From: "Nishit Shah" <nishit@elitecore.com>
To: "Yasuyuki KOZAKAI" <yasuyuki.kozakai@toshiba.co.jp>
Cc: netfilter-devel@lists.netfilter.org
Subject: Re: rmmod ip_conntrack hangs.....
Date: Thu, 26 Apr 2007 17:46:56 +0530 [thread overview]
Message-ID: <08c701c787fc$c874e1c0$4c01a8c0@elitecore26> (raw)
In-Reply-To: 200704261105.l3QB59NB010836@toshiba.co.jp
Thanks very much.
Regards,
Nishit Shah.
----- Original Message -----
From: "Yasuyuki KOZAKAI" <yasuyuki.kozakai@toshiba.co.jp>
To: <nishit@elitecore.com>
Cc: <netfilter-devel@lists.netfilter.org>
Sent: Thursday, April 26, 2007 4:35 PM
Subject: Re: rmmod ip_conntrack hangs.....
> From: "Nishit Shah" <nishit@elitecore.com>
> Date: Wed, 25 Apr 2007 12:30:09 +0530
>
> > Hi,
> > when I do rmmod ip_conntrack, rmmod hangs. It is not the case
> > everytime but sometimes "rmmod ip_conntrack" hangs.
>
> It has been already fixed by following patch, which is available in
2.6.21,
> I think.
>
> commit ec68e97dedacc1c7fb20a4b23b7fa76bee56b5ff
> Author: Patrick McHardy <kaber@trash.net>
> Date: Sun Mar 4 15:57:01 2007 -0800
>
> [NETFILTER]: conntrack: fix {nf,ip}_ct_iterate_cleanup endless loops
>
> Fix {nf,ip}_ct_iterate_cleanup unconfirmed list handling:
>
> - unconfirmed entries can not be killed manually, they are removed on
> confirmation or final destruction of the conntrack entry, which
means
> we might iterate forever without making forward progress.
>
> This can happen in combination with the conntrack event cache, which
> holds a reference to the conntrack entry, which is only released
when
> the packet makes it all the way through the stack or a different
> packet is handled.
>
> - taking references to an unconfirmed entry and using it outside the
> locked section doesn't work, the list entries are not refcounted and
> another CPU might already be waiting to destroy the entry
>
> What the code really wants to do is make sure the references of the
hash
> table to the selected conntrack entries are released, so they will be
> destroyed once all references from skbs and the event cache are
dropped.
>
> Since unconfirmed entries haven't even entered the hash yet, simply
mark
> them as dying and skip confirmation based on that.
>
> Reported and tested by Chuck Ebbert <cebbert@redhat.com>
>
> Signed-off-by: Patrick McHardy <kaber@trash.net>
> Signed-off-by: David S. Miller <davem@davemloft.net>
>
> diff --git a/include/linux/netfilter_ipv4/ip_conntrack_core.h
b/include/linux/netfilter_ipv4/ip_conntrack_core.h
> index 907d4f5..e3a6df0 100644
> --- a/include/linux/netfilter_ipv4/ip_conntrack_core.h
> +++ b/include/linux/netfilter_ipv4/ip_conntrack_core.h
> @@ -45,7 +45,7 @@ static inline int ip_conntrack_confirm(struct sk_buff
**pskb)
> int ret = NF_ACCEPT;
>
> if (ct) {
> - if (!is_confirmed(ct))
> + if (!is_confirmed(ct) && !is_dying(ct))
> ret = __ip_conntrack_confirm(pskb);
> ip_ct_deliver_cached_events(ct);
> }
> diff --git a/include/net/netfilter/nf_conntrack_core.h
b/include/net/netfilter/nf_conntrack_core.h
> index 7fdc72c..85634e1 100644
> --- a/include/net/netfilter/nf_conntrack_core.h
> +++ b/include/net/netfilter/nf_conntrack_core.h
> @@ -64,7 +64,7 @@ static inline int nf_conntrack_confirm(struct sk_buff
**pskb)
> int ret = NF_ACCEPT;
>
> if (ct) {
> - if (!nf_ct_is_confirmed(ct))
> + if (!nf_ct_is_confirmed(ct) && !nf_ct_is_dying(ct))
> ret = __nf_conntrack_confirm(pskb);
> nf_ct_deliver_cached_events(ct);
> }
> diff --git a/net/ipv4/netfilter/ip_conntrack_core.c
b/net/ipv4/netfilter/ip_conntrack_core.c
> index 07ba1dd..23b99ae 100644
> --- a/net/ipv4/netfilter/ip_conntrack_core.c
> +++ b/net/ipv4/netfilter/ip_conntrack_core.c
> @@ -1254,7 +1254,7 @@ get_next_corpse(int (*iter)(struct ip_conntrack *i,
void *data),
> list_for_each_entry(h, &unconfirmed, list) {
> ct = tuplehash_to_ctrack(h);
> if (iter(ct, data))
> - goto found;
> + set_bit(IPS_DYING_BIT, &ct->status);
> }
> write_unlock_bh(&ip_conntrack_lock);
> return NULL;
> diff --git a/net/netfilter/nf_conntrack_core.c
b/net/netfilter/nf_conntrack_core.c
> index 32891eb..4fdf484 100644
> --- a/net/netfilter/nf_conntrack_core.c
> +++ b/net/netfilter/nf_conntrack_core.c
> @@ -1070,7 +1070,7 @@ get_next_corpse(int (*iter)(struct nf_conn *i, void
*data),
> list_for_each_entry(h, &unconfirmed, list) {
> ct = nf_ct_tuplehash_to_ctrack(h);
> if (iter(ct, data))
> - goto found;
> + set_bit(IPS_DYING_BIT, &ct->status);
> }
> write_unlock_bh(&nf_conntrack_lock);
> return NULL;
>
>
next prev parent reply other threads:[~2007-04-26 12:16 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-04-25 7:00 rmmod ip_conntrack hangs Nishit Shah
2007-04-25 14:18 ` Phil Oester
2007-04-26 5:45 ` Nishit Shah
2007-04-26 11:05 ` Yasuyuki KOZAKAI
[not found] ` <200704261105.l3QB59NB010836@toshiba.co.jp>
2007-04-26 12:16 ` Nishit Shah [this message]
2007-04-26 16:17 ` Patrick McHardy
2007-04-27 5:56 ` Nishit Shah
[not found] ` <048501c80812$0d372350$4c01a8c0@elitecore.com>
2007-10-08 4:30 ` Patrick McHardy
2007-10-10 19:15 ` nishit
2007-10-11 5:16 ` Patrick McHardy
2007-10-12 15:02 ` Nishit Shah
-- strict thread matches above, loose matches on Subject: below --
2007-10-23 12:30 Nishit Shah
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='08c701c787fc$c874e1c0$4c01a8c0@elitecore26' \
--to=nishit@elitecore.com \
--cc=netfilter-devel@lists.netfilter.org \
--cc=yasuyuki.kozakai@toshiba.co.jp \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).