From: Pablo Neira Ayuso <pablo@netfilter.org>
To: Florian Westphal <fw@strlen.de>
Cc: netfilter-devel@vger.kernel.org
Subject: Re: [PATCH nf-next RFC 2/2] netfilter: conntrack: skip event delivery for the netns exit path
Date: Sun, 10 Apr 2022 17:23:01 +0200 [thread overview]
Message-ID: <YlL2Vfn3ijjh9O97@salvia> (raw)
In-Reply-To: <20220408193413.GC7920@breakpoint.cc>
On Fri, Apr 08, 2022 at 09:34:13PM +0200, Florian Westphal wrote:
> Pablo Neira Ayuso <pablo@netfilter.org> wrote:
> > 70e9942f17a6 ("netfilter: nf_conntrack: make event callback registration
> > per-netns") introduced a per-netns callback for events to workaround a
> > crash when delivering conntrack events on a stale per-netns nfnetlink
> > kernel socket.
> >
> > This patch adds a new flag to the nf_ct_iter_data object to skip event
> > delivery from the netns cleanup path to address this issue.
> >
> > Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
> > ---
> > compiled tested only.
> > @Florian: Maybe this helps to remove the per-netns nf_conntrack_event_cb
> > callback without having to update nfnetlink to deal with this corner case?
>
> Old crash recipe is (from your changelog of the 'make it pernet' change):
>
> 0) make sure nf_conntrack_netlink and nf_conntrack_ipv4 are loaded.
> 1) container is started.
> 2) connect to it via lxc-console.
> 3) generate some traffic with the container to create some conntrack
> entries in its table.
> 4) stop the container: you hit one oops because the conntrack table
> cleanup tries to report the destroy event to user-space but the
> per-netns nfnetlink socket has already gone (as the nfnetlink
> socket is per-netns but event callback registration is global).
>
> Pernet exit handlers are called in reverse order of the module load
> order, so normally this means:
>
> ctnetlink exit handlers
> nfnetlink_net_exit_batch, removes nfnl socket
> nf_conntrack_pernet_exit(), removes entries,
>
> Because callback is pernet atm this prevents crash after nfntlink sk
> has been closed.
>
> If thats no longer the case, we need some other way to suppress
> calls with stale nfnl sk.
>
> With the proposed patch series its still possible that we end up
> in nfnetlink via the ctnl event handler.
>
> E.g. gc worker could evit at the right time, or some kfree_skb call
> ends up dropping last reference.
>
> If you really dislike the nfnl changes I will respin without this
> and will keep the pernet ctnetlink callback.
OK, my patch is not covering all the possible cases then.
Probably we can remove the hooks from .pre_exit, then force a run of
the garbage collector from there. Then .exit path skips event delivery
as my patch does.
This would allow to remove the per-netns callback workaround, and all
would be handled from nf_conntrack instead?
next prev parent reply other threads:[~2022-04-10 15:23 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-04-08 12:58 [PATCH nf-next RFC 1/2] netfilter: conntrack: add nf_ct_iter_data object for nf_ct_iterate_cleanup*() Pablo Neira Ayuso
2022-04-08 12:58 ` [PATCH nf-next RFC 2/2] netfilter: conntrack: skip event delivery for the netns exit path Pablo Neira Ayuso
2022-04-08 19:34 ` Florian Westphal
2022-04-10 15:23 ` Pablo Neira Ayuso [this message]
2022-04-10 15:38 ` Florian Westphal
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YlL2Vfn3ijjh9O97@salvia \
--to=pablo@netfilter.org \
--cc=fw@strlen.de \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).