2024-06-12 13:13:20 +08:00
|
|
|
/* Broadcom NetXtreme-C/E network driver.
|
|
|
|
*
|
2024-07-12 18:27:24 +08:00
|
|
|
* Copyright (c) 2022-2023 Broadcom Inc.
|
2024-06-12 13:13:20 +08:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/stddef.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/kernel.h>
|
2024-07-12 18:27:24 +08:00
|
|
|
#include <linux/bitmap.h>
|
2024-06-12 13:13:20 +08:00
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/list.h>
|
2024-07-12 18:27:24 +08:00
|
|
|
#include <linux/hashtable.h>
|
|
|
|
#include <linux/ip.h>
|
|
|
|
#include <linux/ipv6.h>
|
|
|
|
#include <linux/tcp.h>
|
|
|
|
#include <net/inet_hashtables.h>
|
|
|
|
#include <net/inet6_hashtables.h>
|
2024-06-12 13:13:20 +08:00
|
|
|
#ifdef HAVE_KTLS
|
|
|
|
#include <net/tls.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "bnxt_compat.h"
|
|
|
|
#include "bnxt_hsi.h"
|
|
|
|
#include "bnxt.h"
|
|
|
|
#include "bnxt_hwrm.h"
|
|
|
|
#include "bnxt_mpc.h"
|
|
|
|
#include "bnxt_ktls.h"
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
#if defined(HAVE_KTLS) && IS_ENABLED(CONFIG_TLS_DEVICE) && (LINUX_VERSION_CODE >= KERNEL_VERSION(5,0,0))
|
|
|
|
|
|
|
|
#define BNXT_PARTITION_CAP_BITS \
|
|
|
|
(FUNC_QCAPS_RESP_XID_PARTITION_CAP_TX_CK | \
|
|
|
|
FUNC_QCAPS_RESP_XID_PARTITION_CAP_RX_CK)
|
|
|
|
|
|
|
|
#define BNXT_PARTITION_CAP(resp) \
|
|
|
|
((le32_to_cpu((resp)->flags_ext2) & \
|
|
|
|
FUNC_QCAPS_RESP_FLAGS_EXT2_KEY_XID_PARTITION_SUPPORTED) && \
|
|
|
|
((le16_to_cpu(resp->xid_partition_cap) & \
|
|
|
|
BNXT_PARTITION_CAP_BITS) == BNXT_PARTITION_CAP_BITS))
|
|
|
|
|
|
|
|
void bnxt_alloc_ktls_info(struct bnxt *bp, struct hwrm_func_qcaps_output *resp)
|
2024-06-12 13:13:20 +08:00
|
|
|
{
|
2024-07-12 18:27:24 +08:00
|
|
|
u16 max_keys = le16_to_cpu(resp->max_key_ctxs_alloc);
|
2024-06-12 13:13:20 +08:00
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
if (BNXT_VF(bp))
|
|
|
|
return;
|
2024-06-12 13:13:20 +08:00
|
|
|
if (!ktls) {
|
2024-07-12 18:27:24 +08:00
|
|
|
bool partition_mode = false;
|
|
|
|
struct bnxt_kctx *kctx;
|
|
|
|
u16 batch_sz = 0;
|
|
|
|
int i;
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
ktls = kzalloc(sizeof(*ktls), GFP_KERNEL);
|
|
|
|
if (!ktls)
|
|
|
|
return;
|
2024-07-12 18:27:24 +08:00
|
|
|
|
|
|
|
if (BNXT_PARTITION_CAP(resp)) {
|
|
|
|
batch_sz = le16_to_cpu(resp->ctxs_per_partition);
|
|
|
|
if (batch_sz && batch_sz <= BNXT_KID_BATCH_SIZE)
|
|
|
|
partition_mode = true;
|
|
|
|
}
|
|
|
|
for (i = 0; i < BNXT_MAX_CRYPTO_KEY_TYPE; i++) {
|
|
|
|
kctx = &ktls->kctx[i];
|
|
|
|
kctx->type = i;
|
|
|
|
if (i == BNXT_TX_CRYPTO_KEY_TYPE)
|
|
|
|
kctx->max_ctx = BNXT_MAX_TX_CRYPTO_KEYS;
|
|
|
|
else
|
|
|
|
kctx->max_ctx = BNXT_MAX_RX_CRYPTO_KEYS;
|
|
|
|
INIT_LIST_HEAD(&kctx->list);
|
|
|
|
spin_lock_init(&kctx->lock);
|
|
|
|
atomic_set(&kctx->alloc_pending, 0);
|
|
|
|
init_waitqueue_head(&kctx->alloc_pending_wq);
|
|
|
|
if (partition_mode) {
|
|
|
|
int bmap_sz;
|
|
|
|
|
|
|
|
bmap_sz = DIV_ROUND_UP(kctx->max_ctx, batch_sz);
|
|
|
|
kctx->partition_bmap = bitmap_zalloc(bmap_sz,
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!kctx->partition_bmap)
|
|
|
|
partition_mode = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ktls->partition_mode = partition_mode;
|
|
|
|
ktls->ctxs_per_partition = batch_sz;
|
|
|
|
|
|
|
|
hash_init(ktls->filter_tbl);
|
|
|
|
spin_lock_init(&ktls->filter_lock);
|
|
|
|
|
|
|
|
atomic_set(&ktls->pending, 0);
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
bp->ktls_info = ktls;
|
|
|
|
}
|
2024-07-12 18:27:24 +08:00
|
|
|
ktls->max_key_ctxs_alloc = max_keys;
|
|
|
|
}
|
|
|
|
|
|
|
|
void bnxt_clear_cfa_tls_filters_tbl(struct bnxt *bp)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct bnxt_kfltr_info *kfltr;
|
|
|
|
struct hlist_node *tmp_node;
|
|
|
|
int bkt;
|
|
|
|
|
|
|
|
if (!ktls)
|
|
|
|
return;
|
|
|
|
|
|
|
|
spin_lock(&ktls->filter_lock);
|
|
|
|
hash_for_each_safe(ktls->filter_tbl, bkt, tmp_node, kfltr, hash) {
|
|
|
|
hash_del_rcu(&kfltr->hash);
|
|
|
|
kfree_rcu(kfltr, rcu);
|
|
|
|
}
|
|
|
|
ktls->filter_count = 0;
|
|
|
|
spin_unlock(&ktls->filter_lock);
|
2024-06-12 13:13:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void bnxt_free_ktls_info(struct bnxt *bp)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct bnxt_kid_info *kid, *tmp;
|
|
|
|
struct bnxt_kctx *kctx;
|
2024-07-12 18:27:24 +08:00
|
|
|
int i;
|
2024-06-12 13:13:20 +08:00
|
|
|
|
|
|
|
if (!ktls)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Shutting down, no need to protect the lists. */
|
2024-07-12 18:27:24 +08:00
|
|
|
for (i = 0; i < BNXT_MAX_CRYPTO_KEY_TYPE; i++) {
|
|
|
|
kctx = &ktls->kctx[i];
|
|
|
|
list_for_each_entry_safe(kid, tmp, &kctx->list, list) {
|
|
|
|
list_del(&kid->list);
|
|
|
|
kfree(kid);
|
|
|
|
}
|
|
|
|
bitmap_free(kctx->partition_bmap);
|
2024-06-12 13:13:20 +08:00
|
|
|
}
|
2024-07-12 18:27:24 +08:00
|
|
|
bnxt_clear_cfa_tls_filters_tbl(bp);
|
|
|
|
kmem_cache_destroy(ktls->mpc_cache);
|
2024-06-12 13:13:20 +08:00
|
|
|
kfree(ktls);
|
|
|
|
bp->ktls_info = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void bnxt_hwrm_reserve_pf_key_ctxs(struct bnxt *bp,
|
|
|
|
struct hwrm_func_cfg_input *req)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct bnxt_hw_resc *hw_resc = &bp->hw_resc;
|
2024-07-12 18:27:24 +08:00
|
|
|
u32 tx, rx;
|
2024-06-12 13:13:20 +08:00
|
|
|
|
|
|
|
if (!ktls)
|
|
|
|
return;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
tx = min(ktls->tck.max_ctx, hw_resc->max_tx_key_ctxs);
|
|
|
|
req->num_ktls_tx_key_ctxs = cpu_to_le32(tx);
|
|
|
|
rx = min(ktls->rck.max_ctx, hw_resc->max_rx_key_ctxs);
|
|
|
|
req->num_ktls_rx_key_ctxs = cpu_to_le32(rx);
|
|
|
|
req->enables |= cpu_to_le32(FUNC_CFG_REQ_ENABLES_KTLS_TX_KEY_CTXS |
|
|
|
|
FUNC_CFG_REQ_ENABLES_KTLS_RX_KEY_CTXS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __bnxt_partition_alloc(struct bnxt_kctx *kctx, u32 *id)
|
|
|
|
{
|
|
|
