Hello,

While doing some tests with nftables, I've run into the the following
bug, which is easily reproducable:

[ 1409.721487] BUG: unable to handle kernel NULL pointer dereference at 
0000000000000010
[ 1409.730512] IP: [<ffffffff81495de9>] nft_rbtree_lookup+0xa9/0x150
[ 1409.737525] PGD 0
[ 1409.739841] Oops: 0000 [#1] SMP
[ 1409.743445] Modules linked in:
[ 1409.746966] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.7.0 #1
[ 1409.753660] Hardware name: Dell Inc. PowerEdge R730/0H21J3, BIOS 2.1.6 
05/19/2016
[ 1409.762253] task: ffffffff8180b500 ti: ffffffff81800000 task.ti: 
ffffffff81800000
[ 1409.770846] RIP: 0010:[<ffffffff81495de9>]  [<ffffffff81495de9>] 
nft_rbtree_lookup+0xa9/0x150
[ 1409.780651] RSP: 0018:ffff88085f2039c8  EFLAGS: 00010202
[ 1409.786745] RAX: ffff88083dc76f80 RBX: ffff88083dc76fa4 RCX: 0000000000000002
[ 1409.794937] RDX: 0000000000000004 RSI: ffff88083dc76de0 RDI: ffff88083dc76fa4
[ 1409.803130] RBP: 0000000000000004 R08: 0000000000000000 R09: ffff88085f203aa0
[ 1409.811323] R10: ffff88083dc699e2 R11: ffff88085803d000 R12: ffff88085ae2f700
[ 1409.819517] R13: ffff88083dc76f80 R14: ffff88085f203aa0 R15: 0000000000000000
[ 1409.827710] FS:  0000000000000000(0000) GS:ffff88085f200000(0000) 
knlGS:0000000000000000
[ 1409.837006] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1409.843594] CR2: 0000000000000010 CR3: 0000000001806000 CR4: 00000000001406f0
[ 1409.851788] Stack:
[ 1409.854095]  ffffffff00000002 ffff8800785b0100 0000000000000000 
ffff88085f203a20
[ 1409.862641]  ffff88085ae2f700 ffff880855e16428 ffff88085f203a90 
0000000000000002
[ 1409.871184]  00000000ffffffff ffff880855e16428 ffffffff81493a4e 
ffff880859d699d8
[ 1409.879736] Call Trace:
[ 1409.882539]  <IRQ>
[ 1409.884751]  [<ffffffff81493a4e>] ? nft_lookup_eval+0x2e/0x80
[ 1409.891561]  [<ffffffff8148b089>] ? nft_do_chain+0xc9/0x400
[ 1409.897959]  [<ffffffff814804ae>] ? __qdisc_run+0x3e/0x1b0
[ 1409.904249]  [<ffffffff8145dd52>] ? __dev_queue_xmit+0x212/0x4d0
[ 1409.911147]  [<ffffffff814cca65>] ? arp_xmit+0x25/0xa0
[ 1409.917045]  [<ffffffff814ccb07>] ? arp_send_dst.part.19+0x27/0x50
[ 1409.924141]  [<ffffffff814cd493>] ? arp_solicit+0x103/0x240
[ 1409.930540]  [<ffffffff814d9924>] ? fib_validate_source+0x124/0x350
[ 1409.937732]  [<ffffffff8146b1f0>] ? __neigh_event_send+0x50/0x230
[ 1409.944729]  [<ffffffff8146c0c4>] ? neigh_resolve_output+0x114/0x1a0
[ 1409.952027]  [<ffffffff8149f615>] ? ip_finish_output2+0x135/0x2e0
[ 1409.959027]  [<ffffffff810a1aa3>] ? update_group_capacity+0x23/0x1c0
[ 1409.966328]  [<ffffffff814e6f1c>] ? nft_do_chain_ipv4+0x8c/0xa0
[ 1409.973119]  [<ffffffff81487ba4>] ? nf_iterate+0x54/0x70
[ 1409.979217]  [<ffffffff81487c1d>] ? nf_hook_slow+0x5d/0xb0
[ 1409.985518]  [<ffffffff8149c8b1>] ? ip_rcv+0x2e1/0x370
[ 1409.991420]  [<ffffffff8149c0b0>] ? ip_local_deliver_finish+0xd0/0xd0
[ 1409.998818]  [<ffffffff8145a166>] ? __netif_receive_skb_core+0x3f6/0x790
[ 1410.006516]  [<ffffffff8145a57f>] ? netif_receive_skb_internal+0x1f/0x80
[ 1410.014215]  [<ffffffff8145ab3b>] ? napi_gro_receive+0xbb/0x110
[ 1410.021009]  [<ffffffff813c99b5>] ? i40e_napi_poll+0x7f5/0x1010
[ 1410.034501]  [<ffffffff8145e796>] ? net_rx_action+0x1b6/0x2f0
[ 1410.047758]  [<ffffffff81539ae0>] ? __do_softirq+0x100/0x288
[ 1410.060885]  [<ffffffff81075550>] ? irq_exit+0x80/0x90
[ 1410.073235]  [<ffffffff8153982f>] ? do_IRQ+0x4f/0xd0
[ 1410.085168]  [<ffffffff81537efc>] ? common_interrupt+0x7c/0x7c
[ 1410.098089]  <EOI>
[ 1410.100301]  [<ffffffff81423745>] ? cpuidle_enter_state+0x145/0x2a0
[ 1410.120442]  [<ffffffff81423721>] ? cpuidle_enter_state+0x121/0x2a0
[ 1410.133960]  [<ffffffff810a90e5>] ? cpu_startup_entry+0x2e5/0x320
[ 1410.147132]  [<ffffffff818f0e17>] ? start_kernel+0x3f9/0x401
[ 1410.159720] Code: 7f 08 4d 85 ff 75 d0 4d 85 ed 0f 84 9f 00 00 00 41 f6 84 
24 90 00 00 00 04 0f 84 90 00 00 00 4c 89 e8 0f b6 0c 24 84 48 18 74 49 <4d> 8b 
7f 10 eb a1 4d 85 ed 4d 8b 47 10 74 23 41 0f b6 45 19 48
[ 1410.194716] RIP  [<ffffffff81495de9>] nft_rbtree_lookup+0xa9/0x150
[ 1410.208085]  RSP <ffff88085f2039c8>
[ 1410.218333] CR2: 0000000000000010
[ 1410.228391] ---[ end trace d872214fea68c281 ]---
[ 1410.241846] Kernel panic - not syncing: Fatal exception in interrupt

