NFT_VALIDATE_DO,
 };
 
+static u32 nft_chain_hash(const void *data, u32 len, u32 seed);
+static u32 nft_chain_hash_obj(const void *data, u32 len, u32 seed);
+static int nft_chain_hash_cmp(struct rhashtable_compare_arg *, const void *);
+
+static const struct rhashtable_params nft_chain_ht_params = {
+       .head_offset            = offsetof(struct nft_chain, rhlhead),
+       .key_offset             = offsetof(struct nft_chain, name),
+       .hashfn                 = nft_chain_hash,
+       .obj_hashfn             = nft_chain_hash_obj,
+       .obj_cmpfn              = nft_chain_hash_cmp,
+       .locks_mul              = 1,
+       .automatic_shrinking    = true,
+};
+
 static void nft_validate_state_update(struct net *net, u8 new_validate_state)
 {
        switch (net->nft.validate_state) {
        return ret;
 }
 
+static u32 nft_chain_hash(const void *data, u32 len, u32 seed)
+{
+       const char *name = data;
+
+       return jhash(name, strlen(name), seed);
+}
+
+static u32 nft_chain_hash_obj(const void *data, u32 len, u32 seed)
+{
+       const struct nft_chain *chain = data;
+
+       return nft_chain_hash(chain->name, 0, seed);
+}
+
+static int nft_chain_hash_cmp(struct rhashtable_compare_arg *arg,
+                             const void *ptr)
+{
+       const struct nft_chain *chain = ptr;
+       const char *name = arg->key;
+
+       return strcmp(chain->name, name);
+}
+
 static int nf_tables_newtable(struct net *net, struct sock *nlsk,
                              struct sk_buff *skb, const struct nlmsghdr *nlh,
                              const struct nlattr * const nla[],
        if (table->name == NULL)
                goto err_strdup;
 
+       err = rhltable_init(&table->chains_ht, &nft_chain_ht_params);
+       if (err)
+               goto err_chain_ht;
+
        INIT_LIST_HEAD(&table->chains);
        INIT_LIST_HEAD(&table->sets);
        INIT_LIST_HEAD(&table->objects);
        list_add_tail_rcu(&table->list, &net->nft.tables);
        return 0;
 err_trans:
+       rhltable_destroy(&table->chains_ht);
+err_chain_ht:
        kfree(table->name);
 err_strdup:
        kfree(table);
 {
        BUG_ON(ctx->table->use > 0);
 
+       rhltable_destroy(&ctx->table->chains_ht);
        kfree(ctx->table->name);
        kfree(ctx->table);
 }
        return ERR_PTR(-ENOENT);
 }
 
-static struct nft_chain *nft_chain_lookup(const struct nft_table *table,
+static struct nft_chain *nft_chain_lookup(struct nft_table *table,
                                          const struct nlattr *nla, u8 genmask)
 {
+       char search[NFT_CHAIN_MAXNAMELEN + 1];
+       struct rhlist_head *tmp, *list;
        struct nft_chain *chain;
 
        if (nla == NULL)
                return ERR_PTR(-EINVAL);
 
-       list_for_each_entry_rcu(chain, &table->chains, list) {
-               if (!nla_strcmp(nla, chain->name) &&
-                   nft_active_genmask(chain, genmask))
-                       return chain;
-       }
+       nla_strlcpy(search, nla, sizeof(search));
 
-       return ERR_PTR(-ENOENT);
+       WARN_ON(!rcu_read_lock_held() &&
+               !lockdep_nfnl_is_held(NFNL_SUBSYS_NFTABLES));
+
+       chain = ERR_PTR(-ENOENT);
+       rcu_read_lock();
+       list = rhltable_lookup(&table->chains_ht, search, nft_chain_ht_params);
+       if (!list)
+               goto out_unlock;
+
+       rhl_for_each_entry_rcu(chain, tmp, list, rhlhead) {
+               if (nft_active_genmask(chain, genmask))
+                       goto out_unlock;
+       }
+       chain = ERR_PTR(-ENOENT);
+out_unlock:
+       rcu_read_unlock();
+       return chain;
 }
 
 static const struct nla_policy nft_chain_policy[NFTA_CHAIN_MAX + 1] = {
 {
        const struct nfgenmsg *nfmsg = nlmsg_data(nlh);
        u8 genmask = nft_genmask_cur(net);
-       const struct nft_table *table;
        const struct nft_chain *chain;
+       struct nft_table *table;
        struct sk_buff *skb2;
        int family = nfmsg->nfgen_family;
        int err;
        if (err < 0)
                goto err1;
 
