All of lore.kernel.org
 help / color / mirror / Atom feed
From: Pablo Neira Ayuso <pablo@netfilter.org>
To: "Vitaly E. Lavrov" <lve@guap.ru>
Cc: netfilter-devel@vger.kernel.org
Subject: Re: xt_recent BUG() in kernel 3.2/3.4  & patch
Date: Tue, 11 Dec 2012 02:20:17 +0100	[thread overview]
Message-ID: <20121211012017.GA15044@1984> (raw)
In-Reply-To: <50C4730D.2080401@guap.ru>

[-- Attachment #1: Type: text/plain, Size: 2857 bytes --]

On Sun, Dec 09, 2012 at 03:16:29PM +0400, Vitaly E. Lavrov wrote:
> Appears when stopping container without emptying tables (iptables
> -F/iptables -t mangle -F)
> 
> Problem: recent_mt_destroy called after __net_exit recent_net_exit() !
> 
> xt_hashlimit contains a BUG () and should be corrected similarly

I'll be really happy if we find a way to reverse the order of those
calls, so we don't need to hack xt_recent and xt_hashlimit.

Could you test this patch?

Thanks.

> Possible patch for xt_recent is below
> =============
> diff --git a/net/netfilter/xt_recent.c b/net/netfilter/xt_recent.c
> index d2ff15a..0fc5c32 100644
> --- a/net/netfilter/xt_recent.c
> +++ b/net/netfilter/xt_recent.c
> @@ -75,6 +75,9 @@ struct recent_entry {
>  struct recent_table {
>         struct list_head        list;
>         char                    name[XT_RECENT_NAME_LEN];
> +#ifdef CONFIG_PROC_FS
> +       struct proc_dir_entry   *pe;
> +#endif
>         unsigned int            refcnt;
>         unsigned int            entries;
>         struct list_head        lru_list;
> @@ -375,6 +378,7 @@ static int recent_mt_check(const struct
> xt_mtchk_param *par)
>         }
>         pde->uid = ip_list_uid;
>         pde->gid = ip_list_gid;
> +       t->pe = pde;
>  #endif
>         spin_lock_bh(&recent_lock);
>         list_add_tail(&t->list, &recent_net->tables);
> @@ -398,7 +402,8 @@ static void recent_mt_destroy(const struct
> xt_mtdtor_param *par)
>                 list_del(&t->list);
>                 spin_unlock_bh(&recent_lock);
>  #ifdef CONFIG_PROC_FS
> -               remove_proc_entry(t->name, recent_net->xt_recent);
> +               if(t->pe)
> +                       remove_proc_entry(t->name, recent_net->xt_recent);
>  #endif
>                 recent_table_flush(t);
>                 kfree(t);
> @@ -607,7 +612,19 @@ static void __net_exit recent_net_exit(struct net *net)
>  {
>         struct recent_net *recent_net = recent_pernet(net);
> 
> -       BUG_ON(!list_empty(&recent_net->tables));
> +       if(!list_empty(&recent_net->tables)) {
> +#ifdef CONFIG_PROC_FS
> +               struct recent_table *t;
> +               spin_lock_bh(&recent_lock);
> +               list_for_each_entry(t, &recent_net->tables, list) {
> +                       t->pe = NULL;
> +                       remove_proc_entry(t->name, recent_net->xt_recent);
> +               }
> +               spin_unlock_bh(&recent_lock);
> +#endif
> +               printk(KERN_INFO "%s net %x: Warning! Tables not empty!\n",
> +                               __func__,(u32)net);
> +       }
>         recent_proc_net_exit(net);
>  }
> ==================
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

[-- Attachment #2: x --]
[-- Type: text/plain, Size: 1152 bytes --]

diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c
index 17c5e06..532ae92 100644
--- a/net/ipv4/netfilter/ip_tables.c
+++ b/net/ipv4/netfilter/ip_tables.c
@@ -2266,5 +2266,5 @@ static void __exit ip_tables_fini(void)
 EXPORT_SYMBOL(ipt_register_table);
 EXPORT_SYMBOL(ipt_unregister_table);
 EXPORT_SYMBOL(ipt_do_table);
-module_init(ip_tables_init);
+core_initcall(ip_tables_init);
 module_exit(ip_tables_fini);
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c
index 125a90d..5dc3c7e 100644
--- a/net/ipv6/netfilter/ip6_tables.c
+++ b/net/ipv6/netfilter/ip6_tables.c
@@ -2275,5 +2275,5 @@ EXPORT_SYMBOL(ip6t_register_table);
 EXPORT_SYMBOL(ip6t_unregister_table);
 EXPORT_SYMBOL(ip6t_do_table);
 
-module_init(ip6_tables_init);
+core_initcall(ip6_tables_init);
 module_exit(ip6_tables_fini);
diff --git a/net/netfilter/x_tables.c b/net/netfilter/x_tables.c
index 8d987c3..afcea11 100644
--- a/net/netfilter/x_tables.c
+++ b/net/netfilter/x_tables.c
@@ -1390,6 +1390,6 @@ static void __exit xt_fini(void)
 	kfree(xt);
 }
 
-module_init(xt_init);
+core_initcall(xt_init);
 module_exit(xt_fini);
 

      reply	other threads:[~2012-12-11  1:20 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-12-09 11:16 xt_recent BUG() in kernel 3.2/3.4 & patch Vitaly E. Lavrov
2012-12-11  1:20 ` Pablo Neira Ayuso [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20121211012017.GA15044@1984 \
    --to=pablo@netfilter.org \
    --cc=lve@guap.ru \
    --cc=netfilter-devel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.