Skip to content

Commit 48ff45d

Browse files
committed
Merge branch 'xfrm: add netlink extack for state creation'
Sabrina Dubroca says: ============ This is the second part of my work adding extended acks to XFRM, now taking care of state creation. Policies were handled in the previous series [1]. To keep this series at a reasonable size, x->type->init_state will be handled separately. [1] https://lkml.kernel.org/r/[email protected] ============ Signed-off-by: Steffen Klassert <[email protected]>
2 parents 50c448b + 1cf9a3a commit 48ff45d

File tree

5 files changed

+196
-81
lines changed

5 files changed

+196
-81
lines changed

include/net/xfrm.h

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1580,9 +1580,10 @@ int xfrm_dev_state_flush(struct net *net, struct net_device *dev, bool task_vali
15801580
void xfrm_sad_getinfo(struct net *net, struct xfrmk_sadinfo *si);
15811581
void xfrm_spd_getinfo(struct net *net, struct xfrmk_spdinfo *si);
15821582
u32 xfrm_replay_seqhi(struct xfrm_state *x, __be32 net_seq);
1583-
int xfrm_init_replay(struct xfrm_state *x);
1583+
int xfrm_init_replay(struct xfrm_state *x, struct netlink_ext_ack *extack);
15841584
u32 xfrm_state_mtu(struct xfrm_state *x, int mtu);
1585-
int __xfrm_init_state(struct xfrm_state *x, bool init_replay, bool offload);
1585+
int __xfrm_init_state(struct xfrm_state *x, bool init_replay, bool offload,
1586+
struct netlink_ext_ack *extack);
15861587
int xfrm_init_state(struct xfrm_state *x);
15871588
int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type);
15881589
int xfrm_input_resume(struct sk_buff *skb, int nexthdr);
@@ -1886,7 +1887,8 @@ void xfrm_dev_resume(struct sk_buff *skb);
18861887
void xfrm_dev_backlog(struct softnet_data *sd);
18871888
struct sk_buff *validate_xmit_xfrm(struct sk_buff *skb, netdev_features_t features, bool *again);
18881889
int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
1889-
struct xfrm_user_offload *xuo);
1890+
struct xfrm_user_offload *xuo,
1891+
struct netlink_ext_ack *extack);
18901892
bool xfrm_dev_offload_ok(struct sk_buff *skb, struct xfrm_state *x);
18911893

18921894
static inline void xfrm_dev_state_advance_esn(struct xfrm_state *x)
@@ -1949,7 +1951,7 @@ static inline struct sk_buff *validate_xmit_xfrm(struct sk_buff *skb, netdev_fea
19491951
return skb;
19501952
}
19511953

1952-
static inline int xfrm_dev_state_add(struct net *net, struct xfrm_state *x, struct xfrm_user_offload *xuo)
1954+
static inline int xfrm_dev_state_add(struct net *net, struct xfrm_state *x, struct xfrm_user_offload *xuo, struct netlink_ext_ack *extack)
19531955
{
19541956
return 0;
19551957
}

net/xfrm/xfrm_device.c

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,8 @@ struct sk_buff *validate_xmit_xfrm(struct sk_buff *skb, netdev_features_t featur
207207
EXPORT_SYMBOL_GPL(validate_xmit_xfrm);
208208

209209
int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
210-
struct xfrm_user_offload *xuo)
210+
struct xfrm_user_offload *xuo,
211+
struct netlink_ext_ack *extack)
211212
{
212213
int err;
213214
struct dst_entry *dst;
@@ -216,15 +217,21 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
216217
xfrm_address_t *saddr;
217218
xfrm_address_t *daddr;
218219

219-
if (!x->type_offload)
220+
if (!x->type_offload) {
221+
NL_SET_ERR_MSG(extack, "Type doesn't support offload");
220222
return -EINVAL;
223+
}
221224

222225
/* We don't yet support UDP encapsulation and TFC padding. */
223-
if (x->encap || x->tfcpad)
226+
if (x->encap || x->tfcpad) {
227+
NL_SET_ERR_MSG(extack, "Encapsulation and TFC padding can't be offloaded");
224228
return -EINVAL;
229+
}
225230

226-
if (xuo->flags & ~(XFRM_OFFLOAD_IPV6 | XFRM_OFFLOAD_INBOUND))
231+
if (xuo->flags & ~(XFRM_OFFLOAD_IPV6 | XFRM_OFFLOAD_INBOUND)) {
232+
NL_SET_ERR_MSG(extack, "Unrecognized flags in offload request");
227233
return -EINVAL;
234+
}
228235

229236
dev = dev_get_by_index(net, xuo->ifindex);
230237
if (!dev) {
@@ -256,6 +263,7 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
256263

257264
if (x->props.flags & XFRM_STATE_ESN &&
258265
!dev->xfrmdev_ops->xdo_dev_state_advance_esn) {
266+
NL_SET_ERR_MSG(extack, "Device doesn't support offload with ESN");
259267
xso->dev = NULL;
260268
dev_put(dev);
261269
return -EINVAL;
@@ -277,8 +285,10 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state *x,
277285
xso->real_dev = NULL;
278286
netdev_put(dev, &xso->dev_tracker);
279287

280-
if (err != -EOPNOTSUPP)
288+
if (err != -EOPNOTSUPP) {
289+
NL_SET_ERR_MSG(extack, "Device failed to offload this state");
281290
return err;
291+
}
282292
}
283293

