1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright(c) 2017 Oracle and/or its affiliates. All rights reserved. */ 3 4 #include "ixgbe.h" 5 #include <net/xfrm.h> 6 #include <crypto/aead.h> 7 #include <linux/if_bridge.h> 8 9 #define IXGBE_IPSEC_KEY_BITS 160 10 static const char aes_gcm_name[] = "rfc4106(gcm(aes))"; 11 12 static void ixgbe_ipsec_del_sa(struct xfrm_state *xs); 13 14 /** 15 * ixgbe_ipsec_set_tx_sa - set the Tx SA registers 16 * @hw: hw specific details 17 * @idx: register index to write 18 * @key: key byte array 19 * @salt: salt bytes 20 **/ 21 static void ixgbe_ipsec_set_tx_sa(struct ixgbe_hw *hw, u16 idx, 22 u32 key[], u32 salt) 23 { 24 u32 reg; 25 int i; 26 27 for (i = 0; i < 4; i++) 28 IXGBE_WRITE_REG(hw, IXGBE_IPSTXKEY(i), 29 (__force u32)cpu_to_be32(key[3 - i])); 30 IXGBE_WRITE_REG(hw, IXGBE_IPSTXSALT, (__force u32)cpu_to_be32(salt)); 31 IXGBE_WRITE_FLUSH(hw); 32 33 reg = IXGBE_READ_REG(hw, IXGBE_IPSTXIDX); 34 reg &= IXGBE_RXTXIDX_IPS_EN; 35 reg |= idx << IXGBE_RXTXIDX_IDX_SHIFT | IXGBE_RXTXIDX_WRITE; 36 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, reg); 37 IXGBE_WRITE_FLUSH(hw); 38 } 39 40 /** 41 * ixgbe_ipsec_set_rx_item - set an Rx table item 42 * @hw: hw specific details 43 * @idx: register index to write 44 * @tbl: table selector 45 * 46 * Trigger the device to store into a particular Rx table the 47 * data that has already been loaded into the input register 48 **/ 49 static void ixgbe_ipsec_set_rx_item(struct ixgbe_hw *hw, u16 idx, 50 enum ixgbe_ipsec_tbl_sel tbl) 51 { 52 u32 reg; 53 54 reg = IXGBE_READ_REG(hw, IXGBE_IPSRXIDX); 55 reg &= IXGBE_RXTXIDX_IPS_EN; 56 reg |= tbl << IXGBE_RXIDX_TBL_SHIFT | 57 idx << IXGBE_RXTXIDX_IDX_SHIFT | 58 IXGBE_RXTXIDX_WRITE; 59 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, reg); 60 IXGBE_WRITE_FLUSH(hw); 61 } 62 63 /** 64 * ixgbe_ipsec_set_rx_sa - set up the register bits to save SA info 65 * @hw: hw specific details 66 * @idx: register index to write 67 * @spi: security parameter index 68 * @key: key byte array 69 * @salt: salt bytes 70 * @mode: rx decrypt control bits 71 * @ip_idx: index into IP table for related IP address 72 **/ 73 static void ixgbe_ipsec_set_rx_sa(struct ixgbe_hw *hw, u16 idx, __be32 spi, 74 u32 key[], u32 salt, u32 mode, u32 ip_idx) 75 { 76 int i; 77 78 /* store the SPI (in bigendian) and IPidx */ 79 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSPI, 80 (__force u32)cpu_to_le32((__force u32)spi)); 81 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIPIDX, ip_idx); 82 IXGBE_WRITE_FLUSH(hw); 83 84 ixgbe_ipsec_set_rx_item(hw, idx, ips_rx_spi_tbl); 85 86 /* store the key, salt, and mode */ 87 for (i = 0; i < 4; i++) 88 IXGBE_WRITE_REG(hw, IXGBE_IPSRXKEY(i), 89 (__force u32)cpu_to_be32(key[3 - i])); 90 IXGBE_WRITE_REG(hw, IXGBE_IPSRXSALT, (__force u32)cpu_to_be32(salt)); 91 IXGBE_WRITE_REG(hw, IXGBE_IPSRXMOD, mode); 92 IXGBE_WRITE_FLUSH(hw); 93 94 ixgbe_ipsec_set_rx_item(hw, idx, ips_rx_key_tbl); 95 } 96 97 /** 98 * ixgbe_ipsec_set_rx_ip - set up the register bits to save SA IP addr info 99 * @hw: hw specific details 100 * @idx: register index to write 101 * @addr: IP address byte array 102 **/ 103 static void ixgbe_ipsec_set_rx_ip(struct ixgbe_hw *hw, u16 idx, __be32 addr[]) 104 { 105 int i; 106 107 /* store the ip address */ 108 for (i = 0; i < 4; i++) 109 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIPADDR(i), 110 (__force u32)cpu_to_le32((__force u32)addr[i])); 111 IXGBE_WRITE_FLUSH(hw); 112 113 ixgbe_ipsec_set_rx_item(hw, idx, ips_rx_ip_tbl); 114 } 115 116 /** 117 * ixgbe_ipsec_clear_hw_tables - because some tables don't get cleared on reset 118 * @adapter: board private structure 119 **/ 120 static void ixgbe_ipsec_clear_hw_tables(struct ixgbe_adapter *adapter) 121 { 122 struct ixgbe_hw *hw = &adapter->hw; 123 u32 buf[4] = {0, 0, 0, 0}; 124 u16 idx; 125 126 /* disable Rx and Tx SA lookup */ 127 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, 0); 128 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, 0); 129 130 /* scrub the tables - split the loops for the max of the IP table */ 131 for (idx = 0; idx < IXGBE_IPSEC_MAX_RX_IP_COUNT; idx++) { 132 ixgbe_ipsec_set_tx_sa(hw, idx, buf, 0); 133 ixgbe_ipsec_set_rx_sa(hw, idx, 0, buf, 0, 0, 0); 134 ixgbe_ipsec_set_rx_ip(hw, idx, (__be32 *)buf); 135 } 136 for (; idx < IXGBE_IPSEC_MAX_SA_COUNT; idx++) { 137 ixgbe_ipsec_set_tx_sa(hw, idx, buf, 0); 138 ixgbe_ipsec_set_rx_sa(hw, idx, 0, buf, 0, 0, 0); 139 } 140 } 141 142 /** 143 * ixgbe_ipsec_stop_data 144 * @adapter: board private structure 145 **/ 146 static void ixgbe_ipsec_stop_data(struct ixgbe_adapter *adapter) 147 { 148 struct ixgbe_hw *hw = &adapter->hw; 149 bool link = adapter->link_up; 150 u32 t_rdy, r_rdy; 151 u32 limit; 152 u32 reg; 153 154 /* halt data paths */ 155 reg = IXGBE_READ_REG(hw, IXGBE_SECTXCTRL); 156 reg |= IXGBE_SECTXCTRL_TX_DIS; 157 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, reg); 158 159 reg = IXGBE_READ_REG(hw, IXGBE_SECRXCTRL); 160 reg |= IXGBE_SECRXCTRL_RX_DIS; 161 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, reg); 162 163 /* If both Tx and Rx are ready there are no packets 164 * that we need to flush so the loopback configuration 165 * below is not necessary. 166 */ 167 t_rdy = IXGBE_READ_REG(hw, IXGBE_SECTXSTAT) & 168 IXGBE_SECTXSTAT_SECTX_RDY; 169 r_rdy = IXGBE_READ_REG(hw, IXGBE_SECRXSTAT) & 170 IXGBE_SECRXSTAT_SECRX_RDY; 171 if (t_rdy && r_rdy) 172 return; 173 174 /* If the tx fifo doesn't have link, but still has data, 175 * we can't clear the tx sec block. Set the MAC loopback 176 * before block clear 177 */ 178 if (!link) { 179 reg = IXGBE_READ_REG(hw, IXGBE_MACC); 180 reg |= IXGBE_MACC_FLU; 181 IXGBE_WRITE_REG(hw, IXGBE_MACC, reg); 182 183 reg = IXGBE_READ_REG(hw, IXGBE_HLREG0); 184 reg |= IXGBE_HLREG0_LPBK; 185 IXGBE_WRITE_REG(hw, IXGBE_HLREG0, reg); 186 187 IXGBE_WRITE_FLUSH(hw); 188 mdelay(3); 189 } 190 191 /* wait for the paths to empty */ 192 limit = 20; 193 do { 194 mdelay(10); 195 t_rdy = IXGBE_READ_REG(hw, IXGBE_SECTXSTAT) & 196 IXGBE_SECTXSTAT_SECTX_RDY; 197 r_rdy = IXGBE_READ_REG(hw, IXGBE_SECRXSTAT) & 198 IXGBE_SECRXSTAT_SECRX_RDY; 199 } while (!(t_rdy && r_rdy) && limit--); 200 201 /* undo loopback if we played with it earlier */ 202 if (!link) { 203 reg = IXGBE_READ_REG(hw, IXGBE_MACC); 204 reg &= ~IXGBE_MACC_FLU; 205 IXGBE_WRITE_REG(hw, IXGBE_MACC, reg); 206 207 reg = IXGBE_READ_REG(hw, IXGBE_HLREG0); 208 reg &= ~IXGBE_HLREG0_LPBK; 209 IXGBE_WRITE_REG(hw, IXGBE_HLREG0, reg); 210 211 IXGBE_WRITE_FLUSH(hw); 212 } 213 } 214 215 /** 216 * ixgbe_ipsec_stop_engine 217 * @adapter: board private structure 218 **/ 219 static void ixgbe_ipsec_stop_engine(struct ixgbe_adapter *adapter) 220 { 221 struct ixgbe_hw *hw = &adapter->hw; 222 u32 reg; 223 224 ixgbe_ipsec_stop_data(adapter); 225 226 /* disable Rx and Tx SA lookup */ 227 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, 0); 228 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, 0); 229 230 /* disable the Rx and Tx engines and full packet store-n-forward */ 231 reg = IXGBE_READ_REG(hw, IXGBE_SECTXCTRL); 232 reg |= IXGBE_SECTXCTRL_SECTX_DIS; 233 reg &= ~IXGBE_SECTXCTRL_STORE_FORWARD; 234 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, reg); 235 236 reg = IXGBE_READ_REG(hw, IXGBE_SECRXCTRL); 237 reg |= IXGBE_SECRXCTRL_SECRX_DIS; 238 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, reg); 239 240 /* restore the "tx security buffer almost full threshold" to 0x250 */ 241 IXGBE_WRITE_REG(hw, IXGBE_SECTXBUFFAF, 0x250); 242 243 /* Set minimum IFG between packets back to the default 0x1 */ 244 reg = IXGBE_READ_REG(hw, IXGBE_SECTXMINIFG); 245 reg = (reg & 0xfffffff0) | 0x1; 246 IXGBE_WRITE_REG(hw, IXGBE_SECTXMINIFG, reg); 247 248 /* final set for normal (no ipsec offload) processing */ 249 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, IXGBE_SECTXCTRL_SECTX_DIS); 250 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, IXGBE_SECRXCTRL_SECRX_DIS); 251 252 IXGBE_WRITE_FLUSH(hw); 253 } 254 255 /** 256 * ixgbe_ipsec_start_engine 257 * @adapter: board private structure 258 * 259 * NOTE: this increases power consumption whether being used or not 260 **/ 261 static void ixgbe_ipsec_start_engine(struct ixgbe_adapter *adapter) 262 { 263 struct ixgbe_hw *hw = &adapter->hw; 264 u32 reg; 265 266 ixgbe_ipsec_stop_data(adapter); 267 268 /* Set minimum IFG between packets to 3 */ 269 reg = IXGBE_READ_REG(hw, IXGBE_SECTXMINIFG); 270 reg = (reg & 0xfffffff0) | 0x3; 271 IXGBE_WRITE_REG(hw, IXGBE_SECTXMINIFG, reg); 272 273 /* Set "tx security buffer almost full threshold" to 0x15 so that the 274 * almost full indication is generated only after buffer contains at 275 * least an entire jumbo packet. 276 */ 277 reg = IXGBE_READ_REG(hw, IXGBE_SECTXBUFFAF); 278 reg = (reg & 0xfffffc00) | 0x15; 279 IXGBE_WRITE_REG(hw, IXGBE_SECTXBUFFAF, reg); 280 281 /* restart the data paths by clearing the DISABLE bits */ 282 IXGBE_WRITE_REG(hw, IXGBE_SECRXCTRL, 0); 283 IXGBE_WRITE_REG(hw, IXGBE_SECTXCTRL, IXGBE_SECTXCTRL_STORE_FORWARD); 284 285 /* enable Rx and Tx SA lookup */ 286 IXGBE_WRITE_REG(hw, IXGBE_IPSTXIDX, IXGBE_RXTXIDX_IPS_EN); 287 IXGBE_WRITE_REG(hw, IXGBE_IPSRXIDX, IXGBE_RXTXIDX_IPS_EN); 288 289 IXGBE_WRITE_FLUSH(hw); 290 } 291 292 /** 293 * ixgbe_ipsec_restore - restore the ipsec HW settings after a reset 294 * @adapter: board private structure 295 * 296 * Reload the HW tables from the SW tables after they've been bashed 297 * by a chip reset. 298 * 299 * Any VF entries are removed from the SW and HW tables since either 300 * (a) the VF also gets reset on PF reset and will ask again for the 301 * offloads, or (b) the VF has been removed by a change in the num_vfs. 302 **/ 303 void ixgbe_ipsec_restore(struct ixgbe_adapter *adapter) 304 { 305 struct ixgbe_ipsec *ipsec = adapter->ipsec; 306 struct ixgbe_hw *hw = &adapter->hw; 307 int i; 308 309 if (!(adapter->flags2 & IXGBE_FLAG2_IPSEC_ENABLED)) 310 return; 311 312 /* clean up and restart the engine */ 313 ixgbe_ipsec_stop_engine(adapter); 314 ixgbe_ipsec_clear_hw_tables(adapter); 315 ixgbe_ipsec_start_engine(adapter); 316 317 /* reload the Rx and Tx keys */ 318 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) { 319 struct rx_sa *r = &ipsec->rx_tbl[i]; 320 struct tx_sa *t = &ipsec->tx_tbl[i]; 321 322 if (r->used) { 323 if (r->mode & IXGBE_RXTXMOD_VF) 324 ixgbe_ipsec_del_sa(r->xs); 325 else 326 ixgbe_ipsec_set_rx_sa(hw, i, r->xs->id.spi, 327 r->key, r->salt, 328 r->mode, r->iptbl_ind); 329 } 330 331 if (t->used) { 332 if (t->mode & IXGBE_RXTXMOD_VF) 333 ixgbe_ipsec_del_sa(t->xs); 334 else 335 ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt); 336 } 337 } 338 339 /* reload the IP addrs */ 340 for (i = 0; i < IXGBE_IPSEC_MAX_RX_IP_COUNT; i++) { 341 struct rx_ip_sa *ipsa = &ipsec->ip_tbl[i]; 342 343 if (ipsa->used) 344 ixgbe_ipsec_set_rx_ip(hw, i, ipsa->ipaddr); 345 } 346 } 347 348 /** 349 * ixgbe_ipsec_find_empty_idx - find the first unused security parameter index 350 * @ipsec: pointer to ipsec struct 351 * @rxtable: true if we need to look in the Rx table 352 * 353 * Returns the first unused index in either the Rx or Tx SA table 354 **/ 355 static int ixgbe_ipsec_find_empty_idx(struct ixgbe_ipsec *ipsec, bool rxtable) 356 { 357 u32 i; 358 359 if (rxtable) { 360 if (ipsec->num_rx_sa == IXGBE_IPSEC_MAX_SA_COUNT) 361 return -ENOSPC; 362 363 /* search rx sa table */ 364 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) { 365 if (!ipsec->rx_tbl[i].used) 366 return i; 367 } 368 } else { 369 if (ipsec->num_tx_sa == IXGBE_IPSEC_MAX_SA_COUNT) 370 return -ENOSPC; 371 372 /* search tx sa table */ 373 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT; i++) { 374 if (!ipsec->tx_tbl[i].used) 375 return i; 376 } 377 } 378 379 return -ENOSPC; 380 } 381 382 /** 383 * ixgbe_ipsec_find_rx_state - find the state that matches 384 * @ipsec: pointer to ipsec struct 385 * @daddr: inbound address to match 386 * @proto: protocol to match 387 * @spi: SPI to match 388 * @ip4: true if using an ipv4 address 389 * 390 * Returns a pointer to the matching SA state information 391 **/ 392 static struct xfrm_state *ixgbe_ipsec_find_rx_state(struct ixgbe_ipsec *ipsec, 393 __be32 *daddr, u8 proto, 394 __be32 spi, bool ip4) 395 { 396 struct rx_sa *rsa; 397 struct xfrm_state *ret = NULL; 398 399 rcu_read_lock(); 400 hash_for_each_possible_rcu(ipsec->rx_sa_list, rsa, hlist, 401 (__force u32)spi) { 402 if (rsa->mode & IXGBE_RXTXMOD_VF) 403 continue; 404 if (spi == rsa->xs->id.spi && 405 ((ip4 && *daddr == rsa->xs->id.daddr.a4) || 406 (!ip4 && !memcmp(daddr, &rsa->xs->id.daddr.a6, 407 sizeof(rsa->xs->id.daddr.a6)))) && 408 proto == rsa->xs->id.proto) { 409 ret = rsa->xs; 410 xfrm_state_hold(ret); 411 break; 412 } 413 } 414 rcu_read_unlock(); 415 return ret; 416 } 417 418 /** 419 * ixgbe_ipsec_parse_proto_keys - find the key and salt based on the protocol 420 * @xs: pointer to xfrm_state struct 421 * @mykey: pointer to key array to populate 422 * @mysalt: pointer to salt value to populate 423 * 424 * This copies the protocol keys and salt to our own data tables. The 425 * 82599 family only supports the one algorithm. 426 **/ 427 static int ixgbe_ipsec_parse_proto_keys(struct xfrm_state *xs, 428 u32 *mykey, u32 *mysalt) 429 { 430 struct net_device *dev = xs->xso.real_dev; 431 unsigned char *key_data; 432 char *alg_name = NULL; 433 int key_len; 434 435 if (!xs->aead) { 436 netdev_err(dev, "Unsupported IPsec algorithm\n"); 437 return -EINVAL; 438 } 439 440 if (xs->aead->alg_icv_len != IXGBE_IPSEC_AUTH_BITS) { 441 netdev_err(dev, "IPsec offload requires %d bit authentication\n", 442 IXGBE_IPSEC_AUTH_BITS); 443 return -EINVAL; 444 } 445 446 key_data = &xs->aead->alg_key[0]; 447 key_len = xs->aead->alg_key_len; 448 alg_name = xs->aead->alg_name; 449 450 if (strcmp(alg_name, aes_gcm_name)) { 451 netdev_err(dev, "Unsupported IPsec algorithm - please use %s\n", 452 aes_gcm_name); 453 return -EINVAL; 454 } 455 456 /* The key bytes come down in a bigendian array of bytes, so 457 * we don't need to do any byteswapping. 458 * 160 accounts for 16 byte key and 4 byte salt 459 */ 460 if (key_len == IXGBE_IPSEC_KEY_BITS) { 461 *mysalt = ((u32 *)key_data)[4]; 462 } else if (key_len != (IXGBE_IPSEC_KEY_BITS - (sizeof(*mysalt) * 8))) { 463 netdev_err(dev, "IPsec hw offload only supports keys up to 128 bits with a 32 bit salt\n"); 464 return -EINVAL; 465 } else { 466 netdev_info(dev, "IPsec hw offload parameters missing 32 bit salt value\n"); 467 *mysalt = 0; 468 } 469 memcpy(mykey, key_data, 16); 470 471 return 0; 472 } 473 474 /** 475 * ixgbe_ipsec_check_mgmt_ip - make sure there is no clash with mgmt IP filters 476 * @xs: pointer to transformer state struct 477 **/ 478 static int ixgbe_ipsec_check_mgmt_ip(struct xfrm_state *xs) 479 { 480 struct net_device *dev = xs->xso.real_dev; 481 struct ixgbe_adapter *adapter = netdev_priv(dev); 482 struct ixgbe_hw *hw = &adapter->hw; 483 u32 mfval, manc, reg; 484 int num_filters = 4; 485 bool manc_ipv4; 486 u32 bmcipval; 487 int i, j; 488 489 #define MANC_EN_IPV4_FILTER BIT(24) 490 #define MFVAL_IPV4_FILTER_SHIFT 16 491 #define MFVAL_IPV6_FILTER_SHIFT 24 492 #define MIPAF_ARR(_m, _n) (IXGBE_MIPAF + ((_m) * 0x10) + ((_n) * 4)) 493 494 #define IXGBE_BMCIP(_n) (0x5050 + ((_n) * 4)) 495 #define IXGBE_BMCIPVAL 0x5060 496 #define BMCIP_V4 0x2 497 #define BMCIP_V6 0x3 498 #define BMCIP_MASK 0x3 499 500 manc = IXGBE_READ_REG(hw, IXGBE_MANC); 501 manc_ipv4 = !!(manc & MANC_EN_IPV4_FILTER); 502 mfval = IXGBE_READ_REG(hw, IXGBE_MFVAL); 503 bmcipval = IXGBE_READ_REG(hw, IXGBE_BMCIPVAL); 504 505 if (xs->props.family == AF_INET) { 506 /* are there any IPv4 filters to check? */ 507 if (manc_ipv4) { 508 /* the 4 ipv4 filters are all in MIPAF(3, i) */ 509 for (i = 0; i < num_filters; i++) { 510 if (!(mfval & BIT(MFVAL_IPV4_FILTER_SHIFT + i))) 511 continue; 512 513 reg = IXGBE_READ_REG(hw, MIPAF_ARR(3, i)); 514 if (reg == (__force u32)xs->id.daddr.a4) 515 return 1; 516 } 517 } 518 519 if ((bmcipval & BMCIP_MASK) == BMCIP_V4) { 520 reg = IXGBE_READ_REG(hw, IXGBE_BMCIP(3)); 521 if (reg == (__force u32)xs->id.daddr.a4) 522 return 1; 523 } 524 525 } else { 526 /* if there are ipv4 filters, they are in the last ipv6 slot */ 527 if (manc_ipv4) 528 num_filters = 3; 529 530 for (i = 0; i < num_filters; i++) { 531 if (!(mfval & BIT(MFVAL_IPV6_FILTER_SHIFT + i))) 532 continue; 533 534 for (j = 0; j < 4; j++) { 535 reg = IXGBE_READ_REG(hw, MIPAF_ARR(i, j)); 536 if (reg != (__force u32)xs->id.daddr.a6[j]) 537 break; 538 } 539 if (j == 4) /* did we match all 4 words? */ 540 return 1; 541 } 542 543 if ((bmcipval & BMCIP_MASK) == BMCIP_V6) { 544 for (j = 0; j < 4; j++) { 545 reg = IXGBE_READ_REG(hw, IXGBE_BMCIP(j)); 546 if (reg != (__force u32)xs->id.daddr.a6[j]) 547 break; 548 } 549 if (j == 4) /* did we match all 4 words? */ 550 return 1; 551 } 552 } 553 554 return 0; 555 } 556 557 /** 558 * ixgbe_ipsec_add_sa - program device with a security association 559 * @xs: pointer to transformer state struct 560 **/ 561 static int ixgbe_ipsec_add_sa(struct xfrm_state *xs) 562 { 563 struct net_device *dev = xs->xso.real_dev; 564 struct ixgbe_adapter *adapter = netdev_priv(dev); 565 struct ixgbe_ipsec *ipsec = adapter->ipsec; 566 struct ixgbe_hw *hw = &adapter->hw; 567 int checked, match, first; 568 u16 sa_idx; 569 int ret; 570 int i; 571 572 if (xs->id.proto != IPPROTO_ESP && xs->id.proto != IPPROTO_AH) { 573 netdev_err(dev, "Unsupported protocol 0x%04x for ipsec offload\n", 574 xs->id.proto); 575 return -EINVAL; 576 } 577 578 if (xs->props.mode != XFRM_MODE_TRANSPORT) { 579 netdev_err(dev, "Unsupported mode for ipsec offload\n"); 580 return -EINVAL; 581 } 582 583 if (ixgbe_ipsec_check_mgmt_ip(xs)) { 584 netdev_err(dev, "IPsec IP addr clash with mgmt filters\n"); 585 return -EINVAL; 586 } 587 588 if (xs->xso.type != XFRM_DEV_OFFLOAD_CRYPTO) { 589 netdev_err(dev, "Unsupported ipsec offload type\n"); 590 return -EINVAL; 591 } 592 593 if (xs->xso.dir == XFRM_DEV_OFFLOAD_IN) { 594 struct rx_sa rsa; 595 596 if (xs->calg) { 597 netdev_err(dev, "Compression offload not supported\n"); 598 return -EINVAL; 599 } 600 601 /* find the first unused index */ 602 ret = ixgbe_ipsec_find_empty_idx(ipsec, true); 603 if (ret < 0) { 604 netdev_err(dev, "No space for SA in Rx table!\n"); 605 return ret; 606 } 607 sa_idx = (u16)ret; 608 609 memset(&rsa, 0, sizeof(rsa)); 610 rsa.used = true; 611 rsa.xs = xs; 612 613 if (rsa.xs->id.proto & IPPROTO_ESP) 614 rsa.decrypt = xs->ealg || xs->aead; 615 616 /* get the key and salt */ 617 ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt); 618 if (ret) { 619 netdev_err(dev, "Failed to get key data for Rx SA table\n"); 620 return ret; 621 } 622 623 /* get ip for rx sa table */ 624 if (xs->props.family == AF_INET6) 625 memcpy(rsa.ipaddr, &xs->id.daddr.a6, 16); 626 else 627 memcpy(&rsa.ipaddr[3], &xs->id.daddr.a4, 4); 628 629 /* The HW does not have a 1:1 mapping from keys to IP addrs, so 630 * check for a matching IP addr entry in the table. If the addr 631 * already exists, use it; else find an unused slot and add the 632 * addr. If one does not exist and there are no unused table 633 * entries, fail the request. 