Skip to content

Commit 3f4261d

Browse files
committed
Merge branch 'bpfilter-fixes'
Taehee Yoo says: ==================== net: bpfilter: fix two bugs in bpfilter This patches fix two bugs in the bpfilter_umh which are related in iptables command. The first patch adds an exit code for UMH process. This provides an opportunity to cleanup members of the umh_info to modules which use the UMH. In order to identify UMH processes, a new flag PF_UMH is added. The second patch makes the bpfilter_umh use UMH cleanup callback. The third patch adds re-start routine for the bpfilter_umh. The bpfilter_umh does not re-start after error occurred. because there is no re-start routine in the module. The fourth patch ensures that the bpfilter.ko module will not removed while it's being used. The bpfilter.ko is not protected by locks or module reference counter. Therefore that can be removed while module is being used. In order to protect that, mutex is used. The first and second patch are preparation patches for the third and fourth patch. TEST #1 while : do modprobe bpfilter kill -9 <pid of the bpfilter_umh> iptables -vnL done TEST #2 while : do iptables -I FORWARD -m string --string ap --algo kmp & iptables -F & modprobe -rv bpfilter & done TEST #3 while : do modprobe bpfilter & modprobe -rv bpfilter & done The TEST1 makes a failure of iptables command. This is fixed by the third patch. The TEST2 makes a panic because of a race condition in the bpfilter_umh module. This is fixed by the fourth patch. The TEST3 makes a double-create UMH process. This is fixed by the third and fourth patch. v4 : - declare the exit_umh() as static inline - check stop flag in the load_umh() to avoid a double-create UMH v3 : - Avoid unnecessary list lookup for non-UMH processes - Add a new PF_UMH flag v2 : add the first and second patch v1 : Initial patch ==================== Signed-off-by: David S. Miller <[email protected]>
2 parents 2ff33d6 + 71a8508 commit 3f4261d

File tree

8 files changed

+146
-50
lines changed

8 files changed

+146
-50
lines changed

include/linux/bpfilter.h

+12-3
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,22 @@
33
#define _LINUX_BPFILTER_H
44

55
#include <uapi/linux/bpfilter.h>
6+
#include <linux/umh.h>
67

78
struct sock;
89
int bpfilter_ip_set_sockopt(struct sock *sk, int optname, char __user *optval,
910
unsigned int optlen);
1011
int bpfilter_ip_get_sockopt(struct sock *sk, int optname, char __user *optval,
1112
int __user *optlen);
12-
extern int (*bpfilter_process_sockopt)(struct sock *sk, int optname,
13-
char __user *optval,
14-
unsigned int optlen, bool is_set);
13+
struct bpfilter_umh_ops {
14+
struct umh_info info;
15+
/* since ip_getsockopt() can run in parallel, serialize access to umh */
16+
struct mutex lock;
17+
int (*sockopt)(struct sock *sk, int optname,
18+
char __user *optval,
19+
unsigned int optlen, bool is_set);
20+
int (*start)(void);
21+
bool stop;
22+
};
23+
extern struct bpfilter_umh_ops bpfilter_ops;
1524
#endif

include/linux/sched.h

+9
Original file line numberDiff line numberDiff line change
@@ -1406,6 +1406,7 @@ extern struct pid *cad_pid;
14061406
#define PF_RANDOMIZE 0x00400000 /* Randomize virtual address space */
14071407
#define PF_SWAPWRITE 0x00800000 /* Allowed to write to swap */
14081408
#define PF_MEMSTALL 0x01000000 /* Stalled due to lack of memory */
1409+
#define PF_UMH 0x02000000 /* I'm an Usermodehelper process */
14091410
#define PF_NO_SETAFFINITY 0x04000000 /* Userland is not allowed to meddle with cpus_allowed */
14101411
#define PF_MCE_EARLY 0x08000000 /* Early kill for mce process policy */
14111412
#define PF_MUTEX_TESTER 0x20000000 /* Thread belongs to the rt mutex tester */
@@ -1904,6 +1905,14 @@ static inline void rseq_execve(struct task_struct *t)
19041905

19051906
#endif
19061907

1908+
void __exit_umh(struct task_struct *tsk);
1909+
1910+
static inline void exit_umh(struct task_struct *tsk)
1911+
{
1912+
if (unlikely(tsk->flags & PF_UMH))
1913+
__exit_umh(tsk);
1914+
}
1915+
19071916
#ifdef CONFIG_DEBUG_RSEQ
19081917

19091918
void rseq_syscall(struct pt_regs *regs);

include/linux/umh.h

+2
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@ struct umh_info {
4747
const char *cmdline;
4848
struct file *pipe_to_umh;
4949
struct file *pipe_from_umh;
50+
struct list_head list;
51+
void (*cleanup)(struct umh_info *info);
5052
pid_t pid;
5153
};
5254
int fork_usermode_blob(void *data, size_t len, struct umh_info *info);

kernel/exit.c

+1
Original file line numberDiff line numberDiff line change
@@ -866,6 +866,7 @@ void __noreturn do_exit(long code)
866866
exit_task_namespaces(tsk);
867867
exit_task_work(tsk);
868868
exit_thread(tsk);
869+
exit_umh(tsk);
869870

870871
/*
871872
* Flush inherited counters to the parent - before the parent

kernel/umh.c

+31-2
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ static kernel_cap_t usermodehelper_bset = CAP_FULL_SET;
3737
static kernel_cap_t usermodehelper_inheritable = CAP_FULL_SET;
3838
static DEFINE_SPINLOCK(umh_sysctl_lock);
3939
static DECLARE_RWSEM(umhelper_sem);
40+
static LIST_HEAD(umh_list);
41+
static DEFINE_MUTEX(umh_list_lock);
4042

4143
static void call_usermodehelper_freeinfo(struct subprocess_info *info)
4244
{
@@ -100,10 +102,12 @@ static int call_usermodehelper_exec_async(void *data)
100102
commit_creds(new);
101103

102104
sub_info->pid = task_pid_nr(current);
103-
if (sub_info->file)
105+
if (sub_info->file) {
104106
retval = do_execve_file(sub_info->file,
105107
sub_info->argv, sub_info->envp);
106-
else
108+
if (!retval)
109+
current->flags |= PF_UMH;
110+
} else
107111
retval = do_execve(getname_kernel(sub_info->path),
108112
(const char __user *const __user *)sub_info->argv,
109113
(const char __user *const __user *)sub_info->envp);
@@ -517,6 +521,11 @@ int fork_usermode_blob(void *data, size_t len, struct umh_info *info)
517521
goto out;
518522

519523
err = call_usermodehelper_exec(sub_info, UMH_WAIT_EXEC);
524+
if (!err) {
525+
mutex_lock(&umh_list_lock);
526+
list_add(&info->list, &umh_list);
527+
mutex_unlock(&umh_list_lock);
528+
}
520529
out:
521530
fput(file);
522531
return err;
@@ -679,6 +688,26 @@ static int proc_cap_handler(struct ctl_table *table, int write,
679688
return 0;
680689
}
681690

691+
void __exit_umh(struct task_struct *tsk)
692+
{
693+
struct umh_info *info;
694+
pid_t pid = tsk->pid;
695+
696+
mutex_lock(&umh_list_lock);
697+
list_for_each_entry(info, &umh_list, list) {
698+
if (info->pid == pid) {
699+
list_del(&info->list);
700+
mutex_unlock(&umh_list_lock);
701+
goto out;
702+
}
703+
}
704+
mutex_unlock(&umh_list_lock);
705+
return;
706+
out:
707+
if (info->cleanup)
708+
info->cleanup(info);
709+
}
710+
682711
struct ctl_table usermodehelper_table[] = {
683712
{
684713
.procname = "bset",

net/bpfilter/bpfilter_kern.c

+42-34
Original file line numberDiff line numberDiff line change
@@ -13,39 +13,24 @@
1313
extern char bpfilter_umh_start;
1414
extern char bpfilter_umh_end;
1515

16-
static struct umh_info info;
17-
/* since ip_getsockopt() can run in parallel, serialize access to umh */
18-
static DEFINE_MUTEX(bpfilter_lock);
19-
20-
static void shutdown_umh(struct umh_info *info)
16+
static void shutdown_umh(void)
2117
{
2218
struct task_struct *tsk;
2319

24-
if (!info->pid)
20+
if (bpfilter_ops.stop)
2521
return;
26-
tsk = get_pid_task(find_vpid(info->pid), PIDTYPE_PID);
22+
23+
tsk = get_pid_task(find_vpid(bpfilter_ops.info.pid), PIDTYPE_PID);
2724
if (tsk) {
2825
force_sig(SIGKILL, tsk);
2926
put_task_struct(tsk);
3027
}
31-
fput(info->pipe_to_umh);
32-
fput(info->pipe_from_umh);
33-
info->pid = 0;
3428
}
3529

3630
static void __stop_umh(void)
3731
{
38-
if (IS_ENABLED(CONFIG_INET)) {
39-
bpfilter_process_sockopt = NULL;
40-
shutdown_umh(&info);
41-
}
42-
}
43-
44-
static void stop_umh(void)
45-
{
46-
mutex_lock(&bpfilter_lock);
47-
__stop_umh();
48-
mutex_unlock(&bpfilter_lock);
32+
if (IS_ENABLED(CONFIG_INET))
33+
shutdown_umh();
4934
}
5035

5136
static int __bpfilter_process_sockopt(struct sock *sk, int optname,
@@ -63,18 +48,19 @@ static int __bpfilter_process_sockopt(struct sock *sk, int optname,
6348
req.cmd = optname;
6449
req.addr = (long __force __user)optval;
6550
req.len = optlen;
66-
mutex_lock(&bpfilter_lock);
67-
if (!info.pid)
51+
if (!bpfilter_ops.info.pid)
6852
goto out;
69-
n = __kernel_write(info.pipe_to_umh, &req, sizeof(req), &pos);
53+
n = __kernel_write(bpfilter_ops.info.pipe_to_umh, &req, sizeof(req),
54+
&pos);
7055
if (n != sizeof(req)) {
7156
pr_err("write fail %zd\n", n);
7257
__stop_umh();
7358
ret = -EFAULT;
7459
goto out;
7560
}
7661
pos = 0;
77-
n = kernel_read(info.pipe_from_umh, &reply, sizeof(reply), &pos);
62+
n = kernel_read(bpfilter_ops.info.pipe_from_umh, &reply, sizeof(reply),
63+
&pos);
7864
if (n != sizeof(reply)) {
7965
pr_err("read fail %zd\n", n);
8066
__stop_umh();
@@ -83,37 +69,59 @@ static int __bpfilter_process_sockopt(struct sock *sk, int optname,
8369
}
8470
ret = reply.status;
8571
out:
86-
mutex_unlock(&bpfilter_lock);
8772
return ret;
8873
}
8974

90-
static int __init load_umh(void)
75+
static int start_umh(void)
9176
{
9277
int err;
9378

9479
/* fork usermode process */
95-
info.cmdline = "bpfilter_umh";
9680
err = fork_usermode_blob(&bpfilter_umh_start,
9781
&bpfilter_umh_end - &bpfilter_umh_start,
98-
&info);
82+
&bpfilter_ops.info);
9983
if (err)
10084
return err;
101-
pr_info("Loaded bpfilter_umh pid %d\n", info.pid);
85+
bpfilter_ops.stop = false;
86+
pr_info("Loaded bpfilter_umh pid %d\n", bpfilter_ops.info.pid);
10287

10388
/* health check that usermode process started correctly */
10489
if (__bpfilter_process_sockopt(NULL, 0, NULL, 0, 0) != 0) {
105-
stop_umh();
90+
shutdown_umh();
10691
return -EFAULT;
10792
}
108-
if (IS_ENABLED(CONFIG_INET))
109-
bpfilter_process_sockopt = &__bpfilter_process_sockopt;
11093

