]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
ath: Modify ath_key_delete() to not need full key entry
authorJouni Malinen <jouni@codeaurora.org>
Mon, 14 Dec 2020 17:21:17 +0000 (19:21 +0200)
committerKalle Valo <kvalo@codeaurora.org>
Thu, 17 Dec 2020 06:51:17 +0000 (08:51 +0200)
tkip_keymap can be used internally to avoid the reference to key->cipher
and with this, only the key index value itself is needed. This allows
ath_key_delete() call to be postponed to be handled after the upper
layer STA and key entry have already been removed. This is needed to
make ath9k key cache management safer.

Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Link: https://lore.kernel.org/r/20201214172118.18100-5-jouni@codeaurora.org
drivers/net/wireless/ath/ath.h
drivers/net/wireless/ath/ath5k/mac80211-ops.c
drivers/net/wireless/ath/ath9k/htc_drv_main.c
drivers/net/wireless/ath/ath9k/main.c
drivers/net/wireless/ath/key.c

index 9d18105c449fb19366c249055bd2d04b399af88d..f083fb9038c36384629631d0292a05152a6b17ce 100644 (file)
@@ -197,7 +197,7 @@ struct sk_buff *ath_rxbuf_alloc(struct ath_common *common,
 bool ath_is_mybeacon(struct ath_common *common, struct ieee80211_hdr *hdr);
 
 void ath_hw_setbssidmask(struct ath_common *common);
-void ath_key_delete(struct ath_common *common, struct ieee80211_key_conf *key);
+void ath_key_delete(struct ath_common *common, u8 hw_key_idx);
 int ath_key_config(struct ath_common *common,
                          struct ieee80211_vif *vif,
                          struct ieee80211_sta *sta,
index 8f2719ff463c2e4cf03cb23c29a280753929e999..532eeac9e83e357e50b4656231ab40d542d2c838 100644 (file)
@@ -522,7 +522,7 @@ ath5k_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd,
                }
                break;
        case DISABLE_KEY:
-               ath_key_delete(common, key);
+               ath_key_delete(common, key->hw_key_idx);
                break;
        default:
                ret = -EINVAL;
index 2b7832b1c80089796337fb37cce9d69294927c1b..72ef319feeda73d6c8f82b3d3db42f92561ef233 100644 (file)
@@ -1461,7 +1461,7 @@ static int ath9k_htc_set_key(struct ieee80211_hw *hw,
                }
                break;
        case DISABLE_KEY:
-               ath_key_delete(common, key);
+               ath_key_delete(common, key->hw_key_idx);
                break;
        default:
                ret = -EINVAL;
index 10b87aa1d28954c1efe1f916b83ae80f18ef5df5..bcdf150060f27c596a28c469424ff96a33a05cdd 100644 (file)
@@ -1543,12 +1543,11 @@ static void ath9k_del_ps_key(struct ath_softc *sc,
 {
        struct ath_common *common = ath9k_hw_common(sc->sc_ah);
        struct ath_node *an = (struct ath_node *) sta->drv_priv;
-       struct ieee80211_key_conf ps_key = { .hw_key_idx = an->ps_key };
 
        if (!an->ps_key)
            return;
 
-       ath_key_delete(common, &ps_key);
+       ath_key_delete(common, an->ps_key);
        an->ps_key = 0;
        an->key_idx[0] = 0;
 }
@@ -1748,7 +1747,7 @@ static int ath9k_set_key(struct ieee80211_hw *hw,
                }
                break;
        case DISABLE_KEY:
-               ath_key_delete(common, key);
+               ath_key_delete(common, key->hw_key_idx);
                if (an) {
                        for (i = 0; i < ARRAY_SIZE(an->key_idx); i++) {
                                if (an->key_idx[i] != key->hw_key_idx)
index cb266cf3c77c7871665ce304d379bd2e427071b7..61b59a804e308d8358903d3f81950a85c97afdf0 100644 (file)
@@ -581,38 +581,38 @@ EXPORT_SYMBOL(ath_key_config);
 /*
  * Delete Key.
  */
-void ath_key_delete(struct ath_common *common, struct ieee80211_key_conf *key)
+void ath_key_delete(struct ath_common *common, u8 hw_key_idx)
 {
        /* Leave CCMP and TKIP (main key) configured to avoid disabling
         * encryption for potentially pending frames already in a TXQ with the
         * keyix pointing to this key entry. Instead, only clear the MAC address
         * to prevent RX processing from using this key cache entry.
         */
-       if (test_bit(key->hw_key_idx, common->ccmp_keymap) ||
-           test_bit(key->hw_key_idx, common->tkip_keymap))
-               ath_hw_keysetmac(common, key->hw_key_idx, NULL);
+       if (test_bit(hw_key_idx, common->ccmp_keymap) ||
+           test_bit(hw_key_idx, common->tkip_keymap))
+               ath_hw_keysetmac(common, hw_key_idx, NULL);
        else
-               ath_hw_keyreset(common, key->hw_key_idx);
-       if (key->hw_key_idx < IEEE80211_WEP_NKID)
+               ath_hw_keyreset(common, hw_key_idx);
+       if (hw_key_idx < IEEE80211_WEP_NKID)
                return;
 
-       clear_bit(key->hw_key_idx, common->keymap);
-       clear_bit(key->hw_key_idx, common->ccmp_keymap);
-       if (key->cipher != WLAN_CIPHER_SUITE_TKIP)
+       clear_bit(hw_key_idx, common->keymap);
+       clear_bit(hw_key_idx, common->ccmp_keymap);
+       if (!test_bit(hw_key_idx, common->tkip_keymap))
                return;
 
-       clear_bit(key->hw_key_idx + 64, common->keymap);
+       clear_bit(hw_key_idx + 64, common->keymap);
 
-       clear_bit(key->hw_key_idx, common->tkip_keymap);
-       clear_bit(key->hw_key_idx + 64, common->tkip_keymap);
+       clear_bit(hw_key_idx, common->tkip_keymap);
+       clear_bit(hw_key_idx + 64, common->tkip_keymap);
 
        if (!(common->crypt_caps & ATH_CRYPT_CAP_MIC_COMBINED)) {
-               ath_hw_keyreset(common, key->hw_key_idx + 32);
-               clear_bit(key->hw_key_idx + 32, common->keymap);
-               clear_bit(key->hw_key_idx + 64 + 32, common->keymap);
+               ath_hw_keyreset(common, hw_key_idx + 32);
+               clear_bit(hw_key_idx + 32, common->keymap);
+               clear_bit(hw_key_idx + 64 + 32, common->keymap);
 
-               clear_bit(key->hw_key_idx + 32, common->tkip_keymap);
-               clear_bit(key->hw_key_idx + 64 + 32, common->tkip_keymap);
+               clear_bit(hw_key_idx + 32, common->tkip_keymap);
+               clear_bit(hw_key_idx + 64 + 32, common->tkip_keymap);
        }
 }
 EXPORT_SYMBOL(ath_key_delete);