[PATCH] xt_recent fix BUG()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The following patch fixes a bug in xt_recent.
Bug appears at the end of work the networks namespace, provided that the tables (filter/mangle/raw) have rule with xt_recent. The error occurs because the __net_exit recent_net_exit() is executed before the tables are cleared. Change this order of calls is impossible, since tables must be registered earlier than extensions.
Bug exists in all versions of the kernel since 2.6.35

Cleaning tables before completing the network namespace can be used as a workaround.

Idea of the patch that if the files are deleted from the directory /proc/net/xt_recent" procedure XXXXX, then a flag is set "clean". If cleaning the tables occurs later and the flag "clean" is set, then the delete files is skipped.

Patch for kernel 3.4.22

Signed-off-by: Vitaly Lavrov lve@xxxxxxx

--
diff --git a/net/netfilter/xt_recent.c b/net/netfilter/xt_recent.c
index d2ff15a..747d52d 100644
--- a/net/netfilter/xt_recent.c
+++ b/net/netfilter/xt_recent.c
@@ -85,6 +85,7 @@ struct recent_net {
        struct list_head        tables;
 #ifdef CONFIG_PROC_FS
        struct proc_dir_entry   *xt_recent;
+       int                     clean;
 #endif
 };

@@ -398,7 +399,8 @@ static void recent_mt_destroy(const struct xt_mtdtor_param *par)
                list_del(&t->list);
                spin_unlock_bh(&recent_lock);
 #ifdef CONFIG_PROC_FS
-               remove_proc_entry(t->name, recent_net->xt_recent);
+               if(!recent_net->clean)
+                       remove_proc_entry(t->name, recent_net->xt_recent);
 #endif
                recent_table_flush(t);
                kfree(t);
@@ -599,15 +601,26 @@ static int __net_init recent_net_init(struct net *net)
 {
        struct recent_net *recent_net = recent_pernet(net);

+#ifdef CONFIG_PROC_FS
+       recent_net->clean = 0;
+#endif
        INIT_LIST_HEAD(&recent_net->tables);
        return recent_proc_net_init(net);
 }

 static void __net_exit recent_net_exit(struct net *net)
 {
+#ifdef CONFIG_PROC_FS
        struct recent_net *recent_net = recent_pernet(net);
+       struct recent_table *t;

-       BUG_ON(!list_empty(&recent_net->tables));
+       spin_lock_bh(&recent_lock);
+       recent_net->clean = 1;
+       list_for_each_entry(t, &recent_net->tables, list) {
+               remove_proc_entry(t->name, recent_net->xt_recent);
+       }
+       }
+       spin_unlock_bh(&recent_lock);
+#endif
        recent_proc_net_exit(net);
 }
diff --git a/net/netfilter/xt_recent.c b/net/netfilter/xt_recent.c
index d2ff15a..747d52d 100644
--- a/net/netfilter/xt_recent.c
+++ b/net/netfilter/xt_recent.c
@@ -85,6 +85,7 @@ struct recent_net {
 	struct list_head	tables;
 #ifdef CONFIG_PROC_FS
 	struct proc_dir_entry	*xt_recent;
+	int			clean;
 #endif
 };
 
@@ -398,7 +399,8 @@ static void recent_mt_destroy(const struct xt_mtdtor_param *par)
 		list_del(&t->list);
 		spin_unlock_bh(&recent_lock);
 #ifdef CONFIG_PROC_FS
-		remove_proc_entry(t->name, recent_net->xt_recent);
+		if(!recent_net->clean)
+			remove_proc_entry(t->name, recent_net->xt_recent);
 #endif
 		recent_table_flush(t);
 		kfree(t);
@@ -599,15 +601,26 @@ static int __net_init recent_net_init(struct net *net)
 {
 	struct recent_net *recent_net = recent_pernet(net);
 
+#ifdef CONFIG_PROC_FS
+	recent_net->clean = 0;
+#endif
 	INIT_LIST_HEAD(&recent_net->tables);
 	return recent_proc_net_init(net);
 }
 
 static void __net_exit recent_net_exit(struct net *net)
 {
+#ifdef CONFIG_PROC_FS
 	struct recent_net *recent_net = recent_pernet(net);
+	struct recent_table *t;
 
-	BUG_ON(!list_empty(&recent_net->tables));
+	spin_lock_bh(&recent_lock);
+	recent_net->clean = 1;
+	list_for_each_entry(t, &recent_net->tables, list) {
+		remove_proc_entry(t->name, recent_net->xt_recent);
+	}
+	spin_unlock_bh(&recent_lock);
+#endif
 	recent_proc_net_exit(net);
 }
 

[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux