Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Atul Gupta | 2195 | 97.25% | 7 | 38.89% |
Vinay Kumar Yadav | 20 | 0.89% | 3 | 16.67% |
Ganesh Goudar | 12 | 0.53% | 1 | 5.56% |
David Howells | 9 | 0.40% | 1 | 5.56% |
Ayush Sawal | 7 | 0.31% | 1 | 5.56% |
Jakub Kiciński | 5 | 0.22% | 2 | 11.11% |
Eric Biggers | 4 | 0.18% | 1 | 5.56% |
Chuck Lever | 3 | 0.13% | 1 | 5.56% |
Thomas Gleixner | 2 | 0.09% | 1 | 5.56% |
Total | 2257 | 18 |
/* SPDX-License-Identifier: GPL-2.0-only */ /* * Copyright (c) 2018 Chelsio Communications, Inc. */ #ifndef __CHTLS_H__ #define __CHTLS_H__ #include <crypto/aes.h> #include <crypto/hash.h> #include <crypto/sha1.h> #include <crypto/sha2.h> #include <crypto/authenc.h> #include <crypto/ctr.h> #include <crypto/gf128mul.h> #include <crypto/internal/aead.h> #include <crypto/null.h> #include <crypto/internal/skcipher.h> #include <crypto/aead.h> #include <crypto/scatterwalk.h> #include <crypto/internal/hash.h> #include <linux/tls.h> #include <net/tls.h> #include <net/tls_prot.h> #include <net/tls_toe.h> #include "t4fw_api.h" #include "t4_msg.h" #include "cxgb4.h" #include "cxgb4_uld.h" #include "l2t.h" #include "chcr_algo.h" #include "chcr_core.h" #include "chcr_crypto.h" #define CHTLS_DRV_VERSION "1.0.0.0-ko" #define TLS_KEYCTX_RXFLIT_CNT_S 24 #define TLS_KEYCTX_RXFLIT_CNT_V(x) ((x) << TLS_KEYCTX_RXFLIT_CNT_S) #define TLS_KEYCTX_RXPROT_VER_S 20 #define TLS_KEYCTX_RXPROT_VER_M 0xf #define TLS_KEYCTX_RXPROT_VER_V(x) ((x) << TLS_KEYCTX_RXPROT_VER_S) #define TLS_KEYCTX_RXCIPH_MODE_S 16 #define TLS_KEYCTX_RXCIPH_MODE_M 0xf #define TLS_KEYCTX_RXCIPH_MODE_V(x) ((x) << TLS_KEYCTX_RXCIPH_MODE_S) #define TLS_KEYCTX_RXAUTH_MODE_S 12 #define TLS_KEYCTX_RXAUTH_MODE_M 0xf #define TLS_KEYCTX_RXAUTH_MODE_V(x) ((x) << TLS_KEYCTX_RXAUTH_MODE_S) #define TLS_KEYCTX_RXCIAU_CTRL_S 11 #define TLS_KEYCTX_RXCIAU_CTRL_V(x) ((x) << TLS_KEYCTX_RXCIAU_CTRL_S) #define TLS_KEYCTX_RX_SEQCTR_S 9 #define TLS_KEYCTX_RX_SEQCTR_M 0x3 #define TLS_KEYCTX_RX_SEQCTR_V(x) ((x) << TLS_KEYCTX_RX_SEQCTR_S) #define TLS_KEYCTX_RX_VALID_S 8 #define TLS_KEYCTX_RX_VALID_V(x) ((x) << TLS_KEYCTX_RX_VALID_S) #define TLS_KEYCTX_RXCK_SIZE_S 3 #define TLS_KEYCTX_RXCK_SIZE_M 0x7 #define TLS_KEYCTX_RXCK_SIZE_V(x) ((x) << TLS_KEYCTX_RXCK_SIZE_S) #define TLS_KEYCTX_RXMK_SIZE_S 0 #define TLS_KEYCTX_RXMK_SIZE_M 0x7 #define TLS_KEYCTX_RXMK_SIZE_V(x) ((x) << TLS_KEYCTX_RXMK_SIZE_S) #define KEYCTX_TX_WR_IV_S 55 #define KEYCTX_TX_WR_IV_M 0x1ffULL #define KEYCTX_TX_WR_IV_V(x) ((x) << KEYCTX_TX_WR_IV_S) #define KEYCTX_TX_WR_IV_G(x) \ (((x) >> KEYCTX_TX_WR_IV_S) & KEYCTX_TX_WR_IV_M) #define KEYCTX_TX_WR_AAD_S 47 #define KEYCTX_TX_WR_AAD_M 0xffULL #define