162306a36Sopenharmony_ci/*
262306a36Sopenharmony_ci * Copyright (c) 2016-2017, Mellanox Technologies. All rights reserved.
362306a36Sopenharmony_ci * Copyright (c) 2016-2017, Dave Watson <davejwatson@fb.com>. All rights reserved.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * This software is available to you under a choice of one of two
662306a36Sopenharmony_ci * licenses.  You may choose to be licensed under the terms of the GNU
762306a36Sopenharmony_ci * General Public License (GPL) Version 2, available from the file
862306a36Sopenharmony_ci * COPYING in the main directory of this source tree, or the
962306a36Sopenharmony_ci * OpenIB.org BSD license below:
1062306a36Sopenharmony_ci *
1162306a36Sopenharmony_ci *     Redistribution and use in source and binary forms, with or
1262306a36Sopenharmony_ci *     without modification, are permitted provided that the following
1362306a36Sopenharmony_ci *     conditions are met:
1462306a36Sopenharmony_ci *
1562306a36Sopenharmony_ci *      - Redistributions of source code must retain the above
1662306a36Sopenharmony_ci *        copyright notice, this list of conditions and the following
1762306a36Sopenharmony_ci *        disclaimer.
1862306a36Sopenharmony_ci *
1962306a36Sopenharmony_ci *      - Redistributions in binary form must reproduce the above
2062306a36Sopenharmony_ci *        copyright notice, this list of conditions and the following
2162306a36Sopenharmony_ci *        disclaimer in the documentation and/or other materials
2262306a36Sopenharmony_ci *        provided with the distribution.
2362306a36Sopenharmony_ci *
2462306a36Sopenharmony_ci * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
2562306a36Sopenharmony_ci * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
2662306a36Sopenharmony_ci * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
2762306a36Sopenharmony_ci * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
2862306a36Sopenharmony_ci * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
2962306a36Sopenharmony_ci * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
3062306a36Sopenharmony_ci * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
3162306a36Sopenharmony_ci * SOFTWARE.
3262306a36Sopenharmony_ci */
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_ci#include <linux/module.h>
3562306a36Sopenharmony_ci
3662306a36Sopenharmony_ci#include <net/tcp.h>
3762306a36Sopenharmony_ci#include <net/inet_common.h>
3862306a36Sopenharmony_ci#include <linux/highmem.h>
3962306a36Sopenharmony_ci#include <linux/netdevice.h>
4062306a36Sopenharmony_ci#include <linux/sched/signal.h>
4162306a36Sopenharmony_ci#include <linux/inetdevice.h>
4262306a36Sopenharmony_ci#include <linux/inet_diag.h>
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_ci#include <net/snmp.h>
4562306a36Sopenharmony_ci#include <net/tls.h>
4662306a36Sopenharmony_ci#include <net/tls_toe.h>
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_ci#include "tls.h"
4962306a36Sopenharmony_ci
5062306a36Sopenharmony_ciMODULE_AUTHOR("Mellanox Technologies");
5162306a36Sopenharmony_ciMODULE_DESCRIPTION("Transport Layer Security Support");
5262306a36Sopenharmony_ciMODULE_LICENSE("Dual BSD/GPL");
5362306a36Sopenharmony_ciMODULE_ALIAS_TCP_ULP("tls");
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_cienum {
5662306a36Sopenharmony_ci	TLSV4,
5762306a36Sopenharmony_ci	TLSV6,
5862306a36Sopenharmony_ci	TLS_NUM_PROTS,
5962306a36Sopenharmony_ci};
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci#define CHECK_CIPHER_DESC(cipher,ci)				\
6262306a36Sopenharmony_ci	static_assert(cipher ## _IV_SIZE <= MAX_IV_SIZE);		\
6362306a36Sopenharmony_ci	static_assert(cipher ## _REC_SEQ_SIZE <= TLS_MAX_REC_SEQ_SIZE);	\
6462306a36Sopenharmony_ci	static_assert(cipher ## _TAG_SIZE == TLS_TAG_SIZE);		\
6562306a36Sopenharmony_ci	static_assert(sizeof_field(struct ci, iv) == cipher ## _IV_SIZE);	\
6662306a36Sopenharmony_ci	static_assert(sizeof_field(struct ci, key) == cipher ## _KEY_SIZE);	\
6762306a36Sopenharmony_ci	static_assert(sizeof_field(struct ci, salt) == cipher ## _SALT_SIZE);	\
6862306a36Sopenharmony_ci	static_assert(sizeof_field(struct ci, rec_seq) == cipher ## _REC_SEQ_SIZE);
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci#define __CIPHER_DESC(ci) \
7162306a36Sopenharmony_ci	.iv_offset = offsetof(struct ci, iv), \
7262306a36Sopenharmony_ci	.key_offset = offsetof(struct ci, key), \
7362306a36Sopenharmony_ci	.salt_offset = offsetof(struct ci, salt), \
7462306a36Sopenharmony_ci	.rec_seq_offset = offsetof(struct ci, rec_seq), \
7562306a36Sopenharmony_ci	.crypto_info = sizeof(struct ci)
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci#define CIPHER_DESC(cipher,ci,algname,_offloadable) [cipher - TLS_CIPHER_MIN] = {	\
7862306a36Sopenharmony_ci	.nonce = cipher ## _IV_SIZE, \
7962306a36Sopenharmony_ci	.iv = cipher ## _IV_SIZE, \
8062306a36Sopenharmony_ci	.key = cipher ## _KEY_SIZE, \
8162306a36Sopenharmony_ci	.salt = cipher ## _SALT_SIZE, \
8262306a36Sopenharmony_ci	.tag = cipher ## _TAG_SIZE, \
8362306a36Sopenharmony_ci	.rec_seq = cipher ## _REC_SEQ_SIZE, \
8462306a36Sopenharmony_ci	.cipher_name = algname,	\
8562306a36Sopenharmony_ci	.offloadable = _offloadable, \
8662306a36Sopenharmony_ci	__CIPHER_DESC(ci), \
8762306a36Sopenharmony_ci}
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci#define CIPHER_DESC_NONCE0(cipher,ci,algname,_offloadable) [cipher - TLS_CIPHER_MIN] = { \
9062306a36Sopenharmony_ci	.nonce = 0, \
9162306a36Sopenharmony_ci	.iv = cipher ## _IV_SIZE, \
9262306a36Sopenharmony_ci	.key = cipher ## _KEY_SIZE, \
9362306a36Sopenharmony_ci	.salt = cipher ## _SALT_SIZE, \
9462306a36Sopenharmony_ci	.tag = cipher ## _TAG_SIZE, \
9562306a36Sopenharmony_ci	.rec_seq = cipher ## _REC_SEQ_SIZE, \
9662306a36Sopenharmony_ci	.cipher_name = algname,	\
9762306a36Sopenharmony_ci	.offloadable = _offloadable, \
9862306a36Sopenharmony_ci	__CIPHER_DESC(ci), \
9962306a36Sopenharmony_ci}
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ciconst struct tls_cipher_desc tls_cipher_desc[TLS_CIPHER_MAX + 1 - TLS_CIPHER_MIN] = {
10262306a36Sopenharmony_ci	CIPHER_DESC(TLS_CIPHER_AES_GCM_128, tls12_crypto_info_aes_gcm_128, "gcm(aes)", true),
10362306a36Sopenharmony_ci	CIPHER_DESC(TLS_CIPHER_AES_GCM_256, tls12_crypto_info_aes_gcm_256, "gcm(aes)", true),
10462306a36Sopenharmony_ci	CIPHER_DESC(TLS_CIPHER_AES_CCM_128, tls12_crypto_info_aes_ccm_128, "ccm(aes)", false),
10562306a36Sopenharmony_ci	CIPHER_DESC_NONCE0(TLS_CIPHER_CHACHA20_POLY1305, tls12_crypto_info_chacha20_poly1305, "rfc7539(chacha20,poly1305)", false),
10662306a36Sopenharmony_ci	CIPHER_DESC(TLS_CIPHER_SM4_GCM, tls12_crypto_info_sm4_gcm, "gcm(sm4)", false),
10762306a36Sopenharmony_ci	CIPHER_DESC(TLS_CIPHER_SM4_CCM, tls12_crypto_info_sm4_ccm, "ccm(sm4)", false),
10862306a36Sopenharmony_ci	CIPHER_DESC(TLS_CIPHER_ARIA_GCM_128, tls12_crypto_info_aria_gcm_128, "gcm(aria)", false),
10962306a36Sopenharmony_ci	CIPHER_DESC(TLS_CIPHER_ARIA_GCM_256, tls12_crypto_info_aria_gcm_256, "gcm(aria)", false),
11062306a36Sopenharmony_ci};
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_AES_GCM_128, tls12_crypto_info_aes_gcm_128);
11362306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_AES_GCM_256, tls12_crypto_info_aes_gcm_256);
11462306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_AES_CCM_128, tls12_crypto_info_aes_ccm_128);
11562306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_CHACHA20_POLY1305, tls12_crypto_info_chacha20_poly1305);
11662306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_SM4_GCM, tls12_crypto_info_sm4_gcm);
11762306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_SM4_CCM, tls12_crypto_info_sm4_ccm);
11862306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_ARIA_GCM_128, tls12_crypto_info_aria_gcm_128);
11962306a36Sopenharmony_ciCHECK_CIPHER_DESC(TLS_CIPHER_ARIA_GCM_256, tls12_crypto_info_aria_gcm_256);
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_cistatic const struct proto *saved_tcpv6_prot;
12262306a36Sopenharmony_cistatic DEFINE_MUTEX(tcpv6_prot_mutex);
12362306a36Sopenharmony_cistatic const struct proto *saved_tcpv4_prot;
12462306a36Sopenharmony_cistatic DEFINE_MUTEX(tcpv4_prot_mutex);
12562306a36Sopenharmony_cistatic struct proto tls_prots[TLS_NUM_PROTS][TLS_NUM_CONFIG][TLS_NUM_CONFIG];
