Commit 04cdf13e authored by David S. Miller's avatar David S. Miller

Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next

Steffen Klassert says:

====================
pull request (net-next): ipsec-next 2017-02-01

1) Some typo fixes, from Alexander Alemayhu.

2) Don't acquire state lock in get_mtu functions.
   The only rece against a dead state does not matter.
   From Florian Westphal.

3) Remove xfrm4_state_fini, it is unused for more than
   10 years. From Florian Westphal.

4) Various rcu usage improvements. From Florian Westphal.

5) Properly handle crypto arrors in ah4/ah6.
   From Gilad Ben-Yossef.

6) Try to avoid skb linearization in esp4 and esp6.

7) The esp trailer is now set up in different places,
   add a helper for this.

8) With the upcomming usage of gro_cells in IPsec,
   a gro merged skb can have a secpath. Drop it
   before freeing or reusing the skb.

9) Add a xfrm dummy network device for napi. With
   this we can use gro_cells from within xfrm,
   it allows IPsec GRO without impact on the generic
   networking code.

Please pull or let me know if there are problems.
====================
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parents 624374a5 1995876a
...@@ -213,6 +213,8 @@ struct xfrm_state { ...@@ -213,6 +213,8 @@ struct xfrm_state {
/* Last used time */ /* Last used time */
unsigned long lastused; unsigned long lastused;
struct page_frag xfrag;
/* Reference to data common to all the instances of this /* Reference to data common to all the instances of this
* transformer. */ * transformer. */
const struct xfrm_type *type; const struct xfrm_type *type;
...@@ -343,7 +345,7 @@ struct xfrm_state_afinfo { ...@@ -343,7 +345,7 @@ struct xfrm_state_afinfo {
int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo); int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo);
int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo); int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo);
struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family); struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family);
void xfrm_state_put_afinfo(struct xfrm_state_afinfo *afinfo); struct xfrm_state_afinfo *xfrm_state_afinfo_get_rcu(unsigned int family);
struct xfrm_input_afinfo { struct xfrm_input_afinfo {
unsigned int family; unsigned int family;
......
...@@ -4593,6 +4593,7 @@ static gro_result_t napi_skb_finish(gro_result_t ret, struct sk_buff *skb) ...@@ -4593,6 +4593,7 @@ static gro_result_t napi_skb_finish(gro_result_t ret, struct sk_buff *skb)
case GRO_MERGED_FREE: case GRO_MERGED_FREE:
if (NAPI_GRO_CB(skb)->free == NAPI_GRO_FREE_STOLEN_HEAD) { if (NAPI_GRO_CB(skb)->free == NAPI_GRO_FREE_STOLEN_HEAD) {
skb_dst_drop(skb); skb_dst_drop(skb);
secpath_reset(skb);
kmem_cache_free(skbuff_head_cache, skb); kmem_cache_free(skbuff_head_cache, skb);
} else { } else {
__kfree_skb(skb); __kfree_skb(skb);
...@@ -4633,6 +4634,7 @@ static void napi_reuse_skb(struct napi_struct *napi, struct sk_buff *skb) ...@@ -4633,6 +4634,7 @@ static void napi_reuse_skb(struct napi_struct *napi, struct sk_buff *skb)
skb->encapsulation = 0; skb->encapsulation = 0;
skb_shinfo(skb)->gso_type = 0; skb_shinfo(skb)->gso_type = 0;
skb->truesize = SKB_TRUESIZE(skb_end_offset(skb)); skb->truesize = SKB_TRUESIZE(skb_end_offset(skb));
secpath_reset(skb);
napi->skb = skb; napi->skb = skb;
} }
......
...@@ -270,6 +270,9 @@ static void ah_input_done(struct crypto_async_request *base, int err) ...@@ -270,6 +270,9 @@ static void ah_input_done(struct crypto_async_request *base, int err)
int ihl = ip_hdrlen(skb); int ihl = ip_hdrlen(skb);
