• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2018 Chelsio Communications, Inc.
3  *
4  * This program is free software; you can redistribute it and/or modify
5  * it under the terms of the GNU General Public License version 2 as
6  * published by the Free Software Foundation.
7  */
8 
9 #ifndef __CHTLS_H__
10 #define __CHTLS_H__
11 
12 #include <crypto/aes.h>
13 #include <crypto/algapi.h>
14 #include <crypto/hash.h>
15 #include <crypto/sha.h>
16 #include <crypto/authenc.h>
17 #include <crypto/ctr.h>
18 #include <crypto/gf128mul.h>
19 #include <crypto/internal/aead.h>
20 #include <crypto/null.h>
21 #include <crypto/internal/skcipher.h>
22 #include <crypto/aead.h>
23 #include <crypto/scatterwalk.h>
24 #include <crypto/internal/hash.h>
25 #include <linux/tls.h>
26 #include <net/tls.h>
27 
28 #include "t4fw_api.h"
29 #include "t4_msg.h"
30 #include "cxgb4.h"
31 #include "cxgb4_uld.h"
32 #include "l2t.h"
33 #include "chcr_algo.h"
34 #include "chcr_core.h"
35 #include "chcr_crypto.h"
36 
37 #define MAX_IVS_PAGE			256
38 #define TLS_KEY_CONTEXT_SZ		64
39 #define CIPHER_BLOCK_SIZE		16
40 #define GCM_TAG_SIZE			16
41 #define KEY_ON_MEM_SZ			16
42 #define AEAD_EXPLICIT_DATA_SIZE		8
43 #define TLS_HEADER_LENGTH		5
44 #define SCMD_CIPH_MODE_AES_GCM		2
45 /* Any MFS size should work and come from openssl */
46 #define TLS_MFS				16384
47 
48 #define RSS_HDR sizeof(struct rss_header)
49 #define TLS_WR_CPL_LEN \
50 	(sizeof(struct fw_tlstx_data_wr) + sizeof(struct cpl_tx_tls_sfo))
51 
52 enum {
53 	CHTLS_KEY_CONTEXT_DSGL,
54 	CHTLS_KEY_CONTEXT_IMM,
55 	CHTLS_KEY_CONTEXT_DDR,
56 };
57 
58 enum {
59 	CHTLS_LISTEN_START,
60 	CHTLS_LISTEN_STOP,
61 };
62 
63 /* Flags for return value of CPL message handlers */
64 enum {
65 	CPL_RET_BUF_DONE =    1,   /* buffer processing done */
66 	CPL_RET_BAD_MSG =     2,   /* bad CPL message */
67 	CPL_RET_UNKNOWN_TID = 4    /* unexpected unknown TID */
68 };
69 
70 #define LISTEN_INFO_HASH_SIZE 32
71 #define RSPQ_HASH_BITS 5
72 struct listen_info {
73 	struct listen_info *next;  /* Link to next entry */
74 	struct sock *sk;           /* The listening socket */
75 	unsigned int stid;         /* The server TID */
76 };
77 
78 enum {
79 	T4_LISTEN_START_PENDING,
80 	T4_LISTEN_STARTED
81 };
82 
83 enum csk_flags {
84 	CSK_CALLBACKS_CHKD,	/* socket callbacks have been sanitized */
85 	CSK_ABORT_REQ_RCVD,	/* received one ABORT_REQ_RSS message */
86 	CSK_TX_MORE_DATA,	/* sending ULP data; don't set SHOVE bit */
87 	CSK_TX_WAIT_IDLE,	/* suspend Tx until in-flight data is ACKed */
88 	CSK_ABORT_SHUTDOWN,	/* shouldn't send more abort requests */
89 	CSK_ABORT_RPL_PENDING,	/* expecting an abort reply */
90 	CSK_CLOSE_CON_REQUESTED,/* we've sent a close_conn_req */
91 	CSK_TX_DATA_SENT,	/* sent a TX_DATA WR on this connection */
92 	CSK_TX_FAILOVER,	/* Tx traffic failing over */
93 	CSK_UPDATE_RCV_WND,	/* Need to update rcv window */
94 	CSK_RST_ABORTED,	/* outgoing RST was aborted */
95 	CSK_TLS_HANDSHK,	/* TLS Handshake */
96 	CSK_CONN_INLINE,	/* Connection on HW */
97 };
98 
99 enum chtls_cdev_state {
100 	CHTLS_CDEV_STATE_UP = 1
101 };
102 
103 struct listen_ctx {
104 	struct sock *lsk;
105 	struct chtls_dev *cdev;
106 	struct sk_buff_head synq;
107 	u32 state;
108 };
109 
110 struct key_map {
111 	unsigned long *addr;
112 	unsigned int start;
113 	unsigned int available;
114 	unsigned int size;
115 	spinlock_t lock; /* lock for key id request from map */
116 } __packed;
117 
118 struct tls_scmd {
119 	u32 seqno_numivs;
120 	u32 ivgen_hdrlen;
121 };
122 
123 struct chtls_dev {
124 	struct tls_device tlsdev;
125 	struct list_head list;
126 	struct cxgb4_lld_info *lldi;
127 	struct pci_dev *pdev;
128 	struct listen_info *listen_hash_tab[LISTEN_INFO_HASH_SIZE];
129 	spinlock_t listen_lock; /* lock for listen list */
130 	struct net_device **ports;
131 	struct tid_info *tids;
132 	unsigned int pfvf;
133 	const unsigned short *mtus;
134 
135 	struct idr hwtid_idr;
136 	struct idr stid_idr;
137 
138 	spinlock_t idr_lock ____cacheline_aligned_in_smp;
139 
140 	struct net_device *egr_dev[NCHAN * 2];
141 	struct sk_buff *rspq_skb_cache[1 << RSPQ_HASH_BITS];
142 	struct sk_buff *askb;
143 
144 	struct sk_buff_head deferq;
145 	struct work_struct deferq_task;
146 
147 	struct list_head list_node;
148 	struct list_head rcu_node;
149 	struct list_head na_node;
150 	unsigned int send_page_order;
151 	int max_host_sndbuf;
152 	struct key_map kmap;
153 	unsigned int cdev_state;
154 };
155 
156 struct chtls_listen {
157 	struct chtls_dev *cdev;
158 	struct sock *sk;
159 };
160 
161 struct chtls_hws {
162 	struct sk_buff_head sk_recv_queue;
163 	u8 txqid;
164 	u8 ofld;
165 	u16 type;
166 	u16 rstate;
167 	u16 keyrpl;
168 	u16 pldlen;
169 	u16 rcvpld;
170 	u16 compute;
171 	u16 expansion;
172 	u16 keylen;
173 	u16 pdus;
174 	u16 adjustlen;
175 	u16 ivsize;
176 	u16 txleft;
177 	u32 mfs;
178 	s32 txkey;
179 	s32 rxkey;
180 	u32 fcplenmax;
181 	u32 copied_seq;
182 	u64 tx_seq_no;
183 	struct tls_scmd scmd;
184 	struct tls12_crypto_info_aes_gcm_128 crypto_info;
185 };
186 
187 struct chtls_sock {
188 	struct sock *sk;
189 	struct chtls_dev *cdev;
190 	struct l2t_entry *l2t_entry;    /* pointer to the L2T entry */
191 	struct net_device *egress_dev;  /* TX_CHAN for act open retry */
192 
193 	struct sk_buff_head txq;
194 	struct sk_buff *wr_skb_head;
195 	struct sk_buff *wr_skb_tail;
196 	struct sk_buff *ctrl_skb_cache;
197 	struct sk_buff *txdata_skb_cache; /* abort path messages */
198 	struct kref kref;
199 	unsigned long flags;
200 	u32 opt2;
201 	u32 wr_credits;
202 	u32 wr_unacked;
203 	u32 wr_max_credits;
204 	u32 wr_nondata;
205 	u32 hwtid;               /* TCP Control Block ID */
206 	u32 txq_idx;
207 	u32 rss_qid;
208 	u32 tid;
209 	u32 idr;
210 	u32 mss;
211 	u32 ulp_mode;
212 	u32 tx_chan;
213 	u32 rx_chan;
214 	u32 sndbuf;
215 	u32 txplen_max;
216 	u32 mtu_idx;           /* MTU table index */
217 	u32 smac_idx;
218 	u8 port_id;
219 	u8 tos;
220 	u16 resv2;
221 	u32 delack_mode;
222 	u32 delack_seq;
223 
224 	void *passive_reap_next;        /* placeholder for passive */
225 	struct chtls_hws tlshws;
226 	struct synq {
227 		struct sk_buff *next;
228 		struct sk_buff *prev;
229 	} synq;
230 	struct listen_ctx *listen_ctx;
231 };
232 
233 struct tls_hdr {
234 	u8  type;
235 	u16 version;
236 	u16 length;
237 } __packed;
238 
239 struct tlsrx_cmp_hdr {
240 	u8  type;
241 	u16 version;
242 	u16 length;
243 
244 	u64 tls_seq;
245 	u16 reserved1;
246 	u8  res_to_mac_error;
247 } __packed;
248 
249 /* res_to_mac_error fields */
250 #define TLSRX_HDR_PKT_INT_ERROR_S   4
251 #define TLSRX_HDR_PKT_INT_ERROR_M   0x1
252 #define TLSRX_HDR_PKT_INT_ERROR_V(x) \
253 	((x) << TLSRX_HDR_PKT_INT_ERROR_S)
254 #define TLSRX_HDR_PKT_INT_ERROR_G(x) \
255 	(((x) >> TLSRX_HDR_PKT_INT_ERROR_S) & TLSRX_HDR_PKT_INT_ERROR_M)
256 #define TLSRX_HDR_PKT_INT_ERROR_F   TLSRX_HDR_PKT_INT_ERROR_V(1U)
257 
258 #define TLSRX_HDR_PKT_SPP_ERROR_S        3
259 #define TLSRX_HDR_PKT_SPP_ERROR_M        0x1
260 #define TLSRX_HDR_PKT_SPP_ERROR_V(x)     ((x) << TLSRX_HDR_PKT_SPP_ERROR)
261 #define TLSRX_HDR_PKT_SPP_ERROR_G(x)     \
262 	(((x) >> TLSRX_HDR_PKT_SPP_ERROR_S) & TLSRX_HDR_PKT_SPP_ERROR_M)
263 #define TLSRX_HDR_PKT_SPP_ERROR_F        TLSRX_HDR_PKT_SPP_ERROR_V(1U)
264 
265 #define TLSRX_HDR_PKT_CCDX_ERROR_S       2
266 #define TLSRX_HDR_PKT_CCDX_ERROR_M       0x1
267 #define TLSRX_HDR_PKT_CCDX_ERROR_V(x)    ((x) << TLSRX_HDR_PKT_CCDX_ERROR_S)
268 #define TLSRX_HDR_PKT_CCDX_ERROR_G(x)    \
269 	(((x) >> TLSRX_HDR_PKT_CCDX_ERROR_S) & TLSRX_HDR_PKT_CCDX_ERROR_M)
270 #define TLSRX_HDR_PKT_CCDX_ERROR_F       TLSRX_HDR_PKT_CCDX_ERROR_V(1U)
271 
272 #define TLSRX_HDR_PKT_PAD_ERROR_S        1
273 #define TLSRX_HDR_PKT_PAD_ERROR_M        0x1
274 #define TLSRX_HDR_PKT_PAD_ERROR_V(x)     ((x) << TLSRX_HDR_PKT_PAD_ERROR_S)
275 #define TLSRX_HDR_PKT_PAD_ERROR_G(x)     \
276 	(((x) >> TLSRX_HDR_PKT_PAD_ERROR_S) & TLSRX_HDR_PKT_PAD_ERROR_M)
277 #define TLSRX_HDR_PKT_PAD_ERROR_F        TLSRX_HDR_PKT_PAD_ERROR_V(1U)
278 
279 #define TLSRX_HDR_PKT_MAC_ERROR_S        0
280 #define TLSRX_HDR_PKT_MAC_ERROR_M        0x1
281 #define TLSRX_HDR_PKT_MAC_ERROR_V(x)     ((x) << TLSRX_HDR_PKT_MAC_ERROR)
282 #define TLSRX_HDR_PKT_MAC_ERROR_G(x)     \
283 	(((x) >> S_TLSRX_HDR_PKT_MAC_ERROR_S) & TLSRX_HDR_PKT_MAC_ERROR_M)
284 #define TLSRX_HDR_PKT_MAC_ERROR_F        TLSRX_HDR_PKT_MAC_ERROR_V(1U)
285 
286 #define TLSRX_HDR_PKT_ERROR_M           0x1F
287 #define CONTENT_TYPE_ERROR		0x7F
288 
289 struct ulp_mem_rw {
290 	__be32 cmd;
291 	__be32 len16;             /* command length */
292 	__be32 dlen;              /* data length in 32-byte units */
293 	__be32 lock_addr;
294 };
295 
296 struct tls_key_wr {
297 	__be32 op_to_compl;
298 	__be32 flowid_len16;
299 	__be32 ftid;
300 	u8   reneg_to_write_rx;
301 	u8   protocol;
302 	__be16 mfs;
303 };
304 
305 struct tls_key_req {
306 	struct tls_key_wr wr;
307 	struct ulp_mem_rw req;
308 	struct ulptx_idata sc_imm;
309 };
310 
311 /*
312  * This lives in skb->cb and is used to chain WRs in a linked list.