12662306a36Sopenharmony_cistatic struct proto_ops tls_proto_ops[TLS_NUM_PROTS][TLS_NUM_CONFIG][TLS_NUM_CONFIG];
12762306a36Sopenharmony_cistatic void build_protos(struct proto prot[TLS_NUM_CONFIG][TLS_NUM_CONFIG],
12862306a36Sopenharmony_ci			 const struct proto *base);
12962306a36Sopenharmony_ci
13062306a36Sopenharmony_civoid update_sk_prot(struct sock *sk, struct tls_context *ctx)
13162306a36Sopenharmony_ci{
13262306a36Sopenharmony_ci	int ip_ver = sk->sk_family == AF_INET6 ? TLSV6 : TLSV4;
13362306a36Sopenharmony_ci
13462306a36Sopenharmony_ci	WRITE_ONCE(sk->sk_prot,
13562306a36Sopenharmony_ci		   &tls_prots[ip_ver][ctx->tx_conf][ctx->rx_conf]);
13662306a36Sopenharmony_ci	WRITE_ONCE(sk->sk_socket->ops,
13762306a36Sopenharmony_ci		   &tls_proto_ops[ip_ver][ctx->tx_conf][ctx->rx_conf]);
13862306a36Sopenharmony_ci}
13962306a36Sopenharmony_ci
14062306a36Sopenharmony_ciint wait_on_pending_writer(struct sock *sk, long *timeo)
14162306a36Sopenharmony_ci{
14262306a36Sopenharmony_ci	DEFINE_WAIT_FUNC(wait, woken_wake_function);
14362306a36Sopenharmony_ci	int ret, rc = 0;
14462306a36Sopenharmony_ci
14562306a36Sopenharmony_ci	add_wait_queue(sk_sleep(sk), &wait);
14662306a36Sopenharmony_ci	while (1) {
14762306a36Sopenharmony_ci		if (!*timeo) {
14862306a36Sopenharmony_ci			rc = -EAGAIN;
14962306a36Sopenharmony_ci			break;
15062306a36Sopenharmony_ci		}
15162306a36Sopenharmony_ci
15262306a36Sopenharmony_ci		if (signal_pending(current)) {
15362306a36Sopenharmony_ci			rc = sock_intr_errno(*timeo);
15462306a36Sopenharmony_ci			break;
15562306a36Sopenharmony_ci		}
15662306a36Sopenharmony_ci
15762306a36Sopenharmony_ci		ret = sk_wait_event(sk, timeo,
15862306a36Sopenharmony_ci				    !READ_ONCE(sk->sk_write_pending), &wait);
15962306a36Sopenharmony_ci		if (ret) {
16062306a36Sopenharmony_ci			if (ret < 0)
16162306a36Sopenharmony_ci				rc = ret;
16262306a36Sopenharmony_ci			break;
16362306a36Sopenharmony_ci		}
16462306a36Sopenharmony_ci	}
16562306a36Sopenharmony_ci	remove_wait_queue(sk_sleep(sk), &wait);
16662306a36Sopenharmony_ci	return rc;
16762306a36Sopenharmony_ci}
16862306a36Sopenharmony_ci
16962306a36Sopenharmony_ciint tls_push_sg(struct sock *sk,
17062306a36Sopenharmony_ci		struct tls_context *ctx,
17162306a36Sopenharmony_ci		struct scatterlist *sg,
17262306a36Sopenharmony_ci		u16 first_offset,
17362306a36Sopenharmony_ci		int flags)
17462306a36Sopenharmony_ci{
17562306a36Sopenharmony_ci	struct bio_vec bvec;
17662306a36Sopenharmony_ci	struct msghdr msg = {
17762306a36Sopenharmony_ci		.msg_flags = MSG_SPLICE_PAGES | flags,
17862306a36Sopenharmony_ci	};
17962306a36Sopenharmony_ci	int ret = 0;
18062306a36Sopenharmony_ci	struct page *p;
18162306a36Sopenharmony_ci	size_t size;
18262306a36Sopenharmony_ci	int offset = first_offset;
18362306a36Sopenharmony_ci
18462306a36Sopenharmony_ci	size = sg->length - offset;
18562306a36Sopenharmony_ci	offset += sg->offset;
18662306a36Sopenharmony_ci
18762306a36Sopenharmony_ci	ctx->splicing_pages = true;
18862306a36Sopenharmony_ci	while (1) {
18962306a36Sopenharmony_ci		/* is sending application-limited? */
19062306a36Sopenharmony_ci		tcp_rate_check_app_limited(sk);
19162306a36Sopenharmony_ci		p = sg_page(sg);
19262306a36Sopenharmony_ciretry:
19362306a36Sopenharmony_ci		bvec_set_page(&bvec, p, size, offset);
19462306a36Sopenharmony_ci		iov_iter_bvec(&msg.msg_iter, ITER_SOURCE, &bvec, 1, size);
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci		ret = tcp_sendmsg_locked(sk, &msg, size);
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci		if (ret != size) {
19962306a36Sopenharmony_ci			if (ret > 0) {
20062306a36Sopenharmony_ci				offset += ret;
20162306a36Sopenharmony_ci				size -= ret;
20262306a36Sopenharmony_ci				goto retry;
20362306a36Sopenharmony_ci			}
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_ci			offset -= sg->offset;
20662306a36Sopenharmony_ci			ctx->partially_sent_offset = offset;
20762306a36Sopenharmony_ci			ctx->partially_sent_record = (void *)sg;
20862306a36Sopenharmony_ci			ctx->splicing_pages = false;
20962306a36Sopenharmony_ci			return ret;
21062306a36Sopenharmony_ci		}
21162306a36Sopenharmony_ci
21262306a36Sopenharmony_ci		put_page(p);
21362306a36Sopenharmony_ci		sk_mem_uncharge(sk, sg->length);
21462306a36Sopenharmony_ci		sg = sg_next(sg);
21562306a36Sopenharmony_ci		if (!sg)
21662306a36Sopenharmony_ci			break;
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci		offset = sg->offset;
21962306a36Sopenharmony_ci		size = sg->length;
22062306a36Sopenharmony_ci	}
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_ci	ctx->splicing_pages = false;
22362306a36Sopenharmony_ci
22462306a36Sopenharmony_ci	return 0;
22562306a36Sopenharmony_ci}
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_cistatic int tls_handle_open_record(struct sock *sk, int flags)
22862306a36Sopenharmony_ci{
22962306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
23062306a36Sopenharmony_ci
23162306a36Sopenharmony_ci	if (tls_is_pending_open_record(ctx))
23262306a36Sopenharmony_ci		return ctx->push_pending_record(sk, flags);
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_ci	return 0;
23562306a36Sopenharmony_ci}
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_ciint tls_process_cmsg(struct sock *sk, struct msghdr *msg,
23862306a36Sopenharmony_ci		     unsigned char *record_type)
23962306a36Sopenharmony_ci{
24062306a36Sopenharmony_ci	struct cmsghdr *cmsg;
24162306a36Sopenharmony_ci	int rc = -EINVAL;
24262306a36Sopenharmony_ci
24362306a36Sopenharmony_ci	for_each_cmsghdr(cmsg, msg) {
24462306a36Sopenharmony_ci		if (!CMSG_OK(msg, cmsg))
24562306a36Sopenharmony_ci			return -EINVAL;
24662306a36Sopenharmony_ci		if (cmsg->cmsg_level != SOL_TLS)
24762306a36Sopenharmony_ci			continue;
24862306a36Sopenharmony_ci
24962306a36Sopenharmony_ci		switch (cmsg->cmsg_type) {
25062306a36Sopenharmony_ci		case TLS_SET_RECORD_TYPE:
25162306a36Sopenharmony_ci			if (cmsg->cmsg_len < CMSG_LEN(sizeof(*record_type)))
25262306a36Sopenharmony_ci				return -EINVAL;
25362306a36Sopenharmony_ci
25462306a36Sopenharmony_ci			if (msg->msg_flags & MSG_MORE)
25562306a36Sopenharmony_ci				return -EINVAL;
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci			rc = tls_handle_open_record(sk, msg->msg_flags);
25862306a36Sopenharmony_ci			if (rc)
25962306a36Sopenharmony_ci				return rc;
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_ci			*record_type = *(unsigned char *)CMSG_DATA(cmsg);
26262306a36Sopenharmony_ci			rc = 0;
26362306a36Sopenharmony_ci			break;
26462306a36Sopenharmony_ci		default:
26562306a36Sopenharmony_ci			return -EINVAL;
26662306a36Sopenharmony_ci		}
26762306a36Sopenharmony_ci	}
26862306a36Sopenharmony_ci
26962306a36Sopenharmony_ci	return rc;
27062306a36Sopenharmony_ci}
27162306a36Sopenharmony_ci
27262306a36Sopenharmony_ciint tls_push_partial_record(struct sock *sk, struct tls_context *ctx,
27362306a36Sopenharmony_ci			    int flags)
27462306a36Sopenharmony_ci{
27562306a36Sopenharmony_ci	struct scatterlist *sg;
27662306a36Sopenharmony_ci	u16 offset;
27762306a36Sopenharmony_ci
27862306a36Sopenharmony_ci	sg = ctx->partially_sent_record;
27962306a36Sopenharmony_ci	offset = ctx->partially_sent_offset;
28062306a36Sopenharmony_ci
28162306a36Sopenharmony_ci	ctx->partially_sent_record = NULL;
28262306a36Sopenharmony_ci	return tls_push_sg(sk, ctx, sg, offset, flags);
28362306a36Sopenharmony_ci}
28462306a36Sopenharmony_ci
28562306a36Sopenharmony_civoid tls_free_partial_record(struct sock *sk, struct tls_context *ctx)
28662306a36Sopenharmony_ci{
28762306a36Sopenharmony_ci	struct scatterlist *sg;
28862306a36Sopenharmony_ci
28962306a36Sopenharmony_ci	for (sg = ctx->partially_sent_record; sg; sg = sg_next(sg)) {
29062306a36Sopenharmony_ci		put_page(sg_page(sg));
29162306a36Sopenharmony_ci		sk_mem_uncharge(sk, sg->length);
29262306a36Sopenharmony_ci	}
29362306a36Sopenharmony_ci	ctx->partially_sent_record = NULL;
29462306a36Sopenharmony_ci}
29562306a36Sopenharmony_ci
29662306a36Sopenharmony_cistatic void tls_write_space(struct sock *sk)
29762306a36Sopenharmony_ci{
29862306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
29962306a36Sopenharmony_ci
30062306a36Sopenharmony_ci	/* If splicing_pages call lower protocol write space handler
30162306a36Sopenharmony_ci	 * to ensure we wake up any waiting operations there. For example
30262306a36Sopenharmony_ci	 * if splicing pages where to call sk_wait_event.
30362306a36Sopenharmony_ci	 */
30462306a36Sopenharmony_ci	if (ctx->splicing_pages) {
30562306a36Sopenharmony_ci		ctx->sk_write_space(sk);
30662306a36Sopenharmony_ci		return;
30762306a36Sopenharmony_ci	}
30862306a36Sopenharmony_ci
30962306a36Sopenharmony_ci#ifdef CONFIG_TLS_DEVICE
31062306a36Sopenharmony_ci	if (ctx->tx_conf == TLS_HW)
31162306a36Sopenharmony_ci		tls_device_write_space(sk, ctx);
31262306a36Sopenharmony_ci	else
31362306a36Sopenharmony_ci#endif
31462306a36Sopenharmony_ci		tls_sw_write_space(sk, ctx);
31562306a36Sopenharmony_ci
31662306a36Sopenharmony_ci	ctx->sk_write_space(sk);
31762306a36Sopenharmony_ci}
31862306a36Sopenharmony_ci
31962306a36Sopenharmony_ci/**
32062306a36Sopenharmony_ci * tls_ctx_free() - free TLS ULP context
32162306a36Sopenharmony_ci * @sk:  socket to with @ctx is attached
32262306a36Sopenharmony_ci * @ctx: TLS context structure
32362306a36Sopenharmony_ci *
32462306a36Sopenharmony_ci * Free TLS context. If @sk is %NULL caller guarantees that the socket
32562306a36Sopenharmony_ci * to which @ctx was attached has no outstanding references.
32662306a36Sopenharmony_ci */
32762306a36Sopenharmony_civoid tls_ctx_free(struct sock *sk, struct tls_context *ctx)
32862306a36Sopenharmony_ci{
32962306a36Sopenharmony_ci	if (!ctx)
33062306a36Sopenharmony_ci		return;
33162306a36Sopenharmony_ci
33262306a36Sopenharmony_ci	memzero_explicit(&ctx->crypto_send, sizeof(ctx->crypto_send));
33362306a36Sopenharmony_ci	memzero_explicit(&ctx->crypto_recv, sizeof(ctx->crypto_recv));
33462306a36Sopenharmony_ci	mutex_destroy(&ctx->tx_lock);
33562306a36Sopenharmony_ci
33662306a36Sopenharmony_ci	if (sk)
33762306a36Sopenharmony_ci		kfree_rcu(ctx, rcu);
33862306a36Sopenharmony_ci	else
33962306a36Sopenharmony_ci		kfree(ctx);
34062306a36Sopenharmony_ci}
34162306a36Sopenharmony_ci
34262306a36Sopenharmony_cistatic void tls_sk_proto_cleanup(struct sock *sk,
34362306a36Sopenharmony_ci				 struct tls_context *ctx, long timeo)
34462306a36Sopenharmony_ci{
34562306a36Sopenharmony_ci	if (unlikely(sk->sk_write_pending) &&
34662306a36Sopenharmony_ci	    !wait_on_pending_writer(sk, &timeo))
34762306a36Sopenharmony_ci		tls_handle_open_record(sk, 0);
34862306a36Sopenharmony_ci
34962306a36Sopenharmony_ci	/* We need these for tls_sw_fallback handling of other packets */
35062306a36Sopenharmony_ci	if (ctx->tx_conf == TLS_SW) {
35162306a36Sopenharmony_ci		kfree(ctx->tx.rec_seq);
35262306a36Sopenharmony_ci		kfree(ctx->tx.iv);
35362306a36Sopenharmony_ci		tls_sw_release_resources_tx(sk);
35462306a36Sopenharmony_ci		TLS_DEC_STATS(sock_net(sk), LINUX_MIB_TLSCURRTXSW);
35562306a36Sopenharmony_ci	} else if (ctx->tx_conf == TLS_HW) {
35662306a36Sopenharmony_ci		tls_device_free_resources_tx(sk);
35762306a36Sopenharmony_ci		TLS_DEC_STATS(sock_net(sk), LINUX_MIB_TLSCURRTXDEVICE);
35862306a36Sopenharmony_ci	}
35962306a36Sopenharmony_ci
36062306a36Sopenharmony_ci	if (ctx->rx_conf == TLS_SW) {
36162306a36Sopenharmony_ci		tls_sw_release_resources_rx(sk);
36262306a36Sopenharmony_ci		TLS_DEC_STATS(sock_net(sk), LINUX_MIB_TLSCURRRXSW);
36362306a36Sopenharmony_ci	} else if (ctx->rx_conf == TLS_HW) {
36462306a36Sopenharmony_ci		tls_device_offload_cleanup_rx(sk);
36562306a36Sopenharmony_ci		TLS_DEC_STATS(sock_net(sk), LINUX_MIB_TLSCURRRXDEVICE);
36662306a36Sopenharmony_ci	}
36762306a36Sopenharmony_ci}
36862306a36Sopenharmony_ci
36962306a36Sopenharmony_cistatic void tls_sk_proto_close(struct sock *sk, long timeout)
37062306a36Sopenharmony_ci{
37162306a36Sopenharmony_ci	struct inet_connection_sock *icsk = inet_csk(sk);
37262306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
37362306a36Sopenharmony_ci	long timeo = sock_sndtimeo(sk, 0);
37462306a36Sopenharmony_ci	bool free_ctx;
37562306a36Sopenharmony_ci
37662306a36Sopenharmony_ci	if (ctx->tx_conf == TLS_SW)
37762306a36Sopenharmony_ci		tls_sw_cancel_work_tx(ctx);
37862306a36Sopenharmony_ci
37962306a36Sopenharmony_ci	lock_sock(sk);
38062306a36Sopenharmony_ci	free_ctx = ctx->tx_conf != TLS_HW && ctx->rx_conf != TLS_HW;
38162306a36Sopenharmony_ci
38262306a36Sopenharmony_ci	if (ctx->tx_conf != TLS_BASE || ctx->rx_conf != TLS_BASE)
38362306a36Sopenharmony_ci		tls_sk_proto_cleanup(sk, ctx, timeo);
38462306a36Sopenharmony_ci
38562306a36Sopenharmony_ci	write_lock_bh(&sk->sk_callback_lock);
38662306a36Sopenharmony_ci	if (free_ctx)
38762306a36Sopenharmony_ci		rcu_assign_pointer(icsk->icsk_ulp_data, NULL);
38862306a36Sopenharmony_ci	WRITE_ONCE(sk->sk_prot, ctx->sk_proto);
38962306a36Sopenharmony_ci	if (sk->sk_write_space == tls_write_space)
39062306a36Sopenharmony_ci		sk->sk_write_space = ctx->sk_write_space;
39162306a36Sopenharmony_ci	write_unlock_bh(&sk->sk_callback_lock);
39262306a36Sopenharmony_ci	release_sock(sk);
39362306a36Sopenharmony_ci	if (ctx->tx_conf == TLS_SW)
39462306a36Sopenharmony_ci		tls_sw_free_ctx_tx(ctx);
39562306a36Sopenharmony_ci	if (ctx->rx_conf == TLS_SW || ctx->rx_conf == TLS_HW)
39662306a36Sopenharmony_ci		tls_sw_strparser_done(ctx);
39762306a36Sopenharmony_ci	if (ctx->rx_conf == TLS_SW)
39862306a36Sopenharmony_ci		tls_sw_free_ctx_rx(ctx);
39962306a36Sopenharmony_ci	ctx->sk_proto->close(sk, timeout);
40062306a36Sopenharmony_ci
40162306a36Sopenharmony_ci	if (free_ctx)
40262306a36Sopenharmony_ci		tls_ctx_free(sk, ctx);
40362306a36Sopenharmony_ci}
40462306a36Sopenharmony_ci
40562306a36Sopenharmony_cistatic __poll_t tls_sk_poll(struct file *file, struct socket *sock,
40662306a36Sopenharmony_ci			    struct poll_table_struct *wait)
40762306a36Sopenharmony_ci{
40862306a36Sopenharmony_ci	struct tls_sw_context_rx *ctx;
40962306a36Sopenharmony_ci	struct tls_context *tls_ctx;
41062306a36Sopenharmony_ci	struct sock *sk = sock->sk;
41162306a36Sopenharmony_ci	struct sk_psock *psock;
41262306a36Sopenharmony_ci	__poll_t mask = 0;
41362306a36Sopenharmony_ci	u8 shutdown;
41462306a36Sopenharmony_ci	int state;
41562306a36Sopenharmony_ci
41662306a36Sopenharmony_ci	mask = tcp_poll(file, sock, wait);
41762306a36Sopenharmony_ci
41862306a36Sopenharmony_ci	state = inet_sk_state_load(sk);
41962306a36Sopenharmony_ci	shutdown = READ_ONCE(sk->sk_shutdown);
42062306a36Sopenharmony_ci	if (unlikely(state != TCP_ESTABLISHED || shutdown & RCV_SHUTDOWN))
42162306a36Sopenharmony_ci		return mask;
42262306a36Sopenharmony_ci
42362306a36Sopenharmony_ci	tls_ctx = tls_get_ctx(sk);
42462306a36Sopenharmony_ci	ctx = tls_sw_ctx_rx(tls_ctx);
42562306a36Sopenharmony_ci	psock = sk_psock_get(sk);
42662306a36Sopenharmony_ci
42762306a36Sopenharmony_ci	if (skb_queue_empty_lockless(&ctx->rx_list) &&
42862306a36Sopenharmony_ci	    !tls_strp_msg_ready(ctx) &&
42962306a36Sopenharmony_ci	    sk_psock_queue_empty(psock))
43062306a36Sopenharmony_ci		mask &= ~(EPOLLIN | EPOLLRDNORM);
43162306a36Sopenharmony_ci
43262306a36Sopenharmony_ci	if (psock)
43362306a36Sopenharmony_ci		sk_psock_put(sk, psock);
43462306a36Sopenharmony_ci
43562306a36Sopenharmony_ci	return mask;
43662306a36Sopenharmony_ci}
43762306a36Sopenharmony_ci
43862306a36Sopenharmony_cistatic int do_tls_getsockopt_conf(struct sock *sk, char __user *optval,
43962306a36Sopenharmony_ci				  int __user *optlen, int tx)
