This introduces 4 counters to keep track of key updates:
Tls{Rx,Tx}Rekey{Ok,Error}.

v4: new patch

Suggested-by: Jakub Kicinski <[email protected]>
Signed-off-by: Sabrina Dubroca <[email protected]>
---
 include/uapi/linux/snmp.h |  4 ++++
 net/tls/tls_main.c        | 27 ++++++++++++++++++++++-----
 net/tls/tls_proc.c        |  4 ++++
 3 files changed, 30 insertions(+), 5 deletions(-)

diff --git a/include/uapi/linux/snmp.h b/include/uapi/linux/snmp.h
index adf5fd78dd50..b0e6f922e72f 100644
--- a/include/uapi/linux/snmp.h
+++ b/include/uapi/linux/snmp.h
@@ -358,6 +358,10 @@ enum
        LINUX_MIB_TLSRXDEVICERESYNC,            /* TlsRxDeviceResync */
        LINUX_MIB_TLSDECRYPTRETRY,              /* TlsDecryptRetry */
        LINUX_MIB_TLSRXNOPADVIOL,               /* TlsRxNoPadViolation */
+       LINUX_MIB_TLSRXREKEYOK,                 /* TlsRxRekeyOk */
+       LINUX_MIB_TLSRXREKEYERROR,              /* TlsRxRekeyError */
+       LINUX_MIB_TLSTXREKEYOK,                 /* TlsTxRekeyOk */
+       LINUX_MIB_TLSTXREKEYERROR,              /* TlsTxRekeyError */
        __LINUX_MIB_TLSMAX
 };
 
diff --git a/net/tls/tls_main.c b/net/tls/tls_main.c
index 68b5735dafc1..9ee5a83c5b40 100644
--- a/net/tls/tls_main.c
+++ b/net/tls/tls_main.c
@@ -640,8 +640,11 @@ static int do_tls_setsockopt_conf(struct sock *sk, 
sockptr_t optval,
                /* Currently we only support setting crypto info more
                 * than one time for TLS 1.3
                 */
-               if (crypto_info->version != TLS_1_3_VERSION)
+               if (crypto_info->version != TLS_1_3_VERSION) {
+                       TLS_INC_STATS(sock_net(sk), tx ? 
LINUX_MIB_TLSTXREKEYERROR
+                                                      : 
LINUX_MIB_TLSRXREKEYERROR);
                        return -EBUSY;
+               }
 
                update = true;
                old_crypto_info = crypto_info;
@@ -696,8 +699,13 @@ static int do_tls_setsockopt_conf(struct sock *sk, 
sockptr_t optval,
                                                update ? crypto_info : NULL);
                        if (rc)
                                goto err_crypto_info;
-                       TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSTXSW);
-                       TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSCURRTXSW);
+
+                       if (update) {
+                               TLS_INC_STATS(sock_net(sk), 
LINUX_MIB_TLSTXREKEYOK);
+                       } else {
+                               TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSTXSW);
+                               TLS_INC_STATS(sock_net(sk), 
LINUX_MIB_TLSCURRTXSW);
+                       }
                        conf = TLS_SW;
                }
        } else {
@@ -711,8 +719,13 @@ static int do_tls_setsockopt_conf(struct sock *sk, 
sockptr_t optval,
                                                update ? crypto_info : NULL);
                        if (rc)
                                goto err_crypto_info;
-                       TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSRXSW);
-                       TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSCURRRXSW);
+
+                       if (update) {
+                               TLS_INC_STATS(sock_net(sk), 
LINUX_MIB_TLSRXREKEYOK);
+                       } else {
+                               TLS_INC_STATS(sock_net(sk), LINUX_MIB_TLSRXSW);
+                               TLS_INC_STATS(sock_net(sk), 
LINUX_MIB_TLSCURRRXSW);
+                       }
                        conf = TLS_SW;
                }
                if (!update)
@@ -735,6 +748,10 @@ static int do_tls_setsockopt_conf(struct sock *sk, 
sockptr_t optval,
        return 0;
 
 err_crypto_info:
+       if (update) {
+               TLS_INC_STATS(sock_net(sk), tx ? LINUX_MIB_TLSTXREKEYERROR
+                                              : LINUX_MIB_TLSRXREKEYERROR);
+       }
        memzero_explicit(crypto_ctx, sizeof(*crypto_ctx));
        return rc;
 }
diff --git a/net/tls/tls_proc.c b/net/tls/tls_proc.c
index 68982728f620..44ccdc90095c 100644
--- a/net/tls/tls_proc.c
+++ b/net/tls/tls_proc.c
@@ -22,6 +22,10 @@ static const struct snmp_mib tls_mib_list[] = {
        SNMP_MIB_ITEM("TlsRxDeviceResync", LINUX_MIB_TLSRXDEVICERESYNC),
        SNMP_MIB_ITEM("TlsDecryptRetry", LINUX_MIB_TLSDECRYPTRETRY),
        SNMP_MIB_ITEM("TlsRxNoPadViolation", LINUX_MIB_TLSRXNOPADVIOL),
+       SNMP_MIB_ITEM("TlsRxRekeyOk", LINUX_MIB_TLSRXREKEYOK),
+       SNMP_MIB_ITEM("TlsRxRekeyError", LINUX_MIB_TLSRXREKEYERROR),
+       SNMP_MIB_ITEM("TlsTxRekeyOk", LINUX_MIB_TLSTXREKEYOK),
+       SNMP_MIB_ITEM("TlsTxRekeyError", LINUX_MIB_TLSTXREKEYERROR),
        SNMP_MIB_SENTINEL
 };
 
-- 
2.47.0


Reply via email to