From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754764Ab1LVPyP (ORCPT ); Thu, 22 Dec 2011 10:54:15 -0500 Received: from yuna.grokhost.net ([87.117.228.63]:60001 "EHLO yuna.grokhost.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752407Ab1LVPyO (ORCPT ); Thu, 22 Dec 2011 10:54:14 -0500 Message-ID: <4EF352A2.2090604@bootc.net> Date: Thu, 22 Dec 2011 15:54:10 +0000 From: Chris Boot User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:8.0) Gecko/20111105 Thunderbird/8.0 MIME-Version: 1.0 To: Eric Dumazet CC: David Miller , lkml , netdev , Steffen Klassert Subject: Re: BUG: unable to handle kernel NULL pointer dereference in ipv6_select_ident References: <4EF200BB.7000209@bootc.net> <1324484956.2301.24.camel@edumazet-HP-Compaq-6005-Pro-SFF-PC> <4EF2117F.6000803@bootc.net> <1324488984.2301.45.camel@edumazet-HP-Compaq-6005-Pro-SFF-PC> <1324490401.2301.46.camel@edumazet-HP-Compaq-6005-Pro-SFF-PC> <4EF23BF2.4000601@bootc.net> <1324499332.2621.7.camel@edumazet-laptop> <1324500775.2621.9.camel@edumazet-laptop> <4EF2568C.6040006@bootc.net> <1324528656.2621.19.camel@edumazet-laptop> <4EF300B2.3050903@bootc.net> <1324563353.2153.27.camel@edumazet-HP-Compaq-6005-Pro-SFF-PC> In-Reply-To: <1324563353.2153.27.camel@edumazet-HP-Compaq-6005-Pro-SFF-PC> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22/12/2011 14:15, Eric Dumazet wrote: > Le jeudi 22 décembre 2011 à 10:04 +0000, Chris Boot a écrit : > >> Eric, >> >> So far so good. I've had this running for several hours this morning >> with more of the prodding that would normally have crashed it, both IPv4 >> and IPv6, and it's holding up well. >> > Thanks for testing. > > Here is the official patch then (the .mtu() bit belongs to a separate > patch) > > [PATCH] net: introduce DST_NOPEER dst flag > > Chris Boot reported crashes occurring in ipv6_select_ident(). > > [ 461.457562] RIP: 0010:[] [] > ipv6_select_ident+0x31/0xa7 > > [ 461.578229] Call Trace: > [ 461.580742] > [ 461.582870] [] ? udp6_ufo_fragment+0x124/0x1a2 > [ 461.589054] [] ? ipv6_gso_segment+0xc0/0x155 > [ 461.595140] [] ? skb_gso_segment+0x208/0x28b > [ 461.601198] [] ? ipv6_confirm+0x146/0x15e > [nf_conntrack_ipv6] > [ 461.608786] [] ? nf_iterate+0x41/0x77 > [ 461.614227] [] ? dev_hard_start_xmit+0x357/0x543 > [ 461.620659] [] ? nf_hook_slow+0x73/0x111 > [ 461.626440] [] ? br_parse_ip_options+0x19a/0x19a > [bridge] > [ 461.633581] [] ? dev_queue_xmit+0x3af/0x459 > [ 461.639577] [] ? br_dev_queue_push_xmit+0x72/0x76 > [bridge] > [ 461.646887] [] ? br_nf_post_routing+0x17d/0x18f > [bridge] > [ 461.653997] [] ? nf_iterate+0x41/0x77 > [ 461.659473] [] ? br_flood+0xfa/0xfa [bridge] > [ 461.665485] [] ? nf_hook_slow+0x73/0x111 > [ 461.671234] [] ? br_flood+0xfa/0xfa [bridge] > [ 461.677299] [] ? > nf_bridge_update_protocol+0x20/0x20 [bridge] > [ 461.684891] [] ? nf_ct_zone+0xa/0x17 [nf_conntrack] > [ 461.691520] [] ? br_flood+0xfa/0xfa [bridge] > [ 461.697572] [] ? NF_HOOK.constprop.8+0x3c/0x56 > [bridge] > [ 461.704616] [] ? > nf_bridge_push_encap_header+0x1c/0x26 [bridge] > [ 461.712329] [] ? br_nf_forward_finish+0x8a/0x95 > [bridge] > [ 461.719490] [] ? > nf_bridge_pull_encap_header+0x1c/0x27 [bridge] > [ 461.727223] [] ? br_nf_forward_ip+0x1c0/0x1d4 [bridge] > [ 461.734292] [] ? nf_iterate+0x41/0x77 > [ 461.739758] [] ? __br_deliver+0xa0/0xa0 [bridge] > [ 461.746203] [] ? nf_hook_slow+0x73/0x111 > [ 461.751950] [] ? __br_deliver+0xa0/0xa0 [bridge] > [ 461.758378] [] ? NF_HOOK.constprop.4+0x56/0x56 > [bridge] > > This is caused by bridge netfilter special dst_entry (fake_rtable), a > special shared entry, where attaching an inetpeer makes no sense. > > Problem is present since commit 87c48fa3b46 (ipv6: make fragment > identifications less predictable) > > Introduce DST_NOPEER dst flag and make sure ipv6_select_ident() and > __ip_select_ident() fallback to the 'no peer attached' handling. > > Reported-by: Chris Boot > Tested-by: Chris Boot > Signed-off-by: Eric Dumazet > --- > include/net/dst.h | 1 + > net/bridge/br_netfilter.c | 2 +- > net/ipv4/route.c | 4 ++-- > net/ipv6/ip6_output.c | 2 +- > 4 files changed, 5 insertions(+), 4 deletions(-) > > diff --git a/include/net/dst.h b/include/net/dst.h > index 6faec1a..75766b4 100644 > --- a/include/net/dst.h > +++ b/include/net/dst.h > @@ -53,6 +53,7 @@ struct dst_entry { > #define DST_NOHASH 0x0008 > #define DST_NOCACHE 0x0010 > #define DST_NOCOUNT 0x0020 > +#define DST_NOPEER 0x0040 > > short error; > short obsolete; > diff --git a/net/bridge/br_netfilter.c b/net/bridge/br_netfilter.c > index d6ec372..5693e5f 100644 > --- a/net/bridge/br_netfilter.c > +++ b/net/bridge/br_netfilter.c > @@ -141,7 +141,7 @@ void br_netfilter_rtable_init(struct net_bridge *br) > rt->dst.dev = br->dev; > rt->dst.path =&rt->dst; > dst_init_metrics(&rt->dst, br_dst_default_metrics, true); > - rt->dst.flags = DST_NOXFRM; > + rt->dst.flags = DST_NOXFRM | DST_NOPEER; > rt->dst.ops =&fake_dst_ops; > } > > diff --git a/net/ipv4/route.c b/net/ipv4/route.c > index 252c512..a5004f1 100644 > --- a/net/ipv4/route.c > +++ b/net/ipv4/route.c > @@ -1366,7 +1366,7 @@ void __ip_select_ident(struct iphdr *iph, struct dst_entry *dst, int more) > { > struct rtable *rt = (struct rtable *) dst; > > - if (rt) { > + if (rt&& !(rt->dst.flags& DST_NOPEER)) { > if (rt->peer == NULL) > rt_bind_peer(rt, rt->rt_dst, 1); > > @@ -1377,7 +1377,7 @@ void __ip_select_ident(struct iphdr *iph, struct dst_entry *dst, int more) > iph->id = htons(inet_getid(rt->peer, more)); > return; > } > - } else > + } else if (!rt) > printk(KERN_DEBUG "rt_bind_peer(0) @%p\n", > __builtin_return_address(0)); > > diff --git a/net/ipv6/ip6_output.c b/net/ipv6/ip6_output.c > index 84d0bd5..ec56271 100644 > --- a/net/ipv6/ip6_output.c > +++ b/net/ipv6/ip6_output.c > @@ -603,7 +603,7 @@ void ipv6_select_ident(struct frag_hdr *fhdr, struct rt6_info *rt) > static atomic_t ipv6_fragmentation_id; > int old, new; > > - if (rt) { > + if (rt&& !(rt->dst.flags& DST_NOPEER)) { > struct inet_peer *peer; > > if (!rt->rt6i_peer) > > Eric, I'm seeing a new problem now with IPv6 on my bridge, I don't know if it's related to any of the patches you gave me. Basically, I have eth0 and eth1 in a balance-rr bond (bond0), and this is added as a port in a bridge. When the bond and bridge are freshly brought up, IPv4 works fine but it appears to be deaf to IPv6 traffic. It stays this way until I run 'tcpdump -i eth0' and 'tcpdump -i eth1'. If I run tcpdump with the -p flag to not enable promiscuous mode, the interfaces remain deaf. Only if they enter promiscuous mode do they start to listen to each other. It also doesn't help to run tcpdump against bond0 or br0 at all. I'm not sure if once I've killed tcpdump they become deaf again, but I have enough IPv6 traffic to keep the neighbour entry alive. Cheers, Chris -- Chris Boot bootc@bootc.net