diff options
author | Florian Westphal <fw@strlen.de> | 2020-07-24 13:34:46 +0200 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2020-07-31 19:28:00 +0200 |
commit | ffe8923f109b7ea92c0842c89e61300eefa11c94 (patch) | |
tree | 8b74558e4f43e92aa07e839a4a41f3cf145b3114 /lib/klist.c | |
parent | 85496a29224188051b6135eb38da8afd4c584765 (diff) | |
download | linux-ffe8923f109b7ea92c0842c89e61300eefa11c94.tar.bz2 |
netfilter: nft_compat: make sure xtables destructors have run
Pablo Neira found that after recent update of xt_IDLETIMER the
iptables-nft tests sometimes show an error.
He tracked this down to the delayed cleanup used by nf_tables core:
del rule (transaction A)
add rule (transaction B)
Its possible that by time transaction B (both in same netns) runs,
the xt target destructor has not been invoked yet.
For native nft expressions this is no problem because all expressions
that have such side effects make sure these are handled from the commit
phase, rather than async cleanup.
For nft_compat however this isn't true.
Instead of forcing synchronous behaviour for nft_compat, keep track
of the number of outstanding destructor calls.
When we attempt to create a new expression, flush the cleanup worker
to make sure destructors have completed.
With lots of help from Pablo Neira.
Reported-by: Pablo Neira Ayso <pablo@netfilter.org>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'lib/klist.c')
0 files changed, 0 insertions, 0 deletions