+       err = rhltable_insert_key(&table->chains_ht, chain->name,
+                                 &chain->rhlhead, nft_chain_ht_params);
+       if (err)
+               goto err2;
+
        err = nft_trans_chain_add(ctx, NFT_MSG_NEWCHAIN);
-       if (err < 0)
+       if (err < 0) {
+               rhltable_remove(&table->chains_ht, &chain->rhlhead,
+                               nft_chain_ht_params);
                goto err2;
+       }
 
        table->use++;
        list_add_tail_rcu(&chain->list, &table->chains);
 {
        const struct nfgenmsg *nfmsg = nlmsg_data(nlh);
        u8 genmask = nft_genmask_cur(net);
-       const struct nft_table *table;
        const struct nft_chain *chain;
        const struct nft_rule *rule;
+       struct nft_table *table;
        struct sk_buff *skb2;
        int family = nfmsg->nfgen_family;
        int err;
 {
        struct nft_base_chain *basechain;
 
-       if (nft_trans_chain_name(trans))
+       if (nft_trans_chain_name(trans)) {
+               rhltable_remove(&trans->ctx.table->chains_ht,
+                               &trans->ctx.chain->rhlhead,
+                               nft_chain_ht_params);
                swap(trans->ctx.chain->name, nft_trans_chain_name(trans));
+               rhltable_insert_key(&trans->ctx.table->chains_ht,
+                                   trans->ctx.chain->name,
+                                   &trans->ctx.chain->rhlhead,
+                                   nft_chain_ht_params);
+       }
 
        if (!nft_is_base_chain(trans->ctx.chain))
                return;
                nf_tables_commit_chain_free_rules_old(g0);
 }
 
+static void nft_chain_del(struct nft_chain *chain)
+{
+       struct nft_table *table = chain->table;
+
+       WARN_ON_ONCE(rhltable_remove(&table->chains_ht, &chain->rhlhead,
+                                    nft_chain_ht_params));
+       list_del_rcu(&chain->list);
+}
+
 static int nf_tables_commit(struct net *net, struct sk_buff *skb)
 {
        struct nft_trans *trans, *next;
                        nft_trans_destroy(trans);
                        break;
                case NFT_MSG_DELCHAIN:
-                       list_del_rcu(&trans->ctx.chain->list);
+                       nft_chain_del(trans->ctx.chain);
                        nf_tables_chain_notify(&trans->ctx, NFT_MSG_DELCHAIN);
                        nf_tables_unregister_hook(trans->ctx.net,
                                                  trans->ctx.table,
                                nft_trans_destroy(trans);
                        } else {
                                trans->ctx.table->use--;
-                               list_del_rcu(&trans->ctx.chain->list);
+                               nft_chain_del(trans->ctx.chain);
                                nf_tables_unregister_hook(trans->ctx.net,
                                                          trans->ctx.table,
                                                          trans->ctx.chain);
                ctx->chain->use--;
                nf_tables_rule_release(ctx, rule);
        }
-       list_del(&ctx->chain->list);
+       nft_chain_del(ctx->chain);
        ctx->table->use--;
        nf_tables_chain_destroy(ctx);
 
                }
                list_for_each_entry_safe(chain, nc, &table->chains, list) {
                        ctx.chain = chain;
-                       list_del(&chain->list);
+                       nft_chain_del(chain);
                        table->use--;
                        nf_tables_chain_destroy(&ctx);
                }