Commit 902812b8 authored by Leon Romanovsky's avatar Leon Romanovsky Committed by Jakub Kicinski

net/mlx5e: Fill IPsec state validation failure reason

Rely on extack to return failure reason.
Signed-off-by: default avatarLeon Romanovsky <leonro@nvidia.com>
Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
parent 7681a4f5
...@@ -162,91 +162,87 @@ void mlx5e_ipsec_build_accel_xfrm_attrs(struct mlx5e_ipsec_sa_entry *sa_entry, ...@@ -162,91 +162,87 @@ void mlx5e_ipsec_build_accel_xfrm_attrs(struct mlx5e_ipsec_sa_entry *sa_entry,
mlx5e_ipsec_init_limits(sa_entry, attrs); mlx5e_ipsec_init_limits(sa_entry, attrs);
} }
static inline int mlx5e_xfrm_validate_state(struct xfrm_state *x) static int mlx5e_xfrm_validate_state(struct mlx5_core_dev *mdev,
struct xfrm_state *x,
struct netlink_ext_ack *extack)
{ {
struct net_device *netdev = x->xso.real_dev;
struct mlx5e_priv *priv;
priv = netdev_priv(netdev);
if (x->props.aalgo != SADB_AALG_NONE) { if (x->props.aalgo != SADB_AALG_NONE) {
netdev_info(netdev, "Cannot offload authenticated xfrm states\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload authenticated xfrm states");
return -EINVAL; return -EINVAL;
} }
if (x->props.ealgo != SADB_X_EALG_AES_GCM_ICV16) { if (x->props.ealgo != SADB_X_EALG_AES_GCM_ICV16) {
netdev_info(netdev, "Only AES-GCM-ICV16 xfrm state may be offloaded\n"); NL_SET_ERR_MSG_MOD(extack, "Only AES-GCM-ICV16 xfrm state may be offloaded");
return -EINVAL; return -EINVAL;
} }
if (x->props.calgo != SADB_X_CALG_NONE) { if (x->props.calgo != SADB_X_CALG_NONE) {
netdev_info(netdev, "Cannot offload compressed xfrm states\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload compressed xfrm states");
return -EINVAL; return -EINVAL;
} }
if (x->props.flags & XFRM_STATE_ESN && if (x->props.flags & XFRM_STATE_ESN &&
!(mlx5_ipsec_device_caps(priv->mdev) & MLX5_IPSEC_CAP_ESN)) { !(mlx5_ipsec_device_caps(mdev) & MLX5_IPSEC_CAP_ESN)) {
netdev_info(netdev, "Cannot offload ESN xfrm states\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload ESN xfrm states");
return -EINVAL; return -EINVAL;
} }
if (x->props.family != AF_INET && if (x->props.family != AF_INET &&
x->props.family != AF_INET6) { x->props.family != AF_INET6) {
netdev_info(netdev, "Only IPv4/6 xfrm states may be offloaded\n"); NL_SET_ERR_MSG_MOD(extack, "Only IPv4/6 xfrm states may be offloaded");
return -EINVAL; return -EINVAL;
} }
if (x->id.proto != IPPROTO_ESP) { if (x->id.proto != IPPROTO_ESP) {
netdev_info(netdev, "Only ESP xfrm state may be offloaded\n"); NL_SET_ERR_MSG_MOD(extack, "Only ESP xfrm state may be offloaded");
return -EINVAL; return -EINVAL;
} }
if (x->encap) { if (x->encap) {
netdev_info(netdev, "Encapsulated xfrm state may not be offloaded\n"); NL_SET_ERR_MSG_MOD(extack, "Encapsulated xfrm state may not be offloaded");
return -EINVAL; return -EINVAL;
} }
if (!x->aead) { if (!x->aead) {
netdev_info(netdev, "Cannot offload xfrm states without aead\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states without aead");
return -EINVAL; return -EINVAL;
} }
if (x->aead->alg_icv_len != 128) { if (x->aead->alg_icv_len != 128) {
netdev_info(netdev, "Cannot offload xfrm states with AEAD ICV length other than 128bit\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with AEAD ICV length other than 128bit");
return -EINVAL; return -EINVAL;
} }
if ((x->aead->alg_key_len != 128 + 32) && if ((x->aead->alg_key_len != 128 + 32) &&
(x->aead->alg_key_len != 256 + 32)) { (x->aead->alg_key_len != 256 + 32)) {
netdev_info(netdev, "Cannot offload xfrm states with AEAD key length other than 128/256 bit\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with AEAD key length other than 128/256 bit");
return -EINVAL; return -EINVAL;
} }
if (x->tfcpad) { if (x->tfcpad) {
netdev_info(netdev, "Cannot offload xfrm states with tfc padding\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with tfc padding");
return -EINVAL; return -EINVAL;
} }
if (!x->geniv) { if (!x->geniv) {
netdev_info(netdev, "Cannot offload xfrm states without geniv\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states without geniv");
return -EINVAL; return -EINVAL;
} }
if (strcmp(x->geniv, "seqiv")) { if (strcmp(x->geniv, "seqiv")) {
netdev_info(netdev, "Cannot offload xfrm states with geniv other than seqiv\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload xfrm states with geniv other than seqiv");
