1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright(c) 2017 Oracle and/or its affiliates. All rights reserved. */ 3 4 #include "ixgbe.h" 5 #include <net/xfrm.h> 6 #include <crypto/aead.h> 7 #include <linux/if_bridge.h> 8 9 #define IXGBE_IPSEC_KEY_BITS 160 10 static const char aes_gcm_name[] = "rfc4106(gcm(aes))"; 11 12 static void ixgbe_ipsec_del_sa(struct xfrm_state *xs); 13 14 /** 15 * ixgbe_ipsec_set_tx_sa - set the Tx SA registers 16 * @hw: hw specific details 17 * @idx: register index to write 18 * @key: key byte array 19 * @salt: salt bytes 20 **/ 21 static void ixgbe_ipsec_set_tx_sa(struct ixgbe_hw *hw, u16 idx, 22 u32 key[], u32 salt) 23 { 24 u32 reg; 25 int i; 26 27 for (i = 0; i < 4; i++) 28 IXGBE_WRITE_REG(hw, IXGBE_IPSTXKEY(i), 29 (__force u32)cpu_to_be32(key[3 - i])); 30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); 31 IXGBE_WRITE_FLUSH(hw); 32 33 reg = IXGBE_READ_REG(hw, IXGBE_IPSTXIDX); 34 reg &= IXGBE_RXTXIDX_IPS_EN; 35 reg |= idx << IXGBE_RXTXIDX_IDX_SHIFT | IXGBE_RXTXIDX_WRITE; 36 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, reg); 37 IXGBE_WRITE_FLUSH(hw); 38 } 39 40 /** 41 * ixgbe_ipsec_set_rx_item - set an Rx table item 42 * @hw: hw specific details 43 * @idx: register index to write 44 * @tbl: table selector 45 * 46 * Trigger the device to store into a particular Rx table the 47 * data that has already been loaded into the input register 48 **/ 49 static void ixgbe_ipsec_set_rx_item(struct ixgbe_hw *hw, u16 idx, 50 enum ixgbe_ipsec_tbl_sel tbl) 51 { 52 u32 reg; 53 54 reg = IXGBE_READ_REG(hw, IXGBE_IPSRXIDX); 55 reg &= IXGBE_RXTXIDX_IPS_EN; 56 reg |= tbl << IXGBE_RXIDX_TBL_SHIFT | 57 idx << IXGBE_RXTXIDX_IDX_SHIFT | 58 IXGBE_RXTXIDX_WRITE; 59 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, reg); 60 IXGBE_WRITE_FLUSH(hw); 61 } 62 63 /** 64 * ixgbe_ipsec_set_rx_sa - set up the register bits to save SA info 65 * @hw: hw specific details 66 * @idx: register index to write 67 * @spi: security parameter index 68 * @key: key byte array 69 * @salt: salt bytes 70 * @mode: rx decrypt control bits 71 * @ip_idx: index into IP table for related IP address 72 **/ 73 static void ixgbe_ipsec_set_rx_sa(struct ixgbe_hw *hw, u16 idx, __be32 spi, 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) 75 { 76 int i; 77 78 /* store the SPI (in bigendian) and IPidx */ 79 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSPI, 80 (__force u32)cpu_to_le32((__force u32)spi)); 81 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIPIDX, ip_idx); 82 IXGBE_WRITE_FLUSH(hw); 83 84 ixgbe_ipsec_set_rx_item(hw, idx, ips_rx_spi_tbl); 85 86 /* store the key, salt, and mode */ 87 for (i = 0; i < 4; i++) 88 IXGBE_WRITE_REG(hw, IXGBE_IPSRXKEY(i), 89 (__force u32)cpu_to_be32(key[3 - i])); 90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); 91 IXGBE_WRITE_REG(hw, IXGBE_IPSRXMOD, mode); 92 IXGBE_WRITE_FLUSH(hw); 93 94 ixgbe_ipsec_set_rx_item(hw, idx, ips_rx_key_tbl); 95 } 96 97 /** 98 * ixgbe_ipsec_set_rx_ip - set up the register bits to save SA IP addr info 99 * @hw: hw specific details 100 * @idx: register index to write 101 * @addr: IP address byte array 102 **/ 103 static void ixgbe_ipsec_set_rx_ip(struct ixgbe_hw *hw, u16 idx, __be32 addr[]) 104 { 105 int i; 106 107 /* store the ip address */ 108 for (i = 0; i < 4; i++) 109 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIPADDR(i), 110 (__force u32)cpu_to_le32((__force u32)addr[i])); 111 IXGBE_WRITE_FLUSH(hw); 112 113 ixgbe_ipsec_set_rx_item(hw, idx, ips_rx_ip_tbl); 114 } 115 116 /** 117 * ixgbe_ipsec_clear_hw_tables - because some tables don't get cleared on reset 118 * @adapter: board private structure 119 **/ 120 static void ixgbe_ipsec_clear_hw_tables(struct ixgbe_adapter *adapter) 121 { 122 struct ixgbe_hw *hw = &adapter->hw; 123 u32 buf[4] = {0, 0, 0, 0}; 124 u16 idx; 125 126 /* disable Rx and Tx SA lookup */ 127 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, 0); 128 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, 0); 129 130 /* scrub the tables - split the loops for the max of the IP table */ 131 for (idx = 0; idx < IXGBE_IPSEC_MAX_RX_IP_COUNT; idx++) { 132 ixgbe_ipsec_set_tx_sa(hw, idx, buf, 0); 133 ixgbe_ipsec_set_rx_sa(hw, idx, 0, buf, 0, 0, 0); 134 ixgbe_ipsec_set_rx_ip(hw, idx, (__be32 *)buf); 135 } 136 for (; idx < IXGBE_IPSEC_MAX_SA_COUNT; idx++) { 137 ixgbe_ipsec_set_tx_sa(hw, idx, buf, 0); 138 ixgbe_ipsec_set_rx_sa(hw, idx, 0, buf, 0, 0, 0); 139 } 140 } 141 142 /** 143 * ixgbe_ipsec_stop_data 144 * @adapter: board private structure 145 **/ 146 static void ixgbe_ipsec_stop_data(struct ixgbe_adapter *adapter) 147 { 148 struct ixgbe_hw *hw = &adapter->hw; 149 bool link = adapter->link_up; 150 u32 t_rdy, r_rdy; 151 u32 limit; 152 u32 reg; 153 154 /* halt data paths */ 155 reg = IXGBE_READ_REG(hw, IXGBE_SECTXCTRL); 156 reg |= IXGBE_SECTXCTRL_TX_DIS; 157 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, reg); 158 159 reg = IXGBE_READ_REG(hw, IXGBE_SECRXCTRL); 160 reg |= IXGBE_SECRXCTRL_RX_DIS; 161 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, reg); 162 163 /* If both Tx and Rx are ready there are no packets 164 * that we need to flush so the loopback configuration 165 * below is not necessary. 