From: ebiederm@xmission.com (Eric W. Biederman)
To: Pablo Neira Ayuso <pablo@netfilter.org>
Cc: netfilter-devel@vger.kernel.org
Subject: Re: [PATCH nf-next 1/2] netfilter: fix possible removal of wrong hook
Date: Wed, 22 Jul 2015 15:20:25 -0500 [thread overview]
Message-ID: <87vbdcdjw6.fsf@x220.int.ebiederm.org> (raw)
In-Reply-To: <1437393302-18899-1-git-send-email-pablo@netfilter.org> (Pablo Neira Ayuso's message of "Mon, 20 Jul 2015 13:55:01 +0200")
Pablo Neira Ayuso <pablo@netfilter.org> writes:
> nf_unregister_net_hook() uses the nf_hook_ops fields as tuple to look up for
> the corresponding hook in the list. However, we may have two hooks with exactly
> the same configuration.
>
> This shouldn't be a problem for nftables since every new chain has an unique
> priv field set, but this may still cause us problems in the future, so better
> address this problem now by keeping a reference to the original nf_hook_ops
> structure to make sure we delete the right hook from
> nf_unregister_net_hook().
Acked-by: "Eric W. Biederman" <ebiederm@xmission.com>
> Fixes: 085db2c04557 ("netfilter: Per network namespace netfilter hooks.")
> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
> ---
> net/netfilter/core.c | 39 ++++++++++++++++++---------------------
> 1 file changed, 18 insertions(+), 21 deletions(-)
>
> diff --git a/net/netfilter/core.c b/net/netfilter/core.c
> index 87d237d..a834181 100644
> --- a/net/netfilter/core.c
> +++ b/net/netfilter/core.c
> @@ -78,26 +78,27 @@ static struct list_head *find_nf_hook_list(struct net *net,
> return nf_hook_list;
> }
>
> +struct nf_hook_entry {
> + const struct nf_hook_ops *orig_ops;
> + struct nf_hook_ops ops;
> +};
> +
> int nf_register_net_hook(struct net *net, const struct nf_hook_ops *reg)
> {
> struct list_head *nf_hook_list;
> - struct nf_hook_ops *elem, *new;
> + struct nf_hook_entry *entry;
> + struct nf_hook_ops *elem;
>
> - new = kzalloc(sizeof(*new), GFP_KERNEL);
> - if (!new)
> + entry = kmalloc(sizeof(*entry), GFP_KERNEL);
> + if (!entry)
> return -ENOMEM;
>
> - new->hook = reg->hook;
> - new->dev = reg->dev;
> - new->owner = reg->owner;
> - new->priv = reg->priv;
> - new->pf = reg->pf;
> - new->hooknum = reg->hooknum;
> - new->priority = reg->priority;
> + entry->orig_ops = reg;
> + entry->ops = *reg;
>
> nf_hook_list = find_nf_hook_list(net, reg);
> if (!nf_hook_list) {
> - kfree(new);
> + kfree(entry);
> return -ENOENT;
> }
>
> @@ -106,7 +107,7 @@ int nf_register_net_hook(struct net *net, const struct nf_hook_ops *reg)
> if (reg->priority < elem->priority)
> break;
> }
> - list_add_rcu(&new->list, elem->list.prev);
> + list_add_rcu(&entry->ops.list, elem->list.prev);
> mutex_unlock(&nf_hook_mutex);
> #ifdef CONFIG_NETFILTER_INGRESS
> if (reg->pf == NFPROTO_NETDEV && reg->hooknum == NF_NETDEV_INGRESS)
> @@ -122,6 +123,7 @@ EXPORT_SYMBOL(nf_register_net_hook);
> void nf_unregister_net_hook(struct net *net, const struct nf_hook_ops *reg)
> {
> struct list_head *nf_hook_list;
> + struct nf_hook_entry *entry;
> struct nf_hook_ops *elem;
>
> nf_hook_list = find_nf_hook_list(net, reg);
> @@ -130,14 +132,9 @@ void nf_unregister_net_hook(struct net *net, const struct nf_hook_ops *reg)
>
> mutex_lock(&nf_hook_mutex);
> list_for_each_entry(elem, nf_hook_list, list) {
> - if ((reg->hook == elem->hook) &&
> - (reg->dev == elem->dev) &&
> - (reg->owner == elem->owner) &&
> - (reg->priv == elem->priv) &&
> - (reg->pf == elem->pf) &&
> - (reg->hooknum == elem->hooknum) &&
> - (reg->priority == elem->priority)) {
> - list_del_rcu(&elem->list);
> + entry = container_of(elem, struct nf_hook_entry, ops);
> + if (entry->orig_ops == reg) {
> + list_del_rcu(&entry->ops.list);
> break;
> }
> }
> @@ -154,7 +151,7 @@ void nf_unregister_net_hook(struct net *net, const struct nf_hook_ops *reg)
> static_key_slow_dec(&nf_hooks_needed[reg->pf][reg->hooknum]);
> #endif
> synchronize_net();
> - nf_queue_nf_hook_drop(elem);
> + nf_queue_nf_hook_drop(&entry->ops);
> kfree(elem);
> }
> EXPORT_SYMBOL(nf_unregister_net_hook);
prev parent reply other threads:[~2015-07-22 20:26 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-07-20 11:55 [PATCH nf-next 1/2] netfilter: fix possible removal of wrong hook Pablo Neira Ayuso
2015-07-20 11:55 ` [PATCH nf-next 2/2] netfilter: rename local nf_hook_list to hook_list Pablo Neira Ayuso
2015-07-22 20:21 ` Eric W. Biederman
2015-07-22 20:20 ` Eric W. Biederman [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87vbdcdjw6.fsf@x220.int.ebiederm.org \
--to=ebiederm@xmission.com \
--cc=netfilter-devel@vger.kernel.org \
--cc=pablo@netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).