netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: [PATCH] Fix repeatable Oops on container destroy with conntrack
       [not found]               ` <A51A04647674405AF6C39A4F@nimrod.local>
@ 2011-09-28 21:08                 ` Pablo Neira Ayuso
  2011-09-30 15:54                   ` Alex Bligh
  0 siblings, 1 reply; 2+ messages in thread
From: Pablo Neira Ayuso @ 2011-09-28 21:08 UTC (permalink / raw)
  To: Alex Bligh
  Cc: Alexey Dobriyan, netfilter-devel, linux-kernel, containers,
	Linux Containers, netdev

On Wed, Sep 14, 2011 at 09:01:34AM +0100, Alex Bligh wrote:
> --On 14 September 2011 03:35:00 +0200 Pablo Neira Ayuso
> <pablo@netfilter.org> wrote:
> 
> >>Is this new version OK? I am happy to adjust if not.
> >
> >Hm, I still think that this is a workaround.
> 
> It is a bit of a workaround, that is true. But it is a workaround
> that will fix the bug in every kernel since 2.6.32 (and perhaps
> before - I haven't looked). It's thus reasonably easily applicable
> to stable kernel series.

The container support for netfilter seems to be in intermediate state,
we need several patches to get it finished that:

* subsys_table definition in nfnetlink.c.
* ctnl_notifier and ctnl_notifier_exp definitions in
  nfnetlink_conntrack.c
* similar things for nfnetlink_queue and nfnetlink_log.

If nobody is going to fix all these, I'll find some spare time to do
it myself, but I don't think we'll have a proper fix that we can pass
to -stable. This will have to go to net-next, given the amount of
patches that we'll need to appropriately fix this.

> I'm not clued-up enough on Netfilter to know what the right fix is,
> but is applying the workaround in a commit which could be easily
> backported, then applying the 'right fix' (assuming that is different)
> a reasonable strategy?
> 
> As you can probably tell, my interest here is to get something that
> doesn't oops into stable kernels.

As said, I'm not sure that this can happen, given that the amount of
patches that we need to fix it fine, sorry.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [PATCH] Fix repeatable Oops on container destroy with conntrack
  2011-09-28 21:08                 ` [PATCH] Fix repeatable Oops on container destroy with conntrack Pablo Neira Ayuso
@ 2011-09-30 15:54                   ` Alex Bligh
  0 siblings, 0 replies; 2+ messages in thread
From: Alex Bligh @ 2011-09-30 15:54 UTC (permalink / raw)
  To: Pablo Neira Ayuso
  Cc: Alexey Dobriyan, netfilter-devel, linux-kernel, containers,
	Linux Containers, netdev, Alex Bligh



--On 28 September 2011 23:08:51 +0200 Pablo Neira Ayuso 
<pablo@netfilter.org> wrote:

>> As you can probably tell, my interest here is to get something that
>> doesn't oops into stable kernels.
>
> As said, I'm not sure that this can happen, given that the amount of
> patches that we need to fix it fine, sorry.

This is why I was suggesting the 2 line "don't oops" patch in the
interim.

-- 
Alex Bligh

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2011-09-30 15:54 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <2184C0CE5A5EDC94CDDA5053@Ximines.local>
     [not found] ` <20110912072524.GA2996@p183.telecom.by>
     [not found]   ` <20110912093749.GE2194@1984>
     [not found]     ` <E0902A9541FD5D118EA02B31@Ximines.local>
     [not found]       ` <20110912183357.GC3641@1984>
     [not found]         ` <87A32B21CA99D62CE1AB7A4B@Ximines.local>
     [not found]           ` <7631498AC7E7C0EAD641AC7D@nimrod.local>
     [not found]             ` <20110914013500.GB17051@1984>
     [not found]               ` <A51A04647674405AF6C39A4F@nimrod.local>
2011-09-28 21:08                 ` [PATCH] Fix repeatable Oops on container destroy with conntrack Pablo Neira Ayuso
2011-09-30 15:54                   ` Alex Bligh

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).