Cc Jamal, he introduced the xfrm_mark framework and knows it probably the best.
On Sat, Feb 02, 2013 at 06:27:03PM +0100, Romain KUNTZ wrote: > The current algorithm to insert XFRM policies with a mark and a mask > allows the insertion of more generic policies, but fails when trying > to install more specific policies. > Hm, I think we will not match always the right policy if we allow both orders. Lets take your example and assume we have a flow with mark 1. The policy lookup is a linear search, so we use the first matching policy. xfrm_policy_match() does the following check on the mark: if (... || (fl->flowi_mark & pol->mark.m) != pol->mark.v || ...) return -ESRCH > For example, executing the below commands in that order succeed: > ip -6 xfrm policy flush > ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out mark 1 mask > 0xffffffff > ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out The policy with mark 1 is the first we find. The policy passes the mark check and if the flow matches the selectors, we use this policy. > > But it fails in the reverse order: > ip -6 xfrm policy flush > ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out > ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir out mark 1 mask > 0xffffffff > RTNETLINK answers: File exists With this scenario, we would find the policy with mark and mask 0 first. This policy passes the mark check too. So we would use this policy if the flow matches the selectors, but the flow asked for a policy with mark 1. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/