1 // SPDX-License-Identifier: GPL-2.0 OR Linux-OpenIBt
2 /* Copyright (c) 2020, Mellanox Technologies inc. All rights reserved. */
5 #include "ipsec_offload.h"
7 #include "en_accel/ipsec_fs.h"
9 #define MLX5_IPSEC_DEV_BASIC_CAPS (MLX5_ACCEL_IPSEC_CAP_DEVICE | MLX5_ACCEL_IPSEC_CAP_IPV6 | \
10 MLX5_ACCEL_IPSEC_CAP_LSO)
12 struct mlx5_ipsec_sa_ctx {
13 struct rhash_head hash;
17 struct mlx5_core_dev *dev;
18 struct mlx5_ipsec_esp_xfrm *mxfrm;
21 struct mlx5_ipsec_esp_xfrm {
22 /* reference counter of SA ctx */
23 struct mlx5_ipsec_sa_ctx *sa_ctx;
24 struct mutex lock; /* protects mlx5_ipsec_esp_xfrm */
25 struct mlx5_accel_esp_xfrm accel_xfrm;
28 static u32 mlx5_ipsec_offload_device_caps(struct mlx5_core_dev *mdev)
30 u32 caps = MLX5_IPSEC_DEV_BASIC_CAPS;
32 if (!mlx5_is_ipsec_device(mdev))
35 if (!MLX5_CAP_FLOWTABLE_NIC_TX(mdev, ipsec_encrypt) ||
36 !MLX5_CAP_FLOWTABLE_NIC_RX(mdev, ipsec_decrypt))
39 if (MLX5_CAP_IPSEC(mdev, ipsec_crypto_esp_aes_gcm_128_encrypt) &&
40 MLX5_CAP_IPSEC(mdev, ipsec_crypto_esp_aes_gcm_128_decrypt))
41 caps |= MLX5_ACCEL_IPSEC_CAP_ESP;
43 if (MLX5_CAP_IPSEC(mdev, ipsec_esn)) {
44 caps |= MLX5_ACCEL_IPSEC_CAP_ESN;
45 caps |= MLX5_ACCEL_IPSEC_CAP_TX_IV_IS_ESN;
48 /* We can accommodate up to 2^24 different IPsec objects
49 * because we use up to 24 bit in flow table metadata
50 * to hold the IPsec Object unique handle.
52 WARN_ON_ONCE(MLX5_CAP_IPSEC(mdev, log_max_ipsec_offload) > 24);
57 mlx5_ipsec_offload_esp_validate_xfrm_attrs(struct mlx5_core_dev *mdev,
58 const struct mlx5_accel_esp_xfrm_attrs *attrs)
60 if (attrs->replay_type != MLX5_ACCEL_ESP_REPLAY_NONE) {
61 mlx5_core_err(mdev, "Cannot offload xfrm states with anti replay (replay_type = %d)\n",
66 if (attrs->keymat_type != MLX5_ACCEL_ESP_KEYMAT_AES_GCM) {
67 mlx5_core_err(mdev, "Only aes gcm keymat is supported (keymat_type = %d)\n",
72 if (attrs->keymat.aes_gcm.iv_algo !=
73 MLX5_ACCEL_ESP_AES_GCM_IV_ALGO_SEQ) {
74 mlx5_core_err(mdev, "Only iv sequence algo is supported (iv_algo = %d)\n",
75 attrs->keymat.aes_gcm.iv_algo);
79 if (attrs->keymat.aes_gcm.key_len != 128 &&
80 attrs->keymat.aes_gcm.key_len != 256) {
81 mlx5_core_err(mdev, "Cannot offload xfrm states with key length other than 128/256 bit (key length = %d)\n",
82 attrs->keymat.aes_gcm.key_len);
86 if ((attrs->flags & MLX5_ACCEL_ESP_FLAGS_ESN_TRIGGERED) &&
87 !MLX5_CAP_IPSEC(mdev, ipsec_esn)) {
88 mlx5_core_err(mdev, "Cannot offload xfrm states with ESN triggered\n");
95 static struct mlx5_accel_esp_xfrm *
96 mlx5_ipsec_offload_esp_create_xfrm(struct mlx5_core_dev *mdev,
97 const struct mlx5_accel_esp_xfrm_attrs *attrs,
100 struct mlx5_ipsec_esp_xfrm *mxfrm;
103 err = mlx5_ipsec_offload_esp_validate_xfrm_attrs(mdev, attrs);
107 mxfrm = kzalloc(sizeof(*mxfrm), GFP_KERNEL);
109 return ERR_PTR(-ENOMEM);
111 mutex_init(&mxfrm->lock);
112 memcpy(&mxfrm->accel_xfrm.attrs, attrs,
113 sizeof(mxfrm->accel_xfrm.attrs));
115 return &mxfrm->accel_xfrm;
118 static void mlx5_ipsec_offload_esp_destroy_xfrm(struct mlx5_accel_esp_xfrm *xfrm)
120 struct mlx5_ipsec_esp_xfrm *mxfrm = container_of(xfrm, struct mlx5_ipsec_esp_xfrm,
123 /* assuming no sa_ctx are connected to this xfrm_ctx */
124 WARN_ON(mxfrm->sa_ctx);
128 struct mlx5_ipsec_obj_attrs {
129 const struct aes_gcm_keymat *aes_gcm;
135 static int mlx5_create_ipsec_obj(struct mlx5_core_dev *mdev,
136 struct mlx5_ipsec_obj_attrs *attrs,
139 const struct aes_gcm_keymat *aes_gcm = attrs->aes_gcm;
140 u32 out[MLX5_ST_SZ_DW(general_obj_out_cmd_hdr)];
141 u32 in[MLX5_ST_SZ_DW(create_ipsec_obj_in)] = {};
142 void *obj, *salt_p, *salt_iv_p;
145 obj = MLX5_ADDR_OF(create_ipsec_obj_in, in, ipsec_object);
147 /* salt and seq_iv */
148 salt_p = MLX5_ADDR_OF(ipsec_obj, obj, salt);
149 memcpy(salt_p, &aes_gcm->salt, sizeof(aes_gcm->salt));
151 switch (aes_gcm->icv_len) {
153 MLX5_SET(ipsec_obj, obj, icv_length,
154 MLX5_IPSEC_OBJECT_ICV_LEN_8B);
157 MLX5_SET(ipsec_obj, obj, icv_length,
158 MLX5_IPSEC_OBJECT_ICV_LEN_12B);
161 MLX5_SET(ipsec_obj, obj, icv_length,
162 MLX5_IPSEC_OBJECT_ICV_LEN_16B);
167 salt_iv_p = MLX5_ADDR_OF(ipsec_obj, obj, implicit_iv);
168 memcpy(salt_iv_p, &aes_gcm->seq_iv, sizeof(aes_gcm->seq_iv));
170 if (attrs->accel_flags & MLX5_ACCEL_ESP_FLAGS_ESN_TRIGGERED) {
171 MLX5_SET(ipsec_obj, obj, esn_en, 1);
172 MLX5_SET(ipsec_obj, obj, esn_msb, attrs->esn_msb);
173 if (attrs->accel_flags & MLX5_ACCEL_ESP_FLAGS_ESN_STATE_OVERLAP)
174 MLX5_SET(ipsec_obj, obj, esn_overlap, 1);
177 MLX5_SET(ipsec_obj, obj, dekn, attrs->enc_key_id);
179 /* general object fields set */
180 MLX5_SET(general_obj_in_cmd_hdr, in, opcode,
181 MLX5_CMD_OP_CREATE_GENERAL_OBJECT);
182 MLX5_SET(general_obj_in_cmd_hdr, in, obj_type,
183 MLX5_GENERAL_OBJECT_TYPES_IPSEC);
185 err = mlx5_cmd_exec(mdev, in, sizeof(in), out, sizeof(out));
187 *ipsec_id = MLX5_GET(general_obj_out_cmd_hdr, out, obj_id);
192 static void mlx5_destroy_ipsec_obj(struct mlx5_core_dev *mdev, u32 ipsec_id)
194 u32 in[MLX5_ST_SZ_DW(general_obj_in_cmd_hdr)] = {};
195 u32 out[MLX5_ST_SZ_DW(general_obj_out_cmd_hdr)];
197 MLX5_SET(general_obj_in_cmd_hdr, in, opcode,
198 MLX5_CMD_OP_DESTROY_GENERAL_OBJECT);
199 MLX5_SET(general_obj_in_cmd_hdr, in, obj_type,
200 MLX5_GENERAL_OBJECT_TYPES_IPSEC);
