/* * NetLabel Unlabeled Support * * This file defines functions for dealing with unlabeled packets for the * NetLabel system. The NetLabel system manages static and dynamic label * mappings for network protocols such as CIPSO and RIPSO. * * Author: Paul Moore * */ /* * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see . * */ #ifndef _NETLABEL_UNLABELED_H #define _NETLABEL_UNLABELED_H #include /* * The following NetLabel payloads are supported by the Unlabeled subsystem. * * o STATICADD * This message is sent from an application to add a new static label for * incoming unlabeled connections. * * Required attributes: * * NLBL_UNLABEL_A_IFACE * NLBL_UNLABEL_A_SECCTX * * If IPv4 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV4ADDR * NLBL_UNLABEL_A_IPV4MASK * * If IPv6 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV6ADDR * NLBL_UNLABEL_A_IPV6MASK * * o STATICREMOVE * This message is sent from an application to remove an existing static * label for incoming unlabeled connections. * * Required attributes: * * NLBL_UNLABEL_A_IFACE * * If IPv4 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV4ADDR * NLBL_UNLABEL_A_IPV4MASK * * If IPv6 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV6ADDR * NLBL_UNLABEL_A_IPV6MASK * * o STATICLIST * This message can be sent either from an application or by the kernel in * response to an application generated STATICLIST message. When sent by an * application there is no payload and the NLM_F_DUMP flag should be set. * The kernel should response with a series of the following messages. * * Required attributes: * * NLBL_UNLABEL_A_IFACE * NLBL_UNLABEL_A_SECCTX * * If IPv4 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV4ADDR * NLBL_UNLABEL_A_IPV4MASK * * If IPv6 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV6ADDR * NLBL_UNLABEL_A_IPV6MASK * * o STATICADDDEF * This message is sent from an application to set the default static * label for incoming unlabeled connections. * * Required attribute: * * NLBL_UNLABEL_A_SECCTX * * If IPv4 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV4ADDR * NLBL_UNLABEL_A_IPV4MASK * * If IPv6 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV6ADDR * NLBL_UNLABEL_A_IPV6MASK * * o STATICREMOVEDEF * This message is sent from an application to remove the existing default * static label for incoming unlabeled connections. * * If IPv4 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV4ADDR * NLBL_UNLABEL_A_IPV4MASK * * If IPv6 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV6ADDR * NLBL_UNLABEL_A_IPV6MASK * * o STATICLISTDEF * This message can be sent either from an application or by the kernel in * response to an application generated STATICLISTDEF message. When sent by * an application there is no payload and the NLM_F_DUMP flag should be set. * The kernel should response with the following message. * * Required attribute: * * NLBL_UNLABEL_A_SECCTX * * If IPv4 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV4ADDR * NLBL_UNLABEL_A_IPV4MASK * * If IPv6 is specified the following attributes are required: * * NLBL_UNLABEL_A_IPV6ADDR * NLBL_UNLABEL_A_IPV6MASK * * o ACCEPT * This message is sent from an application to specify if the kernel should * allow unlabled packets to pass if they do not match any of the static * mappings defined in the unlabeled module. * * Required attributes: * * NLBL_UNLABEL_A_ACPTFLG * * o LIST * This message can be sent either from an application or by the kernel in * response to an application generated LIST message. When sent by an * application there is no payload. The kernel should respond to a LIST * message with a