Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3206760yba; Mon, 6 May 2019 19:36:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqzpIBRUvUwtjVUzY4HLaxYVrA9e3QwYkYma08cJjtXU89m4ST1tDdlS38+jqWQOr1DrutGG X-Received: by 2002:aa7:8dc3:: with SMTP id j3mr37900033pfr.141.1557196591298; Mon, 06 May 2019 19:36:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557196591; cv=none; d=google.com; s=arc-20160816; b=zY66XmTsTpY7CBj37vbIWYZO+eJ2GU63gFFHPpg7xBsnBnNjXdNEaNYW+aNpxyal9U Smh+8dgj0qmowhjK3/IeUBDUFn1SpNe+Bjdx4gxypcPC+SYb+/d/uVddLH+kTWTKD7yp gHrgZANbp2qxWv3V2qtfVkVfvvft3Vt8Z+p2+CVlmskCKrDgheK1LBR1hZSjyx2VKVne kUZALLNnKprTuzkKYSOcA2ralJqQUbNiNYlrEZWy02FE9M5qOkwvK5d2gXS0OtXa+1+T lGbt9iBwgvd/UcixEnHPZd67qaByyj6lJXSHZkUo3yhkKpKBr3vRw6LV/SJCALsXBXwx 4q8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject :from:cc:to; bh=LUDVhapPv2+vIGO4OxIHd3K/s9ulep+avOFAkw/aI9o=; b=w8EVKAlvkZ73h5NfBlLBJEEIW6MmpB9G3ZA8PpuuEO9Le5gUBxheJeSi2+FZuOuRIp ZtcfqvQXLtM4wDivZ67nSdw7CA90hxF6xfweW/AtbqXQEg7XY/xnoIfGaVgj5NC6fmzP kzJ61G3hqQ6WrM8eRk01c1AiBP+hrF9SSLu9EU8qXrTOiLs1IJPXj6zB/Z0rxVJbSFup gIhOnxNqPLsb229Qn5sfYOB/ewple4jzzQcGeTr1Bat+Iqllw2CqULg/OMBv5hqYBmRU K3trsiLgR6zVJ0m/ZpBPTAvupRC1A+G6zS/fOOfww5NOuh5mwENEr0gG4qwCLkIhp/Gl t7Vg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w12si18856561pld.438.2019.05.06.19.36.16; Mon, 06 May 2019 19:36:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726491AbfEGCfV (ORCPT + 99 others); Mon, 6 May 2019 22:35:21 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:7729 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726145AbfEGCfV (ORCPT ); Mon, 6 May 2019 22:35:21 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 2DDAC64E83715B669A24; Tue, 7 May 2019 10:35:18 +0800 (CST) Received: from [127.0.0.1] (10.184.191.73) by DGGEMS402-HUB.china.huawei.com (10.3.19.202) with Microsoft SMTP Server id 14.3.439.0; Tue, 7 May 2019 10:35:07 +0800 To: , , , , , , , "netdev@vger.kernel.org" , , , , "linux-kernel@vger.kernel.org" CC: , , From: hujunwei Subject: Subject: [PATCH netfilter] ipvs: Fix crash when ipv6 route unreach Message-ID: Date: Tue, 7 May 2019 10:34:51 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.184.191.73] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Junwei Hu When Tcp send RST packet in ipvs, crash occurs with the following stack trace: BUG: unable to handle kernel NULL pointer dereference at 0000000000000018 PID: 0 COMMAND: "swapper/2" TASK: ffff9ec83889bf40 (1 of 4) [THREAD_INFO: ffff9ec8388b0000] CPU: 2 STATE: TASK_RUNNING (PANIC) [exception RIP: __ip_vs_get_out_rt_v6+1250] RIP: ffffffffc0d566f2 RSP: ffff9ec83ed03c68 RFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff9ec835e85000 RCX: 000000000005e1f9 RDX: 000000000005e1f8 RSI: 0000000000000200 RDI: ffff9ec83e801b00 RBP: ffff9ec83ed03cd8 R8: 000000000001bb40 R9: ffffffffc0d5673f R10: ffff9ec83ed1bb40 R11: ffffe2d384d4fdc0 R12: ffff9ec7b7ad5900 R13: 0000000000000000 R14: 0000000000000007 R15: ffff9ec8353f7580 ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 [ffff9ec83ed03ce0] ip_vs_fnat_xmit_v6 at ffffffffc0d5b42c [ip_vs] [ffff9ec83ed03d70] tcp_send_rst_ipv6 at ffffffffc0d6542a [ip_vs] [ffff9ec83ed03df8] tcp_conn_expire_handler at ffffffffc0d65823 [ip_vs] [ffff9ec83ed03e20] ip_vs_conn_expire at ffffffffc0d42373 [ip_vs] [ffff9ec83ed03e70] call_timer_fn at ffffffffae0a6b58 [ffff9ec83ed03ea8] run_timer_softirq at ffffffffae0a904d [ffff9ec83ed03f20] __do_softirq at ffffffffae09fa85 [ffff9ec83ed03f90] call_softirq at ffffffffae739dac [ffff9ec83ed03fa8] do_softirq at ffffffffae02e62b [ffff9ec83ed03fc0] irq_exit at ffffffffae09fe25 [ffff9ec83ed03fd8] smp_apic_timer_interrupt at ffffffffae73b158 [ffff9ec83ed03ff0] apic_timer_interrupt at ffffffffae737872 TCP connection timeout and send a RST packet, the skb is alloc by alloc_skb, the pointer skb->dev and skb_dst(skb) is NULL, however, ipv6 route unreach at that time, so go into err_unreach. In err_unreach, crash occurs when skb->dev and skb_dst(skb) is NULL. The code is added by the following patch: commit 326bf17ea5d4 ("ipvs: fix ipv6 route unreach panic") because the ip6_link_failure function requires the skb->dev in icmp6_send with that version. This patch only fix the problem in specific scene, and icmp6_send in current version is robust against null skb->dev by adding the following patch. commit 8d9336704521 ("ipv6: make icmp6_send() robust against null skb->dev") So I delete the code, make __ip_vs_get_out_rt_v6() robust, when skb->dev and skb_dst(skb) is NULL. Fixes: 326bf17ea5d4 ("ipvs: fix ipv6 route unreach panic") Signed-off-by: Junwei Hu Reported-by: Wenhao Zhang --- net/netfilter/ipvs/ip_vs_xmit.c | 7 ------- 1 file changed, 7 deletions(-) diff --git a/net/netfilter/ipvs/ip_vs_xmit.c b/net/netfilter/ipvs/ip_vs_xmit.c index 175349fcf91f..e2bb6c223396 100644 --- a/net/netfilter/ipvs/ip_vs_xmit.c +++ b/net/netfilter/ipvs/ip_vs_xmit.c @@ -561,13 +561,6 @@ __ip_vs_get_out_rt_v6(struct netns_ipvs *ipvs, int skb_af, struct sk_buff *skb, return -1; err_unreach: - /* The ip6_link_failure function requires the dev field to be set - * in order to get the net (further for the sake of fwmark - * reflection). - */ - if (!skb->dev) - skb->dev = skb_dst(skb)->dev; - dst_link_failure(skb); return -1; } -- 2.21.GIT