SRU request submitted: https://lists.ubuntu.com/archives/kernel-team/2018-September/095673.html
** Description changed: - Hi, - We've experienced crashes on machines running iptables using ipsets. - We could get a trace from the console on one of them (attached file kernel-trace.txt). + == SRU Justification == + A regression was introduced in Xenial, even prior to v4.4 Final. I did + not test prior to this kernel once I found the bug was fixed in + mainline. The bug reporter experienced crashes on machines running + iptables using ipsets. He could get a trace from the console on one of + them which is attached to the bug report. - On these machines, some ipset commands are automatically run to update the sets, and/or to dump them (ipset restore, swap, delete ... / ipset save). - We strongly suspect the panic is happening due to a race when ipset updates happen at the same time as a dump. + On these machines, some ipset commands are automatically run to update the + sets, and/or to dump them (ipset restore, swap, delete ... / ipset save). - These machines are running xenial. Before the crash, they were on - 4.4.0-116-generic #140-Ubuntu, but then rebooted into 4.4.0-135-generic - #161-Ubuntu. + I was able to reproduce this bug as was cking. This bug was found to be + fixed by mainline commits 596cf3fe5854 and e5173418ac59. - I have an ipset save running in loops on one of these machines to try - and reproduce quicker. + + == Fixes == + 596cf3fe5854 ("netfilter: ipset: fix race condition in ipset save, swap and delete") + e5173418ac59 ("netfilter: ipset: Fix race between dump and swap") + + == Regression Potential == + Low. This fixes a regression and is limited to netfilter. + + == Test Case == + A test kernel was built with these patches and tested by myself and cking. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1793753 Title: kernel panic - null pointer dereference on ipset operations Status in linux package in Ubuntu: In Progress Status in linux source package in Xenial: In Progress Bug description: == SRU Justification == A regression was introduced in Xenial, even prior to v4.4 Final. I did not test prior to this kernel once I found the bug was fixed in mainline. The bug reporter experienced crashes on machines running iptables using ipsets. He could get a trace from the console on one of them which is attached to the bug report. On these machines, some ipset commands are automatically run to update the sets, and/or to dump them (ipset restore, swap, delete ... / ipset save). I was able to reproduce this bug as was cking. This bug was found to be fixed by mainline commits 596cf3fe5854 and e5173418ac59. == Fixes == 596cf3fe5854 ("netfilter: ipset: fix race condition in ipset save, swap and delete") e5173418ac59 ("netfilter: ipset: Fix race between dump and swap") == Regression Potential == Low. This fixes a regression and is limited to netfilter. == Test Case == A test kernel was built with these patches and tested by myself and cking. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1793753/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp