162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* Copyright (c) 2016 Tom Herbert <tom@herbertland.com> */ 362306a36Sopenharmony_ci 462306a36Sopenharmony_ci#include <linux/skbuff.h> 562306a36Sopenharmony_ci#include <linux/workqueue.h> 662306a36Sopenharmony_ci#include <net/strparser.h> 762306a36Sopenharmony_ci#include <net/tcp.h> 862306a36Sopenharmony_ci#include <net/sock.h> 962306a36Sopenharmony_ci#include <net/tls.h> 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#include "tls.h" 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_cistatic struct workqueue_struct *tls_strp_wq; 1462306a36Sopenharmony_ci 1562306a36Sopenharmony_cistatic void tls_strp_abort_strp(struct tls_strparser *strp, int err) 1662306a36Sopenharmony_ci{ 1762306a36Sopenharmony_ci if (strp->stopped) 1862306a36Sopenharmony_ci return; 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci strp->stopped = 1; 2162306a36Sopenharmony_ci 2262306a36Sopenharmony_ci /* Report an error on the lower socket */ 2362306a36Sopenharmony_ci WRITE_ONCE(strp->sk->sk_err, -err); 2462306a36Sopenharmony_ci /* Paired with smp_rmb() in tcp_poll() */ 2562306a36Sopenharmony_ci smp_wmb(); 2662306a36Sopenharmony_ci sk_error_report(strp->sk); 2762306a36Sopenharmony_ci} 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_cistatic void tls_strp_anchor_free(struct tls_strparser *strp) 3062306a36Sopenharmony_ci{ 3162306a36Sopenharmony_ci struct skb_shared_info *shinfo = skb_shinfo(strp->anchor); 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_ci DEBUG_NET_WARN_ON_ONCE(atomic_read(&shinfo->dataref) != 1); 3462306a36Sopenharmony_ci if (!strp->copy_mode) 3562306a36Sopenharmony_ci shinfo->frag_list = NULL; 3662306a36Sopenharmony_ci consume_skb(strp->anchor); 3762306a36Sopenharmony_ci strp->anchor = NULL; 3862306a36Sopenharmony_ci} 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_cistatic struct sk_buff * 4162306a36Sopenharmony_citls_strp_skb_copy(struct tls_strparser *strp, struct sk_buff *in_skb, 4262306a36Sopenharmony_ci int offset, int len) 4362306a36Sopenharmony_ci{ 4462306a36Sopenharmony_ci struct sk_buff *skb; 4562306a36Sopenharmony_ci int i, err; 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_ci skb = alloc_skb_with_frags(0, len, TLS_PAGE_ORDER, 4862306a36Sopenharmony_ci &err, strp->sk->sk_allocation); 4962306a36Sopenharmony_ci if (!skb) 5062306a36Sopenharmony_ci return NULL; 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) { 5362306a36Sopenharmony_ci skb_frag_t *frag = &skb_shinfo(skb)->frags[i]; 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci WARN_ON_ONCE(skb_copy_bits(in_skb, offset, 5662306a36Sopenharmony_ci skb_frag_address(frag), 5762306a36Sopenharmony_ci skb_frag_size(frag))); 5862306a36Sopenharmony_ci offset += skb_frag_size(frag); 5962306a36Sopenharmony_ci } 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_ci skb->len = len; 6262306a36Sopenharmony_ci skb->data_len = len; 6362306a36Sopenharmony_ci skb_copy_header(skb, in_skb); 6462306a36Sopenharmony_ci return skb; 6562306a36Sopenharmony_ci} 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_ci/* Create a new skb with the contents of input copied to its page frags */ 6862306a36Sopenharmony_cistatic struct sk_buff *tls_strp_msg_make_copy(struct tls_strparser *strp) 6962306a36Sopenharmony_ci{ 7062306a36Sopenharmony_ci struct strp_msg *rxm; 7162306a36Sopenharmony_ci struct sk_buff *skb; 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci skb = tls_strp_skb_copy(strp, strp->anchor, strp->stm.offset, 7462306a36Sopenharmony_ci strp->stm.full_len); 7562306a36Sopenharmony_ci if (!skb) 7662306a36Sopenharmony_ci return NULL; 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci rxm = strp_msg(skb); 7962306a36Sopenharmony_ci rxm->offset = 0; 8062306a36Sopenharmony_ci return