1. 14 6月, 2022 1 次提交
  2. 28 5月, 2022 1 次提交
  3. 28 4月, 2022 1 次提交
  4. 27 4月, 2022 1 次提交
  5. 31 12月, 2021 1 次提交
  6. 13 10月, 2021 1 次提交
  7. 26 4月, 2021 2 次提交
  8. 24 9月, 2020 4 次提交
  9. 07 9月, 2020 1 次提交
  10. 25 7月, 2020 1 次提交
  11. 21 7月, 2020 1 次提交
    • S
      xfrm: Fix crash when the hold queue is used. · 101dde42
      Steffen Klassert 提交于
      The commits "xfrm: Move dst->path into struct xfrm_dst"
      and "net: Create and use new helper xfrm_dst_child()."
      changed xfrm bundle handling under the assumption
      that xdst->path and dst->child are not a NULL pointer
      only if dst->xfrm is not a NULL pointer. That is true
      with one exception. If the xfrm hold queue is used
      to wait until a SA is installed by the key manager,
      we create a dummy bundle without a valid dst->xfrm
      pointer. The current xfrm bundle handling crashes
      in that case. Fix this by extending the NULL check
      of dst->xfrm with a test of the DST_XFRM_QUEUE flag.
      
      Fixes: 0f6c480f ("xfrm: Move dst->path into struct xfrm_dst")
      Fixes: b92cf4aa ("net: Create and use new helper xfrm_dst_child().")
      Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
      101dde42
  12. 09 7月, 2020 3 次提交
    • X
      tunnel6: add tunnel6_input_afinfo for ipip and ipv6 tunnels · 86afc703
      Xin Long 提交于
      This patch is to register a callback function tunnel6_rcv_cb with
      is_ipip set in a xfrm_input_afinfo object for tunnel6 and tunnel46.
      
      It will be called by xfrm_rcv_cb() from xfrm_input() when family
      is AF_INET6 and proto is IPPROTO_IPIP or IPPROTO_IPV6.
      
      v1->v2:
        - Fix a sparse warning caused by the missing "__rcu", as Jakub
          noticed.
        - Handle the err returned by xfrm_input_register_afinfo() in
          tunnel6_init/fini(), as Sabrina noticed.
      v2->v3:
        - Add "#if IS_ENABLED(CONFIG_INET6_XFRM_TUNNEL)" to fix the build error
          when xfrm is disabled, reported by kbuild test robot
      Signed-off-by: NXin Long <lucien.xin@gmail.com>
      Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
      86afc703
    • X
      tunnel4: add cb_handler to struct xfrm_tunnel · 6df2db5d
      Xin Long 提交于
      This patch is to register a callback function tunnel4_rcv_cb with
      is_ipip set in a xfrm_input_afinfo object for tunnel4 and tunnel64.
      
      It will be called by xfrm_rcv_cb() from xfrm_input() when family
      is AF_INET and proto is IPPROTO_IPIP or IPPROTO_IPV6.
      
      v1->v2:
        - Fix a sparse warning caused by the missing "__rcu", as Jakub
          noticed.
        - Handle the err returned by xfrm_input_register_afinfo() in
          tunnel4_init/fini(), as Sabrina noticed.
      v2->v3:
        - Add "#if IS_ENABLED(CONFIG_INET_XFRM_TUNNEL)" to fix the build error
          when xfrm is disabled, reported by kbuild test robot.
      Signed-off-by: NXin Long <lucien.xin@gmail.com>
      Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
      6df2db5d
    • X
      xfrm: add is_ipip to struct xfrm_input_afinfo · 1475ee0a
      Xin Long 提交于
      This patch is to add a new member is_ipip to struct xfrm_input_afinfo,
      to allow another group family of callback functions to be registered
      with is_ipip set.
      
      This will be used for doing a callback for struct xfrm(6)_tunnel of
      ipip/ipv6 tunnels in xfrm_input() by calling xfrm_rcv_cb(), which is
      needed by ipip/ipv6 tunnels' support in ip(6)_vti and xfrm interface
      in the next patches.
      Signed-off-by: NXin Long <lucien.xin@gmail.com>
      Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
      1475ee0a
  13. 24 6月, 2020 2 次提交
    • X
      xfrm: policy: match with both mark and mask on user interfaces · 4f47e8ab
      Xin Long 提交于
      In commit ed17b8d3 ("xfrm: fix a warning in xfrm_policy_insert_list"),
      it would take 'priority' to make a policy unique, and allow duplicated
      policies with different 'priority' to be added, which is not expected
      by userland, as Tobias reported in strongswan.
      
      To fix this duplicated policies issue, and also fix the issue in
      commit ed17b8d3 ("xfrm: fix a warning in xfrm_policy_insert_list"),
      when doing add/del/get/update on user interfaces, this patch is to change
      to look up a policy with both mark and mask by doing:
      
        mark.v == pol->mark.v && mark.m == pol->mark.m
      
      and leave the check:
      
        (mark & pol->mark.m) == pol->mark.v
      
      for tx/rx path only.
      
      As the userland expects an exact mark and mask match to manage policies.
      
      v1->v2:
        - make xfrm_policy_mark_match inline and fix the changelog as
          Tobias suggested.
      
      Fixes: 295fae56 ("xfrm: Allow user space manipulation of SPD mark")
      Fixes: ed17b8d3 ("xfrm: fix a warning in xfrm_policy_insert_list")
      Reported-by: NTobias Brunner <tobias@strongswan.org>
      Tested-by: NTobias Brunner <tobias@strongswan.org>
      Signed-off-by: NXin Long <lucien.xin@gmail.com>
      Signed-off-by: NSteffen Klassert <steffen.klassert@secunet.com>
      4f47e8ab
    • J
      bonding/xfrm: use real_dev instead of slave_dev · bdfd2d1f
      Jarod Wilson 提交于
      Rather than requiring every hw crypto capable NIC driver to do a check for
      slave_dev being set, set real_dev in the xfrm layer and xso init time, and
      then override it in the bonding driver as needed. Then NIC drivers can
      always use real_dev, and at the same time, we eliminate the use of a
      variable name that probably shouldn't have been used in the first place,
      particularly given recent current events.
      
      CC: Boris Pismenny <borisp@mellanox.com>
      CC: Saeed Mahameed <saeedm@mellanox.com>
      CC: Leon Romanovsky <leon@kernel.org>
      CC: Jay Vosburgh <j.vosburgh@gmail.com>
      CC: Veaceslav Falico <vfalico@gmail.com>
      CC: Andy Gospodarek <andy@greyhouse.net>
      CC: "David S. Miller" <davem@davemloft.net>
      CC: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
      CC: Jakub Kicinski <kuba@kernel.org>
      CC: Steffen Klassert <steffen.klassert@secunet.com>
      CC: Herbert Xu <herbert@gondor.apana.org.au>
      CC: netdev@vger.kernel.org
      Suggested-by: NSaeed Mahameed <saeedm@mellanox.com>
      Signed-off-by: NJarod Wilson <jarod@redhat.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      bdfd2d1f
  14. 23 6月, 2020 1 次提交
    • J
      xfrm: bail early on slave pass over skb · 272c2330
      Jarod Wilson 提交于
      This is prep work for initial support of bonding hardware encryption
      pass-through support. The bonding driver will fill in the slave_dev
      pointer, and we use that to know not to skb_push() again on a given
      skb that was already processed on the bond device.
      
      CC: Jay Vosburgh <j.vosburgh@gmail.com>
      CC: Veaceslav Falico <vfalico@gmail.com>
      CC: Andy Gospodarek <andy@greyhouse.net>
      CC: "David S. Miller" <davem@davemloft.net>
      CC: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
      CC: Jakub Kicinski <kuba@kernel.org>
      CC: Steffen Klassert <steffen.klassert@secunet.com>
      CC: Herbert Xu <herbert@gondor.apana.org.au>
      CC: netdev@vger.kernel.org
      CC: intel-wired-lan@lists.osuosl.org
      Signed-off-by: NJarod Wilson <jarod@redhat.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      272c2330
  15. 04 6月, 2020 1 次提交
  16. 06 5月, 2020 7 次提交
  17. 28 4月, 2020 1 次提交
  18. 09 12月, 2019 2 次提交
  19. 09 10月, 2019 1 次提交
  20. 17 7月, 2019 2 次提交
  21. 01 7月, 2019 1 次提交
  22. 06 6月, 2019 3 次提交
  23. 05 6月, 2019 1 次提交