* [PATCH] build: add and use a symbol version map
@ 2014-11-12 13:06 Jan Engelhardt
2014-11-19 13:42 ` Pablo Neira Ayuso
0 siblings, 1 reply; 3+ messages in thread
From: Jan Engelhardt @ 2014-11-12 13:06 UTC (permalink / raw)
To: pablo; +Cc: netfilter-devel
It was possible to combine e.g. conntrackd-1.2.1 with
libnetfilter_conntrack-0.0.101, causing libc to issue an exit from
within conntrackd iff such a conntrackd was promoted to a master and
tried to call nfexp_send, due to lazy symbol resolution in libc.
Symbol versions enforce the checks at program startup, so add one.
$ ldd -r /usr/sbin/conntrackd
undefined symbol: nfexp_cmp (/usr/sbin/conntrackd)
undefined symbol: nfexp_send (/usr/sbin/conntrackd)
libnetfilter_conntrack.so.3 => /usr/lib/libnetfilter_conntrack.so.3 (0x77fe7000)
libnfnetlink.so.0 => /usr/lib/libnfnetlink.so.0 (0x77fdf000)
libc.so.6 => /lib/libc.so.6 (0x77e7b000)
libdl.so.2 => /lib/libdl.so.2 (0x77e76000)
/lib/ld.so.1 (0x55555000)
$ dpkg-query -W conntrackd libnetfilter-conntrack3
conntrackd 1:1.2.1-1
libnetfilter-conntrack3 0.0.101-1
Signed-off-by: Jan Engelhardt <jengelh@inai.de>
---
src/Makefile.am | 4 +-
src/libnetfilter_conntrack.map | 109 +++++++++++++++++++++++++++++++++++++++++
2 files changed, 112 insertions(+), 1 deletion(-)
create mode 100644 src/libnetfilter_conntrack.map
diff --git a/src/Makefile.am b/src/Makefile.am
index 7d6c905..918c2ba 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -12,5 +12,7 @@ libnetfilter_conntrack_la_LIBADD = conntrack/libnfconntrack.la \
expect/libnfexpect.la \
${LIBNFNETLINK_LIBS} ${LIBMNL_LIBS}
libnetfilter_conntrack_la_LDFLAGS = -Wc,-nostartfiles -lnfnetlink -ldl \
- -version-info $(LIBVERSION)
+ -version-info $(LIBVERSION) \
+ -Wl,--version-script=$(srcdir)/libnetfilter_conntrack.map
libnetfilter_conntrack_la_SOURCES = main.c callback.c
+libnetfilter_conntrack_la_DEPENDENCIES = libnetfilter_conntrack.map
diff --git a/src/libnetfilter_conntrack.map b/src/libnetfilter_conntrack.map
new file mode 100644
index 0000000..c6404d5
--- /dev/null
+++ b/src/libnetfilter_conntrack.map
@@ -0,0 +1,109 @@
+V_1.0.5 {
+global:
+ nfct_attr_grp_is_set;
+ nfct_attr_grp_unset;
+ nfct_attr_is_set;
+ nfct_attr_is_set_array;
+ nfct_attr_unset;
+ nfct_bitmask_clear;
+ nfct_bitmask_clone;
+ nfct_bitmask_destroy;
+ nfct_bitmask_equal;
+ nfct_bitmask_maxbit;
+ nfct_bitmask_new;
+ nfct_bitmask_set_bit;
+ nfct_bitmask_test_bit;
+ nfct_bitmask_unset_bit;
+ nfct_build_conntrack;
+ nfct_build_query;
+ nfct_build_tuple;
+ nfct_callback_register;
+ nfct_callback_register2;
+ nfct_callback_unregister;
+ nfct_callback_unregister2;
+ nfct_catch;
+ nfct_clone;
+ nfct_close;
+ nfct_cmp;
+ nfct_compare;
+ nfct_copy;
+ nfct_copy_attr;
+ nfct_destroy;
+ nfct_fd;
+ nfct_filter_add_attr;
+ nfct_filter_add_attr_u32;
+ nfct_filter_attach;
+ nfct_filter_create;
+ nfct_filter_destroy;
+ nfct_filter_detach;
+ nfct_filter_dump_create;
+ nfct_filter_dump_destroy;
+ nfct_filter_dump_set_attr;
+ nfct_filter_dump_set_attr_u8;
+ nfct_filter_set_logic;
+ nfct_get_attr;
+ nfct_get_attr_grp;
+ nfct_get_attr_u16;
+ nfct_get_attr_u32;
+ nfct_get_attr_u64;
+ nfct_get_attr_u8;
+ nfct_getobjopt;
+ nfct_labelmap_destroy;
+ nfct_labelmap_get_bit;
+ nfct_labelmap_get_name;
+ nfct_labelmap_new;
+ nfct_maxsize;
+ nfct_new;
+ nfct_nfnlh;
+ nfct_nlmsg_build;
+ nfct_nlmsg_parse;
+ nfct_open;
+ nfct_open_nfnl;
+ nfct_parse_conntrack;
+ nfct_parse_tuple;
+ nfct_payload_parse;
+ nfct_query;
+ nfct_send;
+ nfct_set_attr;
+ nfct_set_attr_grp;
+ nfct_set_attr_l;
+ nfct_set_attr_u16;
+ nfct_set_attr_u32;
+ nfct_set_attr_u64;
+ nfct_set_attr_u8;
+ nfct_setobjopt;
+ nfct_sizeof;
+ nfct_snprintf;
+ nfct_snprintf_labels;
+ nfexp_attr_is_set;
+ nfexp_attr_unset;
+ nfexp_build_expect;
+ nfexp_build_query;
+ nfexp_callback_register;
+ nfexp_callback_register2;
+ nfexp_callback_unregister;
+ nfexp_callback_unregister2;
+ nfexp_catch;
+ nfexp_clone;
+ nfexp_cmp;
+ nfexp_destroy;
+ nfexp_get_attr;
+ nfexp_get_attr_u16;
+ nfexp_get_attr_u32;
+ nfexp_get_attr_u8;
+ nfexp_maxsize;
+ nfexp_new;
+ nfexp_nlmsg_build;
+ nfexp_nlmsg_parse;
+ nfexp_parse_expect;
+ nfexp_query;
+ nfexp_send;
+ nfexp_set_attr;
+ nfexp_set_attr_u16;
+ nfexp_set_attr_u32;
+ nfexp_set_attr_u8;
+ nfexp_sizeof;
