netfilter: conntrack: Fix data-races around ct mark
[ Upstream commit 52d1aa8b8249ff477aaa38b6f74a8ced780d079c ]
nf_conn:mark can be read from and written to in parallel. Use
READ_ONCE()/WRITE_ONCE() for reads and writes to prevent unwanted
compiler optimizations.
Fixes: 1da177e4c3
("Linux-2.6.12-rc2")
Signed-off-by: Daniel Xu <dxu@dxuuu.xyz>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:

committed by
Greg Kroah-Hartman

parent
459332f8db
commit
5c97af75f5
@@ -150,7 +150,7 @@ static u8 ovs_ct_get_state(enum ip_conntrack_info ctinfo)
|
||||
static u32 ovs_ct_get_mark(const struct nf_conn *ct)
|
||||
{
|
||||
#if IS_ENABLED(CONFIG_NF_CONNTRACK_MARK)
|
||||
return ct ? ct->mark : 0;
|
||||
return ct ? READ_ONCE(ct->mark) : 0;
|
||||
#else
|
||||
return 0;
|
||||
#endif
|
||||
@@ -336,9 +336,9 @@ static int ovs_ct_set_mark(struct nf_conn *ct, struct sw_flow_key *key,
|
||||
#if IS_ENABLED(CONFIG_NF_CONNTRACK_MARK)
|
||||
u32 new_mark;
|
||||
|
||||
new_mark = ct_mark | (ct->mark & ~(mask));
|
||||
if (ct->mark != new_mark) {
|
||||
ct->mark = new_mark;
|
||||
new_mark = ct_mark | (READ_ONCE(ct->mark) & ~(mask));
|
||||
if (READ_ONCE(ct->mark) != new_mark) {
|
||||
WRITE_ONCE(ct->mark, new_mark);
|
||||
if (nf_ct_is_confirmed(ct))
|
||||
nf_conntrack_event_cache(IPCT_MARK, ct);
|
||||
key->ct.mark = new_mark;
|
||||
|
Reference in New Issue
Block a user