History log of /freebsd/sys/netipsec/ipsec_offload.c (Results 1 – 17 of 17)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 39598c2a 17-Jul-2025 Konstantin Belousov <kib@FreeBSD.org>

ipsec offload: ipsec_accel_fill_xh() should indirect through fn pointer

The config with IPSEC_SUPPORT + IPSEC_OFFLOAD is the valid one.

Fixes: 5be5a0bde5f990dbc680272eee74132bcde815f2
Sponsored by:

ipsec offload: ipsec_accel_fill_xh() should indirect through fn pointer

The config with IPSEC_SUPPORT + IPSEC_OFFLOAD is the valid one.

Fixes: 5be5a0bde5f990dbc680272eee74132bcde815f2
Sponsored by: Nvidia networking

show more ...


# fb65357d 06-Jul-2025 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: pre-calculate xform_history for recorded accelerated SA

Also provide the helper to fill the xform_history into mtag, provided by
a driver.

Reviewed by: Ariel Ehrenberg <aehrenberg@nv

ipsec_offload: pre-calculate xform_history for recorded accelerated SA

Also provide the helper to fill the xform_history into mtag, provided by
a driver.

Reviewed by: Ariel Ehrenberg <aehrenberg@nvidia.com>, slavash
Sponsored by: Nvidia networking

show more ...


Revision tags: release/14.3.0-p1, release/14.2.0-p4, release/13.5.0-p2
# e453e498 11-Jun-2025 Brooks Davis <brooks@FreeBSD.org>

machine/stdarg.h -> sys/stdarg.h

Switch to using sys/stdarg.h for va_list type and va_* builtins.

Make an attempt to insert the include in a sensible place. Where
style(9) was followed this is eas

machine/stdarg.h -> sys/stdarg.h

Switch to using sys/stdarg.h for va_list type and va_* builtins.

Make an attempt to insert the include in a sensible place. Where
style(9) was followed this is easy, where it was ignored, aim for the
first block of sys/*.h headers and don't get too fussy or try to fix
other style bugs.

Reviewed by: imp
Exp-run by: antoine (PR 286274)
Pull Request: https://github.com/freebsd/freebsd-src/pull/1595

show more ...


Revision tags: release/14.3.0, release/13.4.0-p5, release/13.5.0-p1, release/14.2.0-p3, release/13.5.0, release/14.2.0-p2, release/14.1.0-p8, release/13.4.0-p4, release/14.1.0-p7, release/14.2.0-p1, release/13.4.0-p3, release/14.2.0
# 4d0c9538 08-Nov-2024 Justin Hibbits <jhibbits@FreeBSD.org>

net: Include private header in more needed places

sys/netinet and sys/netipsec are both part of the 'blessed' netstack, so
can access struct ifnet directly. With this structure becoming private
ver

net: Include private header in more needed places

sys/netinet and sys/netipsec are both part of the 'blessed' netstack, so
can access struct ifnet directly. With this structure becoming private
very soon, the necessary files need to get direct access.

Sponsored by: Juniper Networks, Inc.

show more ...


Revision tags: release/13.4.0
# 01f43479 30-Aug-2024 Mark Johnston <markj@FreeBSD.org>

ipsec: Drain async ipsec_offload work when destroying a vnet

Re-apply commit e196b12f4d4d. This was reverted by commit 28294dc92476
because it could trigger a deadlock, but the underlying problem t

ipsec: Drain async ipsec_offload work when destroying a vnet

Re-apply commit e196b12f4d4d. This was reverted by commit 28294dc92476
because it could trigger a deadlock, but the underlying problem there
was fixed in commit f76826b892de.

Reported by: KASAN
Reviewed by: kib
Fixes: ef2a572bf6bd ("ipsec_offload: kernel infrastructure")
Sponsored by: Klara, Inc.
Differential Revision: https://reviews.freebsd.org/D46483

show more ...


# f76826b8 30-Aug-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec offload: use private taskqueue thread

Using global taskqueue_thread XXX with the vnet tasks scheduled during
VNET destruction. VNET shutdown needs to wait for all vnet-scoped
SAs/SPs to be ha

ipsec offload: use private taskqueue thread

Using global taskqueue_thread XXX with the vnet tasks scheduled during
VNET destruction. VNET shutdown needs to wait for all vnet-scoped
SAs/SPs to be handled, and doing that from taskqueue_thread task
deadlocks because the same thread proceeds the removals.

Reviewed by: markj
Sponsored by: NVidia networking
Differential revision: https://reviews.freebsd.org/D46494

show more ...


# 1af77be3 01-Sep-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offlad: remove not needed IFP_HS_INPUT/OUTPUT flags

Calculate the hdr_ext_size unconditionally, it is kept unused for SAs
not handling the input.

Sponsored by: NVidia networking


# d02e1a3f 28-Aug-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_accel_output(): do not process packet if interface rejected offload

Sponsored by: NVidia networking


# 28294dc9 30-Aug-2024 Mark Johnston <markj@FreeBSD.org>

Revert "ipsec: Drain async ipsec_offload work when destroying a vnet"

This change can cause a deadlock in some cases, since it's possible for
VNET teardown to happen in the context of taskqueue_thre

Revert "ipsec: Drain async ipsec_offload work when destroying a vnet"

This change can cause a deadlock in some cases, since it's possible for
VNET teardown to happen in the context of taskqueue_thread, and
ipsec_accel_sync() drains taskqueue_thread's work queue.

This reverts commit e196b12f4d4d13982d42cf7841b77dca1405effa.

show more ...