166 */ 167 t_rdy = IXGBE_READ_REG(hw, IXGBE_SECTXSTAT) & 168 IXGBE_SECTXSTAT_SECTX_RDY; 169 r_rdy = IXGBE_READ_REG(hw, IXGBE_SECRXSTAT) & 170 IXGBE_SECRXSTAT_SECRX_RDY; 171 if (t_rdy && r_rdy) 172 return; 173 174 /* If the tx fifo doesn't have link, but still has data, 175 * we can't clear the tx sec block. Set the MAC loopback 176 * before block clear 177 */ 178 if (!link) { 179 reg = IXGBE_READ_REG(hw, IXGBE_MACC); 180 reg |= IXGBE_MACC_FLU; 181 IXGBE_WRITE_REG(hw, IXGBE_MACC, reg); 182 183 reg = IXGBE_READ_REG(hw, IXGBE_HLREG0); 184 reg |= IXGBE_HLREG0_LPBK; 185 IXGBE_WRITE_REG(hw, IXGBE_HLREG0, reg); 186 187 IXGBE_WRITE_FLUSH(hw); 188 mdelay(3); 189 } 190 191 /* wait for the paths to empty */ 192 limit = 20; 193 do { 194 mdelay(10); 195 t_rdy = IXGBE_READ_REG(hw, IXGBE_SECTXSTAT) & 196 IXGBE_SECTXSTAT_SECTX_RDY; 197 r_rdy = IXGBE_READ_REG(hw, IXGBE_SECRXSTAT) & 198 IXGBE_SECRXSTAT_SECRX_RDY; 199 } while (!(t_rdy && r_rdy) && limit--); 200 201 /* undo loopback if we played with it earlier */ 202 if (!link) { 203 reg = IXGBE_READ_REG(hw, IXGBE_MACC); 204 reg &= ~IXGBE_MACC_FLU; 205 IXGBE_WRITE_REG(hw, IXGBE_MACC, reg); 206 207 reg = IXGBE_READ_REG(hw, IXGBE_HLREG0); 208 reg &= ~IXGBE_HLREG0_LPBK; 209 IXGBE_WRITE_REG(hw, IXGBE_HLREG0, reg); 210 211 IXGBE_WRITE_FLUSH(hw); 212 } 213 } 214 215 /** 216 * ixgbe_ipsec_stop_engine 217 * @adapter: board private structure 218 **/ 219 static void ixgbe_ipsec_stop_engine(struct ixgbe_adapter *adapter) 220 { 221 struct ixgbe_hw *hw = &adapter->hw; 222 u32 reg; 223 224 ixgbe_ipsec_stop_data(adapter); 225 226 /* disable Rx and Tx SA lookup */ 227 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, 0); 228 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, 0); 229 230 /* disable the Rx and Tx engines and full packet store-n-forward */ 231 reg = IXGBE_READ_REG(hw, IXGBE_SECTXCTRL); 232 reg |= IXGBE_SECTXCTRL_SECTX_DIS; 233 reg &= ~IXGBE_SECTXCTRL_STORE_FORWARD; 234 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, reg); 235 236 reg = IXGBE_READ_REG(hw, IXGBE_SECRXCTRL); 237 reg |= IXGBE_SECRXCTRL_SECRX_DIS; 238 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, reg); 239 240 /* restore the "tx security buffer almost full threshold" to 0x250 */ 241 IXGBE_WRITE_REG(hw, IXGBE_SECTXBUFFAF, 0x250); 242 243 /* Set minimum IFG between packets back to the default 0x1 */ 244 reg = IXGBE_READ_REG(hw, IXGBE_SECTXMINIFG); 245 reg = (reg & 0xfffffff0) | 0x1; 246 IXGBE_WRITE_REG(hw, IXGBE_SECTXMINIFG, reg); 247 248 /* final set for normal (no ipsec offload) processing */ 249 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, IXGBE_SECTXCTRL_SECTX_DIS); 250 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, IXGBE_SECRXCTRL_SECRX_DIS); 251 252 IXGBE_WRITE_FLUSH(hw); 253 } 254 255 /** 256 * ixgbe_ipsec_start_engine 257 * @adapter: board private structure 258 * 259 * NOTE: this increases power consumption whether being used or not 260 **/ 261 static void ixgbe_ipsec_start_engine(struct ixgbe_adapter *adapter) 262 { 263 struct ixgbe_hw *hw = &adapter->hw; 264 u32 reg; 265 266 ixgbe_ipsec_stop_data(adapter); 267 268 /* Set minimum IFG between packets to 3 */ 269 reg = IXGBE_READ_REG(hw, IXGBE_SECTXMINIFG); 270 reg = (reg & 0xfffffff0) | 0x3; 271 IXGBE_WRITE_REG(hw, IXGBE_SECTXMINIFG, reg); 272 273 /* Set "tx security buffer almost full threshold" to 0x15 so that the 274 * almost full indication is generated only after buffer contains at 275 * least an entire jumbo packet. 276 */ 277 reg = IXGBE_READ_REG(hw, IXGBE_SECTXBUFFAF); 278 reg = (reg & 0xfffffc00) | 0x15; 279 IXGBE_WRITE_REG(hw, IXGBE_SECTXBUFFAF, reg); 280 281 /* restart the data paths by clearing the DISABLE bits */ 282 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, 0); 283 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, IXGBE_SECTXCTRL_STORE_FORWARD); 284 285 /* enable Rx and Tx SA lookup */ 286 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, IXGBE_RXTXIDX_IPS_EN); 287 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, IXGBE_RXTXIDX_IPS_EN); 288 289 IXGBE_WRITE_FLUSH(hw); 290 } 291 292 /** 293 * ixgbe_ipsec_restore - restore the ipsec HW settings after a reset 294 * @adapter: board private structure 295 * 296 * Reload the HW tables from the SW tables after they've been bashed 297 * by a chip reset. 