1 /*
2  * Copyright (c) 2018 Chelsio Communications, Inc.
3  *
4  * This program is free software; you can redistribute it and/or modify
5  * it under the terms of the GNU General Public License version 2 as
6  * published by the Free Software Foundation.
7  *
8  * Written by: Atul Gupta (atul.gupta@chelsio.com)
9  */
10 #include <linux/kernel.h>
11 #include <linux/module.h>
12 #include <linux/skbuff.h>
13 #include <linux/socket.h>
14 #include <linux/hash.h>
15 #include <linux/in.h>
16 #include <linux/net.h>
17 #include <linux/ip.h>
18 #include <linux/tcp.h>
19 #include <net/tcp.h>
20 #include <net/tls.h>
21 
22 #include "chtls.h"
23 #include "chtls_cm.h"
24 
25 #define DRV_NAME "chtls"
26 
27 /*
28  * chtls device management
29  * maintains a list of the chtls devices
30  */
31 static LIST_HEAD(cdev_list);
32 static DEFINE_MUTEX(cdev_mutex);
33 static DEFINE_MUTEX(cdev_list_lock);
34 
35 static DEFINE_MUTEX(notify_mutex);
36 static RAW_NOTIFIER_HEAD(listen_notify_list);
37 static struct proto chtls_cpl_prot;
38 struct request_sock_ops chtls_rsk_ops;
39 static uint send_page_order = (14 - PAGE_SHIFT < 0) ? 0 : 14 - PAGE_SHIFT;
40 
register_listen_notifier(struct notifier_block * nb)41 static void register_listen_notifier(struct notifier_block *nb)
42 {
43 	mutex_lock(&notify_mutex);
44 	raw_notifier_chain_register(&listen_notify_list, nb);
45 	mutex_unlock(&notify_mutex);
46 }
47 
unregister_listen_notifier(struct notifier_block * nb)48 static void unregister_listen_notifier(struct notifier_block *nb)
49 {
50 	mutex_lock(&notify_mutex);
51 	raw_notifier_chain_unregister(&listen_notify_list, nb);
52 	mutex_unlock(&notify_mutex);
53 }
54 
listen_notify_handler(struct notifier_block * this,unsigned long event,void * data)55 static int listen_notify_handler(struct notifier_block *this,
56 				 unsigned long event, void *data)
57 {
58 	struct chtls_dev *cdev;
59 	struct sock *sk;
60 	int ret;
61 
62 	sk = data;
63 	ret =  NOTIFY_DONE;
64 
65 	switch (event) {
66 	case CHTLS_LISTEN_START:
67 	case CHTLS_LISTEN_STOP:
68 		mutex_lock(&cdev_list_lock);
69 		list_for_each_entry(cdev, &cdev_list, list) {
70 			if (event == CHTLS_LISTEN_START)
71 				ret = chtls_listen_start(cdev, sk);
72 			else
73 				chtls_listen_stop(cdev, sk);
74 		}
75 		mutex_unlock(&cdev_list_lock);
76 		break;
77 	}
78 	return ret;
79 }
80 
81 static struct notifier_block listen_notifier = {
82 	.notifier_call = listen_notify_handler
83 };
84 
listen_backlog_rcv(struct sock * sk,struct sk_buff * skb)85 static int listen_backlog_rcv(struct sock *sk, struct sk_buff *skb)
86 {
87 	if (likely(skb_transport_header(skb) != skb_network_header(skb)))
88 		return tcp_v4_do_rcv(sk, skb);
89 	BLOG_SKB_CB(skb)->backlog_rcv(sk, skb);
90 	return 0;
91 }
92 
chtls_start_listen(struct sock * sk)93 static int chtls_start_listen(struct sock *sk)
94 {
95 	int err;
96 
97 	if (sk->sk_protocol != IPPROTO_TCP)
98 		return -EPROTONOSUPPORT;
99 
100 	if (sk->sk_family == PF_INET &&
101 	    LOOPBACK(inet_sk(sk)->inet_rcv_saddr))
102 		return -EADDRNOTAVAIL;
103 
104 	sk->sk_backlog_rcv = listen_backlog_rcv;
105 	mutex_lock(&notify_mutex);
106 	err = raw_notifier_call_chain(&listen_notify_list,
107 				      CHTLS_LISTEN_START, sk);
