Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp49460ybl; Thu, 22 Aug 2019 19:32:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqzlayPHsStjsRYgB40gX1YjanHy9sBGP03MP8veSLKblwuKHaBVc5s5R3i0aaP+5oyNT+Ak X-Received: by 2002:a17:902:b604:: with SMTP id b4mr2038033pls.94.1566527548374; Thu, 22 Aug 2019 19:32:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566527548; cv=none; d=google.com; s=arc-20160816; b=txD7vtrDnYuOblCrKLzYoiTLKSUM8CD7HDbqvZHZQE8VBn7cZjp6xe99q9cMpwgUHH bDgd5hbjY0b1IJlLpsE7PSUvNcYEoMC0rDbjJkz//wRUNeIWLaYx3oRbgumAYVPs2gk3 za29GXOR/OgUwkqcFMgFmjAvOL80Z2SvFhFbcXI4fmrGVZF00mOyQ4rTFI8VEiSYdZ/8 TAnPIfttx8b09fP1USzejjcz+ETcRPJalxdktLEtR0wMLWHsBj9KjSy32EZBRmf/gYEL t56CVDaLjV5uz3kbZ8MaAH8YnvJ167RFCT2CTpZAMX1MTYAGSp3gUJBdE0jjF8YGXdrW HbvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=b2shTRJ92vS0teP4eHPNwkxoxHrPlWR23h2iFVFDwZM=; b=XbdNPIUq5I5q8Awy205yq7r4govdUGJIuGNlumWVLwS82wQWQmXTRrY/Zj4aSdIB/R d5a9ci0K5xJg3EFx061tiQi23sIZXvyZD8NBYBkgVUvinJ9edGObqMTTxTAkQROH56qV QqTu7+1ifQ1GSffEfoHZbNyKjutPLMbv/8smBiOKS2pOjrTkTkmVFJH5qx0lSxTJ+BTf sJHzy9B21infX+PzAwbsi5DWXOc1FnfOGa/m7hhh1/kEBEvt7H6HQKZPRYC/NOBCWFyH L/p0YjMLhf/ccz65VRSa2VuRID+YmAeO0squ4KxBzYTwmHYHvpguONIEwPAByKYJyCuO cP1A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0XLOf2k9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q2si1165728pjq.31.2019.08.22.19.32.12; Thu, 22 Aug 2019 19:32:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0XLOf2k9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392152AbfHVRah (ORCPT + 99 others); Thu, 22 Aug 2019 13:30:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:51006 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404615AbfHVR0I (ORCPT ); Thu, 22 Aug 2019 13:26:08 -0400 Received: from localhost (wsip-184-188-36-2.sd.sd.cox.net [184.188.36.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 26C8123429; Thu, 22 Aug 2019 17:26:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566494767; bh=fWkTaLmnBl7IcJbp8y4mJqpFp40ijLFvTMt4xn0IRPc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0XLOf2k9O4ZNx05gbUeuXd/QWTIdTbTQlRlYXXreaQDvR7a5DUmQ2grK5JnU6ws+1 jtx6v4VDGlo5js3HvvvKTY3zXhSaFQnSXU4FIyCUB1SozNeonIl6eEz4qsmDkMZgvW uz+ohpl7KqvTQaF0EqL6fU+mNdcONrMTETLn2qnc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dirk Morris , Florian Westphal , Pablo Neira Ayuso Subject: [PATCH 4.19 70/85] netfilter: conntrack: Use consistent ct id hash calculation Date: Thu, 22 Aug 2019 10:19:43 -0700 Message-Id: <20190822171734.212525148@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190822171731.012687054@linuxfoundation.org> References: <20190822171731.012687054@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dirk Morris commit 656c8e9cc1badbc18eefe6ba01d33ebbcae61b9a upstream. Change ct id hash calculation to only use invariants. Currently the ct id hash calculation is based on some fields that can change in the lifetime on a conntrack entry in some corner cases. The current hash uses the whole tuple which contains an hlist pointer which will change when the conntrack is placed on the dying list resulting in a ct id change. This patch also removes the reply-side tuple and extension pointer from the hash calculation so that the ct id will will not change from initialization until confirmation. Fixes: 3c79107631db1f7 ("netfilter: ctnetlink: don't use conntrack/expect object addresses as id") Signed-off-by: Dirk Morris Acked-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/netfilter/nf_conntrack_core.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c @@ -431,13 +431,12 @@ EXPORT_SYMBOL_GPL(nf_ct_invert_tuple); * table location, we assume id gets exposed to userspace. * * Following nf_conn items do not change throughout lifetime - * of the nf_conn after it has been committed to main hash table: + * of the nf_conn: * * 1. nf_conn address - * 2. nf_conn->ext address - * 3. nf_conn->master address (normally NULL) - * 4. tuple - * 5. the associated net namespace + * 2. nf_conn->master address (normally NULL) + * 3. the associated net namespace + * 4. the original direction tuple */ u32 nf_ct_get_id(const struct nf_conn *ct) { @@ -447,9 +446,10 @@ u32 nf_ct_get_id(const struct nf_conn *c net_get_random_once(&ct_id_seed, sizeof(ct_id_seed)); a = (unsigned long)ct; - b = (unsigned long)ct->master ^ net_hash_mix(nf_ct_net(ct)); - c = (unsigned long)ct->ext; - d = (unsigned long)siphash(&ct->tuplehash, sizeof(ct->tuplehash), + b = (unsigned long)ct->master; + c = (unsigned long)nf_ct_net(ct); + d = (unsigned long)siphash(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple, + sizeof(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple), &ct_id_seed); #ifdef CONFIG_64BIT return siphash_4u64((u64)a, (u64)b, (u64)c, (u64)d, &ct_id_seed);