|
unsigned int next, max = kctx->max_ctx;
|
|
|
|
|
|
|
|
next = find_next_zero_bit(kctx->partition_bmap, max, kctx->next);
|
|
|
|
if (next >= max)
|
|
|
|
next = find_first_zero_bit(kctx->partition_bmap, max);
|
|
|
|
if (next >= max)
|
|
|
|
return -ENOSPC;
|
|
|
|
*id = next;
|
|
|
|
kctx->next = next;
|
|
|
|
return 0;
|
2024-06-12 13:13:20 +08:00
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
static int bnxt_partition_alloc(struct bnxt_kctx *kctx, u32 *id)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
do {
|
|
|
|
rc = __bnxt_partition_alloc(kctx, id);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
} while (test_and_set_bit(*id, kctx->partition_bmap));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bnxt_key_ctx_store(struct bnxt *bp, __le32 *key_buf, u32 num,
|
|
|
|
bool contig, struct bnxt_kctx *kctx, u32 *id)
|
2024-06-12 13:13:20 +08:00
|
|
|
{
|
|
|
|
struct bnxt_kid_info *kid;
|
2024-07-12 18:27:24 +08:00
|
|
|
u32 i;
|
2024-06-12 13:13:20 +08:00
|
|
|
|
|
|
|
for (i = 0; i < num; ) {
|
|
|
|
kid = kzalloc(sizeof(*kid), GFP_KERNEL);
|
|
|
|
if (!kid)
|
|
|
|
return -ENOMEM;
|
|
|
|
kid->start_id = le32_to_cpu(key_buf[i]);
|
|
|
|
if (contig)
|
|
|
|
kid->count = num;
|
|
|
|
else
|
|
|
|
kid->count = 1;
|
|
|
|
bitmap_set(kid->ids, 0, kid->count);
|
2024-07-12 18:27:24 +08:00
|
|
|
if (id && !i) {
|
|
|
|
clear_bit(0, kid->ids);
|
|
|
|
*id = kid->start_id;
|
|
|
|
}
|
2024-06-12 13:13:20 +08:00
|
|
|
spin_lock(&kctx->lock);
|
|
|
|
list_add_tail_rcu(&kid->list, &kctx->list);
|
|
|
|
kctx->total_alloc += kid->count;
|
|
|
|
spin_unlock(&kctx->lock);
|
|
|
|
i += kid->count;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
static int bnxt_hwrm_key_ctx_alloc(struct bnxt *bp, struct bnxt_kctx *kctx,
|
|
|
|
u32 num, u32 *id)
|
2024-06-12 13:13:20 +08:00
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct hwrm_func_key_ctx_alloc_output *resp;
|
|
|
|
struct hwrm_func_key_ctx_alloc_input *req;
|
|
|
|
dma_addr_t mapping;
|
2024-07-12 18:27:24 +08:00
|
|
|
int pending_count;
|
2024-06-12 13:13:20 +08:00
|
|
|
__le32 *key_buf;
|
|
|
|
bool contig;
|
|
|
|
int rc;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
num = min_t(u32, num, ktls->max_key_ctxs_alloc);
|
2024-06-12 13:13:20 +08:00
|
|
|
rc = hwrm_req_init(bp, req, HWRM_FUNC_KEY_CTX_ALLOC);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
if (ktls->partition_mode) {
|
|
|
|
u32 partition_id;
|
2024-06-12 13:13:20 +08:00
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
num = ktls->ctxs_per_partition;
|
|
|
|
rc = bnxt_partition_alloc(kctx, &partition_id);
|
|
|
|
if (rc)
|
|
|
|
goto key_alloc_exit;
|
|
|
|
req->partition_start_xid = cpu_to_le32(partition_id * num);
|
|
|
|
} else {
|
|
|
|
key_buf = hwrm_req_dma_slice(bp, req, num * 4, &mapping);
|
|
|
|
if (!key_buf) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto key_alloc_exit;
|
|
|
|
}
|
|
|
|
req->dma_bufr_size_bytes = cpu_to_le32(num * 4);
|
|
|
|
req->host_dma_addr = cpu_to_le64(mapping);
|
2024-06-12 13:13:20 +08:00
|
|
|
}
|
|
|
|
resp = hwrm_req_hold(bp, req);
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
req->key_ctx_type = kctx->type;
|
2024-06-12 13:13:20 +08:00
|
|
|
req->num_key_ctxs = cpu_to_le16(num);
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
pending_count = atomic_inc_return(&kctx->alloc_pending);
|
2024-06-12 13:13:20 +08:00
|
|
|
rc = hwrm_req_send(bp, req);
|
2024-07-12 18:27:24 +08:00
|
|
|
atomic_dec(&kctx->alloc_pending);
|
2024-06-12 13:13:20 +08:00
|
|
|
if (rc)
|
2024-07-12 18:27:24 +08:00
|
|
|
goto key_alloc_exit_wake;
|
2024-06-12 13:13:20 +08:00
|
|
|
|
|
|
|
num = le16_to_cpu(resp->num_key_ctxs_allocated);
|
|
|
|
contig =
|
|
|
|
resp->flags & FUNC_KEY_CTX_ALLOC_RESP_FLAGS_KEY_CTXS_CONTIGUOUS;
|
2024-07-12 18:27:24 +08:00
|
|
|
if (ktls->partition_mode)
|
|
|
|
key_buf = &resp->partition_start_xid;
|
|
|
|
rc = bnxt_key_ctx_store(bp, key_buf, num, contig, kctx, id);
|
2024-06-12 13:13:20 +08:00
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
key_alloc_exit_wake:
|
|
|
|
if (pending_count >= BNXT_KCTX_ALLOC_PENDING_MAX)
|
|
|
|
wake_up_all(&kctx->alloc_pending_wq);
|
2024-06-12 13:13:20 +08:00
|
|
|
key_alloc_exit:
|
|
|
|
hwrm_req_drop(bp, req);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bnxt_alloc_one_kctx(struct bnxt_kctx *kctx, u32 *id)
|
|
|
|
{
|
|
|
|
struct bnxt_kid_info *kid;
|
|
|
|
int rc = -ENOMEM;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
list_for_each_entry_rcu(kid, &kctx->list, list) {
|
|
|
|
u32 idx = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
idx = find_next_bit(kid->ids, kid->count, idx);
|
|
|
|
if (idx >= kid->count)
|
|
|
|
break;
|
|
|
|
if (test_and_clear_bit(idx, kid->ids)) {
|
|
|
|
*id = kid->start_id + idx;
|
|
|
|
rc = 0;
|
|
|
|
goto alloc_done;
|
|
|
|
}
|
|
|
|
} while (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
alloc_done:
|
|
|
|
rcu_read_unlock();
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bnxt_free_one_kctx(struct bnxt_kctx *kctx, u32 id)
|
|
|
|
{
|
|
|
|
struct bnxt_kid_info *kid;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
list_for_each_entry_rcu(kid, &kctx->list, list) {
|
|
|
|
if (id >= kid->start_id && id < kid->start_id + kid->count) {
|
|
|
|
set_bit(id - kid->start_id, kid->ids);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
#define BNXT_KCTX_ALLOC_RETRY_MAX 3
|
|
|
|
|
|
|
|
static int bnxt_key_ctx_alloc_one(struct bnxt *bp, struct bnxt_kctx *kctx,
|
|
|
|
u32 *id)
|
|
|
|
{
|
|
|
|
int rc, retry = 0;
|
|
|
|
|
|
|
|
while (retry++ < BNXT_KCTX_ALLOC_RETRY_MAX) {
|
|
|
|
rc = bnxt_alloc_one_kctx(kctx, id);
|
|
|
|
if (!rc)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if ((kctx->total_alloc + BNXT_KID_BATCH_SIZE) > kctx->max_ctx)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
if (!BNXT_KCTX_ALLOC_OK(kctx)) {
|
|
|
|
wait_event(kctx->alloc_pending_wq,
|
|
|
|
