Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2576173imm; Sun, 19 Aug 2018 00:07:12 -0700 (PDT) X-Google-Smtp-Source: AA+uWPw+hsoKq+9vhFLwU6yd1lhSgguwP7AY3+xsA9LbHpantlCLSjID2M3rzFXEDvg38mhVS67O X-Received: by 2002:a63:a919:: with SMTP id u25-v6mr39675579pge.211.1534662432496; Sun, 19 Aug 2018 00:07:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534662432; cv=none; d=google.com; s=arc-20160816; b=V2oTKdjvRLBlphGuDSPdlIv/9H9sOILUI9gcnU2kNebzlaD9pNy7X8jr8zWpQGiix7 Egpn2j3ISC4aD9pDi9St03cWvAd6Jkm4cLW3AFXrzozpDX+d43J/YF+zWuJoS8/l93nf K2PWA8FHujpw4jFA8h/do3LD+lalIplFx80hkcfXB71Xd1bvmzAohpwVaBgOoGWqpGL/ dcpZRBkQ5VammjIfPaAPR0VYqFHviisUhBaWR//hYtKu3w4pjgHfrM96T/9H7Ykbs2xQ UilyE2XI/tFBKgOsoEOABO+g6PDM0qq4iBhraF+DshQgLygoxMo7GJ5alwWILY3xEoUJ KiZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=4bdEm/40bU80Hc3BBAkl1URfXWlQBivf2io/bIE0GfU=; b=TVDBBkhkOQmH4RT2RaxigwIs7MLMBQIZIXhtXDceXAgPl+Jn/mLzaa1s9uqQy0dmkb Jix+QR8yac9uO9vu5Bmv6w0xn35E3NPQG9iehB+GVNpG5r1qz9BPOZxr6aKIY1TygwOc 5+ELh3197x5O0mU/HCWFj3dLwxNN4nqcJ8sNhTxjruV3+umkl6dtlbIKDKkDEUxPD39g lOt+Xh2Evr4yj7A+96MR4jnRBfyQQg6mJhg3LdAR5GFlKOO70TzkVd8QpD+QGcA7e2IY /uNAAJDvmB02qnQFOsheWemSccbYnWHjTUmjBbY4x1NE6Chd5yBtJL5bMtXzTp+RY4WU He6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 8-v6si6311792pgu.519.2018.08.19.00.06.57; Sun, 19 Aug 2018 00:07:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726461AbeHSKQR (ORCPT + 99 others); Sun, 19 Aug 2018 06:16:17 -0400 Received: from cmccmta3.chinamobile.com ([221.176.66.81]:36628 "EHLO cmccmta3.chinamobile.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725885AbeHSKQR (ORCPT ); Sun, 19 Aug 2018 06:16:17 -0400 Received: from spf.mail.chinamobile.com (unknown[172.16.121.7]) by rmmx-syy-dmz-app11-12011 (RichMail) with SMTP id 2eeb5b7916c0988-54444; Sun, 19 Aug 2018 15:05:40 +0800 (CST) X-RM-TRANSID: 2eeb5b7916c0988-54444 X-RM-TagInfo: emlType=0 X-RM-SPAM-FLAG: 00000000 Received: from localhost (unknown[223.105.0.240]) by rmsmtp-syy-appsvr04-12004 (RichMail) with SMTP id 2ee45b7916c295e-d86d8; Sun, 19 Aug 2018 15:05:39 +0800 (CST) X-RM-TRANSID: 2ee45b7916c295e-d86d8 From: Haishuang Yan To: Steffen Klassert , "David S. Miller" , Alexey Kuznetsov Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Haishuang Yan , Eric Dumazet Subject: [PATCH 1/2] ip_vti: fix a null pointer deferrence when create vti fallback tunnel Date: Sun, 19 Aug 2018 15:05:04 +0800 Message-Id: <1534662305-16734-1-git-send-email-yanhaishuang@cmss.chinamobile.com> X-Mailer: git-send-email 1.8.3.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After set fb_tunnels_only_for_init_net to 1, the itn->fb_tunnel_dev will be NULL and will cause following crash: [ 2742.849298] BUG: unable to handle kernel NULL pointer dereference at 0000000000000941 [ 2742.851380] PGD 800000042c21a067 P4D 800000042c21a067 PUD 42aaed067 PMD 0 [ 2742.852818] Oops: 0002 [#1] SMP PTI [ 2742.853570] CPU: 7 PID: 2484 Comm: unshare Kdump: loaded Not tainted 4.18.0-rc8+ #2 [ 2742.855163] Hardware name: Fedora Project OpenStack Nova, BIOS seabios-1.7.5-11.el7 04/01/2014 [ 2742.856970] RIP: 0010:vti_init_net+0x3a/0x50 [ip_vti] [ 2742.858034] Code: 90 83 c0 48 c7 c2 20 a1 83 c0 48 89 fb e8 6e 3b f6 ff 85 c0 75 22 8b 0d f4 19 00 00 48 8b 93 00 14 00 00 48 8b 14 ca 48 8b 12 82 41 09 00 00 04 c6 82 38 09 00 00 45 5b c3 66 0f 1f 44 00 00 [ 2742.861940] RSP: 0018:ffff9be28207fde0 EFLAGS: 00010246 [ 2742.863044] RAX: 0000000000000000 RBX: ffff8a71ebed4980 RCX: 0000000000000013 [ 2742.864540] RDX: 0000000000000000 RSI: 0000000000000013 RDI: ffff8a71ebed4980 [ 2742.866020] RBP: ffff8a71ea717000 R08: ffffffffc083903c R09: ffff8a71ea717000 [ 2742.867505] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8a71ebed4980 [ 2742.868987] R13: 0000000000000013 R14: ffff8a71ea5b49c0 R15: 0000000000000000 [ 2742.870473] FS: 00007f02266c9740(0000) GS:ffff8a71ffdc0000(0000) knlGS:0000000000000000 [ 2742.872143] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2742.873340] CR2: 0000000000000941 CR3: 000000042bc20006 CR4: 00000000001606e0 [ 2742.874821] Call Trace: [ 2742.875358] ops_init+0x38/0xf0 [ 2742.876078] setup_net+0xd9/0x1f0 [ 2742.876789] copy_net_ns+0xb7/0x130 [ 2742.877538] create_new_namespaces+0x11a/0x1d0 [ 2742.878525] unshare_nsproxy_namespaces+0x55/0xa0 [ 2742.879526] ksys_unshare+0x1a7/0x330 [ 2742.880313] __x64_sys_unshare+0xe/0x20 [ 2742.881131] do_syscall_64+0x5b/0x180 [ 2742.881933] entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reproduce: echo 1 > /proc/sys/net/core/fb_tunnels_only_for_init_net modprobe ip_vti unshare -n Fixes: 79134e6ce2c9 (net: do not create fallback tunnels for non-default namespaces) Cc: Eric Dumazet Signed-off-by: Haishuang Yan --- net/ipv4/ip_vti.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/ipv4/ip_vti.c b/net/ipv4/ip_vti.c index 3f091cc..f38cb21 100644 --- a/net/ipv4/ip_vti.c +++ b/net/ipv4/ip_vti.c @@ -438,7 +438,8 @@ static int __net_init vti_init_net(struct net *net) if (err) return err; itn = net_generic(net, vti_net_id); - vti_fb_tunnel_init(itn->fb_tunnel_dev); + if (itn->fb_tunnel_dev) + vti_fb_tunnel_init(itn->fb_tunnel_dev); return 0; } -- 1.8.3.1