Commit 4666faab authored by Herbert Xu's avatar Herbert Xu Committed by David S. Miller

[IPSEC] Kill spurious hard expire messages

This patch ensures that the hard state/policy expire notifications are
only sent when the state/policy is successfully removed from their
respective tables.

As it is, it's possible for a state/policy to both expire through
reaching a hard limit, as well as being deleted by the user.

Note that this behaviour isn't actually forbidden by RFC 2367.
However, it is a quality of implementation issue.

As an added bonus, the restructuring in this patch will help
eventually in moving the expire notifications from softirq
context into process context, thus improving their reliability.

One important side-effect from this change is that SAs reaching
their hard byte/packet limits are now deleted immediately, just
like SAs that have reached their hard time limits.

Previously they were announced immediately but only deleted after
30 seconds.

This is bad because it prevents the system from issuing an ACQUIRE
command until the existing state was deleted by the user or expires
after the time is up.

In the scenario where the expire notification was lost this introduces
a 30 second delay into the system for no good reason.
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 26b15dad
...@@ -679,7 +679,7 @@ static inline int xfrm_sk_clone_policy(struct sock *sk) ...@@ -679,7 +679,7 @@ static inline int xfrm_sk_clone_policy(struct sock *sk)
return 0; return 0;
} }
extern void xfrm_policy_delete(struct xfrm_policy *pol, int dir); extern int xfrm_policy_delete(struct xfrm_policy *pol, int dir);
static inline void xfrm_sk_free_policy(struct sock *sk) static inline void xfrm_sk_free_policy(struct sock *sk)
{ {
......
...@@ -216,8 +216,8 @@ out: ...@@ -216,8 +216,8 @@ out:
expired: expired:
read_unlock(&xp->lock); read_unlock(&xp->lock);
if (!xfrm_policy_delete(xp, dir))
km_policy_expired(xp, dir, 1); km_policy_expired(xp, dir, 1);
xfrm_policy_delete(xp, dir);
xfrm_pol_put(xp); xfrm_pol_put(xp);
} }
...@@ -555,7 +555,7 @@ static struct xfrm_policy *__xfrm_policy_unlink(struct xfrm_policy *pol, ...@@ -555,7 +555,7 @@ static struct xfrm_policy *__xfrm_policy_unlink(struct xfrm_policy *pol,
return NULL; return NULL;
} }
void xfrm_policy_delete(struct xfrm_policy *pol, int dir) int xfrm_policy_delete(struct xfrm_policy *pol, int dir)
{ {
write_lock_bh(&xfrm_policy_lock); write_lock_bh(&xfrm_policy_lock);
pol = __xfrm_policy_unlink(pol, dir); pol = __xfrm_policy_unlink(pol, dir);
...@@ -564,7 +564,9 @@ void xfrm_policy_delete(struct xfrm_policy *pol, int dir) ...@@ -564,7 +564,9 @@ void xfrm_policy_delete(struct xfrm_policy *pol, int dir)
if (dir < XFRM_POLICY_MAX) if (dir < XFRM_POLICY_MAX)
atomic_inc(&flow_cache_genid); atomic_inc(&flow_cache_genid);
xfrm_policy_kill(pol); xfrm_policy_kill(pol);
return 0;
} }
return -ENOENT;
} }
int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol) int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol)
......
...@@ -154,6 +154,7 @@ static void xfrm_timer_handler(unsigned long data) ...@@ -154,6 +154,7 @@ static void xfrm_timer_handler(unsigned long data)
next = tmo; next = tmo;
} }
x->km.dying = warn;
if (warn) if (warn)
km_state_expired(x, 0); km_state_expired(x, 0);
resched: resched:
...@@ -169,9 +170,8 @@ expired: ...@@ -169,9 +170,8 @@ expired:
next = 2; next = 2;
goto resched; goto resched;
} }
if (x->id.spi != 0) if (!__xfrm_state_delete(x) && x->id.spi)
km_state_expired(x, 1); km_state_expired(x, 1);
__xfrm_state_delete(x);
out: out:
spin_unlock(&x->lock); spin_unlock(&x->lock);
...@@ -566,16 +566,18 @@ int xfrm_state_check_expire(struct xfrm_state *x) ...@@ -566,16 +566,18 @@ int xfrm_state_check_expire(struct xfrm_state *x)
if (x->curlft.bytes >= x->lft.hard_byte_limit || if (x->curlft.bytes >= x->lft.hard_byte_limit ||
x->curlft.packets >= x->lft.hard_packet_limit) { x->curlft.packets >= x->lft.hard_packet_limit) {
km_state_expired(x, 1); x->km.state = XFRM_STATE_EXPIRED;
if (!mod_timer(&x->timer, jiffies + XFRM_ACQ_EXPIRES*HZ)) if (!mod_timer(&x->timer, jiffies))
xfrm_state_hold(x); xfrm_state_hold(x);
return -EINVAL; return -EINVAL;
} }
if (!x->km.dying && if (!x->km.dying &&
(x->curlft.bytes >= x->lft.soft_byte_limit || (x->curlft.bytes >= x->lft.soft_byte_limit ||
x->curlft.packets >= x->lft.soft_packet_limit)) x->curlft.packets >= x->lft.soft_packet_limit)) {
x->km.dying = 1;
km_state_expired(x, 0); km_state_expired(x, 0);
}
return 0; return 0;
} }
EXPORT_SYMBOL(xfrm_state_check_expire); EXPORT_SYMBOL(xfrm_state_check_expire);
...@@ -833,10 +835,6 @@ static void km_state_expired(struct xfrm_state *x, int hard) ...@@ -833,10 +835,6 @@ static void km_state_expired(struct xfrm_state *x, int hard)
{ {
struct km_event c; struct km_event c;
if (hard)
x->km.state = XFRM_STATE_EXPIRED;
else
x->km.dying = 1;
c.data = hard; c.data = hard;
c.event = XFRM_SAP_EXPIRED; c.event = XFRM_SAP_EXPIRED;
km_state_notify(x, &c); km_state_notify(x, &c);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment