mirror of
https://github.com/torvalds/linux.git
synced 2024-11-28 15:11:31 +00:00
475747a193
Cannot know whether a Rx skb missing md_dst is intended for MACsec or not
without knowing whether the device is able to update this field during an
offload. Assume that an offload to a MACsec device cannot support updating
md_dst by default. Capable devices can advertise that they do indicate that
an skb is related to a MACsec offloaded packet using the md_dst.
Cc: Sabrina Dubroca <sd@queasysnail.net>
Cc: stable@vger.kernel.org
Fixes: 860ead89b8
("net/macsec: Add MACsec skb_metadata_dst Rx Data path support")
Signed-off-by: Rahul Rameshbabu <rrameshbabu@nvidia.com>
Reviewed-by: Benjamin Poirier <bpoirier@nvidia.com>
Reviewed-by: Cosmin Ratiu <cratiu@nvidia.com>
Reviewed-by: Sabrina Dubroca <sd@queasysnail.net>
Link: https://lore.kernel.org/r/20240423181319.115860-2-rrameshbabu@nvidia.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
385 lines
10 KiB
C
385 lines
10 KiB
C
/* SPDX-License-Identifier: GPL-2.0+ */
|
|
/*
|
|
* MACsec netdev header, used for h/w accelerated implementations.
|
|
*
|
|
* Copyright (c) 2015 Sabrina Dubroca <sd@queasysnail.net>
|
|
*/
|
|
#ifndef _NET_MACSEC_H_
|
|
#define _NET_MACSEC_H_
|
|
|
|
#include <linux/u64_stats_sync.h>
|
|
#include <linux/if_vlan.h>
|
|
#include <uapi/linux/if_link.h>
|
|
#include <uapi/linux/if_macsec.h>
|
|
|
|
#define MACSEC_DEFAULT_PN_LEN 4
|
|
#define MACSEC_XPN_PN_LEN 8
|
|
|
|
#define MACSEC_NUM_AN 4 /* 2 bits for the association number */
|
|
|
|
#define MACSEC_SCI_LEN 8
|
|
#define MACSEC_PORT_ES (htons(0x0001))
|
|
|
|
#define MACSEC_TCI_VERSION 0x80
|
|
#define MACSEC_TCI_ES 0x40 /* end station */
|
|
#define MACSEC_TCI_SC 0x20 /* SCI present */
|
|
#define MACSEC_TCI_SCB 0x10 /* epon */
|
|
#define MACSEC_TCI_E 0x08 /* encryption */
|
|
#define MACSEC_TCI_C 0x04 /* changed text */
|
|
#define MACSEC_AN_MASK 0x03 /* association number */
|
|
#define MACSEC_TCI_CONFID (MACSEC_TCI_E | MACSEC_TCI_C)
|
|
|
|
#define MACSEC_DEFAULT_ICV_LEN 16
|
|
|
|
typedef u64 __bitwise sci_t;
|
|
typedef u32 __bitwise ssci_t;
|
|
|
|
struct metadata_dst;
|
|
|
|
typedef union salt {
|
|
struct {
|
|
u32 ssci;
|
|
u64 pn;
|
|
} __packed;
|
|
u8 bytes[MACSEC_SALT_LEN];
|
|
} __packed salt_t;
|
|
|
|
typedef union pn {
|
|
struct {
|
|
#if defined(__LITTLE_ENDIAN_BITFIELD)
|
|
u32 lower;
|
|
u32 upper;
|
|
#elif defined(__BIG_ENDIAN_BITFIELD)
|
|
u32 upper;
|
|
u32 lower;
|
|
#else
|
|
#error "Please fix <asm/byteorder.h>"
|
|
#endif
|
|
};
|
|
u64 full64;
|
|
} pn_t;
|
|
|
|
/**
|
|
* struct macsec_key - SA key
|
|
* @id: user-provided key identifier
|
|
* @tfm: crypto struct, key storage
|
|
* @salt: salt used to generate IV in XPN cipher suites
|
|
*/
|
|
struct macsec_key {
|
|
u8 id[MACSEC_KEYID_LEN];
|
|
struct crypto_aead *tfm;
|
|
salt_t salt;
|
|
};
|
|
|
|
struct macsec_rx_sc_stats {
|
|
__u64 InOctetsValidated;
|
|
__u64 InOctetsDecrypted;
|
|
__u64 InPktsUnchecked;
|
|
__u64 InPktsDelayed;
|
|
__u64 InPktsOK;
|
|
__u64 InPktsInvalid;
|
|
__u64 InPktsLate;
|
|
__u64 InPktsNotValid;
|
|
__u64 InPktsNotUsingSA;
|
|
__u64 InPktsUnusedSA;
|
|
};
|
|
|
|
struct macsec_rx_sa_stats {
|
|
__u32 InPktsOK;
|
|
__u32 InPktsInvalid;
|
|