int ah_hlen = (ah->hdrlen + 2) << 2; int ah_hlen = (ah->hdrlen + 2) << 2;
if (err)
goto out;
work_iph = AH_SKB_CB(skb)->tmp; work_iph = AH_SKB_CB(skb)->tmp;
auth_data = ah_tmp_auth(work_iph, ihl); auth_data = ah_tmp_auth(work_iph, ihl);
icv = ah_tmp_icv(ahp->ahash, auth_data, ahp->icv_trunc_len); icv = ah_tmp_icv(ahp->ahash, auth_data, ahp->icv_trunc_len);
......
This diff is collapsed.
...@@ -90,11 +90,3 @@ void __init xfrm4_state_init(void) ...@@ -90,11 +90,3 @@ void __init xfrm4_state_init(void)
{ {
xfrm_state_register_afinfo(&xfrm4_state_afinfo); xfrm_state_register_afinfo(&xfrm4_state_afinfo);
} }
#if 0
void __exit xfrm4_state_fini(void)
{
xfrm_state_unregister_afinfo(&xfrm4_state_afinfo);
}
#endif /* 0 */
...@@ -474,6 +474,9 @@ static void ah6_input_done(struct crypto_async_request *base, int err) ...@@ -474,6 +474,9 @@ static void ah6_input_done(struct crypto_async_request *base, int err)
int hdr_len = skb_network_header_len(skb); int hdr_len = skb_network_header_len(skb);
int ah_hlen = (ah->hdrlen + 2) << 2; int ah_hlen = (ah->hdrlen + 2) << 2;
if (err)
goto out;
work_iph = AH_SKB_CB(skb)->tmp; work_iph = AH_SKB_CB(skb)->tmp;
auth_data = ah_tmp_auth(work_iph, hdr_len); auth_data = ah_tmp_auth(work_iph, hdr_len);
icv = ah_tmp_icv(ahp->ahash, auth_data, ahp->icv_trunc_len); icv = ah_tmp_icv(ahp->ahash, auth_data, ahp->icv_trunc_len);
......
This diff is collapsed.
...@@ -21,6 +21,9 @@ static struct kmem_cache *secpath_cachep __read_mostly; ...@@ -21,6 +21,9 @@ static struct kmem_cache *secpath_cachep __read_mostly;
static DEFINE_SPINLOCK(xfrm_input_afinfo_lock); static DEFINE_SPINLOCK(xfrm_input_afinfo_lock);
static struct xfrm_input_afinfo __rcu *xfrm_input_afinfo[NPROTO]; static struct xfrm_input_afinfo __rcu *xfrm_input_afinfo[NPROTO];
static struct gro_cells gro_cells;
static struct net_device xfrm_napi_dev;
int xfrm_input_register_afinfo(struct xfrm_input_afinfo *afinfo) int xfrm_input_register_afinfo(struct xfrm_input_afinfo *afinfo)
{ {
int err = 0; int err = 0;
...@@ -371,7 +374,7 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type) ...@@ -371,7 +374,7 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)
if (decaps) { if (decaps) {
skb_dst_drop(skb); skb_dst_drop(skb);
netif_rx(skb); gro_cells_receive(&gro_cells, skb);
return 0; return 0;
} else { } else {
return x->inner_mode->afinfo->transport_finish(skb, async); return x->inner_mode->afinfo->transport_finish(skb, async);
...@@ -394,6 +397,13 @@ EXPORT_SYMBOL(xfrm_input_resume); ...@@ -394,6 +397,13 @@ EXPORT_SYMBOL(xfrm_input_resume);
void __init xfrm_input_init(void) void __init xfrm_input_init(void)
{ {
int err;
init_dummy_netdev(&xfrm_napi_dev);
err = gro_cells_init(&gro_cells, &xfrm_napi_dev);
if (err)
gro_cells.cells = NULL;
secpath_cachep = kmem_cache_create("secpath_cache", secpath_cachep = kmem_cache_create("secpath_cache",
sizeof(struct sec_path), sizeof(struct sec_path),
0, SLAB_HWCACHE_ALIGN|SLAB_PANIC, 0, SLAB_HWCACHE_ALIGN|SLAB_PANIC,
......
...@@ -246,10 +246,8 @@ void xfrm_local_error(struct sk_buff *skb, int mtu) ...@@ -246,10 +246,8 @@ void xfrm_local_error(struct sk_buff *skb, int mtu)
return; return;
afinfo = xfrm_state_get_afinfo(proto); afinfo = xfrm_state_get_afinfo(proto);
if (!afinfo) if (afinfo)
return;
afinfo->local_error(skb, mtu); afinfo->local_error(skb, mtu);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
} }
EXPORT_SYMBOL_GPL(xfrm_local_error); EXPORT_SYMBOL_GPL(xfrm_local_error);
...@@ -330,7 +330,7 @@ void xfrm_policy_destroy(struct xfrm_policy *policy) ...@@ -330,7 +330,7 @@ void xfrm_policy_destroy(struct xfrm_policy *policy)
} }
EXPORT_SYMBOL(xfrm_policy_destroy); EXPORT_SYMBOL(xfrm_policy_destroy);
/* Rule must be locked. Release descentant resources, announce /* Rule must be locked. Release descendant resources, announce
* entry dead. The rule must be unlinked from lists to the moment. * entry dead. The rule must be unlinked from lists to the moment.
*/ */
......
...@@ -192,7 +192,7 @@ int xfrm_register_type(const struct xfrm_type *type, unsigned short family) ...@@ -192,7 +192,7 @@ int xfrm_register_type(const struct xfrm_type *type, unsigned short family)
else else
err = -EEXIST; err = -EEXIST;
spin_unlock_bh(&xfrm_type_lock); spin_unlock_bh(&xfrm_type_lock);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
return err; return err;
} }
EXPORT_SYMBOL(xfrm_register_type); EXPORT_SYMBOL(xfrm_register_type);
...@@ -213,7 +213,7 @@ int xfrm_unregister_type(const struct xfrm_type *type, unsigned short family) ...@@ -213,7 +213,7 @@ int xfrm_unregister_type(const struct xfrm_type *type, unsigned short family)
else else
typemap[type->proto] = NULL; typemap[type->proto] = NULL;
spin_unlock_bh(&xfrm_type_lock); spin_unlock_bh(&xfrm_type_lock);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
return err; return err;
} }
EXPORT_SYMBOL(xfrm_unregister_type); EXPORT_SYMBOL(xfrm_unregister_type);
...@@ -231,17 +231,18 @@ static const struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family) ...@@ -231,17 +231,18 @@ static const struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family)
return NULL; return NULL;
typemap = afinfo->type_map; typemap = afinfo->type_map;
type = typemap[proto]; type = READ_ONCE(typemap[proto]);
if (unlikely(type && !try_module_get(type->owner))) if (unlikely(type && !try_module_get(type->owner)))
type = NULL; type = NULL;
rcu_read_unlock();
if (!type && !modload_attempted) { if (!type && !modload_attempted) {
xfrm_state_put_afinfo(afinfo);
request_module("xfrm-type-%d-%d", family, proto); request_module("xfrm-type-%d-%d", family, proto);
modload_attempted = 1; modload_attempted = 1;
goto retry; goto retry;
} }
xfrm_state_put_afinfo(afinfo);
return type; return type;
} }
...@@ -280,7 +281,7 @@ int xfrm_register_mode(struct xfrm_mode *mode, int family) ...@@ -280,7 +281,7 @@ int xfrm_register_mode(struct xfrm_mode *mode, int family)
out: out:
spin_unlock_bh(&xfrm_mode_lock); spin_unlock_bh(&xfrm_mode_lock);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
return err; return err;
} }
EXPORT_SYMBOL(xfrm_register_mode); EXPORT_SYMBOL(xfrm_register_mode);
...@@ -308,7 +309,7 @@ int xfrm_unregister_mode(struct xfrm_mode *mode, int family) ...@@ -308,7 +309,7 @@ int xfrm_unregister_mode(struct xfrm_mode *mode, int family)
} }
spin_unlock_bh(&xfrm_mode_lock); spin_unlock_bh(&xfrm_mode_lock);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
return err; return err;
} }
EXPORT_SYMBOL(xfrm_unregister_mode); EXPORT_SYMBOL(xfrm_unregister_mode);
...@@ -327,17 +328,17 @@ static struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family) ...@@ -327,17 +328,17 @@ static struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family)
if (unlikely(afinfo == NULL)) if (unlikely(afinfo == NULL))
return NULL; return NULL;
mode = afinfo->mode_map[encap]; mode = READ_ONCE(afinfo->mode_map[encap]);
if (unlikely(mode && !try_module_get(mode->owner))) if (unlikely(mode && !try_module_get(mode->owner)))
mode = NULL; mode = NULL;
rcu_read_unlock();
if (!mode && !modload_attempted) { if (!mode && !modload_attempted) {
xfrm_state_put_afinfo(afinfo);
request_module("xfrm-mode-%d-%d", family, encap); request_module("xfrm-mode-%d-%d", family, encap);
modload_attempted = 1; modload_attempted = 1;
goto retry; goto retry;
} }
xfrm_state_put_afinfo(afinfo);
return mode; return mode;
} }
...@@ -409,7 +410,7 @@ static enum hrtimer_restart xfrm_timer_handler(struct hrtimer *me) ...@@ -409,7 +410,7 @@ static enum hrtimer_restart xfrm_timer_handler(struct hrtimer *me)
if (x->xflags & XFRM_SOFT_EXPIRE) { if (x->xflags & XFRM_SOFT_EXPIRE) {
/* enter hard expire without soft expire first?! /* enter hard expire without soft expire first?!
* setting a new date could trigger this. * setting a new date could trigger this.
* workarbound: fix x->curflt.add_time by below: * workaround: fix x->curflt.add_time by below:
*/ */
x->curlft.add_time = now - x->saved_tmo - 1; x->curlft.add_time = now - x->saved_tmo - 1;
tmo = x->lft.hard_add_expires_seconds - x->saved_tmo; tmo = x->lft.hard_add_expires_seconds - x->saved_tmo;
...@@ -639,26 +640,25 @@ void xfrm_sad_getinfo(struct net *net, struct xfrmk_sadinfo *si) ...@@ -639,26 +640,25 @@ void xfrm_sad_getinfo(struct net *net, struct xfrmk_sadinfo *si)
} }
EXPORT_SYMBOL(xfrm_sad_getinfo); EXPORT_SYMBOL(xfrm_sad_getinfo);
static int static void
xfrm_init_tempstate(struct xfrm_state *x, const struct flowi *fl, xfrm_init_tempstate(struct xfrm_state *x, const struct flowi *fl,
const struct xfrm_tmpl *tmpl, const struct xfrm_tmpl *tmpl,
const xfrm_address_t *daddr, const xfrm_address_t *saddr, const xfrm_address_t *daddr, const xfrm_address_t *saddr,
unsigned short family) unsigned short family)
{ {
struct xfrm_state_afinfo *afinfo = xfrm_state_get_afinfo(family); struct xfrm_state_afinfo *afinfo = xfrm_state_afinfo_get_rcu(family);
if (!afinfo) if (!afinfo)
return -1; return;
afinfo->init_tempsel(&x->sel, fl); afinfo->init_tempsel(&x->sel, fl);
if (family != tmpl->encap_family) { if (family != tmpl->encap_family) {
xfrm_state_put_afinfo(afinfo); afinfo = xfrm_state_afinfo_get_rcu(tmpl->encap_family);
afinfo = xfrm_state_get_afinfo(tmpl->encap_family);
if (!afinfo) if (!afinfo)
return -1; return;
} }
afinfo->init_temprop(x, tmpl, daddr, saddr); afinfo->init_temprop(x, tmpl, daddr, saddr);
xfrm_state_put_afinfo(afinfo);
return 0;
} }
static struct xfrm_state *__xfrm_state_lookup(struct net *net, u32 mark, static struct xfrm_state *__xfrm_state_lookup(struct net *net, u32 mark,
...@@ -1474,7 +1474,7 @@ xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n, ...@@ -1474,7 +1474,7 @@ xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n,
if (afinfo->tmpl_sort) if (afinfo->tmpl_sort)
err = afinfo->tmpl_sort(dst, src, n); err = afinfo->tmpl_sort(dst, src, n);
spin_unlock_bh(&net->xfrm.xfrm_state_lock); spin_unlock_bh(&net->xfrm.xfrm_state_lock);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
return err; return err;
} }
EXPORT_SYMBOL(xfrm_tmpl_sort); EXPORT_SYMBOL(xfrm_tmpl_sort);
...@@ -1494,7 +1494,7 @@ xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n, ...@@ -1494,7 +1494,7 @@ xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n,
if (afinfo->state_sort) if (afinfo->state_sort)
err = afinfo->state_sort(dst, src, n); err = afinfo->state_sort(dst, src, n);
spin_unlock_bh(&net->xfrm.xfrm_state_lock); spin_unlock_bh(&net->xfrm.xfrm_state_lock);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
return err; return err;
} }
EXPORT_SYMBOL(xfrm_state_sort); EXPORT_SYMBOL(xfrm_state_sort);
...@@ -1932,10 +1932,10 @@ EXPORT_SYMBOL(xfrm_unregister_km); ...@@ -1932,10 +1932,10 @@ EXPORT_SYMBOL(xfrm_unregister_km);
int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo) int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo)
{ {
int err = 0; int err = 0;
if (unlikely(afinfo == NULL))
return -EINVAL; if (WARN_ON(afinfo->family >= NPROTO))
