Received: by 10.223.176.46 with SMTP id f43csp1093692wra; Sat, 20 Jan 2018 10:40:39 -0800 (PST) X-Google-Smtp-Source: AH8x224ZIU94K8amOLJKxCZY4emgEZaCaF1Fwx9GHnrT3gSxwgpzaoF4wGXVFQyA8y3nsKJmRwYd X-Received: by 10.101.82.203 with SMTP id z11mr2765221pgp.164.1516473639248; Sat, 20 Jan 2018 10:40:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516473639; cv=none; d=google.com; s=arc-20160816; b=CZeJVieSKi9G6QybiNVtHEm/Y8n+sO/xCROjpa76FTMV/krq1P25/nyjQ7JIUAK8ir 0kXUp6sdrIdw5kjYMiyVbg5B519igK4/blVzPl76jbI/cQcjcvgQXKhIKZs7Xz4S+0aZ fwS6PEw/uHUTjJOc5SmKDPcPFSwSvDsoNluixzQRd5dA+WX6mUFGH+B2KU56Z8fUaAQ4 sxOko95kWwavjRI+WIJQTQTnMjBw9d9YR+Px2X7J9MterN4mt6S0bCRm5O9EqNlAEi+c aV+HeZdKOcC5EtxHKQopT6xnXZ4+QVD3A/4gIfIFEDuZroscshBvycYLUWlTiXshJFL3 ARuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=MDc2aLC5jV5MJ9ZGWOkfadR/MuiFrdi4u0sq8TKSKTk=; b=H6Qaj3omwe/QrKMAnCFPUuvUgtIf3qnsOOcSYUPiQv5fcKuKRiL8EqVIZkLpgdSaOM wOcE3RRIoAzZKdXUJO+vY9Ox5kxQ0lX47ZjSOS5IA4tokr07cQmr7CuhOewzocw1fwVM 8oSxgjj1XJOOrREHp6Grm3xvCmQSSc0/JfZ2fArlc7QVwT9Hl/rQUpiRbI96LNgvFF8a Ij2n2kgoHP0P8MBICE+Gieqh376P9uxIyLUYbiUaPywew7x9SQLGuuGq/KPXtsGVZt3/ OW76T9CvCjvA0prG5a5A2AULADs7w5y2KR/IiPwlF97mt6Py8l6OBJ8EgUWSDp5+iQa9 Ulyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9si11943596pfq.5.2018.01.20.10.40.25; Sat, 20 Jan 2018 10:40:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756615AbeATShs (ORCPT + 99 others); Sat, 20 Jan 2018 13:37:48 -0500 Received: from imap1.codethink.co.uk ([176.9.8.82]:38655 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756385AbeATShk (ORCPT ); Sat, 20 Jan 2018 13:37:40 -0500 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126] helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1ecy1M-0004fT-WA; Sat, 20 Jan 2018 18:37:41 +0000 Message-ID: <1516473457.3417.18.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 28/78] netfilter: nfnl_cthelper: fix runtime expectation policy updates From: Ben Hutchings To: Pablo Neira Ayuso Cc: stable@vger.kernel.org, Liping Zhang , Sasha Levin , Greg Kroah-Hartman , LKML Date: Sat, 20 Jan 2018 18:37:37 +0000 In-Reply-To: <20171222084600.065969708@linuxfoundation.org> References: <20171222084556.909780563@linuxfoundation.org> <20171222084600.065969708@linuxfoundation.org> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2017-12-22 at 09:46 +0100, Greg Kroah-Hartman wrote: > 4.4-stable review patch.  If anyone has any objections, please let me know. > > ------------------ > > From: Pablo Neira Ayuso > > > [ Upstream commit 2c422257550f123049552b39f7af6e3428a60f43 ] > > We only allow runtime updates of expectation policies for timeout and > maximum number of expectations, otherwise reject the update. [...] > +static int nfnl_cthelper_update_policy_all(struct nlattr *tb[], > +    struct nf_conntrack_helper *helper) > +{ > + struct nf_conntrack_expect_policy new_policy[helper->expect_class_max + 1]; > + struct nf_conntrack_expect_policy *policy; > + int i, err; > + > + /* Check first that all policy attributes are well-formed, so we don't > +  * leave things in inconsistent state on errors. > +  */ > + for (i = 0; i < helper->expect_class_max + 1; i++) { > + > + if (!tb[NFCTH_POLICY_SET + i]) > + return -EINVAL; > + > + err = nfnl_cthelper_update_policy_one(&helper->expect_policy[i], > +       &new_policy[i], > +       tb[NFCTH_POLICY_SET + i]); > + if (err < 0) > + return err; > + } > + /* Now we can safely update them. */ > + for (i = 0; i < helper->expect_class_max + 1; i++) { > + policy = (struct nf_conntrack_expect_policy *) > + &helper->expect_policy[i]; > + policy->max_expected = new_policy->max_expected; > + policy->timeout = new_policy->timeout; [...] Shouldn't the RHS of these two assignments use new_policy[i]? Ben. -- Ben Hutchings Software Developer, Codethink Ltd.