Previously, device driver IPSec offload implementations would fall into
two categories:
1. Those that used xso.dev to determine the offload device.
2. Those that used xso.real_dev to determine the offload device.

The first category didn't work with bonding while the second did.
In a non-bonding setup the two pointers are the same.

This commit adds explicit pointers for the offload netdevice to
.xdo_dev_state_add() / .xdo_dev_state_delete() / .xdo_dev_state_free()
which eliminates the confusion and allows drivers from the first
category to work with bonding.

xso.real_dev now becomes a private pointer managed by the bonding
driver.

Signed-off-by: Cosmin Ratiu <cra...@nvidia.com>
Reviewed-by: Leon Romanovsky <leo...@nvidia.com>
---
 Documentation/networking/xfrm_device.rst      | 10 +++--
 drivers/net/bonding/bond_main.c               | 31 +++++++-------
 .../net/ethernet/chelsio/cxgb4/cxgb4_main.c   | 20 +++++-----
 .../inline_crypto/ch_ipsec/chcr_ipsec.c       | 18 ++++++---
 .../net/ethernet/intel/ixgbe/ixgbe_ipsec.c    | 40 ++++++++++---------
 drivers/net/ethernet/intel/ixgbevf/ipsec.c    | 20 ++++++----
 .../marvell/octeontx2/nic/cn10k_ipsec.c       | 18 ++++-----
 .../mellanox/mlx5/core/en_accel/ipsec.c       | 12 +++---
 .../net/ethernet/netronome/nfp/crypto/ipsec.c | 11 +++--
 drivers/net/netdevsim/ipsec.c                 | 15 ++++---
 include/linux/netdevice.h                     | 10 +++--
 include/net/xfrm.h                            |  8 ++++
 net/xfrm/xfrm_device.c                        |  4 +-
 net/xfrm/xfrm_state.c                         | 14 ++++---
 14 files changed, 132 insertions(+), 99 deletions(-)

diff --git a/Documentation/networking/xfrm_device.rst 
b/Documentation/networking/xfrm_device.rst
index 7f24c09f2694..122204da0fff 100644
--- a/Documentation/networking/xfrm_device.rst
+++ b/Documentation/networking/xfrm_device.rst
@@ -65,9 +65,13 @@ Callbacks to implement
   /* from include/linux/netdevice.h */
   struct xfrmdev_ops {
         /* Crypto and Packet offload callbacks */
-       int     (*xdo_dev_state_add) (struct xfrm_state *x, struct 
netlink_ext_ack *extack);
-       void    (*xdo_dev_state_delete) (struct xfrm_state *x);
-       void    (*xdo_dev_state_free) (struct xfrm_state *x);
+       int     (*xdo_dev_state_add)(struct net_device *dev,
+                                     struct xfrm_state *x,
+                                     struct netlink_ext_ack *extack);
+       void    (*xdo_dev_state_delete)(struct net_device *dev,
+                                        struct xfrm_state *x);
+       void    (*xdo_dev_state_free)(struct net_device *dev,
+                                      struct xfrm_state *x);
        bool    (*xdo_dev_offload_ok) (struct sk_buff *skb,
                                       struct xfrm_state *x);
        void    (*xdo_dev_state_advance_esn) (struct xfrm_state *x);
diff --git a/drivers/net/bonding/bond_main.c b/drivers/net/bonding/bond_main.c
index 950d8e4d86f8..2ffde8f672c2 100644
--- a/drivers/net/bonding/bond_main.c
+++ b/drivers/net/bonding/bond_main.c
@@ -456,10 +456,10 @@ static struct net_device *bond_ipsec_dev(struct 
xfrm_state *xs)
  * @xs: pointer to transformer state struct
  * @extack: extack point to fill failure reason
  **/
-static int bond_ipsec_add_sa(struct xfrm_state *xs,
+static int bond_ipsec_add_sa(struct net_device *bond_dev,
+                            struct xfrm_state *xs,
                             struct netlink_ext_ack *extack)
 {
-       struct net_device *bond_dev = xs->xso.dev;
        struct net_device *real_dev;
        netdevice_tracker tracker;
        struct bond_ipsec *ipsec;
@@ -496,7 +496,7 @@ static int bond_ipsec_add_sa(struct xfrm_state *xs,
        }
 
        xs->xso.real_dev = real_dev;
-       err = real_dev->xfrmdev_ops->xdo_dev_state_add(xs, extack);
+       err = real_dev->xfrmdev_ops->xdo_dev_state_add(real_dev, xs, extack);
        if (!err) {
                ipsec->xs = xs;
                INIT_LIST_HEAD(&ipsec->list);
@@ -540,7 +540,8 @@ static void bond_ipsec_add_sa_all(struct bonding *bond)
                        continue;
 
                ipsec->xs->xso.real_dev = real_dev;
-               if (real_dev->xfrmdev_ops->xdo_dev_state_add(ipsec->xs, NULL)) {
+               if (real_dev->xfrmdev_ops->xdo_dev_state_add(real_dev,
+                                                            ipsec->xs, NULL)) {
                        slave_warn(bond_dev, real_dev, "%s: failed to add 
SA\n", __func__);
                        ipsec->xs->xso.real_dev = NULL;
                }
@@ -553,9 +554,9 @@ static void bond_ipsec_add_sa_all(struct bonding *bond)
  * bond_ipsec_del_sa - clear out this specific SA
  * @xs: pointer to transformer state struct
  **/
-static void bond_ipsec_del_sa(struct xfrm_state *xs)
+static void bond_ipsec_del_sa(struct net_device *bond_dev,
+                             struct xfrm_state *xs)
 {
-       struct net_device *bond_dev = xs->xso.dev;
        struct net_device *real_dev;
        netdevice_tracker tracker;
        struct bond_ipsec *ipsec;
@@ -587,7 +588,7 @@ static void bond_ipsec_del_sa(struct xfrm_state *xs)
                goto out;
        }
 
-       real_dev->xfrmdev_ops->xdo_dev_state_delete(xs);
+       real_dev->xfrmdev_ops->xdo_dev_state_delete(real_dev, xs);
 out:
        netdev_put(real_dev, &tracker);
        mutex_lock(&bond->ipsec_lock);
@@ -624,18 +625,20 @@ static void bond_ipsec_del_sa_all(struct bonding *bond)
                        slave_warn(bond_dev, real_dev,
                                   "%s: no slave xdo_dev_state_delete\n",
                                   __func__);
-               } else {
-                       real_dev->xfrmdev_ops->xdo_dev_state_delete(ipsec->xs);
-                       if (real_dev->xfrmdev_ops->xdo_dev_state_free)
-                               
real_dev->xfrmdev_ops->xdo_dev_state_free(ipsec->xs);
+                       continue;
                }
+               real_dev->xfrmdev_ops->xdo_dev_state_delete(real_dev,
+                                                           ipsec->xs);
+               if (real_dev->xfrmdev_ops->xdo_dev_state_free)
+                       real_dev->xfrmdev_ops->xdo_dev_state_free(real_dev,
+                                                                 ipsec->xs);
        }
        mutex_unlock(&bond->ipsec_lock);
 }
 
-static void bond_ipsec_free_sa(struct xfrm_state *xs)
+static void bond_ipsec_free_sa(struct net_device *bond_dev,
+                              struct xfrm_state *xs)
 {
-       struct net_device *bond_dev = xs->xso.dev;
        struct net_device *real_dev;
        netdevice_tracker tracker;
        struct bonding *bond;
@@ -661,7 +664,7 @@ static void bond_ipsec_free_sa(struct xfrm_state *xs)
 
        if (real_dev && real_dev->xfrmdev_ops &&
            real_dev->xfrmdev_ops->xdo_dev_state_free)
-               real_dev->xfrmdev_ops->xdo_dev_state_free(xs);
+               real_dev->xfrmdev_ops->xdo_dev_state_free(real_dev, xs);
 out:
        netdev_put(real_dev, &tracker);
 }
diff --git a/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c 
b/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c
index 551c279dc14b..51395c96b2e9 100644
--- a/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c
+++ b/drivers/net/ethernet/chelsio/cxgb4/cxgb4_main.c
@@ -6480,10 +6480,11 @@ static const struct tlsdev_ops cxgb4_ktls_ops = {
 
 #if IS_ENABLED(CONFIG_CHELSIO_IPSEC_INLINE)
 
-static int cxgb4_xfrm_add_state(struct xfrm_state *x,
+static int cxgb4_xfrm_add_state(struct net_device *dev,
+                               struct xfrm_state *x,
                                struct netlink_ext_ack *extack)
 {
-       struct adapter *adap = netdev2adap(x->xso.dev);
+       struct adapter *adap = netdev2adap(dev);
        int ret;
 
        if (!mutex_trylock(&uld_mutex)) {
@@ -6494,7 +6495,8 @@ static int cxgb4_xfrm_add_state(struct xfrm_state *x,
        if (ret)
                goto out_unlock;
 
-       ret = adap->uld[CXGB4_ULD_IPSEC].xfrmdev_ops->xdo_dev_state_add(x, 
extack);
+       ret = adap->uld[CXGB4_ULD_IPSEC].xfrmdev_ops->xdo_dev_state_add(dev, x,
+                                                                       extack);
 
 out_unlock:
        mutex_unlock(&uld_mutex);
@@ -6502,9 +6504,9 @@ static int cxgb4_xfrm_add_state(struct xfrm_state *x,
        return ret;
 }
 
-static void cxgb4_xfrm_del_state(struct xfrm_state *x)
+static void cxgb4_xfrm_del_state(struct net_device *dev, struct xfrm_state *x)
 {
-       struct adapter *adap = netdev2adap(x->xso.dev);
+       struct adapter *adap = netdev2adap(dev);
 
        if (!mutex_trylock(&uld_mutex)) {
                dev_dbg(adap->pdev_dev,
@@ -6514,15 +6516,15 @@ static void cxgb4_xfrm_del_state(struct xfrm_state *x)
        if (chcr_offload_state(adap, CXGB4_XFRMDEV_OPS))
                goto out_unlock;
 
-       adap->uld[CXGB4_ULD_IPSEC].xfrmdev_ops->xdo_dev_state_delete(x);
+       adap->uld[CXGB4_ULD_IPSEC].xfrmdev_ops->xdo_dev_state_delete(dev, x);
 
 out_unlock:
        mutex_unlock(&uld_mutex);
 }
 
-static void cxgb4_xfrm_free_state(struct xfrm_state *x)
+static void cxgb4_xfrm_free_state(struct net_device *dev, struct xfrm_state *x)
 {
-       struct adapter *adap = netdev2adap(x->xso.dev);
+       struct adapter *adap = netdev2adap(dev);
 
        if (!mutex_trylock(&uld_mutex)) {
                dev_dbg(adap->pdev_dev,
@@ -6532,7 +6534,7 @@ static void cxgb4_xfrm_free_state(struct xfrm_state *x)
        if (chcr_offload_state(adap, CXGB4_XFRMDEV_OPS))
                goto out_unlock;
 
-       adap->uld[CXGB4_ULD_IPSEC].xfrmdev_ops->xdo_dev_state_free(x);
+       adap->uld[CXGB4_ULD_IPSEC].xfrmdev_ops->xdo_dev_state_free(dev, x);
 
 out_unlock:
        mutex_unlock(&uld_mutex);
diff --git a/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c 
b/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c
index baba96883f48..ecd9a0bd5e18 100644
--- a/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c
+++ b/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/chcr_ipsec.c
@@ -75,9 +75,12 @@ static int ch_ipsec_uld_state_change(void *handle, enum 
cxgb4_state new_state);
 static int ch_ipsec_xmit(struct sk_buff *skb, struct net_device *dev);
 static void *ch_ipsec_uld_add(const struct cxgb4_lld_info *infop);
 static void ch_ipsec_advance_esn_state(struct xfrm_state *x);
-static void ch_ipsec_xfrm_free_state(struct xfrm_state *x);
-static void ch_ipsec_xfrm_del_state(struct xfrm_state *x);
-static int ch_ipsec_xfrm_add_state(struct xfrm_state *x,
+static void ch_ipsec_xfrm_free_state(struct net_device *dev,
+                                    struct xfrm_state *x);
+static void ch_ipsec_xfrm_del_state(struct net_device *dev,
+                                   struct xfrm_state *x);
+static int ch_ipsec_xfrm_add_state(struct net_device *dev,
+                                  struct xfrm_state *x,
                                   struct netlink_ext_ack *extack);
 
 static const struct xfrmdev_ops ch_ipsec_xfrmdev_ops = {
@@ -223,7 +226,8 @@ static int ch_ipsec_setkey(struct xfrm_state *x,
  * returns 0 on success, negative error if failed to send message to FPGA
  * positive error if FPGA returned a bad response
  */
-static int ch_ipsec_xfrm_add_state(struct xfrm_state *x,
+static int ch_ipsec_xfrm_add_state(struct net_device *dev,
+                                  struct xfrm_state *x,
                                   struct netlink_ext_ack *extack)
 {
        struct ipsec_sa_entry *sa_entry;
@@ -302,14 +306,16 @@ static int ch_ipsec_xfrm_add_state(struct xfrm_state *x,
        return res;
 }
 
-static void ch_ipsec_xfrm_del_state(struct xfrm_state *x)
+static void ch_ipsec_xfrm_del_state(struct net_device *dev,
+                                   struct xfrm_state *x)
 {
        /* do nothing */
        if (!x->xso.offload_handle)
                return;
 }
 
-static void ch_ipsec_xfrm_free_state(struct xfrm_state *x)
+static void ch_ipsec_xfrm_free_state(struct net_device *dev,
+                                    struct xfrm_state *x)
 {
        struct ipsec_sa_entry *sa_entry;
 
diff --git a/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c 
b/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c
index 07ea1954a276..bfb26a78da85 100644
--- a/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c
+++ b/drivers/net/ethernet/intel/ixgbe/ixgbe_ipsec.c
@@ -9,7 +9,7 @@
 #define IXGBE_IPSEC_KEY_BITS  160
 static const char aes_gcm_name[] = "rfc4106(gcm(aes))";
 
-static void ixgbe_ipsec_del_sa(struct xfrm_state *xs);
+static void ixgbe_ipsec_del_sa(struct net_device *dev, struct xfrm_state *xs);
 
 /**
  * ixgbe_ipsec_set_tx_sa - set the Tx SA registers
@@ -321,7 +321,7 @@ void ixgbe_ipsec_restore(struct ixgbe_adapter *adapter)
 
                if (r->used) {
                        if (r->mode & IXGBE_RXTXMOD_VF)
-                               ixgbe_ipsec_del_sa(r->xs);
+                               ixgbe_ipsec_del_sa(adapter->netdev, r->xs);
                        else
                                ixgbe_ipsec_set_rx_sa(hw, i, r->xs->id.spi,
                                                      r->key, r->salt,
@@ -330,7 +330,7 @@ void ixgbe_ipsec_restore(struct ixgbe_adapter *adapter)
 
                if (t->used) {
                        if (t->mode & IXGBE_RXTXMOD_VF)
-                               ixgbe_ipsec_del_sa(t->xs);
+                               ixgbe_ipsec_del_sa(adapter->netdev, t->xs);
                        else
                                ixgbe_ipsec_set_tx_sa(hw, i, t->key, t->salt);
                }
@@ -424,10 +424,10 @@ static struct xfrm_state 
*ixgbe_ipsec_find_rx_state(struct ixgbe_ipsec *ipsec,
  * This copies the protocol keys and salt to our own data tables.  The
  * 82599 family only supports the one algorithm.
  **/
-static int ixgbe_ipsec_parse_proto_keys(struct xfrm_state *xs,
+static int ixgbe_ipsec_parse_proto_keys(struct net_device *dev,
+                                       struct xfrm_state *xs,
                                        u32 *mykey, u32 *mysalt)
 {
-       struct net_device *dev = xs->xso.real_dev;
        unsigned char *key_data;
        char *alg_name = NULL;
        int key_len;
@@ -473,11 +473,12 @@ static int ixgbe_ipsec_parse_proto_keys(struct xfrm_state 
*xs,
 