I have narrowed the rule set in use down to:

table ip filter {
        set bogons {
                type ipv4_addr
                flags interval
        }

        chain prerouting {
                type filter hook prerouting priority -300; policy accept;
                iif lo accept
                ip daddr @bogons ip daddr != 224.0.0.0/4 log prefix "Bogon" 
group 0 snaplen 80 counter packets 0 bytes 0 drop
                ip saddr @bogons log prefix "Bogon" group 0 snaplen 80 counter 
packets 0 bytes 0 drop
        }
}

With the following shell code, the box will crash quite quickly (within
seconds) during the "nft delete element" part:

I=1
while : ; do
        echo -n "${I} add"
        nft add element ip filter bogons { 0.0.0.0/8 }
        echo -n " delete"
        nft delete element ip filter bogons { 0.0.0.0/8 }
        echo
        I=$[${I}+1]
done

Traffic to/from the box is limited to the ssh connection used to run
the shell code above and some broadcast on the network segment.

Dump of assembler code for function nft_rbtree_lookup:
   0xffffffff81495d40 <+0>:     callq  0xffffffff81539530 <__fentry__>
   0xffffffff81495d45 <+5>:     push   %r15
   0xffffffff81495d47 <+7>:     mov    $0x1,%r15d
   0xffffffff81495d4d <+13>:    push   %r14
   0xffffffff81495d4f <+15>:    mov    %rsi,%r14
   0xffffffff81495d52 <+18>:    push   %r13
   0xffffffff81495d54 <+20>:    xor    %r13d,%r13d
   0xffffffff81495d57 <+23>:    push   %r12
   0xffffffff81495d59 <+25>:    mov    %rdi,%r12
   0xffffffff81495d5c <+28>:    push   %rbp
   0xffffffff81495d5d <+29>:    push   %rbx
   0xffffffff81495d5e <+30>:    sub    $0x20,%rsp
   0xffffffff81495d62 <+34>:    mov    0x88(%rdi),%rax
   0xffffffff81495d69 <+41>:    mov    $0xffffffff81a7b6b0,%rdi
   0xffffffff81495d70 <+48>:    mov    %rdx,0x18(%rsp)
   0xffffffff81495d75 <+53>:    movzbl 0xeec(%rax),%ecx
   0xffffffff81495d7c <+60>:    shl    %cl,%r15d
   0xffffffff81495d7f <+63>:    mov    %r15d,(%rsp)
   0xffffffff81495d83 <+67>:    callq  0xffffffff81537280 <_raw_spin_lock_bh>
   0xffffffff81495d88 <+72>:    mov    0x98(%r12),%r15
   0xffffffff81495d90 <+80>:    test   %r15,%r15
   0xffffffff81495d93 <+83>:    je     0xffffffff81495dc5 
<nft_rbtree_lookup+133>
   0xffffffff81495d95 <+85>:    movzbl 0x19(%r15),%eax
   0xffffffff81495d9a <+90>:    mov    %r14,%rsi
   0xffffffff81495d9d <+93>:    movzbl 0x92(%r12),%ebp
   0xffffffff81495da6 <+102>:   lea    0x18(%r15,%rax,1),%rbx
   0xffffffff81495dab <+107>:   mov    %rbp,%rdx
   0xffffffff81495dae <+110>:   mov    %rbx,%rdi
   0xffffffff81495db1 <+113>:   callq  0xffffffff81299680 <memcmp>
   0xffffffff81495db6 <+118>:   test   %eax,%eax
   0xffffffff81495db8 <+120>:   js     0xffffffff81495def 
<nft_rbtree_lookup+175>
   0xffffffff81495dba <+122>:   je     0xffffffff81495e26 
<nft_rbtree_lookup+230>
   0xffffffff81495dbc <+124>:   mov    0x8(%r15),%r15
   0xffffffff81495dc0 <+128>:   test   %r15,%r15
   0xffffffff81495dc3 <+131>:   jne    0xffffffff81495d95 <nft_rbtree_lookup+85>
   0xffffffff81495dc5 <+133>:   test   %r13,%r13
   0xffffffff81495dc8 <+136>:   je     0xffffffff81495e6d 
<nft_rbtree_lookup+301>
   0xffffffff81495dce <+142>:   testb  $0x4,0x90(%r12)
