kern/164402: [pf] pf crashes with a particular set of rules when
first matching packet arrives
Gleb Smirnoff
glebius at FreeBSD.org
Mon Apr 16 18:59:51 UTC 2012
On Sun, Apr 15, 2012 at 12:00:21PM +0000, Gleb Smirnoff wrote:
T> On Sun, Apr 15, 2012 at 11:10:03AM +0000, Gleb Smirnoff wrote:
T> T> I have a vague suspicion on what is happening. Your description of
T> T> the problem looks like if a packet processing in the kernel has entered
T> T> an endless loop.
T> T>
T> T> Looking at pf_route() I see such possibility. From OpenBSD we have
T> T> this protection against endless looping:
T> T>
T> T> if ((*m)->m_pkthdr.pf.routed++ > 3) {
T> T> m0 = *m;
T> T> *m = NULL;
T> T> goto bad;
T> T> }
T> T>
T> T> In our code this transforms to:
T> T>
T> T> if (pd->pf_mtag->routed++ > 3) {
T> T> m0 = *m;
T> T> *m = NULL;
T> T> goto bad;
T> T> }
T> T>
T> T> The root difference between storing the tag on mbuf and on pfdesc
T> T> is that we lose pfdesc, and thus the tag, when we enter pf_test()
T> T> recursively. And pf_route() does this recursion:
T> T>
T> T> if (oifp != ifp) {
T> T> if (pf_test(PF_OUT, ifp, &m0, NULL) != PF_PASS) {
T> T> goto bad;
T> T> ....
T>
T> On second look I see that my suspicion may not be true. In the
T> beginning of pf_test() we do pf_get_mtag() which preserves already
T> present tag if there is one.
Further investigation showed that problem exist when route applied
ends in lo0, and packet passes to if_simloop(). There all mtags are
stripped from the mbuf, including the pf mtag. Then packet is again
processed by ip_input() again entering pf(4), if it again matches
a routing rule, then we got an endless loop.
We can try to fix this applying MTAG_PERSISTENT to the pf(4) tag id.
--
Totus tuus, Glebius.
More information about the freebsd-pf
mailing list