netfilter: ipset: Missing gc cancellations fixed
commit 27c5a095e2518975e20a10102908ae8231699879 upstream. The patch fdb8e12cc2cc ("netfilter: ipset: fix performance regression in swap operation") missed to add the calls to gc cancellations at the error path of create operations and at module unload. Also, because the half of the destroy operations now executed by a function registered by call_rcu(), neither NFNL_SUBSYS_IPSET mutex or rcu read lock is held and therefore the checking of them results false warnings. Fixes: 97f7cf1cd80e ("netfilter: ipset: fix performance regression in swap operation") Reported-by: syzbot+52bbc0ad036f6f0d4a25@syzkaller.appspotmail.com Reported-by: Brad Spengler <spender@grsecurity.net> Reported-by: Стас Ничипорович <stasn77@gmail.com> Tested-by: Brad Spengler <spender@grsecurity.net> Tested-by: Стас Ничипорович <stasn77@gmail.com> Signed-off-by: Jozsef Kadlecsik <kadlec@netfilter.org> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
a24d5f2ac8
commit
c80ddc1092
@ -1158,6 +1158,7 @@ static int ip_set_create(struct net *net, struct sock *ctnl,
|
||||
return ret;
|
||||
|
||||
cleanup:
|
||||
set->variant->cancel_gc(set);
|
||||
set->variant->destroy(set);
|
||||
put_out:
|
||||
module_put(set->type->me);
|
||||
@ -2413,6 +2414,7 @@ ip_set_net_exit(struct net *net)
|
||||
set = ip_set(inst, i);
|
||||
if (set) {
|
||||
ip_set(inst, i) = NULL;
|
||||
set->variant->cancel_gc(set);
|
||||
ip_set_destroy_set(set);
|
||||
}
|
||||
}
|
||||
|
@ -446,7 +446,7 @@ mtype_ahash_destroy(struct ip_set *set, struct htable *t, bool ext_destroy)
|
||||
u32 i;
|
||||
|
||||
for (i = 0; i < jhash_size(t->htable_bits); i++) {
|
||||
n = __ipset_dereference(hbucket(t, i));
|
||||
n = (__force struct hbucket *)hbucket(t, i);
|
||||
if (!n)
|
||||
continue;
|
||||
if (set->extensions & IPSET_EXT_DESTROY && ext_destroy)
|
||||
@ -466,7 +466,7 @@ mtype_destroy(struct ip_set *set)
|
||||
struct htype *h = set->data;
|
||||
struct list_head *l, *lt;
|
||||
|
||||
mtype_ahash_destroy(set, ipset_dereference_nfnl(h->table), true);
|
||||
mtype_ahash_destroy(set, (__force struct htable *)h->table, true);
|
||||
list_for_each_safe(l, lt, &h->ad) {
|
||||
list_del(l);
|
||||
kfree(l);
|
||||
|
Loading…
Reference in New Issue
Block a user