162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/* Copyright (c) 2016 Tom Herbert <tom@herbertland.com> */
362306a36Sopenharmony_ci
462306a36Sopenharmony_ci#include <linux/skbuff.h>
562306a36Sopenharmony_ci#include <linux/workqueue.h>
662306a36Sopenharmony_ci#include <net/strparser.h>
762306a36Sopenharmony_ci#include <net/tcp.h>
862306a36Sopenharmony_ci#include <net/sock.h>
962306a36Sopenharmony_ci#include <net/tls.h>
1062306a36Sopenharmony_ci
1162306a36Sopenharmony_ci#include "tls.h"
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_cistatic struct workqueue_struct *tls_strp_wq;
1462306a36Sopenharmony_ci
1562306a36Sopenharmony_cistatic void tls_strp_abort_strp(struct tls_strparser *strp, int err)
1662306a36Sopenharmony_ci{
1762306a36Sopenharmony_ci	if (strp->stopped)
1862306a36Sopenharmony_ci		return;
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci	strp->stopped = 1;
2162306a36Sopenharmony_ci
2262306a36Sopenharmony_ci	/* Report an error on the lower socket */
2362306a36Sopenharmony_ci	WRITE_ONCE(strp->sk->sk_err, -err);
2462306a36Sopenharmony_ci	/* Paired with smp_rmb() in tcp_poll() */
2562306a36Sopenharmony_ci	smp_wmb();
2662306a36Sopenharmony_ci	sk_error_report(strp->sk);
2762306a36Sopenharmony_ci}
2862306a36Sopenharmony_ci
2962306a36Sopenharmony_cistatic void tls_strp_anchor_free(struct tls_strparser *strp)
3062306a36Sopenharmony_ci{
3162306a36Sopenharmony_ci	struct skb_shared_info *shinfo = skb_shinfo(strp->anchor);
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ci	DEBUG_NET_WARN_ON_ONCE(atomic_read(&shinfo->dataref) != 1);
3462306a36Sopenharmony_ci	if (!strp->copy_mode)
3562306a36Sopenharmony_ci		shinfo->frag_list = NULL;
3662306a36Sopenharmony_ci	consume_skb(strp->anchor);
3762306a36Sopenharmony_ci	strp->anchor = NULL;
3862306a36Sopenharmony_ci}
3962306a36Sopenharmony_ci
4062306a36Sopenharmony_cistatic struct sk_buff *
4162306a36Sopenharmony_citls_strp_skb_copy(struct tls_strparser *strp, struct sk_buff *in_skb,
4262306a36Sopenharmony_ci		  int offset, int len)
4362306a36Sopenharmony_ci{
4462306a36Sopenharmony_ci	struct sk_buff *skb;
4562306a36Sopenharmony_ci	int i, err;
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci	skb = alloc_skb_with_frags(0, len, TLS_PAGE_ORDER,
4862306a36Sopenharmony_ci				   &err, strp->sk->sk_allocation);
4962306a36Sopenharmony_ci	if (!skb)
5062306a36Sopenharmony_ci		return NULL;
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci	for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
5362306a36Sopenharmony_ci		skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
5462306a36Sopenharmony_ci
5562306a36Sopenharmony_ci		WARN_ON_ONCE(skb_copy_bits(in_skb, offset,
5662306a36Sopenharmony_ci					   skb_frag_address(frag),
5762306a36Sopenharmony_ci					   skb_frag_size(frag)));
5862306a36Sopenharmony_ci		offset += skb_frag_size(frag);
5962306a36Sopenharmony_ci	}
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	skb->len = len;
6262306a36Sopenharmony_ci	skb->data_len = len;
6362306a36Sopenharmony_ci	skb_copy_header(skb, in_skb);
6462306a36Sopenharmony_ci	return skb;
6562306a36Sopenharmony_ci}
6662306a36Sopenharmony_ci
6762306a36Sopenharmony_ci/* Create a new skb with the contents of input copied to its page frags */
6862306a36Sopenharmony_cistatic struct sk_buff *tls_strp_msg_make_copy(struct tls_strparser *strp)
6962306a36Sopenharmony_ci{
7062306a36Sopenharmony_ci	struct strp_msg *rxm;
7162306a36Sopenharmony_ci	struct sk_buff *skb;
7262306a36Sopenharmony_ci
7362306a36Sopenharmony_ci	skb = tls_strp_skb_copy(strp, strp->anchor, strp->stm.offset,
7462306a36Sopenharmony_ci				strp->stm.full_len);
7562306a36Sopenharmony_ci	if (!skb)
7662306a36Sopenharmony_ci		return NULL;
7762306a36Sopenharmony_ci
7862306a36Sopenharmony_ci	rxm = strp_msg(skb);
7962306a36Sopenharmony_ci	rxm->offset = 0;
8062306a36Sopenharmony_ci	return skb;
8162306a36Sopenharmony_ci}
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ci/* Steal the input skb, input msg is invalid after calling this function */
8462306a36Sopenharmony_cistruct sk_buff *tls_strp_msg_detach(struct tls_sw_context_rx *ctx)
8562306a36Sopenharmony_ci{
8662306a36Sopenharmony_ci	struct tls_strparser *strp = &ctx->strp;
8762306a36Sopenharmony_ci
8862306a36Sopenharmony_ci#ifdef CONFIG_TLS_DEVICE
8962306a36Sopenharmony_ci	DEBUG_NET_WARN_ON_ONCE(!strp->anchor->decrypted);
9062306a36Sopenharmony_ci#else
9162306a36Sopenharmony_ci	/* This function turns an input into an output,
9262306a36Sopenharmony_ci	 * that can only happen if we have offload.
