen_notifier = {
  72. .notifier_call = listen_notify_handler
  73. };
  74. static int listen_backlog_rcv(struct sock *sk, struct sk_buff *skb)
  75. {
  76. if (likely(skb_transport_header(skb) != skb_network_header(skb)))
  77. return tcp_v4_do_rcv(sk, skb);
  78. BLOG_SKB_CB(skb)->backlog_rcv(sk, skb);
  79. return 0;
  80. }
  81. static int chtls_start_listen(struct sock *sk)
  82. {
  83. int err;
  84. if (sk->sk_protocol != IPPROTO_TCP)
  85. return -EPROTONOSUPPORT;
  86. if (sk->sk_family == PF_INET &&
  87. LOOPBACK(inet_sk(sk)->inet_rcv_saddr))
  88. return -EADDRNOTAVAIL;
  89. sk->sk_backlog_rcv = listen_backlog_rcv;
  90. mutex_lock(&notify_mutex);
  91. err = raw_notifier_call_chain(&listen_notify_list,
  92. CHTLS_LISTEN_START, sk);
  93. mutex_unlock(&notify_mutex);
  94. return err;
  95. }
  96. static void chtls_stop_listen(struct sock *sk)
  97. {
  98. if (sk->sk_protocol != IPPROTO_TCP)
  99. return;
  100. mutex_lock(&notify_mutex);
  101. raw_notifier_call_chain(&listen_notify_list,
  102. CHTLS_LISTEN_STOP, sk);
  103. mutex_unlock(&notify_mutex);
  104. }
  105. static int chtls_inline_feature(struct tls_device *dev)
  106. {
  107. struct net_device *netdev;
  108. struct chtls_dev *cdev;
  109. int i;
  110. cdev = to_chtls_dev(dev);
  111. for (i = 0; i < cdev->lldi->nports; i++) {
  112. netdev = cdev->ports[i];
  113. if (netdev->features & NETIF_F_HW_TLS_RECORD)
  114. return 1;
  115. }
  116. return 0;
  117. }
  118. static int chtls_create_hash(struct tls_device *dev, struct sock *sk)
  119. {
  120. if (sk->sk_state == TCP_LISTEN)
  121. return chtls_start_listen(sk);
  122. return 0;
  123. }
  124. static void chtls_destroy_hash(struct tls_device *dev, struct sock *sk)
  125. {
  126. if (sk->sk_state == TCP_LISTEN)
  127. chtls_stop_listen(sk);
  128. }
  129. static void chtls_register_dev(struct chtls_dev *cdev)
  130. {
  131. struct tls_device *tlsdev = &cdev->tlsdev;
  132. strlcpy(tlsdev->name, "chtls", TLS_DEVICE_NAME_MAX);
  133. strlcat(tlsdev->name, cdev->lldi->ports[0]->name,
  134. TLS_DEVICE_NAME_MAX);
  135. tlsdev->feature = chtls_inline_feature;
  136. tlsdev->hash = chtls_create_hash;
  137. tlsdev->unhash = chtls_destroy_hash;
  138. tls_register_device(&cdev->tlsdev);
  139. cdev->cdev_state = CHTLS_CDEV_STATE_UP;
  140. }
  141. static void chtls_unregister_dev(struct chtls_dev *cdev)
  142. {
  143. tls_unregister_device(&cdev->tlsdev);
  144. }
  145. static void process_deferq(struct work_struct *task_param)
  146. {
  147. struct chtls_dev *cdev = container_of(task_param,
  148. struct chtls_dev, deferq_task);
  149. struct sk_buff *skb;
  150. spin_lock_bh(&cdev->deferq.lock);
  151. while ((skb = __skb_dequeue(&cdev->deferq)) != NULL) {
  152. spin_unlock_bh(&cdev->deferq.lock);
  153. DEFERRED_SKB_CB(skb)->handler(cdev, skb);