298 * 299 * Any VF entries are removed from the SW and HW tables since either 300 * (a) the VF also gets reset on PF reset and will ask again for the 301 * offloads, or (b) the VF has been removed by a change in the num_vfs. 302 **/ 303 void ixgbe_ipsec_restore(struct ixgbe_adapter *adapter) 304 { 305 struct ixgbe_ipsec *ipsec = adapter->ipsec; 306 struct ixgbe_hw *hw = &adapter->hw; 307 int i; 308 309 if (!(adapter->flags2 & IXGBE_FLAG2_IPSEC_ENABLED)) 310 return; 311 312 /* clean up and restart the engine */ 313 ixgbe_ipsec_stop_engine(adapter); 314 ixgbe_ipsec_clear_hw_tables(adapter); 315 ixgbe_ipsec_start_engine(adapter); 316 317 /* reload the Rx and Tx keys */ 318 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) { 319 struct rx_sa *r = &ipsec->rx_tbl[i]; 320 struct tx_sa *t = &ipsec->tx_tbl[i]; 321 322 if (r->used) { 323 if (r->mode & IXGBE_RXTXMOD_VF) 324 ixgbe_ipsec_del_sa(r->xs); 325 else 326 ixgbe_ipsec_set_rx_sa(hw, i, r->xs->id.spi, 327 r->key, r->salt, 328 r->mode, r->iptbl_ind); 329 } 330 331 if (t->used) { 332 if (t->mode & IXGBE_RXTXMOD_VF) 333 ixgbe_ipsec_del_sa(t->xs); 334 else 335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); 336 } 337 } 338 339 /* reload the IP addrs */ 340 for (i = 0; i < IXGBE_IPSEC_MAX_RX_IP_COUNT; i++) { 341 struct rx_ip_sa *ipsa = &ipsec->ip_tbl[i]; 342 343 if (ipsa->used) 344 ixgbe_ipsec_set_rx_ip(hw, i, ipsa->ipaddr); 345 } 346 } 347 348 /** 349 * ixgbe_ipsec_find_empty_idx - find the first unused security parameter index 350 * @ipsec: pointer to ipsec struct 351 * @rxtable: true if we need to look in the Rx table 352 * 353 * Returns the first unused index in either the Rx or Tx SA table 354 **/ 355 static int ixgbe_ipsec_find_empty_idx(struct ixgbe_ipsec *ipsec, bool rxtable) 356 { 357 u32 i; 358 359 if (rxtable) { 360 if (ipsec->num_rx_sa == IXGBE_IPSEC_MAX_SA_COUNT) 361 return -ENOSPC; 362 363 /* search rx sa table */ 364 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) { 365 if (!ipsec->rx_tbl[i].used) 366 return i; 367 } 368 } else { 369 if (ipsec->num_tx_sa == IXGBE_IPSEC_MAX_SA_COUNT) 370 return -ENOSPC; 371 372 /* search tx sa table */ 373 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) { 374 if (!ipsec->tx_tbl[i].used) 375 return i; 376 } 377 } 378 379 return -ENOSPC; 380 } 381 382 /** 383 * ixgbe_ipsec_find_rx_state - find the state that matches 384 * @ipsec: pointer to ipsec struct 385 * @daddr: inbound address to match 386 * @proto: protocol to match 387 * @spi: SPI to match 388 * @ip4: true if using an ipv4 address 389 * 390 * Returns a pointer to the matching SA state information 391 **/ 392 static struct xfrm_state *ixgbe_ipsec_find_rx_state(struct ixgbe_ipsec *ipsec, 393 __be32 *daddr, u8 proto, 394 __be32 spi, bool ip4) 395 { 396 struct rx_sa *rsa; 397 struct xfrm_state *ret = NULL; 398 399 rcu_read_lock(); 400 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, 401 (__force u32)spi) { 402 if (rsa->mode & IXGBE_RXTXMOD_VF) 403 continue; 404 if (spi == rsa->xs->id.spi && 405 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || 406 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, 407 sizeof(rsa->xs->id.daddr.a6)))) && 408 proto == rsa->xs->id.proto) { 409 ret = rsa->xs; 410 xfrm_state_hold(ret); 411 break; 412 } 413 } 414 rcu_read_unlock(); 415 return ret; 416 } 417 418 /** 419 * ixgbe_ipsec_parse_proto_keys - find the key and salt based on the protocol 420 * @xs: pointer to xfrm_state struct 421 * @mykey: pointer to key array to populate 422 * @mysalt: pointer to salt value to populate 423 * 424 * This copies the protocol keys and salt to our own data tables. The 425 * 82599 family only supports the one algorithm. 426 **/ 427 static int ixgbe_ipsec_parse_proto_keys(struct xfrm_state *xs, 428 u32 *mykey, u32 *mysalt) 429 { 430 struct net_device *dev = xs->xso.real_dev; 431 unsigned char *key_data; 432 char *alg_name = NULL; 433 int key_len; 434 435 if (!xs->aead) { 436 netdev_err(dev, "Unsupported IPsec algorithm\n"); 437 return -EINVAL; 438 } 439 440 if (xs->aead->alg_icv_len != IXGBE_IPSEC_AUTH_BITS) { 441 netdev_err(dev, "IPsec offload requires %d bit authentication\n", 442 IXGBE_IPSEC_AUTH_BITS); 443 return -EINVAL; 444 } 445 446 key_data = &xs->aead->alg_key[0]; 447 key_len = xs->aead->alg_key_len; 448 alg_name = xs->aead->alg_name; 449 450 if (strcmp(alg_name, aes_gcm_name)) { 451 netdev_err(dev, "Unsupported IPsec algorithm - please use %s\n", 452 aes_gcm_name); 453 return -EINVAL; 454 } 455 456 /* The key bytes come down in a bigendian array of bytes, so 457 * we don't need to do any byteswapping. 