From: Patrick McHardy <kaber@trash.net>
To: "David S. Miller" <davem@davemloft.net>
Cc: dlstevens@us.ibm.com, davem@redhat.com, laforge@netfilter.org,
netdev@oss.sgi.com, netdev-bounce@oss.sgi.com,
netfilter-devel@lists.netfilter.org, okir@suse.de
Subject: Re: [PATCH] Prevent crash on ip_conntrack removal
Date: Mon, 30 Aug 2004 02:50:10 +0200 [thread overview]
Message-ID: <413279C2.8020400@trash.net> (raw)
In-Reply-To: <20040829163821.2a4239df.davem@davemloft.net>
[-- Attachment #1: Type: text/plain, Size: 751 bytes --]
David S. Miller wrote:
>On Sun, 29 Aug 2004 23:58:06 +0200
>Patrick McHardy <kaber@trash.net> wrote:
>
>
>>Before I post the patch, 2.4 seems to be
>>missing this patch, do you already have it queued or should I send
>>a 2.4 version first ?
>>
>>ChangeSet@1.1853, 2004-08-18 14:28:05-07:00, davem@nuts.davemloft.net
>> [IPV4]: Fix theoretical loop on SMP in ip_evictor().
>>
>>
>
>I pushed this off to Marcelo, he just didn't pull from my
>tree yet, which is at:
>
> bk://kernel.bkbits.net/davem/net-2.4
>
>Where you'll find those fixes as:
>
>ChangeSet@1.1498.1.2, 2004-08-18 14:26:09-07:00, davem@nuts.davemloft.net
> [IPV4]: Fix theoretical loop on SMP in ip_evictor().
>
>
Great, here is the patch for 2.4 for the conntrack problem.
[-- Attachment #2: x --]
[-- Type: text/plain, Size: 4797 bytes --]
# This is a BitKeeper generated diff -Nru style patch.
#
# ChangeSet
# 2004/08/30 02:22:35+02:00 kaber@coreworks.de
# [NETFILTER]: Flush fragment queue on conntrack unload
#
# Based on patch from Olaf Kirch <okir@suse.de>
#
# Signed-off-by: Patrick McHardy <kaber@trash.net>
#
# net/netsyms.c
# 2004/08/30 02:22:30+02:00 kaber@coreworks.de +1 -0
# [NETFILTER]: Flush fragment queue on conntrack unload
#
# net/ipv4/netfilter/ip_conntrack_standalone.c
# 2004/08/30 02:22:30+02:00 kaber@coreworks.de +7 -0
# [NETFILTER]: Flush fragment queue on conntrack unload
#
# net/ipv4/netfilter/ip_conntrack_core.c
# 2004/08/30 02:22:30+02:00 kaber@coreworks.de +8 -0
# [NETFILTER]: Flush fragment queue on conntrack unload
#
# net/ipv4/ip_fragment.c
# 2004/08/30 02:22:30+02:00 kaber@coreworks.de +13 -3
# [NETFILTER]: Flush fragment queue on conntrack unload
#
# include/net/ip.h
# 2004/08/30 02:22:30+02:00 kaber@coreworks.de +1 -0
# [NETFILTER]: Flush fragment queue on conntrack unload
#
# include/linux/netfilter_ipv4/ip_conntrack.h
# 2004/08/30 02:22:30+02:00 kaber@coreworks.de +1 -0
# [NETFILTER]: Flush fragment queue on conntrack unload
#
diff -Nru a/include/linux/netfilter_ipv4/ip_conntrack.h b/include/linux/netfilter_ipv4/ip_conntrack.h
--- a/include/linux/netfilter_ipv4/ip_conntrack.h 2004-08-30 02:24:47 +02:00
+++ b/include/linux/netfilter_ipv4/ip_conntrack.h 2004-08-30 02:24:47 +02:00
@@ -249,6 +249,7 @@
/* Call me when a conntrack is destroyed. */
extern void (*ip_conntrack_destroyed)(struct ip_conntrack *conntrack);
+extern int ip_ct_no_defrag;
/* Returns new sk_buff, or NULL */
struct sk_buff *
ip_ct_gather_frags(struct sk_buff *skb);
diff -Nru a/include/net/ip.h b/include/net/ip.h
--- a/include/net/ip.h 2004-08-30 02:24:47 +02:00
+++ b/include/net/ip.h 2004-08-30 02:24:47 +02:00
@@ -228,6 +228,7 @@
*/
struct sk_buff *ip_defrag(struct sk_buff *skb);
+extern void ipfrag_flush(void);
extern int ip_frag_nqueues;
extern atomic_t ip_frag_mem;
diff -Nru a/net/ipv4/ip_fragment.c b/net/ipv4/ip_fragment.c
--- a/net/ipv4/ip_fragment.c 2004-08-30 02:24:47 +02:00
+++ b/net/ipv4/ip_fragment.c 2004-08-30 02:24:47 +02:00
@@ -240,15 +240,15 @@
}
/* Memory limiting on fragments. Evictor trashes the oldest
- * fragment queue until we are back under the low threshold.
+ * fragment queue until we are back under the threshold.
