On tir, 2016-07-26 at 17:15 +0200, Florian Westphal wrote: > Anders K. Pedersen <akp@xxxxxx> wrote: > > Hello, > > > > While doing some tests with nftables, I've run into the the > > following > > bug, which is easily reproducable: > > > > [ 1409.721487] BUG: unable to handle kernel NULL pointer > > dereference at 0000000000000010 > > [ 1409.730512] IP: [<ffffffff81495de9>] > > nft_rbtree_lookup+0xa9/0x150 > > [ 1409.737525] PGD 0 > > [ 1409.739841] Oops: 0000 [#1] SMP > > [ 1409.743445] Modules linked in: > > [ 1409.746966] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.7.0 #1 > > [ 1409.753660] Hardware name: Dell Inc. PowerEdge R730/0H21J3, BIOS > > 2.1.6 05/19/2016 > > [ 1409.762253] task: ffffffff8180b500 ti: ffffffff81800000 task.ti: > > ffffffff81800000 > > [ 1409.770846] RIP: 0010:[<ffffffff81495de9>] [<ffffffff81495de9>] > > nft_rbtree_lookup+0xa9/0x150 > > [ 1409.780651] RSP: 0018:ffff88085f2039c8 EFLAGS: 00010202 > > [ 1409.786745] RAX: ffff88083dc76f80 RBX: ffff88083dc76fa4 RCX: > > 0000000000000002 > > [ 1409.794937] RDX: 0000000000000004 RSI: ffff88083dc76de0 RDI: > > ffff88083dc76fa4 > > [ 1409.803130] RBP: 0000000000000004 R08: 0000000000000000 R09: > > ffff88085f203aa0 > > [ 1409.811323] R10: ffff88083dc699e2 R11: ffff88085803d000 R12: > > ffff88085ae2f700 > > [ 1409.819517] R13: ffff88083dc76f80 R14: ffff88085f203aa0 R15: > > 0000000000000000 > > [ 1409.827710] FS: 0000000000000000(0000) > > GS:ffff88085f200000(0000) knlGS:0000000000000000 > > [ 1409.837006] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > [ 1409.843594] CR2: 0000000000000010 CR3: 0000000001806000 CR4: > > 00000000001406f0 > > [ 1409.851788] Stack: > > [ 1409.854095] ffffffff00000002 ffff8800785b0100 0000000000000000 > > ffff88085f203a20 > > [ 1409.862641] ffff88085ae2f700 ffff880855e16428 ffff88085f203a90 > > 0000000000000002 > > [ 1409.871184] 00000000ffffffff ffff880855e16428 ffffffff81493a4e > > ffff880859d699d8 > > [ 1409.879736] Call Trace: > > [ 1409.882539] <IRQ> > > [ 1409.884751] [<ffffffff81493a4e>] ? nft_lookup_eval+0x2e/0x80 > [..] > > > I have narrowed the rule set in use down to: > > > > table ip filter { > > set bogons { > > type ipv4_addr > > flags interval > > } > > > > chain prerouting { > > type filter hook prerouting priority -300; policy > > accept; > > iif lo accept > > ip daddr @bogons ip daddr != 224.0.0.0/4 log prefix > > "Bogon" group 0 snaplen 80 counter packets 0 bytes 0 drop > > ip saddr @bogons log prefix "Bogon" group 0 snaplen > > 80 counter packets 0 bytes 0 drop > > } > > } > > > > With the following shell code, the box will crash quite quickly > > (within > > seconds) during the "nft delete element" part: > > > > I=1 > > while : ; do > > echo -n "${I} add" > > nft add element ip filter bogons { 0.0.0.0/8 } > > echo -n " delete" > > nft delete element ip filter bogons { 0.0.0.0/8 } > > echo > > I=$[${I}+1] > > done > > Perfect. Thanks for this detailed bug report! > > When the 'goto found' path is taken then 'parent' has already been > set in > previous loop and might be NULL. > > diff --git a/net/netfilter/nft_rbtree.c b/net/netfilter/nft_rbtree.c > --- a/net/netfilter/nft_rbtree.c > +++ b/net/netfilter/nft_rbtree.c > @@ -72,6 +72,8 @@ static bool nft_rbtree_lookup(const struct net > *net, const struct nft_set *set, > else { > found: > if (!nft_set_elem_active(&rbe->ext, > genmask)) { > + if (parent == NULL) > + goto out; > parent = parent->rb_left; > continue; > } Thanks, this change solves the crashes I've encountered with nftables sets. Regards, Anders K. Pedersen -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html