201 MLX5_SET(general_obj_in_cmd_hdr, in, obj_id, ipsec_id);
203 mlx5_cmd_exec(mdev, in, sizeof(in), out, sizeof(out));
206 static void *mlx5_ipsec_offload_create_sa_ctx(struct mlx5_core_dev *mdev,
207 struct mlx5_accel_esp_xfrm *accel_xfrm,
208 const __be32 saddr[4], const __be32 daddr[4],
209 const __be32 spi, bool is_ipv6, u32 *hw_handle)
211 struct mlx5_accel_esp_xfrm_attrs *xfrm_attrs = &accel_xfrm->attrs;
212 struct aes_gcm_keymat *aes_gcm = &xfrm_attrs->keymat.aes_gcm;
213 struct mlx5_ipsec_obj_attrs ipsec_attrs = {};
214 struct mlx5_ipsec_esp_xfrm *mxfrm;
215 struct mlx5_ipsec_sa_ctx *sa_ctx;
218 /* alloc SA context */
219 sa_ctx = kzalloc(sizeof(*sa_ctx), GFP_KERNEL);
221 return ERR_PTR(-ENOMEM);
225 mxfrm = container_of(accel_xfrm, struct mlx5_ipsec_esp_xfrm, accel_xfrm);
226 mutex_lock(&mxfrm->lock);
227 sa_ctx->mxfrm = mxfrm;
230 err = mlx5_create_encryption_key(mdev, aes_gcm->aes_key,
231 aes_gcm->key_len / BITS_PER_BYTE,
232 MLX5_ACCEL_OBJ_IPSEC_KEY,
233 &sa_ctx->enc_key_id);
235 mlx5_core_dbg(mdev, "Failed to create encryption key (err = %d)\n", err);
239 ipsec_attrs.aes_gcm = aes_gcm;
240 ipsec_attrs.accel_flags = accel_xfrm->attrs.flags;
241 ipsec_attrs.esn_msb = accel_xfrm->attrs.esn;
242 ipsec_attrs.enc_key_id = sa_ctx->enc_key_id;
243 err = mlx5_create_ipsec_obj(mdev, &ipsec_attrs,
244 &sa_ctx->ipsec_obj_id);
246 mlx5_core_dbg(mdev, "Failed to create IPsec object (err = %d)\n", err);
250 *hw_handle = sa_ctx->ipsec_obj_id;
251 mxfrm->sa_ctx = sa_ctx;
252 mutex_unlock(&mxfrm->lock);
257 mlx5_destroy_encryption_key(mdev, sa_ctx->enc_key_id);
259 mutex_unlock(&mxfrm->lock);
264 static void mlx5_ipsec_offload_delete_sa_ctx(void *context)
266 struct mlx5_ipsec_sa_ctx *sa_ctx = (struct mlx5_ipsec_sa_ctx *)context;
267 struct mlx5_ipsec_esp_xfrm *mxfrm = sa_ctx->mxfrm;
269 mutex_lock(&mxfrm->lock);
270 mlx5_destroy_ipsec_obj(sa_ctx->dev, sa_ctx->ipsec_obj_id);
271 mlx5_destroy_encryption_key(sa_ctx->dev, sa_ctx->enc_key_id);
273 mxfrm->sa_ctx = NULL;
274 mutex_unlock(&mxfrm->lock);
277 static int mlx5_ipsec_offload_init(struct mlx5_core_dev *mdev)
282 static int mlx5_modify_ipsec_obj(struct mlx5_core_dev *mdev,
283 struct mlx5_ipsec_obj_attrs *attrs,
286 u32 in[MLX5_ST_SZ_DW(modify_ipsec_obj_in)] = {};
287 u32 out[MLX5_ST_SZ_DW(query_ipsec_obj_out)];
288 u64 modify_field_select = 0;
289 u64 general_obj_types;
293 if (!(attrs->accel_flags & MLX5_ACCEL_ESP_FLAGS_ESN_TRIGGERED))
296 general_obj_types = MLX5_CAP_GEN_64(mdev, general_obj_types);
297 if (!(general_obj_types & MLX5_HCA_CAP_GENERAL_OBJECT_TYPES_IPSEC))
300 /* general object fields set */
301 MLX5_SET(general_obj_in_cmd_hdr, in, opcode, MLX5_CMD_OP_QUERY_GENERAL_OBJECT);
302 MLX5_SET(general_obj_in_cmd_hdr, in, obj_type, MLX5_GENERAL_OBJECT_TYPES_IPSEC);
303 MLX5_SET(general_obj_in_cmd_hdr, in, obj_id, ipsec_id);
304 err = mlx5_cmd_exec(mdev, in, sizeof(in), out, sizeof(out));
306 mlx5_core_err(mdev, "Query IPsec object failed (Object id %d), err = %d\n",
311 obj = MLX5_ADDR_OF(query_ipsec_obj_out, out, ipsec_object);
312 modify_field_select = MLX5_GET64(ipsec_obj, obj, modify_field_select);
315 if (!(modify_field_select & MLX5_MODIFY_IPSEC_BITMASK_ESN_OVERLAP) ||
316 !(modify_field_select & MLX5_MODIFY_IPSEC_BITMASK_ESN_MSB))
319 obj = MLX5_ADDR_OF(modify_ipsec_obj_in, in, ipsec_object);
320 MLX5_SET(ipsec_obj, obj, esn_msb, attrs->esn_msb);
321 if (attrs->accel_flags & MLX5_ACCEL_ESP_FLAGS_ESN_STATE_OVERLAP)
322 MLX5_SET(ipsec_obj, obj, esn_overlap, 1);
324 /* general object fields set */
325 MLX5_SET(general_obj_in_cmd_hdr, in, opcode, MLX5_CMD_OP_MODIFY_GENERAL_OBJECT);
327 return mlx5_cmd_exec(mdev, in, sizeof(in), out, sizeof(out));
330 static int mlx5_ipsec_offload_esp_modify_xfrm(struct mlx5_accel_esp_xfrm *xfrm,
331 const struct mlx5_accel_esp_xfrm_attrs *attrs)
333 struct mlx5_ipsec_obj_attrs ipsec_attrs = {};
334 struct mlx5_core_dev *mdev = xfrm->mdev;
335 struct mlx5_ipsec_esp_xfrm *mxfrm;
339 if (!memcmp(&xfrm->attrs, attrs, sizeof(xfrm->attrs)))
342 if (mlx5_ipsec_offload_esp_validate_xfrm_attrs(mdev, attrs))
345 mxfrm = container_of(xfrm, struct mlx5_ipsec_esp_xfrm, accel_xfrm);
347 mutex_lock(&mxfrm->lock);
350 /* Not bound xfrm, change only sw attrs */
351 goto change_sw_xfrm_attrs;
353 /* need to add find and replace in ipsec_rhash_sa the sa_ctx */
354 /* modify device with new hw_sa */
355 ipsec_attrs.accel_flags = attrs->flags;
356 ipsec_attrs.esn_msb = attrs->esn;
357 err = mlx5_modify_ipsec_obj(mdev,
359 mxfrm->sa_ctx->ipsec_obj_id);
361 change_sw_xfrm_attrs:
363 memcpy(&xfrm->attrs, attrs, sizeof(xfrm->attrs));
365 mutex_unlock(&mxfrm->lock);
369 static const struct mlx5_accel_ipsec_ops ipsec_offload_ops = {
370 .device_caps = mlx5_ipsec_offload_device_caps,
371 .create_hw_context = mlx5_ipsec_offload_create_sa_ctx,
372 .free_hw_context = mlx5_ipsec_offload_delete_sa_ctx,
373 .init = mlx5_ipsec_offload_init,
374 .esp_create_xfrm = mlx5_ipsec_offload_esp_create_xfrm,
375 .esp_destroy_xfrm = mlx5_ipsec_offload_esp_destroy_xfrm,
376 .esp_modify_xfrm = mlx5_ipsec_offload_esp_modify_xfrm,
379 const struct mlx5_accel_ipsec_ops *mlx5_ipsec_offload_ops(struct mlx5_core_dev *mdev)
381 if (!mlx5_ipsec_offload_device_caps(mdev))
384 return &ipsec_offload_ops;