634 */ 635 636 /* Find an existing match or first not used, and stop looking 637 * after we've checked all we know we have. 638 */ 639 checked = 0; 640 match = -1; 641 first = -1; 642 for (i = 0; 643 i < IXGBE_IPSEC_MAX_RX_IP_COUNT && 644 (checked < ipsec->num_rx_sa || first < 0); 645 i++) { 646 if (ipsec->ip_tbl[i].used) { 647 if (!memcmp(ipsec->ip_tbl[i].ipaddr, 648 rsa.ipaddr, sizeof(rsa.ipaddr))) { 649 match = i; 650 break; 651 } 652 checked++; 653 } else if (first < 0) { 654 first = i; /* track the first empty seen */ 655 } 656 } 657 658 if (ipsec->num_rx_sa == 0) 659 first = 0; 660 661 if (match >= 0) { 662 /* addrs are the same, we should use this one */ 663 rsa.iptbl_ind = match; 664 ipsec->ip_tbl[match].ref_cnt++; 665 666 } else if (first >= 0) { 667 /* no matches, but here's an empty slot */ 668 rsa.iptbl_ind = first; 669 670 memcpy(ipsec->ip_tbl[first].ipaddr, 671 rsa.ipaddr, sizeof(rsa.ipaddr)); 672 ipsec->ip_tbl[first].ref_cnt = 1; 673 ipsec->ip_tbl[first].used = true; 674 675 ixgbe_ipsec_set_rx_ip(hw, rsa.iptbl_ind, rsa.ipaddr); 676 677 } else { 678 /* no match and no empty slot */ 679 netdev_err(dev, "No space for SA in Rx IP SA table\n"); 680 memset(&rsa, 0, sizeof(rsa)); 681 return -ENOSPC; 682 } 683 684 rsa.mode = IXGBE_RXMOD_VALID; 685 if (rsa.xs->id.proto & IPPROTO_ESP) 686 rsa.mode |= IXGBE_RXMOD_PROTO_ESP; 687 if (rsa.decrypt) 688 rsa.mode |= IXGBE_RXMOD_DECRYPT; 689 if (rsa.xs->props.family == AF_INET6) 690 rsa.mode |= IXGBE_RXMOD_IPV6; 691 692 /* the preparations worked, so save the info */ 693 memcpy(&ipsec->rx_tbl[sa_idx], &rsa, sizeof(rsa)); 694 695 ixgbe_ipsec_set_rx_sa(hw, sa_idx, rsa.xs->id.spi, rsa.key, 696 rsa.salt, rsa.mode, rsa.iptbl_ind); 697 xs->xso.offload_handle = sa_idx + IXGBE_IPSEC_BASE_RX_INDEX; 698 699 ipsec->num_rx_sa++; 700 701 /* hash the new entry for faster search in Rx path */ 702 hash_add_rcu(ipsec->rx_sa_list, &ipsec->rx_tbl[sa_idx].hlist, 703 (__force u32)rsa.xs->id.spi); 704 } else { 705 struct tx_sa tsa; 706 707 if (adapter->num_vfs && 708 adapter->bridge_mode != BRIDGE_MODE_VEPA) 709 return -EOPNOTSUPP; 710 711 /* find the first unused index */ 712 ret = ixgbe_ipsec_find_empty_idx(ipsec, false); 713 if (ret < 0) { 714 netdev_err(dev, "No space for SA in Tx table\n"); 715 return ret; 716 } 717 sa_idx = (u16)ret; 718 719 memset(&tsa, 0, sizeof(tsa)); 720 tsa.used = true; 721 tsa.xs = xs; 722 723 if (xs->id.proto & IPPROTO_ESP) 724 tsa.encrypt = xs->ealg || xs->aead; 725 726 ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt); 727 if (ret) { 728 netdev_err(dev, "Failed to get key data for Tx SA table\n"); 729 memset(&tsa, 0, sizeof(tsa)); 730 return ret; 731 } 732 733 /* the preparations worked, so save the info */ 734 memcpy(&ipsec->tx_tbl[sa_idx], &tsa, sizeof(tsa)); 735 736 ixgbe_ipsec_set_tx_sa(hw, sa_idx, tsa.key, tsa.salt); 737 738 xs->xso.offload_handle = sa_idx + IXGBE_IPSEC_BASE_TX_INDEX; 739 740 ipsec->num_tx_sa++; 741 } 742 743 /* enable the engine if not already warmed up */ 744 if (!(adapter->flags2 & IXGBE_FLAG2_IPSEC_ENABLED)) { 745 ixgbe_ipsec_start_engine(adapter); 746 adapter->flags2 |= IXGBE_FLAG2_IPSEC_ENABLED; 747 } 748 749 return 0; 750 } 751 752 /** 753 * ixgbe_ipsec_del_sa - clear out this specific SA 754 * @xs: pointer to transformer state struct 755 **/ 756 static void ixgbe_ipsec_del_sa(struct xfrm_state *xs) 757 { 758 struct net_device *dev = xs->xso.real_dev; 759 struct ixgbe_adapter *adapter = netdev_priv(dev); 760 struct ixgbe_ipsec *ipsec = adapter->ipsec; 761 struct ixgbe_hw *hw = &adapter->hw; 762 u32 zerobuf[4] = {0, 0, 0, 0}; 763 u16 sa_idx; 764 765 if (xs->xso.dir == XFRM_DEV_OFFLOAD_IN) { 766 struct rx_sa *rsa; 767 u8 ipi; 768 769 sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_RX_INDEX; 770 rsa = &ipsec->rx_tbl[sa_idx]; 771 772 if (!rsa->used) { 773 netdev_err(dev, "Invalid Rx SA selected sa_idx=%d offload_handle=%lu\n", 774 sa_idx, xs->xso.offload_handle); 775 return; 776 } 777 778 ixgbe_ipsec_set_rx_sa(hw, sa_idx, 0, zerobuf, 0, 0, 0); 779 hash_del_rcu(&rsa->hlist); 780 781 /* if the IP table entry is referenced by only this SA, 782 * i.e. ref_cnt is only 1, clear the IP table entry as well 783 */ 784 ipi = rsa->iptbl_ind; 785 if (ipsec->ip_tbl[ipi].ref_cnt > 0) { 786 ipsec->ip_tbl[ipi].ref_cnt--; 787 788 if (!ipsec->ip_tbl[ipi].ref_cnt) { 789 memset(&ipsec->ip_tbl[ipi], 0, 790 sizeof(struct rx_ip_sa)); 791 ixgbe_ipsec_set_rx_ip(hw, ipi, 792 (__force __be32 *)zerobuf); 793 } 794 } 795 796 memset(rsa, 0, sizeof(struct rx_sa)); 797 ipsec->num_rx_sa--; 798 } else { 799 sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_TX_INDEX; 800 801 if (!ipsec->tx_tbl[sa_idx].used) { 802 netdev_err(dev, "Invalid Tx SA selected sa_idx=%d offload_handle=%lu\n", 803 sa_idx, xs->xso.offload_handle); 804 return; 805 } 806 807 ixgbe_ipsec_set_tx_sa(hw, sa_idx, zerobuf, 0); 808 memset(&ipsec->tx_tbl[sa_idx], 0, sizeof(struct tx_sa)); 809 ipsec->num_tx_sa--; 810 } 811 812 /* if there are no SAs left, stop the engine to save energy */ 813 if (ipsec->num_rx_sa == 0 && ipsec->num_tx_sa == 0) { 814 adapter->flags2 &= ~IXGBE_FLAG2_IPSEC_ENABLED; 815 ixgbe_ipsec_stop_engine(adapter); 816 } 817 } 818 819 /** 820 * ixgbe_ipsec_offload_ok - can this packet use the xfrm hw offload 821 * @skb: current data packet 822 * @xs: pointer to transformer state struct 823 **/ 824 static bool ixgbe_ipsec_offload_ok(struct sk_buff *skb, struct xfrm_state *xs) 825 { 826 if (xs->props.family == AF_INET) { 827 /* Offload with IPv4 options is not supported yet */ 828 if (ip_hdr(skb)->ihl != 5) 829 return false; 830 } else { 831 /* Offload with IPv6 extension headers is not support yet */ 832 if (ipv6_ext_hdr(ipv6_hdr(skb)->nexthdr)) 833 return false; 834 } 835 836 return true; 837 } 838 839 static const struct xfrmdev_ops ixgbe_xfrmdev_ops = { 840 .xdo_dev_state_add = ixgbe_ipsec_add_sa, 841 .xdo_dev_state_delete = ixgbe_ipsec_del_sa, 842 .xdo_dev_offload_ok = ixgbe_ipsec_offload_ok, 843 }; 844 845 /** 846 * ixgbe_ipsec_vf_clear - clear the tables of data for a VF 847 * @adapter: board private structure 848 * @vf: VF id to be removed 849 **/ 850 void ixgbe_ipsec_vf_clear(struct ixgbe_adapter *adapter, u32 vf) 851 { 852 struct ixgbe_ipsec *ipsec = adapter->ipsec; 853 int i; 854 855 if (!ipsec) 856 return; 857 858 /* search rx sa table */ 859 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT && ipsec->num_rx_sa; i++) { 860 if (!ipsec->rx_tbl[i].used) 861 continue; 862 if (ipsec->rx_tbl[i].mode & IXGBE_RXTXMOD_VF && 863 ipsec->rx_tbl[i].vf == vf) 864 ixgbe_ipsec_del_sa(ipsec->rx_tbl[i].xs); 865 } 866 867 /* search tx sa table */ 868 for (i = 0; i < IXGBE_IPSEC_MAX_SA_COUNT && ipsec->num_tx_sa; i++) { 869 if (!ipsec->tx_tbl[i].used) 870 continue; 871 if (ipsec->tx_tbl[i].mode & IXGBE_RXTXMOD_VF && 872 ipsec->tx_tbl[i].vf == vf) 873 ixgbe_ipsec_del_sa(ipsec->tx_tbl[i].xs); 874 } 875 } 876 877 /** 878 * ixgbe_ipsec_vf_add_sa - translate VF request to SA add 879 * @adapter: board private structure 880 * @msgbuf: The message buffer 881 * @vf: the VF index 882 * 883 * Make up a new xs and algorithm info from the data sent by the VF. 884 * We only need to sketch in just enough to set up the HW offload. 885 * Put the resulting offload_handle into the return message to the VF. 886 * 887 * Returns 0 or error value 888 **/ 889 int ixgbe_ipsec_vf_add_sa(struct ixgbe_adapter *adapter, u32 *msgbuf, u32 vf) 890 { 891 struct ixgbe_ipsec *ipsec = adapter->ipsec; 892 struct xfrm_algo_desc *algo; 893 struct sa_mbx_msg *sam; 894 struct xfrm_state *xs; 895 size_t aead_len; 896 u16 sa_idx; 897 u32 pfsa; 898 int err; 899 900 sam = (struct sa_mbx_msg *)(&msgbuf[1]); 901 if (!adapter->vfinfo[vf].trusted || 902 !(adapter->flags2 & IXGBE_FLAG2_VF_IPSEC_ENABLED)) { 903 e_warn(drv, "VF %d attempted to add an IPsec SA\n", vf); 904 err = -EACCES; 905 goto err_out; 906 } 907 908 /* Tx IPsec offload doesn't seem to work on this 909 * device, so block these requests for now. 910 */ 911 if (sam->dir != XFRM_DEV_OFFLOAD_IN) { 912 err = -EOPNOTSUPP; 913 goto err_out; 914 } 915 916 xs = kzalloc(sizeof(*xs), GFP_KERNEL); 917 if (unlikely(!xs)) { 918 err = -ENOMEM; 919 goto err_out; 920 } 921 922 xs->xso.dir = sam->dir; 923 xs->id.spi = sam->spi; 924 xs->id.proto = sam->proto; 925 xs->props.family = sam->family; 926 if (xs->props.family == AF_INET6) 927 memcpy(&xs->id.daddr.a6, sam->addr, sizeof(xs->id.daddr.a6)); 928 else 929 memcpy(&xs->id.daddr.a4, sam->addr, sizeof(xs->id.daddr.a4)); 930 xs->xso.dev = adapter->netdev; 931 932 algo = xfrm_aead_get_byname(aes_gcm_name, IXGBE_IPSEC_AUTH_BITS, 1); 933 if (unlikely(!algo)) { 934 err = -ENOENT; 935 goto err_xs; 936 } 937 938 aead_len = sizeof(*xs->aead) + IXGBE_IPSEC_KEY_BITS / 8; 939 xs->aead = kzalloc(aead_len, GFP_KERNEL); 940 if (unlikely(!xs->aead)) { 941 err = -ENOMEM; 942 goto err_xs; 943 } 944 945 xs->props.ealgo = algo->desc.sadb_alg_id; 946 xs->geniv = algo->uinfo.aead.geniv; 947 xs->aead->alg_icv_len = IXGBE_IPSEC_AUTH_BITS; 948 xs->aead->alg_key_len = IXGBE_IPSEC_KEY_BITS; 949 memcpy(xs->aead->alg_key, sam->key, sizeof(sam->key)); 950 memcpy(xs->aead->alg_name, aes_gcm_name, sizeof(aes_gcm_name)); 951 952 /* set up the HW offload */ 953 err = ixgbe_ipsec_add_sa(xs); 954 if (err) 955 goto err_aead; 956 957 pfsa = xs->xso.offload_handle; 958 if (pfsa < IXGBE_IPSEC_BASE_TX_INDEX) { 959 sa_idx = pfsa - IXGBE_IPSEC_BASE_RX_INDEX; 960 ipsec->rx_tbl[sa_idx].vf = vf; 961 ipsec->rx_tbl[sa_idx].mode |= IXGBE_RXTXMOD_VF; 962 } else { 963 sa_idx = pfsa - IXGBE_IPSEC_BASE_TX_INDEX; 964 ipsec->tx_tbl[sa_idx].vf = vf; 965 ipsec->tx_tbl[sa_idx].mode |= IXGBE_RXTXMOD_VF; 966 } 967 968 msgbuf[1] = xs->xso.offload_handle; 969 970 return 0; 971 972 err_aead: 973 kfree_sensitive(xs->aead); 974 err_xs: 975 kfree_sensitive(xs); 976 err_out: 977 msgbuf[1] = err; 978 return err; 979 } 980 981 /** 982 * ixgbe_ipsec_vf_del_sa - translate VF request to SA delete 983 * @adapter: board private structure 984 * @msgbuf: The message buffer 985 * @vf: the VF index 986 * 987 * Given the offload_handle sent by the VF, look for the related SA table 988 * entry and use its xs field to call for a delete of the SA. 989 * 990 * Note: We silently ignore requests to delete entries that are already 991 * set to unused because when a VF is set to "DOWN", the PF first 992 * gets a reset and clears all the VF's entries; then the VF's 993 * XFRM stack sends individual deletes for each entry, which the 994 * reset already removed. In the future it might be good to try to 995 * optimize this so not so many unnecessary delete messages are sent. 996 * 997 * Returns 0 or error value 998 **/ 999 int ixgbe_ipsec_vf_del_sa(struct ixgbe_adapter *adapter, u32 *msgbuf, u32 vf) 1000 { 1001 struct ixgbe_ipsec *ipsec = adapter->ipsec; 1002 struct xfrm_state *xs; 1003 u32 pfsa = msgbuf[1]; 1004 u16 sa_idx; 1005 1006 if (!adapter->vfinfo[vf].trusted) { 1007 e_err(drv, "vf %d attempted to delete an SA\n", vf); 1008 return -EPERM; 1009 } 1010 1011 if (pfsa < IXGBE_IPSEC_BASE_TX_INDEX) { 1012 struct rx_sa *rsa; 1013 1014 sa_idx = pfsa - IXGBE_IPSEC_BASE_RX_INDEX; 1015 if (sa_idx >= IXGBE_IPSEC_MAX_SA_COUNT) { 1016 e_err(drv, "vf %d SA index %d out of range\n", 1017 vf, sa_idx); 1018 return -EINVAL; 1019 } 1020 1021 rsa = &ipsec->rx_tbl[sa_idx]; 1022 1023 if (!rsa->used) 1024 return 0; 1025 1026 if (!(rsa->mode & IXGBE_RXTXMOD_VF) || 1027 rsa->vf != vf) { 1028 e_err(drv, "vf %d bad Rx SA index %d\n", vf, sa_idx); 1029 return -ENOENT; 1030 } 1031 1032 xs = ipsec->rx_tbl[sa_idx].xs; 1033 } else { 1034 struct tx_sa *tsa; 1035 1036 sa_idx = pfsa - IXGBE_IPSEC_BASE_TX_INDEX; 1037 if (sa_idx >= IXGBE_IPSEC_MAX_SA_COUNT) { 1038 e_err(drv, "vf %d SA index %d out of range\n", 1039 vf, sa_idx); 1040 return -EINVAL; 1041 } 1042 1043 tsa = &ipsec->tx_tbl[sa_idx]; 1044 1045 if (!tsa->used) 1046 return 0; 1047 1048 if (!(tsa->mode & IXGBE_RXTXMOD_VF) || 1049 tsa->vf != vf) { 1050 e_err(drv, "vf %d bad Tx SA index %d\n", vf, sa_idx); 1051 return -ENOENT; 1052 } 1053 1054 xs = ipsec->tx_tbl[sa_idx].xs; 1055 } 1056 1057 ixgbe_ipsec_del_sa(xs); 1058 1059 /* remove the xs that was made-up in the add request */ 1060 kfree_sensitive(xs); 1061 1062 return 0; 1063 } 1064 1065 /** 1066 * ixgbe_ipsec_tx - setup Tx flags for ipsec offload 1067 * @tx_ring: outgoing context 1068 * @first: current data packet 1069 * @itd: ipsec Tx data for later use in building context descriptor 1070 **/ 1071 int ixgbe_ipsec_tx(struct ixgbe_ring *tx_ring, 1072 struct ixgbe_tx_buffer *first, 1073 struct ixgbe_ipsec_tx_data *itd) 1074 { 1075 struct ixgbe_adapter *adapter = netdev_priv(tx_ring->netdev); 1076 struct ixgbe_ipsec *ipsec = adapter->ipsec; 1077 struct xfrm_state *xs; 1078 struct sec_path *sp; 1079 struct tx_sa *tsa; 1080 1081 sp = skb_sec_path(first->skb); 1082 if (unlikely(!sp->len)) { 1083 netdev_err(tx_ring->netdev, "%s: no xfrm state len = %d\n", 1084 __func__, sp->len); 1085 return 0; 1086 } 1087 1088 xs = xfrm_input_state(first->skb); 1089 if (unlikely(!xs)) { 1090 netdev_err(tx_ring->netdev, "%s: no xfrm_input_state() xs = %p\n", 1091 __func__, xs); 1092 return 0; 1093 } 1094 1095 itd->sa_idx = xs->xso.offload_handle - IXGBE_IPSEC_BASE_TX_INDEX; 1096 if (unlikely(itd->sa_idx >= IXGBE_IPSEC_MAX_SA_COUNT)) { 1097 netdev_err(tx_ring->netdev, "%s: bad sa_idx=%d handle=%lu\n", 1098 __func__, itd->sa_idx, xs->xso.offload_handle); 1099 return 0; 1100 } 1101 1102 tsa = &ipsec->tx_tbl[itd->sa_idx]; 1103 if (unlikely(!tsa->used)) { 1104 netdev_err(tx_ring->netdev, "%s: unused sa_idx=%d\n", 1105 __func__, itd->sa_idx); 1106 return 0; 1107 } 1108 1109 first->tx_flags |= IXGBE_TX_FLAGS_IPSEC | IXGBE_TX_FLAGS_CC; 1110 1111 if (xs->id.proto == IPPROTO_ESP) { 1112 1113 itd->flags |= IXGBE_ADVTXD_TUCMD_IPSEC_TYPE_ESP | 1114 IXGBE_ADVTXD_TUCMD_L4T_TCP; 1115 if (first->protocol == htons(ETH_P_IP)) 1116 itd->flags |= IXGBE_ADVTXD_TUCMD_IPV4; 1117 1118 /* The actual trailer length is authlen (16 bytes) plus 1119 * 2 bytes for the proto and the padlen values, plus 1120 * padlen bytes of padding. This ends up not the same 1121 * as the static value found in xs->props.trailer_len (21). 1122 * 1123 * ... but if we're doing GSO, don't bother as the stack 1124 * doesn't add a trailer for those. 1125 */ 1126 if (!skb_is_gso(first->skb)) { 1127 /* The "correct" way to get the auth length would be 1128 * to use 1129 * authlen = crypto_aead_authsize(xs->data); 1130 * but since we know we only have one size to worry 1131 * about * we can let the compiler use the constant 1132 * and save us a few CPU cycles. 1133 */ 1134 const int authlen = IXGBE_IPSEC_AUTH_BITS / 8; 1135 struct sk_buff *skb = first->skb; 1136 u8 padlen; 1137 int ret; 1138 1139 ret = skb_copy_bits(skb, skb->len - (authlen + 2), 1140 &padlen, 1); 1141 if (unlikely(ret)) 1142 return 0; 1143 itd->trailer_len = authlen + 2 + padlen; 1144 } 1145 } 1146 if (tsa->encrypt) 1147 itd->flags |= IXGBE_ADVTXD_TUCMD_IPSEC_ENCRYPT_EN; 1148 1149 return 1; 1150 } 1151 1152 /** 1153 * ixgbe_ipsec_rx - decode ipsec bits from Rx descriptor 1154 * @rx_ring: receiving ring 1155 * @rx_desc: receive data descriptor 1156 * @skb: current data packet 1157 * 1158 * Determine if there was an ipsec encapsulation noticed, and if so set up 1159 * the resulting status for later in the receive stack. 1160 **/ 1161 void ixgbe_ipsec_rx(struct ixgbe_ring *rx_ring, 1162 union ixgbe_adv_rx_desc *rx_desc, 1163 struct sk_buff *skb) 1164 { 1165 struct ixgbe_adapter *adapter = netdev_priv(rx_ring->netdev); 1166 __le16 pkt_info = rx_desc->wb.lower.lo_dword.hs_rss.pkt_info; 1167 __le16 ipsec_pkt_types = cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_AH | 1168 IXGBE_RXDADV_PKTTYPE_IPSEC_ESP); 1169 struct ixgbe_ipsec *ipsec = adapter->ipsec; 1170 struct xfrm_offload *xo = NULL; 1171 struct xfrm_state *xs = NULL; 1172 struct ipv6hdr *ip6 = NULL; 1173 struct iphdr *ip4 = NULL; 1174 struct sec_path *sp; 1175 void *daddr; 1176 __be32 spi; 1177 u8 *c_hdr; 1178 u8 proto; 1179 1180 /* Find the ip and crypto headers in the data. 1181 * We can assume no vlan header in the way, b/c the 1182 * hw won't recognize the IPsec packet and anyway the 1183 * currently vlan device doesn't support xfrm offload. 1184 */ 1185 if (pkt_info & cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPV4)) { 1186 ip4 = (struct iphdr *)(skb->data + ETH_HLEN); 1187 daddr = &ip4->daddr; 1188 c_hdr = (u8 *)ip4 + ip4->ihl * 4; 1189 } else if (pkt_info & cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPV6)) { 1190 ip6 = (struct ipv6hdr *)(skb->data + ETH_HLEN); 1191 daddr = &ip6->daddr; 1192 c_hdr = (u8 *)ip6 + sizeof(struct ipv6hdr); 1193 } else { 1194 return; 1195 } 1196 1197 switch (pkt_info & ipsec_pkt_types) { 1198 case cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_AH): 1199 spi = ((struct ip_auth_hdr *)c_hdr)->spi; 1200 proto = IPPROTO_AH; 1201 break; 1202 case cpu_to_le16(IXGBE_RXDADV_PKTTYPE_IPSEC_ESP): 1203 spi = ((struct ip_esp_hdr *)c_hdr)->spi; 1204 proto = IPPROTO_ESP; 1205 break; 1206 default: 1207 return; 1208 } 1209 1210 xs = ixgbe_ipsec_find_rx_state(ipsec, daddr, proto, spi, !!ip4); 1211 if (unlikely(!xs)) 1212 return; 1213 1214 sp = secpath_set(skb); 1215 if (unlikely(!sp)) 1216 return; 1217 1218 sp->xvec[sp->len++] = xs; 1219 sp->olen++; 1220 xo = xfrm_offload(skb); 1221 xo->flags = CRYPTO_DONE; 1222 xo->status = CRYPTO_SUCCESS; 1223 1224 adapter->rx_ipsec++; 1225 } 1226 1227 /** 1228 * ixgbe_init_ipsec_offload - initialize security registers for IPSec operation 1229 * @adapter: board private structure 1230 **/ 1231 void ixgbe_init_ipsec_offload(struct ixgbe_adapter *adapter) 1232 { 1233 struct ixgbe_hw *hw = &adapter->hw; 1234 struct ixgbe_ipsec *ipsec; 1235 u32 t_dis, r_dis; 1236 size_t size; 1237 1238 if (hw->mac.type == ixgbe_mac_82598EB) 1239 return; 1240 1241 /* If there is no support for either Tx or Rx offload 1242 * we should not be advertising support for IPsec. 1243 */ 1244 t_dis = IXGBE_READ_REG(hw, IXGBE_SECTXSTAT) & 1245 IXGBE_SECTXSTAT_SECTX_OFF_DIS; 1246 r_dis = IXGBE_READ_REG(hw, IXGBE_SECRXSTAT) & 1247 IXGBE_SECRXSTAT_SECRX_OFF_DIS; 1248 if (t_dis || r_dis) 1249 return; 1250 1251 ipsec = kzalloc(sizeof(*ipsec), GFP_KERNEL); 1252 if (!ipsec) 1253 goto err1; 1254 hash_init(ipsec->rx_sa_list); 1255 1256 size = sizeof(struct rx_sa) * IXGBE_IPSEC_MAX_SA_COUNT; 1257 ipsec->rx_tbl = kzalloc(size, GFP_KERNEL); 1258 if (!ipsec->rx_tbl) 1259 goto err2; 1260 1261 size = sizeof(struct tx_sa) * IXGBE_IPSEC_MAX_SA_COUNT; 1262 ipsec->tx_tbl = kzalloc(size, GFP_KERNEL); 1263 if (!ipsec->tx_tbl) 1264 goto err2; 1265 1266 size = sizeof(struct rx_ip_sa) * IXGBE_IPSEC_MAX_RX_IP_COUNT; 1267 ipsec->ip_tbl = kzalloc(size, GFP_KERNEL); 1268 if (!ipsec->ip_tbl) 1269 goto err2; 1270 1271 ipsec->num_rx_sa = 0; 1272 ipsec->num_tx_sa = 0; 1273 1274 adapter->ipsec = ipsec; 1275 ixgbe_ipsec_stop_engine(adapter); 1276 ixgbe_ipsec_clear_hw_tables(adapter); 1277 1278 adapter->netdev->xfrmdev_ops = &ixgbe_xfrmdev_ops; 1279 1280 return; 1281 1282 err2: 1283 kfree(ipsec->ip_tbl); 1284 kfree(ipsec->rx_tbl); 1285 kfree(ipsec->tx_tbl); 1286 kfree(ipsec); 1287 err1: 1288 netdev_err(adapter->netdev, "Unable to allocate memory for SA tables"); 1289 } 1290 1291 /** 1292 * ixgbe_stop_ipsec_offload - tear down the ipsec offload 1293 * @adapter: board private structure 1294 **/ 1295 void ixgbe_stop_ipsec_offload(struct ixgbe_adapter *adapter) 1296 { 1297 struct ixgbe_ipsec *ipsec = adapter->ipsec; 1298 1299 adapter->ipsec = NULL; 1300 if (ipsec) { 1301 kfree(ipsec->ip_tbl); 1302 kfree(ipsec->rx_tbl); 1303 kfree(ipsec->tx_tbl); 1304 kfree(ipsec); 1305 } 1306 } 1307