~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/net/xfrm/espintcp.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 #include <net/tcp.h>
  3 #include <net/strparser.h>
  4 #include <net/xfrm.h>
  5 #include <net/esp.h>
  6 #include <net/espintcp.h>
  7 #include <linux/skmsg.h>
  8 #include <net/inet_common.h>
  9 #include <trace/events/sock.h>
 10 #if IS_ENABLED(CONFIG_IPV6)
 11 #include <net/ipv6_stubs.h>
 12 #endif
 13 #include <net/hotdata.h>
 14 
 15 static void handle_nonesp(struct espintcp_ctx *ctx, struct sk_buff *skb,
 16                           struct sock *sk)
 17 {
 18         if (atomic_read(&sk->sk_rmem_alloc) >= sk->sk_rcvbuf ||
 19             !sk_rmem_schedule(sk, skb, skb->truesize)) {
 20                 XFRM_INC_STATS(sock_net(sk), LINUX_MIB_XFRMINERROR);
 21                 kfree_skb(skb);
 22                 return;
 23         }
 24 
 25         skb_set_owner_r(skb, sk);
 26 
 27         memset(skb->cb, 0, sizeof(skb->cb));
 28         skb_queue_tail(&ctx->ike_queue, skb);
 29         ctx->saved_data_ready(sk);
 30 }
 31 
 32 static void handle_esp(struct sk_buff *skb, struct sock *sk)
 33 {
 34         struct tcp_skb_cb *tcp_cb = (struct tcp_skb_cb *)skb->cb;
 35 
 36         skb_reset_transport_header(skb);
 37 
 38         /* restore IP CB, we need at least IP6CB->nhoff */
 39         memmove(skb->cb, &tcp_cb->header, sizeof(tcp_cb->header));
 40 
 41         rcu_read_lock();
 42         skb->dev = dev_get_by_index_rcu(sock_net(sk), skb->skb_iif);
 43         local_bh_disable();
 44 #if IS_ENABLED(CONFIG_IPV6)
 45         if (sk->sk_family == AF_INET6)
 46                 ipv6_stub->xfrm6_rcv_encap(skb, IPPROTO_ESP, 0, TCP_ENCAP_ESPINTCP);
 47         else
 48 #endif
 49                 xfrm4_rcv_encap(skb, IPPROTO_ESP, 0, TCP_ENCAP_ESPINTCP);
 50         local_bh_enable();
 51         rcu_read_unlock();
 52 }
 53 
 54 static void espintcp_rcv(struct strparser *strp, struct sk_buff *skb)
 55 {
 56         struct espintcp_ctx *ctx = container_of(strp, struct espintcp_ctx,
 57                                                 strp);
 58         struct strp_msg *rxm = strp_msg(skb);
 59         int len = rxm->full_len - 2;
 60         u32 nonesp_marker;
 61         int err;
 62 
 63         /* keepalive packet? */
 64         if (unlikely(len == 1)) {
 65                 u8 data;
 66 
 67                 err = skb_copy_bits(skb, rxm->offset + 2, &data, 1);
 68                 if (err < 0) {
 69                         XFRM_INC_STATS(sock_net(strp->sk), LINUX_MIB_XFRMINHDRERROR);
 70                         kfree_skb(skb);
 71                         return;
 72                 }
 73 
 74                 if (data == 0xff) {
 75                         kfree_skb(skb);
 76                         return;
 77                 }
 78         }
 79 
 80         /* drop other short messages */
 81         if (unlikely(len <= sizeof(nonesp_marker))) {
 82                 XFRM_INC_STATS(sock_net(strp->sk), LINUX_MIB_XFRMINHDRERROR);
 83                 kfree_skb(skb);
 84                 return;
 85         }
 86 
 87         err = skb_copy_bits(skb, rxm->offset + 2, &nonesp_marker,
 88                             sizeof(nonesp_marker));
 89         if (err < 0) {
 90                 XFRM_INC_STATS(sock_net(strp->sk), LINUX_MIB_XFRMINHDRERROR);
 91                 kfree_skb(skb);
 92                 return;
 93         }
 94 
 95         /* remove header, leave non-ESP marker/SPI */
 96         if (!pskb_pull(skb, rxm->offset + 2)) {
 97                 XFRM_INC_STATS(sock_net(strp->sk), LINUX_MIB_XFRMINERROR);
 98                 kfree_skb(skb);
 99                 return;
100         }
101 
102         if (pskb_trim(skb, rxm->full_len - 2) != 0) {
103                 XFRM_INC_STATS(sock_net(strp->sk), LINUX_MIB_XFRMINERROR);
104                 kfree_skb(skb);
105                 return;
106         }
107 
108         if (nonesp_marker == 0)
109                 handle_nonesp(ctx, skb, strp->sk);
110         else
111                 handle_esp(skb, strp->sk);
112 }
113 
114 static int espintcp_parse(struct strparser *strp, struct sk_buff *skb)
115 {
116         struct strp_msg *rxm = strp_msg(skb);
117         __be16 blen;
118         u16 len;
119         int err;
120 
121         if (skb->len < rxm->offset + 2)
122                 return 0;
123 
124         err = skb_copy_bits(skb, rxm->offset, &blen, sizeof(blen));
125         if (err < 0)
126                 return err;
127 
128         len = be16_to_cpu(blen);
129         if (len < 2)
130                 return -EINVAL;
131 
132         return len;
133 }
134 
135 static int espintcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len,
136                             int flags, int *addr_len)
137 {
138         struct espintcp_ctx *ctx = espintcp_getctx(sk);
139         struct sk_buff *skb;
140         int err = 0;
141         int copied;
142         int off = 0;
143 
144         skb = __skb_recv_datagram(sk, &ctx->ike_queue, flags, &off, &err);
145         if (!skb) {
146                 if (err == -EAGAIN && sk->sk_shutdown & RCV_SHUTDOWN)
147                         return 0;
148                 return err;
149         }
150 
151         copied = len;
152         if (copied > skb->len)
153                 copied = skb->len;
154         else if (copied < skb->len)
155                 msg->msg_flags |= MSG_TRUNC;
156 
157         err = skb_copy_datagram_msg(skb, 0, msg, copied);
158         if (unlikely(err)) {
159                 kfree_skb(skb);
160                 return err;
161         }
162 
163         if (flags & MSG_TRUNC)
164                 copied = skb->len;
165         kfree_skb(skb);
166         return copied;
167 }
168 
169 int espintcp_queue_out(struct sock *sk, struct sk_buff *skb)
170 {
171         struct espintcp_ctx *ctx = espintcp_getctx(sk);
172 
173         if (skb_queue_len(&ctx->out_queue) >=
174             READ_ONCE(net_hotdata.max_backlog))
175                 return -ENOBUFS;
176 
177         __skb_queue_tail(&ctx->out_queue, skb);
178 
179         return 0;
180 }
181 EXPORT_SYMBOL_GPL(espintcp_queue_out);
182 
183 /* espintcp length field is 2B and length includes the length field's size */
184 #define MAX_ESPINTCP_MSG (((1 << 16) - 1) - 2)
185 
186 static int espintcp_sendskb_locked(struct sock *sk, struct espintcp_msg *emsg,
187                                    int flags)
188 {
189         do {
190                 int ret;
191 
192                 ret = skb_send_sock_locked(sk, emsg->skb,
193                                            emsg->offset, emsg->len);
194                 if (ret < 0)
195                         return ret;
196 
197                 emsg->len -= ret;
198                 emsg->offset += ret;
199         } while (emsg->len > 0);
200 
201         kfree_skb(emsg->skb);
202         memset(emsg, 0, sizeof(*emsg));
203 
204         return 0;
205 }
206 
207 static int espintcp_sendskmsg_locked(struct sock *sk,
208                                      struct espintcp_msg *emsg, int flags)
209 {
210         struct msghdr msghdr = {
211                 .msg_flags = flags | MSG_SPLICE_PAGES | MSG_MORE,
212         };
213         struct sk_msg *skmsg = &emsg->skmsg;
214         bool more = flags & MSG_MORE;
215         struct scatterlist *sg;
216         int done = 0;
217         int ret;
218 
219         sg = &skmsg->sg.data[skmsg->sg.start];
220         do {
221                 struct bio_vec bvec;
222                 size_t size = sg->length - emsg->offset;
223                 int offset = sg->offset + emsg->offset;
224                 struct page *p;
225 
226                 emsg->offset = 0;
227 
228                 if (sg_is_last(sg) && !more)
229                         msghdr.msg_flags &= ~MSG_MORE;
230 
231                 p = sg_page(sg);
232 retry:
233                 bvec_set_page(&bvec, p, size, offset);
234                 iov_iter_bvec(&msghdr.msg_iter, ITER_SOURCE, &bvec, 1, size);
235                 ret = tcp_sendmsg_locked(sk, &msghdr, size);
236                 if (ret < 0) {
237                         emsg->offset = offset - sg->offset;
238                         skmsg->sg.start += done;
239                         return ret;
240                 }
241 
242                 if (ret != size) {
243                         offset += ret;
244                         size -= ret;
245                         goto retry;
246                 }
247 
248                 done++;
249                 put_page(p);
250                 sk_mem_uncharge(sk, sg->length);
251                 sg = sg_next(sg);
252         } while (sg);
253 
254         memset(emsg, 0, sizeof(*emsg));
255 
256         return 0;
257 }
258 
259 static int espintcp_push_msgs(struct sock *sk, int flags)
260 {
261         struct espintcp_ctx *ctx = espintcp_getctx(sk);
262         struct espintcp_msg *emsg = &ctx->partial;
263         int err;
264 
265         if (!emsg->len)
266                 return 0;
267 
268         if (ctx->tx_running)
269                 return -EAGAIN;
270         ctx->tx_running = 1;
271 
272         if (emsg->skb)
273                 err = espintcp_sendskb_locked(sk, emsg, flags);
274         else
275                 err = espintcp_sendskmsg_locked(sk, emsg, flags);
276         if (err == -EAGAIN) {
277                 ctx->tx_running = 0;
278                 return flags & MSG_DONTWAIT ? -EAGAIN : 0;
279         }
280         if (!err)
281                 memset(emsg, 0, sizeof(*emsg));
282 
283         ctx->tx_running = 0;
284 
285         return err;
286 }
287 
288 int espintcp_push_skb(struct sock *sk, struct sk_buff *skb)
289 {
290         struct espintcp_ctx *ctx = espintcp_getctx(sk);
291         struct espintcp_msg *emsg = &ctx->partial;
292         unsigned int len;
293         int offset;
294 
295         if (sk->sk_state != TCP_ESTABLISHED) {
296                 kfree_skb(skb);
297                 return -ECONNRESET;
298         }
299 
300         offset = skb_transport_offset(skb);
301         len = skb->len - offset;
302 
303         espintcp_push_msgs(sk, 0);
304 
305         if (emsg->len) {
306                 kfree_skb(skb);
307                 return -ENOBUFS;
308         }
309 
310         skb_set_owner_w(skb, sk);
311 
312         emsg->offset = offset;
313         emsg->len = len;
314         emsg->skb = skb;
315 
316         espintcp_push_msgs(sk, 0);
317 
318         return 0;
319 }
320 EXPORT_SYMBOL_GPL(espintcp_push_skb);
321 
322 static int espintcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t size)
323 {
324         long timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
325         struct espintcp_ctx *ctx = espintcp_getctx(sk);
326         struct espintcp_msg *emsg = &ctx->partial;
327         struct iov_iter pfx_iter;
328         struct kvec pfx_iov = {};
329         size_t msglen = size + 2;
330         char buf[2] = {0};
331         int err, end;
332 
333         if (msg->msg_flags & ~MSG_DONTWAIT)
334                 return -EOPNOTSUPP;
335 
336         if (size > MAX_ESPINTCP_MSG)
337                 return -EMSGSIZE;
338 
339         if (msg->msg_controllen)
340                 return -EOPNOTSUPP;
341 
342         lock_sock(sk);
343 
344         err = espintcp_push_msgs(sk, msg->msg_flags & MSG_DONTWAIT);
345         if (err < 0) {
346                 if (err != -EAGAIN || !(msg->msg_flags & MSG_DONTWAIT))
347                         err = -ENOBUFS;
348                 goto unlock;
349         }
350 
351         sk_msg_init(&emsg->skmsg);
352         while (1) {
353                 /* only -ENOMEM is possible since we don't coalesce */
354                 err = sk_msg_alloc(sk, &emsg->skmsg, msglen, 0);
355                 if (!err)
356                         break;
357 
358                 err = sk_stream_wait_memory(sk, &timeo);
359                 if (err)
360                         goto fail;
361         }
362 
363         *((__be16 *)buf) = cpu_to_be16(msglen);
364         pfx_iov.iov_base = buf;
365         pfx_iov.iov_len = sizeof(buf);
366         iov_iter_kvec(&pfx_iter, ITER_SOURCE, &pfx_iov, 1, pfx_iov.iov_len);
367 
368         err = sk_msg_memcopy_from_iter(sk, &pfx_iter, &emsg->skmsg,
369                                        pfx_iov.iov_len);
370         if (err < 0)
371                 goto fail;
372 
373         err = sk_msg_memcopy_from_iter(sk, &msg->msg_iter, &emsg->skmsg, size);
374         if (err < 0)
375                 goto fail;
376 
377         end = emsg->skmsg.sg.end;
378         emsg->len = size;
379         sk_msg_iter_var_prev(end);
380         sg_mark_end(sk_msg_elem(&emsg->skmsg, end));
381 
382         tcp_rate_check_app_limited(sk);
383 
384         err = espintcp_push_msgs(sk, msg->msg_flags & MSG_DONTWAIT);
385         /* this message could be partially sent, keep it */
386 
387         release_sock(sk);
388 
389         return size;
390 
391 fail:
392         sk_msg_free(sk, &emsg->skmsg);
393         memset(emsg, 0, sizeof(*emsg));
394 unlock:
395         release_sock(sk);
396         return err;
397 }
398 
399 static struct proto espintcp_prot __ro_after_init;
400 static struct proto_ops espintcp_ops __ro_after_init;
401 static struct proto espintcp6_prot;
402 static struct proto_ops espintcp6_ops;
403 static DEFINE_MUTEX(tcpv6_prot_mutex);
404 
405 static void espintcp_data_ready(struct sock *sk)
406 {
407         struct espintcp_ctx *ctx = espintcp_getctx(sk);
408 
409         trace_sk_data_ready(sk);
410 
411         strp_data_ready(&ctx->strp);
412 }
413 
414 static void espintcp_tx_work(struct work_struct *work)
415 {
416         struct espintcp_ctx *ctx = container_of(work,
417                                                 struct espintcp_ctx, work);
418         struct sock *sk = ctx->strp.sk;
419 
420         lock_sock(sk);
421         if (!ctx->tx_running)
422                 espintcp_push_msgs(sk, 0);
423         release_sock(sk);
424 }
425 
426 static void espintcp_write_space(struct sock *sk)
427 {
428         struct espintcp_ctx *ctx = espintcp_getctx(sk);
429 
430         schedule_work(&ctx->work);
431         ctx->saved_write_space(sk);
432 }
433 
434 static void espintcp_destruct(struct sock *sk)
435 {
436         struct espintcp_ctx *ctx = espintcp_getctx(sk);
437 
438         ctx->saved_destruct(sk);
439         kfree(ctx);
440 }
441 
442 bool tcp_is_ulp_esp(struct sock *sk)
443 {
444         return sk->sk_prot == &espintcp_prot || sk->sk_prot == &espintcp6_prot;
445 }
446 EXPORT_SYMBOL_GPL(tcp_is_ulp_esp);
447 
448 static void build_protos(struct proto *espintcp_prot,
449                          struct proto_ops *espintcp_ops,
450                          const struct proto *orig_prot,
451                          const struct proto_ops *orig_ops);
452 static int espintcp_init_sk(struct sock *sk)
453 {
454         struct inet_connection_sock *icsk = inet_csk(sk);
455         struct strp_callbacks cb = {
456                 .rcv_msg = espintcp_rcv,
457                 .parse_msg = espintcp_parse,
458         };
459         struct espintcp_ctx *ctx;
460         int err;
461 
462         /* sockmap is not compatible with espintcp */
463         if (sk->sk_user_data)
464                 return -EBUSY;
465 
466         ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
467         if (!ctx)
468                 return -ENOMEM;
469 
470         err = strp_init(&ctx->strp, sk, &cb);
471         if (err)
472                 goto free;
473 
474         __sk_dst_reset(sk);
475 
476         strp_check_rcv(&ctx->strp);
477         skb_queue_head_init(&ctx->ike_queue);
478         skb_queue_head_init(&ctx->out_queue);
479 
480         if (sk->sk_family == AF_INET) {
481                 sk->sk_prot = &espintcp_prot;
482                 sk->sk_socket->ops = &espintcp_ops;
483         } else {
484                 mutex_lock(&tcpv6_prot_mutex);
485                 if (!espintcp6_prot.recvmsg)
486                         build_protos(&espintcp6_prot, &espintcp6_ops, sk->sk_prot, sk->sk_socket->ops);
487                 mutex_unlock(&tcpv6_prot_mutex);
488 
489                 sk->sk_prot = &espintcp6_prot;
490                 sk->sk_socket->ops = &espintcp6_ops;
491         }
492         ctx->saved_data_ready = sk->sk_data_ready;
493         ctx->saved_write_space = sk->sk_write_space;
494         ctx->saved_destruct = sk->sk_destruct;
495         sk->sk_data_ready = espintcp_data_ready;
496         sk->sk_write_space = espintcp_write_space;
497         sk->sk_destruct = espintcp_destruct;
498         rcu_assign_pointer(icsk->icsk_ulp_data, ctx);
499         INIT_WORK(&ctx->work, espintcp_tx_work);
500 
501         /* avoid using task_frag */
502         sk->sk_allocation = GFP_ATOMIC;
503         sk->sk_use_task_frag = false;
504 
505         return 0;
506 
507 free:
508         kfree(ctx);
509         return err;
510 }
511 
512 static void espintcp_release(struct sock *sk)
513 {
514         struct espintcp_ctx *ctx = espintcp_getctx(sk);
515         struct sk_buff_head queue;
516         struct sk_buff *skb;
517 
518         __skb_queue_head_init(&queue);
519         skb_queue_splice_init(&ctx->out_queue, &queue);
520 
521         while ((skb = __skb_dequeue(&queue)))
522                 espintcp_push_skb(sk, skb);
523 
524         tcp_release_cb(sk);
525 }
526 
527 static void espintcp_close(struct sock *sk, long timeout)
528 {
529         struct espintcp_ctx *ctx = espintcp_getctx(sk);
530         struct espintcp_msg *emsg = &ctx->partial;
531 
532         strp_stop(&ctx->strp);
533 
534         sk->sk_prot = &tcp_prot;
535         barrier();
536 
537         cancel_work_sync(&ctx->work);
538         strp_done(&ctx->strp);
539 
540         skb_queue_purge(&ctx->out_queue);
541         skb_queue_purge(&ctx->ike_queue);
542 
543         if (emsg->len) {
544                 if (emsg->skb)
545                         kfree_skb(emsg->skb);
546                 else
547                         sk_msg_free(sk, &emsg->skmsg);
548         }
549 
550         tcp_close(sk, timeout);
551 }
552 
553 static __poll_t espintcp_poll(struct file *file, struct socket *sock,
554                               poll_table *wait)
555 {
556         __poll_t mask = datagram_poll(file, sock, wait);
557         struct sock *sk = sock->sk;
558         struct espintcp_ctx *ctx = espintcp_getctx(sk);
559 
560         if (!skb_queue_empty(&ctx->ike_queue))
561                 mask |= EPOLLIN | EPOLLRDNORM;
562 
563         return mask;
564 }
565 
566 static void build_protos(struct proto *espintcp_prot,
567                          struct proto_ops *espintcp_ops,
568                          const struct proto *orig_prot,
569                          const struct proto_ops *orig_ops)
570 {
571         memcpy(espintcp_prot, orig_prot, sizeof(struct proto));
572         memcpy(espintcp_ops, orig_ops, sizeof(struct proto_ops));
573         espintcp_prot->sendmsg = espintcp_sendmsg;
574         espintcp_prot->recvmsg = espintcp_recvmsg;
575         espintcp_prot->close = espintcp_close;
576         espintcp_prot->release_cb = espintcp_release;
577         espintcp_ops->poll = espintcp_poll;
578 }
579 
580 static struct tcp_ulp_ops espintcp_ulp __read_mostly = {
581         .name = "espintcp",
582         .owner = THIS_MODULE,
583         .init = espintcp_init_sk,
584 };
585 
586 void __init espintcp_init(void)
587 {
588         build_protos(&espintcp_prot, &espintcp_ops, &tcp_prot, &inet_stream_ops);
589 
590         tcp_register_ulp(&espintcp_ulp);
591 }
592 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php