458 * 160 accounts for 16 byte key and 4 byte salt 459 */ 460 if (key_len == IXGBE_IPSEC_KEY_BITS) { 461 *mysalt = ((u32 *)key_data)[4]; 462 } else if (key_len != (IXGBE_IPSEC_KEY_BITS - (sizeof(*mysalt) * 8))) { 463 netdev_err(dev, "IPsec hw offload only supports keys up to 128 bits with a 32 bit salt\n"); 464 return -EINVAL; 465 } else { 466 netdev_info(dev, "IPsec hw offload parameters missing 32 bit salt value\n"); 467 *mysalt = 0; 468 } 469 memcpy(mykey, key_data, 16); 470 471 return 0; 472 } 473 474 /** 475 * ixgbe_ipsec_check_mgmt_ip - make sure there is no clash with mgmt IP filters 476 * @xs: pointer to transformer state struct 477 **/ 478 static int ixgbe_ipsec_check_mgmt_ip(struct xfrm_state *xs) 479 { 480 struct net_device *dev = xs->xso.real_dev; 481 struct ixgbe_adapter *adapter = netdev_priv(dev); 482 struct ixgbe_hw *hw = &adapter->hw; 483 u32 mfval, manc, reg; 484 int num_filters = 4; 485 bool manc_ipv4; 486 u32 bmcipval; 487 int i, j; 488 489 #define MANC_EN_IPV4_FILTER BIT(24) 490 #define MFVAL_IPV4_FILTER_SHIFT 16 491 #define MFVAL_IPV6_FILTER_SHIFT 24 492 #define MIPAF_ARR(_m, _n) (IXGBE_MIPAF + ((_m) * 0x10) + ((_n) * 4)) 493 494 #define IXGBE_BMCIP(_n) (0x5050 + ((_n) * 4)) 495 #define IXGBE_BMCIPVAL 0x5060 496 #define BMCIP_V4 0x2 497 #define BMCIP_V6 0x3 498 #define BMCIP_MASK 0x3 499 500 manc = IXGBE_READ_REG(hw, IXGBE_MANC); 501 manc_ipv4 = !!(manc & MANC_EN_IPV4_FILTER); 502 mfval = IXGBE_READ_REG(hw, IXGBE_MFVAL); 503 bmcipval = IXGBE_READ_REG(hw, IXGBE_BMCIPVAL); 504 505 if (xs->props.family == AF_INET) { 506 /* are there any IPv4 filters to check? */ 507 if (manc_ipv4) { 508 /* the 4 ipv4 filters are all in MIPAF(3, i) */ 509 for (i = 0; i < num_filters; i++) { 510 if (!(mfval & BIT(MFVAL_IPV4_FILTER_SHIFT + i))) 511 continue; 512 513 reg = IXGBE_READ_REG(hw, MIPAF_ARR(3, i)); 514 if (reg == (__force u32)xs->id.daddr.a4) 515 return 1; 516 } 517 } 518 519 if ((bmcipval & BMCIP_MASK) == BMCIP_V4) { 520 reg = IXGBE_READ_REG(hw, IXGBE_BMCIP(3)); 521 if (reg == (__force u32)xs->id.daddr.a4) 522 return 1; 523 } 524 525 } else { 526 /* if there are ipv4 filters, they are in the last ipv6 slot */ 527 if (manc_ipv4) 528 num_filters = 3; 529 530 for (i = 0; i < num_filters; i++) { 531 if (!(mfval & BIT(MFVAL_IPV6_FILTER_SHIFT + i))) 532 continue; 533 534 for (j = 0; j < 4; j++) { 535 reg = IXGBE_READ_REG(hw, MIPAF_ARR(i, j)); 536 if (reg != (__force u32)xs->id.daddr.a6[j]) 537 break; 538 } 539 if (j == 4) /* did we match all 4 words? */ 540 return 1; 541 } 542 543 if ((bmcipval & BMCIP_MASK) == BMCIP_V6) { 544 for (j = 0; j < 4; j++) { 545 reg = IXGBE_READ_REG(hw, IXGBE_BMCIP(j)); 546 if (reg != (__force u32)xs->id.daddr.a6[j]) 547 break; 548 } 549 if (j == 4) /* did we match all 4 words? */ 550 return 1; 551 } 552 } 553 554 return 0; 555 } 556 557 /** 558 * ixgbe_ipsec_add_sa - program device with a security association 559 * @xs: pointer to transformer state struct 560 **/ 561 static int ixgbe_ipsec_add_sa(struct xfrm_state *xs) 562 { 563 struct net_device *dev = xs->xso.real_dev; 564 struct ixgbe_adapter *adapter = netdev_priv(dev); 565 struct ixgbe_ipsec *ipsec = adapter->ipsec; 566 struct ixgbe_hw *hw = &adapter->hw; 567 int checked, match, first; 568 u16 sa_idx; 569 int ret; 570 int i; 571 572 if (xs->id.proto != IPPROTO_ESP && xs->id.proto != IPPROTO_AH) { 573 netdev_err(dev, "Unsupported protocol 0x%04x for ipsec offload\n", 574 xs->id.proto); 575 return -EINVAL; 576 } 577 578 if (xs->props.mode != XFRM_MODE_TRANSPORT) { 579 netdev_err(dev, "Unsupported mode for ipsec offload\n"); 580 return -EINVAL; 581 } 582 583 if (ixgbe_ipsec_check_mgmt_ip(xs)) { 584 netdev_err(dev, "IPsec IP addr clash with mgmt filters\n"); 585 return -EINVAL; 586 } 587 588 if (xs->xso.flags & XFRM_OFFLOAD_INBOUND) { 589 struct rx_sa rsa; 590 591 if (xs->calg) { 592 netdev_err(dev, "Compression offload not supported\n"); 593 return -EINVAL; 594 } 595 596 /* find the first unused index */ 597 ret = ixgbe_ipsec_find_empty_idx(ipsec, true); 598 if (ret < 0) { 599 netdev_err(dev, "No space for SA in Rx table!\n"); 600 return ret; 601 } 602 sa_idx = (u16)ret; 603 604 memset(&rsa, 0, sizeof(rsa)); 605 rsa.used = true; 606 rsa.xs = xs; 607 608 if (rsa.xs->id.proto & IPPROTO_ESP) 609 rsa.decrypt = xs->ealg || xs->aead; 610 611 /* get the key and salt */ 612 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); 613 if (ret) { 614 netdev_err(dev, "Failed to get key data for Rx SA table\n"); 615 return ret; 616 } 617 618 /* get ip for rx sa table */ 619 if (xs->props.family == AF_INET6) 620 memcpy(rsa.ipaddr, &xs->id.daddr.a6, 16); 621 else 622 memcpy(&rsa.ipaddr[3], &xs->id.daddr.a4, 4); 623 624 /* The HW does not have a 1:1 mapping from keys to IP addrs, so 625 * check for a matching IP addr entry in the table. If the addr 626 * already exists, use it; else find an unused slot and add the 627 * addr. If one does not exist and there are no unused table 628 * entries, fail the request. 