Merge branch 'macsec-fixes'
Sabrina Dubroca says:
====================
macsec: reference counting fixes
Patch 1 adds explicit reference counting on RXSCs, instead of the
current implicit reference counting using the RXSA's refcount.
Patch 2 fixes possible kernel panics during module unload caused by an
RCU callback that schedules another RCU callback, which the
rcu_barrier() added in b196c22af5
("macsec: add rcu_barrier() on
module exit") didn't protect against.
Patch 3 fixes a refcounting issue with the underlying device for a
macsec device when link creation fails.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
commit
c27bdce2b9
|
@ -344,7 +344,6 @@ static void free_rxsa(struct rcu_head *head)
|
||||||
|
|
||||||
crypto_free_aead(sa->key.tfm);
|
crypto_free_aead(sa->key.tfm);
|
||||||
free_percpu(sa->stats);
|
free_percpu(sa->stats);
|
||||||
macsec_rxsc_put(sa->sc);
|
|
||||||
kfree(sa);
|
kfree(sa);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -863,6 +862,7 @@ static void macsec_decrypt_done(struct crypto_async_request *base, int err)
|
||||||
struct net_device *dev = skb->dev;
|
struct net_device *dev = skb->dev;
|
||||||
struct macsec_dev *macsec = macsec_priv(dev);
|
struct macsec_dev *macsec = macsec_priv(dev);
|
||||||
struct macsec_rx_sa *rx_sa = macsec_skb_cb(skb)->rx_sa;
|
struct macsec_rx_sa *rx_sa = macsec_skb_cb(skb)->rx_sa;
|
||||||
|
struct macsec_rx_sc *rx_sc = rx_sa->sc;
|
||||||
int len, ret;
|
int len, ret;
|
||||||
u32 pn;
|
u32 pn;
|
||||||
|
|
||||||
|
@ -891,6 +891,7 @@ static void macsec_decrypt_done(struct crypto_async_request *base, int err)
|
||||||
|
|
||||||
out:
|
out:
|
||||||
macsec_rxsa_put(rx_sa);
|
macsec_rxsa_put(rx_sa);
|
||||||
|
macsec_rxsc_put(rx_sc);
|
||||||
dev_put(dev);
|
dev_put(dev);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1106,6 +1107,7 @@ static rx_handler_result_t macsec_handle_frame(struct sk_buff **pskb)
|
||||||
|
|
||||||
list_for_each_entry_rcu(macsec, &rxd->secys, secys) {
|
list_for_each_entry_rcu(macsec, &rxd->secys, secys) {
|
||||||
struct macsec_rx_sc *sc = find_rx_sc(&macsec->secy, sci);
|
struct macsec_rx_sc *sc = find_rx_sc(&macsec->secy, sci);
|
||||||
|
sc = sc ? macsec_rxsc_get(sc) : NULL;
|
||||||
|
|
||||||
if (sc) {
|
if (sc) {
|
||||||
secy = &macsec->secy;
|
secy = &macsec->secy;
|
||||||
|
@ -1180,8 +1182,10 @@ static rx_handler_result_t macsec_handle_frame(struct sk_buff **pskb)
|
||||||
|
|
||||||
if (IS_ERR(skb)) {
|
if (IS_ERR(skb)) {
|
||||||
/* the decrypt callback needs the reference */
|
/* the decrypt callback needs the reference */
|
||||||
if (PTR_ERR(skb) != -EINPROGRESS)
|
if (PTR_ERR(skb) != -EINPROGRESS) {
|
||||||
macsec_rxsa_put(rx_sa);
|
macsec_rxsa_put(rx_sa);
|
||||||
|
macsec_rxsc_put(rx_sc);
|
||||||
|
}
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
*pskb = NULL;
|
*pskb = NULL;
|
||||||
return RX_HANDLER_CONSUMED;
|
return RX_HANDLER_CONSUMED;
|
||||||
|
@ -1197,6 +1201,7 @@ static rx_handler_result_t macsec_handle_frame(struct sk_buff **pskb)
|
||||||
|
|
||||||
if (rx_sa)
|
if (rx_sa)
|
||||||
macsec_rxsa_put(rx_sa);
|
macsec_rxsa_put(rx_sa);
|
||||||
|
macsec_rxsc_put(rx_sc);
|
||||||
|
|
||||||
ret = gro_cells_receive(&macsec->gro_cells, skb);
|
ret = gro_cells_receive(&macsec->gro_cells, skb);
|
||||||
if (ret == NET_RX_SUCCESS)
|
if (ret == NET_RX_SUCCESS)
|
||||||
|
@ -1212,6 +1217,7 @@ static rx_handler_result_t macsec_handle_frame(struct sk_buff **pskb)
|
||||||
drop:
|
drop:
|
||||||
macsec_rxsa_put(rx_sa);
|
macsec_rxsa_put(rx_sa);
|
||||||
drop_nosa:
|
drop_nosa:
|
||||||
|
macsec_rxsc_put(rx_sc);
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
drop_direct:
|
drop_direct:
|
||||||
kfree_skb(skb);
|
kfree_skb(skb);
|
||||||
|
@ -1646,7 +1652,7 @@ static int macsec_add_rxsa(struct sk_buff *skb, struct genl_info *info)
|
||||||
|
|
||||||
rtnl_lock();
|
rtnl_lock();
|
||||||
rx_sc = get_rxsc_from_nl(genl_info_net(info), attrs, tb_rxsc, &dev, &secy);
|
rx_sc = get_rxsc_from_nl(genl_info_net(info), attrs, tb_rxsc, &dev, &secy);
|
||||||
if (IS_ERR(rx_sc) || !macsec_rxsc_get(rx_sc)) {
|
if (IS_ERR(rx_sc)) {
|
||||||
rtnl_unlock();
|
rtnl_unlock();
|
||||||
return PTR_ERR(rx_sc);
|
return PTR_ERR(rx_sc);
|
||||||
}
|
}
|
||||||
|
@ -3173,6 +3179,8 @@ static int macsec_newlink(struct net *net, struct net_device *dev,
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
|
||||||
|
dev_hold(real_dev);
|
||||||
|
|
||||||
/* need to be already registered so that ->init has run and
|
/* need to be already registered so that ->init has run and
|
||||||
* the MAC addr is set
|
* the MAC addr is set
|
||||||
*/
|
*/
|
||||||
|
@ -3201,8 +3209,6 @@ static int macsec_newlink(struct net *net, struct net_device *dev,
|
||||||
|
|
||||||
macsec_generation++;
|
macsec_generation++;
|
||||||
|
|
||||||
dev_hold(real_dev);
|
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
del_dev:
|
del_dev:
|
||||||
|
|
Loading…
Reference in New Issue