return -EINVAL; return -EINVAL;
} }
switch (x->xso.type) { switch (x->xso.type) {
case XFRM_DEV_OFFLOAD_CRYPTO: case XFRM_DEV_OFFLOAD_CRYPTO:
if (!(mlx5_ipsec_device_caps(priv->mdev) & if (!(mlx5_ipsec_device_caps(mdev) & MLX5_IPSEC_CAP_CRYPTO)) {
MLX5_IPSEC_CAP_CRYPTO)) { NL_SET_ERR_MSG_MOD(extack, "Crypto offload is not supported");
netdev_info(netdev, "Crypto offload is not supported\n");
return -EINVAL; return -EINVAL;
} }
if (x->props.mode != XFRM_MODE_TRANSPORT && if (x->props.mode != XFRM_MODE_TRANSPORT &&
x->props.mode != XFRM_MODE_TUNNEL) { x->props.mode != XFRM_MODE_TUNNEL) {
netdev_info(netdev, "Only transport and tunnel xfrm states may be offloaded\n"); NL_SET_ERR_MSG_MOD(extack, "Only transport and tunnel xfrm states may be offloaded");
return -EINVAL; return -EINVAL;
} }
break; break;
case XFRM_DEV_OFFLOAD_PACKET: case XFRM_DEV_OFFLOAD_PACKET:
if (!(mlx5_ipsec_device_caps(priv->mdev) & if (!(mlx5_ipsec_device_caps(mdev) &
MLX5_IPSEC_CAP_PACKET_OFFLOAD)) { MLX5_IPSEC_CAP_PACKET_OFFLOAD)) {
netdev_info(netdev, "Packet offload is not supported\n"); NL_SET_ERR_MSG_MOD(extack, "Packet offload is not supported");
return -EINVAL; return -EINVAL;
} }
if (x->props.mode != XFRM_MODE_TRANSPORT) { if (x->props.mode != XFRM_MODE_TRANSPORT) {
netdev_info(netdev, "Only transport xfrm states may be offloaded in packet mode\n"); NL_SET_ERR_MSG_MOD(extack, "Only transport xfrm states may be offloaded in packet mode");
return -EINVAL; return -EINVAL;
} }
...@@ -254,35 +250,30 @@ static inline int mlx5e_xfrm_validate_state(struct xfrm_state *x) ...@@ -254,35 +250,30 @@ static inline int mlx5e_xfrm_validate_state(struct xfrm_state *x)
x->replay_esn->replay_window != 64 && x->replay_esn->replay_window != 64 &&
x->replay_esn->replay_window != 128 && x->replay_esn->replay_window != 128 &&
x->replay_esn->replay_window != 256) { x->replay_esn->replay_window != 256) {
netdev_info(netdev, NL_SET_ERR_MSG_MOD(extack, "Unsupported replay window size");
"Unsupported replay window size %u\n",
x->replay_esn->replay_window);
return -EINVAL; return -EINVAL;
} }
if (!x->props.reqid) { if (!x->props.reqid) {
netdev_info(netdev, "Cannot offload without reqid\n"); NL_SET_ERR_MSG_MOD(extack, "Cannot offload without reqid");
return -EINVAL; return -EINVAL;
} }
if (x->lft.hard_byte_limit != XFRM_INF || if (x->lft.hard_byte_limit != XFRM_INF ||
x->lft.soft_byte_limit != XFRM_INF) { x->lft.soft_byte_limit != XFRM_INF) {
netdev_info(netdev, NL_SET_ERR_MSG_MOD(extack, "Device doesn't support limits in bytes");
"Device doesn't support limits in bytes\n");
return -EINVAL; return -EINVAL;
} }
if (x->lft.soft_packet_limit >= x->lft.hard_packet_limit && if (x->lft.soft_packet_limit >= x->lft.hard_packet_limit &&
x->lft.hard_packet_limit != XFRM_INF) { x->lft.hard_packet_limit != XFRM_INF) {
/* XFRM stack doesn't prevent such configuration :(. */ /* XFRM stack doesn't prevent such configuration :(. */
netdev_info(netdev, NL_SET_ERR_MSG_MOD(extack, "Hard packet limit must be greater than soft one");
"Hard packet limit must be greater than soft one\n");
return -EINVAL; return -EINVAL;
} }
break; break;
default: default:
netdev_info(netdev, "Unsupported xfrm offload type %d\n", NL_SET_ERR_MSG_MOD(extack, "Unsupported xfrm offload type");
x->xso.type);
return -EINVAL; return -EINVAL;
} }
return 0; return 0;
...@@ -312,15 +303,13 @@ static int mlx5e_xfrm_add_state(struct xfrm_state *x, ...@@ -312,15 +303,13 @@ static int mlx5e_xfrm_add_state(struct xfrm_state *x,
return -EOPNOTSUPP; return -EOPNOTSUPP;
ipsec = priv->ipsec; ipsec = priv->ipsec;
err = mlx5e_xfrm_validate_state(x); err = mlx5e_xfrm_validate_state(priv->mdev, x, extack);
if (err) if (err)
return err; return err;
sa_entry = kzalloc(sizeof(*sa_entry), GFP_KERNEL); sa_entry = kzalloc(sizeof(*sa_entry), GFP_KERNEL);
if (!sa_entry) { if (!sa_entry)
err = -ENOMEM; return -ENOMEM;
goto out;
}
sa_entry->x = x; sa_entry->x = x;
sa_entry->ipsec = ipsec; sa_entry->ipsec = ipsec;
...@@ -361,7 +350,7 @@ static int mlx5e_xfrm_add_state(struct xfrm_state *x, ...@@ -361,7 +350,7 @@ static int mlx5e_xfrm_add_state(struct xfrm_state *x,
mlx5_ipsec_free_sa_ctx(sa_entry); mlx5_ipsec_free_sa_ctx(sa_entry);
err_xfrm: err_xfrm:
kfree(sa_entry); kfree(sa_entry);
out: NL_SET_ERR_MSG_MOD(extack, "Device failed to offload this policy");
return err; return err;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment