From: Leon Romanovsky <leon@kernel.org> To: "David S . Miller" <davem@davemloft.net>, Jakub Kicinski <kuba@kernel.org>, Steffen Klassert <steffen.klassert@secunet.com> Cc: Leon Romanovsky <leonro@nvidia.com>, Andy Gospodarek <andy@greyhouse.net>, Ayush Sawal <ayush.sawal@chelsio.com>, Eric Dumazet <edumazet@google.com>, Herbert Xu <herbert@gondor.apana.org.au>, intel-wired-lan@lists.osuosl.org, Jay Vosburgh <j.vosburgh@gmail.com>, Jesse Brandeburg <jesse.brandeburg@intel.com>, Jonathan Corbet <corbet@lwn.net>, linux-doc@vger.kernel.org, netdev@vger.kernel.org, oss-drivers@corigine.com, Paolo Abeni <pabeni@redhat.com>, Raju Rangoju <rajur@chelsio.com>, Saeed Mahameed <saeedm@nvidia.com>, Simon Horman <simon.horman@corigine.com>, Tony Nguyen <anthony.l.nguyen@intel.com>, Veaceslav Falico <vfalico@gmail.com> Subject: [PATCH net-next v1 02/10] net/mlx5e: Fill IPsec policy validation failure reason Date: Tue, 24 Jan 2023 13:54:58 +0200 [thread overview] Message-ID: <827fc088e41d891a651ea7c0c10c0343ffe8177d.1674560845.git.leon@kernel.org> (raw) In-Reply-To: <cover.1674560845.git.leon@kernel.org> From: Leon Romanovsky <leonro@nvidia.com> Rely on extack to return failure reason. Signed-off-by: Leon Romanovsky <leonro@nvidia.com> --- .../mellanox/mlx5/core/en_accel/ipsec.c | 22 ++++++++++--------- 1 file changed, 12 insertions(+), 10 deletions(-) diff --git a/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c b/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c index 83e0f874484e..3236c3b43149 100644 --- a/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c +++ b/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c @@ -497,34 +497,33 @@ static void mlx5e_xfrm_update_curlft(struct xfrm_state *x) mlx5e_ipsec_aso_update_curlft(sa_entry, &x->curlft.packets); } -static int mlx5e_xfrm_validate_policy(struct xfrm_policy *x) +static int mlx5e_xfrm_validate_policy(struct xfrm_policy *x, + struct netlink_ext_ack *extack) { - struct net_device *netdev = x->xdo.real_dev; - if (x->type != XFRM_POLICY_TYPE_MAIN) { - netdev_info(netdev, "Cannot offload non-main policy types\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload non-main policy types"); return -EINVAL; } /* Please pay attention that we support only one template */ if (x->xfrm_nr > 1) { - netdev_info(netdev, "Cannot offload more than one template\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload more than one template"); return -EINVAL; } if (x->xdo.dir != XFRM_DEV_OFFLOAD_IN && x->xdo.dir != XFRM_DEV_OFFLOAD_OUT) { - netdev_info(netdev, "Cannot offload forward policy\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload forward policy"); return -EINVAL; } if (!x->xfrm_vec[0].reqid) { - netdev_info(netdev, "Cannot offload policy without reqid\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload policy without reqid"); return -EINVAL; } if (x->xdo.type != XFRM_DEV_OFFLOAD_PACKET) { - netdev_info(netdev, "Unsupported xfrm offload type\n"); + NL_SET_ERR_MSG_MOD(extack, "Unsupported xfrm offload type"); return -EINVAL; } @@ -559,10 +558,12 @@ static int mlx5e_xfrm_add_policy(struct xfrm_policy *x, int err; priv = netdev_priv(netdev); - if (!priv->ipsec) + if (!priv->ipsec) { + NL_SET_ERR_MSG_MOD(extack, "Device doesn't support IPsec packet offload"); return -EOPNOTSUPP; + } - err = mlx5e_xfrm_validate_policy(x); + err = mlx5e_xfrm_validate_policy(x, extack); if (err) return err; @@ -583,6 +584,7 @@ static int mlx5e_xfrm_add_policy(struct xfrm_policy *x, err_fs: kfree(pol_entry); + NL_SET_ERR_MSG_MOD(extack, "Device failed to offload this policy"); return err; } -- 2.39.1