108 	mutex_unlock(&notify_mutex);
109 	return err;
110 }
111 
chtls_stop_listen(struct sock * sk)112 static void chtls_stop_listen(struct sock *sk)
113 {
114 	if (sk->sk_protocol != IPPROTO_TCP)
115 		return;
116 
117 	mutex_lock(&notify_mutex);
118 	raw_notifier_call_chain(&listen_notify_list,
119 				CHTLS_LISTEN_STOP, sk);
120 	mutex_unlock(&notify_mutex);
121 }
122 
chtls_inline_feature(struct tls_device * dev)123 static int chtls_inline_feature(struct tls_device *dev)
124 {
125 	struct net_device *netdev;
126 	struct chtls_dev *cdev;
127 	int i;
128 
129 	cdev = to_chtls_dev(dev);
130 
131 	for (i = 0; i < cdev->lldi->nports; i++) {
132 		netdev = cdev->ports[i];
133 		if (netdev->features & NETIF_F_HW_TLS_RECORD)
134 			return 1;
135 	}
136 	return 0;
137 }
138 
chtls_create_hash(struct tls_device * dev,struct sock * sk)139 static int chtls_create_hash(struct tls_device *dev, struct sock *sk)
140 {
141 	if (sk->sk_state == TCP_LISTEN)
142 		return chtls_start_listen(sk);
143 	return 0;
144 }
145 
chtls_destroy_hash(struct tls_device * dev,struct sock * sk)146 static void chtls_destroy_hash(struct tls_device *dev, struct sock *sk)
147 {
148 	if (sk->sk_state == TCP_LISTEN)
149 		chtls_stop_listen(sk);
150 }
151 
chtls_register_dev(struct chtls_dev * cdev)152 static void chtls_register_dev(struct chtls_dev *cdev)
153 {
154 	struct tls_device *tlsdev = &cdev->tlsdev;
155 
156 	strlcpy(tlsdev->name, "chtls", TLS_DEVICE_NAME_MAX);
157 	strlcat(tlsdev->name, cdev->lldi->ports[0]->name,
158 		TLS_DEVICE_NAME_MAX);
159 	tlsdev->feature = chtls_inline_feature;
160 	tlsdev->hash = chtls_create_hash;
161 	tlsdev->unhash = chtls_destroy_hash;
162 	tls_register_device(&cdev->tlsdev);
163 	cdev->cdev_state = CHTLS_CDEV_STATE_UP;
164 }
165 
chtls_unregister_dev(struct chtls_dev * cdev)166 static void chtls_unregister_dev(struct chtls_dev *cdev)
167 {
168 	tls_unregister_device(&cdev->tlsdev);
169 }
170 
process_deferq(struct work_struct * task_param)171 static void process_deferq(struct work_struct *task_param)
172 {
173 	struct chtls_dev *cdev = container_of(task_param,
174 				struct chtls_dev, deferq_task);
175 	struct sk_buff *skb;
176 
177 	spin_lock_bh(&cdev->deferq.lock);
178 	while ((skb = __skb_dequeue(&cdev->deferq)) != NULL) {
179 		spin_unlock_bh(&cdev->deferq.lock);
180 		DEFERRED_SKB_CB(skb)->handler(cdev, skb);
181 		spin_lock_bh(&cdev->deferq.lock);
182 	}
183 	spin_unlock_bh(&cdev->deferq.lock);
184 }
185 
chtls_get_skb(struct chtls_dev * cdev)186 static int chtls_get_skb(struct chtls_dev *cdev)
187 {
188 	cdev->askb = alloc_skb(sizeof(struct tcphdr), GFP_KERNEL);
189 	if (!cdev->askb)
190 		return -ENOMEM;
191 
192 	skb_put(cdev->askb, sizeof(struct tcphdr));
193 	skb_reset_transport_header(cdev->askb);
194 	memset(cdev->askb->data, 0, cdev->askb->len);
195 	return 0;
196 }
197 
chtls_uld_add(const struct cxgb4_lld_info * info)198 static void *chtls_uld_add(const struct cxgb4_lld_info *info)
199 {
200 	struct cxgb4_lld_info *lldi;
201 	struct chtls_dev *cdev;
202 	int i, j;
203 
204 	cdev = kzalloc(sizeof(*cdev) + info->nports *
205 		      (sizeof(struct net_device *)), GFP_KERNEL);
206 	if (!cdev)
207 		goto out;
208 
209 	lldi = kzalloc(sizeof(*lldi), GFP_KERNEL);
210 	if (!lldi)