__u32 InPktsNotValid;
|
|
__u32 InPktsNotUsingSA;
|
|
__u32 InPktsUnusedSA;
|
|
};
|
|
|
|
struct macsec_tx_sa_stats {
|
|
__u32 OutPktsProtected;
|
|
__u32 OutPktsEncrypted;
|
|
};
|
|
|
|
struct macsec_tx_sc_stats {
|
|
__u64 OutPktsProtected;
|
|
__u64 OutPktsEncrypted;
|
|
__u64 OutOctetsProtected;
|
|
__u64 OutOctetsEncrypted;
|
|
};
|
|
|
|
struct macsec_dev_stats {
|
|
__u64 OutPktsUntagged;
|
|
__u64 InPktsUntagged;
|
|
__u64 OutPktsTooLong;
|
|
__u64 InPktsNoTag;
|
|
__u64 InPktsBadTag;
|
|
__u64 InPktsUnknownSCI;
|
|
__u64 InPktsNoSCI;
|
|
__u64 InPktsOverrun;
|
|
};
|
|
|
|
/**
|
|
* struct macsec_rx_sa - receive secure association
|
|
* @active:
|
|
* @next_pn: packet number expected for the next packet
|
|
* @lock: protects next_pn manipulations
|
|
* @key: key structure
|
|
* @ssci: short secure channel identifier
|
|
* @stats: per-SA stats
|
|
*/
|
|
struct macsec_rx_sa {
|
|
struct macsec_key key;
|
|
ssci_t ssci;
|
|
spinlock_t lock;
|
|
union {
|
|
pn_t next_pn_halves;
|
|
u64 next_pn;
|
|
};
|
|
refcount_t refcnt;
|
|
bool active;
|
|
struct macsec_rx_sa_stats __percpu *stats;
|
|
struct macsec_rx_sc *sc;
|
|
struct rcu_head rcu;
|
|
};
|
|
|
|
struct pcpu_rx_sc_stats {
|
|
struct macsec_rx_sc_stats stats;
|
|
struct u64_stats_sync syncp;
|
|
};
|
|
|
|
struct pcpu_tx_sc_stats {
|
|
struct macsec_tx_sc_stats stats;
|
|
struct u64_stats_sync syncp;
|
|
};
|
|
|
|
/**
|
|
* struct macsec_rx_sc - receive secure channel
|
|
* @sci: secure channel identifier for this SC
|
|
* @active: channel is active
|
|
* @sa: array of secure associations
|
|
* @stats: per-SC stats
|
|
*/
|
|
struct macsec_rx_sc {
|
|
struct macsec_rx_sc __rcu *next;
|
|
sci_t sci;
|
|
bool active;
|
|
struct macsec_rx_sa __rcu *sa[MACSEC_NUM_AN];
|
|
struct pcpu_rx_sc_stats __percpu *stats;
|
|
refcount_t refcnt;
|
|
struct rcu_head rcu_head;
|
|
};
|
|
|
|
/**
|
|
* struct macsec_tx_sa - transmit secure association
|
|
* @active:
|
|
* @next_pn: packet number to use for the next packet
|
|
* @lock: protects next_pn manipulations
|
|
* @key: key structure
|
|
* @ssci: short secure channel identifier
|
|
* @stats: per-SA stats
|
|
*/
|
|
struct macsec_tx_sa {
|
|
struct macsec_key key;
|
|
ssci_t ssci;
|
|
spinlock_t lock;
|
|
union {
|
|
pn_t next_pn_halves;
|
|
u64 next_pn;
|
|
};
|
|
refcount_t refcnt;
|
|
bool active;
|
|
struct macsec_tx_sa_stats __percpu *stats;
|
|
struct rcu_head rcu;
|
|
};
|
|
|
|
/**
|
|
* struct macsec_tx_sc - transmit secure channel
|
|
* @active:
|
|
* @encoding_sa: association number of the SA currently in use
|
|
* @encrypt: encrypt packets on transmit, or authenticate only
|
|
* @send_sci: always include the SCI in the SecTAG
|
|
* @end_station:
|
|
* @scb: single copy broadcast flag
|
|
* @sa: array of secure associations
|
|
* @stats: stats for this TXSC
|
|
* @md_dst: MACsec offload metadata dst
|
|
*/
|
|
struct macsec_tx_sc {
|
|
bool active;
|
|
u8 encoding_sa;
|
|
bool encrypt;
|
|
bool send_sci;
|
|
bool end_station;
|
|
bool scb;
|
|
struct macsec_tx_sa __rcu *sa[MACSEC_NUM_AN];
|
|
struct pcpu_tx_sc_stats __percpu *stats;
|
|
struct metadata_dst *md_dst;
|
|
};
|
|
|
|
/**
|
|
* struct macsec_secy - MACsec Security Entity
|
|
* @netdev: netdevice for this SecY
|
|
* @n_rx_sc: number of receive secure channels configured on this SecY
|
|
* @sci: secure channel identifier used for tx
|
|
* @key_len: length of keys used by the cipher suite
|
|
* @icv_len: length of ICV used by the cipher suite
|
|
* @validate_frames: validation mode
|
|
* @xpn: enable XPN for this SecY
|
|
* @operational: MAC_Operational flag
|
|
* @protect_frames: enable protection for this SecY
|
|
* @replay_protect: enable packet number checks on receive
|
|
* @replay_window: size of the replay window
|
|
* @tx_sc: transmit secure channel
|
|
* @rx_sc: linked list of receive secure channels
|
|
*/
|
|
struct macsec_secy {
|
|
struct net_device *netdev;
|
|
unsigned int n_rx_sc;
|
|
sci_t sci;
|
|
u16 key_len;
|
|
u16 icv_len;
|
|
enum macsec_validation_type validate_frames;
|
|
bool xpn;
|
|
bool operational;
|
|
bool protect_frames;
|
|
bool replay_protect;
|
|
u32 replay_window;
|
|
struct macsec_tx_sc tx_sc;
|
|
struct macsec_rx_sc __rcu *rx_sc;
|
|
};
|
|
|
|
/**
|
|
* struct macsec_context - MACsec context for hardware offloading
|
|
* @netdev: a valid pointer to a struct net_device if @offload ==
|
|
* MACSEC_OFFLOAD_MAC
|
|
* @phydev: a valid pointer to a struct phy_device if @offload ==
|
|
* MACSEC_OFFLOAD_PHY
|
|
* @offload: MACsec offload status
|
|
* @secy: pointer to a MACsec SecY
|
|
* @rx_sc: pointer to a RX SC
|
|
* @update_pn: when updating the SA, update the next PN
|
|
* @assoc_num: association number of the target SA
|
|
* @key: key of the target SA
|
|
* @rx_sa: pointer to an RX SA if a RX SA is added/updated/removed
|
|
* @tx_sa: pointer to an TX SA if a TX SA is added/updated/removed
|
|
* @tx_sc_stats: pointer to TX SC stats structure
|
|
* @tx_sa_stats: pointer to TX SA stats structure
|
|
* @rx_sc_stats: pointer to RX SC stats structure
|
|
* @rx_sa_stats: pointer to RX SA stats structure
|
|
* @dev_stats: pointer to dev stats structure
|
|
*/
|
|
struct macsec_context {
|
|
union {
|
|
struct net_device *netdev;
|
|
struct phy_device *phydev;
|
|
};
|
|
enum macsec_offload offload;
|
|
|
|
struct macsec_secy *secy;
|
|
struct macsec_rx_sc *rx_sc;
|
|
struct {
|
|
bool update_pn;
|
|
unsigned char assoc_num;
|
|
u8 key[MACSEC_MAX_KEY_LEN];
|
|
union {
|
|
struct macsec_rx_sa *rx_sa;
|
|
struct macsec_tx_sa *tx_sa;
|
|
};
|
|
} sa;
|
|
union {
|
|
struct macsec_tx_sc_stats *tx_sc_stats;
|
|
struct macsec_tx_sa_stats *tx_sa_stats;
|
|
struct macsec_rx_sc_stats *rx_sc_stats;
|
|
struct macsec_rx_sa_stats *rx_sa_stats;
|
|
struct macsec_dev_stats *dev_stats;
|
|
} stats;
|
|
};
|
|
|
|
/**
|
|
* struct macsec_ops - MACsec offloading operations
|
|
* @mdo_dev_open: called when the MACsec interface transitions to the up state
|
|
* @mdo_dev_stop: called when the MACsec interface transitions to the down
|
|
* state
|
|
* @mdo_add_secy: called when a new SecY is added
|
|
* @mdo_upd_secy: called when the SecY flags are changed or the MAC address of
|
|
* the MACsec interface is changed
|
|
* @mdo_del_secy: called when the hw offload is disabled or the MACsec
|
|
* interface is removed
|
|
* @mdo_add_rxsc: called when a new RX SC is added
|
|
* @mdo_upd_rxsc: called when a certain RX SC is updated
|
|
* @mdo_del_rxsc: called when a certain RX SC is removed
|
|
* @mdo_add_rxsa: called when a new RX SA is added
|
|
* @mdo_upd_rxsa: called when a certain RX SA is updated
|
|
* @mdo_del_rxsa: called when a certain RX SA is removed
|
|
* @mdo_add_txsa: called when a new TX SA is added
|
|
* @mdo_upd_txsa: called when a certain TX SA is updated
|
|
* @mdo_del_txsa: called when a certain TX SA is removed
|
|
* @mdo_get_dev_stats: called when dev stats are read
|
|
* @mdo_get_tx_sc_stats: called when TX SC stats are read
|
|
* @mdo_get_tx_sa_stats: called when TX SA stats are read
|
|
* @mdo_get_rx_sc_stats: called when RX SC stats are read
|
|
* @mdo_get_rx_sa_stats: called when RX SA stats are read
|
|
* @mdo_insert_tx_tag: called to insert the TX tag
|
|
* @needed_headroom: number of bytes reserved at the beginning of the sk_buff
|
|
* for the TX tag
|
|
* @needed_tailroom: number of bytes reserved at the end of the sk_buff for the
|
|
* TX tag
|
|
* @rx_uses_md_dst: whether MACsec device offload supports sk_buff md_dst
|
|
*/
|
|
struct macsec_ops {
|
|
/* Device wide */
|
|
int (*mdo_dev_open)(struct macsec_context *ctx);
|
|
int (*mdo_dev_stop)(struct macsec_context *ctx);
|
|
/* SecY */
|
|
int (*mdo_add_secy)(struct macsec_context *ctx);
|
|
int (*mdo_upd_secy)(struct macsec_context *ctx);
|
|
int (*mdo_del_secy)(struct macsec_context *ctx);
|
|
/* Security channels */
|
|
int (*mdo_add_rxsc)(struct macsec_context *ctx);
|
|
int (*mdo_upd_rxsc)(struct macsec_context *ctx);
|
|
int (*mdo_del_rxsc)(struct macsec_context *ctx);
|
|
/* Security associations */
|
|
int (*mdo_add_rxsa)(struct macsec_context *ctx);
|
|
int (*mdo_upd_rxsa)(struct macsec_context *ctx);
|
|
int (*mdo_del_rxsa)(struct macsec_context *ctx);
|
|
int (*mdo_add_txsa)(struct macsec_context *ctx);
|
|
int (*mdo_upd_txsa)(struct macsec_context *ctx);
|
|
int (*mdo_del_txsa)(struct macsec_context *ctx);
|
|
/* Statistics */
|
|
int (*mdo_get_dev_stats)(struct macsec_context *ctx);
|
|
int (*mdo_get_tx_sc_stats)(struct macsec_context *ctx);
|
|
int (*mdo_get_tx_sa_stats)(struct macsec_context *ctx);
|
|
int (*mdo_get_rx_sc_stats)(struct macsec_context *ctx);
|
|
int (*mdo_get_rx_sa_stats)(struct macsec_context *ctx);
|
|
/* Offload tag */
|
|
int (*mdo_insert_tx_tag)(struct phy_device *phydev,
|
|
struct sk_buff *skb);
|
|
unsigned int needed_headroom;
|
|
unsigned int needed_tailroom;
|
|
bool rx_uses_md_dst;
|
|
};
|
|
|
|
void macsec_pn_wrapped(struct macsec_secy *secy, struct macsec_tx_sa *tx_sa);
|
|
static inline bool macsec_send_sci(const struct macsec_secy *secy)
|
|
{
|
|
const struct macsec_tx_sc *tx_sc = &secy->tx_sc;
|
|
|
|
return tx_sc->send_sci ||
|
|
(secy->n_rx_sc > 1 && !tx_sc->end_station && !tx_sc->scb);
|
|
}
|
|
struct net_device *macsec_get_real_dev(const struct net_device *dev);
|
|
bool macsec_netdev_is_offloaded(struct net_device *dev);
|
|
|
|
static inline void *macsec_netdev_priv(const struct net_device *dev)
|
|
{
|
|
#if IS_ENABLED(CONFIG_VLAN_8021Q)
|
|
if (is_vlan_dev(dev))
|
|
return netdev_priv(vlan_dev_priv(dev)->real_dev);
|
|
#endif
|
|
return netdev_priv(dev);
|
|
}
|
|
|
|
static inline u64 sci_to_cpu(sci_t sci)
|
|
{
|
|
return be64_to_cpu((__force __be64)sci);
|
|
}
|
|
|
|
#endif /* _NET_MACSEC_H_ */
|