mirror of
git://nv-tegra.nvidia.com/linux-nv-oot.git
synced 2025-12-24 02:01:36 +03:00
Issue: If WOL is enabled after running "./ethtool -s eth0 wol g" command there will not be any eapol frames transaction, hence macsec will be disabled. As macsec is disabled before suspend we are not enabling it back once resumed. Because of this eapol frames are also sent with sec-tag as byp_lut is not programmed. Fix: Instead of depending on the macsec state, check if there is any supplicant running, if there is any supplicant then enable the macsec post resume. Bug 3577131 Change-Id: I6018b94411034eebba34f5f0a9520907305c573e Signed-off-by: Sanath Kumar Gampa <sgampa@nvidia.com> Reviewed-on: https://git-master.nvidia.com/r/c/linux-nvidia/+/2694446 Reviewed-by: svcacv <svcacv@nvidia.com> Reviewed-by: Bhadram Varka <vbhadram@nvidia.com> Reviewed-by: Mahesh Patil <maheshp@nvidia.com> Reviewed-by: svc-mobile-coverity <svc-mobile-coverity@nvidia.com> Reviewed-by: svc-mobile-cert <svc-mobile-cert@nvidia.com> Reviewed-by: svc_kernel_abi <svc_kernel_abi@nvidia.com> Reviewed-by: Ashutosh Jha <ajha@nvidia.com> GVS: Gerrit_Virtual_Submit
246 lines
7.7 KiB
C
246 lines
7.7 KiB
C
/*
|
|
* Copyright (c) 2021-2022, NVIDIA CORPORATION. All rights reserved.
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
|
* copy of this software and associated documentation files (the "Software"),
|
|
* to deal in the Software without restriction, including without limitation
|
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
* and/or sell copies of the Software, and to permit persons to whom the
|
|
* Software is furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in
|
|
* all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
* DEALINGS IN THE SOFTWARE.
|
|
*/
|
|
|
|
#ifndef INCLUDED_MACSEC_H
|
|
#define INCLUDED_MACSEC_H
|
|
|
|
#include <osi_macsec.h>
|
|
#include <linux/random.h>
|
|
#include <net/genetlink.h>
|
|
#include <linux/crypto.h>
|
|
|
|
|
|
/**
|
|
* @brief Expected number of inputs in BYP or SCI LUT sysfs config
|
|
*/
|
|
#define LUT_INPUTS_LEN 39
|
|
|
|
/**
|
|
* @brief Expected number of extra inputs in BYP LUT sysfs config
|
|
*/
|
|
#define BYP_LUT_INPUTS 1
|
|
|
|
/**
|
|
* @brief Size of Macsec IRQ name.
|
|
*/
|
|
#define MACSEC_IRQ_NAME_SZ 32
|
|
|
|
#define NV_MACSEC_GENL_VERSION 1
|
|
|
|
#ifdef MACSEC_KEY_PROGRAM
|
|
#define MACSEC_SIZE 0x10000U
|
|
#endif
|
|
|
|
#define KEY2STR(a) (a)[0], (a)[1], (a)[2], (a)[3], (a)[4], (a)[5],\
|
|
(a)[6], (a)[7], (a)[8], (a)[9], (a)[10], (a)[11],\
|
|
(a)[12], (a)[13], (a)[14], (a)[15]
|
|
#define KEYSTR "%02x %02x %02x %02x %02x %02x %02x %02x %02x %02x \
|
|
%02x %02x %02x %02x %02x %02x"
|
|
|
|
/* keep the same enum definition in nv macsec supplicant driver */
|
|
enum nv_macsec_sa_attrs {
|
|
NV_MACSEC_SA_ATTR_UNSPEC,
|
|
NV_MACSEC_SA_ATTR_SCI,
|
|
NV_MACSEC_SA_ATTR_AN,
|
|
NV_MACSEC_SA_ATTR_PN,
|
|
NV_MACSEC_SA_ATTR_LOWEST_PN,
|
|
NV_MACSEC_SA_ATTR_KEY,
|
|
__NV_MACSEC_SA_ATTR_END,
|
|
NUM_NV_MACSEC_SA_ATTR = __NV_MACSEC_SA_ATTR_END,
|
|
NV_MACSEC_SA_ATTR_MAX = __NV_MACSEC_SA_ATTR_END - 1,
|
|
};
|
|
|
|
enum nv_macsec_tz_attrs {
|
|
NV_MACSEC_TZ_ATTR_UNSPEC,
|
|
NV_MACSEC_TZ_INSTANCE_ID,
|
|
NV_MACSEC_TZ_ATTR_CTRL,
|
|
NV_MACSEC_TZ_ATTR_RW,
|
|
NV_MACSEC_TZ_ATTR_INDEX,
|
|
NV_MACSEC_TZ_ATTR_KEY,
|
|
NV_MACSEC_TZ_ATTR_FLAG,
|
|
__NV_MACSEC_TZ_ATTR_END,
|
|
NUM_NV_MACSEC_TZ_ATTR = __NV_MACSEC_TZ_ATTR_END,
|
|
NV_MACSEC_TZ_ATTR_MAX = __NV_MACSEC_TZ_ATTR_END - 1,
|
|
};
|
|
|
|
enum nv_macsec_tz_kt_reset_attrs {
|
|
NV_MACSEC_TZ_KT_RESET_ATTR_UNSPEC,
|
|
NV_MACSEC_TZ_KT_RESET_INSTANCE_ID,
|
|
__NV_MACSEC_TZ_KT_RESET_ATTR_END,
|
|
NUM_KT_RESET_ATTR = __NV_MACSEC_TZ_KT_RESET_ATTR_END,
|
|
NV_MACSEC_TZ_KT_RESET_ATTR_MAX = __NV_MACSEC_TZ_KT_RESET_ATTR_END - 1,
|
|
};
|
|
|
|
enum nv_macsec_attrs {
|
|
NV_MACSEC_ATTR_UNSPEC,
|
|
NV_MACSEC_ATTR_IFNAME,
|
|
NV_MACSEC_ATTR_TXSC_PORT,
|
|
NV_MACSEC_ATTR_PROT_FRAMES_EN,
|
|
NV_MACSEC_ATTR_REPLAY_PROT_EN,
|
|
NV_MACSEC_ATTR_REPLAY_WINDOW,
|
|
NV_MACSEC_ATTR_CIPHER_SUITE,
|
|
NV_MACSEC_ATTR_CTRL_PORT_EN,
|
|
NV_MACSEC_ATTR_SA_CONFIG, /* Nested SA config */
|
|
NV_MACSEC_ATTR_TZ_CONFIG, /* Nested TZ config */
|
|
NV_MACSEC_ATTR_TZ_KT_RESET, /* Nested TZ KT config */
|
|
__NV_MACSEC_ATTR_END,
|
|
NUM_NV_MACSEC_ATTR = __NV_MACSEC_ATTR_END,
|
|
NV_MACSEC_ATTR_MAX = __NV_MACSEC_ATTR_END - 1,
|
|
};
|
|
|
|
static const struct nla_policy nv_macsec_sa_genl_policy[NUM_NV_MACSEC_SA_ATTR] = {
|
|
[NV_MACSEC_SA_ATTR_SCI] = { .type = NLA_BINARY,
|
|
.len = 8, }, /* SCI is 64bit */
|
|
[NV_MACSEC_SA_ATTR_AN] = { .type = NLA_U8 },
|
|
[NV_MACSEC_SA_ATTR_PN] = { .type = NLA_U32 },
|
|
[NV_MACSEC_SA_ATTR_LOWEST_PN] = { .type = NLA_U32 },
|
|
[NV_MACSEC_SA_ATTR_KEY] = { .type = NLA_BINARY,
|
|
.len = OSI_KEY_LEN_256,},
|
|
};
|
|
|
|
static const struct nla_policy nv_macsec_tz_genl_policy[NUM_NV_MACSEC_TZ_ATTR] = {
|
|
[NV_MACSEC_TZ_INSTANCE_ID] = { .type = NLA_U32 },
|
|
[NV_MACSEC_TZ_ATTR_CTRL] = { .type = NLA_U8 }, /* controller Tx or Rx */
|
|
[NV_MACSEC_TZ_ATTR_RW] = { .type = NLA_U8 },
|
|
[NV_MACSEC_TZ_ATTR_INDEX] = { .type = NLA_U8 },
|
|
[NV_MACSEC_TZ_ATTR_KEY] = { .type = NLA_BINARY,
|
|
.len = OSI_KEY_LEN_256 },
|
|
[NV_MACSEC_TZ_ATTR_FLAG] = { .type = NLA_U32 },
|
|
};
|
|
|
|
static const struct nla_policy nv_kt_reset_genl_policy[NUM_KT_RESET_ATTR] = {
|
|
[NV_MACSEC_TZ_KT_RESET_INSTANCE_ID] = { .type = NLA_U32 },
|
|
};
|
|
|
|
static const struct nla_policy nv_macsec_genl_policy[NUM_NV_MACSEC_ATTR] = {
|
|
[NV_MACSEC_ATTR_IFNAME] = { .type = NLA_STRING },
|
|
[NV_MACSEC_ATTR_TXSC_PORT] = { .type = NLA_U16 },
|
|
[NV_MACSEC_ATTR_REPLAY_PROT_EN] = { .type = NLA_U32 },
|
|
[NV_MACSEC_ATTR_REPLAY_WINDOW] = { .type = NLA_U32 },
|
|
[NV_MACSEC_ATTR_SA_CONFIG] = { .type = NLA_NESTED },
|
|
[NV_MACSEC_ATTR_TZ_CONFIG] = { .type = NLA_NESTED },
|
|
[NV_MACSEC_ATTR_TZ_KT_RESET] = { .type = NLA_NESTED },
|
|
};
|
|
|
|
enum nv_macsec_nl_commands {
|
|
NV_MACSEC_CMD_INIT,
|
|
NV_MACSEC_CMD_GET_TX_NEXT_PN,
|
|
NV_MACSEC_CMD_SET_PROT_FRAMES,
|
|
NV_MACSEC_CMD_SET_REPLAY_PROT,
|
|
NV_MACSEC_CMD_SET_CIPHER,
|
|
NV_MACSEC_CMD_SET_CONTROLLED_PORT,
|
|
NV_MACSEC_CMD_CREATE_TX_SA,
|
|
NV_MACSEC_CMD_EN_TX_SA,
|
|
NV_MACSEC_CMD_DIS_TX_SA,
|
|
NV_MACSEC_CMD_CREATE_RX_SA,
|
|
NV_MACSEC_CMD_EN_RX_SA,
|
|
NV_MACSEC_CMD_DIS_RX_SA,
|
|
NV_MACSEC_CMD_TZ_CONFIG,
|
|
NV_MACSEC_CMD_TZ_KT_RESET,
|
|
NV_MACSEC_CMD_DEINIT,
|
|
};
|
|
|
|
/**
|
|
* @brief MACsec supplicant data structure
|
|
*/
|
|
struct macsec_supplicant_data {
|
|
/** specific port id to identity supplicant instance */
|
|
unsigned int snd_portid;
|
|
/** flag check supplicant instance is allocated */
|
|
unsigned short in_use;
|
|
/** MACsec protect frames variable */
|
|
unsigned int protect_frames;
|
|
/** MACsec enabled flags for Tx/Rx controller status */
|
|
unsigned int enabled;
|
|
/** MACsec cipher suite */
|
|
unsigned int cipher;
|
|
};
|
|
|
|
/**
|
|
* @brief MACsec private data structure
|
|
*/
|
|
struct macsec_priv_data {
|
|
/** Non secure reset */
|
|
struct reset_control *ns_rst;
|
|
/** MGBE Macsec clock */
|
|
struct clk *mgbe_clk;
|
|
/** EQOS Macsec TX clock */
|
|
struct clk *eqos_tx_clk;
|
|
/** EQOS Macsec RX clock */
|
|
struct clk *eqos_rx_clk;
|
|
/** Secure irq */
|
|
int s_irq;
|
|
/** Non secure irq */
|
|
int ns_irq;
|
|
/** is_irq_allocated BIT(0)for s_irq and BIT(1)for ns_irq*/
|
|
unsigned int is_irq_allocated;
|
|
/** pointer to ether private data struct */
|
|
struct ether_priv_data *ether_pdata;
|
|
/** macsec IRQ name strings */
|
|
char irq_name[2][MACSEC_IRQ_NAME_SZ];
|
|
/** loopback mode */
|
|
unsigned int loopback_mode;
|
|
/** macsec cipher, aes128 or aes256 bit */
|
|
unsigned int cipher;
|
|
/** MACsec protect frames variable */
|
|
unsigned int protect_frames;
|
|
/** MACsec enabled flags for Tx/Rx controller status */
|
|
unsigned int enabled;
|
|
/** MACsec Rx PN Window */
|
|
unsigned int pn_window;
|
|
/** MACsec controller init reference count */
|
|
atomic_t ref_count;
|
|
/** supplicant instance specific data */
|
|
struct macsec_supplicant_data supplicant[OSI_MAX_NUM_SC];
|
|
/** next supplicant instance index */
|
|
unsigned short next_supp_idx;
|
|
/** macsec mutex lock */
|
|
struct mutex lock;
|
|
/** macsec hw instance id */
|
|
unsigned int id;
|
|
/** Macsec enable flag in DT */
|
|
unsigned int is_macsec_enabled_in_dt;
|
|
/** Context family name */
|
|
struct genl_family nv_macsec_fam;
|
|
/** Flag to check if nv macsec nl registered */
|
|
unsigned int is_nv_macsec_fam_registered;
|
|
};
|
|
|
|
int macsec_probe(struct ether_priv_data *pdata);
|
|
void macsec_remove(struct ether_priv_data *pdata);
|
|
int macsec_open(struct macsec_priv_data *macsec_pdata,
|
|
void *const genl_info);
|
|
int macsec_close(struct macsec_priv_data *macsec_pdata);
|
|
int macsec_suspend(struct macsec_priv_data *macsec_pdata);
|
|
int macsec_resume(struct macsec_priv_data *macsec_pdata);
|
|
|
|
#ifdef MACSEC_DEBUG
|
|
#define PRINT_ENTRY() (printk(KERN_DEBUG "-->%s()\n", __func__))
|
|
#define PRINT_EXIT() (printk(KERN_DEBUG "<--%s()\n", __func__))
|
|
#else
|
|
#define PRINT_ENTRY()
|
|
#define PRINT_EXIT()
|
|
#endif /* MACSEC_DEBUG */
|
|
|
|
#endif /* INCLUDED_MACSEC_H */
|
|
|