  154. spin_lock_bh(&cdev->deferq.lock);
  155. }
  156. spin_unlock_bh(&cdev->deferq.lock);
  157. }
  158. static int chtls_get_skb(struct chtls_dev *cdev)
  159. {
  160. cdev->askb = alloc_skb(sizeof(struct tcphdr), GFP_KERNEL);
  161. if (!cdev->askb)
  162. return -ENOMEM;
  163. skb_put(cdev->askb, sizeof(struct tcphdr));
  164. skb_reset_transport_header(cdev->askb);
  165. memset(cdev->askb->data, 0, cdev->askb->len);
  166. return 0;
  167. }
  168. static void *chtls_uld_add(const struct cxgb4_lld_info *info)
  169. {
  170. struct cxgb4_lld_info *lldi;
  171. struct chtls_dev *cdev;
  172. int i, j;
  173. cdev = kzalloc(sizeof(*cdev) + info->nports *
  174. (sizeof(struct net_device *)), GFP_KERNEL);
  175. if (!cdev)
  176. goto out;
  177. lldi = kzalloc(sizeof(*lldi), GFP_KERNEL);
  178. if (!lldi)
  179. goto out_lldi;
  180. if (chtls_get_skb(cdev))
  181. goto out_skb;
  182. *lldi = *info;
  183. cdev->lldi = lldi;
  184. cdev->pdev = lldi->pdev;
  185. cdev->tids = lldi->tids;
  186. cdev->ports = lldi->ports;
  187. cdev->mtus = lldi->mtus;
  188. cdev->tids = lldi->tids;
  189. cdev->pfvf = FW_VIID_PFN_G(cxgb4_port_viid(lldi->ports[0]))
  190. << FW_VIID_PFN_S;
  191. for (i = 0; i < (1 << RSPQ_HASH_BITS); i++) {
  192. unsigned int size = 64 - sizeof(struct rsp_ctrl) - 8;
  193. cdev->rspq_skb_cache[i] = __alloc_skb(size,
  194. gfp_any(), 0,
  195. lldi->nodeid);
  196. if (unlikely(!cdev->rspq_skb_cache[i]))
  197. goto out_rspq_skb;
  198. }
  199. idr_init(&cdev->hwtid_idr);
  200. INIT_WORK(&cdev->deferq_task, process_deferq);
  201. spin_lock_init(&cdev->listen_lock);
  202. spin_lock_init(&cdev->idr_lock);
  203. cdev->send_page_order = min_t(uint, get_order(32768),
  204. send_page_order);
  205. cdev->max_host_sndbuf = 48 * 1024;
  206. if (lldi->vr->key.size)
  207. if (chtls_init_kmap(cdev, lldi))
  208. goto out_rspq_skb;
  209. mutex_lock(&cdev_mutex);
  210. list_add_tail(&cdev->list, &cdev_list);
  211. mutex_unlock(&cdev_mutex);
  212. return cdev;
  213. out_rspq_skb:
  214. for (j = 0; j < i; j++)
  215. kfree_skb(cdev->rspq_skb_cache[j]);
  216. kfree_skb(cdev->askb);
  217. out_skb:
  218. kfree(lldi);
  219. out_lldi:
  220. kfree(cdev);
  221. out:
  222. return NULL;
  223. }
  224. static void chtls_free_uld(struct chtls_dev *cdev)
  225. {
  226. int i;
  227. chtls_unregister_dev(cdev);
  228. kvfree(cdev->kmap.addr);
  229. idr_destroy(&cdev->hwtid_idr);
  230. for (i = 0; i < (1 << RSPQ_HASH_BITS); i++)
  231. kfree_skb(cdev->rspq_skb_cache[i]);
  232. kfree(cdev->lldi);
  233. kfree_skb(cdev->askb);
  234. kfree(cdev);
  235. }
  236. static void chtls_free_all_uld(void)
  237. {
  238. struct chtls_dev *cdev, *tmp;
  239. mutex_lock(&cdev_mutex);
  240. list_for_each_entry_safe(cdev, tmp, &cdev_list, list) {
  241. if (cdev->cdev_state == CHTLS_CDEV_STATE_UP)
  242. chtls_free_uld(cdev);
  243. }
  244. mutex_unlock(&cdev_mutex);
  245. }
  246. static int chtls_uld_state_change(void *handle, enum cxgb4_state new_state)
  247. {
  248. struct chtls_dev *cdev = handle;
  249. switch (new_state) {
  250. case CXGB4_STATE_UP:
  251. chtls_register_dev(cdev);
  252. break;
  253. case CXGB4_STATE_DOWN:
  254. break;
  255. case CXGB4_STATE_START_RECOVERY:
  256. break;
  257. case CXGB4_STATE_DETACH:
  258. mutex_lock(&cdev_mutex);
  259. list_del(&cdev->list);
  260. mutex_unlock(&cdev_mutex);
  261. chtls_free_uld(cdev);
  262. break;
  263. default:
  264. break;
  265. }
  266. return 0;
  267. }
  268. static struct sk_buff *copy_gl_to_skb_pkt(const struct pkt_gl *gl,
  269. const __be64 *rsp,
  270. u32 pktshift)
  271. {
  272. struct sk_buff *skb;
  273. /* Allocate space for cpl_pass_accpet_req which will be synthesized by
  274. * driver. Once driver synthesizes cpl_pass_accpet_req the skb will go
  275. * through the regular cpl_pass_accept_req processing in TOM.
  276. */
  277. skb = alloc_skb(gl->tot_len + sizeof(struct cpl_pass_accept_req)
  278. - pktshift, GFP_ATOMIC);
  279. if (unlikely(!skb))
  280. return NULL;
  281. __skb_put(skb, gl->tot_len + sizeof(struct cpl_pass_accept_req)
  282. - pktshift);
  283. /* For now we will copy cpl_rx_pkt in the skb */
  284. skb_copy_to_linear_data(skb, rsp, sizeof(struct cpl_rx_pkt));
  285. skb_copy_to_linear_data_offset(skb, sizeof(struct cpl_pass_accept_req)
  286. , gl->va + pktshift,
  287. gl->tot_len - pktshift);
  288. return skb;
  289. }
  290. static int chtls_recv_packet(struct chtls_dev *cdev,
  291. const struct pkt_gl *gl, const __be64 *rsp)
  292. {
  293. unsigned int opcode = *(u8 *)rsp;
  294. struct sk_buff *skb;
  295. int ret;
  296. skb = copy_gl_to_skb_pkt(gl, rsp, cdev->lldi->sge_pktshift);
  297. if (!skb)
  298. return -ENOMEM;
  299. ret = chtls_handlers[opcode](cdev, skb);
  300. if (ret & CPL_RET_BUF_DONE)
  301. kfree_skb(skb);
  302. return 0;
  303. }
  304. static int chtls_recv_rsp(struct chtls_dev *cdev, const __be64 *rsp)
  305. {
  306. unsigned long rspq_bin;
  307. unsigned int opcode;
  308. struct sk_buff *skb;
  309. unsigned int len;
  310. int ret;
  311. len = 64 - sizeof(struct rsp_ctrl) - 8;
  312. opcode = *(u8 *)rsp;
  313. rspq_bin = hash_ptr((void *)rsp, RSPQ_HASH_BITS);
  314. skb = cdev->rspq_skb_cache[rspq_bin];
  315. if (skb && !skb_is_nonlinear(skb) &&
  316. !skb_shared(skb) && !skb_cloned(skb)) {
  317. refcount_inc(&skb->users);
  318. if (refcount_read(&skb->users) == 2) {
  319. __skb_trim(skb, 0);
  320. if (skb_tailroom(skb) >= len)
  321. goto copy_out;
  322. }
  323. refcount_dec(&skb->users);
  324. }
  325. skb = alloc_skb(len, GFP_ATOMIC);
