From patchwork Sun Nov 5 16:49:09 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vasily Averin X-Patchwork-Id: 834362 Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yVM962YLLz9sRV for ; Mon, 6 Nov 2017 03:49:14 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750907AbdKEQtM (ORCPT ); Sun, 5 Nov 2017 11:49:12 -0500 Received: from mailhub.sw.ru ([195.214.232.25]:49012 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750731AbdKEQtL (ORCPT ); Sun, 5 Nov 2017 11:49:11 -0500 Received: from [172.16.24.21] (msk-vpn.virtuozzo.com [195.214.232.6]) by relay.sw.ru (8.13.4/8.13.4) with ESMTP id vA5Gn9CI018281 for ; Sun, 5 Nov 2017 19:49:10 +0300 (MSK) From: Vasily Averin Subject: [PATCH v2 00/21] exit_net checks for objects initialized in net_init hook To: netdev@vger.kernel.org References: Message-ID: <4fdc4264-e338-6ee8-a662-7d98b45733a1@virtuozzo.com> Date: Sun, 5 Nov 2017 19:49:09 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org This patch set checks that lists initialized in net_init hooks were return to initial state at end of net_exit hooks. I hope such checks allows to detect leaked per-netns objects. Also I hope that all new pernet_operations will inherit such checks too. I assume that elements added into per-net lists should not live longer than net namespace, and should be deleted from the list. I think exit_net hook is good place for such check. Recently I've found lost list_entry and enabled timer on stop of net namespace. Then I've reviewed all existing pernet_operations and found that many drivers have such checks already. So I decided to complete this task and add such checks into all affected subsystems. v2: - net pointer removed from output - fixed compilation for phonet driver Vasily Averin (21): exit_net cleanup: geneve sock_list check ppp: exit_net cleanup checks added vxlan: exit_net cleanup checks added netdev: exit_net cleanup check added nfs4blocklayout: exit_net cleanup check added nfs client: exit_net cleanup check added fib_notifier: exit_net cleanup check added fib_rules: exit_net cleanup check added clusterip: exit_net cleanup check added xfrm6_tunnel: exit_net cleanup check added af_key: replace BUG_ON on WARN_ON in net_exit hook l2tp: exit_net cleanup check added nf_tables: exit_net cleanup check added nfnetlink_log: exit_net cleanup check added nfnetlink_gueue: exit_net cleanup check added x_tables: exit_net cleanup check added hashlimit: exit_net cleanup check added recent: exit_net cleanup check added packet: exit_net cleanup check added phonet: exit_net cleanup check added sunrpc: exit_net cleanup check added drivers/net/geneve.c | 2 ++ drivers/net/ppp/ppp_generic.c | 4 ++++ drivers/net/vxlan.c | 6 ++++++ fs/nfs/blocklayout/rpc_pipefs.c | 2 ++ fs/nfs/client.c | 4 ++++ net/core/dev.c | 3 +++ net/core/fib_notifier.c | 7 +++++++ net/core/fib_rules.c | 7 +++++++ net/ipv4/netfilter/ipt_CLUSTERIP.c | 2 ++ net/ipv6/xfrm6_tunnel.c | 12 ++++++++++++ net/key/af_key.c | 2 +- net/l2tp/l2tp_core.c | 6 ++++++ net/netfilter/nf_tables_api.c | 9 +++++++++ net/netfilter/nfnetlink_log.c | 6 ++++++ net/netfilter/nfnetlink_queue.c | 7 +++++++ net/netfilter/x_tables.c | 10 ++++++++++ net/netfilter/xt_hashlimit.c | 4 ++++ net/netfilter/xt_recent.c | 4 ++++ net/packet/af_packet.c | 2 ++ net/phonet/pn_dev.c | 4 ++++ net/sunrpc/sunrpc_syms.c | 4 ++++ 21 files changed, 106 insertions(+), 1 deletion(-)