Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp3953968imm; Sun, 13 May 2018 23:52:37 -0700 (PDT) X-Google-Smtp-Source: AB8JxZroX3ZuN2Ih3I5d4RLN6n+2g5v5VzsLdYtao4UShNGOsJnh4vuLgUXcr3yY3+0AN+4RkTNb X-Received: by 2002:a63:7315:: with SMTP id o21-v6mr7425491pgc.360.1526280757131; Sun, 13 May 2018 23:52:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526280757; cv=none; d=google.com; s=arc-20160816; b=NPNptqHckCG6Pd8ZaBVbRdyTnCKPLZn4w17CtCt2ozzQKsOnZzeLOuJJNrW8xYGcJp gOp3SLRDWoIA7IFsuPNEAbgDioy3ykIvjNFPm/+sx8OLVmAynB38wmKV2co0/q4HX3bc /RNgpUs1SmOJuzoJHRuDEAf6EM5/RKzNwOGPwfmX9NU0ifi2lCHiVDZp3/JH376uhx8r 1Q9LvUJ/+8vMq6CMVpbut4Rh+UXGKEjy0cY7cA2lgueILf828fhsanbTYFpLti9YXX2V 5KK0SMCI44UMZqbWEpcQsckmf+4yWcRvV/jk+xFpJKZsOPLUzcA/khO0+p+aUItjUWsd 4p/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=H2d1ZECQUVYZJ7OonIttJy1VDXAxCt0yF6gaGqA0/G0=; b=brv7evIXSoZUshfdds/21BdRGCjmoPmWS2UlkLviWwGwVKNRii8YshnwE7drkI0qEe veZtOZZCu8Sp6YP79MBGSSQD+z/ArbabW4nJg/H5JrJftdhwH2ODDJ5lVsu6ytKn8z8z Snmc1MQaGJQEWIZdBakOYpHrokBo+ZbDrfcFbzF7XQYQjcVwH+T6B6dEm/NanmCqtTJu Xn+8ppMoUpHcQbRQYptlquvxYz+k1/tFu6OnKbh5/YmWzRu9cnUh/qIhcAVvj76IgaBm a34X4Cg3hipkLpJb58t/tbuHlMLolAUGyewWnmgxoe4MYmhYDAOE1r55Il4sM7Mbh1es 8fkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TaeCnvu+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d16-v6si7990298plj.57.2018.05.13.23.52.22; Sun, 13 May 2018 23:52:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TaeCnvu+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752618AbeENGwG (ORCPT + 99 others); Mon, 14 May 2018 02:52:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:58544 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752606AbeENGwC (ORCPT ); Mon, 14 May 2018 02:52:02 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AE69220834; Mon, 14 May 2018 06:52:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526280722; bh=MaU0lShl7gIpbR+HW3OuM+08GThv/jQdUT1bJhBRgis=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TaeCnvu+TMLB+S5+5L8nIzvYiynv7DS3Ey5N4kMArSFy4qjuRa71m8cfKv3EOoMZR vzUewZMQHE0+sKjArlqzXS/PeckPAsTGa/4UOnrAKPJ1eHzyEaJJeOz7DdNhSCvuh7 vfz//hxO0dXqN9DjRLao1ZXwjwI3HGtfW4wHPkwQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Spinadel , Johannes Berg , Sriram R Subject: [PATCH 4.4 07/56] mac80211: Add RX flag to indicate ICV stripped Date: Mon, 14 May 2018 08:48:12 +0200 Message-Id: <20180514064755.647627131@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180514064754.853201981@linuxfoundation.org> References: <20180514064754.853201981@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: David Spinadel commit cef0acd4d7d4811d2d19cd0195031bf0dfe41249 upstream. Add a flag that indicates that the WEP ICV was stripped from an RX packet, allowing the device to not transfer that if it's already checked. Signed-off-by: David Spinadel Signed-off-by: Johannes Berg Cc: Sriram R Signed-off-by: Greg Kroah-Hartman --- include/net/mac80211.h | 5 ++++- net/mac80211/wep.c | 3 ++- net/mac80211/wpa.c | 3 ++- 3 files changed, 8 insertions(+), 3 deletions(-) --- a/include/net/mac80211.h +++ b/include/net/mac80211.h @@ -975,7 +975,7 @@ ieee80211_tx_info_clear_status(struct ie * @RX_FLAG_DECRYPTED: This frame was decrypted in hardware. * @RX_FLAG_MMIC_STRIPPED: the Michael MIC is stripped off this frame, * verification has been done by the hardware. - * @RX_FLAG_IV_STRIPPED: The IV/ICV are stripped from this frame. + * @RX_FLAG_IV_STRIPPED: The IV and ICV are stripped from this frame. * If this flag is set, the stack cannot do any replay detection * hence the driver or hardware will have to do that. * @RX_FLAG_PN_VALIDATED: Currently only valid for CCMP/GCMP frames, this @@ -1034,6 +1034,8 @@ ieee80211_tx_info_clear_status(struct ie * @RX_FLAG_ALLOW_SAME_PN: Allow the same PN as same packet before. * This is used for AMSDU subframes which can have the same PN as * the first subframe. + * @RX_FLAG_ICV_STRIPPED: The ICV is stripped from this frame. CRC checking must + * be done in the hardware. */ enum mac80211_rx_flags { RX_FLAG_MMIC_ERROR = BIT(0), @@ -1066,6 +1068,7 @@ enum mac80211_rx_flags { RX_FLAG_RADIOTAP_VENDOR_DATA = BIT(31), RX_FLAG_MIC_STRIPPED = BIT_ULL(32), RX_FLAG_ALLOW_SAME_PN = BIT_ULL(33), + RX_FLAG_ICV_STRIPPED = BIT_ULL(34), }; #define RX_FLAG_STBC_SHIFT 26 --- a/net/mac80211/wep.c +++ b/net/mac80211/wep.c @@ -293,7 +293,8 @@ ieee80211_crypto_wep_decrypt(struct ieee return RX_DROP_UNUSABLE; ieee80211_wep_remove_iv(rx->local, rx->skb, rx->key); /* remove ICV */ - if (pskb_trim(rx->skb, rx->skb->len - IEEE80211_WEP_ICV_LEN)) + if (!(status->flag & RX_FLAG_ICV_STRIPPED) && + pskb_trim(rx->skb, rx->skb->len - IEEE80211_WEP_ICV_LEN)) return RX_DROP_UNUSABLE; } --- a/net/mac80211/wpa.c +++ b/net/mac80211/wpa.c @@ -298,7 +298,8 @@ ieee80211_crypto_tkip_decrypt(struct iee return RX_DROP_UNUSABLE; /* Trim ICV */ - skb_trim(skb, skb->len - IEEE80211_TKIP_ICV_LEN); + if (!(status->flag & RX_FLAG_ICV_STRIPPED)) + skb_trim(skb, skb->len - IEEE80211_TKIP_ICV_LEN); /* Remove IV */ memmove(skb->data + IEEE80211_TKIP_IV_LEN, skb->data, hdrlen);