I've tested the proposed kernel under the previous test environment -
after two hours the host was still up, where as it would have previously
crashed within 30 minutes or so. As such, this appears to prevent the
panic.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1793753

Title:
  kernel panic - null pointer dereference on ipset operations

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released

Bug description:
  
  == SRU Justification ==
  A regression was introduced in Xenial, even prior to v4.4 Final.  I did
  not test prior to this kernel once I found the bug was fixed in
  mainline.   The bug reporter experienced crashes on machines running
  iptables using ipsets.  He could get a trace from the console on one of
  them which is attached to the bug report.

  On these machines, some ipset commands are automatically run to update the
  sets, and/or to dump them (ipset restore, swap, delete ... / ipset save).

  I was able to reproduce this bug as was cking.  This bug was found to be
  fixed by mainline commits 596cf3fe5854 and e5173418ac59.

  
  == Fixes ==
  596cf3fe5854 ("netfilter: ipset: fix race condition in ipset save, swap and 
delete")
  e5173418ac59 ("netfilter: ipset: Fix race between dump and swap")

  == Regression Potential ==
  Low.  This fixes a regression and is limited to netfilter.

  == Test Case ==
  A test kernel was built with these patches and tested by myself and cking.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1793753/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to