]> git.ipfire.org Git - thirdparty/nftables.git/commitdiff
cmd: skip variable set elements when collapsing commands
authorPablo Neira Ayuso <pablo@netfilter.org>
Tue, 11 Jun 2024 15:40:23 +0000 (17:40 +0200)
committerPablo Neira Ayuso <pablo@netfilter.org>
Tue, 11 Jun 2024 21:32:56 +0000 (23:32 +0200)
ASAN reports an issue when collapsing commands that represent an element
through a variable:

include/list.h:60:13: runtime error: member access within null pointer of type 'struct list_head'
AddressSanitizer:DEADLYSIGNAL
=================================================================
==11398==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7ffb77cf09c2 bp 0x7ffc818267c0 sp 0x7ffc818267a0 T0)
==11398==The signal is caused by a WRITE memory access.
==11398==Hint: address points to the zero page.
    #0 0x7ffb77cf09c2 in __list_add include/list.h:60
    #1 0x7ffb77cf0ad9 in list_add_tail include/list.h:87
    #2 0x7ffb77cf0e72 in list_move_tail include/list.h:169
    #3 0x7ffb77cf86ad in nft_cmd_collapse src/cmd.c:478
    #4 0x7ffb77da9f16 in nft_evaluate src/libnftables.c:531
    #5 0x7ffb77dac471 in __nft_run_cmd_from_filename src/libnftables.c:720
    #6 0x7ffb77dad703 in nft_run_cmd_from_filename src/libnftables.c:807

Skip such commands to address this issue.

This patch also extends tests/shell to cover for this bug.

Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1754
Fixes: 498a5f0c219d ("rule: collapse set element commands")
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
src/cmd.c
tests/shell/testcases/sets/collapse_elem_0
tests/shell/testcases/sets/dumps/collapse_elem_0.json-nft
tests/shell/testcases/sets/dumps/collapse_elem_0.nft

index d6b1d844ed8dde8dab2dd982987900bcf1cb3e3c..37d93abc2cd4083c7f9c0976f60d604341d720f1 100644 (file)
--- a/src/cmd.c
+++ b/src/cmd.c
@@ -455,6 +455,9 @@ bool nft_cmd_collapse(struct list_head *cmds)
                        continue;
                }
 
+               if (cmd->expr->etype == EXPR_VARIABLE)
+                       continue;
+
                if (!elems) {
                        elems = cmd;
                        continue;
index 7699e9da3e75dd0dc27321ccb2f6a5b9ca589ddd..52a42c2f7305f56f6cb235fefeb2a8218ad8638d 100755 (executable)
@@ -17,3 +17,9 @@ add element ip a x { 2 }
 add element ip6 a x { 2 }"
 
 $NFT -f - <<< $RULESET
+
+RULESET="define m = { 3, 4 }
+add element ip a x \$m
+add element ip a x { 5 }"
+
+$NFT -f - <<< $RULESET
index c713828d2843607677e501c5da3363bf885ace8f..c8ff4347142825acab64277a1f7bfab26c886308 100644 (file)
         "handle": 0,
         "elem": [
           1,
-          2
+          2,
+          3,
+          4,
+          5
         ]
       }
     },
index a3244fc616dee3f73fec2a86060794ad18d92464..775f0ab15d675bceda26f90574ecf605b4b54473 100644 (file)
@@ -1,7 +1,7 @@
 table ip a {
        set x {
                type inet_service
-               elements = { 1, 2 }
+               elements = { 1, 2, 3, 4, 5 }
        }
 }
 table ip6 a {