# e196b12f 30-Aug-2024 Mark Johnston <markj@FreeBSD.org>

ipsec: Drain async ipsec_offload work when destroying a vnet

The ipsec_offload code in some cases releases object references in an
asynchronous context where it needs to set the current VNET. Make

ipsec: Drain async ipsec_offload work when destroying a vnet

The ipsec_offload code in some cases releases object references in an
asynchronous context where it needs to set the current VNET. Make sure
that all such work completes before the VNET is actually destroyed,
otherwise a use-after-free is possible.

Reported by: KASAN
Reviewed by: kib
Fixes: ef2a572bf6bd ("ipsec_offload: kernel infrastructure")
Sponsored by: Klara, Inc.
Differential Revision: https://reviews.freebsd.org/D46483

show more ...


# 66f0e201 18-Aug-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: add ipsec_accel_drv_sa_lifetime_fetch()

A function to fetch hardware counters for offloaded SA on specific
interface.

Sponsored by: NVidia networking


# c4a0ee9b 08-Aug-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: add handler for interface down events

Remove all offloaded SAs and SPs on ifdown.

Sponsored by: NVIDIA networking


# 65f264dc 23-Jul-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: indirect two more functions on the ipsec.ko module load

Specifically, ipsec_accel_on_ifdown() and ipsec_accel_drv_sa_lifetime_update()
should be present in kernel for future mlx5en dr

ipsec_offload: indirect two more functions on the ipsec.ko module load

Specifically, ipsec_accel_on_ifdown() and ipsec_accel_drv_sa_lifetime_update()
should be present in kernel for future mlx5en driver to be statically
linkable into the kernel built with IPSEC_HOOKS + IPSEC_OFFLOAD.

Sponsored by: NVIDIA networking

show more ...


# 9a7096ff 19-Jul-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: hide SA/SP offload lifecycle prints under verbose sysctl

Reported and reviewed by: kp
Discussed with: np
Sponsored by: NVIDIA networking
Differential revision: https://reviews.freebsd

ipsec_offload: hide SA/SP offload lifecycle prints under verbose sysctl

Reported and reviewed by: kp
Discussed with: np
Sponsored by: NVIDIA networking
Differential revision: https://reviews.freebsd.org/D46045

show more ...


Revision tags: release/14.1.0
# e6e2c0a5 06-Mar-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: switch TF2_IPSEC_TSO on/off as appropriate on output

after the interface ipsec_accel method if_hwassist() is consulted.

Sponsored by: NVIDIA networking


Revision tags: release/13.3.0
# 240b7bfe 14-Feb-2024 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: offload inner checksums calculations for UDP/TCP/TSO

and allow the interface driver to declare such support.

Sponsored by: NVIDIA networking
Differential revision: https://reviews.fr

ipsec_offload: offload inner checksums calculations for UDP/TCP/TSO

and allow the interface driver to declare such support.

Sponsored by: NVIDIA networking
Differential revision: https://reviews.freebsd.org/D44221

show more ...


Revision tags: release/14.0.0, release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0
# ef2a572b 22-Aug-2021 Konstantin Belousov <kib@FreeBSD.org>

ipsec_offload: kernel infrastructure

Inline IPSEC offload moves almost whole IPSEC processing from the
CPU/MCU and possibly crypto accelerator, to the network card.

The transmitted packet content i

ipsec_offload: kernel infrastructure

Inline IPSEC offload moves almost whole IPSEC processing from the
CPU/MCU and possibly crypto accelerator, to the network card.

The transmitted packet content is not touched by CPU during TX
operations, kernel only does the required policy and security
association lookups to find out that given flow is offloaded, and then
packet is transmitted as plain text to the card. For driver convenience,
a metadata is attached to the packet identifying SA which must process
the packet. Card does encryption of the payload, padding, calculates
authentication, and does the reformat according to the policy.

Similarly, on receive, card does the decapsulation, decryption, and
authentification. Kernel receives the identifier of SA that was
used to process the packet, together with the plain-text packet.

Overall, payload octets are only read or written by card DMA engine,
removing a lot of memory subsystem overhead, and saving CPU time because
IPSEC algos calculations are avoided.

If driver declares support for inline IPSEC offload (with the
IFCAP2_IPSEC_OFFLOAD capability set and registering method table struct
if_ipsec_accel_methods), kernel offers the SPD and SAD to driver.
Driver decides which policies and SAs can be offloaded based on
hardware capacity, and acks/nacks each SA for given interface to
kernel. Kernel needs to keep this information to make a decision to
skip software processing on TX, and to assume processing already done
on RX. This shadow SPD/SAD database of offloads is rooted from
policies (struct secpolicy accel_ifps, struct ifp_handle_sp) and SAs
(struct secasvar accel_ipfs, struct ifp_handle_sav).

Some extensions to the PF_KEY socket allow to limit interfaces for
which given SP/SA could be offloaded (proposed for offload). Also,
additional statistics extensions allow to observe allocation/octet/use
counters for specific SA.

Since SPs and SAs are typically instantiated in non-sleepable context,
while offloading them into card is expected to require costly async
manipulations of the card state, calls to the driver for offload and
termination are executed in the threaded taskqueue. It also solves
the issue of allocating resources needed for the offload database.
Neither ipf_handle_sp nor ipf_handle_sav do not add reference to the
owning SP/SA, the offload must be terminated before last reference is
dropped. ipsec_accel only adds transient references to ensure safe
pointer ownership by taskqueue.

Maintaining the SA counters for hardware-accelerated packets is the
duty of the driver. The helper ipsec_accel_drv_sa_lifetime_update()
is provided to hide accel infrastructure from drivers which would use
expected callout to query hardware periodically for updates.

Reviewed by: rscheff (transport, stack integration), np
Sponsored by: NVIDIA networking
Differential revision: https://reviews.freebsd.org/D44219

show more ...