   0xffffffff81495dd7 <+151>:   je     0xffffffff81495e6d 
<nft_rbtree_lookup+301>
   0xffffffff81495ddd <+157>:   mov    %r13,%rax
   0xffffffff81495de0 <+160>:   movzbl (%rsp),%ecx
   0xffffffff81495de4 <+164>:   test   %cl,0x18(%rax)
   0xffffffff81495de7 <+167>:   je     0xffffffff81495e32 
<nft_rbtree_lookup+242>
>  0xffffffff81495de9 <+169>:   mov    0x10(%r15),%r15
   0xffffffff81495ded <+173>:   jmp    0xffffffff81495d90 <nft_rbtree_lookup+80>
   0xffffffff81495def <+175>:   test   %r13,%r13
   0xffffffff81495df2 <+178>:   mov    0x10(%r15),%r8
   0xffffffff81495df6 <+182>:   je     0xffffffff81495e1b 
<nft_rbtree_lookup+219>
   0xffffffff81495df8 <+184>:   movzbl 0x19(%r13),%eax
   0xffffffff81495dfd <+189>:   mov    %rbp,%rdx
   0xffffffff81495e00 <+192>:   mov    %rbx,%rdi
   0xffffffff81495e03 <+195>:   mov    %r8,0x10(%rsp)
   0xffffffff81495e08 <+200>:   lea    0x18(%r13,%rax,1),%rsi
   0xffffffff81495e0d <+205>:   callq  0xffffffff81299680 <memcmp>
   0xffffffff81495e12 <+210>:   mov    0x10(%rsp),%r8
   0xffffffff81495e17 <+215>:   test   %eax,%eax
   0xffffffff81495e19 <+217>:   je     0xffffffff81495e1e 
<nft_rbtree_lookup+222>
   0xffffffff81495e1b <+219>:   mov    %r15,%r13
   0xffffffff81495e1e <+222>:   mov    %r8,%r15
   0xffffffff81495e21 <+225>:   jmpq   0xffffffff81495d90 <nft_rbtree_lookup+80>
   0xffffffff81495e26 <+230>:   mov    %r15,%rax
   0xffffffff81495e29 <+233>:   movzbl (%rsp),%ecx
   0xffffffff81495e2d <+237>:   test   %cl,0x18(%rax)
   0xffffffff81495e30 <+240>:   jne    0xffffffff81495de9 
<nft_rbtree_lookup+169>
   0xffffffff81495e32 <+242>:   movzbl 0x1b(%rax),%edx
   0xffffffff81495e36 <+246>:   lea    0x18(%rax),%rbx
   0xffffffff81495e3a <+250>:   test   %dl,%dl
   0xffffffff81495e3c <+252>:   je     0xffffffff81495e45 
<nft_rbtree_lookup+261>
   0xffffffff81495e3e <+254>:   testb  $0x1,0x18(%rax,%rdx,1)
   0xffffffff81495e43 <+259>:   jne    0xffffffff81495e6d 
<nft_rbtree_lookup+301>
   0xffffffff81495e45 <+261>:   mov    $0xffffffff81a7b6b0,%rdi
   0xffffffff81495e4c <+268>:   callq  0xffffffff81537240 <_raw_spin_unlock_bh>
   0xffffffff81495e51 <+273>:   mov    0x18(%rsp),%rax
   0xffffffff81495e56 <+278>:   mov    %rbx,(%rax)
   0xffffffff81495e59 <+281>:   add    $0x20,%rsp
   0xffffffff81495e5d <+285>:   mov    $0x1,%eax
   0xffffffff81495e62 <+290>:   pop    %rbx
   0xffffffff81495e63 <+291>:   pop    %rbp
   0xffffffff81495e64 <+292>:   pop    %r12
   0xffffffff81495e66 <+294>:   pop    %r13
   0xffffffff81495e68 <+296>:   pop    %r14
   0xffffffff81495e6a <+298>:   pop    %r15
   0xffffffff81495e6c <+300>:   retq
   0xffffffff81495e6d <+301>:   mov    $0xffffffff81a7b6b0,%rdi
   0xffffffff81495e74 <+308>:   callq  0xffffffff81537240 <_raw_spin_unlock_bh>
   0xffffffff81495e79 <+313>:   add    $0x20,%rsp
   0xffffffff81495e7d <+317>:   xor    %eax,%eax
   0xffffffff81495e7f <+319>:   pop    %rbx
   0xffffffff81495e80 <+320>:   pop    %rbp
   0xffffffff81495e81 <+321>:   pop    %r12
   0xffffffff81495e83 <+323>:   pop    %r13
   0xffffffff81495e85 <+325>:   pop    %r14
   0xffffffff81495e87 <+327>:   pop    %r15
   0xffffffff81495e89 <+329>:   retq
End of assembler dump.

Regards,
Anders K. Pedersen
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to