+ nfexp_snprintf;
+local:
+ *;
+};
--
2.1.2
^ permalink raw reply related [flat|nested] 3+ messages in thread* Re: [PATCH] build: add and use a symbol version map
2014-11-12 13:06 [PATCH] build: add and use a symbol version map Jan Engelhardt
@ 2014-11-19 13:42 ` Pablo Neira Ayuso
2014-11-19 15:56 ` Jan Engelhardt
0 siblings, 1 reply; 3+ messages in thread
From: Pablo Neira Ayuso @ 2014-11-19 13:42 UTC (permalink / raw)
To: Jan Engelhardt; +Cc: netfilter-devel
On Wed, Nov 12, 2014 at 02:06:47PM +0100, Jan Engelhardt wrote:
> It was possible to combine e.g. conntrackd-1.2.1 with
> libnetfilter_conntrack-0.0.101, causing libc to issue an exit from
> within conntrackd iff such a conntrackd was promoted to a master and
> tried to call nfexp_send, due to lazy symbol resolution in libc.
I wonder how you have reached such a situation. I can only think of
very broken packaging.
> Symbol versions enforce the checks at program startup, so add one.
>
> $ ldd -r /usr/sbin/conntrackd
> undefined symbol: nfexp_cmp (/usr/sbin/conntrackd)
> undefined symbol: nfexp_send (/usr/sbin/conntrackd)
> libnetfilter_conntrack.so.3 => /usr/lib/libnetfilter_conntrack.so.3 (0x77fe7000)
> libnfnetlink.so.0 => /usr/lib/libnfnetlink.so.0 (0x77fdf000)
> libc.so.6 => /lib/libc.so.6 (0x77e7b000)
> libdl.so.2 => /lib/libdl.so.2 (0x77e76000)
> /lib/ld.so.1 (0x55555000)
> $ dpkg-query -W conntrackd libnetfilter-conntrack3
> conntrackd 1:1.2.1-1
> libnetfilter-conntrack3 0.0.101-1
Would you also convert libnetfilter_conntrack to use the same
EXPORT_SYMBOL() macro that we use in more recent libnetfilter_*
libraries for consistency?
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] build: add and use a symbol version map
2014-11-19 13:42 ` Pablo Neira Ayuso
@ 2014-11-19 15:56 ` Jan Engelhardt
0 siblings, 0 replies; 3+ messages in thread
From: Jan Engelhardt @ 2014-11-19 15:56 UTC (permalink / raw)
To: Pablo Neira Ayuso; +Cc: netfilter-devel
On Wednesday 2014-11-19 14:42, Pablo Neira Ayuso wrote:
>On Wed, Nov 12, 2014 at 02:06:47PM +0100, Jan Engelhardt wrote:
>> It was possible to combine e.g. conntrackd-1.2.1 with
>> libnetfilter_conntrack-0.0.101, causing libc to issue an exit from
>> within conntrackd iff such a conntrackd was promoted to a master and
>> tried to call nfexp_send, due to lazy symbol resolution in libc.
>
>I wonder how you have reached such a situation. I can only think of
>very broken packaging.
To reach such a situation, the shortest way to get there is:
1. On Debian squeeze, `apt-get install conntrack`.
This would install conntrack-tools-0.9.14.
2. Install a newer version at some point,
`perl -i -pe s/squeeze/wheezy/g /etc/apt/sources.list &&
apt-get update && apt-get install conntrack`.
The long description:
The conntrack-tools source code only checks the
libnetfilter_conntrack version only once, at build time.
The files in the top-level source directory of conntrack-tools do not
indicate any particular runtime requirement on libnetfilter_conntrack
version besides the implicit requirement of the built conntrackd on a
particular library by SONAME, in other words, the runtime
requirements are weaker than the build-time requirements.
Such a case is pretty normal, too. Build-time requirements are
generally seen as independent from runtime requirements by distros
and packagers. Some perl module may want Test::Simple at build time,
and not use it at runtime.
I cannot find that the Debian packager for conntrack-tools has
done something inappropriate.
>Would you also convert libnetfilter_conntrack to use the same
>EXPORT_SYMBOL() macro that we use in more recent libnetfilter_*
>libraries for consistency?
I can; question is, do we need it? It turns out that using
just a .map file (with implicit -fvisibility=default) gives
the same result, but requiring less steps. The map file
can also turn symbols from visible to hidden, without requiring
-fvisibility+EXPORT_SYMBOLs.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-11-19 15:56 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-11-12 13:06 [PATCH] build: add and use a symbol version map Jan Engelhardt
2014-11-19 13:42 ` Pablo Neira Ayuso
2014-11-19 15:56 ` Jan Engelhardt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).