44062306a36Sopenharmony_ci{
44162306a36Sopenharmony_ci	int rc = 0;
44262306a36Sopenharmony_ci	const struct tls_cipher_desc *cipher_desc;
44362306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
44462306a36Sopenharmony_ci	struct tls_crypto_info *crypto_info;
44562306a36Sopenharmony_ci	struct cipher_context *cctx;
44662306a36Sopenharmony_ci	int len;
44762306a36Sopenharmony_ci
44862306a36Sopenharmony_ci	if (get_user(len, optlen))
44962306a36Sopenharmony_ci		return -EFAULT;
45062306a36Sopenharmony_ci
45162306a36Sopenharmony_ci	if (!optval || (len < sizeof(*crypto_info))) {
45262306a36Sopenharmony_ci		rc = -EINVAL;
45362306a36Sopenharmony_ci		goto out;
45462306a36Sopenharmony_ci	}
45562306a36Sopenharmony_ci
45662306a36Sopenharmony_ci	if (!ctx) {
45762306a36Sopenharmony_ci		rc = -EBUSY;
45862306a36Sopenharmony_ci		goto out;
45962306a36Sopenharmony_ci	}
46062306a36Sopenharmony_ci
46162306a36Sopenharmony_ci	/* get user crypto info */
46262306a36Sopenharmony_ci	if (tx) {
46362306a36Sopenharmony_ci		crypto_info = &ctx->crypto_send.info;
46462306a36Sopenharmony_ci		cctx = &ctx->tx;
46562306a36Sopenharmony_ci	} else {
46662306a36Sopenharmony_ci		crypto_info = &ctx->crypto_recv.info;
46762306a36Sopenharmony_ci		cctx = &ctx->rx;
46862306a36Sopenharmony_ci	}
46962306a36Sopenharmony_ci
47062306a36Sopenharmony_ci	if (!TLS_CRYPTO_INFO_READY(crypto_info)) {
47162306a36Sopenharmony_ci		rc = -EBUSY;
47262306a36Sopenharmony_ci		goto out;
47362306a36Sopenharmony_ci	}
47462306a36Sopenharmony_ci
47562306a36Sopenharmony_ci	if (len == sizeof(*crypto_info)) {
47662306a36Sopenharmony_ci		if (copy_to_user(optval, crypto_info, sizeof(*crypto_info)))
47762306a36Sopenharmony_ci			rc = -EFAULT;
47862306a36Sopenharmony_ci		goto out;
47962306a36Sopenharmony_ci	}
48062306a36Sopenharmony_ci
48162306a36Sopenharmony_ci	cipher_desc = get_cipher_desc(crypto_info->cipher_type);
48262306a36Sopenharmony_ci	if (!cipher_desc || len != cipher_desc->crypto_info) {
48362306a36Sopenharmony_ci		rc = -EINVAL;
48462306a36Sopenharmony_ci		goto out;
48562306a36Sopenharmony_ci	}
48662306a36Sopenharmony_ci
48762306a36Sopenharmony_ci	memcpy(crypto_info_iv(crypto_info, cipher_desc),
48862306a36Sopenharmony_ci	       cctx->iv + cipher_desc->salt, cipher_desc->iv);
48962306a36Sopenharmony_ci	memcpy(crypto_info_rec_seq(crypto_info, cipher_desc),
49062306a36Sopenharmony_ci	       cctx->rec_seq, cipher_desc->rec_seq);
49162306a36Sopenharmony_ci
49262306a36Sopenharmony_ci	if (copy_to_user(optval, crypto_info, cipher_desc->crypto_info))
49362306a36Sopenharmony_ci		rc = -EFAULT;
49462306a36Sopenharmony_ci
49562306a36Sopenharmony_ciout:
49662306a36Sopenharmony_ci	return rc;
49762306a36Sopenharmony_ci}
49862306a36Sopenharmony_ci
49962306a36Sopenharmony_cistatic int do_tls_getsockopt_tx_zc(struct sock *sk, char __user *optval,
50062306a36Sopenharmony_ci				   int __user *optlen)
50162306a36Sopenharmony_ci{
50262306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
50362306a36Sopenharmony_ci	unsigned int value;
50462306a36Sopenharmony_ci	int len;
50562306a36Sopenharmony_ci
50662306a36Sopenharmony_ci	if (get_user(len, optlen))
50762306a36Sopenharmony_ci		return -EFAULT;
50862306a36Sopenharmony_ci
50962306a36Sopenharmony_ci	if (len != sizeof(value))
51062306a36Sopenharmony_ci		return -EINVAL;
51162306a36Sopenharmony_ci
51262306a36Sopenharmony_ci	value = ctx->zerocopy_sendfile;
51362306a36Sopenharmony_ci	if (copy_to_user(optval, &value, sizeof(value)))
51462306a36Sopenharmony_ci		return -EFAULT;
51562306a36Sopenharmony_ci
51662306a36Sopenharmony_ci	return 0;
51762306a36Sopenharmony_ci}
51862306a36Sopenharmony_ci
51962306a36Sopenharmony_cistatic int do_tls_getsockopt_no_pad(struct sock *sk, char __user *optval,
52062306a36Sopenharmony_ci				    int __user *optlen)
52162306a36Sopenharmony_ci{
52262306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
52362306a36Sopenharmony_ci	int value, len;
52462306a36Sopenharmony_ci
52562306a36Sopenharmony_ci	if (ctx->prot_info.version != TLS_1_3_VERSION)
52662306a36Sopenharmony_ci		return -EINVAL;
52762306a36Sopenharmony_ci
52862306a36Sopenharmony_ci	if (get_user(len, optlen))
52962306a36Sopenharmony_ci		return -EFAULT;
53062306a36Sopenharmony_ci	if (len < sizeof(value))
53162306a36Sopenharmony_ci		return -EINVAL;
53262306a36Sopenharmony_ci
53362306a36Sopenharmony_ci	value = -EINVAL;
53462306a36Sopenharmony_ci	if (ctx->rx_conf == TLS_SW || ctx->rx_conf == TLS_HW)
53562306a36Sopenharmony_ci		value = ctx->rx_no_pad;
53662306a36Sopenharmony_ci	if (value < 0)
53762306a36Sopenharmony_ci		return value;
53862306a36Sopenharmony_ci
53962306a36Sopenharmony_ci	if (put_user(sizeof(value), optlen))
54062306a36Sopenharmony_ci		return -EFAULT;
54162306a36Sopenharmony_ci	if (copy_to_user(optval, &value, sizeof(value)))
54262306a36Sopenharmony_ci		return -EFAULT;
54362306a36Sopenharmony_ci
54462306a36Sopenharmony_ci	return 0;
54562306a36Sopenharmony_ci}
54662306a36Sopenharmony_ci
54762306a36Sopenharmony_cistatic int do_tls_getsockopt(struct sock *sk, int optname,
54862306a36Sopenharmony_ci			     char __user *optval, int __user *optlen)
54962306a36Sopenharmony_ci{
55062306a36Sopenharmony_ci	int rc = 0;
55162306a36Sopenharmony_ci
55262306a36Sopenharmony_ci	lock_sock(sk);
55362306a36Sopenharmony_ci
55462306a36Sopenharmony_ci	switch (optname) {
55562306a36Sopenharmony_ci	case TLS_TX:
55662306a36Sopenharmony_ci	case TLS_RX:
55762306a36Sopenharmony_ci		rc = do_tls_getsockopt_conf(sk, optval, optlen,
55862306a36Sopenharmony_ci					    optname == TLS_TX);
55962306a36Sopenharmony_ci		break;
56062306a36Sopenharmony_ci	case TLS_TX_ZEROCOPY_RO:
56162306a36Sopenharmony_ci		rc = do_tls_getsockopt_tx_zc(sk, optval, optlen);
56262306a36Sopenharmony_ci		break;
56362306a36Sopenharmony_ci	case TLS_RX_EXPECT_NO_PAD:
56462306a36Sopenharmony_ci		rc = do_tls_getsockopt_no_pad(sk, optval, optlen);
56562306a36Sopenharmony_ci		break;
56662306a36Sopenharmony_ci	default:
56762306a36Sopenharmony_ci		rc = -ENOPROTOOPT;
56862306a36Sopenharmony_ci		break;
56962306a36Sopenharmony_ci	}
57062306a36Sopenharmony_ci
57162306a36Sopenharmony_ci	release_sock(sk);
57262306a36Sopenharmony_ci
57362306a36Sopenharmony_ci	return rc;
57462306a36Sopenharmony_ci}
57562306a36Sopenharmony_ci
57662306a36Sopenharmony_cistatic int tls_getsockopt(struct sock *sk, int level, int optname,
57762306a36Sopenharmony_ci			  char __user *optval, int __user *optlen)
57862306a36Sopenharmony_ci{
57962306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
58062306a36Sopenharmony_ci
58162306a36Sopenharmony_ci	if (level != SOL_TLS)
58262306a36Sopenharmony_ci		return ctx->sk_proto->getsockopt(sk, level,
58362306a36Sopenharmony_ci						 optname, optval, optlen);
58462306a36Sopenharmony_ci
58562306a36Sopenharmony_ci	return do_tls_getsockopt(sk, optname, optval, optlen);
58662306a36Sopenharmony_ci}
58762306a36Sopenharmony_ci
58862306a36Sopenharmony_cistatic int do_tls_setsockopt_conf(struct sock *sk, sockptr_t optval,
58962306a36Sopenharmony_ci				  unsigned int optlen, int tx)
59062306a36Sopenharmony_ci{