KEYCTX_TX_WR_AAD_V(x) ((x) << KEYCTX_TX_WR_AAD_S) #define KEYCTX_TX_WR_AAD_G(x) (((x) >> KEYCTX_TX_WR_AAD_S) & \ KEYCTX_TX_WR_AAD_M) #define KEYCTX_TX_WR_AADST_S 39 #define KEYCTX_TX_WR_AADST_M 0xffULL #define KEYCTX_TX_WR_AADST_V(x) ((x) << KEYCTX_TX_WR_AADST_S) #define KEYCTX_TX_WR_AADST_G(x) \ (((x) >> KEYCTX_TX_WR_AADST_S) & KEYCTX_TX_WR_AADST_M) #define KEYCTX_TX_WR_CIPHER_S 30 #define KEYCTX_TX_WR_CIPHER_M 0x1ffULL #define KEYCTX_TX_WR_CIPHER_V(x) ((x) << KEYCTX_TX_WR_CIPHER_S) #define KEYCTX_TX_WR_CIPHER_G(x) \ (((x) >> KEYCTX_TX_WR_CIPHER_S) & KEYCTX_TX_WR_CIPHER_M) #define KEYCTX_TX_WR_CIPHERST_S 23 #define KEYCTX_TX_WR_CIPHERST_M 0x7f #define KEYCTX_TX_WR_CIPHERST_V(x) ((x) << KEYCTX_TX_WR_CIPHERST_S) #define KEYCTX_TX_WR_CIPHERST_G(x) \ (((x) >> KEYCTX_TX_WR_CIPHERST_S) & KEYCTX_TX_WR_CIPHERST_M) #define KEYCTX_TX_WR_AUTH_S 14 #define KEYCTX_TX_WR_AUTH_M 0x1ff #define KEYCTX_TX_WR_AUTH_V(x) ((x) << KEYCTX_TX_WR_AUTH_S) #define KEYCTX_TX_WR_AUTH_G(x) \ (((x) >> KEYCTX_TX_WR_AUTH_S) & KEYCTX_TX_WR_AUTH_M) #define KEYCTX_TX_WR_AUTHST_S 7 #define KEYCTX_TX_WR_AUTHST_M 0x7f #define KEYCTX_TX_WR_AUTHST_V(x) ((x) << KEYCTX_TX_WR_AUTHST_S) #define KEYCTX_TX_WR_AUTHST_G(x) \ (((x) >> KEYCTX_TX_WR_AUTHST_S) & KEYCTX_TX_WR_AUTHST_M) #define KEYCTX_TX_WR_AUTHIN_S 0 #define KEYCTX_TX_WR_AUTHIN_M 0x7f #define KEYCTX_TX_WR_AUTHIN_V(x) ((x) << KEYCTX_TX_WR_AUTHIN_S) #define KEYCTX_TX_WR_AUTHIN_G(x) \ (((x) >> KEYCTX_TX_WR_AUTHIN_S) & KEYCTX_TX_WR_AUTHIN_M) struct sge_opaque_hdr { void *dev; dma_addr_t addr[MAX_SKB_FRAGS + 1]; }; #define MAX_IVS_PAGE 256 #define TLS_KEY_CONTEXT_SZ 64 #define CIPHER_BLOCK_SIZE 16 #define GCM_TAG_SIZE 16 #define KEY_ON_MEM_SZ 16 #define AEAD_EXPLICIT_DATA_SIZE 8 #define TLS_HEADER_LENGTH 5 #define SCMD_CIPH_MODE_AES_GCM 2 /* Any MFS size should work and come from openssl */ #define TLS_MFS 16384 #define RSS_HDR sizeof(struct rss_header) #define TLS_WR_CPL_LEN \ (sizeof(struct fw_tlstx_data_wr) + sizeof(struct cpl_tx_tls_sfo)) enum { CHTLS_KEY_CONTEXT_DSGL, CHTLS_KEY_CONTEXT_IMM, CHTLS_KEY_CONTEXT_DDR, }; enum { CHTLS_LISTEN_START, CHTLS_LISTEN_STOP, }; /* Flags for return value of CPL message handlers */ enum { CPL_RET_BUF_DONE = 1, /* buffer processing done */ CPL_RET_BAD_MSG = 2, /* bad CPL message */ CPL_RET_UNKNOWN_TID = 4 /* unexpected unknown TID */ }; #define LISTEN_INFO_HASH_SIZE 32 #define RSPQ_HASH_BITS 5 struct listen_info { struct listen_info *next; /* Link to next entry */ struct sock *sk; /* The listening socket */ unsigned int stid; /* The server TID */ }; enum { T4_LISTEN_START_PENDING, T4_LISTEN_STARTED }; enum csk_flags { CSK_CALLBACKS_CHKD, /* socket callbacks have been sanitized */ CSK_ABORT_REQ_RCVD, /* received one ABORT_REQ_RSS message */ CSK_TX_MORE_DATA, /* sending ULP data; don't set SHOVE bit */ CSK_TX_WAIT_IDLE, /* suspend Tx until in-flight data is ACKed */ CSK_ABORT_SHUTDOWN, /* shouldn't send more abort requests */ CSK_ABORT_RPL_PENDING, /* expecting an abort reply */ CSK_CLOSE_CON_REQUESTED,/* we've sent a close_conn_req */ CSK_TX_DATA_SENT, /* sent a TX_DATA WR on this connection */ CSK_TX_FAILOVER, /* Tx traffic failing over */ CSK_UPDATE_RCV_WND, /* Need to update rcv window */ CSK_RST_ABORTED, /* outgoing RST was aborted */ CSK_TLS_HANDSHK, /* TLS Handshake */ CSK_CONN_INLINE, /* Connection on HW */ }; enum chtls_cdev_state { CHTLS_CDEV_STATE_UP = 1 }; struct listen_ctx { struct sock *lsk; struct chtls_dev *cdev; struct sk_buff_head synq; u32 state; }; struct key_map { unsigned long *addr; unsigned int start; unsigned int available; unsigned int size; spinlock_t lock; /* lock for key id request from map */ } __packed; struct tls_scmd { u32 seqno_numivs; u32 ivgen_hdrlen; }; struct chtls_dev { struct tls_toe_device tlsdev; struct list_head list; struct cxgb4_lld_info *lldi; struct pci_dev *pdev; struct listen_info *listen_hash_tab[LISTEN_INFO_HASH_SIZE]; spinlock_t listen_lock; /* lock for listen list */ struct net_device **ports; struct tid_info *tids; unsigned int pfvf; const unsigned short *mtus; struct idr hwtid_idr; struct idr stid_idr; spinlock_t idr_lock ____cacheline_aligned_in_smp; struct net_device *egr_dev[NCHAN * 2]; struct sk_buff *rspq_skb_cache[1 << RSPQ_HASH_BITS]; struct sk_buff *askb; struct sk_buff_head deferq; struct work_struct deferq_task; struct list_head list_node; struct list_head rcu_node; struct list_head na_node; unsigned int send_page_order; int max_host_sndbuf; u32 round_robin_cnt; struct key_map kmap; unsigned int cdev_state; }; struct chtls_listen { struct chtls_dev *cdev; struct sock *sk; }; struct chtls_hws { struct sk_buff_head sk_recv_queue; u8 txqid; u8 ofld; u16 type; u16 rstate; u16 keyrpl; u16 pldlen; u16 rcvpld; u16 compute; u16 expansion; u16 keylen; u16 pdus; u16 adjustlen; u16 ivsize; u16 txleft; u32 mfs; s32 txkey; s32 rxkey; u32 fcplenmax; u32 copied_seq; u64 tx_seq_no; struct tls_scmd scmd; union { struct tls12_crypto_info_aes_gcm_128 aes_gcm_128; struct tls12_crypto_info_aes_gcm_256 aes_gcm_256; } crypto_info; }; struct chtls_sock { struct sock *sk; struct chtls_dev *cdev; struct l2t_entry *l2t_entry; /* pointer to the L2T entry */ struct net_device *egress_dev; /* TX_CHAN for act open retry */ struct sk_buff_head txq; struct sk_buff *wr_skb_head; struct sk_buff *wr_skb_tail; struct sk_buff *ctrl_skb_cache; struct sk_buff *txdata_skb_cache; /* abort path messages */ struct kref kref; unsigned long flags; u32 opt2; u32 wr_credits; u32 wr_unacked; u32 wr_max_credits; u32 wr_nondata; u32 hwtid; /* TCP Control Block ID */ u32 txq_idx; u32 rss_qid; u32 tid; u32 idr; u32 mss; u32 ulp_mode; u32 tx_chan; u32 rx_chan; u32 sndbuf; u32 txplen_max; u32 mtu_idx; /* MTU table index */ u32 smac_idx; u8 port_id; u8 tos; u16 resv2; u32 delack_mode; u32 delack_seq; u32 snd_win; u32 rcv_win; void *passive_reap_next; /* placeholder for passive */ struct chtls_hws tlshws; struct synq { struct sk_buff *next; struct sk_buff *prev; } synq; struct listen_ctx *listen_ctx; }; struct tls_hdr { u8 type; u16 version; u16 length; } __packed; struct tlsrx_cmp_hdr { u8 type; u16 version; u16 length; u64 tls_seq; u16 reserved1; u8 res_to_mac_error; } __packed; /* res_to_mac_error fields */ #define TLSRX_HDR_PKT_INT_ERROR_S 4 #define TLSRX_HDR_PKT_INT_ERROR_M 0x1 #define TLSRX_HDR_PKT_INT_ERROR_V(x) \ ((x) << TLSRX_HDR_PKT_INT_ERROR_S) #define TLSRX_HDR_PKT_INT_ERROR_G(x) \ (((x) >> TLSRX_HDR_PKT_INT_ERROR_S) & TLSRX_HDR_PKT_INT_ERROR_M) #define TLSRX_HDR_PKT_INT_ERROR_F TLSRX_HDR_PKT_INT_ERROR_V(1U) #define TLSRX_HDR_PKT_SPP_ERROR_S 3 #define TLSRX_HDR_PKT_SPP_ERROR_M 0x1 #define TLSRX_HDR_PKT_SPP_ERROR_V(x) ((x) << TLSRX_HDR_PKT_SPP_ERROR) #define TLSRX_HDR_PKT_SPP_ERROR_G(x) \ (((x) >> TLSRX_HDR_PKT_SPP_ERROR_S) & TLSRX_HDR_PKT_SPP_ERROR_M) #define TLSRX_HDR_PKT_SPP_ERROR_F TLSRX_HDR_PKT_SPP_ERROR_V(1U) #define TLSRX_HDR_PKT_CCDX_ERROR_S 2 #define TLSRX_HDR_PKT_CCDX_ERROR_M 0x1 #define TLSRX_HDR_PKT_CCDX_ERROR_V(x) ((x) << TLSRX_HDR_PKT_CCDX_ERROR_S) #define TLSRX_HDR_PKT_CCDX_ERROR_G(x) \ (((x) >> TLSRX_HDR_PKT_CCDX_ERROR_S) & TLSRX_HDR_PKT_CCDX_ERROR_M) #define TLSRX_HDR_PKT_CCDX_ERROR_F TLSRX_HDR_PKT_CCDX_ERROR_V(1U) #define TLSRX_HDR_PKT_PAD_ERROR_S 1 #define TLSRX_HDR_PKT_PAD_ERROR_M 0x1 #define TLSRX_HDR_PKT_PAD_ERROR_V(x) ((x) << TLSRX_HDR_PKT_PAD_ERROR_S) #define TLSRX_HDR_PKT_PAD_ERROR_G(x) \ (((x) >> TLSRX_HDR_PKT_PAD_ERROR_S) & TLSRX_HDR_PKT_PAD_ERROR_M) #define TLSRX_HDR_PKT_PAD_ERROR_F TLSRX_HDR_PKT_PAD_ERROR_V(1U) #define TLSRX_HDR_PKT_MAC_ERROR_S 0 #define TLSRX_HDR_PKT_MAC_ERROR_M 0x1 #define TLSRX_HDR_PKT_MAC_ERROR_V(x) ((x) << TLSRX_HDR_PKT_MAC_ERROR) #define TLSRX_HDR_PKT_MAC_ERROR_G(x) \ (((x) >> S_TLSRX_HDR_PKT_MAC_ERROR_S) & TLSRX_HDR_PKT_MAC_ERROR_M) #define TLSRX_HDR_PKT_MAC_ERROR_F TLSRX_HDR_PKT_MAC_ERROR_V(1U) #define TLSRX_HDR_PKT_ERROR_M 0x1F #define CONTENT_TYPE_ERROR 0x7F struct ulp_mem_rw { __be32 cmd; __be32 len16; /* command length */ __be32 dlen; /* data length in 32-byte units */ __be32 lock_addr; }; struct tls_key_wr { __be32 op_to_compl; __be32 