if (unlikely(afinfo->family >= NPROTO))
return -EAFNOSUPPORT; return -EAFNOSUPPORT;
spin_lock_bh(&xfrm_state_afinfo_lock); spin_lock_bh(&xfrm_state_afinfo_lock);
if (unlikely(xfrm_state_afinfo[afinfo->family] != NULL)) if (unlikely(xfrm_state_afinfo[afinfo->family] != NULL))
err = -EEXIST; err = -EEXIST;
...@@ -1948,14 +1948,14 @@ EXPORT_SYMBOL(xfrm_state_register_afinfo); ...@@ -1948,14 +1948,14 @@ EXPORT_SYMBOL(xfrm_state_register_afinfo);
int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo) int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo)
{ {
int err = 0; int err = 0, family = afinfo->family;
if (unlikely(afinfo == NULL))
return -EINVAL; if (WARN_ON(family >= NPROTO))
if (unlikely(afinfo->family >= NPROTO))
return -EAFNOSUPPORT; return -EAFNOSUPPORT;
spin_lock_bh(&xfrm_state_afinfo_lock); spin_lock_bh(&xfrm_state_afinfo_lock);
if (likely(xfrm_state_afinfo[afinfo->family] != NULL)) { if (likely(xfrm_state_afinfo[afinfo->family] != NULL)) {
if (unlikely(xfrm_state_afinfo[afinfo->family] != afinfo)) if (rcu_access_pointer(xfrm_state_afinfo[family]) != afinfo)
err = -EINVAL; err = -EINVAL;
else else
RCU_INIT_POINTER(xfrm_state_afinfo[afinfo->family], NULL); RCU_INIT_POINTER(xfrm_state_afinfo[afinfo->family], NULL);
...@@ -1966,6 +1966,14 @@ int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo) ...@@ -1966,6 +1966,14 @@ int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo)
} }
EXPORT_SYMBOL(xfrm_state_unregister_afinfo); EXPORT_SYMBOL(xfrm_state_unregister_afinfo);
struct xfrm_state_afinfo *xfrm_state_afinfo_get_rcu(unsigned int family)
{
if (unlikely(family >= NPROTO))
return NULL;
return rcu_dereference(xfrm_state_afinfo[family]);
}
struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family) struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family)
{ {
struct xfrm_state_afinfo *afinfo; struct xfrm_state_afinfo *afinfo;
...@@ -1978,11 +1986,6 @@ struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family) ...@@ -1978,11 +1986,6 @@ struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family)
return afinfo; return afinfo;
} }
void xfrm_state_put_afinfo(struct xfrm_state_afinfo *afinfo)
{
rcu_read_unlock();
}
/* Temporarily located here until net/xfrm/xfrm_tunnel.c is created */ /* Temporarily located here until net/xfrm/xfrm_tunnel.c is created */
void xfrm_state_delete_tunnel(struct xfrm_state *x) void xfrm_state_delete_tunnel(struct xfrm_state *x)
{ {
...@@ -2000,16 +2003,13 @@ EXPORT_SYMBOL(xfrm_state_delete_tunnel); ...@@ -2000,16 +2003,13 @@ EXPORT_SYMBOL(xfrm_state_delete_tunnel);
int xfrm_state_mtu(struct xfrm_state *x, int mtu) int xfrm_state_mtu(struct xfrm_state *x, int mtu)
{ {
int res; const struct xfrm_type *type = READ_ONCE(x->type);
spin_lock_bh(&x->lock);
if (x->km.state == XFRM_STATE_VALID && if (x->km.state == XFRM_STATE_VALID &&
x->type && x->type->get_mtu) type && type->get_mtu)
res = x->type->get_mtu(x, mtu); return type->get_mtu(x, mtu);
else
res = mtu - x->props.header_len; return mtu - x->props.header_len;
spin_unlock_bh(&x->lock);
return res;
} }
int __xfrm_init_state(struct xfrm_state *x, bool init_replay) int __xfrm_init_state(struct xfrm_state *x, bool init_replay)
...@@ -2028,7 +2028,7 @@ int __xfrm_init_state(struct xfrm_state *x, bool init_replay) ...@@ -2028,7 +2028,7 @@ int __xfrm_init_state(struct xfrm_state *x, bool init_replay)
if (afinfo->init_flags) if (afinfo->init_flags)
err = afinfo->init_flags(x); err = afinfo->init_flags(x);
xfrm_state_put_afinfo(afinfo); rcu_read_unlock();
if (err) if (err)
goto error; goto error;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment