Received: by 10.192.165.156 with SMTP id m28csp1172279imm; Wed, 11 Apr 2018 13:52:03 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+bSJU1S/X9bfhJpqJQPsjI9lTI8Wy74sD3mQONuFbikzAvb0Vxia53jxlmVzOuPE5KNIYA X-Received: by 2002:a17:902:2b84:: with SMTP id l4-v6mr6830590plb.65.1523479923827; Wed, 11 Apr 2018 13:52:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523479923; cv=none; d=google.com; s=arc-20160816; b=DYkURYlFhNO5FhWctoa4HRtFN/DiWJPzsa8rLEX7JW4/Ccenw+iKsXgJjtAmkLulF+ aG7wVodhLaitHQoJL3sRSbiriJPNobIxl9kDbZOq7bxLagJlyZcjo0OuhNzRofffAOFi JxecOsfLCSlNd6/xMkpFQbGcpwRl8qWKS1sWVDbF9RcBDAaLrCusZVaN0QPLBaVpeRW5 PjegwdPGKj1RvkBKXUik0UYPv47HKEsi5x4NcOdCb2z3q9eeLlvwsPoiGfQZR8fp2MlU euETqgkAXx1i1HcmCHxDr3zRSbB9Qj4To8i3f1W2F5pBieSK9rDB4dvGthPsUIccuBiN N13w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=0KdeANSGxlV2S+PsezdIPhzQdNteLFq8J/nal1Tkigs=; b=UojJriLa3Xsks+cc58lU/MLe5ZsMijCVjRC2k9YAmcYuA7XR5XPtlzLluBhL5z7ehn gx7KFLd/fpQRCLzcYLtfzHWiNRQgN5lATLgHhm2m4kPqRQ0Li13qYO6sXvod+TSNj4H8 ZQKH++VoqxOrR32BpU+TviHBzmqqfldEkwxhdWn0nJfFQrBk3fLoqRU1iaGId5Zp8H5j EfnzNib/46FF3Vuv91LMTrdRr4cRg+z3B2Ai0yBQ1Su6elH69KEIjILE5xTslRDgSjaN VgEPm6ifQKh+9UOCW1hBVey7MgJTQ2D+csy5K2J2qbgTdm8X9vWu4M79KfLFUo0wH0EZ 6XaQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v13si1230389pgq.478.2018.04.11.13.51.27; Wed, 11 Apr 2018 13:52:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756672AbeDKUry (ORCPT + 99 others); Wed, 11 Apr 2018 16:47:54 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:58910 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755727AbeDKSq0 (ORCPT ); Wed, 11 Apr 2018 14:46:26 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 35668CA5; Wed, 11 Apr 2018 18:46:25 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Liping Zhang , Pablo Neira Ayuso , Sasha Levin Subject: [PATCH 4.4 069/190] netfilter: ctnetlink: fix incorrect nf_ct_put during hash resize Date: Wed, 11 Apr 2018 20:35:15 +0200 Message-Id: <20180411183554.349904185@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180411183550.114495991@linuxfoundation.org> References: <20180411183550.114495991@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Liping Zhang [ Upstream commit fefa92679dbe0c613e62b6c27235dcfbe9640ad1 ] If nf_conntrack_htable_size was adjusted by the user during the ct dump operation, we may invoke nf_ct_put twice for the same ct, i.e. the "last" ct. This will cause the ct will be freed but still linked in hash buckets. It's very easy to reproduce the problem by the following commands: # while : ; do echo $RANDOM > /proc/sys/net/netfilter/nf_conntrack_buckets done # while : ; do conntrack -L done # iperf -s 127.0.0.1 & # iperf -c 127.0.0.1 -P 60 -t 36000 After a while, the system will hang like this: NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [bash:20184] NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [iperf:20382] ... So at last if we find cb->args[1] is equal to "last", this means hash resize happened, then we can set cb->args[1] to 0 to fix the above issue. Fixes: d205dc40798d ("[NETFILTER]: ctnetlink: fix deadlock in table dumping") Signed-off-by: Liping Zhang Signed-off-by: Pablo Neira Ayuso Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- net/netfilter/nf_conntrack_netlink.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/net/netfilter/nf_conntrack_netlink.c +++ b/net/netfilter/nf_conntrack_netlink.c @@ -887,8 +887,13 @@ restart: } out: local_bh_enable(); - if (last) + if (last) { + /* nf ct hash resize happened, now clear the leftover. */ + if ((struct nf_conn *)cb->args[1] == last) + cb->args[1] = 0; + nf_ct_put(last); + } return skb->len; }