<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_NEW "
title="NEW - multicast and NOTRACK segfaults"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1491">1491</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>multicast and NOTRACK segfaults
</td>
</tr>
<tr>
<th>Product</th>
<td>conntrack-tools
</td>
</tr>
<tr>
<th>Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th>Hardware</th>
<td>x86_64
</td>
</tr>
<tr>
<th>OS</th>
<td>All
</td>
</tr>
<tr>
<th>Status</th>
<td>NEW
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>P5
</td>
</tr>
<tr>
<th>Component</th>
<td>conntrack-daemon
</td>
</tr>
<tr>
<th>Assignee</th>
<td>netfilter-buglog@lists.netfilter.org
</td>
</tr>
<tr>
<th>Reporter</th>
<td>arturo@netfilter.org
</td>
</tr></table>
<p>
<div>
<pre>I can get a reproducible segfault using this config file:
Sync {
Mode NOTRACK {
}
Multicast {
IPv4_address 225.0.0.50
Group 3780
IPv4_interface 10.239.43.214
Interface wlp4s0
SndSocketBuffer 1249280
RcvSocketBuffer 1249280
Checksum on
}
Options {
# TCPWindowTracking On
# ExpectationSync On
}
}
General {
# HashLimit 524288
LogFile on
Syslog on
LockFile /var/lock/conntrackd.lock
UNIX {
Path /var/run/conntrackd.sock
}
NetlinkBufferSize 2097152
NetlinkBufferSizeMaxGrowth 8388608
Filter From Userspace {
Address Ignore {
IPv4_address 127.0.0.0/8
}
}
}
This is with commit 7f1fb5dad90f04caa94f4fcefd1340aeb2c2f0e3
But I detected the issue even earlier in the git history.
Valgrind report:
==62735== Process terminating with default action of signal 11 (SIGSEGV)
==62735== Access not within mapped region at address 0x10
==62735== at 0x11882F: cache_ct_cmp (cache-ct.c:104)
==62735== by 0x1133C1: hashtable_find (hash.c:74)
==62735== by 0x117E7A: cache_find (cache.c:304)
==62735== by 0x117E7A: cache_update_force (cache.c:279)
==62735== by 0x119D57: dump_handler (ctnl.c:266)
==62735== by 0x119D57: dump_handler (ctnl.c:257)
==62735== by 0x4871BBB: __callback (callback.c:62)
==62735== by 0x4AA205B: ??? (in
/usr/lib/x86_64-linux-gnu/libnfnetlink.so.0.2.0)
==62735== by 0x4AA2822: nfnl_process (in
/usr/lib/x86_64-linux-gnu/libnfnetlink.so.0.2.0)
==62735== by 0x4AA2B8D: nfnl_catch (in
/usr/lib/x86_64-linux-gnu/libnfnetlink.so.0.2.0)
==62735== by 0x4872A8F: nfct_query (api.c:1003)
==62735== by 0x119FBF: ctnl_init (ctnl.c:456)
==62735== by 0x113284: init (run.c:307)
==62735== by 0x111F0D: main (main.c:366)</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>