[Bug 1096] New: Kernel oops when inserting an element into a map
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Fri Oct 28 14:30:37 CEST 2016
https://bugzilla.netfilter.org/show_bug.cgi?id=1096
Bug ID: 1096
Summary: Kernel oops when inserting an element into a map
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: critical
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
Reporter: dalegaard at gmail.com
Created attachment 485
--> https://bugzilla.netfilter.org/attachment.cgi?id=485&action=edit
dmesg log from kernel oops
The following ruleset, when loaded with 'nft -f bad.txt', results in a kernel
oops:
----snip----
flush ruleset
table ip inlinenat {
map sourcemap {
type ipv4_addr : verdict;
}
chain postrouting {
ip saddr vmap @sourcemap accept
}
}
add chain inlinenat test
add element inlinenat sourcemap { 100.123.10.2 : jump test }
----snip----
If the element and chain are inserted as part of the table statement everything
works:
----snip----
flush ruleset
table ip inlinenat {
map sourcemap {
type ipv4_addr : verdict;
elements = {
0.0.0.0 : jump test
}
}
chain test {
}
chain postrouting {
ip saddr vmap @sourcemap accept
}
}
----snip----
However, adding another element afterwards will then fail just as in the first
case.
A dmesg log from the oops is attached. I can reproduce this 100% of the time on
Arch Linux running kernel:
Linux dalegaard-t460s 4.8.4-1-ARCH #1 SMP PREEMPT x86_64 GNU/Linux
nft version is 0.6.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20161028/da8179bd/attachment.html>
More information about the netfilter-buglog
mailing list