Received: by 10.223.176.5 with SMTP id f5csp3394301wra; Mon, 29 Jan 2018 12:33:02 -0800 (PST) X-Google-Smtp-Source: AH8x226wAEemBzcGvo2Tdwt4sBZzGvXc1pbW/OyQJ7Gy3GYzv6W3suPupP1oaakRpDqmYJKbmurA X-Received: by 10.99.146.86 with SMTP id s22mr21901247pgn.209.1517257982441; Mon, 29 Jan 2018 12:33:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517257982; cv=none; d=google.com; s=arc-20160816; b=hVmmPEBLWW+qA5AVdSO7a1RV0RNbZW7b69ttVHT8yD38IJrZeiD6+TTW4SJX1o5WdP jNKD12II38qovapIUhe03k6UhjVXgI3+OMcLqhAIxGRNTmSz6IQO6IHdVsXz9onAAJZo EViytcCl5wFophayJ7NiDupqXMqgRH8HKdLc0bHwWgTgmqjAZjZ6QOuA5htu3RNvM4d2 Is5cUdICKpgupr11x0uzb/nMtQjRz/OdEGEtQWeefmR0TP4LhjLPwFs2d+yomw7ITNYt m2TFWvZAVGayjs/qN7q5THCa5/T3hPGqYvxW3z76rxuUNWAAFCR3DzYb2Jg6jdP/VxKF z5GA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=9khqI4tXmsLKcF/Hrrun9xMqD9lTwVDohRiKEhMwFHg=; b=ie/rCWH1fA9NuklmrDsAbKu7vs7RfLP+08xCta1s4qiDAVH/oGsXRPyUe8b7/p2c0D Nocr+NDrTo9IrQQnRBSGu+wPpeFaKTNYdRBKPJMwZb/DGSvYpBEjH5koKeJUFkytrYPz f+OlM126ttOG4zt7AYREERMR0Z3TIqDeI60cz1F1dO3Fi6NMXvQPWgOWWspCNs7glzt6 Ib2NGQHN0AcJl1KssYrn5XQpoVGpJjXP1klRoWjAblecd4+VEV8kPTwefJOjjpVDiK2o E/H/ojGc/OgnXOaKTd0nqIXzZ5GUMfMsM9/NJmHwBWrsb9SDPJEhJGvhk8aKYbioPq6R +Vnw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u19si11696473pfl.141.2018.01.29.12.32.47; Mon, 29 Jan 2018 12:33:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932439AbeA2UcT (ORCPT + 99 others); Mon, 29 Jan 2018 15:32:19 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:41660 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754290AbeA2UPA (ORCPT ); Mon, 29 Jan 2018 15:15:00 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id E328B2F06; Mon, 29 Jan 2018 13:01:58 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , Florian Westphal , Pablo Neira Ayuso , Michal Kubecek Subject: [PATCH 4.4 35/74] netfilter: restart search if moved to other chain Date: Mon, 29 Jan 2018 13:56:40 +0100 Message-Id: <20180129123849.164057407@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180129123847.507563674@linuxfoundation.org> References: <20180129123847.507563674@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Florian Westphal commit 95a8d19f28e6b29377a880c6264391a62e07fccc upstream. In case nf_conntrack_tuple_taken did not find a conflicting entry check that all entries in this hash slot were tested and restart in case an entry was moved to another chain. Reported-by: Eric Dumazet Fixes: ea781f197d6a ("netfilter: nf_conntrack: use SLAB_DESTROY_BY_RCU and get rid of call_rcu()") Signed-off-by: Florian Westphal Acked-by: Eric Dumazet Signed-off-by: Pablo Neira Ayuso Acked-by: Michal Kubecek Signed-off-by: Greg Kroah-Hartman --- net/netfilter/nf_conntrack_core.c | 7 +++++++ 1 file changed, 7 insertions(+) --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c @@ -719,6 +719,7 @@ nf_conntrack_tuple_taken(const struct nf * least once for the stats anyway. */ rcu_read_lock_bh(); + begin: hlist_nulls_for_each_entry_rcu(h, n, &net->ct.hash[hash], hnnode) { ct = nf_ct_tuplehash_to_ctrack(h); if (ct != ignored_conntrack && @@ -730,6 +731,12 @@ nf_conntrack_tuple_taken(const struct nf } NF_CT_STAT_INC(net, searched); } + + if (get_nulls_value(n) != hash) { + NF_CT_STAT_INC(net, search_restart); + goto begin; + } + rcu_read_unlock_bh(); return 0;