  326. if (unlikely(!skb))
  327. return -ENOMEM;
  328. copy_out:
  329. __skb_put(skb, len);
  330. skb_copy_to_linear_data(skb, rsp, len);
  331. skb_reset_network_header(skb);
  332. skb_reset_transport_header(skb);
  333. ret = chtls_handlers[opcode](cdev, skb);
  334. if (ret & CPL_RET_BUF_DONE)
  335. kfree_skb(skb);
  336. return 0;
  337. }
  338. static void chtls_recv(struct chtls_dev *cdev,
  339. struct sk_buff **skbs, const __be64 *rsp)
  340. {
  341. struct sk_buff *skb = *skbs;
  342. unsigned int opcode;
  343. int ret;
  344. opcode = *(u8 *)rsp;
  345. __skb_push(skb, sizeof(struct rss_header));
  346. skb_copy_to_linear_data(skb, rsp, sizeof(struct rss_header));
  347. ret = chtls_handlers[opcode](cdev, skb);
  348. if (ret & CPL_RET_BUF_DONE)
  349. kfree_skb(skb);
  350. }
  351. static int chtls_uld_rx_handler(void *handle, const __be64 *rsp,
  352. const struct pkt_gl *gl)
  353. {
  354. struct chtls_dev *cdev = handle;
  355. unsigned int opcode;
  356. struct sk_buff *skb;
  357. opcode = *(u8 *)rsp;
  358. if (unlikely(opcode == CPL_RX_PKT)) {
  359. if (chtls_recv_packet(cdev, gl, rsp) < 0)
  360. goto nomem;
  361. return 0;
  362. }
  363. if (!gl)
  364. return chtls_recv_rsp(cdev, rsp);
  365. #define RX_PULL_LEN 128
  366. skb = cxgb4_pktgl_to_skb(gl, RX_PULL_LEN, RX_PULL_LEN);
  367. if (unlikely(!skb))
  368. goto nomem;
  369. chtls_recv(cdev, &skb, rsp);
  370. return 0;
  371. nomem:
  372. return -ENOMEM;
  373. }
  374. static int do_chtls_getsockopt(struct sock *sk, char __user *optval,
  375. int __user *optlen)
  376. {
  377. struct tls_crypto_info crypto_info = { 0 };
  378. crypto_info.version = TLS_1_2_VERSION;
  379. if (copy_to_user(optval, &crypto_info, sizeof(struct tls_crypto_info)))
  380. return -EFAULT;
  381. return 0;
  382. }
  383. static int chtls_getsockopt(struct sock *sk, int level, int optname,
  384. char __user *optval, int __user *optlen)
  385. {
  386. struct tls_context *ctx = tls_get_ctx(sk);
  387. if (level != SOL_TLS)
  388. return ctx->getsockopt(sk, level, optname, optval, optlen);
  389. return do_chtls_getsockopt(sk, optval, optlen);
  390. }
  391. static int do_chtls_setsockopt(struct sock *sk, int optname,
  392. char __user *optval, unsigned int optlen)
  393. {
  394. struct tls_crypto_info *crypto_info, tmp_crypto_info;
  395. struct chtls_sock *csk;
  396. int keylen;
  397. int rc = 0;
  398. csk = rcu_dereference_sk_user_data(sk);
  399. if (!optval || optlen < sizeof(*crypto_info)) {
  400. rc = -EINVAL;
  401. goto out;
  402. }
  403. rc = copy_from_user(&tmp_crypto_info, optval, sizeof(*crypto_info));
  404. if (rc) {
  405. rc = -EFAULT;
  406. goto out;
  407. }
  408. /* check version */
  409. if (tmp_crypto_info.version != TLS_1_2_VERSION) {
  410. rc = -ENOTSUPP;
  411. goto out;
