OSDN Git Service

netfilter: add and use nf_ct_unconfirmed_destroy
authorFlorian Westphal <fw@strlen.de>
Tue, 25 Jul 2017 22:02:32 +0000 (00:02 +0200)
committerPablo Neira Ayuso <pablo@netfilter.org>
Mon, 31 Jul 2017 17:09:39 +0000 (19:09 +0200)
This also removes __nf_ct_unconfirmed_destroy() call from
nf_ct_iterate_cleanup_net, so that function can be used only
when missing conntracks from unconfirmed list isn't a problem.

Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
include/net/netfilter/nf_conntrack.h
net/netfilter/nf_conntrack_core.c
net/netfilter/nfnetlink_cttimeout.c

index 4840756..6e6f678 100644 (file)
@@ -224,6 +224,9 @@ extern s32 (*nf_ct_nat_offset)(const struct nf_conn *ct,
                               enum ip_conntrack_dir dir,
                               u32 seq);
 
+/* Set all unconfirmed conntrack as dying */
+void nf_ct_unconfirmed_destroy(struct net *);
+
 /* Iterate over all conntracks: if iter returns true, it's deleted. */
 void nf_ct_iterate_cleanup_net(struct net *net,
                               int (*iter)(struct nf_conn *i, void *data),
index c6f1cf0..80ab4e9 100644 (file)
@@ -1686,6 +1686,17 @@ __nf_ct_unconfirmed_destroy(struct net *net)
        }
 }
 
+void nf_ct_unconfirmed_destroy(struct net *net)
+{
+       might_sleep();
+
+       if (atomic_read(&net->ct.count) > 0) {
+               __nf_ct_unconfirmed_destroy(net);
+               synchronize_net();
+       }
+}
+EXPORT_SYMBOL_GPL(nf_ct_unconfirmed_destroy);
+
 void nf_ct_iterate_cleanup_net(struct net *net,
                               int (*iter)(struct nf_conn *i, void *data),
                               void *data, u32 portid, int report)
@@ -1697,14 +1708,10 @@ void nf_ct_iterate_cleanup_net(struct net *net,
        if (atomic_read(&net->ct.count) == 0)
                return;
 
-       __nf_ct_unconfirmed_destroy(net);
-
        d.iter = iter;
        d.data = data;
        d.net = net;
 
-       synchronize_net();
-
        nf_ct_iterate_cleanup(iter_net_only, &d, portid, report);
 }
 EXPORT_SYMBOL_GPL(nf_ct_iterate_cleanup_net);
index 7ce9e86..f4fb6d4 100644 (file)
@@ -570,6 +570,7 @@ static void __net_exit cttimeout_net_exit(struct net *net)
 {
        struct ctnl_timeout *cur, *tmp;
 
+       nf_ct_unconfirmed_destroy(net);
        ctnl_untimeout(net, NULL);
 
        list_for_each_entry_safe(cur, tmp, &net->nfct_timeout_list, head) {