aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/tools/perf/scripts/python/export-to-postgresql.py
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2024-11-04 10:41:18 +0100
committerPablo Neira Ayuso <pablo@netfilter.org>2024-11-05 22:06:32 +0100
commitee666a541ed957937454d50afa4757924508cd74 (patch)
treece0f09d877c375e91dcd7ca81fced94f115a4116 /tools/perf/scripts/python/export-to-postgresql.py
parentnetfilter: nf_tables: avoid false-positive lockdep splats with basechain hook (diff)
downloadwireguard-linux-ee666a541ed957937454d50afa4757924508cd74.tar.xz
wireguard-linux-ee666a541ed957937454d50afa4757924508cd74.zip
netfilter: nf_tables: must hold rcu read lock while iterating expression type list
nft shell tests trigger: WARNING: suspicious RCU usage net/netfilter/nf_tables_api.c:3125 RCU-list traversed in non-reader section!! 1 lock held by nft/2068: #0: ffff888106c6f8c8 (&nft_net->commit_mutex){+.+.}-{4:4}, at: nf_tables_valid_genid+0x3c/0xf0 But the transaction mutex doesn't protect this list, the nfnl subsystem mutex would, but we can't acquire it here without risk of ABBA deadlocks. Acquire the rcu read lock to avoid this issue. v3: add a comment that explains the ->inner_ops check implies expression is builtin and lack of a module owner reference is ok. Fixes: 3a07327d10a0 ("netfilter: nft_inner: support for inner tunnel header matching") Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to '')
0 files changed, 0 insertions, 0 deletions