*/
-static void ip_evictor(void)
+static void __ip_evictor(int threshold)
{
struct ipq *qp;
struct list_head *tmp;
int work;
- work = atomic_read(&ip_frag_mem) - sysctl_ipfrag_low_thresh;
+ work = atomic_read(&ip_frag_mem) - threshold;
if (work <= 0)
return;
@@ -273,6 +273,11 @@
}
}
+static inline void ip_evictor(void)
+{
+ __ip_evictor(sysctl_ipfrag_low_thresh);
+}
+
/*
* Oops, a fragment queue timed out. Kill it and send an ICMP reply.
*/
@@ -681,4 +686,9 @@
ipfrag_secret_timer.function = ipfrag_secret_rebuild;
ipfrag_secret_timer.expires = jiffies + sysctl_ipfrag_secret_interval;
add_timer(&ipfrag_secret_timer);
+}
+
+void ipfrag_flush(void)
+{
+ __ip_evictor(0);
}
diff -Nru a/net/ipv4/netfilter/ip_conntrack_core.c b/net/ipv4/netfilter/ip_conntrack_core.c
--- a/net/ipv4/netfilter/ip_conntrack_core.c 2004-08-30 02:24:47 +02:00
+++ b/net/ipv4/netfilter/ip_conntrack_core.c 2004-08-30 02:24:47 +02:00
@@ -1183,6 +1183,8 @@
WRITE_UNLOCK(&ip_conntrack_lock);
}
+int ip_ct_no_defrag;
+
/* Returns new sk_buff, or NULL */
struct sk_buff *
ip_ct_gather_frags(struct sk_buff *skb)
@@ -1191,6 +1193,12 @@
#ifdef CONFIG_NETFILTER_DEBUG
unsigned int olddebug = skb->nf_debug;
#endif
+
+ if (unlikely(ip_ct_no_defrag)) {
+ kfree_skb(skb);
+ return NULL;
+ }
+
if (sk) {
sock_hold(sk);
skb_orphan(skb);
diff -Nru a/net/ipv4/netfilter/ip_conntrack_standalone.c b/net/ipv4/netfilter/ip_conntrack_standalone.c
--- a/net/ipv4/netfilter/ip_conntrack_standalone.c 2004-08-30 02:24:47 +02:00
+++ b/net/ipv4/netfilter/ip_conntrack_standalone.c 2004-08-30 02:24:47 +02:00
@@ -393,6 +393,13 @@
cleanup_inandlocalops:
nf_unregister_hook(&ip_conntrack_local_out_ops);
cleanup_inops:
+ /* Frag queues may hold fragments with skb->dst == NULL */
+ ip_ct_no_defrag = 1;
+ local_bh_disable();
+ br_write_lock(BR_NETPROTO_LOCK);
+ br_write_unlock(BR_NETPROTO_LOCK);
+ ipfrag_flush();
+ local_bh_enable();
nf_unregister_hook(&ip_conntrack_in_ops);
cleanup_proc:
proc_net_remove("ip_conntrack");
diff -Nru a/net/netsyms.c b/net/netsyms.c
--- a/net/netsyms.c 2004-08-30 02:24:47 +02:00
+++ b/net/netsyms.c 2004-08-30 02:24:47 +02:00
@@ -283,6 +283,7 @@
EXPORT_SYMBOL(inetdev_by_index);
EXPORT_SYMBOL(in_dev_finish_destroy);
EXPORT_SYMBOL(ip_defrag);
+EXPORT_SYMBOL(ipfrag_flush);
/* Route manipulation */
EXPORT_SYMBOL(ip_rt_ioctl);
next prev parent reply other threads:[~2004-08-30 0:50 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-08-18 9:13 [PATCH] Prevent crash on ip_conntrack removal Olaf Kirch
2004-08-19 10:11 ` Harald Welte
2004-08-19 14:18 ` David S. Miller
2004-08-19 14:55 ` Patrick McHardy
2004-08-19 15:14 ` David S. Miller
2004-08-21 15:10 ` Patrick McHardy
2004-08-22 5:13 ` David S. Miller
2004-08-22 12:58 ` Patrick McHardy
2004-08-23 5:03 ` David S. Miller
2004-08-23 21:18 ` David Stevens
2004-08-24 0:45 ` Nivedita Singhvi
2004-08-24 0:45 ` Patrick McHardy
2004-08-24 21:28 ` David Stevens
2004-08-29 6:15 ` David S. Miller
2004-08-29 19:36 ` Patrick McHardy
2004-08-29 19:57 ` David S. Miller
2004-08-29 20:06 ` Patrick McHardy
2004-08-29 21:58 ` Patrick McHardy
2004-08-29 23:38 ` David S. Miller
2004-08-30 0:50 ` Patrick McHardy [this message]
2004-08-30 4:28 ` David S. Miller
2004-08-29 21:48 ` Patrick McHardy
2004-08-30 7:57 ` Olaf Kirch
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=413279C2.8020400@trash.net \
--to=kaber@trash.net \
--cc=davem@davemloft.net \
--cc=davem@redhat.com \
--cc=dlstevens@us.ibm.com \
--cc=laforge@netfilter.org \
--cc=netdev-bounce@oss.sgi.com \
--cc=netdev@oss.sgi.com \
--cc=netfilter-devel@lists.netfilter.org \
--cc=okir@suse.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.