HardenedBSD/sys/conf
Konstantin Belousov ef2a572bf6 ipsec_offload: kernel infrastructure
Inline IPSEC offload moves almost whole IPSEC processing from the
CPU/MCU and possibly crypto accelerator, to the network card.

The transmitted packet content is not touched by CPU during TX
operations, kernel only does the required policy and security
association lookups to find out that given flow is offloaded, and then
packet is transmitted as plain text to the card. For driver convenience,
a metadata is attached to the packet identifying SA which must process
the packet. Card does encryption of the payload, padding, calculates
authentication, and does the reformat according to the policy.

Similarly, on receive, card does the decapsulation, decryption, and
authentification.  Kernel receives the identifier of SA that was
used to process the packet, together with the plain-text packet.

Overall, payload octets are only read or written by card DMA engine,
removing a lot of memory subsystem overhead, and saving CPU time because
IPSEC algos calculations are avoided.

If driver declares support for inline IPSEC offload (with the
IFCAP2_IPSEC_OFFLOAD capability set and registering method table struct
if_ipsec_accel_methods), kernel offers the SPD and SAD to driver.
Driver decides which policies and SAs can be offloaded based on
hardware capacity, and acks/nacks each SA for given interface to
kernel.  Kernel needs to keep this information to make a decision to
skip software processing on TX, and to assume processing already done
on RX.  This shadow SPD/SAD database of offloads is rooted from
policies (struct secpolicy accel_ifps, struct ifp_handle_sp) and SAs
(struct secasvar accel_ipfs, struct ifp_handle_sav).

Some extensions to the PF_KEY socket allow to limit interfaces for
which given SP/SA could be offloaded (proposed for offload).  Also,
additional statistics extensions allow to observe allocation/octet/use
counters for specific SA.

Since SPs and SAs are typically instantiated in non-sleepable context,
while offloading them into card is expected to require costly async
manipulations of the card state, calls to the driver for offload and
termination are executed in the threaded taskqueue.  It also solves
the issue of allocating resources needed for the offload database.
Neither ipf_handle_sp nor ipf_handle_sav do not add reference to the
owning SP/SA, the offload must be terminated before last reference is
dropped.  ipsec_accel only adds transient references to ensure safe
pointer ownership by taskqueue.

Maintaining the SA counters for hardware-accelerated packets is the
duty of the driver.  The helper ipsec_accel_drv_sa_lifetime_update()
is provided to hide accel infrastructure from drivers which would use
expected callout to query hardware periodically for updates.

Reviewed by:	rscheff	(transport, stack integration), np
Sponsored by:	NVIDIA networking
Differential revision:	https://reviews.freebsd.org/D44219
2024-07-12 07:27:58 +03:00
..
config.mk Revert "config.mk: Add MK_VIMAGE knob" 2024-04-25 22:43:36 +01:00
dtb.build.mk
dtb.mk
files ipsec_offload: kernel infrastructure 2024-07-12 07:27:58 +03:00
files.amd64 Hyper-V: TLB flush enlightment using hypercall 2024-06-07 07:56:07 +00:00
files.arm sdt: Implement SDT probes using hot-patching 2024-06-19 16:57:41 -04:00
files.arm64 sdt: Implement SDT probes using hot-patching 2024-06-19 16:57:41 -04:00
files.i386 files.x86: Pull in some more duplicate lines from files.{amd64,i386} 2024-04-12 14:35:45 -07:00
files.powerpc ossl: Add support for powerpc64/powerpc64le 2024-06-21 03:29:04 -04:00
files.riscv sdt: Implement SDT probes using hot-patching 2024-06-19 16:57:41 -04:00
files.x86 sdt: Implement SDT probes using hot-patching 2024-06-19 16:57:41 -04:00
kern.mk arm64: Disable outling atomics 2024-06-05 09:23:40 +00:00
kern.opts.mk Revert "config.mk: Add MK_VIMAGE knob" 2024-04-25 22:43:36 +01:00
kern.post.mk
kern.pre.mk Fix bnxt build in LINT 2024-05-29 09:49:53 -06:00
kmod_syms_prefix.awk
kmod_syms.awk
kmod.mk kmod.mk use ${XARGS} 2024-05-10 12:05:05 -07:00
kmod.opts.mk
ldscript.amd64
ldscript.arm
ldscript.arm64
ldscript.i386
ldscript.kmod.amd64
ldscript.kmod.i386
ldscript.powerpc
ldscript.powerpc64
ldscript.powerpc64le
ldscript.powerpcspe
ldscript.riscv
Makefile.amd64
Makefile.arm
Makefile.arm64 sys: Build arm64 per-thread SSP with GCC 2024-05-22 08:20:01 +00:00
Makefile.i386
Makefile.powerpc
Makefile.riscv
newvers.sh
NOTES bde: remove lingering references 2024-07-08 12:43:38 +02:00
options ipsec_offload: kernel infrastructure 2024-07-12 07:27:58 +03:00
options.amd64
options.arm
options.arm64
options.i386 i386: Use DEV_HYPERV to enable HyperV APIC vector 2024-04-13 19:10:44 -07:00
options.powerpc
options.riscv riscv: support PV_STATS pmap option 2024-07-08 11:44:10 -03:00
std.debug sys: add conf/std.debug, generic debugging options 2024-04-23 15:13:31 -06:00
std.nodebug
sysent.mk
systags.sh
vdso_amd64_ia32.ldscript
vdso_amd64.ldscript
WITHOUT_SOURCELESS
WITHOUT_SOURCELESS_HOST
WITHOUT_SOURCELESS_UCODE