From patchwork Sun Nov 5 10:02:09 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vasily Averin X-Patchwork-Id: 834306 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yVB7f6rphz9t34 for ; Sun, 5 Nov 2017 21:02:22 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752994AbdKEKCT (ORCPT ); Sun, 5 Nov 2017 05:02:19 -0500 Received: from mailhub.sw.ru ([195.214.232.25]:2231 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752962AbdKEKCS (ORCPT ); Sun, 5 Nov 2017 05:02:18 -0500 Received: from [172.16.24.21] (msk-vpn.virtuozzo.com [195.214.232.6]) by relay.sw.ru (8.13.4/8.13.4) with ESMTP id vA5A29bh014420; Sun, 5 Nov 2017 13:02:09 +0300 (MSK) From: Vasily Averin Subject: [PATCH 17/21] hashlimit: exit_net cleanup check added To: netdev@vger.kernel.org Cc: coreteam@netfilter.org, netfilter-devel@vger.kernel.org, Florian Westphal , Jozsef Kadlecsik , Pablo Neira Ayuso Message-ID: <32ef6c18-ccf4-39fd-7128-04456da2402e@virtuozzo.com> Date: Sun, 5 Nov 2017 13:02:09 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 Content-Language: en-US Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Be sure that htables array initialized in net_init hook was return to initial state. Signed-off-by: Vasily Averin --- net/netfilter/xt_hashlimit.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/net/netfilter/xt_hashlimit.c b/net/netfilter/xt_hashlimit.c index 5da8746..78485d1 100644 --- a/net/netfilter/xt_hashlimit.c +++ b/net/netfilter/xt_hashlimit.c @@ -1338,7 +1338,11 @@ static int __net_init hashlimit_net_init(struct net *net) static void __net_exit hashlimit_net_exit(struct net *net) { + struct hashlimit_net *hashlimit_net = hashlimit_pernet(net); + hashlimit_proc_net_exit(net); + WARN(!hlist_empty(&hashlimit_net->htables), + "net %p exit: hashlimit htables hlist is not empty\n", net); } static struct pernet_operations hashlimit_net_ops = {