BNXT_KCTX_ALLOC_OK(kctx));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
rc = bnxt_hwrm_key_ctx_alloc(bp, kctx, BNXT_KID_BATCH_SIZE, id);
|
|
|
|
if (!rc)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -EAGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BNXT_TLS_FLTR_FLAGS \
|
|
|
|
(CFA_TLS_FILTER_ALLOC_REQ_ENABLES_L2_FILTER_ID | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_ETHERTYPE | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_IPADDR_TYPE | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_SRC_IPADDR | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_DST_IPADDR | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_IP_PROTOCOL | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_SRC_PORT | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_DST_PORT | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_KID | \
|
|
|
|
CFA_TLS_FILTER_ALLOC_REQ_ENABLES_DST_ID)
|
|
|
|
|
|
|
|
static int bnxt_hwrm_cfa_tls_filter_alloc(struct bnxt *bp, struct sock *sk,
|
|
|
|
u32 kid)
|
|
|
|
{
|
|
|
|
struct hwrm_cfa_tls_filter_alloc_output *resp;
|
|
|
|
struct hwrm_cfa_tls_filter_alloc_input *req;
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct inet_sock *inet = inet_sk(sk);
|
|
|
|
struct bnxt_l2_filter *l2_fltr;
|
|
|
|
struct bnxt_kfltr_info *kfltr;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
kfltr = kzalloc(sizeof(*kfltr), GFP_KERNEL);
|
|
|
|
if (!kfltr)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
rc = hwrm_req_init(bp, req, HWRM_CFA_TLS_FILTER_ALLOC);
|
|
|
|
if (rc) {
|
|
|
|
kfree(kfltr);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
req->enables = cpu_to_le32(BNXT_TLS_FLTR_FLAGS);
|
|
|
|
|
|
|
|
l2_fltr = bp->vnic_info[BNXT_VNIC_DEFAULT].l2_filters[0];
|
|
|
|
req->l2_filter_id = l2_fltr->base.filter_id;
|
|
|
|
req->dst_id = cpu_to_le16(bp->vnic_info[BNXT_VNIC_DEFAULT].fw_vnic_id);
|
|
|
|
req->kid = cpu_to_le32(kid);
|
|
|
|
|
|
|
|
req->ip_protocol = CFA_TLS_FILTER_ALLOC_REQ_IP_PROTOCOL_TCP;
|
|
|
|
req->src_port = inet->inet_dport;
|
|
|
|
req->dst_port = inet->inet_sport;
|
|
|
|
|
|
|
|
switch (sk->sk_family) {
|
|
|
|
case AF_INET:
|
|
|
|
default:
|
|
|
|
req->ethertype = htons(ETH_P_IP);
|
|
|
|
req->ip_addr_type = CFA_TLS_FILTER_ALLOC_REQ_IP_ADDR_TYPE_IPV4;
|
|
|
|
req->src_ipaddr[0] = inet->inet_daddr;
|
|
|
|
req->dst_ipaddr[0] = inet->inet_saddr;
|
|
|
|
break;
|
|
|
|
case AF_INET6: {
|
|
|
|
struct ipv6_pinfo *inet6 = inet6_sk(sk);
|
|
|
|
|
|
|
|
req->ethertype = htons(ETH_P_IPV6);
|
|
|
|
req->ip_addr_type = CFA_TLS_FILTER_ALLOC_REQ_IP_ADDR_TYPE_IPV6;
|
|
|
|
memcpy(req->src_ipaddr, &sk->sk_v6_daddr, sizeof(req->src_ipaddr));
|
|
|
|
memcpy(req->dst_ipaddr, &inet6->saddr, sizeof(req->dst_ipaddr));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
resp = hwrm_req_hold(bp, req);
|
|
|
|
rc = hwrm_req_send(bp, req);
|
|
|
|
if (rc) {
|
|
|
|
kfree(kfltr);
|
|
|
|
} else {
|
|
|
|
kfltr->kid = kid;
|
|
|
|
kfltr->filter_id = resp->tls_filter_id;
|
|
|
|
spin_lock(&ktls->filter_lock);
|
|
|
|
ktls->filter_count++;
|
|
|
|
hash_add_rcu(ktls->filter_tbl, &kfltr->hash, kid);
|
|
|
|
spin_unlock(&ktls->filter_lock);
|
|
|
|
}
|
|
|
|
hwrm_req_drop(bp, req);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bnxt_hwrm_cfa_tls_filter_free(struct bnxt *bp, u32 kid)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct hwrm_cfa_tls_filter_free_input *req;
|
|
|
|
struct bnxt_kfltr_info *kfltr;
|
|
|
|
bool found = false;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
hash_for_each_possible_rcu(ktls->filter_tbl, kfltr, hash, kid) {
|
|
|
|
if (kfltr->kid == kid) {
|
|
|
|
found = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
if (!found)
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
rc = hwrm_req_init(bp, req, HWRM_CFA_TLS_FILTER_FREE);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
req->tls_filter_id = kfltr->filter_id;
|
|
|
|
rc = hwrm_req_send(bp, req);
|
|
|
|
|
|
|
|
spin_lock(&ktls->filter_lock);
|
|
|
|
ktls->filter_count--;
|
|
|
|
hash_del_rcu(&kfltr->hash);
|
|
|
|
spin_unlock(&ktls->filter_lock);
|
|
|
|
kfree_rcu(kfltr, rcu);
|
|
|
|
return rc;
|
|
|
|
}
|
2024-06-12 13:13:20 +08:00
|
|
|
|
|
|
|
static int bnxt_xmit_crypto_cmd(struct bnxt *bp, struct bnxt_tx_ring_info *txr,
|
|
|
|
void *cmd, uint len, uint tmo)
|
|
|
|
{
|
2024-07-12 18:27:24 +08:00
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct bnxt_crypto_cmd_ctx *ctx = NULL;
|
|
|
|
unsigned long tmo_left, handle = 0;
|
2024-06-12 13:13:20 +08:00
|
|
|
int rc;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
if (tmo) {
|
|
|
|
u32 kid = CE_CMD_KID(cmd);
|
|
|
|
|
|
|
|
ctx = kmem_cache_alloc(ktls->mpc_cache, GFP_KERNEL);
|
|
|
|
if (!ctx)
|
|
|
|
return -ENOMEM;
|
|
|
|
init_completion(&ctx->cmp);
|
|
|
|
handle = (unsigned long)ctx;
|
|
|
|
ctx->ce_cmp.opaque =
|
|
|
|
BNXT_KMPC_OPAQUE(txr->tx_ring_struct.mpc_chnl_type,
|
|
|
|
kid);
|
|
|
|
might_sleep();
|
|
|
|
}
|
2024-06-12 13:13:20 +08:00
|
|
|
spin_lock(&txr->tx_lock);
|
2024-07-12 18:27:24 +08:00
|
|
|
rc = bnxt_start_xmit_mpc(bp, txr, cmd, len, handle);
|
2024-06-12 13:13:20 +08:00
|
|
|
spin_unlock(&txr->tx_lock);
|
2024-07-12 18:27:24 +08:00
|
|
|
if (rc || !tmo)
|
|
|
|
goto xmit_done;
|
|
|
|
|
|
|
|
tmo_left = wait_for_completion_timeout(&ctx->cmp, msecs_to_jiffies(tmo));
|
|
|
|
if (!tmo_left) {
|
|
|
|
ctx->ce_cmp.opaque = BNXT_INV_KMPC_OPAQUE;
|
|
|
|
netdev_warn(bp->dev, "kTLS MP cmd %08x timed out\n",
|
|
|
|
*((u32 *)cmd));
|
|
|
|
rc = -ETIMEDOUT;
|
|
|
|
goto xmit_done;
|
|
|
|
}
|
|
|
|
if (CE_CMPL_STATUS(&ctx->ce_cmp) == CE_CMPL_STATUS_OK)
|
|
|
|
rc = 0;
|
|
|
|
else
|
|
|
|
rc = -EIO;
|
|
|
|
xmit_done:
|
|
|
|
if (ctx)
|
|
|
|
kmem_cache_free(ktls->mpc_cache, ctx);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bnxt_copy_tls_mp_data(u8 *dst, u8 *src, int bytes)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < bytes; i++)
|
|
|
|
dst[-i] = src[i];
|
