10062e7ccSShannon Nelson // SPDX-License-Identifier: GPL-2.0
20062e7ccSShannon Nelson /* Copyright(c) 2018 Oracle and/or its affiliates. All rights reserved. */
30062e7ccSShannon Nelson
40062e7ccSShannon Nelson #include "ixgbevf.h"
50062e7ccSShannon Nelson #include <net/xfrm.h>
60062e7ccSShannon Nelson #include <crypto/aead.h>
70062e7ccSShannon Nelson
80062e7ccSShannon Nelson #define IXGBE_IPSEC_KEY_BITS 160
90062e7ccSShannon Nelson static const char aes_gcm_name[] = "rfc4106(gcm(aes))";
100062e7ccSShannon Nelson
110062e7ccSShannon Nelson /**
120062e7ccSShannon Nelson * ixgbevf_ipsec_set_pf_sa - ask the PF to set up an SA
130062e7ccSShannon Nelson * @adapter: board private structure
140062e7ccSShannon Nelson * @xs: xfrm info to be sent to the PF
150062e7ccSShannon Nelson *
160062e7ccSShannon Nelson * Returns: positive offload handle from the PF, or negative error code
170062e7ccSShannon Nelson **/
ixgbevf_ipsec_set_pf_sa(struct ixgbevf_adapter * adapter,struct xfrm_state * xs)180062e7ccSShannon Nelson static int ixgbevf_ipsec_set_pf_sa(struct ixgbevf_adapter *adapter,
190062e7ccSShannon Nelson struct xfrm_state *xs)
200062e7ccSShannon Nelson {
210062e7ccSShannon Nelson u32 msgbuf[IXGBE_VFMAILBOX_SIZE] = { 0 };
220062e7ccSShannon Nelson struct ixgbe_hw *hw = &adapter->hw;
230062e7ccSShannon Nelson struct sa_mbx_msg *sam;
240062e7ccSShannon Nelson int ret;
250062e7ccSShannon Nelson
260062e7ccSShannon Nelson /* send the important bits to the PF */
270062e7ccSShannon Nelson sam = (struct sa_mbx_msg *)(&msgbuf[1]);
280c05ab78SLeon Romanovsky sam->dir = xs->xso.dir;
290062e7ccSShannon Nelson sam->spi = xs->id.spi;
300062e7ccSShannon Nelson sam->proto = xs->id.proto;
310062e7ccSShannon Nelson sam->family = xs->props.family;
320062e7ccSShannon Nelson
330062e7ccSShannon Nelson if (xs->props.family == AF_INET6)
340062e7ccSShannon Nelson memcpy(sam->addr, &xs->id.daddr.a6, sizeof(xs->id.daddr.a6));
350062e7ccSShannon Nelson else
360062e7ccSShannon Nelson memcpy(sam->addr, &xs->id.daddr.a4, sizeof(xs->id.daddr.a4));
370062e7ccSShannon Nelson memcpy(sam->key, xs->aead->alg_key, sizeof(sam->key));
380062e7ccSShannon Nelson
390062e7ccSShannon Nelson msgbuf[0] = IXGBE_VF_IPSEC_ADD;
400062e7ccSShannon Nelson
410062e7ccSShannon Nelson spin_lock_bh(&adapter->mbx_lock);
420062e7ccSShannon Nelson
43c8692598SRadoslaw Tyl ret = ixgbevf_write_mbx(hw, msgbuf, IXGBE_VFMAILBOX_SIZE);
440062e7ccSShannon Nelson if (ret)
450062e7ccSShannon Nelson goto out;
460062e7ccSShannon Nelson
47c8692598SRadoslaw Tyl ret = ixgbevf_poll_mbx(hw, msgbuf, 2);
480062e7ccSShannon Nelson if (ret)
490062e7ccSShannon Nelson goto out;
500062e7ccSShannon Nelson
510062e7ccSShannon Nelson ret = (int)msgbuf[1];
520edbecd5SRadoslaw Tyl if (msgbuf[0] & IXGBE_VT_MSGTYPE_FAILURE && ret >= 0)
530062e7ccSShannon Nelson ret = -1;
540062e7ccSShannon Nelson
550062e7ccSShannon Nelson out:
560062e7ccSShannon Nelson spin_unlock_bh(&adapter->mbx_lock);
570062e7ccSShannon Nelson
580062e7ccSShannon Nelson return ret;
590062e7ccSShannon Nelson }
600062e7ccSShannon Nelson
610062e7ccSShannon Nelson /**
620062e7ccSShannon Nelson * ixgbevf_ipsec_del_pf_sa - ask the PF to delete an SA
630062e7ccSShannon Nelson * @adapter: board private structure
640062e7ccSShannon Nelson * @pfsa: sa index returned from PF when created, -1 for all
650062e7ccSShannon Nelson *
660062e7ccSShannon Nelson * Returns: 0 on success, or negative error code
670062e7ccSShannon Nelson **/
ixgbevf_ipsec_del_pf_sa(struct ixgbevf_adapter * adapter,int pfsa)680062e7ccSShannon Nelson static int ixgbevf_ipsec_del_pf_sa(struct ixgbevf_adapter *adapter, int pfsa)
690062e7ccSShannon Nelson {
700062e7ccSShannon Nelson struct ixgbe_hw *hw = &adapter->hw;
710062e7ccSShannon Nelson u32 msgbuf[2];
720062e7ccSShannon Nelson int err;
730062e7ccSShannon Nelson
740062e7ccSShannon Nelson memset(msgbuf, 0, sizeof(msgbuf));
750062e7ccSShannon Nelson msgbuf[0] = IXGBE_VF_IPSEC_DEL;
760062e7ccSShannon Nelson msgbuf[1] = (u32)pfsa;
770062e7ccSShannon Nelson
780062e7ccSShannon Nelson spin_lock_bh(&adapter->mbx_lock);
790062e7ccSShannon Nelson
80c8692598SRadoslaw Tyl err = ixgbevf_write_mbx(hw, msgbuf, 2);
810062e7ccSShannon Nelson if (err)
820062e7ccSShannon Nelson goto out;
830062e7ccSShannon Nelson
84c8692598SRadoslaw Tyl err = ixgbevf_poll_mbx(hw, msgbuf, 2);
850062e7ccSShannon Nelson if (err)
860062e7ccSShannon Nelson goto out;
870062e7ccSShannon Nelson
880062e7ccSShannon Nelson out:
890062e7ccSShannon Nelson spin_unlock_bh(&adapter->mbx_lock);
900062e7ccSShannon Nelson return err;
910062e7ccSShannon Nelson }
920062e7ccSShannon Nelson
930062e7ccSShannon Nelson /**
940062e7ccSShannon Nelson * ixgbevf_ipsec_restore - restore the IPsec HW settings after a reset
950062e7ccSShannon Nelson * @adapter: board private structure
960062e7ccSShannon Nelson *
970062e7ccSShannon Nelson * Reload the HW tables from the SW tables after they've been bashed
980062e7ccSShannon Nelson * by a chip reset. While we're here, make sure any stale VF data is
990062e7ccSShannon Nelson * removed, since we go through reset when num_vfs changes.
1000062e7ccSShannon Nelson **/
ixgbevf_ipsec_restore(struct ixgbevf_adapter * adapter)1010062e7ccSShannon Nelson void ixgbevf_ipsec_restore(struct ixgbevf_adapter *adapter)
1020062e7ccSShannon Nelson {
1030062e7ccSShannon Nelson struct ixgbevf_ipsec *ipsec = adapter->ipsec;
1040062e7ccSShannon Nelson struct net_device *netdev = adapter->netdev;
1050062e7ccSShannon Nelson int i;
1060062e7ccSShannon Nelson
1070062e7ccSShannon Nelson if (!(adapter->netdev->features & NETIF_F_HW_ESP))
1080062e7ccSShannon Nelson return;
1090062e7ccSShannon Nelson
1100062e7ccSShannon Nelson /* reload the Rx and Tx keys */
1110062e7ccSShannon Nelson for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) {
1120062e7ccSShannon Nelson struct rx_sa *r = &ipsec->rx_tbl[i];
1130062e7ccSShannon Nelson struct tx_sa *t = &ipsec->tx_tbl[i];
1140062e7ccSShannon Nelson int ret;
1150062e7ccSShannon Nelson
1160062e7ccSShannon Nelson if (r->used) {
1170062e7ccSShannon Nelson ret = ixgbevf_ipsec_set_pf_sa(adapter, r->xs);
1180062e7ccSShannon Nelson if (ret < 0)
1190062e7ccSShannon Nelson netdev_err(netdev, "reload rx_tbl[%d] failed = %d\n",
1200062e7ccSShannon Nelson i, ret);
1210062e7ccSShannon Nelson }
1220062e7ccSShannon Nelson
1230062e7ccSShannon Nelson if (t->used) {
1240062e7ccSShannon Nelson ret = ixgbevf_ipsec_set_pf_sa(adapter, t->xs);
1250062e7ccSShannon Nelson if (ret < 0)
1260062e7ccSShannon Nelson netdev_err(netdev, "reload tx_tbl[%d] failed = %d\n",
1270062e7ccSShannon Nelson i, ret);
1280062e7ccSShannon Nelson }
1290062e7ccSShannon Nelson }
1300062e7ccSShannon Nelson }
1310062e7ccSShannon Nelson
1320062e7ccSShannon Nelson /**
1330062e7ccSShannon Nelson * ixgbevf_ipsec_find_empty_idx - find the first unused security parameter index
1340062e7ccSShannon Nelson * @ipsec: pointer to IPsec struct
1350062e7ccSShannon Nelson * @rxtable: true if we need to look in the Rx table
1360062e7ccSShannon Nelson *
1370062e7ccSShannon Nelson * Returns the first unused index in either the Rx or Tx SA table
1380062e7ccSShannon Nelson **/
1390062e7ccSShannon Nelson static
ixgbevf_ipsec_find_empty_idx(struct ixgbevf_ipsec * ipsec,bool rxtable)1400062e7ccSShannon Nelson int ixgbevf_ipsec_find_empty_idx(struct ixgbevf_ipsec *ipsec, bool rxtable)
1410062e7ccSShannon Nelson {
1420062e7ccSShannon Nelson u32 i;
1430062e7ccSShannon Nelson
1440062e7ccSShannon Nelson if (rxtable) {
1450062e7ccSShannon Nelson if (ipsec->num_rx_sa == IXGBE_IPSEC_MAX_SA_COUNT)
1460062e7ccSShannon Nelson return -ENOSPC;
1470062e7ccSShannon Nelson
1480062e7ccSShannon Nelson /* search rx sa table */
1490062e7ccSShannon Nelson for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) {
1500062e7ccSShannon Nelson if (!ipsec->rx_tbl[i].used)
1510062e7ccSShannon Nelson return i;
1520062e7ccSShannon Nelson }
1530062e7ccSShannon Nelson } else {
1540062e7ccSShannon Nelson if (ipsec->num_tx_sa == IXGBE_IPSEC_MAX_SA_COUNT)
1550062e7ccSShannon Nelson return -ENOSPC;
1560062e7ccSShannon Nelson
1570062e7ccSShannon Nelson /* search tx sa table */
1580062e7ccSShannon Nelson for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) {
1590062e7ccSShannon Nelson if (!ipsec->tx_tbl[i].used)
1600062e7ccSShannon Nelson return i;
1610062e7ccSShannon Nelson }
1620062e7ccSShannon Nelson }
1630062e7ccSShannon Nelson
1640062e7ccSShannon Nelson return -ENOSPC;
1650062e7ccSShannon Nelson }
1660062e7ccSShannon Nelson
1670062e7ccSShannon Nelson /**
1680062e7ccSShannon Nelson * ixgbevf_ipsec_find_rx_state - find the state that matches
1690062e7ccSShannon Nelson * @ipsec: pointer to IPsec struct
1700062e7ccSShannon Nelson * @daddr: inbound address to match
1710062e7ccSShannon Nelson * @proto: protocol to match
1720062e7ccSShannon Nelson * @spi: SPI to match
1730062e7ccSShannon Nelson * @ip4: true if using an IPv4 address
