netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "Nishit Shah" <nishit@elitecore.com>
To: "Yasuyuki KOZAKAI" <yasuyuki.kozakai@toshiba.co.jp>
Cc: netfilter-devel@lists.netfilter.org
Subject: Re: rmmod ip_conntrack hangs.....
Date: Thu, 26 Apr 2007 17:46:56 +0530	[thread overview]
Message-ID: <08c701c787fc$c874e1c0$4c01a8c0@elitecore26> (raw)
In-Reply-To: 200704261105.l3QB59NB010836@toshiba.co.jp

Thanks very much.

Regards,
Nishit Shah.

----- Original Message ----- 
From: "Yasuyuki KOZAKAI" <yasuyuki.kozakai@toshiba.co.jp>
To: <nishit@elitecore.com>
Cc: <netfilter-devel@lists.netfilter.org>
Sent: Thursday, April 26, 2007 4:35 PM
Subject: Re: rmmod ip_conntrack hangs.....


> From: "Nishit Shah" <nishit@elitecore.com>
> Date: Wed, 25 Apr 2007 12:30:09 +0530
>
> > Hi,
> >         when I do rmmod ip_conntrack, rmmod hangs. It is not the case
> > everytime but sometimes "rmmod ip_conntrack" hangs.
>
> It has been already fixed by following patch, which is available in
2.6.21,
> I think.
>
> commit ec68e97dedacc1c7fb20a4b23b7fa76bee56b5ff
> Author: Patrick McHardy <kaber@trash.net>
> Date:   Sun Mar 4 15:57:01 2007 -0800
>
>     [NETFILTER]: conntrack: fix {nf,ip}_ct_iterate_cleanup endless loops
>
>     Fix {nf,ip}_ct_iterate_cleanup unconfirmed list handling:
>
>     - unconfirmed entries can not be killed manually, they are removed on
>       confirmation or final destruction of the conntrack entry, which
means
>       we might iterate forever without making forward progress.
>
>       This can happen in combination with the conntrack event cache, which
>       holds a reference to the conntrack entry, which is only released
when
>       the packet makes it all the way through the stack or a different
>       packet is handled.
>
>     - taking references to an unconfirmed entry and using it outside the
>       locked section doesn't work, the list entries are not refcounted and
>       another CPU might already be waiting to destroy the entry
>
>     What the code really wants to do is make sure the references of the
hash
>     table to the selected conntrack entries are released, so they will be
>     destroyed once all references from skbs and the event cache are
dropped.
>
>     Since unconfirmed entries haven't even entered the hash yet, simply
mark
>     them as dying and skip confirmation based on that.
>
>     Reported and tested by Chuck Ebbert <cebbert@redhat.com>
>
>     Signed-off-by: Patrick McHardy <kaber@trash.net>
>     Signed-off-by: David S. Miller <davem@davemloft.net>
>
> diff --git a/include/linux/netfilter_ipv4/ip_conntrack_core.h
b/include/linux/netfilter_ipv4/ip_conntrack_core.h
> index 907d4f5..e3a6df0 100644
> --- a/include/linux/netfilter_ipv4/ip_conntrack_core.h
> +++ b/include/linux/netfilter_ipv4/ip_conntrack_core.h
> @@ -45,7 +45,7 @@ static inline int ip_conntrack_confirm(struct sk_buff
**pskb)
>   int ret = NF_ACCEPT;
>
>   if (ct) {
> - if (!is_confirmed(ct))
> + if (!is_confirmed(ct) && !is_dying(ct))
>   ret = __ip_conntrack_confirm(pskb);
>   ip_ct_deliver_cached_events(ct);
>   }
> diff --git a/include/net/netfilter/nf_conntrack_core.h
b/include/net/netfilter/nf_conntrack_core.h
> index 7fdc72c..85634e1 100644
> --- a/include/net/netfilter/nf_conntrack_core.h
> +++ b/include/net/netfilter/nf_conntrack_core.h
> @@ -64,7 +64,7 @@ static inline int nf_conntrack_confirm(struct sk_buff
**pskb)
>   int ret = NF_ACCEPT;
>
>   if (ct) {
> - if (!nf_ct_is_confirmed(ct))
> + if (!nf_ct_is_confirmed(ct) && !nf_ct_is_dying(ct))
>   ret = __nf_conntrack_confirm(pskb);
>   nf_ct_deliver_cached_events(ct);
>   }
> diff --git a/net/ipv4/netfilter/ip_conntrack_core.c
b/net/ipv4/netfilter/ip_conntrack_core.c
> index 07ba1dd..23b99ae 100644
> --- a/net/ipv4/netfilter/ip_conntrack_core.c
> +++ b/net/ipv4/netfilter/ip_conntrack_core.c
> @@ -1254,7 +1254,7 @@ get_next_corpse(int (*iter)(struct ip_conntrack *i,
void *data),
>   list_for_each_entry(h, &unconfirmed, list) {
>   ct = tuplehash_to_ctrack(h);
>   if (iter(ct, data))
> - goto found;
> + set_bit(IPS_DYING_BIT, &ct->status);
>   }
>   write_unlock_bh(&ip_conntrack_lock);
>   return NULL;
> diff --git a/net/netfilter/nf_conntrack_core.c
b/net/netfilter/nf_conntrack_core.c
> index 32891eb..4fdf484 100644
> --- a/net/netfilter/nf_conntrack_core.c
> +++ b/net/netfilter/nf_conntrack_core.c
> @@ -1070,7 +1070,7 @@ get_next_corpse(int (*iter)(struct nf_conn *i, void
*data),
>   list_for_each_entry(h, &unconfirmed, list) {
>   ct = nf_ct_tuplehash_to_ctrack(h);
>   if (iter(ct, data))
> - goto found;
> + set_bit(IPS_DYING_BIT, &ct->status);
>   }
>   write_unlock_bh(&nf_conntrack_lock);
>   return NULL;
>
>

  parent reply	other threads:[~2007-04-26 12:16 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-04-25  7:00 rmmod ip_conntrack hangs Nishit Shah
2007-04-25 14:18 ` Phil Oester
2007-04-26  5:45   ` Nishit Shah
2007-04-26 11:05 ` Yasuyuki KOZAKAI
     [not found] ` <200704261105.l3QB59NB010836@toshiba.co.jp>
2007-04-26 12:16   ` Nishit Shah [this message]
2007-04-26 16:17     ` Patrick McHardy
2007-04-27  5:56       ` Nishit Shah
     [not found]       ` <048501c80812$0d372350$4c01a8c0@elitecore.com>
2007-10-08  4:30         ` Patrick McHardy
2007-10-10 19:15           ` nishit
2007-10-11  5:16             ` Patrick McHardy
2007-10-12 15:02               ` Nishit Shah
  -- strict thread matches above, loose matches on Subject: below --
2007-10-23 12:30 Nishit Shah

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='08c701c787fc$c874e1c0$4c01a8c0@elitecore26' \
    --to=nishit@elitecore.com \
    --cc=netfilter-devel@lists.netfilter.org \
    --cc=yasuyuki.kozakai@toshiba.co.jp \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).