blob: c255aac6b816b4911b435ae76cd3377b88f2d9dd [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001// SPDX-License-Identifier: GPL-2.0-or-later
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/*
3 * xfrm_device.c - IPsec device offloading code.
4 *
5 * Copyright (c) 2015 secunet Security Networks AG
6 *
7 * Author:
8 * Steffen Klassert <steffen.klassert@secunet.com>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00009 */
10
11#include <linux/errno.h>
12#include <linux/module.h>
13#include <linux/netdevice.h>
14#include <linux/skbuff.h>
15#include <linux/slab.h>
16#include <linux/spinlock.h>
17#include <net/dst.h>
18#include <net/xfrm.h>
19#include <linux/notifier.h>
20
21#ifdef CONFIG_XFRM_OFFLOAD
David Brazdil0f672f62019-12-10 10:32:29 +000022static void __xfrm_transport_prep(struct xfrm_state *x, struct sk_buff *skb,
23 unsigned int hsize)
24{
25 struct xfrm_offload *xo = xfrm_offload(skb);
26
27 skb_reset_mac_len(skb);
Olivier Deprez0e641232021-09-23 10:07:05 +020028 if (xo->flags & XFRM_GSO_SEGMENT)
David Brazdil0f672f62019-12-10 10:32:29 +000029 skb->transport_header -= x->props.header_len;
Olivier Deprez0e641232021-09-23 10:07:05 +020030
31 pskb_pull(skb, skb_transport_offset(skb) + x->props.header_len);
David Brazdil0f672f62019-12-10 10:32:29 +000032}
33
34static void __xfrm_mode_tunnel_prep(struct xfrm_state *x, struct sk_buff *skb,
35 unsigned int hsize)
36
37{
38 struct xfrm_offload *xo = xfrm_offload(skb);
39
40 if (xo->flags & XFRM_GSO_SEGMENT)
41 skb->transport_header = skb->network_header + hsize;
42
43 skb_reset_mac_len(skb);
44 pskb_pull(skb, skb->mac_len + x->props.header_len);
45}
46
Olivier Deprez157378f2022-04-04 15:47:50 +020047static void __xfrm_mode_beet_prep(struct xfrm_state *x, struct sk_buff *skb,
48 unsigned int hsize)
49{
50 struct xfrm_offload *xo = xfrm_offload(skb);
51 int phlen = 0;
52
53 if (xo->flags & XFRM_GSO_SEGMENT)
54 skb->transport_header = skb->network_header + hsize;
55
56 skb_reset_mac_len(skb);
57 if (x->sel.family != AF_INET6) {
58 phlen = IPV4_BEET_PHMAXLEN;
59 if (x->outer_mode.family == AF_INET6)
60 phlen += sizeof(struct ipv6hdr) - sizeof(struct iphdr);
61 }
62
63 pskb_pull(skb, skb->mac_len + hsize + (x->props.header_len - phlen));
64}
65
David Brazdil0f672f62019-12-10 10:32:29 +000066/* Adjust pointers into the packet when IPsec is done at layer2 */
67static void xfrm_outer_mode_prep(struct xfrm_state *x, struct sk_buff *skb)
68{
69 switch (x->outer_mode.encap) {
70 case XFRM_MODE_TUNNEL:
71 if (x->outer_mode.family == AF_INET)
72 return __xfrm_mode_tunnel_prep(x, skb,
73 sizeof(struct iphdr));
74 if (x->outer_mode.family == AF_INET6)
75 return __xfrm_mode_tunnel_prep(x, skb,
76 sizeof(struct ipv6hdr));
77 break;
78 case XFRM_MODE_TRANSPORT:
79 if (x->outer_mode.family == AF_INET)
80 return __xfrm_transport_prep(x, skb,
81 sizeof(struct iphdr));
82 if (x->outer_mode.family == AF_INET6)
83 return __xfrm_transport_prep(x, skb,
84 sizeof(struct ipv6hdr));
85 break;
Olivier Deprez157378f2022-04-04 15:47:50 +020086 case XFRM_MODE_BEET:
87 if (x->outer_mode.family == AF_INET)
88 return __xfrm_mode_beet_prep(x, skb,
89 sizeof(struct iphdr));
90 if (x->outer_mode.family == AF_INET6)
91 return __xfrm_mode_beet_prep(x, skb,
92 sizeof(struct ipv6hdr));
93 break;
David Brazdil0f672f62019-12-10 10:32:29 +000094 case XFRM_MODE_ROUTEOPTIMIZATION:
95 case XFRM_MODE_IN_TRIGGER:
David Brazdil0f672f62019-12-10 10:32:29 +000096 break;
97 }
98}
99
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000100struct sk_buff *validate_xmit_xfrm(struct sk_buff *skb, netdev_features_t features, bool *again)
101{
102 int err;
103 unsigned long flags;
104 struct xfrm_state *x;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000105 struct softnet_data *sd;
Olivier Deprez157378f2022-04-04 15:47:50 +0200106 struct sk_buff *skb2, *nskb, *pskb = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000107 netdev_features_t esp_features = features;
108 struct xfrm_offload *xo = xfrm_offload(skb);
Olivier Deprez157378f2022-04-04 15:47:50 +0200109 struct net_device *dev = skb->dev;
David Brazdil0f672f62019-12-10 10:32:29 +0000110 struct sec_path *sp;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000111
Olivier Deprez0e641232021-09-23 10:07:05 +0200112 if (!xo || (xo->flags & XFRM_XMIT))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000113 return skb;
114
115 if (!(features & NETIF_F_HW_ESP))
116 esp_features = features & ~(NETIF_F_SG | NETIF_F_CSUM_MASK);
117
David Brazdil0f672f62019-12-10 10:32:29 +0000118 sp = skb_sec_path(skb);
119 x = sp->xvec[sp->len - 1];
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000120 if (xo->flags & XFRM_GRO || x->xso.flags & XFRM_OFFLOAD_INBOUND)
121 return skb;
122
Olivier Deprez157378f2022-04-04 15:47:50 +0200123 /* This skb was already validated on the upper/virtual dev */
124 if ((x->xso.dev != dev) && (x->xso.real_dev == dev))
125 return skb;
126
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000127 local_irq_save(flags);
128 sd = this_cpu_ptr(&softnet_data);
129 err = !skb_queue_empty(&sd->xfrm_backlog);
130 local_irq_restore(flags);
131
132 if (err) {
133 *again = true;
134 return skb;
135 }
136
Olivier Deprez157378f2022-04-04 15:47:50 +0200137 if (skb_is_gso(skb) && unlikely(x->xso.dev != dev)) {
138 struct sk_buff *segs;
Olivier Deprez0e641232021-09-23 10:07:05 +0200139
Olivier Deprez157378f2022-04-04 15:47:50 +0200140 /* Packet got rerouted, fixup features and segment it. */
141 esp_features = esp_features & ~(NETIF_F_HW_ESP | NETIF_F_GSO_ESP);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000142
Olivier Deprez157378f2022-04-04 15:47:50 +0200143 segs = skb_gso_segment(skb, esp_features);
144 if (IS_ERR(segs)) {
145 kfree_skb(skb);
146 atomic_long_inc(&dev->tx_dropped);
147 return NULL;
148 } else {
149 consume_skb(skb);
150 skb = segs;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000151 }
152 }
153
154 if (!skb->next) {
David Brazdil0f672f62019-12-10 10:32:29 +0000155 esp_features |= skb->dev->gso_partial_features;
156 xfrm_outer_mode_prep(x, skb);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000157
158 xo->flags |= XFRM_DEV_RESUME;
159
160 err = x->type_offload->xmit(x, skb, esp_features);
161 if (err) {
162 if (err == -EINPROGRESS)
163 return NULL;
164
165 XFRM_INC_STATS(xs_net(x), LINUX_MIB_XFRMOUTSTATEPROTOERROR);
166 kfree_skb(skb);
167 return NULL;
168 }
169
170 skb_push(skb, skb->data - skb_mac_header(skb));
171
172 return skb;
173 }
174
Olivier Deprez157378f2022-04-04 15:47:50 +0200175 skb_list_walk_safe(skb, skb2, nskb) {
David Brazdil0f672f62019-12-10 10:32:29 +0000176 esp_features |= skb->dev->gso_partial_features;
177 skb_mark_not_on_list(skb2);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000178
179 xo = xfrm_offload(skb2);
180 xo->flags |= XFRM_DEV_RESUME;
181
David Brazdil0f672f62019-12-10 10:32:29 +0000182 xfrm_outer_mode_prep(x, skb2);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000183
184 err = x->type_offload->xmit(x, skb2, esp_features);
185 if (!err) {