WARNING: multiple messages have this Message-ID (diff)
From: Leon Romanovsky <leon@kernel.org> To: "David S . Miller" <davem@davemloft.net>, Jakub Kicinski <kuba@kernel.org>, Steffen Klassert <steffen.klassert@secunet.com> Cc: Veaceslav Falico <vfalico@gmail.com>, Herbert Xu <herbert@gondor.apana.org.au>, Jonathan Corbet <corbet@lwn.net>, Jay Vosburgh <j.vosburgh@gmail.com>, oss-drivers@corigine.com, linux-doc@vger.kernel.org, Raju Rangoju <rajur@chelsio.com>, Jesse Brandeburg <jesse.brandeburg@intel.com>, Eric Dumazet <edumazet@google.com>, netdev@vger.kernel.org, intel-wired-lan@lists.osuosl.org, Ayush Sawal <ayush.sawal@chelsio.com>, Simon Horman <simon.horman@corigine.com>, Tony Nguyen <anthony.l.nguyen@intel.com>, Paolo Abeni <pabeni@redhat.com>, Leon Romanovsky <leonro@nvidia.com>, Saeed Mahameed <saeedm@nvidia.com>, Andy Gospodarek <andy@greyhouse.net> Subject: [Intel-wired-lan] [PATCH net-next v1 02/10] net/mlx5e: Fill IPsec policy validation failure reason Date: Tue, 24 Jan 2023 13:54:58 +0200 [thread overview] Message-ID: <827fc088e41d891a651ea7c0c10c0343ffe8177d.1674560845.git.leon@kernel.org> (raw) In-Reply-To: <cover.1674560845.git.leon@kernel.org> From: Leon Romanovsky <leonro@nvidia.com> Rely on extack to return failure reason. Signed-off-by: Leon Romanovsky <leonro@nvidia.com> --- .../mellanox/mlx5/core/en_accel/ipsec.c | 22 ++++++++++--------- 1 file changed, 12 insertions(+), 10 deletions(-) diff --git a/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c b/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c index 83e0f874484e..3236c3b43149 100644 --- a/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c +++ b/drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec.c @@ -497,34 +497,33 @@ static void mlx5e_xfrm_update_curlft(struct xfrm_state *x) mlx5e_ipsec_aso_update_curlft(sa_entry, &x->curlft.packets); } -static int mlx5e_xfrm_validate_policy(struct xfrm_policy *x) +static int mlx5e_xfrm_validate_policy(struct xfrm_policy *x, + struct netlink_ext_ack *extack) { - struct net_device *netdev = x->xdo.real_dev; - if (x->type != XFRM_POLICY_TYPE_MAIN) { - netdev_info(netdev, "Cannot offload non-main policy types\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload non-main policy types"); return -EINVAL; } /* Please pay attention that we support only one template */ if (x->xfrm_nr > 1) { - netdev_info(netdev, "Cannot offload more than one template\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload more than one template"); return -EINVAL; } if (x->xdo.dir != XFRM_DEV_OFFLOAD_IN && x->xdo.dir != XFRM_DEV_OFFLOAD_OUT) { - netdev_info(netdev, "Cannot offload forward policy\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload forward policy"); return -EINVAL; } if (!x->xfrm_vec[0].reqid) { - netdev_info(netdev, "Cannot offload policy without reqid\n"); + NL_SET_ERR_MSG_MOD(extack, "Cannot offload policy without reqid"); return -EINVAL; } if (x->xdo.type != XFRM_DEV_OFFLOAD_PACKET) { - netdev_info(netdev, "Unsupported xfrm offload type\n"); + NL_SET_ERR_MSG_MOD(extack, "Unsupported xfrm offload type"); return -EINVAL; } @@ -559,10 +558,12 @@ static int mlx5e_xfrm_add_policy(struct xfrm_policy *x, int err; priv = netdev_priv(netdev); - if (!priv->ipsec) + if (!priv->ipsec) { + NL_SET_ERR_MSG_MOD(extack, "Device doesn't support IPsec packet offload"); return -EOPNOTSUPP; + } - err = mlx5e_xfrm_validate_policy(x); + err = mlx5e_xfrm_validate_policy(x, extack); if (err) return err; @@ -583,6 +584,7 @@ static int mlx5e_xfrm_add_policy(struct xfrm_policy *x, err_fs: kfree(pol_entry); + NL_SET_ERR_MSG_MOD(extack, "Device failed to offload this policy"); return err; } -- 2.39.1 _______________________________________________ Intel-wired-lan mailing list Intel-wired-lan@osuosl.org https://lists.osuosl.org/mailman/listinfo/intel-wired-lan