skb; 8162306a36Sopenharmony_ci} 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci/* Steal the input skb, input msg is invalid after calling this function */ 8462306a36Sopenharmony_cistruct sk_buff *tls_strp_msg_detach(struct tls_sw_context_rx *ctx) 8562306a36Sopenharmony_ci{ 8662306a36Sopenharmony_ci struct tls_strparser *strp = &ctx->strp; 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci#ifdef CONFIG_TLS_DEVICE 8962306a36Sopenharmony_ci DEBUG_NET_WARN_ON_ONCE(!strp->anchor->decrypted); 9062306a36Sopenharmony_ci#else 9162306a36Sopenharmony_ci /* This function turns an input into an output, 9262306a36Sopenharmony_ci * that can only happen if we have offload. 9362306a36Sopenharmony_ci */ 9462306a36Sopenharmony_ci WARN_ON(1); 9562306a36Sopenharmony_ci#endif 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_ci if (strp->copy_mode) { 9862306a36Sopenharmony_ci struct sk_buff *skb; 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci /* Replace anchor with an empty skb, this is a little 10162306a36Sopenharmony_ci * dangerous but __tls_cur_msg() warns on empty skbs 10262306a36Sopenharmony_ci * so hopefully we'll catch abuses. 10362306a36Sopenharmony_ci */ 10462306a36Sopenharmony_ci skb = alloc_skb(0, strp->sk->sk_allocation); 10562306a36Sopenharmony_ci if (!skb) 10662306a36Sopenharmony_ci return NULL; 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_ci swap(strp->anchor, skb); 10962306a36Sopenharmony_ci return skb; 11062306a36Sopenharmony_ci } 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci return tls_strp_msg_make_copy(strp); 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci/* Force the input skb to be in copy mode. The data ownership remains 11662306a36Sopenharmony_ci * with the input skb itself (meaning unpause will wipe it) but it can 11762306a36Sopenharmony_ci * be modified. 11862306a36Sopenharmony_ci */ 11962306a36Sopenharmony_ciint tls_strp_msg_cow(struct tls_sw_context_rx *ctx) 12062306a36Sopenharmony_ci{ 12162306a36Sopenharmony_ci struct tls_strparser *strp = &ctx->strp; 12262306a36Sopenharmony_ci struct sk_buff *skb; 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci if (strp->copy_mode) 12562306a36Sopenharmony_ci return 0; 12662306a36Sopenharmony_ci 12762306a36Sopenharmony_ci skb = tls_strp_msg_make_copy(strp); 12862306a36Sopenharmony_ci if (!skb) 12962306a36Sopenharmony_ci return -ENOMEM; 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_ci tls_strp_anchor_free(strp); 13262306a36Sopenharmony_ci strp->anchor = skb; 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci tcp_read_done(strp->sk, strp->stm.full_len); 13562306a36Sopenharmony_ci strp->copy_mode = 1; 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci return 0; 13862306a36Sopenharmony_ci} 13962306a36Sopenharmony_ci 14062306a36Sopenharmony_ci/* Make a clone (in the skb sense) of the input msg to keep a reference 14162306a36Sopenharmony_ci * to the underlying data. The reference-holding skbs get placed on 14262306a36Sopenharmony_ci * @dst. 14362306a36Sopenharmony_ci */ 14462306a36Sopenharmony_ciint tls_strp_msg_hold(struct tls_strparser *strp, struct sk_buff_head *dst) 14562306a36Sopenharmony_ci{ 14662306a36Sopenharmony_ci struct skb_shared_info *shinfo = skb_shinfo(strp->anchor); 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_ci if (strp->copy_mode) { 14962306a36Sopenharmony_ci struct sk_buff *skb; 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci WARN_ON_ONCE(!shinfo->nr_frags); 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci /* We can't skb_clone() the anchor, it gets wiped by unpause */ 15462306a36Sopenharmony_ci skb = alloc_skb(0, strp->sk->sk_allocation); 15562306a36Sopenharmony_ci if (!skb) 15662306a36Sopenharmony_ci return -ENOMEM; 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci __skb_queue_tail(dst, strp->anchor); 15962306a36Sopenharmony_ci strp->anchor = skb; 16062306a36Sopenharmony_ci } else { 16162306a36Sopenharmony_ci struct sk_buff *iter, *clone; 16262306a36Sopenharmony_ci int chunk, len, offset; 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_ci offset = strp->stm.offset; 16562306a36Sopenharmony_ci len = strp->stm.full_len; 16662306a36Sopenharmony_ci iter = shinfo->frag_list; 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ci while (len > 0) { 16962306a36Sopenharmony_ci if (iter->len <= offset) { 17062306a36Sopenharmony_ci offset -= iter->len; 17162306a36Sopenharmony_ci goto next; 17262306a36Sopenharmony_ci } 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci chunk = iter->len - offset; 17562306a36Sopenharmony_ci offset = 0; 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_ci clone = skb_clone(iter, strp->sk->sk_allocation); 17862306a36Sopenharmony_ci if (!clone) 17962306a36Sopenharmony_ci return -ENOMEM; 18062306a36Sopenharmony_ci __skb_queue_tail(dst, clone); 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci len -= chunk; 18362306a36Sopenharmony_cinext: 18462306a36Sopenharmony_ci iter = iter->next; 18562306a36Sopenharmony_ci } 18662306a36Sopenharmony_ci } 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci return 0; 18962306a36Sopenharmony_ci} 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_cistatic void tls_strp_flush_anchor_copy(struct tls_strparser *strp) 19262306a36Sopenharmony_ci{ 19362306a36Sopenharmony_ci struct skb_shared_info *shinfo = skb_shinfo(strp->anchor); 19462306a36Sopenharmony_ci int i; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci DEBUG_NET_WARN_ON_ONCE(atomic_read(&shinfo->dataref) != 1); 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci for (i = 0; i < shinfo->nr_frags; i++) 19962306a36Sopenharmony_ci __skb_frag_unref(&shinfo->frags[i], false); 20062306a36Sopenharmony_ci shinfo->nr_frags = 0; 20162306a36Sopenharmony_ci if (strp->copy_mode) { 20262306a36Sopenharmony_ci kfree_skb_list(shinfo->frag_list); 20362306a36Sopenharmony_ci shinfo->frag_list = NULL; 20462306a36Sopenharmony_ci } 20562306a36Sopenharmony_ci strp->copy_mode = 0; 20662306a36Sopenharmony_ci strp->mixed_decrypted = 0; 20762306a36Sopenharmony_ci} 20862306a36Sopenharmony_ci 20962306a36Sopenharmony_cistatic int tls_strp_copyin_frag(struct tls_strparser *strp, struct sk_buff *skb, 21062306a36Sopenharmony_ci struct sk_buff *in_skb, unsigned int offset, 21162306a36Sopenharmony_ci size_t in_len) 21262306a36Sopenharmony_ci{ 21362306a36Sopenharmony_ci size_t len, chunk; 21462306a36Sopenharmony_ci skb_frag_t *frag; 21562306a36Sopenharmony_ci int sz; 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_ci frag = &skb_shinfo(skb)->frags[skb->len / PAGE_SIZE]; 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci len = in_len; 22062306a36Sopenharmony_ci /* First make sure we got the header */ 22162306a36Sopenharmony_ci if (!strp->stm.full_len) { 22262306a36Sopenharmony_ci /* Assume one page is more than enough for headers */ 22362306a36Sopenharmony_ci chunk = min_t(size_t, len, PAGE_SIZE - skb_frag_size(frag)); 22462306a36Sopenharmony_ci WARN_ON_ONCE(skb_copy_bits(in_skb, offset, 22562306a36Sopenharmony_ci skb_frag_address(frag) + 22662306a36Sopenharmony_ci skb_frag_size(frag), 22762306a36Sopenharmony_ci chunk)); 22862306a36Sopenharmony_ci 22962306a36Sopenharmony_ci skb->len += chunk; 23062306a36Sopenharmony_ci skb->data_len += chunk; 23162306a36Sopenharmony_ci skb_frag_size_add(frag, chunk); 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_ci sz = tls_rx_msg_size(strp, skb); 23462306a36Sopenharmony_ci if (sz < 0) 23562306a36Sopenharmony_ci return sz; 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_ci /* We may have over-read, sz == 0 is guaranteed under-read */ 23862306a36Sopenharmony_ci if (unlikely(sz && sz < skb->len)) { 23962306a36Sopenharmony_ci int over = skb->len - sz; 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_ci WARN_ON_ONCE(over > chunk); 24262306a36Sopenharmony_ci skb->len -= over; 24362306a36Sopenharmony_ci skb->data_len -= over; 24462306a36Sopenharmony_ci skb_frag_size_add(frag, -over); 24562306a36Sopenharmony_ci 24662306a36Sopenharmony_ci chunk -= over; 24762306a36Sopenharmony_ci } 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_ci frag++; 25062306a36Sopenharmony_ci len -= chunk; 25162306a36Sopenharmony_ci offset += chunk; 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci strp->stm.full_len = sz; 25462306a36Sopenharmony_ci if (!strp->stm.full_len) 25562306a36Sopenharmony_ci goto read_done; 25662306a36Sopenharmony_ci } 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci /* Load up more data */ 25962306a36Sopenharmony_ci while (len && strp->stm.full_len > skb->len) { 26062306a36Sopenharmony_ci chunk = min_t(size_t, len, strp->stm.full_len - skb->len); 26162306a36Sopenharmony_ci chunk = min_t(size_t, chunk, PAGE_SIZE - skb_frag_size(frag)); 26262306a36Sopenharmony_ci WARN_ON_ONCE(skb_copy_bits(in_skb, offset, 26362306a36Sopenharmony_ci skb_frag_address(frag) + 26462306a36Sopenharmony_ci skb_frag_size(frag), 26562306a36Sopenharmony_ci chunk)); 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_ci skb->len += chunk; 26862306a36Sopenharmony_ci skb->data_len += chunk; 26962306a36Sopenharmony_ci skb_frag_size_add(frag, chunk); 27062306a36Sopenharmony_ci frag++; 27162306a36Sopenharmony_ci len -= chunk; 27262306a36Sopenharmony_ci offset += chunk; 27362306a36Sopenharmony_ci } 27462306a36Sopenharmony_ci 27562306a36Sopenharmony_ciread_done: 27662306a36Sopenharmony_ci return in_len - len; 27762306a36Sopenharmony_ci} 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_cistatic int tls_strp_copyin_skb(struct tls_strparser *strp, struct sk_buff *skb, 28062306a36Sopenharmony_ci struct sk_buff *in_skb, unsigned int offset, 28162306a36Sopenharmony_ci size_t in_len) 28262306a36Sopenharmony_ci{ 28362306a36Sopenharmony_ci struct sk_buff *nskb, *first, *last; 28462306a36Sopenharmony_ci struct skb_shared_info *shinfo; 28562306a36Sopenharmony_ci size_t chunk; 28662306a36Sopenharmony_ci int sz; 28762306a36Sopenharmony_ci 28862306a36Sopenharmony_ci if (strp->stm.full_len) 28962306a36Sopenharmony_ci chunk = strp->stm.full_len - skb->len; 29062306a36Sopenharmony_ci else 29162306a36Sopenharmony_ci chunk = TLS_MAX_PAYLOAD_SIZE + PAGE_SIZE; 29262306a36Sopenharmony_ci chunk = min(chunk, in_len); 29362306a36Sopenharmony_ci 29462306a36Sopenharmony_ci nskb = tls_strp_skb_copy(strp, in_skb, offset, chunk); 29562306a36Sopenharmony_ci if (!nskb) 29662306a36Sopenharmony_ci return -ENOMEM; 29762306a36Sopenharmony_ci 29862306a36Sopenharmony_ci shinfo = skb_shinfo(skb); 29962306a36Sopenharmony_ci if (!shinfo->frag_list) { 30062306a36Sopenharmony_ci shinfo->frag_list = nskb; 30162306a36Sopenharmony_ci nskb->prev = nskb; 30262306a36Sopenharmony_ci } else { 30362306a36Sopenharmony_ci first = shinfo->frag_list; 30462306a36Sopenharmony_ci last = first->prev; 30562306a36Sopenharmony_ci last->next = nskb; 30662306a36Sopenharmony_ci first->prev = nskb; 30762306a36Sopenharmony_ci } 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci skb->len += chunk; 31062306a36Sopenharmony_ci skb->data_len += chunk; 31162306a36Sopenharmony_ci 31262306a36Sopenharmony_ci if (!strp->stm.full_len) { 31362306a36Sopenharmony_ci sz = tls_rx_msg_size(strp, skb); 31462306a36Sopenharmony_ci if (sz < 0) 31562306a36Sopenharmony_ci return sz; 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci /* We may have over-read, sz == 0 is guaranteed under-read */ 31862306a36Sopenharmony_ci if (unlikely(sz && sz < skb->len)) { 31962306a36Sopenharmony_ci int over = skb->len - sz; 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci WARN_ON_ONCE(over > chunk); 32262306a36Sopenharmony_ci skb->len -= over; 32362306a36Sopenharmony_ci skb->data_len -= over; 32462306a36Sopenharmony_ci __pskb_trim(nskb, nskb->len - over); 32562306a36Sopenharmony_ci 32662306a36Sopenharmony_ci chunk -= over; 32762306a36Sopenharmony_ci } 32862306a36Sopenharmony_ci 32962306a36Sopenharmony_ci strp->stm.full_len = sz; 33062306a36Sopenharmony_ci } 33162306a36Sopenharmony_ci 33262306a36Sopenharmony_ci return chunk; 33362306a36Sopenharmony_ci} 33462306a36Sopenharmony_ci 33562306a36Sopenharmony_cistatic int tls_strp_copyin(read_descriptor_t *desc, struct sk_buff *in_skb, 33662306a36Sopenharmony_ci unsigned int offset, size_t in_len) 33762306a36Sopenharmony_ci{ 33862306a36Sopenharmony_ci struct tls_strparser *strp = (struct tls_strparser *)desc->arg.data; 33962306a36Sopenharmony_ci struct sk_buff *skb; 34062306a36Sopenharmony_ci int ret; 34162306a36Sopenharmony_ci 34262306a36Sopenharmony_ci if (strp->msg_ready) 34362306a36Sopenharmony_ci return 0; 34462306a36Sopenharmony_ci 34562306a36Sopenharmony_ci skb = strp->anchor; 34662306a36Sopenharmony_ci if (!skb->len) 34762306a36Sopenharmony_ci skb_copy_decrypted(skb, in_skb); 34862306a36Sopenharmony_ci else 34962306a36Sopenharmony_ci strp->mixed_decrypted |= !!skb_cmp_decrypted(skb, in_skb); 35062306a36Sopenharmony_ci 35162306a36Sopenharmony_ci if (IS_ENABLED(CONFIG_TLS_DEVICE) && strp->mixed_decrypted) 35262306a36Sopenharmony_ci ret = tls_strp_copyin_skb(strp, skb, in_skb, offset, in_len); 35362306a36Sopenharmony_ci else 35462306a36Sopenharmony_ci ret = tls_strp_copyin_frag(strp, skb, in_skb, offset, in_len); 35562306a36Sopenharmony_ci if (ret < 0) { 35662306a36Sopenharmony_ci desc->error = ret; 35762306a36Sopenharmony_ci ret = 0; 35862306a36Sopenharmony_ci } 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_ci if (strp->stm.full_len && strp->stm.full_len == skb->len) { 36162306a36Sopenharmony_ci desc->count = 0; 36262306a36Sopenharmony_ci 36362306a36Sopenharmony_ci strp->msg_ready = 1; 36462306a36Sopenharmony_ci tls_rx_msg_ready(strp); 36562306a36Sopenharmony_ci } 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci return ret; 36862306a36Sopenharmony_ci} 36962306a36Sopenharmony_ci 37062306a36Sopenharmony_cistatic int tls_strp_read_copyin(struct tls_strparser *strp) 37162306a36Sopenharmony_ci{ 37262306a36Sopenharmony_ci read_descriptor_t desc; 37362306a36Sopenharmony_ci 37462306a36Sopenharmony_ci desc.arg.data = strp; 37562306a36Sopenharmony_ci desc.error = 0; 37662306a36Sopenharmony_ci desc.count = 1; /* give more than one skb per call */ 37762306a36Sopenharmony_ci 37862306a36Sopenharmony_ci /* sk should be locked here, so okay to do read_sock */ 37962306a36Sopenharmony_ci tcp_read_sock(strp->sk, &desc, tls_strp_copyin); 38062306a36Sopenharmony_ci 38162306a36Sopenharmony_ci return desc.error; 38262306a36Sopenharmony_ci} 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_cistatic int tls_strp_read_copy(struct tls_strparser *strp, bool qshort) 38562306a36Sopenharmony_ci{ 38662306a36Sopenharmony_ci struct skb_shared_info *shinfo; 38762306a36Sopenharmony_ci struct page *page; 38862306a36Sopenharmony_ci int need_spc, len; 38962306a36Sopenharmony_ci 39062306a36Sopenharmony_ci /* If the rbuf is small or rcv window has collapsed to 0 we need 39162306a36Sopenharmony_ci * to read the data out. Otherwise the connection will stall. 39262306a36Sopenharmony_ci * Without pressure threshold of INT_MAX will never be ready. 39362306a36Sopenharmony_ci */ 39462306a36Sopenharmony_ci if (likely(qshort && !tcp_epollin_ready(strp->sk, INT_MAX))) 39562306a36Sopenharmony_ci return 0; 39662306a36Sopenharmony_ci 39762306a36Sopenharmony_ci shinfo = skb_shinfo(strp->anchor); 39862306a36Sopenharmony_ci shinfo->frag_list = NULL; 39962306a36Sopenharmony_ci 40062306a36Sopenharmony_ci /* If we don't know the length go max plus page for cipher overhead */ 40162306a36Sopenharmony_ci need_spc = strp->stm.full_len ?: TLS_MAX_PAYLOAD_SIZE + PAGE_SIZE; 40262306a36Sopenharmony_ci 40362306a36Sopenharmony_ci for (len = need_spc; len > 0; len -= PAGE_SIZE) { 40462306a36Sopenharmony_ci page = alloc_page(strp->sk->sk_allocation); 40562306a36Sopenharmony_ci if (!page) { 40662306a36Sopenharmony_ci tls_strp_flush_anchor_copy(strp); 40762306a36Sopenharmony_ci return -ENOMEM; 40862306a36Sopenharmony_ci } 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_ci skb_fill_page_desc(strp->anchor, shinfo->nr_frags++, 41162306a36Sopenharmony_ci page, 0, 0); 41262306a36Sopenharmony_ci } 41362306a36Sopenharmony_ci 41462306a36Sopenharmony_ci strp->copy_mode = 1; 41562306a36Sopenharmony_ci strp->stm.offset = 0; 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci strp->anchor->len = 0; 41862306a36Sopenharmony_ci strp->anchor->data_len = 0; 41962306a36Sopenharmony_ci strp->anchor->truesize = round_up(need_spc, PAGE_SIZE); 42062306a36Sopenharmony_ci 42162306a36Sopenharmony_ci tls_strp_read_copyin(strp); 42262306a36Sopenharmony_ci 42362306a36Sopenharmony_ci return 0; 42462306a36Sopenharmony_ci} 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_cistatic bool tls_strp_check_queue_ok(struct tls_strparser *strp) 42762306a36Sopenharmony_ci{ 42862306a36Sopenharmony_ci unsigned int len = strp->stm.offset + strp->stm.full_len; 42962306a36Sopenharmony_ci struct sk_buff *first, *skb; 43062306a36Sopenharmony_ci u32 seq; 43162306a36Sopenharmony_ci 43262306a36Sopenharmony_ci first = skb_shinfo(strp->anchor)->frag_list; 43362306a36Sopenharmony_ci skb = first; 43462306a36Sopenharmony_ci seq = TCP_SKB_CB(first)->seq; 43562306a36Sopenharmony_ci 43662306a36Sopenharmony_ci /* Make sure there's no duplicate data in the queue, 43762306a36Sopenharmony_ci * and the decrypted status matches. 43862306a36Sopenharmony_ci */ 43962306a36Sopenharmony_ci while (skb->len < len) { 44062306a36Sopenharmony_ci seq += skb->len; 44162306a36Sopenharmony_ci len -= skb->len; 44262306a36Sopenharmony_ci skb = skb->next; 44362306a36Sopenharmony_ci 44462306a36Sopenharmony_ci if (TCP_SKB_CB(skb)->seq != seq) 44562306a36Sopenharmony_ci return false; 44662306a36Sopenharmony_ci if (skb_cmp_decrypted(first, skb)) 44762306a36Sopenharmony_ci return false; 44862306a36Sopenharmony_ci } 44962306a36Sopenharmony_ci 45062306a36Sopenharmony_ci return true; 45162306a36Sopenharmony_ci} 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_cistatic void tls_strp_load_anchor_with_queue(struct tls_strparser *strp, int len) 45462306a36Sopenharmony_ci{ 45562306a36Sopenharmony_ci struct tcp_sock *tp = tcp_sk(strp->sk); 45662306a36Sopenharmony_ci struct sk_buff *first; 45762306a36Sopenharmony_ci u32 offset; 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci first = tcp_recv_skb(strp->sk, tp->copied_seq, &offset); 46062306a36Sopenharmony_ci if (WARN_ON_ONCE(!first)) 46162306a36Sopenharmony_ci return; 46262306a36Sopenharmony_ci 46362306a36Sopenharmony_ci /* Bestow the state onto the anchor */ 46462306a36Sopenharmony_ci strp->anchor->len = offset + len; 46562306a36Sopenharmony_ci strp->anchor->data_len = offset + len; 46662306a36Sopenharmony_ci strp->anchor->truesize = offset + len; 46762306a36Sopenharmony_ci 46862306a36Sopenharmony_ci skb_shinfo(strp->anchor)->frag_list = first; 46962306a36Sopenharmony_ci 47062306a36Sopenharmony_ci skb_copy_header(strp->anchor, first); 47162306a36Sopenharmony_ci strp->anchor->destructor = NULL; 47262306a36Sopenharmony_ci 47362306a36Sopenharmony_ci strp->stm.offset = offset; 47462306a36Sopenharmony_ci} 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_civoid tls_strp_msg_load(struct tls_strparser *strp, bool force_refresh) 47762306a36Sopenharmony_ci{ 47862306a36Sopenharmony_ci struct strp_msg *rxm; 47962306a36Sopenharmony_ci struct tls_msg *tlm; 48062306a36Sopenharmony_ci 48162306a36Sopenharmony_ci DEBUG_NET_WARN_ON_ONCE(!strp->msg_ready); 48262306a36Sopenharmony_ci DEBUG_NET_WARN_ON_ONCE(!strp->stm.full_len); 48362306a36Sopenharmony_ci 48462306a36Sopenharmony_ci if (!strp->copy_mode && force_refresh) { 48562306a36Sopenharmony_ci if (WARN_ON(tcp_inq(strp->sk) < strp->stm.full_len)) 48662306a36Sopenharmony_ci return; 48762306a36Sopenharmony_ci 48862306a36Sopenharmony_ci tls_strp_load_anchor_with_queue(strp, strp->stm.full_len); 48962306a36Sopenharmony_ci } 49062306a36Sopenharmony_ci 49162306a36Sopenharmony_ci rxm = strp_msg(strp->anchor); 49262306a36Sopenharmony_ci rxm->full_len = strp->stm.full_len; 49362306a36Sopenharmony_ci rxm->offset = strp->stm.offset; 49462306a36Sopenharmony_ci tlm = tls_msg(strp->anchor); 49562306a36Sopenharmony_ci tlm->control = strp->mark; 49662306a36Sopenharmony_ci} 49762306a36Sopenharmony_ci 49862306a36Sopenharmony_ci/* Called with lock held on lower socket */ 49962306a36Sopenharmony_cistatic int tls_strp_read_sock(struct tls_strparser *strp) 50062306a36Sopenharmony_ci{ 50162306a36Sopenharmony_ci int sz, inq; 50262306a36Sopenharmony_ci 50362306a36Sopenharmony_ci inq = tcp_inq(strp->sk); 50462306a36Sopenharmony_ci if (inq < 1) 50562306a36Sopenharmony_ci return 0; 50662306a36Sopenharmony_ci 50762306a36Sopenharmony_ci if (unlikely(strp->copy_mode)) 50862306a36Sopenharmony_ci return tls_strp_read_copyin(strp); 50962306a36Sopenharmony_ci 51062306a36Sopenharmony_ci if (inq < strp->stm.full_len) 51162306a36Sopenharmony_ci return tls_strp_read_copy(strp, true); 51262306a36Sopenharmony_ci 51362306a36Sopenharmony_ci if (!strp->stm.full_len) { 51462306a36Sopenharmony_ci tls_strp_load_anchor_with_queue(strp, inq); 51562306a36Sopenharmony_ci 51662306a36Sopenharmony_ci sz = tls_rx_msg_size(strp, strp->anchor); 51762306a36Sopenharmony_ci if (sz < 0) { 51862306a36Sopenharmony_ci tls_strp_abort_strp(strp, sz); 51962306a36Sopenharmony_ci return sz; 52062306a36Sopenharmony_ci } 52162306a36Sopenharmony_ci 52262306a36Sopenharmony_ci strp->stm.full_len = sz; 52362306a36Sopenharmony_ci 52462306a36Sopenharmony_ci if (!strp->stm.full_len || inq < strp->stm.full_len) 52562306a36Sopenharmony_ci return tls_strp_read_copy(strp, true); 52662306a36Sopenharmony_ci } 52762306a36Sopenharmony_ci 52862306a36Sopenharmony_ci if (!tls_strp_check_queue_ok(strp)) 52962306a36Sopenharmony_ci return tls_strp_read_copy(strp, false); 53062306a36Sopenharmony_ci 53162306a36Sopenharmony_ci strp->msg_ready = 1; 53262306a36Sopenharmony_ci tls_rx_msg_ready(strp); 53362306a36Sopenharmony_ci 53462306a36Sopenharmony_ci return 0; 53562306a36Sopenharmony_ci} 53662306a36Sopenharmony_ci 53762306a36Sopenharmony_civoid tls_strp_check_rcv(struct tls_strparser *strp) 53862306a36Sopenharmony_ci{ 53962306a36Sopenharmony_ci if (unlikely(strp->stopped) || strp->msg_ready) 54062306a36Sopenharmony_ci return; 54162306a36Sopenharmony_ci 54262306a36Sopenharmony_ci if (tls_strp_read_sock(strp) == -ENOMEM) 54362306a36Sopenharmony_ci queue_work(tls_strp_wq, &strp->work); 54462306a36Sopenharmony_ci} 54562306a36Sopenharmony_ci 54662306a36Sopenharmony_ci/* Lower sock lock held */ 54762306a36Sopenharmony_civoid tls_strp_data_ready(struct tls_strparser *strp) 54862306a36Sopenharmony_ci{ 54962306a36Sopenharmony_ci /* This check is needed to synchronize with do_tls_strp_work. 55062306a36Sopenharmony_ci * do_tls_strp_work acquires a process lock (lock_sock) whereas 55162306a36Sopenharmony_ci * the lock held here is bh_lock_sock. The two locks can be 55262306a36Sopenharmony_ci * held by different threads at the same time, but bh_lock_sock 55362306a36Sopenharmony_ci * allows a thread in BH context to safely check if the process 55462306a36Sopenharmony_ci * lock is held. In this case, if the lock is held, queue work. 55562306a36Sopenharmony_ci */ 55662306a36Sopenharmony_ci if (sock_owned_by_user_nocheck(strp->sk)) { 55762306a36Sopenharmony_ci queue_work(tls_strp_wq, &strp->work); 55862306a36Sopenharmony_ci return; 55962306a36Sopenharmony_ci } 56062306a36Sopenharmony_ci 56162306a36Sopenharmony_ci tls_strp_check_rcv(strp); 56262306a36Sopenharmony_ci} 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_cistatic void tls_strp_work(struct work_struct *w) 56562306a36Sopenharmony_ci{ 56662306a36Sopenharmony_ci struct tls_strparser *strp = 56762306a36Sopenharmony_ci container_of(w, struct tls_strparser, work); 56862306a36Sopenharmony_ci 56962306a36Sopenharmony_ci lock_sock(strp->sk); 57062306a36Sopenharmony_ci tls_strp_check_rcv(strp); 57162306a36Sopenharmony_ci release_sock(strp->sk); 57262306a36Sopenharmony_ci} 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_civoid tls_strp_msg_done(struct tls_strparser *strp) 57562306a36Sopenharmony_ci{ 57662306a36Sopenharmony_ci WARN_ON(!strp->stm.full_len); 57762306a36Sopenharmony_ci 57862306a36Sopenharmony_ci if (likely(!strp->copy_mode)) 57962306a36Sopenharmony_ci tcp_read_done(strp->sk, strp->stm.full_len); 58062306a36Sopenharmony_ci else 58162306a36Sopenharmony_ci tls_strp_flush_anchor_copy(strp); 58262306a36Sopenharmony_ci 58362306a36Sopenharmony_ci strp->msg_ready = 0; 58462306a36Sopenharmony_ci memset(&strp->stm, 0, sizeof(strp->stm)); 58562306a36Sopenharmony_ci 58662306a36Sopenharmony_ci tls_strp_check_rcv(strp); 58762306a36Sopenharmony_ci} 58862306a36Sopenharmony_ci 58962306a36Sopenharmony_civoid tls_strp_stop(struct tls_strparser *strp) 59062306a36Sopenharmony_ci{ 59162306a36Sopenharmony_ci strp->stopped = 1; 59262306a36Sopenharmony_ci} 59362306a36Sopenharmony_ci 59462306a36Sopenharmony_ciint tls_strp_init(struct tls_strparser *strp, struct sock *sk) 59562306a36Sopenharmony_ci{ 59662306a36Sopenharmony_ci memset(strp, 0, sizeof(*strp)); 59762306a36Sopenharmony_ci 59862306a36Sopenharmony_ci strp->sk = sk; 59962306a36Sopenharmony_ci 60062306a36Sopenharmony_ci strp->anchor = alloc_skb(0, GFP_KERNEL); 60162306a36Sopenharmony_ci if (!strp->anchor) 60262306a36Sopenharmony_ci return -ENOMEM; 60362306a36Sopenharmony_ci 60462306a36Sopenharmony_ci INIT_WORK(&strp->work, tls_strp_work); 60562306a36Sopenharmony_ci 60662306a36Sopenharmony_ci return 0; 60762306a36Sopenharmony_ci} 60862306a36Sopenharmony_ci 60962306a36Sopenharmony_ci/* strp must already be stopped so that tls_strp_recv will no longer be called. 61062306a36Sopenharmony_ci * Note that tls_strp_done is not called with the lower socket held. 61162306a36Sopenharmony_ci */ 61262306a36Sopenharmony_civoid tls_strp_done(struct tls_strparser *strp) 61362306a36Sopenharmony_ci{ 61462306a36Sopenharmony_ci WARN_ON(!strp->stopped); 61562306a36Sopenharmony_ci 61662306a36Sopenharmony_ci cancel_work_sync(&strp->work); 61762306a36Sopenharmony_ci tls_strp_anchor_free(strp); 61862306a36Sopenharmony_ci} 61962306a36Sopenharmony_ci 62062306a36Sopenharmony_ciint __init tls_strp_dev_init(void) 62162306a36Sopenharmony_ci{ 62262306a36Sopenharmony_ci tls_strp_wq = create_workqueue("tls-strp"); 62362306a36Sopenharmony_ci if (unlikely(!tls_strp_wq)) 62462306a36Sopenharmony_ci return -ENOMEM; 62562306a36Sopenharmony_ci 62662306a36Sopenharmony_ci return 0; 62762306a36Sopenharmony_ci} 62862306a36Sopenharmony_ci 62962306a36Sopenharmony_civoid tls_strp_dev_exit(void) 63062306a36Sopenharmony_ci{ 63162306a36Sopenharmony_ci destroy_workqueue(tls_strp_wq); 63262306a36Sopenharmony_ci} 633