284294
return 0;

net/xfrm/xfrm_replay.c

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -766,18 +766,22 @@ int xfrm_replay_overflow(struct xfrm_state *x, struct sk_buff *skb)
766766
}
767767
#endif
768768

769-
int xfrm_init_replay(struct xfrm_state *x)
769+
int xfrm_init_replay(struct xfrm_state *x, struct netlink_ext_ack *extack)
770770
{
771771
struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
772772

773773
if (replay_esn) {
774774
if (replay_esn->replay_window >
775-
replay_esn->bmp_len * sizeof(__u32) * 8)
775+
replay_esn->bmp_len * sizeof(__u32) * 8) {
776+
NL_SET_ERR_MSG(extack, "ESN replay window is too large for the chosen bitmap size");
776777
return -EINVAL;
778+
}
777779

778780
if (x->props.flags & XFRM_STATE_ESN) {
779-
if (replay_esn->replay_window == 0)
781+
if (replay_esn->replay_window == 0) {
782+
NL_SET_ERR_MSG(extack, "ESN replay window must be > 0");
780783
return -EINVAL;
784+
}
781785
x->repl_mode = XFRM_REPLAY_MODE_ESN;
782786
} else {
783787
x->repl_mode = XFRM_REPLAY_MODE_BMP;

net/xfrm/xfrm_state.c

Lines changed: 20 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2610,7 +2610,8 @@ u32 xfrm_state_mtu(struct xfrm_state *x, int mtu)
26102610
}
26112611
EXPORT_SYMBOL_GPL(xfrm_state_mtu);
26122612

2613-
int __xfrm_init_state(struct xfrm_state *x, bool init_replay, bool offload)
2613+
int __xfrm_init_state(struct xfrm_state *x, bool init_replay, bool offload,
2614+
struct netlink_ext_ack *extack)
26142615
{
26152616
const struct xfrm_mode *inner_mode;
26162617
const struct xfrm_mode *outer_mode;
@@ -2625,24 +2626,32 @@ int __xfrm_init_state(struct xfrm_state *x, bool init_replay, bool offload)
26252626

26262627
if (x->sel.family != AF_UNSPEC) {
26272628
inner_mode = xfrm_get_mode(x->props.mode, x->sel.family);
2628-
if (inner_mode == NULL)
2629+
if (inner_mode == NULL) {
2630+
NL_SET_ERR_MSG(extack, "Requested mode not found");
26292631
goto error;
2632+
}
26302633

26312634
if (!(inner_mode->flags & XFRM_MODE_FLAG_TUNNEL) &&
2632-
family != x->sel.family)
2635+
family != x->sel.family) {
2636+
NL_SET_ERR_MSG(extack, "Only tunnel modes can accommodate a change of family");
26332637
goto error;
2638+
}
26342639

26352640
x->inner_mode = *inner_mode;
26362641
} else {
26372642
const struct xfrm_mode *inner_mode_iaf;
26382643
int iafamily = AF_INET;
26392644

26402645
inner_mode = xfrm_get_mode(x->props.mode, x->props.family);
2641-
if (inner_mode == NULL)
2646+
if (inner_mode == NULL) {
2647+
NL_SET_ERR_MSG(extack, "Requested mode not found");
26422648
goto error;
2649+
}
26432650

2644-
if (!(inner_mode->flags & XFRM_MODE_FLAG_TUNNEL))
2651+
if (!(inner_mode->flags & XFRM_MODE_FLAG_TUNNEL)) {
2652+
NL_SET_ERR_MSG(extack, "Only tunnel modes can accommodate an AF_UNSPEC selector");
26452653
goto error;
2654+
}
26462655

26472656
x->inner_mode = *inner_mode;
26482657

@@ -2657,8 +2666,10 @@ int __xfrm_init_state(struct xfrm_state *x, bool init_replay, bool offload)
26572666
}
26582667

26592668
x->type = xfrm_get_type(x->id.proto, family);
2660-
if (x->type == NULL)
2669+
if (x->type == NULL) {
2670+
NL_SET_ERR_MSG(extack, "Requested type not found");
26612671
goto error;
2672+
}
26622673

26632674
x->type_offload = xfrm_get_type_offload(x->id.proto, family, offload);
26642675

@@ -2668,13 +2679,14 @@ int __xfrm_init_state(struct xfrm_state *x, bool init_replay, bool offload)
26682679

26692680
outer_mode = xfrm_get_mode(x->props.mode, family);
26702681
if (!outer_mode) {
2682+
NL_SET_ERR_MSG(extack, "Requested mode not found");
26712683
err = -EPROTONOSUPPORT;
26722684
goto error;
26732685
}
26742686

26752687
x->outer_mode = *outer_mode;
26762688
if (init_replay) {
2677-
err = xfrm_init_replay(x);
2689+
err = xfrm_init_replay(x, extack);
26782690
if (err)
26792691
goto error;
26802692
}
@@ -2689,7 +2701,7 @@ int xfrm_init_state(struct xfrm_state *x)
26892701
{
26902702
int err;
26912703

2692-
err = __xfrm_init_state(x, true, false);
2704+
err = __xfrm_init_state(x, true, false, NULL);
26932705
if (!err)
26942706
x->km.state = XFRM_STATE_VALID;
26952707

0 commit comments

Comments
 (0)