2024-06-12 13:13:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int bnxt_crypto_add(struct bnxt *bp,
|
|
|
|
enum tls_offload_ctx_dir direction,
|
2024-07-12 18:27:24 +08:00
|
|
|
struct tls_crypto_info *crypto_info, u32 tcp_seq_no,
|
|
|
|
u32 kid)
|
2024-06-12 13:13:20 +08:00
|
|
|
{
|
|
|
|
struct bnxt_mpc_info *mpc = bp->mpc_info;
|
|
|
|
struct bnxt_tx_ring_info *txr;
|
|
|
|
struct ce_add_cmd cmd = {0};
|
|
|
|
u32 data;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
if (direction == TLS_OFFLOAD_CTX_DIR_TX) {
|
2024-06-12 13:13:20 +08:00
|
|
|
txr = &mpc->mpc_rings[BNXT_MPC_TCE_TYPE][0];
|
2024-07-12 18:27:24 +08:00
|
|
|
cmd.ctx_kind = CE_ADD_CMD_CTX_KIND_CK_TX;
|
|
|
|
} else {
|
2024-06-12 13:13:20 +08:00
|
|
|
txr = &mpc->mpc_rings[BNXT_MPC_RCE_TYPE][0];
|
2024-07-12 18:27:24 +08:00
|
|
|
cmd.ctx_kind = CE_ADD_CMD_CTX_KIND_CK_RX;
|
|
|
|
}
|
2024-06-12 13:13:20 +08:00
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
data = CE_ADD_CMD_OPCODE_ADD | (kid << CE_ADD_CMD_KID_SFT);
|
2024-06-12 13:13:20 +08:00
|
|
|
switch (crypto_info->cipher_type) {
|
|
|
|
case TLS_CIPHER_AES_GCM_128: {
|
|
|
|
struct tls12_crypto_info_aes_gcm_128 *aes;
|
|
|
|
|
|
|
|
aes = (void *)crypto_info;
|
|
|
|
data |= CE_ADD_CMD_ALGORITHM_AES_GCM_128;
|
|
|
|
if (crypto_info->version == TLS_1_3_VERSION)
|
|
|
|
data |= CE_ADD_CMD_VERSION_TLS1_3;
|
2024-07-12 18:27:24 +08:00
|
|
|
memcpy(&cmd.session_key, aes->key, sizeof(aes->key));
|
|
|
|
memcpy(&cmd.salt, aes->salt, sizeof(aes->salt));
|
|
|
|
memcpy(&cmd.addl_iv, aes->iv, sizeof(aes->iv));
|
|
|
|
bnxt_copy_tls_mp_data(&cmd.record_seq_num_end, aes->rec_seq,
|
|
|
|
sizeof(aes->rec_seq));
|
2024-06-12 13:13:20 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case TLS_CIPHER_AES_GCM_256: {
|
|
|
|
struct tls12_crypto_info_aes_gcm_256 *aes;
|
|
|
|
|
|
|
|
aes = (void *)crypto_info;
|
|
|
|
data |= CE_ADD_CMD_ALGORITHM_AES_GCM_256;
|
|
|
|
if (crypto_info->version == TLS_1_3_VERSION)
|
|
|
|
data |= CE_ADD_CMD_VERSION_TLS1_3;
|
2024-07-12 18:27:24 +08:00
|
|
|
memcpy(&cmd.session_key, aes->key, sizeof(aes->key));
|
|
|
|
memcpy(&cmd.salt, aes->salt, sizeof(aes->salt));
|
|
|
|
memcpy(&cmd.addl_iv, aes->iv, sizeof(aes->iv));
|
|
|
|
bnxt_copy_tls_mp_data(&cmd.record_seq_num_end, aes->rec_seq,
|
|
|
|
sizeof(aes->rec_seq));
|
2024-06-12 13:13:20 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
cmd.ver_algo_kid_opcode = cpu_to_le32(data);
|
2024-07-12 18:27:24 +08:00
|
|
|
cmd.pkt_tcp_seq_num = cpu_to_le32(tcp_seq_no);
|
2024-06-12 13:13:20 +08:00
|
|
|
cmd.tls_header_tcp_seq_num = cmd.pkt_tcp_seq_num;
|
|
|
|
return bnxt_xmit_crypto_cmd(bp, txr, &cmd, sizeof(cmd),
|
|
|
|
BNXT_MPC_TMO_MSECS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bnxt_crypto_del(struct bnxt *bp,
|
2024-07-12 18:27:24 +08:00
|
|
|
enum tls_offload_ctx_dir direction, u32 kid)
|
2024-06-12 13:13:20 +08:00
|
|
|
{
|
|
|
|
struct bnxt_mpc_info *mpc = bp->mpc_info;
|
|
|
|
struct bnxt_tx_ring_info *txr;
|
|
|
|
struct ce_delete_cmd cmd = {0};
|
|
|
|
u32 data;
|
|
|
|
|
|
|
|
if (direction == TLS_OFFLOAD_CTX_DIR_TX) {
|
|
|
|
txr = &mpc->mpc_rings[BNXT_MPC_TCE_TYPE][0];
|
|
|
|
data = CE_DELETE_CMD_CTX_KIND_CK_TX;
|
|
|
|
} else {
|
|
|
|
txr = &mpc->mpc_rings[BNXT_MPC_RCE_TYPE][0];
|
|
|
|
data = CE_DELETE_CMD_CTX_KIND_CK_RX;
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
data |= CE_DELETE_CMD_OPCODE_DEL | (kid << CE_DELETE_CMD_KID_SFT);
|
2024-06-12 13:13:20 +08:00
|
|
|
|
|
|
|
cmd.ctx_kind_kid_opcode = cpu_to_le32(data);
|
|
|
|
return bnxt_xmit_crypto_cmd(bp, txr, &cmd, sizeof(cmd),
|
|
|
|
BNXT_MPC_TMO_MSECS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool bnxt_ktls_cipher_supported(struct bnxt *bp,
|
|
|
|
struct tls_crypto_info *crypto_info)
|
|
|
|
{
|
|
|
|
u16 type = crypto_info->cipher_type;
|
|
|
|
u16 version = crypto_info->version;
|
|
|
|
|
|
|
|
if ((type == TLS_CIPHER_AES_GCM_128 ||
|
|
|
|
type == TLS_CIPHER_AES_GCM_256) &&
|
|
|
|
(version == TLS_1_2_VERSION ||
|
|
|
|
version == TLS_1_3_VERSION))
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
static void bnxt_set_ktls_ctx_rx(struct tls_context *tls_ctx,
|
|
|
|
struct bnxt_ktls_offload_ctx_rx *kctx_rx)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_offload_ctx_rx **rx =
|
|
|
|
__tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_RX);
|
|
|
|
|
|
|
|
*rx = kctx_rx;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct bnxt_ktls_offload_ctx_rx *
|
|
|
|
bnxt_get_ktls_ctx_rx(struct tls_context *tls_ctx)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_offload_ctx_rx **rx =
|
|
|
|
__tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_RX);
|
|
|
|
|
|
|
|
return *rx;
|
|
|
|
}
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
static int bnxt_ktls_dev_add(struct net_device *dev, struct sock *sk,
|
|
|
|
enum tls_offload_ctx_dir direction,
|
|
|
|
struct tls_crypto_info *crypto_info,
|
|
|
|
u32 start_offload_tcp_sn)
|
|
|
|
{
|
2024-07-12 18:27:24 +08:00
|
|
|
struct bnxt_ktls_offload_ctx_rx *kctx_rx = NULL;
|
2024-06-12 13:13:20 +08:00
|
|
|
struct bnxt_ktls_offload_ctx_tx *kctx_tx;
|
|
|
|
struct bnxt *bp = netdev_priv(dev);
|
2024-07-12 18:27:24 +08:00
|
|
|
struct tls_context *tls_ctx;
|
2024-06-12 13:13:20 +08:00
|
|
|
struct bnxt_ktls_info *ktls;
|
2024-07-12 18:27:24 +08:00
|
|
|
struct bnxt_kctx *kctx;
|
|
|
|
u32 kid;
|
2024-06-12 13:13:20 +08:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
BUILD_BUG_ON(sizeof(struct bnxt_ktls_offload_ctx_tx) >
|
2024-07-12 18:27:24 +08:00
|
|
|
TLS_DRIVER_STATE_SIZE_TX);
|
|
|
|
BUILD_BUG_ON(sizeof(struct bnxt_ktls_offload_ctx_rx *) >
|
|
|
|
TLS_DRIVER_STATE_SIZE_RX);
|
2024-06-12 13:13:20 +08:00
|
|
|
|
|
|
|
if (!bnxt_ktls_cipher_supported(bp, crypto_info))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
ktls = bp->ktls_info;
|
2024-07-12 18:27:24 +08:00
|
|
|
atomic_inc(&ktls->pending);
|
|
|
|
/* Make sure bnxt_close_nic() sees pending before we check the
|
|
|
|
* BNXT_STATE_OPEN flag.
|
|
|
|
*/
|
|
|
|
smp_mb__after_atomic();
|
|
|
|
if (!test_bit(BNXT_STATE_OPEN, &bp->state)) {
|
|
|
|
rc = -ENODEV;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
tls_ctx = tls_get_ctx(sk);
|
|
|
|
if (direction == TLS_OFFLOAD_CTX_DIR_TX) {
|
|
|
|
kctx_tx = __tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_TX);
|
|
|
|
kctx = &ktls->tck;
|
|
|
|
} else {
|
|
|
|
if (ktls->filter_count > BNXT_MAX_KTLS_FILTER) {
|
|
|
|
rc = -ENOSPC;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
kctx_rx = kzalloc(sizeof(*kctx_rx), GFP_KERNEL);
|
|
|
|
if (!kctx_rx) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
spin_lock_init(&kctx_rx->resync_lock);
|
|
|
|
bnxt_set_ktls_ctx_rx(tls_ctx, kctx_rx);
|
|
|
|
kctx = &ktls->rck;
|
|
|
|
}
|
|
|
|
rc = bnxt_key_ctx_alloc_one(bp, kctx, &kid);
|
2024-06-12 13:13:20 +08:00
|
|
|
if (rc)
|
2024-07-12 18:27:24 +08:00
|
|
|
goto free_ctx_rx;
|
|
|
|
rc = bnxt_crypto_add(bp, direction, crypto_info, start_offload_tcp_sn,
|
|
|
|
kid);
|
2024-06-12 13:13:20 +08:00
|
|
|
if (rc)
|
2024-07-12 18:27:24 +08:00
|
|
|
goto free_kctx;
|
|
|
|
if (direction == TLS_OFFLOAD_CTX_DIR_TX) {
|
|
|
|
kctx_tx->kid = kid;
|
|
|
|
kctx_tx->tcp_seq_no = start_offload_tcp_sn;
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_TX_ADD]);
|
|
|
|
} else {
|
|
|
|
kctx_rx->kid = kid;
|
|
|
|
rc = bnxt_hwrm_cfa_tls_filter_alloc(bp, sk, kid);
|
|
|
|
if (rc) {
|
|
|
|
int err = bnxt_crypto_del(bp, direction, kid);
|
|
|
|
|
|
|
|
/* If unable to free, keep the KID */
|
|
|
|
if (err)
|
|
|
|
goto free_ctx_rx;
|
|
|
|
goto free_kctx;
|
|
|
|
}
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_ADD]);
|
|
|
|
}
|
|
|
|
free_kctx:
|
|
|
|
if (rc)
|
|
|
|
bnxt_free_one_kctx(kctx, kid);
|
|
|
|
free_ctx_rx:
|
|
|
|
if (rc)
|
|
|
|
kfree(kctx_rx);
|
|
|
|
exit:
|
|
|
|
atomic_dec(&ktls->pending);
|
2024-06-12 13:13:20 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
#if defined(BNXT_FPGA)
|
|
|
|
#define BNXT_RETRY_MAX 200
|
|
|
|
#else
|
|
|
|
#define BNXT_RETRY_MAX 20
|
|
|
|
#endif
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
static void bnxt_ktls_dev_del(struct net_device *dev,
|
|
|
|
struct tls_context *tls_ctx,
|
|
|
|
enum tls_offload_ctx_dir direction)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_offload_ctx_tx *kctx_tx;
|
2024-07-12 18:27:24 +08:00
|
|
|
struct bnxt_ktls_offload_ctx_rx *kctx_rx;
|
2024-06-12 13:13:20 +08:00
|
|
|
struct bnxt *bp = netdev_priv(dev);
|
|
|
|
struct bnxt_ktls_info *ktls;
|
2024-07-12 18:27:24 +08:00
|
|
|
struct bnxt_kctx *kctx;
|
|
|
|
int retry_cnt = 0;
|
|
|
|
u32 kid;
|
2024-06-12 13:13:20 +08:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
ktls = bp->ktls_info;
|
2024-07-12 18:27:24 +08:00
|
|
|
retry:
|
|
|
|
atomic_inc(&ktls->pending);
|
|
|
|
/* Make sure bnxt_close_nic() sees pending before we check the
|
|
|
|
* BNXT_STATE_OPEN flag.
|
|
|
|
*/
|
|
|
|
smp_mb__after_atomic();
|
|
|
|
while (!test_bit(BNXT_STATE_OPEN, &bp->state)) {
|
|
|
|
atomic_dec(&ktls->pending);
|
|
|
|
if (!netif_running(dev))
|
|
|
|
return;
|
|
|
|
if (retry_cnt > BNXT_RETRY_MAX) {
|
|
|
|
netdev_warn(bp->dev, "%s retry max %d exceeded, state %lx\n",
|
|
|
|
__func__, retry_cnt, bp->state);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
retry_cnt++;
|
|
|
|
msleep(100);
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (direction == TLS_OFFLOAD_CTX_DIR_TX) {
|
|
|
|
kctx_tx = __tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_TX);
|
|
|
|
kid = kctx_tx->kid;
|
|
|
|
kctx = &ktls->tck;
|
|
|
|
} else {
|
|
|
|
kctx_rx = bnxt_get_ktls_ctx_rx(tls_ctx);
|
|
|
|
kid = kctx_rx->kid;
|
|
|
|
kctx = &ktls->rck;
|
|
|
|
bnxt_hwrm_cfa_tls_filter_free(bp, kid);
|
|
|
|
kfree(kctx_rx);
|
|
|
|
}
|
|
|
|
rc = bnxt_crypto_del(bp, direction, kid);
|
2024-06-12 13:13:20 +08:00
|
|
|
if (!rc) {
|
2024-07-12 18:27:24 +08:00
|
|
|
bnxt_free_one_kctx(kctx, kid);
|
|
|
|
if (direction == TLS_OFFLOAD_CTX_DIR_TX)
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_TX_DEL]);
|
|
|
|
else
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_DEL]);
|
2024-06-12 13:13:20 +08:00
|
|
|
}
|
2024-07-12 18:27:24 +08:00
|
|
|
atomic_dec(&ktls->pending);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
bnxt_ktls_dev_resync(struct net_device *dev, struct sock *sk, u32 seq,
|
|
|
|
u8 *rcd_sn, enum tls_offload_ctx_dir direction)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_offload_ctx_rx *kctx_rx;
|
|
|
|
struct ce_resync_resp_ack_cmd cmd = {0};
|
|
|
|
struct bnxt *bp = netdev_priv(dev);
|
|
|
|
struct bnxt_tx_ring_info *txr;
|
|
|
|
struct bnxt_ktls_info *ktls;
|
|
|
|
struct tls_context *tls_ctx;
|
|
|
|
struct bnxt_mpc_info *mpc;
|
|
|
|
u32 data;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (direction == TLS_OFFLOAD_CTX_DIR_TX)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
ktls = bp->ktls_info;
|
|
|
|
atomic_inc(&ktls->pending);
|
|
|
|
/* Make sure bnxt_close_nic() sees pending before we check the
|
|
|
|
* BNXT_STATE_OPEN flag.
|
|
|
|
*/
|
|
|
|
smp_mb__after_atomic();
|
|
|
|
if (!test_bit(BNXT_STATE_OPEN, &bp->state)) {
|
|
|
|
atomic_dec(&ktls->pending);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
mpc = bp->mpc_info;
|
|
|
|
txr = &mpc->mpc_rings[BNXT_MPC_RCE_TYPE][0];
|
|
|
|
tls_ctx = tls_get_ctx(sk);
|
|
|
|
kctx_rx = bnxt_get_ktls_ctx_rx(tls_ctx);
|
|
|
|
spin_lock_bh(&kctx_rx->resync_lock);
|
|
|
|
if (!kctx_rx->resync_pending || seq != kctx_rx->resync_tcp_seq_no) {
|
|
|
|
spin_unlock_bh(&kctx_rx->resync_lock);
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_RESYNC_DISCARD]);
|
|
|
|
atomic_dec(&ktls->pending);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
kctx_rx->resync_pending = false;
|
|
|
|
spin_unlock_bh(&kctx_rx->resync_lock);
|
|
|
|
data = CE_RESYNC_RESP_ACK_CMD_OPCODE_RESYNC |
|
|
|
|
(kctx_rx->kid << CE_RESYNC_RESP_ACK_CMD_KID_SFT);
|
|
|
|
cmd.resync_status_kid_opcode = cpu_to_le32(data);
|
|
|
|
cmd.resync_record_tcp_seq_num = cpu_to_le32(seq - TLS_HEADER_SIZE + 1);
|
|
|
|
bnxt_copy_tls_mp_data(&cmd.resync_record_seq_num_end, rcd_sn,
|
|
|
|
sizeof(cmd.resync_record_seq_num));
|
|
|
|
rc = bnxt_xmit_crypto_cmd(bp, txr, &cmd, sizeof(cmd), 0);
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_RESYNC_ACK]);
|
|
|
|
atomic_dec(&ktls->pending);
|
|
|
|
return rc;
|
2024-06-12 13:13:20 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static const struct tlsdev_ops bnxt_ktls_ops = {
|
|
|
|