next prev parent reply other threads:[~2023-01-24 12:15 UTC|newest] Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top 2023-01-24 11:54 [PATCH net-next v1 00/10] Convert drivers to return XFRM configuration errors through extack Leon Romanovsky 2023-01-24 11:54 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:54 ` [PATCH net-next v1 01/10] xfrm: extend add policy callback to set failure reason Leon Romanovsky 2023-01-24 11:54 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-25 19:02 ` Jakub Kicinski 2023-01-25 19:02 ` [Intel-wired-lan] " Jakub Kicinski 2023-01-26 7:28 ` Leon Romanovsky 2023-01-26 7:28 ` Leon Romanovsky 2023-01-26 9:45 ` Paolo Abeni 2023-01-26 9:45 ` [Intel-wired-lan] " Paolo Abeni 2023-01-26 10:42 ` Leon Romanovsky 2023-01-26 10:42 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-26 19:17 ` Leon Romanovsky 2023-01-26 19:17 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:54 ` Leon Romanovsky [this message] 2023-01-24 11:54 ` [Intel-wired-lan] [PATCH net-next v1 02/10] net/mlx5e: Fill IPsec policy validation " Leon Romanovsky 2023-01-24 11:54 ` [PATCH net-next v1 03/10] xfrm: extend add state callback to set " Leon Romanovsky 2023-01-24 11:54 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:55 ` [PATCH net-next v1 04/10] net/mlx5e: Fill IPsec state validation " Leon Romanovsky 2023-01-24 11:55 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:55 ` [PATCH net-next v1 05/10] netdevsim: " Leon Romanovsky 2023-01-24 11:55 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:55 ` [Intel-wired-lan] [PATCH net-next v1 06/10] nfp: fill " Leon Romanovsky 2023-01-24 11:55 ` Leon Romanovsky 2023-01-24 11:55 ` [PATCH net-next v1 07/10] ixgbevf: " Leon Romanovsky 2023-01-24 11:55 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:55 ` [PATCH net-next v1 08/10] ixgbe: " Leon Romanovsky 2023-01-24 11:55 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:55 ` [PATCH net-next v1 09/10] bonding: " Leon Romanovsky 2023-01-24 11:55 ` [Intel-wired-lan] " Leon Romanovsky 2023-01-24 11:55 ` [Intel-wired-lan] [PATCH net-next v1 10/10] cxgb4: " Leon Romanovsky 2023-01-24 11:55 ` Leon Romanovsky 2023-01-25 19:01 ` [PATCH net-next v1 00/10] Convert drivers to return XFRM configuration errors through extack Jakub Kicinski 2023-01-25 19:01 ` [Intel-wired-lan] " Jakub Kicinski 2023-01-26 9:43 ` Steffen Klassert 2023-01-26 9:43 ` [Intel-wired-lan] " Steffen Klassert 2023-01-27 0:50 ` patchwork-bot+netdevbpf 2023-01-27 0:50 ` [Intel-wired-lan] " patchwork-bot+netdevbpf
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=827fc088e41d891a651ea7c0c10c0343ffe8177d.1674560845.git.leon@kernel.org \ --to=leon@kernel.org \ --cc=andy@greyhouse.net \ --cc=anthony.l.nguyen@intel.com \ --cc=ayush.sawal@chelsio.com \ --cc=corbet@lwn.net \ --cc=davem@davemloft.net \ --cc=edumazet@google.com \ --cc=herbert@gondor.apana.org.au \ --cc=intel-wired-lan@lists.osuosl.org \ --cc=j.vosburgh@gmail.com \ --cc=jesse.brandeburg@intel.com \ --cc=kuba@kernel.org \ --cc=leonro@nvidia.com \ --cc=linux-doc@vger.kernel.org \ --cc=netdev@vger.kernel.org \ --cc=oss-drivers@corigine.com \ --cc=pabeni@redhat.com \ --cc=rajur@chelsio.com \ --cc=saeedm@nvidia.com \ --cc=simon.horman@corigine.com \ --cc=steffen.klassert@secunet.com \ --cc=vfalico@gmail.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.