[bpf-next,v2,3/6] netfilter: bpf: Prevent defrag module unload while link active
Commit Message
While in practice we could handle the module being unloaded while a
netfilter link (that requested defrag) was active, it's a better user
experience to prevent the defrag module from going away. It would
violate user expectations if fragmented packets started showing up if
some other part of the system tried to unload defrag module.
Signed-off-by: Daniel Xu <dxu@dxuuu.xyz>
---
include/linux/netfilter.h | 3 +++
net/ipv4/netfilter/nf_defrag_ipv4.c | 1 +
net/ipv6/netfilter/nf_defrag_ipv6_hooks.c | 1 +
net/netfilter/nf_bpf_link.c | 21 +++++++++++++++++++--
4 files changed, 24 insertions(+), 2 deletions(-)
Comments
Daniel Xu <dxu@dxuuu.xyz> wrote:
> + /* Prevent defrag module from going away while in use */
> + if (!try_module_get(v4_hook->owner)) {
> + err = -ENOENT;
> + goto out_v4;
> + }
> +
> err = v4_hook->enable(link->net);
> out_v4:
> rcu_read_unlock();
> @@ -79,6 +86,12 @@ static int bpf_nf_enable_defrag(struct bpf_nf_link *link)
> }
> }
>
> + /* Prevent defrag module from going away while in use */
> + if (!try_module_get(v6_hook->owner)) {
> + err = -ENOENT;
> + goto out_v6;
> + }
> +
> err = v6_hook->enable(link->net);
> out_v6:
> rcu_read_unlock();
This needs module_put() calls in case ->enable() returns an error, no?
Other than this this series LGTM, thanks!
@@ -11,6 +11,7 @@
#include <linux/wait.h>
#include <linux/list.h>
#include <linux/static_key.h>
+#include <linux/module.h>
#include <linux/netfilter_defs.h>
#include <linux/netdevice.h>
#include <linux/sockptr.h>
@@ -482,12 +483,14 @@ struct nfnl_ct_hook {
extern const struct nfnl_ct_hook __rcu *nfnl_ct_hook;
struct nf_defrag_v4_hook {
+ struct module *owner;
int (*enable)(struct net *net);
void (*disable)(struct net *net);
};
extern const struct nf_defrag_v4_hook __rcu *nf_defrag_v4_hook;
struct nf_defrag_v6_hook {
+ struct module *owner;
int (*enable)(struct net *net);
void (*disable)(struct net *net);
};
@@ -115,6 +115,7 @@ static void __net_exit defrag4_net_exit(struct net *net)
}
static const struct nf_defrag_v4_hook defrag_hook = {
+ .owner = THIS_MODULE,
.enable = nf_defrag_ipv4_enable,
.disable = nf_defrag_ipv4_disable,
};
@@ -98,6 +98,7 @@ static void __net_exit defrag6_net_exit(struct net *net)
}
static const struct nf_defrag_v6_hook defrag_hook = {
+ .owner = THIS_MODULE,
.enable = nf_defrag_ipv6_enable,
.disable = nf_defrag_ipv6_disable,
};
@@ -2,6 +2,7 @@
#include <linux/bpf.h>
#include <linux/filter.h>
#include <linux/kmod.h>
+#include <linux/module.h>
#include <linux/netfilter.h>
#include <net/netfilter/nf_bpf_link.h>
@@ -53,6 +54,12 @@ static int bpf_nf_enable_defrag(struct bpf_nf_link *link)
}
}
+ /* Prevent defrag module from going away while in use */
+ if (!try_module_get(v4_hook->owner)) {
+ err = -ENOENT;
+ goto out_v4;
+ }
+
err = v4_hook->enable(link->net);
out_v4:
rcu_read_unlock();
@@ -79,6 +86,12 @@ static int bpf_nf_enable_defrag(struct bpf_nf_link *link)
}
}
+ /* Prevent defrag module from going away while in use */
+ if (!try_module_get(v6_hook->owner)) {
+ err = -ENOENT;
+ goto out_v6;
+ }
+
err = v6_hook->enable(link->net);
out_v6:
rcu_read_unlock();
@@ -98,8 +111,10 @@ static void bpf_nf_disable_defrag(struct bpf_nf_link *link)
rcu_read_lock();
v4_hook = rcu_dereference(nf_defrag_v4_hook);
- if (v4_hook)
+ if (v4_hook) {
v4_hook->disable(link->net);
+ module_put(v4_hook->owner);
+ }
rcu_read_unlock();
break;
@@ -110,8 +125,10 @@ static void bpf_nf_disable_defrag(struct bpf_nf_link *link)
rcu_read_lock();
v6_hook = rcu_dereference(nf_defrag_v6_hook);
- if (v6_hook)
+ if (v6_hook) {
v6_hook->disable(link->net);
+ module_put(v6_hook->owner);
+ }
rcu_read_unlock();
break;