.tls_dev_add = bnxt_ktls_dev_add,
|
|
|
|
.tls_dev_del = bnxt_ktls_dev_del,
|
2024-07-12 18:27:24 +08:00
|
|
|
.tls_dev_resync = bnxt_ktls_dev_resync,
|
2024-06-12 13:13:20 +08:00
|
|
|
};
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
static int bnxt_set_partition_mode(struct bnxt *bp)
|
|
|
|
{
|
|
|
|
struct hwrm_func_cfg_input *req;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = bnxt_hwrm_func_cfg_short_req_init(bp, &req);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
req->fid = cpu_to_le16(0xffff);
|
|
|
|
req->enables2 = cpu_to_le32(FUNC_CFG_REQ_ENABLES2_XID_PARTITION_CFG);
|
|
|
|
req->xid_partition_cfg =
|
|
|
|
cpu_to_le16(FUNC_CFG_REQ_XID_PARTITION_CFG_TX_CK |
|
|
|
|
FUNC_CFG_REQ_XID_PARTITION_CFG_RX_CK);
|
|
|
|
return hwrm_req_send(bp, req);
|
|
|
|
}
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
int bnxt_ktls_init(struct bnxt *bp)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct bnxt_hw_resc *hw_resc = &bp->hw_resc;
|
|
|
|
struct net_device *dev = bp->dev;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (!ktls)
|
|
|
|
return 0;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
ktls->tck.max_ctx = hw_resc->resv_tx_key_ctxs;
|
|
|
|
ktls->rck.max_ctx = hw_resc->resv_rx_key_ctxs;
|
2024-06-12 13:13:20 +08:00
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
if (!ktls->tck.max_ctx || !ktls->rck.max_ctx)
|
2024-06-12 13:13:20 +08:00
|
|
|
return 0;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
if (ktls->partition_mode) {
|
|
|
|
rc = bnxt_set_partition_mode(bp);
|
|
|
|
if (rc)
|
|
|
|
ktls->partition_mode = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = bnxt_hwrm_key_ctx_alloc(bp, &ktls->tck, BNXT_KID_BATCH_SIZE, NULL);
|
2024-06-12 13:13:20 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
rc = bnxt_hwrm_key_ctx_alloc(bp, &ktls->rck, BNXT_KID_BATCH_SIZE, NULL);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
ktls->mpc_cache = kmem_cache_create("bnxt_ktls",
|
|
|
|
sizeof(struct bnxt_crypto_cmd_ctx),
|
|
|
|
0, 0, NULL);
|
|
|
|
if (!ktls->mpc_cache)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
dev->tlsdev_ops = &bnxt_ktls_ops;
|
2024-07-12 18:27:24 +08:00
|
|
|
dev->hw_features |= NETIF_F_HW_TLS_TX | NETIF_F_HW_TLS_RX;
|
|
|
|
dev->features |= NETIF_F_HW_TLS_TX | NETIF_F_HW_TLS_RX;
|
2024-06-12 13:13:20 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
void bnxt_ktls_mpc_cmp(struct bnxt *bp, u32 client, unsigned long handle,
|
2024-06-12 13:13:20 +08:00
|
|
|
struct bnxt_cmpl_entry cmpl[], u32 entries)
|
|
|
|
{
|
|
|
|
struct bnxt_crypto_cmd_ctx *ctx;
|
2024-07-12 18:27:24 +08:00
|
|
|
struct ce_cmpl *cmp;
|
|
|
|
u32 len, kid;
|
2024-06-12 13:13:20 +08:00
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
cmp = cmpl[0].cmpl;
|
2024-06-12 13:13:20 +08:00
|
|
|
if (!handle || entries != 1) {
|
2024-07-12 18:27:24 +08:00
|
|
|
if (entries != 1) {
|
|
|
|
netdev_warn(bp->dev, "Invalid entries %d with handle %lx cmpl %08x in %s()\n",
|
|
|
|
entries, handle, *(u32 *)cmp, __func__);
|
|
|
|
}
|
2024-06-12 13:13:20 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
ctx = (void *)handle;
|
2024-07-12 18:27:24 +08:00
|
|
|
kid = CE_CMPL_KID(cmp);
|
|
|
|
if (ctx->ce_cmp.opaque != BNXT_KMPC_OPAQUE(client, kid)) {
|
|
|
|
netdev_warn(bp->dev, "Invalid CE cmpl software opaque %08x, cmpl %08x, kid %x\n",
|
|
|
|
ctx->ce_cmp.opaque, *(u32 *)cmp, kid);
|
|
|
|
return;
|
|
|
|
}
|
2024-06-12 13:13:20 +08:00
|
|
|
len = min_t(u32, cmpl[0].len, sizeof(ctx->ce_cmp));
|
|
|
|
memcpy(&ctx->ce_cmp, cmpl[0].cmpl, len);
|
|
|
|
complete(&ctx->cmp);
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
static void bnxt_ktls_pre_xmit(struct bnxt *bp, struct bnxt_tx_ring_info *txr,
|
|
|
|
u32 kid, struct crypto_prefix_cmd *pre_cmd)
|
|
|
|
{
|
|
|
|
struct bnxt_sw_tx_bd *tx_buf;
|
|
|
|
struct tx_bd_presync *psbd;
|
|
|
|
u32 bd_space, space;
|
|
|
|
u8 *pcmd;
|
|
|
|
u16 prod;
|
|
|
|
|
|
|
|
prod = txr->tx_prod;
|
|
|
|
tx_buf = &txr->tx_buf_ring[RING_TX(bp, prod)];
|
|
|
|
|
|
|
|
psbd = (void *)&txr->tx_desc_ring[TX_RING(bp, prod)][TX_IDX(prod)];
|
|
|
|
psbd->tx_bd_len_flags_type = CRYPTO_PRESYNC_BD_CMD;
|
|
|
|
psbd->tx_bd_kid = cpu_to_le32(kid);
|
|
|
|
psbd->tx_bd_opaque =
|
|
|
|
SET_TX_OPAQUE(bp, txr, prod, CRYPTO_PREFIX_CMD_BDS + 1);
|
|
|
|
|
|
|
|
prod = NEXT_TX(prod);
|
|
|
|
pcmd = (void *)&txr->tx_desc_ring[TX_RING(bp, prod)][TX_IDX(prod)];
|
|
|
|
bd_space = TX_DESC_CNT - TX_IDX(prod);
|
|
|
|
space = bd_space * sizeof(struct tx_bd);
|
|
|
|
if (space >= CRYPTO_PREFIX_CMD_SIZE) {
|
|
|
|
memcpy(pcmd, pre_cmd, CRYPTO_PREFIX_CMD_SIZE);
|
|
|
|
prod += CRYPTO_PREFIX_CMD_BDS;
|
|
|
|
} else {
|
|
|
|
memcpy(pcmd, pre_cmd, space);
|
|
|
|
prod += bd_space;
|
|
|
|
pcmd = (void *)&txr->tx_desc_ring[TX_RING(bp, prod)][TX_IDX(prod)];
|
|
|
|
memcpy(pcmd, (u8 *)pre_cmd + space,
|
|
|
|
CRYPTO_PREFIX_CMD_SIZE - space);
|
|
|
|
prod += CRYPTO_PREFIX_CMD_BDS - bd_space;
|
|
|
|
}
|
|
|
|
txr->tx_prod = prod;
|
|
|
|
tx_buf->is_push = 1;
|
|
|
|
tx_buf->inline_data_bds = CRYPTO_PREFIX_CMD_BDS - 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct sk_buff *
|
|
|
|
bnxt_ktls_tx_replay(struct bnxt *bp, struct bnxt_tx_ring_info *txr,
|
|
|
|
struct sk_buff *skb, struct tls_record_info *record,
|
|
|
|
u32 replay_len)
|
|
|
|
{
|
|
|
|
int headlen, headroom;
|
|
|
|
struct sk_buff *nskb;
|
|
|
|
struct ipv6hdr *ip6h;
|
|
|
|
struct tcphdr *th;
|
|
|
|
struct iphdr *iph;
|
|
|
|
int remaining, i;
|
|
|
|
|
|
|
|
headlen = skb_headlen(skb);
|
|
|
|
headroom = skb_headroom(skb);
|
|
|
|
nskb = alloc_skb(headlen + headroom, GFP_ATOMIC);
|
|
|
|
if (!nskb)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
skb_reserve(nskb, headroom);
|
|
|
|
skb_put(nskb, headlen);
|
|
|
|
memcpy(nskb->data, skb->data, headlen);
|
|
|
|
skb_copy_header(nskb, skb);
|
|
|
|
skb_gso_reset(nskb);
|
|
|
|
th = tcp_hdr(nskb);
|
|
|
|
th->seq = htonl(tls_record_start_seq(record));
|
|
|
|
if (skb->protocol == htons(ETH_P_IPV6)) {
|
|
|
|
ip6h = ipv6_hdr(nskb);
|
|
|
|
ip6h->payload_len = htons(replay_len + __tcp_hdrlen(th));
|
|
|
|
} else {
|
|
|
|
iph = ip_hdr(nskb);
|
|
|
|
iph->tot_len = htons(replay_len + __tcp_hdrlen(th) +
|
|
|
|
ip_hdrlen(nskb));
|
|
|
|
}
|
|
|
|
remaining = replay_len;
|
|
|
|
for (i = 0; remaining > 0 && i < record->num_frags; i++) {
|
|
|
|
skb_frag_t *frag = &skb_shinfo(nskb)->frags[i];
|
|
|
|
int len;
|
|
|
|
|
|
|
|
len = skb_frag_size(&record->frags[i]) >= remaining ?
|
|
|
|
remaining :
|
|
|
|
skb_frag_size(&record->frags[i]);
|
|
|
|
|
|
|
|
skb_frag_page_copy(frag, &record->frags[i]);
|
|
|
|
__skb_frag_ref(frag);
|
|
|
|
skb_frag_off_copy(frag, &record->frags[i]);
|
|
|
|
skb_frag_size_set(frag, len);
|
|
|
|
nskb->data_len += len;
|
|
|
|
nskb->len += len;
|
|
|
|
remaining -= len;
|
|
|
|
}
|
|
|
|
if (remaining) {
|
|
|
|
dev_kfree_skb_any(nskb);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
skb_shinfo(nskb)->nr_frags = i;
|
|
|
|
return nskb;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bnxt_ktls_tx_ooo(struct bnxt *bp, struct bnxt_tx_ring_info *txr,
|
|
|
|
struct sk_buff *skb, u32 payload_len, u32 seq,
|
|
|
|
struct tls_context *tls_ctx)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct tls_offload_context_tx *tx_tls_ctx;
|
|
|
|
struct bnxt_ktls_offload_ctx_tx *kctx_tx;
|
|
|
|
struct crypto_prefix_cmd *pcmd;
|
|
|
|
struct tls_record_info *record;
|
|
|
|
struct sk_buff *nskb = NULL;
|
|
|
|
unsigned long flags;
|
|
|
|
u32 hdr_tcp_seq;
|
|
|
|
u64 rec_sn;
|
|
|
|
u8 *hdr;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
tx_tls_ctx = tls_offload_ctx_tx(tls_ctx);
|
|
|
|
kctx_tx = __tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_TX);
|
|
|
|
if (before(seq, kctx_tx->tcp_seq_no)) {
|
|
|
|
u32 total_bds;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&tx_tls_ctx->lock, flags);
|
|
|
|
record = tls_get_record(tx_tls_ctx, seq, &rec_sn);
|
|
|
|
if (!record || !record->num_frags) {
|
|
|
|
rc = -EPROTO;
|
|
|
|
goto unlock_exit;
|
|
|
|
}
|
|
|
|
hdr_tcp_seq = tls_record_start_seq(record);
|
|
|
|
hdr = skb_frag_address_safe(&record->frags[0]);
|
|
|
|
|
|
|
|
total_bds = CRYPTO_PRESYNC_BDS + skb_shinfo(skb)->nr_frags + 2;
|
|
|
|
if (bnxt_tx_avail(bp, txr) < total_bds) {
|
|
|
|
rc = -ENOSPC;
|
|
|
|
goto unlock_exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
pcmd = kzalloc(sizeof(*pcmd), GFP_ATOMIC);
|
|
|
|
if (!pcmd) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto unlock_exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
pcmd->header_tcp_seq_num = cpu_to_le32(hdr_tcp_seq);
|
|
|
|
pcmd->start_tcp_seq_num = cpu_to_le32(seq);
|
|
|
|
pcmd->end_tcp_seq_num = cpu_to_le32(seq + payload_len - 1);
|
|
|
|
if (tls_ctx->prot_info.version == TLS_1_2_VERSION)
|
|
|
|
memcpy(pcmd->explicit_nonce, hdr + 5,
|
|
|
|
tls_ctx->prot_info.iv_size);
|
|
|
|
memcpy(&pcmd->record_seq_num[0], &rec_sn, sizeof(rec_sn));
|
|
|
|
|
|
|
|
/* retransmission includes tag bytes */
|
|
|
|
if (before(record->end_seq - tls_ctx->prot_info.tag_size,
|
|
|
|
seq + payload_len)) {
|
|
|
|
u32 replay_len = seq - hdr_tcp_seq;
|
|
|
|
|
|
|
|
nskb = bnxt_ktls_tx_replay(bp, txr, skb, record,
|
|
|
|
replay_len);
|
|
|
|
if (!nskb) {
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto free_exit;
|
|
|
|
}
|
|
|
|
total_bds += skb_shinfo(nskb)->nr_frags + 2;
|
|
|
|
if (bnxt_tx_avail(bp, txr) < total_bds) {
|
|
|
|
dev_kfree_skb_any(nskb);
|
|
|
|
rc = -ENOSPC;
|
|
|
|
goto free_exit;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rc = 0;
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_TX_RETRANS]);
|
|
|
|
bnxt_ktls_pre_xmit(bp, txr, kctx_tx->kid, pcmd);
|
|
|
|
|
|
|
|
if (nskb) {
|
|
|
|
struct netdev_queue *txq;
|
|
|
|
u32 kid = kctx_tx->kid;
|
|
|
|
__le32 lflags;
|
|
|
|
int txq_map;
|
|
|
|
|
|
|
|
txq_map = skb_get_queue_mapping(nskb);
|
|
|
|
txq = netdev_get_tx_queue(bp->dev, txq_map);
|
|
|
|
lflags = cpu_to_le32(TX_BD_FLAGS_CRYPTO_EN |
|
|
|
|
BNXT_TX_KID_LO(kid));
|
|
|
|
__bnxt_start_xmit(bp, txq, txr, nskb, lflags, kid);
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_TX_REPLAY]);
|
|
|
|
}
|
|
|
|
free_exit:
|
|
|
|
kfree(pcmd);
|
|
|
|
|
|
|
|
unlock_exit:
|
|
|
|
spin_unlock_irqrestore(&tx_tls_ctx->lock, flags);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct sk_buff *bnxt_ktls_xmit(struct bnxt *bp, struct bnxt_tx_ring_info *txr,
|
|
|
|
struct sk_buff *skb, __le32 *lflags, u32 *kid)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct bnxt_ktls_offload_ctx_tx *kctx_tx;
|
|
|
|
struct tls_context *tls_ctx;
|
|
|
|
u32 seq;
|
|
|
|
|
|
|
|
if (!IS_ENABLED(CONFIG_TLS_DEVICE) || !skb->sk ||
|
|
|
|
!tls_is_skb_tx_device_offloaded(skb))
|
|
|
|
return skb;
|
|
|
|
|
|
|
|
seq = ntohl(tcp_hdr(skb)->seq);
|
|
|
|
tls_ctx = tls_get_ctx(skb->sk);
|
|
|
|
kctx_tx = __tls_driver_ctx(tls_ctx, TLS_OFFLOAD_CTX_DIR_TX);
|
|
|
|
if (kctx_tx->tcp_seq_no == seq) {
|
|
|
|
kctx_tx->tcp_seq_no += skb->len - skb_tcp_all_headers(skb);
|
|
|
|
*kid = kctx_tx->kid;
|
|
|
|
*lflags |= cpu_to_le32(TX_BD_FLAGS_CRYPTO_EN |
|
|
|
|
BNXT_TX_KID_LO(*kid));
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_TX_HW_PKT]);
|
|
|
|
} else {
|
|
|
|
u32 payload_len;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
payload_len = skb->len - skb_tcp_all_headers(skb);
|
|
|
|
if (!payload_len)
|
|
|
|
return skb;
|
|
|
|
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_TX_OOO]);
|
|
|
|
|
|
|
|
rc = bnxt_ktls_tx_ooo(bp, txr, skb, payload_len, seq, tls_ctx);
|
|
|
|
if (rc) {
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_TX_SW_PKT]);
|
|
|
|
return tls_encrypt_skb(skb);
|
|
|
|
}
|
|
|
|
*kid = kctx_tx->kid;
|
|
|
|
*lflags |= cpu_to_le32(TX_BD_FLAGS_CRYPTO_EN |
|
|
|
|
BNXT_TX_KID_LO(*kid));
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bnxt_ktls_resync_nak(struct bnxt *bp, u32 kid, u32 seq)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
struct bnxt_mpc_info *mpc = bp->mpc_info;
|
|
|
|
struct ce_resync_resp_ack_cmd cmd = {0};
|
|
|
|
struct bnxt_tx_ring_info *txr;
|
|
|
|
u32 data;
|
|
|
|
|
|
|
|
txr = &mpc->mpc_rings[BNXT_MPC_RCE_TYPE][0];
|
|
|
|
data = CE_RESYNC_RESP_ACK_CMD_OPCODE_RESYNC |
|
|
|
|
(kid << CE_RESYNC_RESP_ACK_CMD_KID_SFT) |
|
|
|
|
CE_RESYNC_RESP_ACK_CMD_RESYNC_STATUS_NAK;
|
|
|
|
cmd.resync_status_kid_opcode = cpu_to_le32(data);
|
|
|
|
cmd.resync_record_tcp_seq_num = cpu_to_le32(seq - TLS_HEADER_SIZE + 1);
|
|
|
|
bnxt_xmit_crypto_cmd(bp, txr, &cmd, sizeof(cmd), 0);
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_RESYNC_NAK]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bnxt_ktls_rx_resync_exp(struct bnxt *bp,
|
|
|
|
struct bnxt_ktls_offload_ctx_rx *kctx_rx,
|
|
|
|
u32 bytes)
|
|
|
|
{
|
|
|
|
u32 tcp_seq_no;
|
|
|
|
|
|
|
|
spin_lock_bh(&kctx_rx->resync_lock);
|
|
|
|
if (!kctx_rx->resync_pending)
|
|
|
|
goto unlock;
|
|
|
|
kctx_rx->bytes_since_resync += bytes;
|
|
|
|
if (kctx_rx->bytes_since_resync > BNXT_KTLS_MAX_RESYNC_BYTES &&
|
|
|
|
time_after(jiffies, kctx_rx->resync_timestamp +
|
|
|
|
BNXT_KTLS_RESYNC_TMO)) {
|
|
|
|
kctx_rx->resync_pending = false;
|
|
|
|
tcp_seq_no = kctx_rx->resync_tcp_seq_no;
|
|
|
|
spin_unlock_bh(&kctx_rx->resync_lock);
|
|
|
|
bnxt_ktls_resync_nak(bp, kctx_rx->kid, tcp_seq_no);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
unlock:
|
|
|
|
spin_unlock_bh(&kctx_rx->resync_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define BNXT_METADATA_OFF(len) ALIGN(len, 32)
|
|
|
|
|
|
|
|
void bnxt_ktls_rx(struct bnxt *bp, struct sk_buff *skb, u8 *data_ptr,
|
|
|
|
unsigned int len, struct rx_cmp *rxcmp,
|
|
|
|
struct rx_cmp_ext *rxcmp1)
|
|
|
|
{
|
|
|
|
struct bnxt_ktls_info *ktls = bp->ktls_info;
|
|
|
|
unsigned int off = BNXT_METADATA_OFF(len);
|
|
|
|
struct bnxt_ktls_offload_ctx_rx *kctx_rx;
|
|
|
|
struct tls_metadata_base_msg *md;
|
|
|
|
struct tls_context *tls_ctx;
|
|
|
|
u32 md_data;
|
|
|
|
|
|
|
|
md = (struct tls_metadata_base_msg *)(data_ptr + off);
|
|
|
|
md_data = le32_to_cpu(md->md_type_link_flags_kid_lo);
|
|
|
|
if (md_data & TLS_METADATA_BASE_MSG_FLAGS_DECRYPTED) {
|
|
|
|
skb->decrypted = true;
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_HW_PKT]);
|
|
|
|
} else {
|
|
|
|
u32 misc = le32_to_cpu(rxcmp->rx_cmp_misc_v1);
|
|
|
|
struct tls_metadata_resync_msg *resync_msg;
|
|
|
|
u32 payload_off, tcp_seq, md_type;
|
|
|
|
struct net_device *dev = bp->dev;
|
|
|
|
struct net *net = dev_net(dev);
|
|
|
|
u8 agg_bufs, *l3_ptr;
|
|
|
|
struct tcphdr *th;
|
|
|
|
struct sock *sk;
|
|
|
|
|
|
|
|
payload_off = RX_CMP_PAYLOAD_OFF(misc);
|
|
|
|
agg_bufs = (misc & RX_CMP_AGG_BUFS) >> RX_CMP_AGG_BUFS_SHIFT;
|
|
|
|
/* No payload */
|
|
|
|
if (payload_off == len && !agg_bufs)
|
|
|
|
return;
|
|
|
|
|
|
|
|
l3_ptr = data_ptr + RX_CMP_INNER_L3_OFF(rxcmp1);
|
|
|
|
if (RX_CMP_IS_IPV6(rxcmp1)) {
|
|
|
|
struct ipv6hdr *ip6h = (struct ipv6hdr *)l3_ptr;
|
|
|
|
u8 *nextp = (u8 *)(ip6h + 1);
|
|
|
|
u8 nexthdr = ip6h->nexthdr;
|
|
|
|
|
|
|
|
while (ipv6_ext_hdr(nexthdr)) {
|
|
|
|
struct ipv6_opt_hdr *hp;
|
|
|
|
|
|
|
|
hp = (struct ipv6_opt_hdr *)nextp;
|
|
|
|
if (nexthdr == NEXTHDR_AUTH)
|
|
|
|
nextp += ipv6_authlen(hp);
|
|
|
|
else
|
|
|
|
nextp += ipv6_optlen(hp);
|
|
|
|
nexthdr = hp->nexthdr;
|
|
|
|
}
|
|
|
|
th = (struct tcphdr *)nextp;
|
|
|
|
sk = __inet6_lookup_established(net,
|
|
|
|
net->ipv4.tcp_death_row.hashinfo,
|
|
|
|
&ip6h->saddr, th->source, &ip6h->daddr,
|
|
|
|
ntohs(th->dest), dev->ifindex, 0);
|
|
|
|
} else {
|
|
|
|
struct iphdr *iph = (struct iphdr *)l3_ptr;
|
|
|
|
|
|
|
|
th = (struct tcphdr *)(l3_ptr + iph->ihl * 4);
|
|
|
|
sk = inet_lookup_established(net,
|
|
|
|
net->ipv4.tcp_death_row.hashinfo,
|
|
|
|
iph->saddr, th->source, iph->daddr,
|
|
|
|
th->dest, dev->ifindex);
|
|
|
|
}
|
|
|
|
if (!sk)
|
|
|
|
goto rx_done_no_sk;
|
|
|
|
|
|
|
|
if (!tls_is_sk_rx_device_offloaded(sk))
|
|
|
|
goto rx_done;
|
|
|
|
|
|
|
|
tls_ctx = tls_get_ctx(sk);
|
|
|
|
kctx_rx = bnxt_get_ktls_ctx_rx(tls_ctx);
|
|
|
|
|
|
|
|
md_type = md_data & TLS_METADATA_BASE_MSG_MD_TYPE_MASK;
|
|
|
|
if (md_type != TLS_METADATA_BASE_MSG_MD_TYPE_TLS_RESYNC) {
|
|
|
|
bnxt_ktls_rx_resync_exp(bp, kctx_rx, len - payload_off);
|
|
|
|
goto rx_done;
|
|
|
|
}
|
|
|
|
|
|
|
|
resync_msg = (struct tls_metadata_resync_msg *)md;
|
|
|
|
tcp_seq = le32_to_cpu(resync_msg->resync_record_tcp_seq_num);
|
|
|
|
tcp_seq += TLS_HEADER_SIZE - 1;
|
|
|
|
|
|
|
|
spin_lock_bh(&kctx_rx->resync_lock);
|
|
|
|
kctx_rx->resync_pending = true;
|
|
|
|
kctx_rx->resync_tcp_seq_no = tcp_seq;
|
|
|
|
kctx_rx->bytes_since_resync = 0;
|
|
|
|
kctx_rx->resync_timestamp = jiffies;
|
|
|
|
spin_unlock_bh(&kctx_rx->resync_lock);
|
|
|
|
|
|
|
|
tls_offload_rx_resync_request(sk, htonl(tcp_seq));
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_RESYNC_REQ]);
|
|
|
|
rx_done:
|
|
|
|
sock_gen_put(sk);
|
|
|
|
rx_done_no_sk:
|
|
|
|
atomic64_inc(&ktls->counters[BNXT_KTLS_RX_SW_PKT]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
#else /* HAVE_KTLS */
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
void bnxt_alloc_ktls_info(struct bnxt *bp, struct hwrm_func_qcaps_output *resp)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
void bnxt_clear_cfa_tls_filters_tbl(struct bnxt *bp)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
void bnxt_free_ktls_info(struct bnxt *bp)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2024-06-12 13:13:20 +08:00
|
|
|
void bnxt_hwrm_reserve_pf_key_ctxs(struct bnxt *bp,
|
|
|
|
struct hwrm_func_cfg_input *req)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
int bnxt_ktls_init(struct bnxt *bp)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2024-07-12 18:27:24 +08:00
|
|
|
void bnxt_ktls_mpc_cmp(struct bnxt *bp, u32 client, unsigned long handle,
|
2024-06-12 13:13:20 +08:00
|
|
|
struct bnxt_cmpl_entry cmpl[], u32 entries)
|
|
|
|
{
|
|
|
|
}
|
2024-07-12 18:27:24 +08:00
|
|
|
|
|
|
|
struct sk_buff *bnxt_ktls_xmit(struct bnxt *bp, struct bnxt_tx_ring_info *txr,
|
|
|
|
struct sk_buff *skb, __le32 *lflags, u32 *kid)
|
|
|
|
{
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
void bnxt_ktls_rx(struct bnxt *bp, struct sk_buff *skb, u8 *data_ptr,
|
|
|
|
unsigned int len, struct rx_cmp *rxcmp,
|
|
|
|
struct rx_cmp_ext *rxcmp1)
|
|
|
|
{
|
|
|
|
}
|
2024-06-12 13:13:20 +08:00
|
|
|
#endif /* HAVE_KTLS */
|