netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Patrick McHardy <kaber@trash.net>
To: Andrew Morton <akpm@osdl.org>
Cc: netdev@oss.sgi.com, "Marcin Gibu³a" <mg@iceni.pl>, jmorris@redhat.com
Subject: Re: Fw: ipsec hang
Date: Wed, 24 Nov 2004 19:10:57 +0100	[thread overview]
Message-ID: <41A4CEB1.7000001@trash.net> (raw)
In-Reply-To: <20041123173111.1b74fabb.akpm@osdl.org>

[-- Attachment #1: Type: text/plain, Size: 923 bytes --]

Andrew Morton wrote:

>Looks like one of the chains off xfrm_policy_list[] might have gone
>circular?
>
This patch fixes it. When a policy with a priority lower than an
existing policy is inserted, it loops forever on the existing policy.

Regards
Patrick

>Begin forwarded message:
>
>Date: Wed, 24 Nov 2004 01:34:49 +0100
>From: Marcin Gibu³a <mg@iceni.pl>
>To: linux-kernel@vger.kernel.org
>Subject: ipsec hang
>
>
>Hi,
>today I tried to configure ipsec on my linux workstation (with openswan) and 
>it hanged just after the init had run /etc/rc.d/init.d/ipsec start. 
>It was on linux-2.6.10-rc1-bk20, so I upgraded to 2.6.10-rc2-mm3 but it didn't 
>make any difference. 
>
>The alt-sysrq-p shows the following call trace:
>xfrm_policy_insert
>xfrm_netlink_rcv
>netlink_data_ready
>netlink_sendmsg
>sock_aio_write
>do_sync_write
>sock_map_fd
>sys_select
>vfs_write
>system_call
>


[-- Attachment #2: x --]
[-- Type: text/plain, Size: 1239 bytes --]

# This is a BitKeeper generated diff -Nru style patch.
#
# ChangeSet
#   2004/11/23 18:21:09-08:00 kaber@trash.net 
#   [XFRM]: Fix endless loop in xfrm_policy_insert
#   
#   The patch 'Fix policy update bug when increasing
#   priority of last policy' broke this, when a policy
#   with lower priority than an existing policy is inserted
#   xfrm_policy_insert loops forever.
#   
#   Signed-off-by: Patrick McHardy <kaber@trash.net>
#   Signed-off-by: David S. Miller <davem@davemloft.net>
# 
# net/xfrm/xfrm_policy.c
#   2004/11/23 18:20:49-08:00 kaber@trash.net +1 -0
#   [XFRM]: Fix endless loop in xfrm_policy_insert
#   
#   The patch 'Fix policy update bug when increasing
#   priority of last policy' broke this, when a policy
#   with lower priority than an existing policy is inserted
#   xfrm_policy_insert loops forever.
#   
#   Signed-off-by: Patrick McHardy <kaber@trash.net>
#   Signed-off-by: David S. Miller <davem@davemloft.net>
# 
diff -Nru a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c
--- a/net/xfrm/xfrm_policy.c	2004-11-24 19:01:38 +01:00
+++ b/net/xfrm/xfrm_policy.c	2004-11-24 19:01:38 +01:00
@@ -353,6 +353,7 @@
 			newpos = p;
 		if (delpol)
 			break;
+		p = &pol->next;
 	}
 	if (newpos)
 		p = newpos;

  reply	other threads:[~2004-11-24 18:10 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2004-11-24  1:31 Fw: ipsec hang Andrew Morton
2004-11-24 18:10 ` Patrick McHardy [this message]
2004-11-24 22:30   ` James Morris
2004-11-25 10:22     ` Herbert Xu
2004-11-25 12:36       ` Patrick McHardy
2004-11-29 14:16         ` Bill Crowell
2004-11-29 22:17         ` Bill Crowell
2004-11-29 23:54           ` Patrick McHardy

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=41A4CEB1.7000001@trash.net \
    --to=kaber@trash.net \
    --cc=akpm@osdl.org \
    --cc=jmorris@redhat.com \
    --cc=mg@iceni.pl \
    --cc=netdev@oss.sgi.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).