1740062e7ccSShannon Nelson *
1750062e7ccSShannon Nelson * Returns a pointer to the matching SA state information
1760062e7ccSShannon Nelson **/
1770062e7ccSShannon Nelson static
ixgbevf_ipsec_find_rx_state(struct ixgbevf_ipsec * ipsec,__be32 * daddr,u8 proto,__be32 spi,bool ip4)1780062e7ccSShannon Nelson struct xfrm_state *ixgbevf_ipsec_find_rx_state(struct ixgbevf_ipsec *ipsec,
1790062e7ccSShannon Nelson __be32 *daddr, u8 proto,
1800062e7ccSShannon Nelson __be32 spi, bool ip4)
1810062e7ccSShannon Nelson {
1820062e7ccSShannon Nelson struct xfrm_state *ret = NULL;
1830062e7ccSShannon Nelson struct rx_sa *rsa;
1840062e7ccSShannon Nelson
1850062e7ccSShannon Nelson rcu_read_lock();
1860062e7ccSShannon Nelson hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist,
1870062e7ccSShannon Nelson (__force u32)spi) {
1880062e7ccSShannon Nelson if (spi == rsa->xs->id.spi &&
1890062e7ccSShannon Nelson ((ip4 && *daddr == rsa->xs->id.daddr.a4) ||
1900062e7ccSShannon Nelson (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6,
1910062e7ccSShannon Nelson sizeof(rsa->xs->id.daddr.a6)))) &&
1920062e7ccSShannon Nelson proto == rsa->xs->id.proto) {
1930062e7ccSShannon Nelson ret = rsa->xs;
1940062e7ccSShannon Nelson xfrm_state_hold(ret);
1950062e7ccSShannon Nelson break;
1960062e7ccSShannon Nelson }
1970062e7ccSShannon Nelson }
1980062e7ccSShannon Nelson rcu_read_unlock();
1990062e7ccSShannon Nelson return ret;
2000062e7ccSShannon Nelson }
2010062e7ccSShannon Nelson
2020062e7ccSShannon Nelson /**
2030062e7ccSShannon Nelson * ixgbevf_ipsec_parse_proto_keys - find the key and salt based on the protocol
2040062e7ccSShannon Nelson * @xs: pointer to xfrm_state struct
2050062e7ccSShannon Nelson * @mykey: pointer to key array to populate
2060062e7ccSShannon Nelson * @mysalt: pointer to salt value to populate
2070062e7ccSShannon Nelson *
2080062e7ccSShannon Nelson * This copies the protocol keys and salt to our own data tables. The
2090062e7ccSShannon Nelson * 82599 family only supports the one algorithm.
2100062e7ccSShannon Nelson **/
ixgbevf_ipsec_parse_proto_keys(struct xfrm_state * xs,u32 * mykey,u32 * mysalt)2110062e7ccSShannon Nelson static int ixgbevf_ipsec_parse_proto_keys(struct xfrm_state *xs,
2120062e7ccSShannon Nelson u32 *mykey, u32 *mysalt)
2130062e7ccSShannon Nelson {
2142de7e4f6STaehee Yoo struct net_device *dev = xs->xso.real_dev;
2150062e7ccSShannon Nelson unsigned char *key_data;
2160062e7ccSShannon Nelson char *alg_name = NULL;
2170062e7ccSShannon Nelson int key_len;
2180062e7ccSShannon Nelson
2190062e7ccSShannon Nelson if (!xs->aead) {
2200062e7ccSShannon Nelson netdev_err(dev, "Unsupported IPsec algorithm\n");
2210062e7ccSShannon Nelson return -EINVAL;
2220062e7ccSShannon Nelson }
2230062e7ccSShannon Nelson
2240062e7ccSShannon Nelson if (xs->aead->alg_icv_len != IXGBE_IPSEC_AUTH_BITS) {
2250062e7ccSShannon Nelson netdev_err(dev, "IPsec offload requires %d bit authentication\n",
2260062e7ccSShannon Nelson IXGBE_IPSEC_AUTH_BITS);
2270062e7ccSShannon Nelson return -EINVAL;
2280062e7ccSShannon Nelson }
2290062e7ccSShannon Nelson
2300062e7ccSShannon Nelson key_data = &xs->aead->alg_key[0];
2310062e7ccSShannon Nelson key_len = xs->aead->alg_key_len;
2320062e7ccSShannon Nelson alg_name = xs->aead->alg_name;
2330062e7ccSShannon Nelson
2340062e7ccSShannon Nelson if (strcmp(alg_name, aes_gcm_name)) {
2350062e7ccSShannon Nelson netdev_err(dev, "Unsupported IPsec algorithm - please use %s\n",
2360062e7ccSShannon Nelson aes_gcm_name);
2370062e7ccSShannon Nelson return -EINVAL;
2380062e7ccSShannon Nelson }
2390062e7ccSShannon Nelson
2400062e7ccSShannon Nelson /* The key bytes come down in a big endian array of bytes, so
2410062e7ccSShannon Nelson * we don't need to do any byte swapping.
2420062e7ccSShannon Nelson * 160 accounts for 16 byte key and 4 byte salt
2430062e7ccSShannon Nelson */
2440062e7ccSShannon Nelson if (key_len > IXGBE_IPSEC_KEY_BITS) {
2450062e7ccSShannon Nelson *mysalt = ((u32 *)key_data)[4];
2460062e7ccSShannon Nelson } else if (key_len == IXGBE_IPSEC_KEY_BITS) {
2470062e7ccSShannon Nelson *mysalt = 0;
2480062e7ccSShannon Nelson } else {
2490062e7ccSShannon Nelson netdev_err(dev, "IPsec hw offload only supports keys up to 128 bits with a 32 bit salt\n");
2500062e7ccSShannon Nelson return -EINVAL;
2510062e7ccSShannon Nelson }
2520062e7ccSShannon Nelson memcpy(mykey, key_data, 16);
2530062e7ccSShannon Nelson
2540062e7ccSShannon Nelson return 0;
2550062e7ccSShannon Nelson }
2560062e7ccSShannon Nelson
2570062e7ccSShannon Nelson /**
2580062e7ccSShannon Nelson * ixgbevf_ipsec_add_sa - program device with a security association
2590062e7ccSShannon Nelson * @xs: pointer to transformer state struct
2607681a4f5SLeon Romanovsky * @extack: extack point to fill failure reason
2610062e7ccSShannon Nelson **/
ixgbevf_ipsec_add_sa(struct xfrm_state * xs,struct netlink_ext_ack * extack)2627681a4f5SLeon Romanovsky static int ixgbevf_ipsec_add_sa(struct xfrm_state *xs,
2637681a4f5SLeon Romanovsky struct netlink_ext_ack *extack)
2640062e7ccSShannon Nelson {
2652de7e4f6STaehee Yoo struct net_device *dev = xs->xso.real_dev;
2662de7e4f6STaehee Yoo struct ixgbevf_adapter *adapter;
2672de7e4f6STaehee Yoo struct ixgbevf_ipsec *ipsec;
2680062e7ccSShannon Nelson u16 sa_idx;
2690062e7ccSShannon Nelson int ret;
2700062e7ccSShannon Nelson
2712de7e4f6STaehee Yoo adapter = netdev_priv(dev);
2722de7e4f6STaehee Yoo ipsec = adapter->ipsec;
2732de7e4f6STaehee Yoo
2740062e7ccSShannon Nelson if (xs->id.proto != IPPROTO_ESP && xs->id.proto != IPPROTO_AH) {
275*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "Unsupported protocol for IPsec offload");
2760062e7ccSShannon Nelson return -EINVAL;
2770062e7ccSShannon Nelson }
2780062e7ccSShannon Nelson
279d785e1feSAntony Antony if (xs->props.mode != XFRM_MODE_TRANSPORT) {
280*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "Unsupported mode for ipsec offload");
281d785e1feSAntony Antony return -EINVAL;
282d785e1feSAntony Antony }
283d785e1feSAntony Antony
28462f6eca5SLeon Romanovsky if (xs->xso.type != XFRM_DEV_OFFLOAD_CRYPTO) {
285*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "Unsupported ipsec offload type");
28662f6eca5SLeon Romanovsky return -EINVAL;
28762f6eca5SLeon Romanovsky }
28862f6eca5SLeon Romanovsky
2890c05ab78SLeon Romanovsky if (xs->xso.dir == XFRM_DEV_OFFLOAD_IN) {
2900062e7ccSShannon Nelson struct rx_sa rsa;
2910062e7ccSShannon Nelson
2920062e7ccSShannon Nelson if (xs->calg) {
293*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "Compression offload not supported");
2940062e7ccSShannon Nelson return -EINVAL;
2950062e7ccSShannon Nelson }
2960062e7ccSShannon Nelson
2970062e7ccSShannon Nelson /* find the first unused index */
2980062e7ccSShannon Nelson ret = ixgbevf_ipsec_find_empty_idx(ipsec, true);
2990062e7ccSShannon Nelson if (ret < 0) {
300*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "No space for SA in Rx table!");
3010062e7ccSShannon Nelson return ret;
3020062e7ccSShannon Nelson }
3030062e7ccSShannon Nelson sa_idx = (u16)ret;
3040062e7ccSShannon Nelson
3050062e7ccSShannon Nelson memset(&rsa, 0, sizeof(rsa));
3060062e7ccSShannon Nelson rsa.used = true;
3070062e7ccSShannon Nelson rsa.xs = xs;
3080062e7ccSShannon Nelson
3090062e7ccSShannon Nelson if (rsa.xs->id.proto & IPPROTO_ESP)
3100062e7ccSShannon Nelson rsa.decrypt = xs->ealg || xs->aead;
3110062e7ccSShannon Nelson
3120062e7ccSShannon Nelson /* get the key and salt */
3130062e7ccSShannon Nelson ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt);
3140062e7ccSShannon Nelson if (ret) {
315*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "Failed to get key data for Rx SA table");
3160062e7ccSShannon Nelson return ret;
3170062e7ccSShannon Nelson }
3180062e7ccSShannon Nelson
3190062e7ccSShannon Nelson /* get ip for rx sa table */
3200062e7ccSShannon Nelson if (xs->props.family == AF_INET6)
3210062e7ccSShannon Nelson memcpy(rsa.ipaddr, &xs->id.daddr.a6, 16);
3220062e7ccSShannon Nelson else
3230062e7ccSShannon Nelson memcpy(&rsa.ipaddr[3], &xs->id.daddr.a4, 4);
3240062e7ccSShannon Nelson
3250062e7ccSShannon Nelson rsa.mode = IXGBE_RXMOD_VALID;
3260062e7ccSShannon Nelson if (rsa.xs->id.proto & IPPROTO_ESP)
3270062e7ccSShannon Nelson rsa.mode |= IXGBE_RXMOD_PROTO_ESP;
3280062e7ccSShannon Nelson if (rsa.decrypt)
3290062e7ccSShannon Nelson rsa.mode |= IXGBE_RXMOD_DECRYPT;
3300062e7ccSShannon Nelson if (rsa.xs->props.family == AF_INET6)
3310062e7ccSShannon Nelson rsa.mode |= IXGBE_RXMOD_IPV6;
3320062e7ccSShannon Nelson
3330062e7ccSShannon Nelson ret = ixgbevf_ipsec_set_pf_sa(adapter, xs);
3340062e7ccSShannon Nelson if (ret < 0)
3350062e7ccSShannon Nelson return ret;
3360062e7ccSShannon Nelson rsa.pfsa = ret;
3370062e7ccSShannon Nelson
3380062e7ccSShannon Nelson /* the preparations worked, so save the info */
3390062e7ccSShannon Nelson memcpy(&ipsec->rx_tbl[sa_idx], &rsa, sizeof(rsa));
3400062e7ccSShannon Nelson
3410062e7ccSShannon Nelson xs->xso.offload_handle = sa_idx + IXGBE_IPSEC_BASE_RX_INDEX;
3420062e7ccSShannon Nelson
3430062e7ccSShannon Nelson ipsec->num_rx_sa++;
3440062e7ccSShannon Nelson
3450062e7ccSShannon Nelson /* hash the new entry for faster search in Rx path */
3460062e7ccSShannon Nelson hash_add_rcu(ipsec->rx_sa_list, &ipsec->rx_tbl[sa_idx].hlist,
3470062e7ccSShannon Nelson (__force u32)rsa.xs->id.spi);
3480062e7ccSShannon Nelson } else {
3490062e7ccSShannon Nelson struct tx_sa tsa;
3500062e7ccSShannon Nelson
3510062e7ccSShannon Nelson /* find the first unused index */
3520062e7ccSShannon Nelson ret = ixgbevf_ipsec_find_empty_idx(ipsec, false);
3530062e7ccSShannon Nelson if (ret < 0) {
354*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "No space for SA in Tx table");
3550062e7ccSShannon Nelson return ret;
3560062e7ccSShannon Nelson }
3570062e7ccSShannon Nelson sa_idx = (u16)ret;
3580062e7ccSShannon Nelson
3590062e7ccSShannon Nelson memset(&tsa, 0, sizeof(tsa));
3600062e7ccSShannon Nelson tsa.used = true;
3610062e7ccSShannon Nelson tsa.xs = xs;
3620062e7ccSShannon Nelson
3630062e7ccSShannon Nelson if (xs->id.proto & IPPROTO_ESP)
3640062e7ccSShannon Nelson tsa.encrypt = xs->ealg || xs->aead;
3650062e7ccSShannon Nelson
3660062e7ccSShannon Nelson ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt);
3670062e7ccSShannon Nelson if (ret) {
368*c068ec5cSLeon Romanovsky NL_SET_ERR_MSG_MOD(extack, "Failed to get key data for Tx SA table");
3690062e7ccSShannon Nelson memset(&tsa, 0, sizeof(tsa));
3700062e7ccSShannon Nelson return ret;
3710062e7ccSShannon Nelson }
3720062e7ccSShannon Nelson
3730062e7ccSShannon Nelson ret = ixgbevf_ipsec_set_pf_sa(adapter, xs);
3740062e7ccSShannon Nelson if (ret < 0)
3750062e7ccSShannon Nelson return ret;
3760062e7ccSShannon Nelson tsa.pfsa = ret;
3770062e7ccSShannon Nelson
3780062e7ccSShannon Nelson /* the preparations worked, so save the info */
3790062e7ccSShannon Nelson memcpy(&ipsec->tx_tbl[sa_idx], &tsa, sizeof(tsa));
3800062e7ccSShannon Nelson
3810062e7ccSShannon Nelson xs->xso.offload_handle = sa_idx + IXGBE_IPSEC_BASE_TX_INDEX;
3820062e7ccSShannon Nelson
3830062e7ccSShannon Nelson ipsec->num_tx_sa++;
3840062e7ccSShannon Nelson }
3850062e7ccSShannon Nelson
3860062e7ccSShannon Nelson return 0;
3870062e7ccSShannon Nelson }
3880062e7ccSShannon Nelson
3890062e7ccSShannon Nelson /**
3900062e7ccSShannon Nelson * ixgbevf_ipsec_del_sa - clear out this specific SA
3910062e7ccSShannon Nelson * @xs: pointer to transformer state struct
3920062e7ccSShannon Nelson **/
ixgbevf_ipsec_del_sa(struct xfrm_state * xs)3930062e7ccSShannon Nelson static void ixgbevf_ipsec_del_sa(struct xfrm_state *xs)
3940062e7ccSShannon Nelson {
3952de7e4f6STaehee Yoo struct net_device *dev = xs->xso.real_dev;
3962de7e4f6STaehee Yoo struct ixgbevf_adapter *adapter;
3972de7e4f6STaehee Yoo struct ixgbevf_ipsec *ipsec;
3980062e7ccSShannon Nelson u16 sa_idx;
3990062e7ccSShannon Nelson
4002de7e4f6STaehee Yoo adapter = netdev_priv(dev);
4012de7e4f6STaehee Yoo ipsec = adapter->ipsec;
4022de7e4f6STaehee Yoo
4030c05ab78SLeon Romanovsky if (xs->xso.dir == XFRM_DEV_OFFLOAD_IN) {
4040062e7ccSShannon Nelson sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_RX_INDEX;
4050062e7ccSShannon Nelson
4060062e7ccSShannon Nelson if (!ipsec->rx_tbl[sa_idx].used) {
4070062e7ccSShannon Nelson netdev_err(dev, "Invalid Rx SA selected sa_idx=%d offload_handle=%lu\n",
4080062e7ccSShannon Nelson sa_idx, xs->xso.offload_handle);
4090062e7ccSShannon Nelson return;
4100062e7ccSShannon Nelson }
4110062e7ccSShannon Nelson
4120062e7ccSShannon Nelson ixgbevf_ipsec_del_pf_sa(adapter, ipsec->rx_tbl[sa_idx].pfsa);
4130062e7ccSShannon Nelson hash_del_rcu(&ipsec->rx_tbl[sa_idx].hlist);
4140062e7ccSShannon Nelson memset(&ipsec->rx_tbl[sa_idx], 0, sizeof(struct rx_sa));
4150062e7ccSShannon Nelson ipsec->num_rx_sa--;
4160062e7ccSShannon Nelson } else {
4170062e7ccSShannon Nelson sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_TX_INDEX;
4180062e7ccSShannon Nelson
4190062e7ccSShannon Nelson if (!ipsec->tx_tbl[sa_idx].used) {
4200062e7ccSShannon Nelson netdev_err(dev, "Invalid Tx SA selected sa_idx=%d offload_handle=%lu\n",
4210062e7ccSShannon Nelson sa_idx, xs->xso.offload_handle);
4220062e7ccSShannon Nelson return;
4230062e7ccSShannon Nelson }
4240062e7ccSShannon Nelson
4250062e7ccSShannon Nelson ixgbevf_ipsec_del_pf_sa(adapter, ipsec->tx_tbl[sa_idx].pfsa);
4260062e7ccSShannon Nelson memset(&ipsec->tx_tbl[sa_idx], 0, sizeof(struct tx_sa));
4270062e7ccSShannon Nelson ipsec->num_tx_sa--;
4280062e7ccSShannon Nelson }
4290062e7ccSShannon Nelson }
4300062e7ccSShannon Nelson
4310062e7ccSShannon Nelson /**
4320062e7ccSShannon Nelson * ixgbevf_ipsec_offload_ok - can this packet use the xfrm hw offload
4330062e7ccSShannon Nelson * @skb: current data packet
4340062e7ccSShannon Nelson * @xs: pointer to transformer state struct
4350062e7ccSShannon Nelson **/
ixgbevf_ipsec_offload_ok(struct sk_buff * skb,struct xfrm_state * xs)4360062e7ccSShannon Nelson static bool ixgbevf_ipsec_offload_ok(struct sk_buff *skb, struct xfrm_state *xs)
4370062e7ccSShannon Nelson {
4380062e7ccSShannon Nelson if (xs->props.family == AF_INET) {
4390062e7ccSShannon Nelson /* Offload with IPv4 options is not supported yet */
4400062e7ccSShannon Nelson if (ip_hdr(skb)->ihl != 5)
4410062e7ccSShannon Nelson return false;
4420062e7ccSShannon Nelson } else {
4430062e7ccSShannon Nelson /* Offload with IPv6 extension headers is not support yet */
4440062e7ccSShannon Nelson if (ipv6_ext_hdr(ipv6_hdr(skb)->nexthdr))
4450062e7ccSShannon Nelson return false;
4460062e7ccSShannon Nelson }
4470062e7ccSShannon Nelson
4480062e7ccSShannon Nelson return true;
4490062e7ccSShannon Nelson }
4500062e7ccSShannon Nelson
4510062e7ccSShannon Nelson static const struct xfrmdev_ops ixgbevf_xfrmdev_ops = {
4520062e7ccSShannon Nelson .xdo_dev_state_add = ixgbevf_ipsec_add_sa,
4530062e7ccSShannon Nelson .xdo_dev_state_delete = ixgbevf_ipsec_del_sa,
4540062e7ccSShannon Nelson .xdo_dev_offload_ok = ixgbevf_ipsec_offload_ok,
4550062e7ccSShannon Nelson };
4560062e7ccSShannon Nelson
4570062e7ccSShannon Nelson /**
4580062e7ccSShannon Nelson * ixgbevf_ipsec_tx - setup Tx flags for IPsec offload
4590062e7ccSShannon Nelson * @tx_ring: outgoing context
4600062e7ccSShannon Nelson * @first: current data packet
4610062e7ccSShannon Nelson * @itd: ipsec Tx data for later use in building context descriptor
4620062e7ccSShannon Nelson **/
ixgbevf_ipsec_tx(struct ixgbevf_ring * tx_ring,struct ixgbevf_tx_buffer * first,struct ixgbevf_ipsec_tx_data * itd)4630062e7ccSShannon Nelson int ixgbevf_ipsec_tx(struct ixgbevf_ring *tx_ring,
4640062e7ccSShannon Nelson struct ixgbevf_tx_buffer *first,
4650062e7ccSShannon Nelson struct ixgbevf_ipsec_tx_data *itd)
4660062e7ccSShannon Nelson {
4670062e7ccSShannon Nelson struct ixgbevf_adapter *adapter = netdev_priv(tx_ring->netdev);
4680062e7ccSShannon Nelson struct ixgbevf_ipsec *ipsec = adapter->ipsec;
4690062e7ccSShannon Nelson struct xfrm_state *xs;
4702fdb435bSFlorian Westphal struct sec_path *sp;
4710062e7ccSShannon Nelson struct tx_sa *tsa;
4720062e7ccSShannon Nelson u16 sa_idx;
4730062e7ccSShannon Nelson
4742fdb435bSFlorian Westphal sp = skb_sec_path(first->skb);
4752fdb435bSFlorian Westphal if (unlikely(!sp->len)) {
4760062e7ccSShannon Nelson netdev_err(tx_ring->netdev, "%s: no xfrm state len = %d\n",
4772fdb435bSFlorian Westphal __func__, sp->len);
4780062e7ccSShannon Nelson return 0;
4790062e7ccSShannon Nelson }
4800062e7ccSShannon Nelson
4810062e7ccSShannon Nelson xs = xfrm_input_state(first->skb);
4820062e7ccSShannon Nelson if (unlikely(!xs)) {
4830062e7ccSShannon Nelson netdev_err(tx_ring->netdev, "%s: no xfrm_input_state() xs = %p\n",
4840062e7ccSShannon Nelson __func__, xs);
4850062e7ccSShannon Nelson return 0;
4860062e7ccSShannon Nelson }
4870062e7ccSShannon Nelson
4880062e7ccSShannon Nelson sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_TX_INDEX;
489617cc646SDan Carpenter if (unlikely(sa_idx >= IXGBE_IPSEC_MAX_SA_COUNT)) {
4900062e7ccSShannon Nelson netdev_err(tx_ring->netdev, "%s: bad sa_idx=%d handle=%lu\n",
4910062e7ccSShannon Nelson __func__, sa_idx, xs->xso.offload_handle);
4920062e7ccSShannon Nelson return 0;
4930062e7ccSShannon Nelson }
4940062e7ccSShannon Nelson
4950062e7ccSShannon Nelson tsa = &ipsec->tx_tbl[sa_idx];
4960062e7ccSShannon Nelson if (unlikely(!tsa->used)) {
4970062e7ccSShannon Nelson netdev_err(tx_ring->netdev, "%s: unused sa_idx=%d\n",
4980062e7ccSShannon Nelson __func__, sa_idx);
4990062e7ccSShannon Nelson return 0;
5000062e7ccSShannon Nelson }
5010062e7ccSShannon Nelson
5020062e7ccSShannon Nelson itd->pfsa = tsa->pfsa - IXGBE_IPSEC_BASE_TX_INDEX;
5030062e7ccSShannon Nelson
5040062e7ccSShannon Nelson first->tx_flags |= IXGBE_TX_FLAGS_IPSEC | IXGBE_TX_FLAGS_CSUM;
5050062e7ccSShannon Nelson
5060062e7ccSShannon Nelson if (xs->id.proto == IPPROTO_ESP) {
5070062e7ccSShannon Nelson itd->flags |= IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP |
5080062e7ccSShannon Nelson IXGBE_ADVTXD_TUCMD_L4T_TCP;
5090062e7ccSShannon Nelson if (first->protocol == htons(ETH_P_IP))
5100062e7ccSShannon Nelson itd->flags |= IXGBE_ADVTXD_TUCMD_IPV4;
5110062e7ccSShannon Nelson
5120062e7ccSShannon Nelson /* The actual trailer length is authlen (16 bytes) plus
5130062e7ccSShannon Nelson * 2 bytes for the proto and the padlen values, plus
5140062e7ccSShannon Nelson * padlen bytes of padding. This ends up not the same
5150062e7ccSShannon Nelson * as the static value found in xs->props.trailer_len (21).
5160062e7ccSShannon Nelson *
5170062e7ccSShannon Nelson * ... but if we're doing GSO, don't bother as the stack
5180062e7ccSShannon Nelson * doesn't add a trailer for those.
5190062e7ccSShannon Nelson */
5200062e7ccSShannon Nelson if (!skb_is_gso(first->skb)) {
5210062e7ccSShannon Nelson /* The "correct" way to get the auth length would be
5220062e7ccSShannon Nelson * to use
5230062e7ccSShannon Nelson * authlen = crypto_aead_authsize(xs->data);
5240062e7ccSShannon Nelson * but since we know we only have one size to worry
5250062e7ccSShannon Nelson * about * we can let the compiler use the constant
5260062e7ccSShannon Nelson * and save us a few CPU cycles.
5270062e7ccSShannon Nelson */
5280062e7ccSShannon Nelson const int authlen = IXGBE_IPSEC_AUTH_BITS / 8;
5290062e7ccSShannon Nelson struct sk_buff *skb = first->skb;
5300062e7ccSShannon Nelson u8 padlen;
5310062e7ccSShannon Nelson int ret;
5320062e7ccSShannon Nelson
5330062e7ccSShannon Nelson ret = skb_copy_bits(skb, skb->len - (authlen + 2),
5340062e7ccSShannon Nelson &padlen, 1);
5350062e7ccSShannon Nelson if (unlikely(ret))
5360062e7ccSShannon Nelson return 0;
5370062e7ccSShannon Nelson itd->trailer_len = authlen + 2 + padlen;
5380062e7ccSShannon Nelson }
5390062e7ccSShannon Nelson }
5400062e7ccSShannon Nelson if (tsa->encrypt)
5410062e7ccSShannon Nelson itd->flags |= IXGBE_ADVTXD_TUCMD_IPSEC_ENCRYPT_EN;
5420062e7ccSShannon Nelson
5430062e7ccSShannon Nelson return 1;
5440062e7ccSShannon Nelson }
5450062e7ccSShannon Nelson
5460062e7ccSShannon Nelson /**
5470062e7ccSShannon Nelson * ixgbevf_ipsec_rx - decode IPsec bits from Rx descriptor
5480062e7ccSShannon Nelson * @rx_ring: receiving ring
5490062e7ccSShannon Nelson * @rx_desc: receive data descriptor
5500062e7ccSShannon Nelson * @skb: current data packet
5510062e7ccSShannon Nelson *
5520062e7ccSShannon Nelson * Determine if there was an IPsec encapsulation noticed, and if so set up
5530062e7ccSShannon Nelson * the resulting status for later in the receive stack.
5540062e7ccSShannon Nelson **/
ixgbevf_ipsec_rx(struct ixgbevf_ring * rx_ring,union ixgbe_adv_rx_desc * rx_desc,struct sk_buff * skb)5550062e7ccSShannon Nelson void ixgbevf_ipsec_rx(struct ixgbevf_ring *rx_ring,
5560062e7ccSShannon Nelson union ixgbe_adv_rx_desc *rx_desc,
5570062e7ccSShannon Nelson struct sk_buff *skb)
5580062e7ccSShannon Nelson {
5590062e7ccSShannon Nelson struct ixgbevf_adapter *adapter = netdev_priv(rx_ring->netdev);
5600062e7ccSShannon Nelson __le16 pkt_info = rx_desc->wb.lower.lo_dword.hs_rss.pkt_info;
5610062e7ccSShannon Nelson __le16 ipsec_pkt_types = cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_AH |
5620062e7ccSShannon Nelson IXGBE_RXDADV_PKTTYPE_IPSEC_ESP);
5630062e7ccSShannon Nelson struct ixgbevf_ipsec *ipsec = adapter->ipsec;
5640062e7ccSShannon Nelson struct xfrm_offload *xo = NULL;
5650062e7ccSShannon Nelson struct xfrm_state *xs = NULL;
5660062e7ccSShannon Nelson struct ipv6hdr *ip6 = NULL;
5670062e7ccSShannon Nelson struct iphdr *ip4 = NULL;
568a84e3f53SFlorian Westphal struct sec_path *sp;
5690062e7ccSShannon Nelson void *daddr;
5700062e7ccSShannon Nelson __be32 spi;
5710062e7ccSShannon Nelson u8 *c_hdr;
5720062e7ccSShannon Nelson u8 proto;
5730062e7ccSShannon Nelson
5740062e7ccSShannon Nelson /* Find the IP and crypto headers in the data.
5750062e7ccSShannon Nelson * We can assume no VLAN header in the way, b/c the
5760062e7ccSShannon Nelson * hw won't recognize the IPsec packet and anyway the
5770062e7ccSShannon Nelson * currently VLAN device doesn't support xfrm offload.
5780062e7ccSShannon Nelson */
5790062e7ccSShannon Nelson if (pkt_info & cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPV4)) {
5800062e7ccSShannon Nelson ip4 = (struct iphdr *)(skb->data + ETH_HLEN);
5810062e7ccSShannon Nelson daddr = &ip4->daddr;
5820062e7ccSShannon Nelson c_hdr = (u8 *)ip4 + ip4->ihl * 4;
5830062e7ccSShannon Nelson } else if (pkt_info & cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPV6)) {
5840062e7ccSShannon Nelson ip6 = (struct ipv6hdr *)(skb->data + ETH_HLEN);
5850062e7ccSShannon Nelson daddr = &ip6->daddr;
5860062e7ccSShannon Nelson c_hdr = (u8 *)ip6 + sizeof(struct ipv6hdr);
5870062e7ccSShannon Nelson } else {
5880062e7ccSShannon Nelson return;
5890062e7ccSShannon Nelson }
5900062e7ccSShannon Nelson
5910062e7ccSShannon Nelson switch (pkt_info & ipsec_pkt_types) {
5920062e7ccSShannon Nelson case cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_AH):
5930062e7ccSShannon Nelson spi = ((struct ip_auth_hdr *)c_hdr)->spi;
5940062e7ccSShannon Nelson proto = IPPROTO_AH;
5950062e7ccSShannon Nelson break;
5960062e7ccSShannon Nelson case cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_ESP):
5970062e7ccSShannon Nelson spi = ((struct ip_esp_hdr *)c_hdr)->spi;
5980062e7ccSShannon Nelson proto = IPPROTO_ESP;
5990062e7ccSShannon Nelson break;
6000062e7ccSShannon Nelson default:
6010062e7ccSShannon Nelson return;
6020062e7ccSShannon Nelson }
6030062e7ccSShannon Nelson
6040062e7ccSShannon Nelson xs = ixgbevf_ipsec_find_rx_state(ipsec, daddr, proto, spi, !!ip4);
6050062e7ccSShannon Nelson if (unlikely(!xs))
6060062e7ccSShannon Nelson return;
6070062e7ccSShannon Nelson
608a84e3f53SFlorian Westphal sp = secpath_set(skb);
609a84e3f53SFlorian Westphal if (unlikely(!sp))
6100062e7ccSShannon Nelson return;
6110062e7ccSShannon Nelson
612a84e3f53SFlorian Westphal sp->xvec[sp->len++] = xs;
613a84e3f53SFlorian Westphal sp->olen++;
6140062e7ccSShannon Nelson xo = xfrm_offload(skb);
6150062e7ccSShannon Nelson xo->flags = CRYPTO_DONE;
6160062e7ccSShannon Nelson xo->status = CRYPTO_SUCCESS;
6170062e7ccSShannon Nelson
6180062e7ccSShannon Nelson adapter->rx_ipsec++;
6190062e7ccSShannon Nelson }
6200062e7ccSShannon Nelson
6210062e7ccSShannon Nelson /**
6220062e7ccSShannon Nelson * ixgbevf_init_ipsec_offload - initialize registers for IPsec operation
6230062e7ccSShannon Nelson * @adapter: board private structure
6240062e7ccSShannon Nelson **/
ixgbevf_init_ipsec_offload(struct ixgbevf_adapter * adapter)6250062e7ccSShannon Nelson void ixgbevf_init_ipsec_offload(struct ixgbevf_adapter *adapter)
6260062e7ccSShannon Nelson {
6270062e7ccSShannon Nelson struct ixgbevf_ipsec *ipsec;
6280062e7ccSShannon Nelson size_t size;
6290062e7ccSShannon Nelson
6300062e7ccSShannon Nelson switch (adapter->hw.api_version) {
6310062e7ccSShannon Nelson case ixgbe_mbox_api_14:
6320062e7ccSShannon Nelson break;
6330062e7ccSShannon Nelson default:
6340062e7ccSShannon Nelson return;
6350062e7ccSShannon Nelson }
6360062e7ccSShannon Nelson
6370062e7ccSShannon Nelson ipsec = kzalloc(sizeof(*ipsec), GFP_KERNEL);
6380062e7ccSShannon Nelson if (!ipsec)
6390062e7ccSShannon Nelson goto err1;
6400062e7ccSShannon Nelson hash_init(ipsec->rx_sa_list);
6410062e7ccSShannon Nelson
6420062e7ccSShannon Nelson size = sizeof(struct rx_sa) * IXGBE_IPSEC_MAX_SA_COUNT;
6430062e7ccSShannon Nelson ipsec->rx_tbl = kzalloc(size, GFP_KERNEL);
6440062e7ccSShannon Nelson if (!ipsec->rx_tbl)
6450062e7ccSShannon Nelson goto err2;
6460062e7ccSShannon Nelson
6470062e7ccSShannon Nelson size = sizeof(struct tx_sa) * IXGBE_IPSEC_MAX_SA_COUNT;
6480062e7ccSShannon Nelson ipsec->tx_tbl = kzalloc(size, GFP_KERNEL);
6490062e7ccSShannon Nelson if (!ipsec->tx_tbl)
6500062e7ccSShannon Nelson goto err2;
6510062e7ccSShannon Nelson
6520062e7ccSShannon Nelson ipsec->num_rx_sa = 0;
6530062e7ccSShannon Nelson ipsec->num_tx_sa = 0;
6540062e7ccSShannon Nelson
6550062e7ccSShannon Nelson adapter->ipsec = ipsec;
6560062e7ccSShannon Nelson
6570062e7ccSShannon Nelson adapter->netdev->xfrmdev_ops = &ixgbevf_xfrmdev_ops;
6580062e7ccSShannon Nelson
6590062e7ccSShannon Nelson #define IXGBEVF_ESP_FEATURES (NETIF_F_HW_ESP | \
6600062e7ccSShannon Nelson NETIF_F_HW_ESP_TX_CSUM | \
6610062e7ccSShannon Nelson NETIF_F_GSO_ESP)
6620062e7ccSShannon Nelson
6630062e7ccSShannon Nelson adapter->netdev->features |= IXGBEVF_ESP_FEATURES;
6640062e7ccSShannon Nelson adapter->netdev->hw_enc_features |= IXGBEVF_ESP_FEATURES;
6650062e7ccSShannon Nelson
6660062e7ccSShannon Nelson return;
6670062e7ccSShannon Nelson
6680062e7ccSShannon Nelson err2:
6690062e7ccSShannon Nelson kfree(ipsec->rx_tbl);
6700062e7ccSShannon Nelson kfree(ipsec->tx_tbl);
6710062e7ccSShannon Nelson kfree(ipsec);
6720062e7ccSShannon Nelson err1:
6730062e7ccSShannon Nelson netdev_err(adapter->netdev, "Unable to allocate memory for SA tables");
6740062e7ccSShannon Nelson }
6750062e7ccSShannon Nelson
6760062e7ccSShannon Nelson /**
6770062e7ccSShannon Nelson * ixgbevf_stop_ipsec_offload - tear down the IPsec offload
6780062e7ccSShannon Nelson * @adapter: board private structure
6790062e7ccSShannon Nelson **/
ixgbevf_stop_ipsec_offload(struct ixgbevf_adapter * adapter)6800062e7ccSShannon Nelson void ixgbevf_stop_ipsec_offload(struct ixgbevf_adapter *adapter)
6810062e7ccSShannon Nelson {
6820062e7ccSShannon Nelson struct ixgbevf_ipsec *ipsec = adapter->ipsec;
6830062e7ccSShannon Nelson
6840062e7ccSShannon Nelson adapter->ipsec = NULL;
6850062e7ccSShannon Nelson if (ipsec) {
6860062e7ccSShannon Nelson kfree(ipsec->rx_tbl);
6870062e7ccSShannon Nelson kfree(ipsec->tx_tbl);
6880062e7ccSShannon Nelson kfree(ipsec);
6890062e7ccSShannon Nelson }
6900062e7ccSShannon Nelson }
691