9362306a36Sopenharmony_ci	 */
9462306a36Sopenharmony_ci	WARN_ON(1);
9562306a36Sopenharmony_ci#endif
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_ci	if (strp->copy_mode) {
9862306a36Sopenharmony_ci		struct sk_buff *skb;
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_ci		/* Replace anchor with an empty skb, this is a little
10162306a36Sopenharmony_ci		 * dangerous but __tls_cur_msg() warns on empty skbs
10262306a36Sopenharmony_ci		 * so hopefully we'll catch abuses.
10362306a36Sopenharmony_ci		 */
10462306a36Sopenharmony_ci		skb = alloc_skb(0, strp->sk->sk_allocation);
10562306a36Sopenharmony_ci		if (!skb)
10662306a36Sopenharmony_ci			return NULL;
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_ci		swap(strp->anchor, skb);
10962306a36Sopenharmony_ci		return skb;
11062306a36Sopenharmony_ci	}
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	return tls_strp_msg_make_copy(strp);
11362306a36Sopenharmony_ci}
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_ci/* Force the input skb to be in copy mode. The data ownership remains
11662306a36Sopenharmony_ci * with the input skb itself (meaning unpause will wipe it) but it can
11762306a36Sopenharmony_ci * be modified.
11862306a36Sopenharmony_ci */
11962306a36Sopenharmony_ciint tls_strp_msg_cow(struct tls_sw_context_rx *ctx)
12062306a36Sopenharmony_ci{
12162306a36Sopenharmony_ci	struct tls_strparser *strp = &ctx->strp;
12262306a36Sopenharmony_ci	struct sk_buff *skb;
12362306a36Sopenharmony_ci
12462306a36Sopenharmony_ci	if (strp->copy_mode)
12562306a36Sopenharmony_ci		return 0;
12662306a36Sopenharmony_ci
12762306a36Sopenharmony_ci	skb = tls_strp_msg_make_copy(strp);
12862306a36Sopenharmony_ci	if (!skb)
12962306a36Sopenharmony_ci		return -ENOMEM;
13062306a36Sopenharmony_ci
13162306a36Sopenharmony_ci	tls_strp_anchor_free(strp);
13262306a36Sopenharmony_ci	strp->anchor = skb;
13362306a36Sopenharmony_ci
13462306a36Sopenharmony_ci	tcp_read_done(strp->sk, strp->stm.full_len);
13562306a36Sopenharmony_ci	strp->copy_mode = 1;
13662306a36Sopenharmony_ci
13762306a36Sopenharmony_ci	return 0;
13862306a36Sopenharmony_ci}
13962306a36Sopenharmony_ci
14062306a36Sopenharmony_ci/* Make a clone (in the skb sense) of the input msg to keep a reference
14162306a36Sopenharmony_ci * to the underlying data. The reference-holding skbs get placed on
14262306a36Sopenharmony_ci * @dst.
14362306a36Sopenharmony_ci */
14462306a36Sopenharmony_ciint tls_strp_msg_hold(struct tls_strparser *strp, struct sk_buff_head *dst)
14562306a36Sopenharmony_ci{
14662306a36Sopenharmony_ci	struct skb_shared_info *shinfo = skb_shinfo(strp->anchor);
14762306a36Sopenharmony_ci
14862306a36Sopenharmony_ci	if (strp->copy_mode) {
14962306a36Sopenharmony_ci		struct sk_buff *skb;
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_ci		WARN_ON_ONCE(!shinfo->nr_frags);
15262306a36Sopenharmony_ci
15362306a36Sopenharmony_ci		/* We can't skb_clone() the anchor, it gets wiped by unpause */
15462306a36Sopenharmony_ci		skb = alloc_skb(0, strp->sk->sk_allocation);
15562306a36Sopenharmony_ci		if (!skb)
15662306a36Sopenharmony_ci			return -ENOMEM;
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci		__skb_queue_tail(dst, strp->anchor);
15962306a36Sopenharmony_ci		strp->anchor = skb;
16062306a36Sopenharmony_ci	} else {
16162306a36Sopenharmony_ci		struct sk_buff *iter, *clone;
16262306a36Sopenharmony_ci		int chunk, len, offset;
16362306a36Sopenharmony_ci
16462306a36Sopenharmony_ci		offset = strp->stm.offset;
16562306a36Sopenharmony_ci		len = strp->stm.full_len;
16662306a36Sopenharmony_ci		iter = shinfo->frag_list;
16762306a36Sopenharmony_ci