629 */ 630 631 /* Find an existing match or first not used, and stop looking 632 * after we've checked all we know we have. 633 */ 634 checked = 0; 635 match = -1; 636 first = -1; 637 for (i = 0; 638 i < IXGBE_IPSEC_MAX_RX_IP_COUNT && 639 (checked < ipsec->num_rx_sa || first < 0); 640 i++) { 641 if (ipsec->ip_tbl[i].used) { 642 if (!memcmp(ipsec->ip_tbl[i].ipaddr, 643 rsa.ipaddr, sizeof(rsa.ipaddr))) { 644 match = i; 645 break; 646 } 647 checked++; 648 } else if (first < 0) { 649 first = i; /* track the first empty seen */ 650 } 651 } 652 653 if (ipsec->num_rx_sa == 0) 654 first = 0; 655 656 if (match >= 0) { 657 /* addrs are the same, we should use this one */ 658 rsa.iptbl_ind = match; 659 ipsec->ip_tbl[match].ref_cnt++; 660 661 } else if (first >= 0) { 662 /* no matches, but here's an empty slot */ 663 rsa.iptbl_ind = first; 664 665 memcpy(ipsec->ip_tbl[first].ipaddr, 666 rsa.ipaddr, sizeof(rsa.ipaddr)); 667 ipsec->ip_tbl[first].ref_cnt = 1; 668 ipsec->ip_tbl[first].used = true; 669 670 ixgbe_ipsec_set_rx_ip(hw, rsa.iptbl_ind, rsa.ipaddr); 671 672 } else { 673 /* no match and no empty slot */ 674 netdev_err(dev, "No space for SA in Rx IP SA table\n"); 675 memset(&rsa, 0, sizeof(rsa)); 676 return -ENOSPC; 677 } 678 679 rsa.mode = IXGBE_RXMOD_VALID; 680 if (rsa.xs->id.proto & IPPROTO_ESP) 681 rsa.mode |= IXGBE_RXMOD_PROTO_ESP; 682 if (rsa.decrypt) 683 rsa.mode |= IXGBE_RXMOD_DECRYPT; 684 if (rsa.xs->props.family == AF_INET6) 685 rsa.mode |= IXGBE_RXMOD_IPV6; 686 687 /* the preparations worked, so save the info */ 688 memcpy(&ipsec->rx_tbl[sa_idx], &rsa, sizeof(rsa)); 689 690 ixgbe_ipsec_set_rx_sa(hw, sa_idx, rsa.xs->id.spi, rsa.key, 691 rsa.salt, rsa.mode, rsa.iptbl_ind); 692 xs->xso.offload_handle = sa_idx + IXGBE_IPSEC_BASE_RX_INDEX; 693 694 ipsec->num_rx_sa++; 695 696 /* hash the new entry for faster search in Rx path */ 697 hash_add_rcu(ipsec->rx_sa_list, &ipsec->rx_tbl[sa_idx].hlist, 698 (__force u32)rsa.xs->id.spi); 699 } else { 700 struct tx_sa tsa; 701 702 if (adapter->num_vfs && 703 adapter->bridge_mode != BRIDGE_MODE_VEPA) 704 return -EOPNOTSUPP; 705 706 /* find the first unused index */ 707 ret = ixgbe_ipsec_find_empty_idx(ipsec, false); 708 if (ret < 0) { 709 netdev_err(dev, "No space for SA in Tx table\n"); 710 return ret; 711 } 712 sa_idx = (u16)ret; 713 714 memset(&tsa, 0, sizeof(tsa)); 715 tsa.used = true; 716 tsa.xs = xs; 717 718 if (xs->id.proto & IPPROTO_ESP) 719 tsa.encrypt = xs->ealg || xs->aead; 720 721 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); 722 if (ret) { 723 netdev_err(dev, "Failed to get key data for Tx SA table\n"); 724 memset(&tsa, 0, sizeof(tsa)); 725 return ret; 726 } 727 728 /* the preparations worked, so save the info */ 729 memcpy(&ipsec->tx_tbl[sa_idx], &tsa, sizeof(tsa)); 730 731 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); 732 733 xs->xso.offload_handle = sa_idx + IXGBE_IPSEC_BASE_TX_INDEX; 734 735 ipsec->num_tx_sa++; 736 } 737 738 /* enable the engine if not already warmed up */ 739 if (!(adapter->flags2 & IXGBE_FLAG2_IPSEC_ENABLED)) { 740 ixgbe_ipsec_start_engine(adapter); 741 adapter->flags2 |= IXGBE_FLAG2_IPSEC_ENABLED; 742 } 743 744 return 0; 745 } 746 747 /** 748 * ixgbe_ipsec_del_sa - clear out this specific SA 749 * @xs: pointer to transformer state struct 750 **/ 751 static void ixgbe_ipsec_del_sa(struct xfrm_state *xs) 752 { 753 struct net_device *dev = xs->xso.real_dev; 754 struct ixgbe_adapter *adapter = netdev_priv(dev); 755 struct ixgbe_ipsec *ipsec = adapter->ipsec; 756 struct ixgbe_hw *hw = &adapter->hw; 757 u32 zerobuf[4] = {0, 0, 0, 0}; 758 u16 sa_idx; 759 760 if (xs->xso.flags & XFRM_OFFLOAD_INBOUND) { 761 struct rx_sa *rsa; 762 u8 ipi; 763 764 sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_RX_INDEX; 765 rsa = &ipsec->rx_tbl[sa_idx]; 766 767 if (!rsa->used) { 768 netdev_err(dev, "Invalid Rx SA selected sa_idx=%d offload_handle=%lu\n", 769 sa_idx, xs->xso.offload_handle); 770 return; 771 } 772 773 ixgbe_ipsec_set_rx_sa(hw, sa_idx, 0, zerobuf, 0, 0, 0); 774 hash_del_rcu(&rsa->hlist); 775 776 /* if the IP table entry is referenced by only this SA, 777 * i.e. ref_cnt is only 1, clear the IP table entry as well 778 */ 779 ipi = rsa->iptbl_ind; 780 if (ipsec->ip_tbl[ipi].ref_cnt > 0) { 781 ipsec->ip_tbl[ipi].ref_cnt--; 782 783 if (!ipsec->ip_tbl[ipi].ref_cnt) { 784 memset(&ipsec->ip_tbl[ipi], 0, 785 sizeof(struct rx_ip_sa)); 786 ixgbe_ipsec_set_rx_ip(hw, ipi, 787 (__force __be32 *)zerobuf); 788 } 789 } 790 791 memset(rsa, 0, sizeof(struct rx_sa)); 792 ipsec->num_rx_sa--; 793 } else { 794 sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_TX_INDEX; 795 796 if (!ipsec->tx_tbl[sa_idx].used) { 797 netdev_err(dev, "Invalid Tx SA selected sa_idx=%d offload_handle=%lu\n", 798 sa_idx, xs->xso.offload_handle); 799 return; 800 } 801 802 ixgbe_ipsec_set_tx_sa(hw, sa_idx, zerobuf, 0); 803 memset(&ipsec->tx_tbl[sa_idx], 0, sizeof(struct tx_sa)); 804 ipsec->num_tx_sa--; 805 } 806 807 /* if there are no SAs left, stop the engine to save energy */ 808 if (ipsec->num_rx_sa == 0 && ipsec->num_tx_sa == 0) { 809 adapter->flags2 &= ~IXGBE_FLAG2_IPSEC_ENABLED; 810 ixgbe_ipsec_stop_engine(adapter); 811 } 812 } 813 814 /** 815 * ixgbe_ipsec_offload_ok - can this packet use the xfrm hw offload 816 * @skb: current data packet 817 * @xs: pointer to transformer state struct 818 **/ 819 static bool ixgbe_ipsec_offload_ok(struct sk_buff *skb, struct xfrm_state *xs) 820 { 821 if (xs->props.family == AF_INET) { 822 /* Offload with IPv4 options is not supported yet */ 823 if (ip_hdr(skb)->ihl != 5) 824 return false; 825 } else { 826 /* Offload with IPv6 extension headers is not support yet */ 827 if (ipv6_ext_hdr(ipv6_hdr(skb)->nexthdr)) 828 return false; 829 } 830 831 return true; 832 } 833 834 static const struct xfrmdev_ops ixgbe_xfrmdev_ops = { 835 .xdo_dev_state_add = ixgbe_ipsec_add_sa, 836 .xdo_dev_state_delete = ixgbe_ipsec_del_sa, 837 .xdo_dev_offload_ok = ixgbe_ipsec_offload_ok, 838 }; 839 840 /** 841 * ixgbe_ipsec_vf_clear - clear the tables of data for a VF 842 * @adapter: board private structure 843 * @vf: VF id to be removed 844 **/ 845 void ixgbe_ipsec_vf_clear(struct ixgbe_adapter *adapter, u32 vf) 846 { 847 struct ixgbe_ipsec *ipsec = adapter->ipsec; 848 int i; 849 850 if (!ipsec) 851 return; 852 853 /* search rx sa table */ 854 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT && ipsec->num_rx_sa; i++) { 855 if (!ipsec->rx_tbl[i].used) 856 continue; 857 if (ipsec->rx_tbl[i].mode & IXGBE_RXTXMOD_VF && 858 ipsec->rx_tbl[i].vf == vf) 859 ixgbe_ipsec_del_sa(ipsec->rx_tbl[i].xs); 860 } 861 862 /* search tx sa table */ 863 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT && ipsec->num_tx_sa; i++) { 864 if (!ipsec->tx_tbl[i].used) 865 continue; 866 if (ipsec->tx_tbl[i].mode & IXGBE_RXTXMOD_VF && 867 ipsec->tx_tbl[i].vf == vf) 868 ixgbe_ipsec_del_sa(ipsec->tx_tbl[i].xs); 869 } 870 } 871 872 /** 873 * ixgbe_ipsec_vf_add_sa - translate VF request to SA add 874 * @adapter: board private structure 875 * @msgbuf: The message buffer 876 * @vf: the VF index 877 * 878 * Make up a new xs and algorithm info from the data sent by the VF. 879 * We only need to sketch in just enough to set up the HW offload. 880 * Put the resulting offload_handle into the return message to the VF. 881 * 882 * Returns 0 or error value 883 **/ 884 int ixgbe_ipsec_vf_add_sa(struct ixgbe_adapter *adapter, u32 *msgbuf, u32 vf) 885 { 886 struct ixgbe_ipsec *ipsec = adapter->ipsec; 887 struct xfrm_algo_desc *algo; 888 struct sa_mbx_msg *sam; 889 struct xfrm_state *xs; 890 size_t aead_len; 891 u16 sa_idx; 892 u32 pfsa; 893 int err; 894 895 sam = (struct sa_mbx_msg *)(&msgbuf[1]); 896 if (!adapter->vfinfo[vf].trusted || 897 !(adapter->flags2 & IXGBE_FLAG2_VF_IPSEC_ENABLED)) { 898 e_warn(drv, "VF %d attempted to add an IPsec SA\n", vf); 899 err = -EACCES; 900 goto err_out; 901 } 902 903 /* Tx IPsec offload doesn't seem to work on this 904 * device, so block these requests for now. 905 */ 906 if (!(sam->flags & XFRM_OFFLOAD_INBOUND)) { 907 err = -EOPNOTSUPP; 908 goto err_out; 909 } 910 911 xs = kzalloc(sizeof(*xs), GFP_KERNEL); 912 if (unlikely(!xs)) { 913 err = -ENOMEM; 914 goto err_out; 915 } 916 917 xs->xso.flags = sam->flags; 918 xs->id.spi = sam->spi; 919 xs->id.proto = sam->proto; 920 xs->props.family = sam->family; 921 if (xs->props.family == AF_INET6) 922 memcpy(&xs->id.daddr.a6, sam->addr, sizeof(xs->id.daddr.a6)); 923 else 924 memcpy(&xs->id.daddr.a4, sam->addr, sizeof(xs->id.daddr.a4)); 925 xs->xso.dev = adapter->netdev; 926 927 algo = xfrm_aead_get_byname(aes_gcm_name, IXGBE_IPSEC_AUTH_BITS, 1); 928 if (unlikely(!algo)) { 929 err = -ENOENT; 930 goto err_xs; 931 } 932 933 aead_len = sizeof(*xs->aead) + IXGBE_IPSEC_KEY_BITS / 8; 934 xs->aead = kzalloc(aead_len, GFP_KERNEL); 935 if (unlikely(!xs->aead)) { 936 err = -ENOMEM; 937 goto err_xs; 938 } 939 940 xs->props.ealgo = algo->desc.sadb_alg_id; 941 xs->geniv = algo->uinfo.aead.geniv; 942 xs->aead->alg_icv_len = IXGBE_IPSEC_AUTH_BITS; 943 xs->aead->alg_key_len = IXGBE_IPSEC_KEY_BITS; 944 memcpy(xs->aead->alg_key, sam->key, sizeof(sam->key)); 945 memcpy(xs->aead->alg_name, aes_gcm_name, sizeof(aes_gcm_name)); 946 947 /* set up the HW offload */ 948 err = ixgbe_ipsec_add_sa(xs); 949 if (err) 950 goto err_aead; 951 952 pfsa = xs->xso.offload_handle; 953 if (pfsa < IXGBE_IPSEC_BASE_TX_INDEX) { 954 sa_idx = pfsa - IXGBE_IPSEC_BASE_RX_INDEX; 955 ipsec->rx_tbl[sa_idx].vf = vf; 956 ipsec->rx_tbl[sa_idx].mode |= IXGBE_RXTXMOD_VF; 957 } else { 958 sa_idx = pfsa - IXGBE_IPSEC_BASE_TX_INDEX; 959 ipsec->tx_tbl[sa_idx].vf = vf; 960 ipsec->tx_tbl[sa_idx].mode |= IXGBE_RXTXMOD_VF; 961 } 962 963 msgbuf[1] = xs->xso.offload_handle; 964 965 return 0; 966 967 err_aead: 968 kfree_sensitive(xs->aead); 969 err_xs: 970 kfree_sensitive(xs); 971 err_out: 972 msgbuf[1] = err; 973 return err; 974 } 975 976 /** 977 * ixgbe_ipsec_vf_del_sa - translate VF request to SA delete 978 * @adapter: board private structure 979 * @msgbuf: The message buffer 980 * @vf: the VF index 981 * 982 * Given the offload_handle sent by the VF, look for the related SA table 983 * entry and use its xs field to call for a delete of the SA. 984 * 985 * Note: We silently ignore requests to delete entries that are already 986 * set to unused because when a VF is set to "DOWN", the PF first 987 * gets a reset and clears all the VF's entries; then the VF's 988 * XFRM stack sends individual deletes for each entry, which the 989 * reset already removed. In the future it might be good to try to 990 * optimize this so not so many unnecessary delete messages are sent. 991 * 992 * Returns 0 or error value 993 **/ 994 int ixgbe_ipsec_vf_del_sa(struct ixgbe_adapter *adapter, u32 *msgbuf, u32 vf) 995 { 996 struct ixgbe_ipsec *ipsec = adapter->ipsec; 997 struct xfrm_state *xs; 998 u32 pfsa = msgbuf[1]; 999 u16 sa_idx; 1000 1001 if (!adapter->vfinfo[vf].trusted) { 1002 e_err(drv, "vf %d attempted to delete an SA\n", vf); 1003 return -EPERM; 1004 } 1005 1006 if (pfsa < IXGBE_IPSEC_BASE_TX_INDEX) { 1007 struct rx_sa *rsa; 1008 1009 sa_idx = pfsa - IXGBE_IPSEC_BASE_RX_INDEX; 1010 if (sa_idx >= IXGBE_IPSEC_MAX_SA_COUNT) { 1011 e_err(drv, "vf %d SA index %d out of range\n", 1012 vf, sa_idx); 1013 return -EINVAL; 1014 } 1015 1016 rsa = &ipsec->rx_tbl[sa_idx]; 1017 1018 if (!rsa->used) 1019 return 0; 1020 1021 if (!(rsa->mode & IXGBE_RXTXMOD_VF) || 1022 rsa->vf != vf) { 1023 e_err(drv, "vf %d bad Rx SA index %d\n", vf, sa_idx); 1024 return -ENOENT; 1025 } 1026 1027 xs = ipsec->rx_tbl[sa_idx].xs; 1028 } else { 1029 struct tx_sa *tsa; 1030 1031 sa_idx = pfsa - IXGBE_IPSEC_BASE_TX_INDEX; 1032 if (sa_idx >= IXGBE_IPSEC_MAX_SA_COUNT) { 1033 e_err(drv, "vf %d SA index %d out of range\n", 1034 vf, sa_idx); 1035 return -EINVAL; 1036 } 1037 1038 tsa = &ipsec->tx_tbl[sa_idx]; 1039 1040 if (!tsa->used) 1041 return 0; 1042 1043 if (!(tsa->mode & IXGBE_RXTXMOD_VF) || 1044 tsa->vf != vf) { 1045 e_err(drv, "vf %d bad Tx SA index %d\n", vf, sa_idx); 1046 return -ENOENT; 1047 } 1048 1049 xs = ipsec->tx_tbl[sa_idx].xs; 1050 } 1051 1052 ixgbe_ipsec_del_sa(xs); 1053 1054 /* remove the xs that was made-up in the add request */ 1055 kfree_sensitive(xs); 1056 1057 return 0; 1058 } 1059 1060 /** 1061 * ixgbe_ipsec_tx - setup Tx flags for ipsec offload 1062 * @tx_ring: outgoing context 1063 * @first: current data packet 1064 * @itd: ipsec Tx data for later use in building context descriptor 1065 **/ 1066 int ixgbe_ipsec_tx(struct ixgbe_ring *tx_ring, 1067 struct ixgbe_tx_buffer *first, 1068 struct ixgbe_ipsec_tx_data *itd) 1069 { 1070 struct ixgbe_adapter *adapter = netdev_priv(tx_ring->netdev); 1071 struct ixgbe_ipsec *ipsec = adapter->ipsec; 1072 struct xfrm_state *xs; 1073 struct sec_path *sp; 1074 struct tx_sa *tsa; 1075 1076 sp = skb_sec_path(first->skb); 1077 if (unlikely(!sp->len)) { 1078 netdev_err(tx_ring->netdev, "%s: no xfrm state len = %d\n", 1079 __func__, sp->len); 1080 return 0; 1081 } 1082 1083 xs = xfrm_input_state(first->skb); 1084 if (unlikely(!xs)) { 1085 netdev_err(tx_ring->netdev, "%s: no xfrm_input_state() xs = %p\n", 1086 __func__, xs); 1087 return 0; 1088 } 1089 1090 itd->sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_TX_INDEX; 1091 if (unlikely(itd->sa_idx >= IXGBE_IPSEC_MAX_SA_COUNT)) { 1092 netdev_err(tx_ring->netdev, "%s: bad sa_idx=%d handle=%lu\n", 1093 __func__, itd->sa_idx, xs->xso.offload_handle); 1094 return 0; 1095 } 1096 1097 tsa = &ipsec->tx_tbl[itd->sa_idx]; 1098 if (unlikely(!tsa->used)) { 1099 netdev_err(tx_ring->netdev, "%s: unused sa_idx=%d\n", 1100 __func__, itd->sa_idx); 1101 return 0; 1102 } 1103 1104 first->tx_flags |= IXGBE_TX_FLAGS_IPSEC | IXGBE_TX_FLAGS_CC; 1105 1106 if (xs->id.proto == IPPROTO_ESP) { 1107 1108 itd->flags |= IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP | 1109 IXGBE_ADVTXD_TUCMD_L4T_TCP; 1110 if (first->protocol == htons(ETH_P_IP)) 1111 itd->flags |= IXGBE_ADVTXD_TUCMD_IPV4; 1112 1113 /* The actual trailer length is authlen (16 bytes) plus 1114 * 2 bytes for the proto and the padlen values, plus 1115 * padlen bytes of padding. This ends up not the same 1116 * as the static value found in xs->props.trailer_len (21). 1117 * 1118 * ... but if we're doing GSO, don't bother as the stack 1119 * doesn't add a trailer for those. 1120 */ 1121 if (!skb_is_gso(first->skb)) { 1122 /* The "correct" way to get the auth length would be 1123 * to use 1124 * authlen = crypto_aead_authsize(xs->data); 1125 * but since we know we only have one size to worry 1126 * about * we can let the compiler use the constant 1127 * and save us a few CPU cycles. 1128 */ 1129 const int authlen = IXGBE_IPSEC_AUTH_BITS / 8; 1130 struct sk_buff *skb = first->skb; 1131 u8 padlen; 1132 int ret; 1133 1134 ret = skb_copy_bits(skb, skb->len - (authlen + 2), 1135 &padlen, 1); 1136 if (unlikely(ret)) 1137 return 0; 1138 itd->trailer_len = authlen + 2 + padlen; 1139 } 1140 } 1141 if (tsa->encrypt) 1142 itd->flags |= IXGBE_ADVTXD_TUCMD_IPSEC_ENCRYPT_EN; 1143 1144 return 1; 1145 } 1146 1147 /** 1148 * ixgbe_ipsec_rx - decode ipsec bits from Rx descriptor 1149 * @rx_ring: receiving ring 1150 * @rx_desc: receive data descriptor 1151 * @skb: current data packet 1152 * 1153 * Determine if there was an ipsec encapsulation noticed, and if so set up 1154 * the resulting status for later in the receive stack. 1155 **/ 1156 void ixgbe_ipsec_rx(struct ixgbe_ring *rx_ring, 1157 union ixgbe_adv_rx_desc *rx_desc, 1158 struct sk_buff *skb) 1159 { 1160 struct ixgbe_adapter *adapter = netdev_priv(rx_ring->netdev); 1161 __le16 pkt_info = rx_desc->wb.lower.lo_dword.hs_rss.pkt_info; 1162 __le16 ipsec_pkt_types = cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_AH | 1163 IXGBE_RXDADV_PKTTYPE_IPSEC_ESP); 1164 struct ixgbe_ipsec *ipsec = adapter->ipsec; 1165 struct xfrm_offload *xo = NULL; 1166 struct xfrm_state *xs = NULL; 1167 struct ipv6hdr *ip6 = NULL; 1168 struct iphdr *ip4 = NULL; 1169 struct sec_path *sp; 1170 void *daddr; 1171 __be32 spi; 1172 u8 *c_hdr; 1173 u8 proto; 1174 1175 /* Find the ip and crypto headers in the data. 1176 * We can assume no vlan header in the way, b/c the 1177 * hw won't recognize the IPsec packet and anyway the 1178 * currently vlan device doesn't support xfrm offload. 1179 */ 1180 if (pkt_info & cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPV4)) { 1181 ip4 = (struct iphdr *)(skb->data + ETH_HLEN); 1182 daddr = &ip4->daddr; 1183 c_hdr = (u8 *)ip4 + ip4->ihl * 4; 1184 } else if (pkt_info & cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPV6)) { 1185 ip6 = (struct ipv6hdr *)(skb->data + ETH_HLEN); 1186 daddr = &ip6->daddr; 1187 c_hdr = (u8 *)ip6 + sizeof(struct ipv6hdr); 1188 } else { 1189 return; 1190 } 1191 1192 switch (pkt_info & ipsec_pkt_types) { 1193 case cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_AH): 1194 spi = ((struct ip_auth_hdr *)c_hdr)->spi; 1195 proto = IPPROTO_AH; 1196 break; 1197 case cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_ESP): 1198 spi = ((struct ip_esp_hdr *)c_hdr)->spi; 1199 proto = IPPROTO_ESP; 1200 break; 1201 default: 1202 return; 1203 } 1204 1205 xs = ixgbe_ipsec_find_rx_state(ipsec, daddr, proto, spi, !!ip4); 1206 if (unlikely(!xs)) 1207 return; 1208 1209 sp = secpath_set(skb); 1210 if (unlikely(!sp)) 1211 return; 1212 1213 sp->xvec[sp->len++] = xs; 1214 sp->olen++; 1215 xo = xfrm_offload(skb); 1216 xo->flags = CRYPTO_DONE; 1217 xo->status = CRYPTO_SUCCESS; 1218 1219 adapter->rx_ipsec++; 1220 } 1221 1222 /** 1223 * ixgbe_init_ipsec_offload - initialize security registers for IPSec operation 1224 * @adapter: board private structure 1225 **/ 1226 void ixgbe_init_ipsec_offload(struct ixgbe_adapter *adapter) 1227 { 1228 struct ixgbe_hw *hw = &adapter->hw; 1229 struct ixgbe_ipsec *ipsec; 1230 u32 t_dis, r_dis; 1231 size_t size; 1232 1233 if (hw->mac.type == ixgbe_mac_82598EB) 1234 return; 1235 1236 /* If there is no support for either Tx or Rx offload 1237 * we should not be advertising support for IPsec. 1238 */ 1239 t_dis = IXGBE_READ_REG(hw, IXGBE_SECTXSTAT) & 1240 IXGBE_SECTXSTAT_SECTX_OFF_DIS; 1241 r_dis = IXGBE_READ_REG(hw, IXGBE_SECRXSTAT) & 1242 IXGBE_SECRXSTAT_SECRX_OFF_DIS; 1243 if (t_dis || r_dis) 1244 return; 1245 1246 ipsec = kzalloc(sizeof(*ipsec), GFP_KERNEL); 1247 if (!ipsec) 1248 goto err1; 1249 hash_init(ipsec->rx_sa_list); 1250 1251 size = sizeof(struct rx_sa) * IXGBE_IPSEC_MAX_SA_COUNT; 1252 ipsec->rx_tbl = kzalloc(size, GFP_KERNEL); 1253 if (!ipsec->rx_tbl) 1254 goto err2; 1255 1256 size = sizeof(struct tx_sa) * IXGBE_IPSEC_MAX_SA_COUNT; 1257 ipsec->tx_tbl = kzalloc(size, GFP_KERNEL); 1258 if (!ipsec->tx_tbl) 1259 goto err2; 1260 1261 size = sizeof(struct rx_ip_sa) * IXGBE_IPSEC_MAX_RX_IP_COUNT; 1262 ipsec->ip_tbl = kzalloc(size, GFP_KERNEL); 1263 if (!ipsec->ip_tbl) 1264 goto err2; 1265 1266 ipsec->num_rx_sa = 0; 1267 ipsec->num_tx_sa = 0; 1268 1269 adapter->ipsec = ipsec; 1270 ixgbe_ipsec_stop_engine(adapter); 1271 ixgbe_ipsec_clear_hw_tables(adapter); 1272 1273 adapter->netdev->xfrmdev_ops = &ixgbe_xfrmdev_ops; 1274 1275 return; 1276 1277 err2: 1278 kfree(ipsec->ip_tbl); 1279 kfree(ipsec->rx_tbl); 1280 kfree(ipsec->tx_tbl); 1281 kfree(ipsec); 1282 err1: 1283 netdev_err(adapter->netdev, "Unable to allocate memory for SA tables"); 1284 } 1285 1286 /** 1287 * ixgbe_stop_ipsec_offload - tear down the ipsec offload 1288 * @adapter: board private structure 1289 **/ 1290 void ixgbe_stop_ipsec_offload(struct ixgbe_adapter *adapter) 1291 { 1292 struct ixgbe_ipsec *ipsec = adapter->ipsec; 1293 1294 adapter->ipsec = NULL; 1295 if (ipsec) { 1296 kfree(ipsec->ip_tbl); 1297 kfree(ipsec->rx_tbl); 1298 kfree(ipsec->tx_tbl); 1299 kfree(ipsec); 1300 } 1301 } 1302