OSDN Git Service

net/mlx5e: Fill IPsec state validation failure reason
authorLeon Romanovsky <leonro@nvidia.com>
Tue, 24 Jan 2023 11:55:00 +0000 (13:55 +0200)
committerJakub Kicinski <kuba@kernel.org>
Fri, 27 Jan 2023 00:28:48 +0000 (16:28 -0800)
Rely on extack to return failure reason.

Signed-off-by: Leon Romanovsky <leonro@nvidia.com>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c

index a889df7..e84c340 100644 (file)
@@ -162,91 +162,87 @@ void mlx5e_ipsec_build_accel_xfrm_attrs(struct mlx5e_ipsec_sa_entry *sa_entry,
        mlx5e_ipsec_init_limits(sa_entry, attrs);
 }
 
-static inline int mlx5e_xfrm_validate_state(struct xfrm_state *x)
+static int mlx5e_xfrm_validate_state(struct mlx5_core_dev *mdev,
+                                    struct xfrm_state *x,
+                                    struct netlink_ext_ack *extack)
 {
-       struct net_device *netdev = x->xso.real_dev;
-       struct mlx5e_priv *priv;
-
-       priv = netdev_priv(netdev);
-
        if (x->props.aalgo != SADB_AALG_NONE) {
-               netdev_info(netdev, "Cannot offload authenticated xfrm states\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload authenticated xfrm states");
                return -EINVAL;
        }
        if (x->props.ealgo != SADB_X_EALG_AES_GCM_ICV16) {
-               netdev_info(netdev, "Only AES-GCM-ICV16 xfrm state may be offloaded\n");
+               NL_SET_ERR_MSG_MOD(extack, "Only AES-GCM-ICV16 xfrm state may be offloaded");
                return -EINVAL;
        }
        if (x->props.calgo != SADB_X_CALG_NONE) {
-               netdev_info(netdev, "Cannot offload compressed xfrm states\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload compressed xfrm states");
                return -EINVAL;
        }
        if (x->props.flags & XFRM_STATE_ESN &&
-           !(mlx5_ipsec_device_caps(priv->mdev) & MLX5_IPSEC_CAP_ESN)) {
-               netdev_info(netdev, "Cannot offload ESN xfrm states\n");
+           !(mlx5_ipsec_device_caps(mdev) & MLX5_IPSEC_CAP_ESN)) {
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload ESN xfrm states");
                return -EINVAL;
        }
        if (x->props.family != AF_INET &&
            x->props.family != AF_INET6) {
-               netdev_info(netdev, "Only IPv4/6 xfrm states may be offloaded\n");
+               NL_SET_ERR_MSG_MOD(extack, "Only IPv4/6 xfrm states may be offloaded");
                return -EINVAL;
        }
        if (x->id.proto != IPPROTO_ESP) {
-               netdev_info(netdev, "Only ESP xfrm state may be offloaded\n");
+               NL_SET_ERR_MSG_MOD(extack, "Only ESP xfrm state may be offloaded");
                return -EINVAL;
        }
        if (x->encap) {
-               netdev_info(netdev, "Encapsulated xfrm state may not be offloaded\n");
+               NL_SET_ERR_MSG_MOD(extack, "Encapsulated xfrm state may not be offloaded");
                return -EINVAL;
        }
        if (!x->aead) {
-               netdev_info(netdev, "Cannot offload xfrm states without aead\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states without aead");
                return -EINVAL;
        }
        if (x->aead->alg_icv_len != 128) {
-               netdev_info(netdev, "Cannot offload xfrm states with AEAD ICV length other than 128bit\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with AEAD ICV length other than 128bit");
                return -EINVAL;
        }
        if ((x->aead->alg_key_len != 128 + 32) &&
            (x->aead->alg_key_len != 256 + 32)) {
-               netdev_info(netdev, "Cannot offload xfrm states with AEAD key length other than 128/256 bit\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with AEAD key length other than 128/256 bit");
                return -EINVAL;
        }
        if (x->tfcpad) {
-               netdev_info(netdev, "Cannot offload xfrm states with tfc padding\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with tfc padding");
                return -EINVAL;
        }
        if (!x->geniv) {
-               netdev_info(netdev, "Cannot offload xfrm states without geniv\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states without geniv");
                return -EINVAL;
        }
        if (strcmp(x->geniv, "seqiv")) {
-               netdev_info(netdev, "Cannot offload xfrm states with geniv other than seqiv\n");
+               NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with geniv other than seqiv");
                return -EINVAL;
        }
        switch (x->xso.type) {
        case XFRM_DEV_OFFLOAD_CRYPTO:
-               if (!(mlx5_ipsec_device_caps(priv->mdev) &
-                     MLX5_IPSEC_CAP_CRYPTO)) {
-                       netdev_info(netdev, "Crypto offload is not supported\n");
+               if (!(mlx5_ipsec_device_caps(mdev) & MLX5_IPSEC_CAP_CRYPTO)) {
+                       NL_SET_ERR_MSG_MOD(extack, "Crypto offload is not supported");
                        return -EINVAL;
                }
 
                if (x->props.mode != XFRM_MODE_TRANSPORT &&
                    x->props.mode != XFRM_MODE_TUNNEL) {
-                       netdev_info(netdev, "Only transport and tunnel xfrm states may be offloaded\n");
+                       NL_SET_ERR_MSG_MOD(extack, "Only transport and tunnel xfrm states may be offloaded");
                        return -EINVAL;
                }
                break;
        case XFRM_DEV_OFFLOAD_PACKET:
-               if (!(mlx5_ipsec_device_caps(priv->mdev) &
+               if (!(mlx5_ipsec_device_caps(mdev) &
                      MLX5_IPSEC_CAP_PACKET_OFFLOAD)) {
-                       netdev_info(netdev, "Packet offload is not supported\n");
+                       NL_SET_ERR_MSG_MOD(extack, "Packet offload is not supported");
                        return -EINVAL;
                }
 
                if (x->props.mode != XFRM_MODE_TRANSPORT) {
-                       netdev_info(netdev, "Only transport xfrm states may be offloaded in packet mode\n");
+                       NL_SET_ERR_MSG_MOD(extack, "Only transport xfrm states may be offloaded in packet mode");
                        return -EINVAL;
                }
 
@@ -254,35 +250,30 @@ static inline int mlx5e_xfrm_validate_state(struct xfrm_state *x)
                    x->replay_esn->replay_window != 64 &&
                    x->replay_esn->replay_window != 128 &&
                    x->replay_esn->replay_window != 256) {
-                       netdev_info(netdev,
-                                   "Unsupported replay window size %u\n",
-                                   x->replay_esn->replay_window);
+                       NL_SET_ERR_MSG_MOD(extack, "Unsupported replay window size");
                        return -EINVAL;
                }
 
                if (!x->props.reqid) {
-                       netdev_info(netdev, "Cannot offload without reqid\n");
+                       NL_SET_ERR_MSG_MOD(extack, "Cannot offload without reqid");
                        return -EINVAL;
                }
 
                if (x->lft.hard_byte_limit != XFRM_INF ||
                    x->lft.soft_byte_limit != XFRM_INF) {
-                       netdev_info(netdev,
-                                   "Device doesn't support limits in bytes\n");
+                       NL_SET_ERR_MSG_MOD(extack, "Device doesn't support limits in bytes");
                        return -EINVAL;
                }
 
                if (x->lft.soft_packet_limit >= x->lft.hard_packet_limit &&
                    x->lft.hard_packet_limit != XFRM_INF) {
                        /* XFRM stack doesn't prevent such configuration :(. */
-                       netdev_info(netdev,
-                                   "Hard packet limit must be greater than soft one\n");
+                       NL_SET_ERR_MSG_MOD(extack, "Hard packet limit must be greater than soft one");
                        return -EINVAL;
                }
                break;
        default:
-               netdev_info(netdev, "Unsupported xfrm offload type %d\n",
-                           x->xso.type);
+               NL_SET_ERR_MSG_MOD(extack, "Unsupported xfrm offload type");
                return -EINVAL;
        }
        return 0;
@@ -312,15 +303,13 @@ static int mlx5e_xfrm_add_state(struct xfrm_state *x,
                return -EOPNOTSUPP;
 
        ipsec = priv->ipsec;
-       err = mlx5e_xfrm_validate_state(x);
+       err = mlx5e_xfrm_validate_state(priv->mdev, x, extack);
        if (err)
                return err;
 
        sa_entry = kzalloc(sizeof(*sa_entry), GFP_KERNEL);
-       if (!sa_entry) {
-               err = -ENOMEM;
-               goto out;
-       }
+       if (!sa_entry)
+               return -ENOMEM;
 
        sa_entry->x = x;
        sa_entry->ipsec = ipsec;
@@ -361,7 +350,7 @@ err_hw_ctx:
        mlx5_ipsec_free_sa_ctx(sa_entry);
 err_xfrm:
        kfree(sa_entry);
-out:
+       NL_SET_ERR_MSG_MOD(extack, "Device failed to offload this policy");
        return err;
 }