Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

netfilter: nft_compat: fix module refcount underflow

Feb 12 18:20:42 nfdev kernel: ------------[ cut here ]------------
Feb 12 18:20:42 nfdev kernel: WARNING: CPU: 4 PID: 4359 at kernel/module.c:963 module_put+0x9b/0xba()
Feb 12 18:20:42 nfdev kernel: CPU: 4 PID: 4359 Comm: ebtables-compat Tainted: G W 3.19.0-rc6+ #43
[...]
Feb 12 18:20:42 nfdev kernel: Call Trace:
Feb 12 18:20:42 nfdev kernel: [<ffffffff815fd911>] dump_stack+0x4c/0x65
Feb 12 18:20:42 nfdev kernel: [<ffffffff8103e6f7>] warn_slowpath_common+0x9c/0xb6
Feb 12 18:20:42 nfdev kernel: [<ffffffff8109919f>] ? module_put+0x9b/0xba
Feb 12 18:20:42 nfdev kernel: [<ffffffff8103e726>] warn_slowpath_null+0x15/0x17
Feb 12 18:20:42 nfdev kernel: [<ffffffff8109919f>] module_put+0x9b/0xba
Feb 12 18:20:42 nfdev kernel: [<ffffffff813ecf7c>] nft_match_destroy+0x45/0x4c
Feb 12 18:20:42 nfdev kernel: [<ffffffff813e683f>] nf_tables_rule_destroy+0x28/0x70

Reported-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Tested-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>

+10 -2
+10 -2
net/netfilter/nft_compat.c
··· 578 578 struct xt_match *match = nft_match->ops.data; 579 579 580 580 if (strcmp(match->name, mt_name) == 0 && 581 - match->revision == rev && match->family == family) 581 + match->revision == rev && match->family == family) { 582 + if (!try_module_get(match->me)) 583 + return ERR_PTR(-ENOENT); 584 + 582 585 return &nft_match->ops; 586 + } 583 587 } 584 588 585 589 match = xt_request_find_match(family, mt_name, rev); ··· 652 648 struct xt_target *target = nft_target->ops.data; 653 649 654 650 if (strcmp(target->name, tg_name) == 0 && 655 - target->revision == rev && target->family == family) 651 + target->revision == rev && target->family == family) { 652 + if (!try_module_get(target->me)) 653 + return ERR_PTR(-ENOENT); 654 + 656 655 return &nft_target->ops; 656 + } 657 657 } 658 658 659 659 target = xt_request_find_target(family, tg_name, rev);