diff options
author | Florian Westphal <fw@strlen.de> | 2017-05-30 11:38:12 +0200 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2017-06-19 19:09:19 +0200 |
commit | 7866cc57b51c1e118e5d78d1a8f721f378eec5c4 (patch) | |
tree | e1ce697fb956d559617dc47bb99743fc54b7f2f8 /arch/s390 | |
parent | 2c41f33c1b7030448212cdacd40e80796e347eac (diff) | |
download | linux-stable-7866cc57b51c1e118e5d78d1a8f721f378eec5c4.tar.gz linux-stable-7866cc57b51c1e118e5d78d1a8f721f378eec5c4.tar.bz2 linux-stable-7866cc57b51c1e118e5d78d1a8f721f378eec5c4.zip |
netns: add and use net_ns_barrier
Quoting Joe Stringer:
If a user loads nf_conntrack_ftp, sends FTP traffic through a network
namespace, destroys that namespace then unloads the FTP helper module,
then the kernel will crash.
Events that lead to the crash:
1. conntrack is created with ftp helper in netns x
2. This netns is destroyed
3. netns destruction is scheduled
4. netns destruction wq starts, removes netns from global list
5. ftp helper is unloaded, which resets all helpers of the conntracks
via for_each_net()
but because netns is already gone from list the for_each_net() loop
doesn't include it, therefore all of these conntracks are unaffected.
6. helper module unload finishes
7. netns wq invokes destructor for rmmod'ed helper
CC: "Eric W. Biederman" <ebiederm@xmission.com>
Reported-by: Joe Stringer <joe@ovn.org>
Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'arch/s390')
0 files changed, 0 insertions, 0 deletions