16862306a36Sopenharmony_ci		while (len > 0) {
16962306a36Sopenharmony_ci			if (iter->len <= offset) {
17062306a36Sopenharmony_ci				offset -= iter->len;
17162306a36Sopenharmony_ci				goto next;
17262306a36Sopenharmony_ci			}
17362306a36Sopenharmony_ci
17462306a36Sopenharmony_ci			chunk = iter->len - offset;
17562306a36Sopenharmony_ci			offset = 0;
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_ci			clone = skb_clone(iter, strp->sk->sk_allocation);
17862306a36Sopenharmony_ci			if (!clone)
17962306a36Sopenharmony_ci				return -ENOMEM;
18062306a36Sopenharmony_ci			__skb_queue_tail(dst, clone);
18162306a36Sopenharmony_ci
18262306a36Sopenharmony_ci			len -= chunk;
18362306a36Sopenharmony_cinext:
18462306a36Sopenharmony_ci			iter = iter->next;
18562306a36Sopenharmony_ci		}
18662306a36Sopenharmony_ci	}
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_ci	return 0;
18962306a36Sopenharmony_ci}
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_cistatic void tls_strp_flush_anchor_copy(struct tls_strparser *strp)
19262306a36Sopenharmony_ci{
19362306a36Sopenharmony_ci	struct skb_shared_info *shinfo = skb_shinfo(strp->anchor);
19462306a36Sopenharmony_ci	int i;
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci	DEBUG_NET_WARN_ON_ONCE(atomic_read(&shinfo->dataref) != 1);
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	for (i = 0; i < shinfo->nr_frags; i++)
19962306a36Sopenharmony_ci		__skb_frag_unref(&shinfo->frags[i], false);
20062306a36Sopenharmony_ci	shinfo->nr_frags = 0;
20162306a36Sopenharmony_ci	if (strp->copy_mode) {
20262306a36Sopenharmony_ci		kfree_skb_list(shinfo->frag_list);
20362306a36Sopenharmony_ci		shinfo->frag_list = NULL;
20462306a36Sopenharmony_ci	}
20562306a36Sopenharmony_ci	strp->copy_mode = 0;
20662306a36Sopenharmony_ci	strp->mixed_decrypted = 0;
20762306a36Sopenharmony_ci}
20862306a36Sopenharmony_ci
20962306a36Sopenharmony_cistatic int tls_strp_copyin_frag(struct tls_strparser *strp, struct sk_buff *skb,
21062306a36Sopenharmony_ci				struct sk_buff *in_skb, unsigned int offset,
21162306a36Sopenharmony_ci				size_t in_len)
21262306a36Sopenharmony_ci{
21362306a36Sopenharmony_ci	size_t len, chunk;
21462306a36Sopenharmony_ci	skb_frag_t *frag;
21562306a36Sopenharmony_ci	int sz;
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_ci	frag = &skb_shinfo(skb)->frags[skb->len / PAGE_SIZE];
21862306a36Sopenharmony_ci
21962306a36Sopenharmony_ci	len = in_len;
22062306a36Sopenharmony_ci	/* First make sure we got the header */
22162306a36Sopenharmony_ci	if (!strp->stm.full_len) {
22262306a36Sopenharmony_ci		/* Assume one page is more than enough for headers */
22362306a36Sopenharmony_ci		chunk =	min_t(size_t, len, PAGE_SIZE - skb_frag_size(frag));
22462306a36Sopenharmony_ci		WARN_ON_ONCE(skb_copy_bits(in_skb, offset,
22562306a36Sopenharmony_ci					   skb_frag_address(frag) +
22662306a36Sopenharmony_ci					   skb_frag_size(frag),
22762306a36Sopenharmony_ci					   chunk));
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_ci		skb->len += chunk;
23062306a36Sopenharmony_ci		skb->data_len += chunk;
23162306a36Sopenharmony_ci		skb_frag_size_add(frag, chunk);
23262306a36Sopenharmony_ci
23362306a36Sopenharmony_ci		sz = tls_rx_msg_size(strp, skb);
23462306a36Sopenharmony_ci		if (sz < 0)
23562306a36Sopenharmony_ci			return sz;
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_ci		/* We may have over-read, sz == 0 is guaranteed under-read */
23862306a36Sopenharmony_ci		if (unlikely(sz && sz < skb->len)) {
23962306a36Sopenharmony_ci			int over = skb->len - sz;
24062306a36Sopenharmony_ci
24162306a36Sopenharmony_ci			WARN_ON_ONCE(over > chunk);
24262306a36Sopenharmony_ci			skb->len -= over;
24362306a36Sopenharmony_ci			skb->data_len -= over;
24462306a36Sopenharmony_ci			skb_frag_size_add(frag, -over);
24562306a36Sopenharmony_ci
24662306a36Sopenharmony_ci			chunk -= over;
24762306a36Sopenharmony_ci		}
24862306a36Sopenharmony_ci
24962306a36Sopenharmony_ci		frag++;
25062306a36Sopenharmony_ci		len -= chunk;
25162306a36Sopenharmony_ci		offset += chunk;
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_ci		strp->stm.full_len = sz;
25462306a36Sopenharmony_ci		if (!strp->stm.full_len)
25562306a36Sopenharmony_ci			goto read_done;
25662306a36Sopenharmony_ci	}
25762306a36Sopenharmony_ci
25862306a36Sopenharmony_ci	/* Load up more data */
25962306a36Sopenharmony_ci	while (len && strp->stm.full_len > skb->len) {
26062306a36Sopenharmony_ci		chunk =	min_t(size_t, len, strp->stm.full_len - skb->len);
26162306a36Sopenharmony_ci		chunk = min_t(size_t, chunk, PAGE_SIZE - skb_frag_size(frag));
26262306a36Sopenharmony_ci		WARN_ON_ONCE(skb_copy_bits(in_skb, offset,
26362306a36Sopenharmony_ci					   skb_frag_address(frag) +
26462306a36Sopenharmony_ci					   skb_frag_size(frag),
26562306a36Sopenharmony_ci					   chunk));
26662306a36Sopenharmony_ci
26762306a36Sopenharmony_ci		skb->len += chunk;
26862306a36Sopenharmony_ci		skb->data_len += chunk;
26962306a36Sopenharmony_ci		skb_frag_size_add(frag, chunk);
27062306a36Sopenharmony_ci		frag++;
27162306a36Sopenharmony_ci		len -= chunk;
27262306a36Sopenharmony_ci		offset += chunk;
27362306a36Sopenharmony_ci	}
27462306a36Sopenharmony_ci
27562306a36Sopenharmony_ciread_done:
27662306a36Sopenharmony_ci	return in_len - len;
27762306a36Sopenharmony_ci}
27862306a36Sopenharmony_ci
27962306a36Sopenharmony_cistatic int tls_strp_copyin_skb(struct tls_strparser *strp, struct sk_buff *skb,
28062306a36Sopenharmony_ci			       struct sk_buff *in_skb, unsigned int offset,
28162306a36Sopenharmony_ci			       size_t in_len)
28262306a36Sopenharmony_ci{
28362306a36Sopenharmony_ci	struct sk_buff *nskb, *first, *last;
28462306a36Sopenharmony_ci	struct skb_shared_info *shinfo;
28562306a36Sopenharmony_ci	size_t chunk;
28662306a36Sopenharmony_ci	int sz;
28762306a36Sopenharmony_ci
28862306a36Sopenharmony_ci	if (strp->stm.full_len)
28962306a36Sopenharmony_ci		chunk = strp->stm.full_len - skb->len;
29062306a36Sopenharmony_ci	else
29162306a36Sopenharmony_ci		chunk = TLS_MAX_PAYLOAD_SIZE + PAGE_SIZE;
29262306a36Sopenharmony_ci	chunk = min(chunk, in_len);
29362306a36Sopenharmony_ci
29462306a36Sopenharmony_ci	nskb = tls_strp_skb_copy(strp, in_skb, offset, chunk);
29562306a36Sopenharmony_ci	if (!nskb)
29662306a36Sopenharmony_ci		return -ENOMEM;
29762306a36Sopenharmony_ci
29862306a36Sopenharmony_ci	shinfo = skb_shinfo(skb);
29962306a36Sopenharmony_ci	if (!shinfo->frag_list) {
30062306a36Sopenharmony_ci		shinfo->frag_list = nskb;
30162306a36Sopenharmony_ci		nskb->prev = nskb;
30262306a36Sopenharmony_ci	} else {
30362306a36Sopenharmony_ci		first = shinfo->frag_list;
30462306a36Sopenharmony_ci		last = first->prev;
30562306a36Sopenharmony_ci		last->next = nskb;
30662306a36Sopenharmony_ci		first->prev = nskb;
30762306a36Sopenharmony_ci	}
30862306a36Sopenharmony_ci
30962306a36Sopenharmony_ci	skb->len += chunk;
31062306a36Sopenharmony_ci	skb->data_len += chunk;
31162306a36Sopenharmony_ci
31262306a36Sopenharmony_ci	if (!strp->stm.full_len) {
31362306a36Sopenharmony_ci		sz = tls_rx_msg_size(strp, skb);
31462306a36Sopenharmony_ci		if (sz < 0)
31562306a36Sopenharmony_ci			return sz;
31662306a36Sopenharmony_ci
31762306a36Sopenharmony_ci		/* We may have over-read, sz == 0 is guaranteed under-read */
31862306a36Sopenharmony_ci		if (unlikely(sz && sz < skb->len)) {
31962306a36Sopenharmony_ci			int over = skb->len - sz;
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci			WARN_ON_ONCE(over > chunk);
32262306a36Sopenharmony_ci			skb->len -= over;
32362306a36Sopenharmony_ci			skb->data_len -= over;
32462306a36Sopenharmony_ci			__pskb_trim(nskb, nskb->len - over);
32562306a36Sopenharmony_ci
32662306a36Sopenharmony_ci			chunk -= over;
32762306a36Sopenharmony_ci		}
32862306a36Sopenharmony_ci
32962306a36Sopenharmony_ci		strp->stm.full_len = sz;
33062306a36Sopenharmony_ci	}
33162306a36Sopenharmony_ci
33262306a36Sopenharmony_ci	return chunk;
33362306a36Sopenharmony_ci}
33462306a36Sopenharmony_ci
33562306a36Sopenharmony_cistatic int tls_strp_copyin(read_descriptor_t *desc, struct sk_buff *in_skb,
33662306a36Sopenharmony_ci			   unsigned int offset, size_t in_len)
33762306a36Sopenharmony_ci{
33862306a36Sopenharmony_ci	struct tls_strparser *strp = (struct tls_strparser *)desc->arg.data;
33962306a36Sopenharmony_ci	struct sk_buff *skb;
34062306a36Sopenharmony_ci	int ret;
34162306a36Sopenharmony_ci
34262306a36Sopenharmony_ci	if (strp->msg_ready)
34362306a36Sopenharmony_ci		return 0;
34462306a36Sopenharmony_ci
34562306a36Sopenharmony_ci	skb = strp->anchor;
34662306a36Sopenharmony_ci	if (!skb->len)
34762306a36Sopenharmony_ci		skb_copy_decrypted(skb, in_skb);
34862306a36Sopenharmony_ci	else
34962306a36Sopenharmony_ci		strp->mixed_decrypted |= !!skb_cmp_decrypted(skb, in_skb);
35062306a36Sopenharmony_ci
35162306a36Sopenharmony_ci	if (IS_ENABLED(CONFIG_TLS_DEVICE) && strp->mixed_decrypted)
35262306a36Sopenharmony_ci		ret = tls_strp_copyin_skb(strp, skb, in_skb, offset, in_len);
35362306a36Sopenharmony_ci	else
35462306a36Sopenharmony_ci		ret = tls_strp_copyin_frag(strp, skb, in_skb, offset, in_len);
35562306a36Sopenharmony_ci	if (ret < 0) {
35662306a36Sopenharmony_ci		desc->error = ret;
35762306a36Sopenharmony_ci		ret = 0;
35862306a36Sopenharmony_ci	}
35962306a36Sopenharmony_ci
36062306a36Sopenharmony_ci	if (strp->stm.full_len && strp->stm.full_len == skb->len) {
36162306a36Sopenharmony_ci		desc->count = 0;
36262306a36Sopenharmony_ci
36362306a36Sopenharmony_ci		strp->msg_ready = 1;
36462306a36Sopenharmony_ci		tls_rx_msg_ready(strp);
36562306a36Sopenharmony_ci	}
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci	return ret;
36862306a36Sopenharmony_ci}
36962306a36Sopenharmony_ci
37062306a36Sopenharmony_cistatic int tls_strp_read_copyin(struct tls_strparser *strp)
37162306a36Sopenharmony_ci{
37262306a36Sopenharmony_ci	read_descriptor_t desc;
37362306a36Sopenharmony_ci
37462306a36Sopenharmony_ci	desc.arg.data = strp;
37562306a36Sopenharmony_ci	desc.error = 0;
37662306a36Sopenharmony_ci	desc.count = 1; /* give more than one skb per call */
37762306a36Sopenharmony_ci
37862306a36Sopenharmony_ci	/* sk should be locked here, so okay to do read_sock */
37962306a36Sopenharmony_ci	tcp_read_sock(strp->sk, &desc, tls_strp_copyin);
38062306a36Sopenharmony_ci
38162306a36Sopenharmony_ci	return desc.error;
38262306a36Sopenharmony_ci}
38362306a36Sopenharmony_ci
38462306a36Sopenharmony_cistatic int tls_strp_read_copy(struct tls_strparser *strp, bool qshort)
38562306a36Sopenharmony_ci{
38662306a36Sopenharmony_ci	struct skb_shared_info *shinfo;
38762306a36Sopenharmony_ci	struct page *page;
38862306a36Sopenharmony_ci	int need_spc, len;
38962306a36Sopenharmony_ci
39062306a36Sopenharmony_ci	/* If the rbuf is small or rcv window has collapsed to 0 we need
39162306a36Sopenharmony_ci	 * to read the data out. Otherwise the connection will stall.
39262306a36Sopenharmony_ci	 * Without pressure threshold of INT_MAX will never be ready.
39362306a36Sopenharmony_ci	 */
39462306a36Sopenharmony_ci	if (likely(qshort && !tcp_epollin_ready(strp->sk, INT_MAX)))
39562306a36Sopenharmony_ci		return 0;
39662306a36Sopenharmony_ci
39762306a36Sopenharmony_ci	shinfo = skb_shinfo(strp->anchor);
39862306a36Sopenharmony_ci	shinfo->frag_list = NULL;
39962306a36Sopenharmony_ci
40062306a36Sopenharmony_ci	/* If we don't know the length go max plus page for cipher overhead */
40162306a36Sopenharmony_ci	need_spc = strp->stm.full_len ?: TLS_MAX_PAYLOAD_SIZE + PAGE_SIZE;
40262306a36Sopenharmony_ci
40362306a36Sopenharmony_ci	for (len = need_spc; len > 0; len -= PAGE_SIZE) {
40462306a36Sopenharmony_ci		page = alloc_page(strp->sk->sk_allocation);
40562306a36Sopenharmony_ci		if (!page) {
40662306a36Sopenharmony_ci			tls_strp_flush_anchor_copy(strp);
40762306a36Sopenharmony_ci			return -ENOMEM;
40862306a36Sopenharmony_ci		}
40962306a36Sopenharmony_ci
41062306a36Sopenharmony_ci		skb_fill_page_desc(strp->anchor, shinfo->nr_frags++,
41162306a36Sopenharmony_ci				   page, 0, 0);
41262306a36Sopenharmony_ci	}
41362306a36Sopenharmony_ci
41462306a36Sopenharmony_ci	strp->copy_mode = 1;
41562306a36Sopenharmony_ci	strp->stm.offset = 0;
41662306a36Sopenharmony_ci
41762306a36Sopenharmony_ci	strp->anchor->len = 0;
41862306a36Sopenharmony_ci	strp->anchor->data_len = 0;
41962306a36Sopenharmony_ci	strp->anchor->truesize = round_up(need_spc, PAGE_SIZE);
42062306a36Sopenharmony_ci
42162306a36Sopenharmony_ci	tls_strp_read_copyin(strp);
42262306a36Sopenharmony_ci
42362306a36Sopenharmony_ci	return 0;
42462306a36Sopenharmony_ci}
42562306a36Sopenharmony_ci
42662306a36Sopenharmony_cistatic bool tls_strp_check_queue_ok(struct tls_strparser *strp)
42762306a36Sopenharmony_ci{
42862306a36Sopenharmony_ci	unsigned int len = strp->stm.offset + strp->stm.full_len;
42962306a36Sopenharmony_ci	struct sk_buff *first, *skb;
43062306a36Sopenharmony_ci	u32 seq;
43162306a36Sopenharmony_ci
43262306a36Sopenharmony_ci	first = skb_shinfo(strp->anchor)->frag_list;
43362306a36Sopenharmony_ci	skb = first;
43462306a36Sopenharmony_ci	seq = TCP_SKB_CB(first)->seq;
43562306a36Sopenharmony_ci
43662306a36Sopenharmony_ci	/* Make sure there's no duplicate data in the queue,
43762306a36Sopenharmony_ci	 * and the decrypted status matches.
43862306a36Sopenharmony_ci	 */
43962306a36Sopenharmony_ci	while (skb->len < len) {
44062306a36Sopenharmony_ci		seq += skb->len;
44162306a36Sopenharmony_ci		len -= skb->len;
44262306a36Sopenharmony_ci		skb = skb->next;
44362306a36Sopenharmony_ci
44462306a36Sopenharmony_ci		if (TCP_SKB_CB(skb)->seq != seq)
44562306a36Sopenharmony_ci			return false;
44662306a36Sopenharmony_ci		if (skb_cmp_decrypted(first, skb))
44762306a36Sopenharmony_ci			return false;
44862306a36Sopenharmony_ci	}
44962306a36Sopenharmony_ci
45062306a36Sopenharmony_ci	return true;
45162306a36Sopenharmony_ci}
45262306a36Sopenharmony_ci
45362306a36Sopenharmony_cistatic void tls_strp_load_anchor_with_queue(struct tls_strparser *strp, int len)
45462306a36Sopenharmony_ci{
45562306a36Sopenharmony_ci	struct tcp_sock *tp = tcp_sk(strp->sk);
45662306a36Sopenharmony_ci	struct sk_buff *first;
45762306a36Sopenharmony_ci	u32 offset;
45862306a36Sopenharmony_ci
45962306a36Sopenharmony_ci	first = tcp_recv_skb(strp->sk, tp->copied_seq, &offset);
46062306a36Sopenharmony_ci	if (WARN_ON_ONCE(!first))
46162306a36Sopenharmony_ci		return;
46262306a36Sopenharmony_ci
46362306a36Sopenharmony_ci	/* Bestow the state onto the anchor */
46462306a36Sopenharmony_ci	strp->anchor->len = offset + len;
46562306a36Sopenharmony_ci	strp->anchor->data_len = offset + len;
46662306a36Sopenharmony_ci	strp->anchor->truesize = offset + len;
46762306a36Sopenharmony_ci
46862306a36Sopenharmony_ci	skb_shinfo(strp->anchor)->frag_list = first;
46962306a36Sopenharmony_ci
47062306a36Sopenharmony_ci	skb_copy_header(strp->anchor, first);
47162306a36Sopenharmony_ci	strp->anchor->destructor = NULL;
47262306a36Sopenharmony_ci
47362306a36Sopenharmony_ci	strp->stm.offset = offset;
47462306a36Sopenharmony_ci}
47562306a36Sopenharmony_ci
47662306a36Sopenharmony_civoid tls_strp_msg_load(struct tls_strparser *strp, bool force_refresh)
47762306a36Sopenharmony_ci{
47862306a36Sopenharmony_ci	struct strp_msg *rxm;
47962306a36Sopenharmony_ci	struct tls_msg *tlm;
48062306a36Sopenharmony_ci
48162306a36Sopenharmony_ci	DEBUG_NET_WARN_ON_ONCE(!strp->msg_ready);
48262306a36Sopenharmony_ci	DEBUG_NET_WARN_ON_ONCE(!strp->stm.full_len);
48362306a36Sopenharmony_ci
48462306a36Sopenharmony_ci	if (!strp->copy_mode && force_refresh) {
48562306a36Sopenharmony_ci		if (WARN_ON(tcp_inq(strp->sk) < strp->stm.full_len))
48662306a36Sopenharmony_ci			return;
48762306a36Sopenharmony_ci
48862306a36Sopenharmony_ci		tls_strp_load_anchor_with_queue(strp, strp->stm.full_len);
48962306a36Sopenharmony_ci	}
49062306a36Sopenharmony_ci
49162306a36Sopenharmony_ci	rxm = strp_msg(strp->anchor);
49262306a36Sopenharmony_ci	rxm->full_len	= strp->stm.full_len;
49362306a36Sopenharmony_ci	rxm->offset	= strp->stm.offset;
49462306a36Sopenharmony_ci	tlm = tls_msg(strp->anchor);
49562306a36Sopenharmony_ci	tlm->control	= strp->mark;
49662306a36Sopenharmony_ci}
49762306a36Sopenharmony_ci
49862306a36Sopenharmony_ci/* Called with lock held on lower socket */
49962306a36Sopenharmony_cistatic int tls_strp_read_sock(struct tls_strparser *strp)
50062306a36Sopenharmony_ci{
50162306a36Sopenharmony_ci	int sz, inq;
50262306a36Sopenharmony_ci
50362306a36Sopenharmony_ci	inq = tcp_inq(strp->sk);
50462306a36Sopenharmony_ci	if (inq < 1)
50562306a36Sopenharmony_ci		return 0;
50662306a36Sopenharmony_ci
50762306a36Sopenharmony_ci	if (unlikely(strp->copy_mode))
50862306a36Sopenharmony_ci		return tls_strp_read_copyin(strp);
50962306a36Sopenharmony_ci
51062306a36Sopenharmony_ci	if (inq < strp->stm.full_len)
51162306a36Sopenharmony_ci		return tls_strp_read_copy(strp, true);
51262306a36Sopenharmony_ci
51362306a36Sopenharmony_ci	if (!strp->stm.full_len) {
51462306a36Sopenharmony_ci		tls_strp_load_anchor_with_queue(strp, inq);
51562306a36Sopenharmony_ci
51662306a36Sopenharmony_ci		sz = tls_rx_msg_size(strp, strp->anchor);
51762306a36Sopenharmony_ci		if (sz < 0) {
51862306a36Sopenharmony_ci			tls_strp_abort_strp(strp, sz);
51962306a36Sopenharmony_ci			return sz;
52062306a36Sopenharmony_ci		}
52162306a36Sopenharmony_ci
52262306a36Sopenharmony_ci		strp->stm.full_len = sz;
52362306a36Sopenharmony_ci
52462306a36Sopenharmony_ci		if (!strp->stm.full_len || inq < strp->stm.full_len)
52562306a36Sopenharmony_ci			return tls_strp_read_copy(strp, true);
52662306a36Sopenharmony_ci	}
52762306a36Sopenharmony_ci
52862306a36Sopenharmony_ci	if (!tls_strp_check_queue_ok(strp))
52962306a36Sopenharmony_ci		return tls_strp_read_copy(strp, false);
53062306a36Sopenharmony_ci
53162306a36Sopenharmony_ci	strp->msg_ready = 1;
53262306a36Sopenharmony_ci	tls_rx_msg_ready(strp);
53362306a36Sopenharmony_ci
53462306a36Sopenharmony_ci	return 0;
53562306a36Sopenharmony_ci}
53662306a36Sopenharmony_ci
53762306a36Sopenharmony_civoid tls_strp_check_rcv(struct tls_strparser *strp)
53862306a36Sopenharmony_ci{
53962306a36Sopenharmony_ci	if (unlikely(strp->stopped) || strp->msg_ready)
54062306a36Sopenharmony_ci		return;
54162306a36Sopenharmony_ci
54262306a36Sopenharmony_ci	if (tls_strp_read_sock(strp) == -ENOMEM)
54362306a36Sopenharmony_ci		queue_work(tls_strp_wq, &strp->work);
54462306a36Sopenharmony_ci}
54562306a36Sopenharmony_ci
54662306a36Sopenharmony_ci/* Lower sock lock held */
54762306a36Sopenharmony_civoid tls_strp_data_ready(struct tls_strparser *strp)
54862306a36Sopenharmony_ci{
54962306a36Sopenharmony_ci	/* This check is needed to synchronize with do_tls_strp_work.
55062306a36Sopenharmony_ci	 * do_tls_strp_work acquires a process lock (lock_sock) whereas
55162306a36Sopenharmony_ci	 * the lock held here is bh_lock_sock. The two locks can be
55262306a36Sopenharmony_ci	 * held by different threads at the same time, but bh_lock_sock
55362306a36Sopenharmony_ci	 * allows a thread in BH context to safely check if the process
55462306a36Sopenharmony_ci	 * lock is held. In this case, if the lock is held, queue work.