LIST message on success. * * Required attributes: * * NLBL_UNLABEL_A_ACPTFLG * */ /* NetLabel Unlabeled commands */ enum { NLBL_UNLABEL_C_UNSPEC, NLBL_UNLABEL_C_ACCEPT, NLBL_UNLABEL_C_LIST, NLBL_UNLABEL_C_STATICADD, NLBL_UNLABEL_C_STATICREMOVE, NLBL_UNLABEL_C_STATICLIST, NLBL_UNLABEL_C_STATICADDDEF, NLBL_UNLABEL_C_STATICREMOVEDEF, NLBL_UNLABEL_C_STATICLISTDEF, __NLBL_UNLABEL_C_MAX, }; /* NetLabel Unlabeled attributes */ enum { NLBL_UNLABEL_A_UNSPEC, NLBL_UNLABEL_A_ACPTFLG, /* (NLA_U8) * if true then unlabeled packets are allowed to pass, else unlabeled * packets are rejected */ NLBL_UNLABEL_A_IPV6ADDR, /* (NLA_BINARY, struct in6_addr) * an IPv6 address */ NLBL_UNLABEL_A_IPV6MASK, /* (NLA_BINARY, struct in6_addr) * an IPv6 address mask */ NLBL_UNLABEL_A_IPV4ADDR, /* (NLA_BINARY, struct in_addr) * an IPv4 address */ NLBL_UNLABEL_A_IPV4MASK, /* (NLA_BINARY, struct in_addr) * and IPv4 address mask */ NLBL_UNLABEL_A_IFACE, /* (NLA_NULL_STRING) * network interface */ NLBL_UNLABEL_A_SECCTX, /* (NLA_BINARY) * a LSM specific security context */ __NLBL_UNLABEL_A_MAX, }; #define NLBL_UNLABEL_A_MAX (__NLBL_UNLABEL_A_MAX - 1) /* NetLabel protocol functions */ int netlbl_unlabel_genl_init(void); /* Unlabeled connection hash table size */ /* XXX - currently this number is an uneducated guess */ #define NETLBL_UNLHSH_BITSIZE 7 /* General Unlabeled init function */ int netlbl_unlabel_init(u32 size); /* Static/Fallback label management functions */ int netlbl_unlhsh_add(struct net *net, const char *dev_name, const void *addr, const void *mask, u32 addr_len, u32 secid, struct netlbl_audit *audit_info); int netlbl_unlhsh_remove(struct net *net, const char *dev_name, const void *addr, const void *mask, u32 addr_len, struct netlbl_audit *audit_info); /* Process Unlabeled incoming network packets */ int netlbl_unlabel_getattr(const struct sk_buff *skb, u16 family, struct netlbl_lsm_secattr *secattr); /* Set the default configuration to allow Unlabeled packets */ int netlbl_unlabel_defconf(void); #endif r] drm_fb_helper_set_par+0x2d/0x60 [drm_kms_helper] intel_fbdev_set_par+0x18/0x70 [i915] fb_set_var+0x236/0x460 fbcon_blank+0x30f/0x350 do_unblank_screen+0xd2/0x1a0 vt_ioctl+0x507/0x12a0 tty_ioctl+0x355/0xc30 do_vfs_ioctl+0xa3/0x5e0 SyS_ioctl+0x79/0x90 entry_SYSCALL_64_fastpath+0x13/0x94 - i915 unpin_work workqueue: intel_unpin_work_fn+0x58/0x140 [i915] process_one_work+0x1f1/0x480 worker_thread+0x48/0x4d0 kthread+0x101/0x140 and this patch purely papers over the issue by adding a NULL pointer check and a WARN_ON_ONCE() to avoid the oops that would then generally make the machine unresponsive. Other callers of i915_gem_object_to_ggtt() seem to also check for the returned pointer being NULL and warn about it, so this clearly has happened before in other places. [ Reported it originally to the i915 developers on Jan 8, applying the ugly workaround on my own now after triggering the problem for the second time with no feedback. This is likely to be the same bug reported as https://bugs.freedesktop.org/show_bug.cgi?id=98829 https://bugs.freedesktop.org/show_bug.cgi?id=99134 which has a patch for the underlying problem, but it hasn't gotten to me, so I'm applying the workaround. ] Cc: Daniel Vetter <daniel.vetter@intel.com> Cc: Jani Nikula <jani.nikula@linux.intel.com> Cc: Ville Syrjälä <ville.syrjala@linux.intel.com> Cc: Chris Wilson <chris@chris-wilson.co.uk> Cc: Maarten Lankhorst <maarten.lankhorst@linux.intel.com> Cc: Tvrtko Ursulin <tvrtko.ursulin@intel.com> Cc: Imre Deak <imre.deak@intel.com> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'net/ipv6/netfilter/ip6t_rpfilter.c')