flowid_len16; __be32 ftid; u8 reneg_to_write_rx; u8 protocol; __be16 mfs; }; struct tls_key_req { struct tls_key_wr wr; struct ulp_mem_rw req; struct ulptx_idata sc_imm; }; /* * This lives in skb->cb and is used to chain WRs in a linked list. */ struct wr_skb_cb { struct l2t_skb_cb l2t; /* reserve space for l2t CB */ struct sk_buff *next_wr; /* next write request */ }; /* Per-skb backlog handler. Run when a socket's backlog is processed. */ struct blog_skb_cb { void (*backlog_rcv)(struct sock *sk, struct sk_buff *skb); struct chtls_dev *cdev; }; /* * Similar to tcp_skb_cb but with ULP elements added to support TLS, * etc. */ struct ulp_skb_cb { struct wr_skb_cb wr; /* reserve space for write request */ u16 flags; /* TCP-like flags */ u8 psh; u8 ulp_mode; /* ULP mode/submode of sk_buff */ u32 seq; /* TCP sequence number */ union { /* ULP-specific fields */ struct { u8 type; u8 ofld; u8 iv; } tls; } ulp; }; #define ULP_SKB_CB(skb) ((struct ulp_skb_cb *)&((skb)->cb[0])) #define BLOG_SKB_CB(skb) ((struct blog_skb_cb *)(skb)->cb) /* * Flags for ulp_skb_cb.flags. */ enum { ULPCB_FLAG_NEED_HDR = 1 << 0, /* packet needs a TX_DATA_WR header */ ULPCB_FLAG_NO_APPEND = 1 << 1, /* don't grow this skb */ ULPCB_FLAG_BARRIER = 1 << 2, /* set TX_WAIT_IDLE after sending */ ULPCB_FLAG_HOLD = 1 << 3, /* skb not ready for Tx yet */ ULPCB_FLAG_COMPL = 1 << 4, /* request WR completion */ ULPCB_FLAG_URG = 1 << 5, /* urgent data */ ULPCB_FLAG_TLS_HDR = 1 << 6, /* payload with tls hdr */ ULPCB_FLAG_NO_HDR = 1 << 7, /* not a ofld wr */ }; /* The ULP mode/submode of an skbuff */ #define skb_ulp_mode(skb) (ULP_SKB_CB(skb)->ulp_mode) #define TCP_PAGE(sk) (sk->sk_frag.page) #define TCP_OFF(sk) (sk->sk_frag.offset) static inline struct chtls_dev *to_chtls_dev(struct tls_toe_device *tlsdev) { return container_of(tlsdev, struct chtls_dev, tlsdev); } static inline void csk_set_flag(struct chtls_sock *csk, enum csk_flags flag) { __set_bit(flag, &csk->flags); } static inline void csk_reset_flag(struct chtls_sock *csk, enum csk_flags flag) { __clear_bit(flag, &csk->flags); } static inline bool csk_conn_inline(const struct chtls_sock *csk) { return test_bit(CSK_CONN_INLINE, &csk->flags); } static inline int csk_flag(const struct sock *sk, enum csk_flags flag) { struct chtls_sock *csk = rcu_dereference_sk_user_data(sk); if (!csk_conn_inline(csk)) return 0; return test_bit(flag, &csk->flags); } static inline int csk_flag_nochk(const struct chtls_sock *csk, enum csk_flags flag) { return test_bit(flag, &csk->flags); } static inline void *cplhdr(struct sk_buff *skb) { return skb->data; } static inline int is_neg_adv(unsigned int status) { return status == CPL_ERR_RTX_NEG_ADVICE || status == CPL_ERR_KEEPALV_NEG_ADVICE || status == CPL_ERR_PERSIST_NEG_ADVICE; } static inline void process_cpl_msg(void (*fn)(struct sock *, struct sk_buff *), struct sock *sk, struct sk_buff *skb) { skb_reset_mac_header(skb); skb_reset_network_header(skb); skb_reset_transport_header(skb); bh_lock_sock(sk); if (unlikely(sock_owned_by_user(sk))) { BLOG_SKB_CB(skb)->backlog_rcv = fn; __sk_add_backlog(sk, skb); } else { fn(sk, skb); } bh_unlock_sock(sk); } static inline void chtls_sock_free(struct kref *ref) { struct chtls_sock *csk = container_of(ref, struct chtls_sock, kref); kfree(csk); } static inline void __chtls_sock_put(const char *fn, struct chtls_sock *csk) { kref_put(&csk->kref, chtls_sock_free); } static inline void __chtls_sock_get(const char *fn, struct chtls_sock *csk) { kref_get(&csk->kref); } static inline void send_or_defer(struct sock *sk, struct tcp_sock *tp, struct sk_buff *skb, int through_l2t) { struct chtls_sock *csk = rcu_dereference_sk_user_data(sk); if (through_l2t) { /* send through L2T */ cxgb4_l2t_send(csk->egress_dev, skb, csk->l2t_entry); } else { /* send directly */ cxgb4_ofld_send(csk->egress_dev, skb); } } typedef int (*chtls_handler_func)(struct chtls_dev *, struct sk_buff *); extern chtls_handler_func chtls_handlers[NUM_CPL_CMDS]; void chtls_install_cpl_ops(struct sock *sk); int chtls_init_kmap(struct chtls_dev *cdev, struct cxgb4_lld_info *lldi); void chtls_listen_stop(struct chtls_dev *cdev, struct sock *sk); int chtls_listen_start(struct chtls_dev *cdev, struct sock *sk); void chtls_close(struct sock *sk, long timeout); int chtls_disconnect(struct sock *sk, int flags); void chtls_shutdown(struct sock *sk, int how); void chtls_destroy_sock(struct sock *sk); int chtls_sendmsg(struct sock *sk, struct msghdr *msg, size_t size); int chtls_recvmsg(struct sock *sk, struct msghdr *msg, size_t len, int flags, int *addr_len); void chtls_splice_eof(struct socket *sock); int send_tx_flowc_wr(struct sock *sk, int compl, u32 snd_nxt, u32 rcv_nxt); void chtls_tcp_push(struct sock *sk, int flags); int chtls_push_frames(struct chtls_sock *csk, int comp); int chtls_set_tcb_tflag(struct sock *sk, unsigned int bit_pos, int val); void chtls_set_tcb_field_rpl_skb(struct sock *sk, u16 word, u64 mask, u64 val, u8 cookie, int through_l2t); int chtls_setkey(struct chtls_sock *csk, u32 keylen, u32 mode, int cipher_type); void chtls_set_quiesce_ctrl(struct sock *sk, int val); void skb_entail(struct sock *sk, struct sk_buff *skb, int flags); unsigned int keyid_to_addr(int start_addr, int keyid); void free_tls_keyid(struct sock *sk); #endif
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1