diff options
author | Johannes Berg <johannes@sipsolutions.net> | 2008-04-09 10:45:37 -0400 |
---|---|---|
committer | John W. Linville <linville@tuxdriver.com> | 2008-04-16 14:53:22 -0400 |
commit | 3a245766901a9dfdc3f53457a7954b369b50f281 (patch) | |
tree | 33bc4ef4dfb1bdf0eec46d320fd4333f55dffaf8 /net/mac80211/key.c | |
parent | 51e8b885902fc8cc2ded48322ad9402bbcff23fe (diff) |
mac80211: fix key hwaccel race
The previous key locking patch left a small race: it would be possible
to add a key and take the interface down before the key todo is run so
that hwaccel for that key is enabled on an interface that is down. Avoid
this by running the todo list when an interface is brought up or down.
This patch also fixes a small bug: before this change, a few functions
used the key list without the lock that protects it.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Diffstat (limited to 'net/mac80211/key.c')
-rw-r--r-- | net/mac80211/key.c | 84 |
1 files changed, 52 insertions, 32 deletions
diff --git a/net/mac80211/key.c b/net/mac80211/key.c index 711e36e54ff8..acf8d0370a37 100644 --- a/net/mac80211/key.c +++ b/net/mac80211/key.c | |||
@@ -355,61 +355,74 @@ void ieee80211_key_link(struct ieee80211_key *key, | |||
355 | 355 | ||
356 | add_todo(key, KEY_FLAG_TODO_ADD_DEBUGFS); | 356 | add_todo(key, KEY_FLAG_TODO_ADD_DEBUGFS); |
357 | if (netif_running(sdata->dev)) | 357 | if (netif_running(sdata->dev)) |
358 | add_todo(key, KEY_FLAG_TODO_HWACCEL); | 358 | add_todo(key, KEY_FLAG_TODO_HWACCEL_ADD); |
359 | } | 359 | } |
360 | 360 | ||
361 | void ieee80211_key_free(struct ieee80211_key *key) | 361 | static void __ieee80211_key_free(struct ieee80211_key *key) |
362 | { | 362 | { |
363 | unsigned long flags; | ||
364 | |||
365 | if (!key) | ||
366 | return; | ||
367 | |||
368 | /* | 363 | /* |
369 | * Replace key with nothingness if it was ever used. | 364 | * Replace key with nothingness if it was ever used. |
370 | */ | 365 | */ |
371 | if (key->sdata) { | 366 | if (key->sdata) |
372 | spin_lock_irqsave(&key->sdata->local->sta_lock, flags); | ||
373 | __ieee80211_key_replace(key->sdata, key->sta, | 367 | __ieee80211_key_replace(key->sdata, key->sta, |
374 | key, NULL); | 368 | key, NULL); |
375 | spin_unlock_irqrestore(&key->sdata->local->sta_lock, flags); | ||
376 | } | ||
377 | 369 | ||
378 | add_todo(key, KEY_FLAG_TODO_DELETE); | 370 | add_todo(key, KEY_FLAG_TODO_DELETE); |
379 | } | 371 | } |
380 | 372 | ||
381 | void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata) | 373 | void ieee80211_key_free(struct ieee80211_key *key) |
382 | { | 374 | { |
383 | struct ieee80211_key *key; | 375 | unsigned long flags; |
384 | |||
385 | might_sleep(); | ||
386 | 376 | ||
387 | if (WARN_ON(!netif_running(sdata->dev))) | 377 | if (!key) |
388 | return; | 378 | return; |
389 | 379 | ||
390 | ieee80211_key_lock(); | 380 | spin_lock_irqsave(&key->sdata->local->sta_lock, flags); |
381 | __ieee80211_key_free(key); | ||
382 | spin_unlock_irqrestore(&key->sdata->local->sta_lock, flags); | ||
383 | } | ||
384 | |||
385 | /* | ||
386 | * To be safe against concurrent manipulations of the list (which shouldn't | ||
387 | * actually happen) we need to hold the spinlock. But under the spinlock we | ||
388 | * can't actually do much, so we defer processing to the todo list. Then run | ||
389 | * the todo list to be sure the operation and possibly previously pending | ||
390 | * operations are completed. | ||
391 | */ | ||
392 | static void ieee80211_todo_for_each_key(struct ieee80211_sub_if_data *sdata, | ||
393 | u32 todo_flags) | ||
394 | { | ||
395 | struct ieee80211_key *key; | ||
396 | unsigned long flags; | ||
391 | 397 | ||
398 | might_sleep(); | ||
399 | |||
400 | spin_lock_irqsave(&sdata->local->sta_lock, flags); | ||
392 | list_for_each_entry(key, &sdata->key_list, list) | 401 | list_for_each_entry(key, &sdata->key_list, list) |
393 | ieee80211_key_enable_hw_accel(key); | 402 | add_todo(key, todo_flags); |
403 | spin_unlock_irqrestore(&sdata->local->sta_lock, flags); | ||
394 | 404 | ||
395 | ieee80211_key_unlock(); | 405 | ieee80211_key_todo(); |
396 | } | 406 | } |
397 | 407 | ||
398 | void ieee80211_disable_keys(struct ieee80211_sub_if_data *sdata) | 408 | void ieee80211_enable_keys(struct ieee80211_sub_if_data *sdata) |
399 | { | 409 | { |
400 | struct ieee80211_key *key; | 410 | ASSERT_RTNL(); |
401 | 411 | ||
402 | might_sleep(); | 412 | if (WARN_ON(!netif_running(sdata->dev))) |
413 | return; | ||
403 | 414 | ||
404 | ieee80211_key_lock(); | 415 | ieee80211_todo_for_each_key(sdata, KEY_FLAG_TODO_HWACCEL_ADD); |
416 | } | ||
405 | 417 | ||
406 | list_for_each_entry(key, &sdata->key_list, list) | 418 | void ieee80211_disable_keys(struct ieee80211_sub_if_data *sdata) |
407 | ieee80211_key_disable_hw_accel(key); | 419 | { |
420 | ASSERT_RTNL(); | ||
408 | 421 | ||
409 | ieee80211_key_unlock(); | 422 | ieee80211_todo_for_each_key(sdata, KEY_FLAG_TODO_HWACCEL_REMOVE); |
410 | } | 423 | } |
411 | 424 | ||
412 | static void __ieee80211_key_free(struct ieee80211_key *key) | 425 | static void __ieee80211_key_destroy(struct ieee80211_key *key) |
413 | { | 426 | { |
414 | if (!key) | 427 | if (!key) |
415 | return; | 428 | return; |
@@ -440,7 +453,8 @@ static void __ieee80211_key_todo(void) | |||
440 | list_del_init(&key->todo); | 453 | list_del_init(&key->todo); |
441 | todoflags = key->flags & (KEY_FLAG_TODO_ADD_DEBUGFS | | 454 | todoflags = key->flags & (KEY_FLAG_TODO_ADD_DEBUGFS | |
442 | KEY_FLAG_TODO_DEFKEY | | 455 | KEY_FLAG_TODO_DEFKEY | |
443 | KEY_FLAG_TODO_HWACCEL | | 456 | KEY_FLAG_TODO_HWACCEL_ADD | |
457 | KEY_FLAG_TODO_HWACCEL_REMOVE | | ||
444 | KEY_FLAG_TODO_DELETE); | 458 | KEY_FLAG_TODO_DELETE); |
445 | key->flags &= ~todoflags; | 459 | key->flags &= ~todoflags; |
446 | spin_unlock(&todo_lock); | 460 | spin_unlock(&todo_lock); |
@@ -456,12 +470,16 @@ static void __ieee80211_key_todo(void) | |||
456 | ieee80211_debugfs_key_add_default(key->sdata); | 470 | ieee80211_debugfs_key_add_default(key->sdata); |
457 | work_done = true; | 471 | work_done = true; |
458 | } | 472 | } |
459 | if (todoflags & KEY_FLAG_TODO_HWACCEL) { | 473 | if (todoflags & KEY_FLAG_TODO_HWACCEL_ADD) { |
460 | ieee80211_key_enable_hw_accel(key); | 474 | ieee80211_key_enable_hw_accel(key); |
461 | work_done = true; | 475 | work_done = true; |
462 | } | 476 | } |
477 | if (todoflags & KEY_FLAG_TODO_HWACCEL_REMOVE) { | ||
478 | ieee80211_key_disable_hw_accel(key); | ||
479 | work_done = true; | ||
480 | } | ||
463 | if (todoflags & KEY_FLAG_TODO_DELETE) { | 481 | if (todoflags & KEY_FLAG_TODO_DELETE) { |
464 | __ieee80211_key_free(key); | 482 | __ieee80211_key_destroy(key); |
465 | work_done = true; | 483 | work_done = true; |
466 | } | 484 | } |
467 | 485 | ||
@@ -482,14 +500,16 @@ void ieee80211_key_todo(void) | |||
482 | void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata) | 500 | void ieee80211_free_keys(struct ieee80211_sub_if_data *sdata) |
483 | { | 501 | { |
484 | struct ieee80211_key *key, *tmp; | 502 | struct ieee80211_key *key, *tmp; |
485 | LIST_HEAD(tmp_list); | 503 | unsigned long flags; |
486 | 504 | ||
487 | ieee80211_key_lock(); | 505 | ieee80211_key_lock(); |
488 | 506 | ||
489 | ieee80211_debugfs_key_remove_default(sdata); | 507 | ieee80211_debugfs_key_remove_default(sdata); |
490 | 508 | ||
509 | spin_lock_irqsave(&sdata->local->sta_lock, flags); | ||
491 | list_for_each_entry_safe(key, tmp, &sdata->key_list, list) | 510 | list_for_each_entry_safe(key, tmp, &sdata->key_list, list) |
492 | ieee80211_key_free(key); | 511 | __ieee80211_key_free(key); |
512 | spin_unlock_irqrestore(&sdata->local->sta_lock, flags); | ||
493 | 513 | ||
494 | __ieee80211_key_todo(); | 514 | __ieee80211_key_todo(); |
495 | 515 | ||