186 skb2->next = nskb;
187 } else if (err != -EINPROGRESS) {
188 XFRM_INC_STATS(xs_net(x), LINUX_MIB_XFRMOUTSTATEPROTOERROR);
189 skb2->next = nskb;
190 kfree_skb_list(skb2);
191 return NULL;
192 } else {
193 if (skb == skb2)
194 skb = nskb;
Olivier Deprez157378f2022-04-04 15:47:50 +0200195 else
196 pskb->next = nskb;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000197
Olivier Deprez157378f2022-04-04 15:47:50 +0200198 continue;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000199 }
200
201 skb_push(skb2, skb2->data - skb_mac_header(skb2));
Olivier Deprez157378f2022-04-04 15:47:50 +0200202 pskb = skb2;
203 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000204
205 return skb;
206}
207EXPORT_SYMBOL_GPL(validate_xmit_xfrm);
208
209int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
210 struct xfrm_user_offload *xuo)
211{
212 int err;
213 struct dst_entry *dst;
214 struct net_device *dev;
215 struct xfrm_state_offload *xso = &x->xso;
216 xfrm_address_t *saddr;
217 xfrm_address_t *daddr;
218
219 if (!x->type_offload)
220 return -EINVAL;
221
222 /* We don't yet support UDP encapsulation and TFC padding. */
223 if (x->encap || x->tfcpad)
224 return -EINVAL;
225
Olivier Deprez157378f2022-04-04 15:47:50 +0200226 if (xuo->flags & ~(XFRM_OFFLOAD_IPV6 | XFRM_OFFLOAD_INBOUND))
227 return -EINVAL;
228
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000229 dev = dev_get_by_index(net, xuo->ifindex);
230 if (!dev) {
231 if (!(xuo->flags & XFRM_OFFLOAD_INBOUND)) {
232 saddr = &x->props.saddr;
233 daddr = &x->id.daddr;
234 } else {
235 saddr = &x->id.daddr;
236 daddr = &x->props.saddr;
237 }
238
239 dst = __xfrm_dst_lookup(net, 0, 0, saddr, daddr,
240 x->props.family,
241 xfrm_smark_get(0, x));
242 if (IS_ERR(dst))
243 return 0;
244
245 dev = dst->dev;
246
247 dev_hold(dev);
248 dst_release(dst);
249 }
250
251 if (!dev->xfrmdev_ops || !dev->xfrmdev_ops->xdo_dev_state_add) {
252 xso->dev = NULL;
253 dev_put(dev);
254 return 0;
255 }
256
257 if (x->props.flags & XFRM_STATE_ESN &&
258 !dev->xfrmdev_ops->xdo_dev_state_advance_esn) {
259 xso->dev = NULL;
260 dev_put(dev);
261 return -EINVAL;
262 }
263
264 xso->dev = dev;
Olivier Deprez157378f2022-04-04 15:47:50 +0200265 xso->real_dev = dev;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000266 xso->num_exthdrs = 1;
Olivier Deprez157378f2022-04-04 15:47:50 +0200267 /* Don't forward bit that is not implemented */
268 xso->flags = xuo->flags & ~XFRM_OFFLOAD_IPV6;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000269
270 err = dev->xfrmdev_ops->xdo_dev_state_add(x);
271 if (err) {
David Brazdil0f672f62019-12-10 10:32:29 +0000272 xso->num_exthdrs = 0;
273 xso->flags = 0;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000274 xso->dev = NULL;
Olivier Deprez157378f2022-04-04 15:47:50 +0200275 xso->real_dev = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000276 dev_put(dev);
David Brazdil0f672f62019-12-10 10:32:29 +0000277
278 if (err != -EOPNOTSUPP)
279 return err;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000280 }
281
282 return 0;
283}
284EXPORT_SYMBOL_GPL(xfrm_dev_state_add);
285
286bool xfrm_dev_offload_ok(struct sk_buff *skb, struct xfrm_state *x)
287{
288 int mtu;
289 struct dst_entry *dst = skb_dst(skb);
290 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
291 struct net_device *dev = x->xso.dev;
292
293 if (!x->type_offload || x->encap)
294 return false;
295
296 if ((!dev || (dev == xfrm_dst_path(dst)->dev)) &&
David Brazdil0f672f62019-12-10 10:32:29 +0000297 (!xdst->child->xfrm)) {
298 mtu = xfrm_state_mtu(x, xdst->child_mtu_cached);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000299 if (skb->len <= mtu)
300 goto ok;
301
302 if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
303 goto ok;
304 }
305
306 return false;
307
308ok:
309 if (dev && dev->xfrmdev_ops && dev->xfrmdev_ops->xdo_dev_offload_ok)
310 return x->xso.dev->xfrmdev_ops->xdo_dev_offload_ok(skb, x);
311
312 return true;
313}
314EXPORT_SYMBOL_GPL(xfrm_dev_offload_ok);
315
316void xfrm_dev_resume(struct sk_buff *skb)
317{
318 struct net_device *dev = skb->dev;
319 int ret = NETDEV_TX_BUSY;
320 struct netdev_queue *txq;
321 struct softnet_data *sd;
322 unsigned long flags;
323
324 rcu_read_lock();
David Brazdil0f672f62019-12-10 10:32:29 +0000325 txq = netdev_core_pick_tx(dev, skb, NULL);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000326
327 HARD_TX_LOCK(dev, txq, smp_processor_id());
328 if (!netif_xmit_frozen_or_stopped(txq))
329 skb = dev_hard_start_xmit(skb, dev, txq, &ret);
330 HARD_TX_UNLOCK(dev, txq);
331
332 if (!dev_xmit_complete(ret)) {
333 local_irq_save(flags);
334 sd = this_cpu_ptr(&softnet_data);
335 skb_queue_tail(&sd->xfrm_backlog, skb);
336 raise_softirq_irqoff(NET_TX_SOFTIRQ);
337 local_irq_restore(flags);
338 }
339 rcu_read_unlock();
340}
341EXPORT_SYMBOL_GPL(xfrm_dev_resume);
342
343void xfrm_dev_backlog(struct softnet_data *sd)
344{
345 struct sk_buff_head *xfrm_backlog = &sd->xfrm_backlog;
346 struct sk_buff_head list;
347 struct sk_buff *skb;
348
349 if (skb_queue_empty(xfrm_backlog))
350 return;
351
352 __skb_queue_head_init(&list);
353
354 spin_lock(&xfrm_backlog->lock);
355 skb_queue_splice_init(xfrm_backlog, &list);
356 spin_unlock(&xfrm_backlog->lock);
357
358 while (!skb_queue_empty(&list)) {
359 skb = __skb_dequeue(&list);
360 xfrm_dev_resume(skb);
361 }
362
363}
364#endif
365
366static int xfrm_api_check(struct net_device *dev)
367{
368#ifdef CONFIG_XFRM_OFFLOAD
369 if ((dev->features & NETIF_F_HW_ESP_TX_CSUM) &&
370 !(dev->features & NETIF_F_HW_ESP))
371 return NOTIFY_BAD;
372
373 if ((dev->features & NETIF_F_HW_ESP) &&
374 (!(dev->xfrmdev_ops &&
375 dev->xfrmdev_ops->xdo_dev_state_add &&
376 dev->xfrmdev_ops->xdo_dev_state_delete)))
377 return NOTIFY_BAD;
378#else
379 if (dev->features & (NETIF_F_HW_ESP | NETIF_F_HW_ESP_TX_CSUM))
380 return NOTIFY_BAD;
381#endif
382
383 return NOTIFY_DONE;
384}
385
386static int xfrm_dev_register(struct net_device *dev)
387{
388 return xfrm_api_check(dev);
389}
390
391static int xfrm_dev_feat_change(struct net_device *dev)
392{
393 return xfrm_api_check(dev);
394}
395
396static int xfrm_dev_down(struct net_device *dev)
397{
398 if (dev->features & NETIF_F_HW_ESP)
399 xfrm_dev_state_flush(dev_net(dev), dev, true);
400
401 return NOTIFY_DONE;
402}
403
404static int xfrm_dev_event(struct notifier_block *this, unsigned long event, void *ptr)
405{
406 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
407
408 switch (event) {
409 case NETDEV_REGISTER:
410 return xfrm_dev_register(dev);
411
412 case NETDEV_FEAT_CHANGE:
413 return xfrm_dev_feat_change(dev);
414
415 case NETDEV_DOWN:
Olivier Deprez0e641232021-09-23 10:07:05 +0200416 case NETDEV_UNREGISTER:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000417 return xfrm_dev_down(dev);
418 }
419 return NOTIFY_DONE;
420}
421
422static struct notifier_block xfrm_dev_notifier = {
423 .notifier_call = xfrm_dev_event,
424};
425
426void __init xfrm_dev_init(void)
427{
428 register_netdevice_notifier(&xfrm_dev_notifier);
429}