59162306a36Sopenharmony_ci	struct tls_crypto_info *crypto_info;
59262306a36Sopenharmony_ci	struct tls_crypto_info *alt_crypto_info;
59362306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
59462306a36Sopenharmony_ci	const struct tls_cipher_desc *cipher_desc;
59562306a36Sopenharmony_ci	int rc = 0;
59662306a36Sopenharmony_ci	int conf;
59762306a36Sopenharmony_ci
59862306a36Sopenharmony_ci	if (sockptr_is_null(optval) || (optlen < sizeof(*crypto_info)))
59962306a36Sopenharmony_ci		return -EINVAL;
60062306a36Sopenharmony_ci
60162306a36Sopenharmony_ci	if (tx) {
60262306a36Sopenharmony_ci		crypto_info = &ctx->crypto_send.info;
60362306a36Sopenharmony_ci		alt_crypto_info = &ctx->crypto_recv.info;
60462306a36Sopenharmony_ci	} else {
60562306a36Sopenharmony_ci		crypto_info = &ctx->crypto_recv.info;
60662306a36Sopenharmony_ci		alt_crypto_info = &ctx->crypto_send.info;
60762306a36Sopenharmony_ci	}
60862306a36Sopenharmony_ci
60962306a36Sopenharmony_ci	/* Currently we don't support set crypto info more than one time */
61062306a36Sopenharmony_ci	if (TLS_CRYPTO_INFO_READY(crypto_info))
61162306a36Sopenharmony_ci		return -EBUSY;
61262306a36Sopenharmony_ci
61362306a36Sopenharmony_ci	rc = copy_from_sockptr(crypto_info, optval, sizeof(*crypto_info));
61462306a36Sopenharmony_ci	if (rc) {
61562306a36Sopenharmony_ci		rc = -EFAULT;
61662306a36Sopenharmony_ci		goto err_crypto_info;
61762306a36Sopenharmony_ci	}
61862306a36Sopenharmony_ci
61962306a36Sopenharmony_ci	/* check version */
62062306a36Sopenharmony_ci	if (crypto_info->version != TLS_1_2_VERSION &&
62162306a36Sopenharmony_ci	    crypto_info->version != TLS_1_3_VERSION) {
62262306a36Sopenharmony_ci		rc = -EINVAL;
62362306a36Sopenharmony_ci		goto err_crypto_info;
62462306a36Sopenharmony_ci	}
62562306a36Sopenharmony_ci
62662306a36Sopenharmony_ci	/* Ensure that TLS version and ciphers are same in both directions */
62762306a36Sopenharmony_ci	if (TLS_CRYPTO_INFO_READY(alt_crypto_info)) {
62862306a36Sopenharmony_ci		if (alt_crypto_info->version != crypto_info->version ||
62962306a36Sopenharmony_ci		    alt_crypto_info->cipher_type != crypto_info->cipher_type) {
63062306a36Sopenharmony_ci			rc = -EINVAL;
63162306a36Sopenharmony_ci			goto err_crypto_info;
63262306a36Sopenharmony_ci		}
63362306a36Sopenharmony_ci	}
63462306a36Sopenharmony_ci
63562306a36Sopenharmony_ci	cipher_desc = get_cipher_desc(crypto_info->cipher_type);
63662306a36Sopenharmony_ci	if (!cipher_desc) {
63762306a36Sopenharmony_ci		rc = -EINVAL;
63862306a36Sopenharmony_ci		goto err_crypto_info;
63962306a36Sopenharmony_ci	}
64062306a36Sopenharmony_ci
64162306a36Sopenharmony_ci	switch (crypto_info->cipher_type) {
64262306a36Sopenharmony_ci	case TLS_CIPHER_ARIA_GCM_128:
64362306a36Sopenharmony_ci	case TLS_CIPHER_ARIA_GCM_256:
64462306a36Sopenharmony_ci		if (crypto_info->version != TLS_1_2_VERSION) {
64562306a36Sopenharmony_ci			rc = -EINVAL;
64662306a36Sopenharmony_ci			goto err_crypto_info;
64762306a36Sopenharmony_ci		}
64862306a36Sopenharmony_ci		break;
64962306a36Sopenharmony_ci	}
65062306a36Sopenharmony_ci
65162306a36Sopenharmony_ci	if (optlen != cipher_desc->crypto_info) {
65262306a36Sopenharmony_ci		rc = -EINVAL;
65362306a36Sopenharmony_ci		goto err_crypto_info;
65462306a36Sopenharmony_ci	}
65562306a36Sopenharmony_ci
65662306a36Sopenharmony_ci	rc = copy_from_sockptr_offset(crypto_info + 1, optval,
65762306a36Sopenharmony_ci				      sizeof(*crypto_info),
65862306a36Sopenharmony_ci				      optlen - sizeof(*crypto_info));
65962306a36Sopenharmony_ci	if (rc) {
66062306a36Sopenharmony_ci		rc = -EFAULT;
66162306a36Sopenharmony_ci		goto err_crypto_info;
66262306a36Sopenharmony_ci	}
66362306a36Sopenharmony_ci
66462306a36Sopenharmony_ci	if (tx) {
66562306a36Sopenharmony_ci		rc = tls_set_device_offload(sk, ctx);
66662306a36Sopenharmony_ci		conf = TLS_HW;
66762306a36Sopenharmony_ci		if (!rc) {
66862306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSTXDEVICE);
66962306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSCURRTXDEVICE);
67062306a36Sopenharmony_ci		} else {
67162306a36Sopenharmony_ci			rc = tls_set_sw_offload(sk, ctx, 1);
67262306a36Sopenharmony_ci			if (rc)
67362306a36Sopenharmony_ci				goto err_crypto_info;
67462306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSTXSW);
67562306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSCURRTXSW);
67662306a36Sopenharmony_ci			conf = TLS_SW;
67762306a36Sopenharmony_ci		}
67862306a36Sopenharmony_ci	} else {
67962306a36Sopenharmony_ci		rc = tls_set_device_offload_rx(sk, ctx);
68062306a36Sopenharmony_ci		conf = TLS_HW;
68162306a36Sopenharmony_ci		if (!rc) {
68262306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSRXDEVICE);
68362306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSCURRRXDEVICE);
68462306a36Sopenharmony_ci		} else {
68562306a36Sopenharmony_ci			rc = tls_set_sw_offload(sk, ctx, 0);
68662306a36Sopenharmony_ci			if (rc)
68762306a36Sopenharmony_ci				goto err_crypto_info;
68862306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSRXSW);
68962306a36Sopenharmony_ci			TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSCURRRXSW);
69062306a36Sopenharmony_ci			conf = TLS_SW;
69162306a36Sopenharmony_ci		}
69262306a36Sopenharmony_ci		tls_sw_strparser_arm(sk, ctx);
69362306a36Sopenharmony_ci	}
69462306a36Sopenharmony_ci
69562306a36Sopenharmony_ci	if (tx)
69662306a36Sopenharmony_ci		ctx->tx_conf = conf;
69762306a36Sopenharmony_ci	else
69862306a36Sopenharmony_ci		ctx->rx_conf = conf;
69962306a36Sopenharmony_ci	update_sk_prot(sk, ctx);
70062306a36Sopenharmony_ci	if (tx) {
70162306a36Sopenharmony_ci		ctx->sk_write_space = sk->sk_write_space;
70262306a36Sopenharmony_ci		sk->sk_write_space = tls_write_space;
70362306a36Sopenharmony_ci	} else {
70462306a36Sopenharmony_ci		struct tls_sw_context_rx *rx_ctx = tls_sw_ctx_rx(ctx);
70562306a36Sopenharmony_ci
70662306a36Sopenharmony_ci		tls_strp_check_rcv(&rx_ctx->strp);
70762306a36Sopenharmony_ci	}
70862306a36Sopenharmony_ci	return 0;
70962306a36Sopenharmony_ci
71062306a36Sopenharmony_cierr_crypto_info:
71162306a36Sopenharmony_ci	memzero_explicit(crypto_info, sizeof(union tls_crypto_context));
71262306a36Sopenharmony_ci	return rc;
71362306a36Sopenharmony_ci}
71462306a36Sopenharmony_ci
71562306a36Sopenharmony_cistatic int do_tls_setsockopt_tx_zc(struct sock *sk, sockptr_t optval,
71662306a36Sopenharmony_ci				   unsigned int optlen)
71762306a36Sopenharmony_ci{
71862306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
71962306a36Sopenharmony_ci	unsigned int value;
72062306a36Sopenharmony_ci
72162306a36Sopenharmony_ci	if (sockptr_is_null(optval) || optlen != sizeof(value))
72262306a36Sopenharmony_ci		return -EINVAL;
72362306a36Sopenharmony_ci
72462306a36Sopenharmony_ci	if (copy_from_sockptr(&value, optval, sizeof(value)))
72562306a36Sopenharmony_ci		return -EFAULT;
72662306a36Sopenharmony_ci
72762306a36Sopenharmony_ci	if (value > 1)
72862306a36Sopenharmony_ci		return -EINVAL;
72962306a36Sopenharmony_ci
73062306a36Sopenharmony_ci	ctx->zerocopy_sendfile = value;
73162306a36Sopenharmony_ci
73262306a36Sopenharmony_ci	return 0;
73362306a36Sopenharmony_ci}
73462306a36Sopenharmony_ci
73562306a36Sopenharmony_cistatic int do_tls_setsockopt_no_pad(struct sock *sk, sockptr_t optval,
73662306a36Sopenharmony_ci				    unsigned int optlen)
73762306a36Sopenharmony_ci{
73862306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
73962306a36Sopenharmony_ci	u32 val;
74062306a36Sopenharmony_ci	int rc;
74162306a36Sopenharmony_ci
74262306a36Sopenharmony_ci	if (ctx->prot_info.version != TLS_1_3_VERSION ||
74362306a36Sopenharmony_ci	    sockptr_is_null(optval) || optlen < sizeof(val))
74462306a36Sopenharmony_ci		return -EINVAL;
74562306a36Sopenharmony_ci
74662306a36Sopenharmony_ci	rc = copy_from_sockptr(&val, optval, sizeof(val));
74762306a36Sopenharmony_ci	if (rc)
74862306a36Sopenharmony_ci		return -EFAULT;
74962306a36Sopenharmony_ci	if (val > 1)
75062306a36Sopenharmony_ci		return -EINVAL;
75162306a36Sopenharmony_ci	rc = check_zeroed_sockptr(optval, sizeof(val), optlen - sizeof(val));
75262306a36Sopenharmony_ci	if (rc < 1)
75362306a36Sopenharmony_ci		return rc == 0 ? -EINVAL : rc;
75462306a36Sopenharmony_ci
75562306a36Sopenharmony_ci	lock_sock(sk);
75662306a36Sopenharmony_ci	rc = -EINVAL;
75762306a36Sopenharmony_ci	if (ctx->rx_conf == TLS_SW || ctx->rx_conf == TLS_HW) {
75862306a36Sopenharmony_ci		ctx->rx_no_pad = val;
75962306a36Sopenharmony_ci		tls_update_rx_zc_capable(ctx);
76062306a36Sopenharmony_ci		rc = 0;
76162306a36Sopenharmony_ci	}
76262306a36Sopenharmony_ci	release_sock(sk);
76362306a36Sopenharmony_ci
76462306a36Sopenharmony_ci	return rc;
76562306a36Sopenharmony_ci}
76662306a36Sopenharmony_ci
76762306a36Sopenharmony_cistatic int do_tls_setsockopt(struct sock *sk, int optname, sockptr_t optval,
76862306a36Sopenharmony_ci			     unsigned int optlen)
76962306a36Sopenharmony_ci{
77062306a36Sopenharmony_ci	int rc = 0;
77162306a36Sopenharmony_ci
77262306a36Sopenharmony_ci	switch (optname) {
77362306a36Sopenharmony_ci	case TLS_TX:
77462306a36Sopenharmony_ci	case TLS_RX:
77562306a36Sopenharmony_ci		lock_sock(sk);
77662306a36Sopenharmony_ci		rc = do_tls_setsockopt_conf(sk, optval, optlen,
77762306a36Sopenharmony_ci					    optname == TLS_TX);
77862306a36Sopenharmony_ci		release_sock(sk);
77962306a36Sopenharmony_ci		break;
78062306a36Sopenharmony_ci	case TLS_TX_ZEROCOPY_RO:
78162306a36Sopenharmony_ci		lock_sock(sk);
78262306a36Sopenharmony_ci		rc = do_tls_setsockopt_tx_zc(sk, optval, optlen);
78362306a36Sopenharmony_ci		release_sock(sk);
78462306a36Sopenharmony_ci		break;
78562306a36Sopenharmony_ci	case TLS_RX_EXPECT_NO_PAD:
78662306a36Sopenharmony_ci		rc = do_tls_setsockopt_no_pad(sk, optval, optlen);
78762306a36Sopenharmony_ci		break;
78862306a36Sopenharmony_ci	default:
78962306a36Sopenharmony_ci		rc = -ENOPROTOOPT;
79062306a36Sopenharmony_ci		break;
79162306a36Sopenharmony_ci	}
79262306a36Sopenharmony_ci	return rc;
79362306a36Sopenharmony_ci}
79462306a36Sopenharmony_ci
79562306a36Sopenharmony_cistatic int tls_setsockopt(struct sock *sk, int level, int optname,
79662306a36Sopenharmony_ci			  sockptr_t optval, unsigned int optlen)
79762306a36Sopenharmony_ci{
79862306a36Sopenharmony_ci	struct tls_context *ctx = tls_get_ctx(sk);
79962306a36Sopenharmony_ci
80062306a36Sopenharmony_ci	if (level != SOL_TLS)
80162306a36Sopenharmony_ci		return ctx->sk_proto->setsockopt(sk, level, optname, optval,
80262306a36Sopenharmony_ci						 optlen);
80362306a36Sopenharmony_ci
80462306a36Sopenharmony_ci	return do_tls_setsockopt(sk, optname, optval, optlen);
80562306a36Sopenharmony_ci}
80662306a36Sopenharmony_ci
80762306a36Sopenharmony_cistruct tls_context *tls_ctx_create(struct sock *sk)
80862306a36Sopenharmony_ci{
80962306a36Sopenharmony_ci	struct inet_connection_sock *icsk = inet_csk(sk);
81062306a36Sopenharmony_ci	struct tls_context *ctx;
81162306a36Sopenharmony_ci
81262306a36Sopenharmony_ci	ctx = kzalloc(sizeof(*ctx), GFP_ATOMIC);
81362306a36Sopenharmony_ci	if (!ctx)
81462306a36Sopenharmony_ci		return NULL;
81562306a36Sopenharmony_ci
81662306a36Sopenharmony_ci	mutex_init(&ctx->tx_lock);
81762306a36Sopenharmony_ci	rcu_assign_pointer(icsk->icsk_ulp_data, ctx);
81862306a36Sopenharmony_ci	ctx->sk_proto = READ_ONCE(sk->sk_prot);
81962306a36Sopenharmony_ci	ctx->sk = sk;
82062306a36Sopenharmony_ci	return ctx;
82162306a36Sopenharmony_ci}
82262306a36Sopenharmony_ci
82362306a36Sopenharmony_cistatic void build_proto_ops(struct proto_ops ops[TLS_NUM_CONFIG][TLS_NUM_CONFIG],
82462306a36Sopenharmony_ci			    const struct proto_ops *base)
82562306a36Sopenharmony_ci{
82662306a36Sopenharmony_ci	ops[TLS_BASE][TLS_BASE] = *base;
82762306a36Sopenharmony_ci
82862306a36Sopenharmony_ci	ops[TLS_SW  ][TLS_BASE] = ops[TLS_BASE][TLS_BASE];
82962306a36Sopenharmony_ci	ops[TLS_SW  ][TLS_BASE].splice_eof	= tls_sw_splice_eof;
83062306a36Sopenharmony_ci
83162306a36Sopenharmony_ci	ops[TLS_BASE][TLS_SW  ] = ops[TLS_BASE][TLS_BASE];
83262306a36Sopenharmony_ci	ops[TLS_BASE][TLS_SW  ].splice_read	= tls_sw_splice_read;
83362306a36Sopenharmony_ci	ops[TLS_BASE][TLS_SW  ].poll		= tls_sk_poll;
83462306a36Sopenharmony_ci	ops[TLS_BASE][TLS_SW  ].read_sock	= tls_sw_read_sock;
83562306a36Sopenharmony_ci
83662306a36Sopenharmony_ci	ops[TLS_SW  ][TLS_SW  ] = ops[TLS_SW  ][TLS_BASE];
83762306a36Sopenharmony_ci	ops[TLS_SW  ][TLS_SW  ].splice_read	= tls_sw_splice_read;
83862306a36Sopenharmony_ci	ops[TLS_SW  ][TLS_SW  ].poll		= tls_sk_poll;
83962306a36Sopenharmony_ci	ops[TLS_SW  ][TLS_SW  ].read_sock	= tls_sw_read_sock;
84062306a36Sopenharmony_ci
84162306a36Sopenharmony_ci#ifdef CONFIG_TLS_DEVICE
84262306a36Sopenharmony_ci	ops[TLS_HW  ][TLS_BASE] = ops[TLS_BASE][TLS_BASE];
84362306a36Sopenharmony_ci
84462306a36Sopenharmony_ci	ops[TLS_HW  ][TLS_SW  ] = ops[TLS_BASE][TLS_SW  ];
84562306a36Sopenharmony_ci
84662306a36Sopenharmony_ci	ops[TLS_BASE][TLS_HW  ] = ops[TLS_BASE][TLS_SW  ];
84762306a36Sopenharmony_ci
84862306a36Sopenharmony_ci	ops[TLS_SW  ][TLS_HW  ] = ops[TLS_SW  ][TLS_SW  ];
84962306a36Sopenharmony_ci
85062306a36Sopenharmony_ci	ops[TLS_HW  ][TLS_HW  ] = ops[TLS_HW  ][TLS_SW  ];
85162306a36Sopenharmony_ci#endif
85262306a36Sopenharmony_ci#ifdef CONFIG_TLS_TOE
85362306a36Sopenharmony_ci	ops[TLS_HW_RECORD][TLS_HW_RECORD] = *base;
85462306a36Sopenharmony_ci#endif
85562306a36Sopenharmony_ci}
85662306a36Sopenharmony_ci
85762306a36Sopenharmony_cistatic void tls_build_proto(struct sock *sk)
85862306a36Sopenharmony_ci{
85962306a36Sopenharmony_ci	int ip_ver = sk->sk_family == AF_INET6 ? TLSV6 : TLSV4;
86062306a36Sopenharmony_ci	struct proto *prot = READ_ONCE(sk->sk_prot);
86162306a36Sopenharmony_ci
86262306a36Sopenharmony_ci	/* Build IPv6 TLS whenever the address of tcpv6 _prot changes */
86362306a36Sopenharmony_ci	if (ip_ver == TLSV6 &&
86462306a36Sopenharmony_ci	    unlikely(prot != smp_load_acquire(&saved_tcpv6_prot))) {
86562306a36Sopenharmony_ci		mutex_lock(&tcpv6_prot_mutex);
86662306a36Sopenharmony_ci		if (likely(prot != saved_tcpv6_prot)) {
86762306a36Sopenharmony_ci			build_protos(tls_prots[TLSV6], prot);
86862306a36Sopenharmony_ci			build_proto_ops(tls_proto_ops[TLSV6],
86962306a36Sopenharmony_ci					sk->sk_socket->ops);
87062306a36Sopenharmony_ci			smp_store_release(&saved_tcpv6_prot, prot);
87162306a36Sopenharmony_ci		}
87262306a36Sopenharmony_ci		mutex_unlock(&tcpv6_prot_mutex);
87362306a36Sopenharmony_ci	}
87462306a36Sopenharmony_ci
87562306a36Sopenharmony_ci	if (ip_ver == TLSV4 &&
87662306a36Sopenharmony_ci	    unlikely(prot != smp_load_acquire(&saved_tcpv4_prot))) {
87762306a36Sopenharmony_ci		mutex_lock(&tcpv4_prot_mutex);
87862306a36Sopenharmony_ci		if (likely(prot != saved_tcpv4_prot)) {
87962306a36Sopenharmony_ci			build_protos(tls_prots[TLSV4], prot);
88062306a36Sopenharmony_ci			build_proto_ops(tls_proto_ops[TLSV4],
88162306a36Sopenharmony_ci					sk->sk_socket->ops);
88262306a36Sopenharmony_ci			smp_store_release(&saved_tcpv4_prot, prot);
88362306a36Sopenharmony_ci		}
88462306a36Sopenharmony_ci		mutex_unlock(&tcpv4_prot_mutex);
88562306a36Sopenharmony_ci	}
88662306a36Sopenharmony_ci}
88762306a36Sopenharmony_ci
88862306a36Sopenharmony_cistatic void build_protos(struct proto prot[TLS_NUM_CONFIG][TLS_NUM_CONFIG],
88962306a36Sopenharmony_ci			 const struct proto *base)
89062306a36Sopenharmony_ci{
89162306a36Sopenharmony_ci	prot[TLS_BASE][TLS_BASE] = *base;
89262306a36Sopenharmony_ci	prot[TLS_BASE][TLS_BASE].setsockopt	= tls_setsockopt;
89362306a36Sopenharmony_ci	prot[TLS_BASE][TLS_BASE].getsockopt	= tls_getsockopt;
89462306a36Sopenharmony_ci	prot[TLS_BASE][TLS_BASE].close		= tls_sk_proto_close;
89562306a36Sopenharmony_ci
89662306a36Sopenharmony_ci	prot[TLS_SW][TLS_BASE] = prot[TLS_BASE][TLS_BASE];
89762306a36Sopenharmony_ci	prot[TLS_SW][TLS_BASE].sendmsg		= tls_sw_sendmsg;
89862306a36Sopenharmony_ci	prot[TLS_SW][TLS_BASE].splice_eof	= tls_sw_splice_eof;
89962306a36Sopenharmony_ci
90062306a36Sopenharmony_ci	prot[TLS_BASE][TLS_SW] = prot[TLS_BASE][TLS_BASE];
90162306a36Sopenharmony_ci	prot[TLS_BASE][TLS_SW].recvmsg		  = tls_sw_recvmsg;
90262306a36Sopenharmony_ci	prot[TLS_BASE][TLS_SW].sock_is_readable   = tls_sw_sock_is_readable;
90362306a36Sopenharmony_ci	prot[TLS_BASE][TLS_SW].close		  = tls_sk_proto_close;
90462306a36Sopenharmony_ci
90562306a36Sopenharmony_ci	prot[TLS_SW][TLS_SW] = prot[TLS_SW][TLS_BASE];
90662306a36Sopenharmony_ci	prot[TLS_SW][TLS_SW].recvmsg		= tls_sw_recvmsg;
90762306a36Sopenharmony_ci	prot[TLS_SW][TLS_SW].sock_is_readable   = tls_sw_sock_is_readable;
90862306a36Sopenharmony_ci	prot[TLS_SW][TLS_SW].close		= tls_sk_proto_close;
90962306a36Sopenharmony_ci
91062306a36Sopenharmony_ci#ifdef CONFIG_TLS_DEVICE
91162306a36Sopenharmony_ci	prot[TLS_HW][TLS_BASE] = prot[TLS_BASE][TLS_BASE];
91262306a36Sopenharmony_ci	prot[TLS_HW][TLS_BASE].sendmsg		= tls_device_sendmsg;
91362306a36Sopenharmony_ci	prot[TLS_HW][TLS_BASE].splice_eof	= tls_device_splice_eof;
91462306a36Sopenharmony_ci
91562306a36Sopenharmony_ci	prot[TLS_HW][TLS_SW] = prot[TLS_BASE][TLS_SW];
91662306a36Sopenharmony_ci	prot[TLS_HW][TLS_SW].sendmsg		= tls_device_sendmsg;
91762306a36Sopenharmony_ci	prot[TLS_HW][TLS_SW].splice_eof		= tls_device_splice_eof;
91862306a36Sopenharmony_ci
91962306a36Sopenharmony_ci	prot[TLS_BASE][TLS_HW] = prot[TLS_BASE][TLS_SW];
92062306a36Sopenharmony_ci
92162306a36Sopenharmony_ci	prot[TLS_SW][TLS_HW] = prot[TLS_SW][TLS_SW];
92262306a36Sopenharmony_ci
92362306a36Sopenharmony_ci	prot[TLS_HW][TLS_HW] = prot[TLS_HW][TLS_SW];
92462306a36Sopenharmony_ci#endif
92562306a36Sopenharmony_ci#ifdef CONFIG_TLS_TOE
92662306a36Sopenharmony_ci	prot[TLS_HW_RECORD][TLS_HW_RECORD] = *base;
92762306a36Sopenharmony_ci	prot[TLS_HW_RECORD][TLS_HW_RECORD].hash		= tls_toe_hash;
92862306a36Sopenharmony_ci	prot[TLS_HW_RECORD][TLS_HW_RECORD].unhash	= tls_toe_unhash;
92962306a36Sopenharmony_ci#endif
93062306a36Sopenharmony_ci}
93162306a36Sopenharmony_ci
93262306a36Sopenharmony_cistatic int tls_init(struct sock *sk)
93362306a36Sopenharmony_ci{
93462306a36Sopenharmony_ci	struct tls_context *ctx;
93562306a36Sopenharmony_ci	int rc = 0;
93662306a36Sopenharmony_ci
93762306a36Sopenharmony_ci	tls_build_proto(sk);
93862306a36Sopenharmony_ci
93962306a36Sopenharmony_ci#ifdef CONFIG_TLS_TOE
94062306a36Sopenharmony_ci	if (tls_toe_bypass(sk))
94162306a36Sopenharmony_ci		return 0;
94262306a36Sopenharmony_ci#endif
94362306a36Sopenharmony_ci
94462306a36Sopenharmony_ci	/* The TLS ulp is currently supported only for TCP sockets
94562306a36Sopenharmony_ci	 * in ESTABLISHED state.
94662306a36Sopenharmony_ci	 * Supporting sockets in LISTEN state will require us
94762306a36Sopenharmony_ci	 * to modify the accept implementation to clone rather then
94862306a36Sopenharmony_ci	 * share the ulp context.
94962306a36Sopenharmony_ci	 */
95062306a36Sopenharmony_ci	if (sk->sk_state != TCP_ESTABLISHED)
95162306a36Sopenharmony_ci		return -ENOTCONN;
95262306a36Sopenharmony_ci
95362306a36Sopenharmony_ci	/* allocate tls context */
95462306a36Sopenharmony_ci	write_lock_bh(&sk->sk_callback_lock);
95562306a36Sopenharmony_ci	ctx = tls_ctx_create(sk);
95662306a36Sopenharmony_ci	if (!ctx) {
95762306a36Sopenharmony_ci		rc = -ENOMEM;
95862306a36Sopenharmony_ci		goto out;
95962306a36Sopenharmony_ci	}
96062306a36Sopenharmony_ci
96162306a36Sopenharmony_ci	ctx->tx_conf = TLS_BASE;
96262306a36Sopenharmony_ci	ctx->rx_conf = TLS_BASE;
96362306a36Sopenharmony_ci	update_sk_prot(sk, ctx);
96462306a36Sopenharmony_ciout:
96562306a36Sopenharmony_ci	write_unlock_bh(&sk->sk_callback_lock);
96662306a36Sopenharmony_ci	return rc;
96762306a36Sopenharmony_ci}
96862306a36Sopenharmony_ci
96962306a36Sopenharmony_cistatic void tls_update(struct sock *sk, struct proto *p,
97062306a36Sopenharmony_ci		       void (*write_space)(struct sock *sk))
97162306a36Sopenharmony_ci{
97262306a36Sopenharmony_ci	struct tls_context *ctx;
97362306a36Sopenharmony_ci
97462306a36Sopenharmony_ci	WARN_ON_ONCE(sk->sk_prot == p);
97562306a36Sopenharmony_ci
97662306a36Sopenharmony_ci	ctx = tls_get_ctx(sk);
97762306a36Sopenharmony_ci	if (likely(ctx)) {
97862306a36Sopenharmony_ci		ctx->sk_write_space = write_space;
97962306a36Sopenharmony_ci		ctx->sk_proto = p;
98062306a36Sopenharmony_ci	} else {
98162306a36Sopenharmony_ci		/* Pairs with lockless read in sk_clone_lock(). */
98262306a36Sopenharmony_ci		WRITE_ONCE(sk->sk_prot, p);
98362306a36Sopenharmony_ci		sk->sk_write_space = write_space;
98462306a36Sopenharmony_ci	}
98562306a36Sopenharmony_ci}
98662306a36Sopenharmony_ci
98762306a36Sopenharmony_cistatic u16 tls_user_config(struct tls_context *ctx, bool tx)
98862306a36Sopenharmony_ci{
98962306a36Sopenharmony_ci	u16 config = tx ? ctx->tx_conf : ctx->rx_conf;
99062306a36Sopenharmony_ci
99162306a36Sopenharmony_ci	switch (config) {
99262306a36Sopenharmony_ci	case TLS_BASE:
99362306a36Sopenharmony_ci		return TLS_CONF_BASE;
99462306a36Sopenharmony_ci	case TLS_SW:
99562306a36Sopenharmony_ci		return TLS_CONF_SW;
99662306a36Sopenharmony_ci	case TLS_HW:
99762306a36Sopenharmony_ci		return TLS_CONF_HW;
99862306a36Sopenharmony_ci	case TLS_HW_RECORD:
99962306a36Sopenharmony_ci		return TLS_CONF_HW_RECORD;
100062306a36Sopenharmony_ci	}
100162306a36Sopenharmony_ci	return 0;
100262306a36Sopenharmony_ci}
100362306a36Sopenharmony_ci
100462306a36Sopenharmony_cistatic int tls_get_info(struct sock *sk, struct sk_buff *skb)
100562306a36Sopenharmony_ci{
100662306a36Sopenharmony_ci	u16 version, cipher_type;
100762306a36Sopenharmony_ci	struct tls_context *ctx;
100862306a36Sopenharmony_ci	struct nlattr *start;
100962306a36Sopenharmony_ci	int err;
101062306a36Sopenharmony_ci
101162306a36Sopenharmony_ci	start = nla_nest_start_noflag(skb, INET_ULP_INFO_TLS);
101262306a36Sopenharmony_ci	if (!start)
101362306a36Sopenharmony_ci		return -EMSGSIZE;
101462306a36Sopenharmony_ci
101562306a36Sopenharmony_ci	rcu_read_lock();
101662306a36Sopenharmony_ci	ctx = rcu_dereference(inet_csk(sk)->icsk_ulp_data);
101762306a36Sopenharmony_ci	if (!ctx) {
101862306a36Sopenharmony_ci		err = 0;
101962306a36Sopenharmony_ci		goto nla_failure;
102062306a36Sopenharmony_ci	}
102162306a36Sopenharmony_ci	version = ctx->prot_info.version;
102262306a36Sopenharmony_ci	if (version) {
102362306a36Sopenharmony_ci		err = nla_put_u16(skb, TLS_INFO_VERSION, version);
102462306a36Sopenharmony_ci		if (err)
102562306a36Sopenharmony_ci			goto nla_failure;
102662306a36Sopenharmony_ci	}
102762306a36Sopenharmony_ci	cipher_type = ctx->prot_info.cipher_type;
102862306a36Sopenharmony_ci	if (cipher_type) {
102962306a36Sopenharmony_ci		err = nla_put_u16(skb, TLS_INFO_CIPHER, cipher_type);
103062306a36Sopenharmony_ci		if (err)
103162306a36Sopenharmony_ci			goto nla_failure;
103262306a36Sopenharmony_ci	}
103362306a36Sopenharmony_ci	err = nla_put_u16(skb, TLS_INFO_TXCONF, tls_user_config(ctx, true));
103462306a36Sopenharmony_ci	if (err)
103562306a36Sopenharmony_ci		goto nla_failure;
103662306a36Sopenharmony_ci
103762306a36Sopenharmony_ci	err = nla_put_u16(skb, TLS_INFO_RXCONF, tls_user_config(ctx, false));
103862306a36Sopenharmony_ci	if (err)
103962306a36Sopenharmony_ci		goto nla_failure;
104062306a36Sopenharmony_ci
104162306a36Sopenharmony_ci	if (ctx->tx_conf == TLS_HW && ctx->zerocopy_sendfile) {
104262306a36Sopenharmony_ci		err = nla_put_flag(skb, TLS_INFO_ZC_RO_TX);
104362306a36Sopenharmony_ci		if (err)
104462306a36Sopenharmony_ci			goto nla_failure;
104562306a36Sopenharmony_ci	}
104662306a36Sopenharmony_ci	if (ctx->rx_no_pad) {
104762306a36Sopenharmony_ci		err = nla_put_flag(skb, TLS_INFO_RX_NO_PAD);
104862306a36Sopenharmony_ci		if (err)
104962306a36Sopenharmony_ci			goto nla_failure;
105062306a36Sopenharmony_ci	}
105162306a36Sopenharmony_ci
105262306a36Sopenharmony_ci	rcu_read_unlock();
105362306a36Sopenharmony_ci	nla_nest_end(skb, start);
105462306a36Sopenharmony_ci	return 0;
105562306a36Sopenharmony_ci
105662306a36Sopenharmony_cinla_failure:
105762306a36Sopenharmony_ci	rcu_read_unlock();
105862306a36Sopenharmony_ci	nla_nest_cancel(skb, start);
105962306a36Sopenharmony_ci	return err;
106062306a36Sopenharmony_ci}
106162306a36Sopenharmony_ci
106262306a36Sopenharmony_cistatic size_t tls_get_info_size(const struct sock *sk)
106362306a36Sopenharmony_ci{
106462306a36Sopenharmony_ci	size_t size = 0;
106562306a36Sopenharmony_ci
106662306a36Sopenharmony_ci	size += nla_total_size(0) +		/* INET_ULP_INFO_TLS */
106762306a36Sopenharmony_ci		nla_total_size(sizeof(u16)) +	/* TLS_INFO_VERSION */
106862306a36Sopenharmony_ci		nla_total_size(sizeof(u16)) +	/* TLS_INFO_CIPHER */
106962306a36Sopenharmony_ci		nla_total_size(sizeof(u16)) +	/* TLS_INFO_RXCONF */
107062306a36Sopenharmony_ci		nla_total_size(sizeof(u16)) +	/* TLS_INFO_TXCONF */
107162306a36Sopenharmony_ci		nla_total_size(0) +		/* TLS_INFO_ZC_RO_TX */
107262306a36Sopenharmony_ci		nla_total_size(0) +		/* TLS_INFO_RX_NO_PAD */
107362306a36Sopenharmony_ci		0;
107462306a36Sopenharmony_ci
107562306a36Sopenharmony_ci	return size;
107662306a36Sopenharmony_ci}
107762306a36Sopenharmony_ci
107862306a36Sopenharmony_cistatic int __net_init tls_init_net(struct net *net)
107962306a36Sopenharmony_ci{
108062306a36Sopenharmony_ci	int err;
108162306a36Sopenharmony_ci
108262306a36Sopenharmony_ci	net->mib.tls_statistics = alloc_percpu(struct linux_tls_mib);
108362306a36Sopenharmony_ci	if (!net->mib.tls_statistics)
108462306a36Sopenharmony_ci		return -ENOMEM;
108562306a36Sopenharmony_ci
108662306a36Sopenharmony_ci	err = tls_proc_init(net);
108762306a36Sopenharmony_ci	if (err)
108862306a36Sopenharmony_ci		goto err_free_stats;
108962306a36Sopenharmony_ci
109062306a36Sopenharmony_ci	return 0;
109162306a36Sopenharmony_cierr_free_stats:
109262306a36Sopenharmony_ci	free_percpu(net->mib.tls_statistics);
109362306a36Sopenharmony_ci	return err;
109462306a36Sopenharmony_ci}
109562306a36Sopenharmony_ci
109662306a36Sopenharmony_cistatic void __net_exit tls_exit_net(struct net *net)
109762306a36Sopenharmony_ci{
109862306a36Sopenharmony_ci	tls_proc_fini(net);
109962306a36Sopenharmony_ci	free_percpu(net->mib.tls_statistics);
110062306a36Sopenharmony_ci}
110162306a36Sopenharmony_ci
110262306a36Sopenharmony_cistatic struct pernet_operations tls_proc_ops = {
110362306a36Sopenharmony_ci	.init = tls_init_net,
110462306a36Sopenharmony_ci	.exit = tls_exit_net,
110562306a36Sopenharmony_ci};
110662306a36Sopenharmony_ci
110762306a36Sopenharmony_cistatic struct tcp_ulp_ops tcp_tls_ulp_ops __read_mostly = {
110862306a36Sopenharmony_ci	.name			= "tls",
110962306a36Sopenharmony_ci	.owner			= THIS_MODULE,
111062306a36Sopenharmony_ci	.init			= tls_init,
111162306a36Sopenharmony_ci	.update			= tls_update,
111262306a36Sopenharmony_ci	.get_info		= tls_get_info,
111362306a36Sopenharmony_ci	.get_info_size		= tls_get_info_size,
111462306a36Sopenharmony_ci};
111562306a36Sopenharmony_ci
111662306a36Sopenharmony_cistatic int __init tls_register(void)
111762306a36Sopenharmony_ci{
111862306a36Sopenharmony_ci	int err;
111962306a36Sopenharmony_ci
112062306a36Sopenharmony_ci	err = register_pernet_subsys(&tls_proc_ops);
112162306a36Sopenharmony_ci	if (err)
112262306a36Sopenharmony_ci		return err;
112362306a36Sopenharmony_ci
112462306a36Sopenharmony_ci	err = tls_strp_dev_init();
112562306a36Sopenharmony_ci	if (err)
112662306a36Sopenharmony_ci		goto err_pernet;
112762306a36Sopenharmony_ci
112862306a36Sopenharmony_ci	err = tls_device_init();
112962306a36Sopenharmony_ci	if (err)
113062306a36Sopenharmony_ci		goto err_strp;
113162306a36Sopenharmony_ci
113262306a36Sopenharmony_ci	tcp_register_ulp(&tcp_tls_ulp_ops);
113362306a36Sopenharmony_ci
113462306a36Sopenharmony_ci	return 0;
113562306a36Sopenharmony_cierr_strp:
113662306a36Sopenharmony_ci	tls_strp_dev_exit();
113762306a36Sopenharmony_cierr_pernet:
113862306a36Sopenharmony_ci	unregister_pernet_subsys(&tls_proc_ops);
113962306a36Sopenharmony_ci	return err;
114062306a36Sopenharmony_ci}
114162306a36Sopenharmony_ci
114262306a36Sopenharmony_cistatic void __exit tls_unregister(void)
114362306a36Sopenharmony_ci{
114462306a36Sopenharmony_ci	tcp_unregister_ulp(&tcp_tls_ulp_ops);
114562306a36Sopenharmony_ci	tls_strp_dev_exit();
114662306a36Sopenharmony_ci	tls_device_cleanup();
114762306a36Sopenharmony_ci	unregister_pernet_subsys(&tls_proc_ops);
114862306a36Sopenharmony_ci}
114962306a36Sopenharmony_ci
115062306a36Sopenharmony_cimodule_init(tls_register);
115162306a36Sopenharmony_cimodule_exit(tls_unregister);
1152