55562306a36Sopenharmony_ci	 */
55662306a36Sopenharmony_ci	if (sock_owned_by_user_nocheck(strp->sk)) {
55762306a36Sopenharmony_ci		queue_work(tls_strp_wq, &strp->work);
55862306a36Sopenharmony_ci		return;
55962306a36Sopenharmony_ci	}
56062306a36Sopenharmony_ci
56162306a36Sopenharmony_ci	tls_strp_check_rcv(strp);
56262306a36Sopenharmony_ci}
56362306a36Sopenharmony_ci
56462306a36Sopenharmony_cistatic void tls_strp_work(struct work_struct *w)
56562306a36Sopenharmony_ci{
56662306a36Sopenharmony_ci	struct tls_strparser *strp =
56762306a36Sopenharmony_ci		container_of(w, struct tls_strparser, work);
56862306a36Sopenharmony_ci
56962306a36Sopenharmony_ci	lock_sock(strp->sk);
57062306a36Sopenharmony_ci	tls_strp_check_rcv(strp);
57162306a36Sopenharmony_ci	release_sock(strp->sk);
57262306a36Sopenharmony_ci}
57362306a36Sopenharmony_ci
57462306a36Sopenharmony_civoid tls_strp_msg_done(struct tls_strparser *strp)
57562306a36Sopenharmony_ci{
57662306a36Sopenharmony_ci	WARN_ON(!strp->stm.full_len);
57762306a36Sopenharmony_ci
57862306a36Sopenharmony_ci	if (likely(!strp->copy_mode))
57962306a36Sopenharmony_ci		tcp_read_done(strp->sk, strp->stm.full_len);
58062306a36Sopenharmony_ci	else
58162306a36Sopenharmony_ci		tls_strp_flush_anchor_copy(strp);
58262306a36Sopenharmony_ci
58362306a36Sopenharmony_ci	strp->msg_ready = 0;
58462306a36Sopenharmony_ci	memset(&strp->stm, 0, sizeof(strp->stm));
58562306a36Sopenharmony_ci
58662306a36Sopenharmony_ci	tls_strp_check_rcv(strp);
58762306a36Sopenharmony_ci}
58862306a36Sopenharmony_ci
58962306a36Sopenharmony_civoid tls_strp_stop(struct tls_strparser *strp)
59062306a36Sopenharmony_ci{
59162306a36Sopenharmony_ci	strp->stopped = 1;
59262306a36Sopenharmony_ci}
59362306a36Sopenharmony_ci
59462306a36Sopenharmony_ciint tls_strp_init(struct tls_strparser *strp, struct sock *sk)
59562306a36Sopenharmony_ci{
59662306a36Sopenharmony_ci	memset(strp, 0, sizeof(*strp));
59762306a36Sopenharmony_ci
59862306a36Sopenharmony_ci	strp->sk = sk;
59962306a36Sopenharmony_ci
60062306a36Sopenharmony_ci	strp->anchor = alloc_skb(0, GFP_KERNEL);
60162306a36Sopenharmony_ci	if (!strp->anchor)
60262306a36Sopenharmony_ci		return -ENOMEM;
60362306a36Sopenharmony_ci
60462306a36Sopenharmony_ci	INIT_WORK(&strp->work, tls_strp_work);
60562306a36Sopenharmony_ci
60662306a36Sopenharmony_ci	return 0;
60762306a36Sopenharmony_ci}
60862306a36Sopenharmony_ci
60962306a36Sopenharmony_ci/* strp must already be stopped so that tls_strp_recv will no longer be called.
61062306a36Sopenharmony_ci * Note that tls_strp_done is not called with the lower socket held.
61162306a36Sopenharmony_ci */
61262306a36Sopenharmony_civoid tls_strp_done(struct tls_strparser *strp)
61362306a36Sopenharmony_ci{
61462306a36Sopenharmony_ci	WARN_ON(!strp->stopped);
61562306a36Sopenharmony_ci
61662306a36Sopenharmony_ci	cancel_work_sync(&strp->work);
61762306a36Sopenharmony_ci	tls_strp_anchor_free(strp);
61862306a36Sopenharmony_ci}
61962306a36Sopenharmony_ci
62062306a36Sopenharmony_ciint __init tls_strp_dev_init(void)
62162306a36Sopenharmony_ci{
62262306a36Sopenharmony_ci	tls_strp_wq = create_workqueue("tls-strp");
62362306a36Sopenharmony_ci	if (unlikely(!tls_strp_wq))
62462306a36Sopenharmony_ci		return -ENOMEM;
62562306a36Sopenharmony_ci
62662306a36Sopenharmony_ci	return 0;
62762306a36Sopenharmony_ci}
62862306a36Sopenharmony_ci
62962306a36Sopenharmony_civoid tls_strp_dev_exit(void)
63062306a36Sopenharmony_ci{
63162306a36Sopenharmony_ci	destroy_workqueue(tls_strp_wq);
63262306a36Sopenharmony_ci}
633