211 		goto out_lldi;
212 
213 	if (chtls_get_skb(cdev))
214 		goto out_skb;
215 
216 	*lldi = *info;
217 	cdev->lldi = lldi;
218 	cdev->pdev = lldi->pdev;
219 	cdev->tids = lldi->tids;
220 	cdev->ports = lldi->ports;
221 	cdev->mtus = lldi->mtus;
222 	cdev->tids = lldi->tids;
223 	cdev->pfvf = FW_VIID_PFN_G(cxgb4_port_viid(lldi->ports[0]))
224 			<< FW_VIID_PFN_S;
225 
226 	for (i = 0; i < (1 << RSPQ_HASH_BITS); i++) {
227 		unsigned int size = 64 - sizeof(struct rsp_ctrl) - 8;
228 
229 		cdev->rspq_skb_cache[i] = __alloc_skb(size,
230 						      gfp_any(), 0,
231 						      lldi->nodeid);
232 		if (unlikely(!cdev->rspq_skb_cache[i]))
233 			goto out_rspq_skb;
234 	}
235 
236 	idr_init(&cdev->hwtid_idr);
237 	INIT_WORK(&cdev->deferq_task, process_deferq);
238 	spin_lock_init(&cdev->listen_lock);
239 	spin_lock_init(&cdev->idr_lock);
240 	cdev->send_page_order = min_t(uint, get_order(32768),
241 				      send_page_order);
242 	cdev->max_host_sndbuf = 48 * 1024;
243 
244 	if (lldi->vr->key.size)
245 		if (chtls_init_kmap(cdev, lldi))
246 			goto out_rspq_skb;
247 
248 	mutex_lock(&cdev_mutex);
249 	list_add_tail(&cdev->list, &cdev_list);
250 	mutex_unlock(&cdev_mutex);
251 
252 	return cdev;
253 out_rspq_skb:
254 	for (j = 0; j < i; j++)
255 		kfree_skb(cdev->rspq_skb_cache[j]);
256 	kfree_skb(cdev->askb);
257 out_skb:
258 	kfree(lldi);
259 out_lldi:
260 	kfree(cdev);
261 out:
262 	return NULL;
263 }
264 
chtls_free_uld(struct chtls_dev * cdev)265 static void chtls_free_uld(struct chtls_dev *cdev)
266 {
267 	int i;
268 
269 	chtls_unregister_dev(cdev);
270 	kvfree(cdev->kmap.addr);
271 	idr_destroy(&cdev->hwtid_idr);
272 	for (i = 0; i < (1 << RSPQ_HASH_BITS); i++)
273 		kfree_skb(cdev->rspq_skb_cache[i]);
274 	kfree(cdev->lldi);
275 	if (cdev->askb)
276 		kfree_skb(cdev->askb);
277 	kfree(cdev);
278 }
279 
chtls_free_all_uld(void)280 static void chtls_free_all_uld(void)
281 {
282 	struct chtls_dev *cdev, *tmp;
283 
284 	mutex_lock(&cdev_mutex);
285 	list_for_each_entry_safe(cdev, tmp, &cdev_list, list) {
286 		if (cdev->cdev_state == CHTLS_CDEV_STATE_UP)
287 			chtls_free_uld(cdev);
288 	}
289 	mutex_unlock(&cdev_mutex);
290 }
291 
chtls_uld_state_change(void * handle,enum cxgb4_state new_state)292 static int chtls_uld_state_change(void *handle, enum cxgb4_state new_state)
293 {
294 	struct chtls_dev *cdev = handle;
295 
296 	switch (new_state) {
297 	case CXGB4_STATE_UP:
298 		chtls_register_dev(cdev);
299 		break;
300 	case CXGB4_STATE_DOWN:
301 		break;
302 	case CXGB4_STATE_START_RECOVERY:
303 		break;
304 	case CXGB4_STATE_DETACH:
305 		mutex_lock(&cdev_mutex);
306 		list_del(&cdev->list);
307 		mutex_unlock(&cdev_mutex);
308 		chtls_free_uld(cdev);
309 		break;
310 	default:
311 		break;
312 	}
313 	return 0;
314 }
315 
copy_gl_to_skb_pkt(const struct pkt_gl * gl,const __be64 * rsp,u32 pktshift)316 static struct sk_buff *copy_gl_to_skb_pkt(const struct pkt_gl *gl,
317 					  const __be64 *rsp,
318 					  u32 pktshift)
319 {
320 	struct sk_buff *skb;
321 
322 	/* Allocate space for cpl_pass_accpet_req which will be synthesized by
323 	 * driver. Once driver synthesizes cpl_pass_accpet_req the skb will go
324 	 * through the regular cpl_pass_accept_req processing in TOM.
