All of lore.kernel.org
 help / color / mirror / Atom feed
From: Steffen Klassert <steffen.klassert@secunet.com>
To: Smart Weblications GmbH - Florian Wiessner 
	<f.wiessner@smart-weblications.de>
Cc: <netdev@vger.kernel.org>, LKML <linux-kernel@vger.kernel.org>,
	<stable@vger.kernel.org>
Subject: Re: 3.12.33 - BUG xfrm_selector_match+0x25/0x2f6
Date: Fri, 5 Dec 2014 11:43:31 +0100	[thread overview]
Message-ID: <20141205104330.GH6390@secunet.com> (raw)
In-Reply-To: <54808D8B.3080804@smart-weblications.de>

On Thu, Dec 04, 2014 at 05:36:27PM +0100, Smart Weblications GmbH - Florian Wiessner wrote:
> Hi,
> 
> Am 04.12.2014 08:56, schrieb Steffen Klassert:
> > 
> > I really wonder why the xfrm_sk_policy_lookup codepath is taken here.
> > It looks like this is the processing of an inbound ipv4 packet that
> > is going to be rerouted to the output path by ipvs, so this packet
> > should not have socket context at all.
> > 
> > xfrm_sk_policy_lookup is called just if the packet has socket context
> > and the socket has an IPsec output policy configured. Do you use IPsec
> > socket policies?
> > 
> 
> Yes it is insane i do not know why this happens and i wonder as well - i do not
> have IPsec configured. I tried yesterday with only
> 
> CONFIG_XFRM=y
> CONFIG_XFRM_ALGO=m
> 
> and all other XFRM modules disabled, same problem.
> 
> I now compiled kernel without xfrm to check if the problem is somewhere else.
> 
> I have seen that on this box (debian squeeze) the racoon tool inserts xfrm
> polcies like so:
> 
> ip xfrm policy show
> src ::/0 dst ::/0
>         dir 4 priority 0 ptype main
> src ::/0 dst ::/0
>         dir 3 priority 0 ptype main
> src ::/0 dst ::/0
>         dir 4 priority 0 ptype main
> src ::/0 dst ::/0
>         dir 3 priority 0 ptype main
> src ::/0 dst ::/0
> ...

Well, these are socket policies. The ike deamon uses them
for SA negotiation.

> 
> I tried without racoon running and with ipsec userspace tools disabled, but the
> problem still exists without ipsec userspace tools.

Does this mean that it still happens if you have no IPsec policies
in the system?

> 
> Interesting is maybe, that the longer the node is running and interfaces are
> added to a bridge, the more policies sum up. Here is an overview of other nodes,
> but without ipvs running:

Would be interesting to see them.


  reply	other threads:[~2014-12-05 10:43 UTC|newest]

Thread overview: 30+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-12-03 14:55 3.12.33 - BUG xfrm_selector_match+0x25/0x2f6 Smart Weblications GmbH - Florian Wiessner
2014-12-03 14:55 ` Smart Weblications GmbH - Florian Wiessner
2014-12-04  7:56 ` Steffen Klassert
2014-12-04 16:36   ` Smart Weblications GmbH - Florian Wiessner
2014-12-04 16:36     ` Smart Weblications GmbH - Florian Wiessner
2014-12-05 10:43     ` Steffen Klassert [this message]
2014-12-04 23:15   ` Julian Anastasov
2014-12-05  2:23     ` Smart Weblications GmbH - Florian Wiessner
2014-12-05  2:23       ` Smart Weblications GmbH - Florian Wiessner
2014-12-05  9:55       ` Julian Anastasov
2014-12-05 13:55         ` Smart Weblications GmbH - Florian Wiessner
2014-12-05 13:55           ` Smart Weblications GmbH - Florian Wiessner
2014-12-05 21:32           ` Julian Anastasov
2014-12-07 22:04             ` Smart Weblications GmbH - Florian Wiessner
2014-12-07 18:27           ` Julian Anastasov
2014-12-08 11:19             ` Smart Weblications GmbH - Florian Wiessner
2014-12-08 11:19               ` Smart Weblications GmbH - Florian Wiessner
2014-12-08 20:40               ` Julian Anastasov
2014-12-09 10:23                 ` Smart Weblications GmbH - Florian Wiessner
2014-12-09 10:23                   ` Smart Weblications GmbH - Florian Wiessner
2014-12-10 21:41                   ` Julian Anastasov
2014-12-11 14:04                     ` Smart Weblications GmbH - Florian Wiessner
2014-12-11 14:04                       ` Smart Weblications GmbH - Florian Wiessner
2014-12-13 20:19                       ` Julian Anastasov
2015-01-06 12:56                         ` Jiri Slaby
2015-01-06 20:46                           ` Julian Anastasov
2014-12-05 10:53     ` Steffen Klassert
2014-12-04  9:44 ` Jiri Slaby
2014-12-04 16:40   ` Smart Weblications GmbH - Florian Wiessner
2014-12-04 16:40     ` Smart Weblications GmbH - Florian Wiessner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20141205104330.GH6390@secunet.com \
    --to=steffen.klassert@secunet.com \
    --cc=f.wiessner@smart-weblications.de \
    --cc=linux-kernel@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.