 /**
  * ixgbe_ipsec_check_mgmt_ip - make sure there is no clash with mgmt IP filters
+ * @dev: pointer to net device
  * @xs: pointer to transformer state struct
  **/
-static int ixgbe_ipsec_check_mgmt_ip(struct xfrm_state *xs)
+static int ixgbe_ipsec_check_mgmt_ip(struct net_device *dev,
+                                    struct xfrm_state *xs)
 {
-       struct net_device *dev = xs->xso.real_dev;
        struct ixgbe_adapter *adapter = netdev_priv(dev);
        struct ixgbe_hw *hw = &adapter->hw;
        u32 mfval, manc, reg;
@@ -556,13 +557,14 @@ static int ixgbe_ipsec_check_mgmt_ip(struct xfrm_state 
*xs)
 
 /**
  * ixgbe_ipsec_add_sa - program device with a security association
+ * @dev: pointer to device to program
  * @xs: pointer to transformer state struct
  * @extack: extack point to fill failure reason
  **/
-static int ixgbe_ipsec_add_sa(struct xfrm_state *xs,
+static int ixgbe_ipsec_add_sa(struct net_device *dev,
+                             struct xfrm_state *xs,
                              struct netlink_ext_ack *extack)
 {
-       struct net_device *dev = xs->xso.real_dev;
        struct ixgbe_adapter *adapter = netdev_priv(dev);
        struct ixgbe_ipsec *ipsec = adapter->ipsec;
        struct ixgbe_hw *hw = &adapter->hw;
@@ -581,7 +583,7 @@ static int ixgbe_ipsec_add_sa(struct xfrm_state *xs,
                return -EINVAL;
        }
 
-       if (ixgbe_ipsec_check_mgmt_ip(xs)) {
+       if (ixgbe_ipsec_check_mgmt_ip(dev, xs)) {
                NL_SET_ERR_MSG_MOD(extack, "IPsec IP addr clash with mgmt 
filters");
                return -EINVAL;
        }
@@ -615,7 +617,7 @@ static int ixgbe_ipsec_add_sa(struct xfrm_state *xs,
                        rsa.decrypt = xs->ealg || xs->aead;
 
                /* get the key and salt */
-               ret = ixgbe_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt);
+               ret = ixgbe_ipsec_parse_proto_keys(dev, xs, rsa.key, &rsa.salt);
                if (ret) {
                        NL_SET_ERR_MSG_MOD(extack, "Failed to get key data for 
Rx SA table");
                        return ret;
@@ -724,7 +726,7 @@ static int ixgbe_ipsec_add_sa(struct xfrm_state *xs,
                if (xs->id.proto & IPPROTO_ESP)
                        tsa.encrypt = xs->ealg || xs->aead;
 
-               ret = ixgbe_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt);
+               ret = ixgbe_ipsec_parse_proto_keys(dev, xs, tsa.key, &tsa.salt);
                if (ret) {
                        NL_SET_ERR_MSG_MOD(extack, "Failed to get key data for 
Tx SA table");
                        memset(&tsa, 0, sizeof(tsa));
@@ -752,11 +754,11 @@ static int ixgbe_ipsec_add_sa(struct xfrm_state *xs,
 
 /**
  * ixgbe_ipsec_del_sa - clear out this specific SA
+ * @dev: pointer to device to program
  * @xs: pointer to transformer state struct
  **/
-static void ixgbe_ipsec_del_sa(struct xfrm_state *xs)
+static void ixgbe_ipsec_del_sa(struct net_device *dev, struct xfrm_state *xs)
 {
-       struct net_device *dev = xs->xso.real_dev;
        struct ixgbe_adapter *adapter = netdev_priv(dev);
        struct ixgbe_ipsec *ipsec = adapter->ipsec;
        struct ixgbe_hw *hw = &adapter->hw;
@@ -841,7 +843,8 @@ void ixgbe_ipsec_vf_clear(struct ixgbe_adapter *adapter, 
u32 vf)
                        continue;
                if (ipsec->rx_tbl[i].mode & IXGBE_RXTXMOD_VF &&
                    ipsec->rx_tbl[i].vf == vf)
-                       ixgbe_ipsec_del_sa(ipsec->rx_tbl[i].xs);
+                       ixgbe_ipsec_del_sa(adapter->netdev,
+                                          ipsec->rx_tbl[i].xs);
        }
 
        /* search tx sa table */
@@ -850,7 +853,8 @@ void ixgbe_ipsec_vf_clear(struct ixgbe_adapter *adapter, 
u32 vf)
                        continue;
                if (ipsec->tx_tbl[i].mode & IXGBE_RXTXMOD_VF &&
                    ipsec->tx_tbl[i].vf == vf)
-                       ixgbe_ipsec_del_sa(ipsec->tx_tbl[i].xs);
+                       ixgbe_ipsec_del_sa(adapter->netdev,
+                                          ipsec->tx_tbl[i].xs);
        }
 }
 
@@ -930,7 +934,7 @@ int ixgbe_ipsec_vf_add_sa(struct ixgbe_adapter *adapter, 
u32 *msgbuf, u32 vf)
        memcpy(xs->aead->alg_name, aes_gcm_name, sizeof(aes_gcm_name));
 
        /* set up the HW offload */
-       err = ixgbe_ipsec_add_sa(xs, NULL);
+       err = ixgbe_ipsec_add_sa(adapter->netdev, xs, NULL);
        if (err)
                goto err_aead;
 
@@ -1034,7 +1038,7 @@ int ixgbe_ipsec_vf_del_sa(struct ixgbe_adapter *adapter, 
u32 *msgbuf, u32 vf)
                xs = ipsec->tx_tbl[sa_idx].xs;
        }
 
-       ixgbe_ipsec_del_sa(xs);
+       ixgbe_ipsec_del_sa(adapter->netdev, xs);
 
        /* remove the xs that was made-up in the add request */
        kfree_sensitive(xs);
diff --git a/drivers/net/ethernet/intel/ixgbevf/ipsec.c 
b/drivers/net/ethernet/intel/ixgbevf/ipsec.c
index 8ba037e3d9c2..70002c89c884 100644
--- a/drivers/net/ethernet/intel/ixgbevf/ipsec.c
+++ b/drivers/net/ethernet/intel/ixgbevf/ipsec.c
@@ -208,10 +208,10 @@ struct xfrm_state *ixgbevf_ipsec_find_rx_state(struct 
ixgbevf_ipsec *ipsec,
  * This copies the protocol keys and salt to our own data tables.  The
  * 82599 family only supports the one algorithm.
  **/
-static int ixgbevf_ipsec_parse_proto_keys(struct xfrm_state *xs,
+static int ixgbevf_ipsec_parse_proto_keys(struct net_device *dev,
+                                         struct xfrm_state *xs,
                                          u32 *mykey, u32 *mysalt)
 {
-       struct net_device *dev = xs->xso.real_dev;
        unsigned char *key_data;
        char *alg_name = NULL;
        int key_len;
@@ -256,13 +256,14 @@ static int ixgbevf_ipsec_parse_proto_keys(struct 
xfrm_state *xs,
 
 /**
  * ixgbevf_ipsec_add_sa - program device with a security association
+ * @dev: pointer to net device to program
  * @xs: pointer to transformer state struct
  * @extack: extack point to fill failure reason
  **/
-static int ixgbevf_ipsec_add_sa(struct xfrm_state *xs,
+static int ixgbevf_ipsec_add_sa(struct net_device *dev,
+                               struct xfrm_state *xs,
                                struct netlink_ext_ack *extack)
 {
-       struct net_device *dev = xs->xso.real_dev;
        struct ixgbevf_adapter *adapter;
        struct ixgbevf_ipsec *ipsec;
        u16 sa_idx;
@@ -310,7 +311,8 @@ static int ixgbevf_ipsec_add_sa(struct xfrm_state *xs,
                        rsa.decrypt = xs->ealg || xs->aead;
 
                /* get the key and salt */
-               ret = ixgbevf_ipsec_parse_proto_keys(xs, rsa.key, &rsa.salt);
+               ret = ixgbevf_ipsec_parse_proto_keys(dev, xs, rsa.key,
+                                                    &rsa.salt);
                if (ret) {
                        NL_SET_ERR_MSG_MOD(extack, "Failed to get key data for 
Rx SA table");
                        return ret;
@@ -363,7 +365,8 @@ static int ixgbevf_ipsec_add_sa(struct xfrm_state *xs,
                if (xs->id.proto & IPPROTO_ESP)
                        tsa.encrypt = xs->ealg || xs->aead;
 
-               ret = ixgbevf_ipsec_parse_proto_keys(xs, tsa.key, &tsa.salt);
+               ret = ixgbevf_ipsec_parse_proto_keys(dev, xs, tsa.key,
+                                                    &tsa.salt);
                if (ret) {
                        NL_SET_ERR_MSG_MOD(extack, "Failed to get key data for 
Tx SA table");
                        memset(&tsa, 0, sizeof(tsa));
@@ -389,10 +392,11 @@ static int ixgbevf_ipsec_add_sa(struct xfrm_state *xs,
 /**
  * ixgbevf_ipsec_del_sa - clear out this specific SA
  * @xs: pointer to transformer state struct
+ * @dev: pointer to net device to program
  **/
-static void ixgbevf_ipsec_del_sa(struct xfrm_state *xs)
+static void ixgbevf_ipsec_del_sa(struct net_device *dev,
+                                struct xfrm_state *xs)
 {
-       struct net_device *dev = xs->xso.real_dev;
        struct ixgbevf_adapter *adapter;
        struct ixgbevf_ipsec *ipsec;
        u16 sa_idx;
diff --git a/drivers/net/ethernet/marvell/octeontx2/nic/cn10k_ipsec.c 
b/drivers/net/ethernet/marvell/octeontx2/nic/cn10k_ipsec.c
index fc59e50bafce..a6500e3673f2 100644
--- a/drivers/net/ethernet/marvell/octeontx2/nic/cn10k_ipsec.c
+++ b/drivers/net/ethernet/marvell/octeontx2/nic/cn10k_ipsec.c
@@ -663,10 +663,10 @@ static int cn10k_ipsec_inb_add_state(struct xfrm_state *x,
        return -EOPNOTSUPP;
 }
 
-static int cn10k_ipsec_outb_add_state(struct xfrm_state *x,
+static int cn10k_ipsec_outb_add_state(struct net_device *dev,
+                                     struct xfrm_state *x,
                                      struct netlink_ext_ack *extack)
 {
-       struct net_device *netdev = x->xso.dev;
        struct cn10k_tx_sa_s *sa_entry;
        struct qmem *sa_info;
        struct otx2_nic *pf;
@@ -676,7 +676,7 @@ static int cn10k_ipsec_outb_add_state(struct xfrm_state *x,
        if (err)
                return err;
 
-       pf = netdev_priv(netdev);
+       pf = netdev_priv(dev);
 
        err = qmem_alloc(pf->dev, &sa_info, pf->ipsec.sa_size, OTX2_ALIGN);
        if (err)
@@ -700,18 +700,18 @@ static int cn10k_ipsec_outb_add_state(struct xfrm_state 
*x,
        return 0;
 }
 
-static int cn10k_ipsec_add_state(struct xfrm_state *x,
+static int cn10k_ipsec_add_state(struct net_device *dev,
+                                struct xfrm_state *x,
                                 struct netlink_ext_ack *extack)
 {
        if (x->xso.dir == XFRM_DEV_OFFLOAD_IN)
                return cn10k_ipsec_inb_add_state(x, extack);
        else
-               return cn10k_ipsec_outb_add_state(x, extack);
+               return cn10k_ipsec_outb_add_state(dev, x, extack);
 }
 
-static void cn10k_ipsec_del_state(struct xfrm_state *x)
+static void cn10k_ipsec_del_state(struct net_device *dev, struct xfrm_state *x)
 {
-       struct net_device *netdev = x->xso.dev;
        struct cn10k_tx_sa_s *sa_entry;
        struct qmem *sa_info;
        struct otx2_nic *pf;
@@ -720,7 +720,7 @@ static void cn10k_ipsec_del_state(struct xfrm_state *x)
        if (x->xso.dir == XFRM_DEV_OFFLOAD_IN)
                return;
 
-       pf = netdev_priv(netdev);
+       pf = netdev_priv(dev);
 
        sa_info = (struct qmem *)x->xso.offload_handle;
        sa_entry = (struct cn10k_tx_sa_s *)sa_info->base;
@@ -732,7 +732,7 @@ static void cn10k_ipsec_del_state(struct xfrm_state *x)
 
        err = cn10k_outb_write_sa(pf, sa_info);
        if (err)
-               netdev_err(netdev, "Error (%d) deleting SA\n", err);
+               netdev_err(dev, "Error (%d) deleting SA\n", err);
 
        x->xso.offload_handle = 0;
        qmem_free(pf->dev, sa_info);
diff --git a/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c 
b/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c
index 0dfbbe21936f..77f61cd28a79 100644
--- a/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c
+++ b/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c
@@ -689,17 +689,17 @@ static int mlx5e_ipsec_create_dwork(struct 
mlx5e_ipsec_sa_entry *sa_entry)
        return 0;
 }
 
-static int mlx5e_xfrm_add_state(struct xfrm_state *x,
+static int mlx5e_xfrm_add_state(struct net_device *dev,
+                               struct xfrm_state *x,
                                struct netlink_ext_ack *extack)
 {
        struct mlx5e_ipsec_sa_entry *sa_entry = NULL;
-       struct net_device *netdev = x->xso.real_dev;
        struct mlx5e_ipsec *ipsec;
        struct mlx5e_priv *priv;
        gfp_t gfp;
        int err;
 
-       priv = netdev_priv(netdev);
+       priv = netdev_priv(dev);
        if (!priv->ipsec)
                return -EOPNOTSUPP;
 
@@ -710,7 +710,7 @@ static int mlx5e_xfrm_add_state(struct xfrm_state *x,
                return -ENOMEM;
 
        sa_entry->x = x;
-       sa_entry->dev = netdev;
+       sa_entry->dev = dev;
        sa_entry->ipsec = ipsec;
        /* Check if this SA is originated from acquire flow temporary SA */
        if (x->xso.flags & XFRM_DEV_OFFLOAD_FLAG_ACQ)
@@ -807,7 +807,7 @@ static int mlx5e_xfrm_add_state(struct xfrm_state *x,
        return err;
 }
 
-static void mlx5e_xfrm_del_state(struct xfrm_state *x)
+static void mlx5e_xfrm_del_state(struct net_device *dev, struct xfrm_state *x)
 {
        struct mlx5e_ipsec_sa_entry *sa_entry = to_ipsec_sa_entry(x);
        struct mlx5e_ipsec *ipsec = sa_entry->ipsec;
@@ -820,7 +820,7 @@ static void mlx5e_xfrm_del_state(struct xfrm_state *x)
        WARN_ON(old != sa_entry);
 }
 
-static void mlx5e_xfrm_free_state(struct xfrm_state *x)
+static void mlx5e_xfrm_free_state(struct net_device *dev, struct xfrm_state *x)
 {
        struct mlx5e_ipsec_sa_entry *sa_entry = to_ipsec_sa_entry(x);
        struct mlx5e_ipsec *ipsec = sa_entry->ipsec;
diff --git a/drivers/net/ethernet/netronome/nfp/crypto/ipsec.c 
b/drivers/net/ethernet/netronome/nfp/crypto/ipsec.c
index 671af5d4c5d2..9e7c285eaa6b 100644
--- a/drivers/net/ethernet/netronome/nfp/crypto/ipsec.c
+++ b/drivers/net/ethernet/netronome/nfp/crypto/ipsec.c
@@ -266,17 +266,17 @@ static void set_sha2_512hmac(struct nfp_ipsec_cfg_add_sa 
*cfg, int *trunc_len)
        }
 }
 
-static int nfp_net_xfrm_add_state(struct xfrm_state *x,
+static int nfp_net_xfrm_add_state(struct net_device *dev,
+                                 struct xfrm_state *x,
                                  struct netlink_ext_ack *extack)
 {
-       struct net_device *netdev = x->xso.real_dev;
        struct nfp_ipsec_cfg_mssg msg = {};
        int i, key_len, trunc_len, err = 0;
        struct nfp_ipsec_cfg_add_sa *cfg;
        struct nfp_net *nn;
        unsigned int saidx;
 
-       nn = netdev_priv(netdev);
+       nn = netdev_priv(dev);
        cfg = &msg.cfg_add_sa;
 
        /* General */
@@ -546,17 +546,16 @@ static int nfp_net_xfrm_add_state(struct xfrm_state *x,
        return 0;
 }
 
-static void nfp_net_xfrm_del_state(struct xfrm_state *x)
+static void nfp_net_xfrm_del_state(struct net_device *dev, struct xfrm_state 
*x)
 {
        struct nfp_ipsec_cfg_mssg msg = {
                .cmd = NFP_IPSEC_CFG_MSSG_INV_SA,
                .sa_idx = x->xso.offload_handle - 1,
        };
-       struct net_device *netdev = x->xso.real_dev;
        struct nfp_net *nn;
        int err;
 
-       nn = netdev_priv(netdev);
+       nn = netdev_priv(dev);
        err = nfp_net_sched_mbox_amsg_work(nn, NFP_NET_CFG_MBOX_CMD_IPSEC, &msg,
                                           sizeof(msg), nfp_net_ipsec_cfg);
        if (err)
diff --git a/drivers/net/netdevsim/ipsec.c b/drivers/net/netdevsim/ipsec.c
index d88bdb9a1717..47cdee5577d4 100644
--- a/drivers/net/netdevsim/ipsec.c
+++ b/drivers/net/netdevsim/ipsec.c
@@ -85,11 +85,11 @@ static int nsim_ipsec_find_empty_idx(struct nsim_ipsec 
*ipsec)
        return -ENOSPC;
 }
 
-static int nsim_ipsec_parse_proto_keys(struct xfrm_state *xs,
+static int nsim_ipsec_parse_proto_keys(struct net_device *dev,
+                                      struct xfrm_state *xs,
                                       u32 *mykey, u32 *mysalt)
 {
        const char aes_gcm_name[] = "rfc4106(gcm(aes))";
-       struct net_device *dev = xs->xso.real_dev;
        unsigned char *key_data;
        char *alg_name = NULL;
        int key_len;
@@ -129,17 +129,16 @@ static int nsim_ipsec_parse_proto_keys(struct xfrm_state 
*xs,
        return 0;
 }
 
-static int nsim_ipsec_add_sa(struct xfrm_state *xs,
+static int nsim_ipsec_add_sa(struct net_device *dev,
+                            struct xfrm_state *xs,
                             struct netlink_ext_ack *extack)
 {
        struct nsim_ipsec *ipsec;
-       struct net_device *dev;
        struct netdevsim *ns;
        struct nsim_sa sa;
        u16 sa_idx;
        int ret;
 
-       dev = xs->xso.real_dev;
        ns = netdev_priv(dev);
        ipsec = &ns->ipsec;
 
@@ -174,7 +173,7 @@ static int nsim_ipsec_add_sa(struct xfrm_state *xs,
                sa.crypt = xs->ealg || xs->aead;
 
        /* get the key and salt */
-       ret = nsim_ipsec_parse_proto_keys(xs, sa.key, &sa.salt);
+       ret = nsim_ipsec_parse_proto_keys(dev, xs, sa.key, &sa.salt);
        if (ret) {
                NL_SET_ERR_MSG_MOD(extack, "Failed to get key data for SA 
table");
                return ret;
@@ -200,9 +199,9 @@ static int nsim_ipsec_add_sa(struct xfrm_state *xs,
        return 0;
 }
 
-static void nsim_ipsec_del_sa(struct xfrm_state *xs)
+static void nsim_ipsec_del_sa(struct net_device *dev, struct xfrm_state *xs)
 {
-       struct netdevsim *ns = netdev_priv(xs->xso.real_dev);
+       struct netdevsim *ns = netdev_priv(dev);
        struct nsim_ipsec *ipsec = &ns->ipsec;
        u16 sa_idx;
 
diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h
index fa79145518d1..4f8163783956 100644
--- a/include/linux/netdevice.h
+++ b/include/linux/netdevice.h
@@ -1012,9 +1012,13 @@ struct netdev_bpf {
 
 #ifdef CONFIG_XFRM_OFFLOAD
 struct xfrmdev_ops {
-       int     (*xdo_dev_state_add) (struct xfrm_state *x, struct 
netlink_ext_ack *extack);
-       void    (*xdo_dev_state_delete) (struct xfrm_state *x);
-       void    (*xdo_dev_state_free) (struct xfrm_state *x);
+       int     (*xdo_dev_state_add)(struct net_device *dev,
+                                    struct xfrm_state *x,
+                                    struct netlink_ext_ack *extack);
+       void    (*xdo_dev_state_delete)(struct net_device *dev,
+                                       struct xfrm_state *x);
+       void    (*xdo_dev_state_free)(struct net_device *dev,
+                                     struct xfrm_state *x);
        bool    (*xdo_dev_offload_ok) (struct sk_buff *skb,
                                       struct xfrm_state *x);
        void    (*xdo_dev_state_advance_esn) (struct xfrm_state *x);
diff --git a/include/net/xfrm.h b/include/net/xfrm.h
index 39365fd2ea17..3d2f6c879311 100644
--- a/include/net/xfrm.h
+++ b/include/net/xfrm.h
@@ -147,8 +147,16 @@ enum {
 };
 
 struct xfrm_dev_offload {
+       /* The device for this offload.
+        * Device drivers should not use this directly, as that will prevent
+        * them from working with bonding device. Instead, the device passed
+        * to the add/delete callbacks should be used.
+        */
        struct net_device       *dev;
        netdevice_tracker       dev_tracker;
+       /* This is a private pointer used by the bonding driver.
+        * Device drivers should not use it.
+        */
        struct net_device       *real_dev;
        unsigned long           offload_handle;
        u8                      dir : 2;
diff --git a/net/xfrm/xfrm_device.c b/net/xfrm/xfrm_device.c
index 0be5f7ffd019..3be0139373f7 100644
--- a/net/xfrm/xfrm_device.c
+++ b/net/xfrm/xfrm_device.c
@@ -309,7 +309,6 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state 
*x,
 
        xso->dev = dev;
        netdev_tracker_alloc(dev, &xso->dev_tracker, GFP_ATOMIC);
-       xso->real_dev = dev;
 
        if (xuo->flags & XFRM_OFFLOAD_INBOUND)
                xso->dir = XFRM_DEV_OFFLOAD_IN;
@@ -321,11 +320,10 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state 
*x,
        else
                xso->type = XFRM_DEV_OFFLOAD_CRYPTO;
 
-       err = dev->xfrmdev_ops->xdo_dev_state_add(x, extack);
+       err = dev->xfrmdev_ops->xdo_dev_state_add(dev, x, extack);
        if (err) {
                xso->dev = NULL;
                xso->dir = 0;
-               xso->real_dev = NULL;
                netdev_put(dev, &xso->dev_tracker);
                xso->type = XFRM_DEV_OFFLOAD_UNSPECIFIED;
 
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
index 33d1f5679e8b..e9b6e25508f6 100644
--- a/net/xfrm/xfrm_state.c
+++ b/net/xfrm/xfrm_state.c
@@ -767,7 +767,7 @@ void xfrm_dev_state_delete(struct xfrm_state *x)
        struct net_device *dev = READ_ONCE(xso->dev);
 
        if (dev) {
-               dev->xfrmdev_ops->xdo_dev_state_delete(x);
+               dev->xfrmdev_ops->xdo_dev_state_delete(dev, x);
                spin_lock_bh(&xfrm_state_dev_gc_lock);
                hlist_add_head(&x->dev_gclist, &xfrm_state_dev_gc_list);
                spin_unlock_bh(&xfrm_state_dev_gc_lock);
@@ -789,7 +789,7 @@ void xfrm_dev_state_free(struct xfrm_state *x)
                spin_unlock_bh(&xfrm_state_dev_gc_lock);
 
                if (dev->xfrmdev_ops->xdo_dev_state_free)
-                       dev->xfrmdev_ops->xdo_dev_state_free(x);
+                       dev->xfrmdev_ops->xdo_dev_state_free(dev, x);
                WRITE_ONCE(xso->dev, NULL);
                xso->type = XFRM_DEV_OFFLOAD_UNSPECIFIED;
                netdev_put(dev, &xso->dev_tracker);
@@ -1551,16 +1551,18 @@ xfrm_state_find(const xfrm_address_t *daddr, const 
xfrm_address_t *saddr,
                if (pol->xdo.type == XFRM_DEV_OFFLOAD_PACKET) {
                        struct xfrm_dev_offload *xdo = &pol->xdo;
                        struct xfrm_dev_offload *xso = &x->xso;
+                       struct net_device *dev = xdo->dev;
 
                        xso->type = XFRM_DEV_OFFLOAD_PACKET;
                        xso->dir = xdo->dir;
-                       xso->dev = xdo->dev;
+                       xso->dev = dev;
                        xso->flags = XFRM_DEV_OFFLOAD_FLAG_ACQ;
-                       netdev_hold(xso->dev, &xso->dev_tracker, GFP_ATOMIC);
-                       error = xso->dev->xfrmdev_ops->xdo_dev_state_add(x, 
NULL);
+                       netdev_hold(dev, &xso->dev_tracker, GFP_ATOMIC);
+                       error = dev->xfrmdev_ops->xdo_dev_state_add(dev, x,
+                                                                   NULL);
                        if (error) {
                                xso->dir = 0;
-                               netdev_put(xso->dev, &xso->dev_tracker);
+                               netdev_put(dev, &xso->dev_tracker);
                                xso->dev = NULL;
                                xso->type = XFRM_DEV_OFFLOAD_UNSPECIFIED;
                                x->km.state = XFRM_STATE_DEAD;
-- 
2.45.0



Reply via email to