325 	 */
326 	skb = alloc_skb(gl->tot_len + sizeof(struct cpl_pass_accept_req)
327 			- pktshift, GFP_ATOMIC);
328 	if (unlikely(!skb))
329 		return NULL;
330 	__skb_put(skb, gl->tot_len + sizeof(struct cpl_pass_accept_req)
331 		   - pktshift);
332 	/* For now we will copy  cpl_rx_pkt in the skb */
333 	skb_copy_to_linear_data(skb, rsp, sizeof(struct cpl_rx_pkt));
334 	skb_copy_to_linear_data_offset(skb, sizeof(struct cpl_pass_accept_req)
335 				       , gl->va + pktshift,
336 				       gl->tot_len - pktshift);
337 
338 	return skb;
339 }
340 
chtls_recv_packet(struct chtls_dev * cdev,const struct pkt_gl * gl,const __be64 * rsp)341 static int chtls_recv_packet(struct chtls_dev *cdev,
342 			     const struct pkt_gl *gl, const __be64 *rsp)
343 {
344 	unsigned int opcode = *(u8 *)rsp;
345 	struct sk_buff *skb;
346 	int ret;
347 
348 	skb = copy_gl_to_skb_pkt(gl, rsp, cdev->lldi->sge_pktshift);
349 	if (!skb)
350 		return -ENOMEM;
351 
352 	ret = chtls_handlers[opcode](cdev, skb);
353 	if (ret & CPL_RET_BUF_DONE)
354 		kfree_skb(skb);
355 
356 	return 0;
357 }
358 
chtls_recv_rsp(struct chtls_dev * cdev,const __be64 * rsp)359 static int chtls_recv_rsp(struct chtls_dev *cdev, const __be64 *rsp)
360 {
361 	unsigned long rspq_bin;
362 	unsigned int opcode;
363 	struct sk_buff *skb;
364 	unsigned int len;
365 	int ret;
366 
367 	len = 64 - sizeof(struct rsp_ctrl) - 8;
368 	opcode = *(u8 *)rsp;
369 
370 	rspq_bin = hash_ptr((void *)rsp, RSPQ_HASH_BITS);
371 	skb = cdev->rspq_skb_cache[rspq_bin];
372 	if (skb && !skb_is_nonlinear(skb) &&
373 	    !skb_shared(skb) && !skb_cloned(skb)) {
374 		refcount_inc(&skb->users);
375 		if (refcount_read(&skb->users) == 2) {
376 			__skb_trim(skb, 0);
377 			if (skb_tailroom(skb) >= len)
378 				goto copy_out;
379 		}
380 		refcount_dec(&skb->users);
381 	}
382 	skb = alloc_skb(len, GFP_ATOMIC);
383 	if (unlikely(!skb))
384 		return -ENOMEM;
385 
386 copy_out:
387 	__skb_put(skb, len);
388 	skb_copy_to_linear_data(skb, rsp, len);
389 	skb_reset_network_header(skb);
390 	skb_reset_transport_header(skb);
391 	ret = chtls_handlers[opcode](cdev, skb);
392 
393 	if (ret & CPL_RET_BUF_DONE)
394 		kfree_skb(skb);
395 	return 0;
396 }
397 
chtls_recv(struct chtls_dev * cdev,struct sk_buff ** skbs,const __be64 * rsp)398 static void chtls_recv(struct chtls_dev *cdev,
399 		       struct sk_buff **skbs, const __be64 *rsp)
400 {
401 	struct sk_buff *skb = *skbs;
402 	unsigned int opcode;
403 	int ret;
404 
405 	opcode = *(u8 *)rsp;
406 
407 	__skb_push(skb, sizeof(struct rss_header));
408 	skb_copy_to_linear_data(skb, rsp, sizeof(struct rss_header));
409 
410 	ret = chtls_handlers[opcode](cdev, skb);
411 	if (ret & CPL_RET_BUF_DONE)
412 		kfree_skb(skb);
413 }
414 
chtls_uld_rx_handler(void * handle,const __be64 * rsp,const struct pkt_gl * gl)415 static int chtls_uld_rx_handler(void *handle, const __be64 *rsp,
416 				const struct pkt_gl *gl)
417 {
418 	struct chtls_dev *cdev = handle;
419 	unsigned int opcode;
420 	struct sk_buff *skb;
421 
422 	opcode = *(u8 *)rsp;
423 
424 	if (unlikely(opcode == CPL_RX_PKT)) {
425 		if (chtls_recv_packet(cdev, gl, rsp) < 0)
426 			goto nomem;
427 		return 0;
428 	}
429 
430 	if (!gl)
431 		return chtls_recv_rsp(cdev, rsp);
432 
433 #define RX_PULL_LEN 128
434 	skb = cxgb4_pktgl_to_skb(gl, RX_PULL_LEN, RX_PULL_LEN);
435 	if (unlikely(!skb))
436 		goto nomem;
437 	chtls_recv(cdev, &skb, rsp);
438 	return 0;
439 
440 nomem:
441 	return -ENOMEM;
442 }
443 
do_chtls_getsockopt(struct sock * sk,char __user * optval,int __user * optlen)444 static int do_chtls_getsockopt(struct sock *sk, char __user *optval,
445 			       int __user *optlen)
446 {
447 	struct tls_crypto_info crypto_info = { 0 };
448 
449 	crypto_info.version = TLS_1_2_VERSION;
450 	if (copy_to_user(optval, &crypto_info, sizeof(struct tls_crypto_info)))
451 		return -EFAULT;
452 	return 0;
453 }
454 
chtls_getsockopt(struct sock * sk,int level,int optname,char __user * optval,int __user * optlen)455 static int chtls_getsockopt(struct sock *sk, int level, int optname,
456 			    char __user *optval, int __user *optlen)
457 {
458 	struct tls_context *ctx = tls_get_ctx(sk);
459 
460 	if (level != SOL_TLS)
461 		return ctx->getsockopt(sk, level, optname, optval, optlen);
462 
463 	return do_chtls_getsockopt(sk, optval, optlen);
464 }
465 
do_chtls_setsockopt(struct sock * sk,int optname,char __user * optval,unsigned int optlen)466 static int do_chtls_setsockopt(struct sock *sk, int optname,
467 			       char __user *optval, unsigned int optlen)
468 {
469 	struct tls_crypto_info *crypto_info, tmp_crypto_info;
470 	struct chtls_sock *csk;
471 	int keylen;
472 	int rc = 0;
473 
474 	csk = rcu_dereference_sk_user_data(sk);
475 
476 	if (!optval || optlen < sizeof(*crypto_info)) {
477 		rc = -EINVAL;
478 		goto out;
479 	}
480 
481 	rc = copy_from_user(&tmp_crypto_info, optval, sizeof(*crypto_info));
482 	if (rc) {
483 		rc = -EFAULT;
484 		goto out;
485 	}
486 
487 	/* check version */
488 	if (tmp_crypto_info.version != TLS_1_2_VERSION) {
489 		rc = -ENOTSUPP;
490 		goto out;
491 	}
492 
493 	crypto_info = (struct tls_crypto_info *)&csk->tlshws.crypto_info;
494 
495 	switch (tmp_crypto_info.cipher_type) {
496 	case TLS_CIPHER_AES_GCM_128: {
497 		/* Obtain version and type from previous copy */
498 		crypto_info[0] = tmp_crypto_info;
499 		/* Now copy the following data */
500 		rc = copy_from_user((char *)crypto_info + sizeof(*crypto_info),
501 				optval + sizeof(*crypto_info),
502 				sizeof(struct tls12_crypto_info_aes_gcm_128)
503 				- sizeof(*crypto_info));
504 
505 		if (rc) {
506 			rc = -EFAULT;
507 			goto out;
508 		}
509 
510 		keylen = TLS_CIPHER_AES_GCM_128_KEY_SIZE;
511 		rc = chtls_setkey(csk, keylen, optname);
512 		break;
513 	}
514 	default:
515 		rc = -EINVAL;
516 		goto out;
517 	}
518 out:
519 	return rc;
520 }
521 
chtls_setsockopt(struct sock * sk,int level,int optname,char __user * optval,unsigned int optlen)522 static int chtls_setsockopt(struct sock *sk, int level, int optname,
523 			    char __user *optval, unsigned int optlen)
524 {
525 	struct tls_context *ctx = tls_get_ctx(sk);
526 
527 	if (level != SOL_TLS)
528 		return ctx->setsockopt(sk, level, optname, optval, optlen);
529 
530 	return do_chtls_setsockopt(sk, optname, optval, optlen);
531 }
532 
533 static struct cxgb4_uld_info chtls_uld_info = {
534 	.name = DRV_NAME,
535 	.nrxq = MAX_ULD_QSETS,
536 	.ntxq = MAX_ULD_QSETS,
537 	.rxq_size = 1024,
538 	.add = chtls_uld_add,
539 	.state_change = chtls_uld_state_change,
540 	.rx_handler = chtls_uld_rx_handler,
541 };
542 
chtls_install_cpl_ops(struct sock * sk)543 void chtls_install_cpl_ops(struct sock *sk)
544 {
545 	sk->sk_prot = &chtls_cpl_prot;
546 }
547 
chtls_init_ulp_ops(void)548 static void __init chtls_init_ulp_ops(void)
549 {
550 	chtls_cpl_prot			= tcp_prot;
551 	chtls_init_rsk_ops(&chtls_cpl_prot, &chtls_rsk_ops,
552 			   &tcp_prot, PF_INET);
553 	chtls_cpl_prot.close		= chtls_close;
554 	chtls_cpl_prot.disconnect	= chtls_disconnect;
555 	chtls_cpl_prot.destroy		= chtls_destroy_sock;
556 	chtls_cpl_prot.shutdown		= chtls_shutdown;
557 	chtls_cpl_prot.sendmsg		= chtls_sendmsg;
558 	chtls_cpl_prot.sendpage		= chtls_sendpage;
559 	chtls_cpl_prot.recvmsg		= chtls_recvmsg;
560 	chtls_cpl_prot.setsockopt	= chtls_setsockopt;
561 	chtls_cpl_prot.getsockopt	= chtls_getsockopt;
562 }
563 
chtls_register(void)564 static int __init chtls_register(void)
565 {
566 	chtls_init_ulp_ops();
567 	register_listen_notifier(&listen_notifier);
568 	cxgb4_register_uld(CXGB4_ULD_TLS, &chtls_uld_info);
569 	return 0;
570 }
571 
chtls_unregister(void)572 static void __exit chtls_unregister(void)
573 {
574 	unregister_listen_notifier(&listen_notifier);
575 	chtls_free_all_uld();
576 	cxgb4_unregister_uld(CXGB4_ULD_TLS);
577 }
578 
579 module_init(chtls_register);
580 module_exit(chtls_unregister);
581 
582 MODULE_DESCRIPTION("Chelsio TLS Inline driver");
583 MODULE_LICENSE("GPL");
584 MODULE_AUTHOR("Chelsio Communications");
585 MODULE_VERSION(DRV_VERSION);
586