313  */
314 struct wr_skb_cb {
315 	struct l2t_skb_cb l2t;          /* reserve space for l2t CB */
316 	struct sk_buff *next_wr;        /* next write request */
317 };
318 
319 /* Per-skb backlog handler.  Run when a socket's backlog is processed. */
320 struct blog_skb_cb {
321 	void (*backlog_rcv)(struct sock *sk, struct sk_buff *skb);
322 	struct chtls_dev *cdev;
323 };
324 
325 /*
326  * Similar to tcp_skb_cb but with ULP elements added to support TLS,
327  * etc.
328  */
329 struct ulp_skb_cb {
330 	struct wr_skb_cb wr;		/* reserve space for write request */
331 	u16 flags;			/* TCP-like flags */
332 	u8 psh;
333 	u8 ulp_mode;			/* ULP mode/submode of sk_buff */
334 	u32 seq;			/* TCP sequence number */
335 	union { /* ULP-specific fields */
336 		struct {
337 			u8  type;
338 			u8  ofld;
339 			u8  iv;
340 		} tls;
341 	} ulp;
342 };
343 
344 #define ULP_SKB_CB(skb) ((struct ulp_skb_cb *)&((skb)->cb[0]))
345 #define BLOG_SKB_CB(skb) ((struct blog_skb_cb *)(skb)->cb)
346 
347 /*
348  * Flags for ulp_skb_cb.flags.
349  */
350 enum {
351 	ULPCB_FLAG_NEED_HDR  = 1 << 0,	/* packet needs a TX_DATA_WR header */
352 	ULPCB_FLAG_NO_APPEND = 1 << 1,	/* don't grow this skb */
353 	ULPCB_FLAG_BARRIER   = 1 << 2,	/* set TX_WAIT_IDLE after sending */
354 	ULPCB_FLAG_HOLD      = 1 << 3,	/* skb not ready for Tx yet */
355 	ULPCB_FLAG_COMPL     = 1 << 4,	/* request WR completion */
356 	ULPCB_FLAG_URG       = 1 << 5,	/* urgent data */
357 	ULPCB_FLAG_TLS_HDR   = 1 << 6,  /* payload with tls hdr */
358 	ULPCB_FLAG_NO_HDR    = 1 << 7,  /* not a ofld wr */
359 };
360 
361 /* The ULP mode/submode of an skbuff */
362 #define skb_ulp_mode(skb)  (ULP_SKB_CB(skb)->ulp_mode)
363 #define TCP_PAGE(sk)   (sk->sk_frag.page)
364 #define TCP_OFF(sk)    (sk->sk_frag.offset)
365 
to_chtls_dev(struct tls_device * tlsdev)366 static inline struct chtls_dev *to_chtls_dev(struct tls_device *tlsdev)
367 {
368 	return container_of(tlsdev, struct chtls_dev, tlsdev);
369 }
370 
csk_set_flag(struct chtls_sock * csk,enum csk_flags flag)371 static inline void csk_set_flag(struct chtls_sock *csk,
372 				enum csk_flags flag)
373 {
374 	__set_bit(flag, &csk->flags);
375 }
376 
csk_reset_flag(struct chtls_sock * csk,enum csk_flags flag)377 static inline void csk_reset_flag(struct chtls_sock *csk,
378 				  enum csk_flags flag)
379 {
380 	__clear_bit(flag, &csk->flags);
381 }
382 
csk_conn_inline(const struct chtls_sock * csk)383 static inline bool csk_conn_inline(const struct chtls_sock *csk)
384 {
385 	return test_bit(CSK_CONN_INLINE, &csk->flags);
386 }
387 
csk_flag(const struct sock * sk,enum csk_flags flag)388 static inline int csk_flag(const struct sock *sk, enum csk_flags flag)
389 {
390 	struct chtls_sock *csk = rcu_dereference_sk_user_data(sk);
391 
392 	if (!csk_conn_inline(csk))
393 		return 0;
394 	return test_bit(flag, &csk->flags);
395 }
396 
csk_flag_nochk(const struct chtls_sock * csk,enum csk_flags flag)397 static inline int csk_flag_nochk(const struct chtls_sock *csk,
398 				 enum csk_flags flag)
399 {
400 	return test_bit(flag, &csk->flags);
401 }
402 
cplhdr(struct sk_buff * skb)403 static inline void *cplhdr(struct sk_buff *skb)
404 {
405 	return skb->data;
406 }
407 
is_neg_adv(unsigned int status)408 static inline int is_neg_adv(unsigned int status)
409 {
410 	return status == CPL_ERR_RTX_NEG_ADVICE ||
411 	       status == CPL_ERR_KEEPALV_NEG_ADVICE ||
412 	       status == CPL_ERR_PERSIST_NEG_ADVICE;
413 }
414 
process_cpl_msg(void (* fn)(struct sock *,struct sk_buff *),struct sock * sk,struct sk_buff * skb)415 static inline void process_cpl_msg(void (*fn)(struct sock *, struct sk_buff *),
416 				   struct sock *sk,
417 				   struct sk_buff *skb)
418 {
419 	skb_reset_mac_header(skb);
420 	skb_reset_network_header(skb);
421 	skb_reset_transport_header(skb);
422 
423 	bh_lock_sock(sk);
424 	if (unlikely(sock_owned_by_user(sk))) {
425 		BLOG_SKB_CB(skb)->backlog_rcv = fn;
426 		__sk_add_backlog(sk, skb);
427 	} else {
428 		fn(sk, skb);
429 	}
430 	bh_unlock_sock(sk);
431 }
432 
chtls_sock_free(struct kref * ref)433 static inline void chtls_sock_free(struct kref *ref)
434 {
435 	struct chtls_sock *csk = container_of(ref, struct chtls_sock,
436 					      kref);
437 	kfree(csk);
438 }
439 
__chtls_sock_put(const char * fn,struct chtls_sock * csk)440 static inline void __chtls_sock_put(const char *fn, struct chtls_sock *csk)
441 {
442 	kref_put(&csk->kref, chtls_sock_free);
443 }
444 
__chtls_sock_get(const char * fn,struct chtls_sock * csk)445 static inline void __chtls_sock_get(const char *fn,
446 				    struct chtls_sock *csk)
447 {
448 	kref_get(&csk->kref);
449 }
450 
send_or_defer(struct sock * sk,struct tcp_sock * tp,struct sk_buff * skb,int through_l2t)451 static inline void send_or_defer(struct sock *sk, struct tcp_sock *tp,
452 				 struct sk_buff *skb, int through_l2t)
453 {
454 	struct chtls_sock *csk = rcu_dereference_sk_user_data(sk);
455 
456 	if (through_l2t) {
457 		/* send through L2T */
458 		cxgb4_l2t_send(csk->egress_dev, skb, csk->l2t_entry);
459 	} else {
460 		/* send directly */
461 		cxgb4_ofld_send(csk->egress_dev, skb);
462 	}
463 }
464 
465 typedef int (*chtls_handler_func)(struct chtls_dev *, struct sk_buff *);
466 extern chtls_handler_func chtls_handlers[NUM_CPL_CMDS];
467 void chtls_install_cpl_ops(struct sock *sk);
468 int chtls_init_kmap(struct chtls_dev *cdev, struct cxgb4_lld_info *lldi);
469 void chtls_listen_stop(struct chtls_dev *cdev, struct sock *sk);
470 int chtls_listen_start(struct chtls_dev *cdev, struct sock *sk);
471 void chtls_close(struct sock *sk, long timeout);
472 int chtls_disconnect(struct sock *sk, int flags);
473 void chtls_shutdown(struct sock *sk, int how);
474 void chtls_destroy_sock(struct sock *sk);
475 int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size);
476 int chtls_recvmsg(struct sock *sk, struct msghdr *msg,
477 		  size_t len, int nonblock, int flags, int *addr_len);
478 int chtls_sendpage(struct sock *sk, struct page *page,
479 		   int offset, size_t size, int flags);
480 int send_tx_flowc_wr(struct sock *sk, int compl,
481 		     u32 snd_nxt, u32 rcv_nxt);
482 void chtls_tcp_push(struct sock *sk, int flags);
483 int chtls_push_frames(struct chtls_sock *csk, int comp);
484 int chtls_set_tcb_tflag(struct sock *sk, unsigned int bit_pos, int val);
485 int chtls_setkey(struct chtls_sock *csk, u32 keylen, u32 mode);
486 void skb_entail(struct sock *sk, struct sk_buff *skb, int flags);
487 unsigned int keyid_to_addr(int start_addr, int keyid);
488 void free_tls_keyid(struct sock *sk);
489 #endif
490