  412. }
  413. crypto_info = (struct tls_crypto_info *)&csk->tlshws.crypto_info;
  414. switch (tmp_crypto_info.cipher_type) {
  415. case TLS_CIPHER_AES_GCM_128: {
  416. /* Obtain version and type from previous copy */
  417. crypto_info[0] = tmp_crypto_info;
  418. /* Now copy the following data */
  419. rc = copy_from_user((char *)crypto_info + sizeof(*crypto_info),
  420. optval + sizeof(*crypto_info),
  421. sizeof(struct tls12_crypto_info_aes_gcm_128)
  422. - sizeof(*crypto_info));
  423. if (rc) {
  424. rc = -EFAULT;
  425. goto out;
  426. }
  427. keylen = TLS_CIPHER_AES_GCM_128_KEY_SIZE;
  428. rc = chtls_setkey(csk, keylen, optname);
  429. break;
  430. }
  431. default:
  432. rc = -EINVAL;
  433. goto out;
  434. }
  435. out:
  436. return rc;
  437. }
  438. static int chtls_setsockopt(struct sock *sk, int level, int optname,
  439. char __user *optval, unsigned int optlen)
  440. {
  441. struct tls_context *ctx = tls_get_ctx(sk);
  442. if (level != SOL_TLS)
  443. return ctx->setsockopt(sk, level, optname, optval, optlen);
  444. return do_chtls_setsockopt(sk, optname, optval, optlen);
  445. }
  446. static struct cxgb4_uld_info chtls_uld_info = {
  447. .name = DRV_NAME,
  448. .nrxq = MAX_ULD_QSETS,
  449. .ntxq = MAX_ULD_QSETS,
  450. .rxq_size = 1024,
  451. .add = chtls_uld_add,
  452. .state_change = chtls_uld_state_change,
  453. .rx_handler = chtls_uld_rx_handler,
  454. };
  455. void chtls_install_cpl_ops(struct sock *sk)
  456. {
  457. sk->sk_prot = &chtls_cpl_prot;
  458. }
  459. static void __init chtls_init_ulp_ops(void)
  460. {
  461. chtls_cpl_prot = tcp_prot;
  462. chtls_init_rsk_ops(&chtls_cpl_prot, &chtls_rsk_ops,
  463. &tcp_prot, PF_INET);
  464. chtls_cpl_prot.close = chtls_close;
  465. chtls_cpl_prot.disconnect = chtls_disconnect;
  466. chtls_cpl_prot.destroy = chtls_destroy_sock;
  467. chtls_cpl_prot.shutdown = chtls_shutdown;
  468. chtls_cpl_prot.sendmsg = chtls_sendmsg;
  469. chtls_cpl_prot.sendpage = chtls_sendpage;
  470. chtls_cpl_prot.recvmsg = chtls_recvmsg;
  471. chtls_cpl_prot.setsockopt = chtls_setsockopt;
  472. chtls_cpl_prot.getsockopt = chtls_getsockopt;
  473. }
  474. static int __init chtls_register(void)
  475. {
  476. chtls_init_ulp_ops();
  477. register_listen_notifier(&listen_notifier);
  478. cxgb4_register_uld(CXGB4_ULD_TLS, &chtls_uld_info);
  479. return 0;
  480. }
  481. static void __exit chtls_unregister(void)
  482. {
  483. unregister_listen_notifier(&listen_notifier);
  484. chtls_free_all_uld();
  485. cxgb4_unregister_uld(CXGB4_ULD_TLS);
  486. }
  487. module_init(chtls_register);
  488. module_exit(chtls_unregister);
  489. MODULE_DESCRIPTION("Chelsio TLS Inline driver");
  490. MODULE_LICENSE("GPL");
  491. MODULE_AUTHOR("Chelsio Communications");
  492. MODULE_VERSION(DRV_VERSION);