Skip to content

Commit b441cf3

Browse files
qsnklassert
authored andcommitted
xfrm: delete x->tunnel as we delete x
The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a reference to that user state still exists, the fallback state will remain on the hashtables/lists, triggering the WARN in xfrm_state_fini. Because of those remaining references, the fix in commit f75a280 ("xfrm: destroy xfrm_state synchronously on net exit path") is not complete. We recently fixed one such situation in TCP due to defered freeing of skbs (commit 9b6412e ("tcp: drop secpath at the same time as we currently drop dst")). This can also happen due to IP reassembly: skbs with a secpath remain on the reassembly queue until netns destruction. If we can't guarantee that the queues are flushed by the time xfrm_state_fini runs, there may still be references to a (user) xfrm_state, preventing the timely deletion of the corresponding fallback state. Instead of chasing each instance of skbs holding a secpath one by one, this patch fixes the issue directly within xfrm, by deleting the fallback state as soon as the last user state depending on it has been deleted. Destruction will still happen when the final reference is dropped. A separate lockdep class for the fallback state is required since we're going to lock x->tunnel while x is locked. Fixes: 9d4139c ("netns xfrm: per-netns xfrm_state_all list") Signed-off-by: Sabrina Dubroca <[email protected]> Signed-off-by: Steffen Klassert <[email protected]>
1 parent a90b2a1 commit b441cf3

File tree

6 files changed

+13
-14
lines changed

6 files changed

+13
-14
lines changed

include/net/xfrm.h

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -441,7 +441,6 @@ int xfrm_input_register_afinfo(const struct xfrm_input_afinfo *afinfo);
441441
int xfrm_input_unregister_afinfo(const struct xfrm_input_afinfo *afinfo);
442442

443443
void xfrm_flush_gc(void);
444-
void xfrm_state_delete_tunnel(struct xfrm_state *x);
445444

446445
struct xfrm_type {
447446
struct module *owner;

net/ipv4/ipcomp.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,7 @@ static int ipcomp4_err(struct sk_buff *skb, u32 info)
5454
}
5555

5656
/* We always hold one tunnel user reference to indicate a tunnel */
57+
static struct lock_class_key xfrm_state_lock_key;
5758
static struct xfrm_state *ipcomp_tunnel_create(struct xfrm_state *x)
5859
{
5960
struct net *net = xs_net(x);
@@ -62,6 +63,7 @@ static struct xfrm_state *ipcomp_tunnel_create(struct xfrm_state *x)
6263
t = xfrm_state_alloc(net);
6364
if (!t)
6465
goto out;
66+
lockdep_set_class(&t->lock, &xfrm_state_lock_key);
6567

6668
t->id.proto = IPPROTO_IPIP;
6769
t->id.spi = x->props.saddr.a4;

net/ipv6/ipcomp6.c

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ static int ipcomp6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
7171
return 0;
7272
}
7373

74+
static struct lock_class_key xfrm_state_lock_key;
7475
static struct xfrm_state *ipcomp6_tunnel_create(struct xfrm_state *x)
7576
{
7677
struct net *net = xs_net(x);
@@ -79,6 +80,7 @@ static struct xfrm_state *ipcomp6_tunnel_create(struct xfrm_state *x)
7980
t = xfrm_state_alloc(net);
8081
if (!t)
8182
goto out;
83+
lockdep_set_class(&t->lock, &xfrm_state_lock_key);
8284

8385
t->id.proto = IPPROTO_IPV6;
8486
t->id.spi = xfrm6_tunnel_alloc_spi(net, (xfrm_address_t *)&x->props.saddr);

net/ipv6/xfrm6_tunnel.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -334,8 +334,8 @@ static void __net_exit xfrm6_tunnel_net_exit(struct net *net)
334334
struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
335335
unsigned int i;
336336

337-
xfrm_flush_gc();
338337
xfrm_state_flush(net, 0, false, true);
338+
xfrm_flush_gc();
339339

340340
for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++)
341341
WARN_ON_ONCE(!hlist_empty(&xfrm6_tn->spi_byaddr[i]));

net/xfrm/xfrm_ipcomp.c

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,6 @@ void ipcomp_destroy(struct xfrm_state *x)
313313
struct ipcomp_data *ipcd = x->data;
314314
if (!ipcd)
315315
return;
316-
xfrm_state_delete_tunnel(x);
317316
ipcomp_free_data(ipcd);
318317
kfree(ipcd);
319318
}

net/xfrm/xfrm_state.c

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -811,6 +811,7 @@ void __xfrm_state_destroy(struct xfrm_state *x, bool sync)
811811
}
812812
EXPORT_SYMBOL(__xfrm_state_destroy);
813813

814+
static void xfrm_state_delete_tunnel(struct xfrm_state *x);
814815
int __xfrm_state_delete(struct xfrm_state *x)
815816
{
816817
struct net *net = xs_net(x);
@@ -838,6 +839,8 @@ int __xfrm_state_delete(struct xfrm_state *x)
838839

839840
xfrm_dev_state_delete(x);
840841

842+
xfrm_state_delete_tunnel(x);
843+
841844
/* All xfrm_state objects are created by xfrm_state_alloc.
842845
* The xfrm_state_alloc call gives a reference, and that
843846
* is what we are dropping here.
@@ -941,10 +944,7 @@ int xfrm_state_flush(struct net *net, u8 proto, bool task_valid, bool sync)
941944
err = xfrm_state_delete(x);
942945
xfrm_audit_state_delete(x, err ? 0 : 1,
943946
task_valid);
944-
if (sync)
945-
xfrm_state_put_sync(x);
946-
else
947-
xfrm_state_put(x);
947+
xfrm_state_put(x);
948948
if (!err)
949949
cnt++;
950950

@@ -3068,20 +3068,17 @@ void xfrm_flush_gc(void)
30683068
}
30693069
EXPORT_SYMBOL(xfrm_flush_gc);
30703070

3071-
/* Temporarily located here until net/xfrm/xfrm_tunnel.c is created */
3072-
void xfrm_state_delete_tunnel(struct xfrm_state *x)
3071+
static void xfrm_state_delete_tunnel(struct xfrm_state *x)
30733072
{
30743073
if (x->tunnel) {
30753074
struct xfrm_state *t = x->tunnel;
30763075

3077-
if (atomic_read(&t->tunnel_users) == 2)
3076+
if (atomic_dec_return(&t->tunnel_users) == 1)
30783077
xfrm_state_delete(t);
3079-
atomic_dec(&t->tunnel_users);
3080-
xfrm_state_put_sync(t);
3078+
xfrm_state_put(t);
30813079
x->tunnel = NULL;
30823080
}
30833081
}
3084-
EXPORT_SYMBOL(xfrm_state_delete_tunnel);
30853082

30863083
u32 xfrm_state_mtu(struct xfrm_state *x, int mtu)
30873084
{
@@ -3286,8 +3283,8 @@ void xfrm_state_fini(struct net *net)
32863283
unsigned int sz;
32873284

32883285
flush_work(&net->xfrm.state_hash_work);
3289-
flush_work(&xfrm_state_gc_work);
32903286
xfrm_state_flush(net, 0, false, true);
3287+
flush_work(&xfrm_state_gc_work);
32913288

32923289
WARN_ON(!list_empty(&net->xfrm.state_all));
32933290

0 commit comments

Comments
 (0)