11194
return 0;
11295
}
11396

97+
static int __init load_umh(void)
98+
{
99+
int err;
100+
101+
mutex_lock(&bpfilter_ops.lock);
102+
if (!bpfilter_ops.stop) {
103+
err = -EFAULT;
104+
goto out;
105+
}
106+
err = start_umh();
107+
if (!err && IS_ENABLED(CONFIG_INET)) {
108+
bpfilter_ops.sockopt = &__bpfilter_process_sockopt;
109+
bpfilter_ops.start = &start_umh;
110+
}
111+
out:
112+
mutex_unlock(&bpfilter_ops.lock);
113+
return err;
114+
}
115+
114116
static void __exit fini_umh(void)
115117
{
116-
stop_umh();
118+
mutex_lock(&bpfilter_ops.lock);
119+
if (IS_ENABLED(CONFIG_INET)) {
120+
shutdown_umh();
121+
bpfilter_ops.start = NULL;
122+
bpfilter_ops.sockopt = NULL;
123+
}
124+
mutex_unlock(&bpfilter_ops.lock);
117125
}
118126
module_init(load_umh);
119127
module_exit(fini_umh);

net/bpfilter/bpfilter_umh_blob.S

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/* SPDX-License-Identifier: GPL-2.0 */
2-
.section .init.rodata, "a"
2+
.section .bpfilter_umh, "a"
33
.global bpfilter_umh_start
44
bpfilter_umh_start:
55
.incbin "net/bpfilter/bpfilter_umh"

net/ipv4/bpfilter/sockopt.c

+48-10
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,54 @@
11
// SPDX-License-Identifier: GPL-2.0
2+
#include <linux/init.h>
3+
#include <linux/module.h>
24
#include <linux/uaccess.h>
35
#include <linux/bpfilter.h>
46
#include <uapi/linux/bpf.h>
57
#include <linux/wait.h>
68
#include <linux/kmod.h>
9+
#include <linux/fs.h>
10+
#include <linux/file.h>
711

8-
int (*bpfilter_process_sockopt)(struct sock *sk, int optname,
9-
char __user *optval,
10-
unsigned int optlen, bool is_set);
11-
EXPORT_SYMBOL_GPL(bpfilter_process_sockopt);
12+
struct bpfilter_umh_ops bpfilter_ops;
13+
EXPORT_SYMBOL_GPL(bpfilter_ops);
14+
15+
static void bpfilter_umh_cleanup(struct umh_info *info)
16+
{
17+
mutex_lock(&bpfilter_ops.lock);
18+
bpfilter_ops.stop = true;
19+
fput(info->pipe_to_umh);
20+
fput(info->pipe_from_umh);
21+
info->pid = 0;
22+
mutex_unlock(&bpfilter_ops.lock);
23+
}
1224

1325
static int bpfilter_mbox_request(struct sock *sk, int optname,
1426
char __user *optval,
1527
unsigned int optlen, bool is_set)
1628
{
17-
if (!bpfilter_process_sockopt) {
18-
int err = request_module("bpfilter");
29+
int err;
30+
mutex_lock(&bpfilter_ops.lock);
31+
if (!bpfilter_ops.sockopt) {
32+
mutex_unlock(&bpfilter_ops.lock);
33+
err = request_module("bpfilter");
34+
mutex_lock(&bpfilter_ops.lock);
1935

2036
if (err)
21-
return err;
22-
if (!bpfilter_process_sockopt)
23-
return -ECHILD;
37+
goto out;
38+
if (!bpfilter_ops.sockopt) {
39+
err = -ECHILD;
40+
goto out;
41+
}
42+
}
43+
if (bpfilter_ops.stop) {
44+
err = bpfilter_ops.start();
45+
if (err)
46+
goto out;
2447
}
25-
return bpfilter_process_sockopt(sk, optname, optval, optlen, is_set);
48+
err = bpfilter_ops.sockopt(sk, optname, optval, optlen, is_set);
49+
out:
50+
mutex_unlock(&bpfilter_ops.lock);
51+
return err;
2652
}
2753

2854
int bpfilter_ip_set_sockopt(struct sock *sk, int optname, char __user *optval,
@@ -41,3 +67,15 @@ int bpfilter_ip_get_sockopt(struct sock *sk, int optname, char __user *optval,
4167

4268
return bpfilter_mbox_request(sk, optname, optval, len, false);
4369
}
70+
71+
static int __init bpfilter_sockopt_init(void)
72+
{
73+
mutex_init(&bpfilter_ops.lock);
74+
bpfilter_ops.stop = true;
75+
bpfilter_ops.info.cmdline = "bpfilter_umh";
76+
bpfilter_ops.info.cleanup = &bpfilter_umh_cleanup;
77+
78+
return 0;
79+
}
80+
81+
module_init(bpfilter_sockopt_init);

0 commit comments

Comments
 (0)