diff options
author | Hans Schillstrom <hans@schillstrom.com> | 2013-05-15 01:23:45 +0000 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2013-05-15 14:11:07 +0200 |
commit | 8cdb46da06ea94543a3b2e53e3e92736421d1093 (patch) | |
tree | 2f3d5703ee736daf10a3556c5c80f6bcca8731b8 /net/netlabel/Kconfig | |
parent | 42010ed0c669aeb1c5b015f5edf590c73919380c (diff) | |
download | linux-exynos-8cdb46da06ea94543a3b2e53e3e92736421d1093.tar.gz linux-exynos-8cdb46da06ea94543a3b2e53e3e92736421d1093.tar.bz2 linux-exynos-8cdb46da06ea94543a3b2e53e3e92736421d1093.zip |
netfilter: log: netns NULL ptr bug when calling from conntrack
Since (69b34fb netfilter: xt_LOG: add net namespace support
for xt_LOG), we hit this:
[ 4224.708977] BUG: unable to handle kernel NULL pointer dereference at 0000000000000388
[ 4224.709074] IP: [<ffffffff8147f699>] ipt_log_packet+0x29/0x270
when callling log functions from conntrack both in and out
are NULL i.e. the net pointer is invalid.
Adding struct net *net in call to nf_logfn() will secure that
there always is a vaild net ptr.
Reported as netfilter's bugzilla bug 818:
https://bugzilla.netfilter.org/show_bug.cgi?id=818
Reported-by: Ronald <ronald645@gmail.com>
Signed-off-by: Hans Schillstrom <hans@schillstrom.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/netlabel/Kconfig')
0 files changed, 0 insertions, 0 deletions