Re: [nf_tables PATCH 3/3] netfilter: nf_tables: add new expression nft_redir

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Oct 14, 2014 at 07:22:42PM +0200, Arturo Borrero Gonzalez wrote:
> This new expression provides NAT in the redirect flavour, which is to
> redirect packets to local machine.
> 
> Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@xxxxxxxxx>
> ---
>  include/net/netfilter/nft_redir.h        |   18 ++++++
>  include/uapi/linux/netfilter/nf_tables.h |   16 +++++
>  net/ipv4/netfilter/Kconfig               |    9 +++
>  net/ipv4/netfilter/Makefile              |    1 
>  net/ipv4/netfilter/nft_redir_ipv4.c      |   76 +++++++++++++++++++++++++
>  net/ipv6/netfilter/Kconfig               |    9 +++
>  net/ipv6/netfilter/Makefile              |    1 
>  net/netfilter/Kconfig                    |    9 +++
>  net/netfilter/Makefile                   |    1 
>  net/netfilter/nft_redir.c                |   93 ++++++++++++++++++++++++++++++
>  10 files changed, 233 insertions(+)
>  create mode 100644 include/net/netfilter/nft_redir.h
>  create mode 100644 net/ipv4/netfilter/nft_redir_ipv4.c
>  create mode 100644 net/netfilter/nft_redir.c
> 
> diff --git a/include/net/netfilter/nft_redir.h b/include/net/netfilter/nft_redir.h
> new file mode 100644
> index 0000000..b6695da
> --- /dev/null
> +++ b/include/net/netfilter/nft_redir.h
> @@ -0,0 +1,18 @@
> +#ifndef _NFT_REDIR_H_
> +#define _NFT_REDIR_H_
> +
> +struct nft_redir {
> +	enum nft_registers	sreg_proto_min:8;
> +	enum nft_registers	sreg_proto_max:8;
> +	u32			flags;

I think you can use u16 to store the flags. So this consumes only 4
bytes in 32-bits arch.

> +};
> +
> +extern const struct nla_policy nft_redir_policy[];
> +
> +int nft_redir_init(const struct nft_ctx *ctx,
> +		   const struct nft_expr *expr,
> +		   const struct nlattr * const tb[]);
> +
> +int nft_redir_dump(struct sk_buff *skb, const struct nft_expr *expr);
> +
> +#endif /* _NFT_REDIR_H_ */
> diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h
> index c26df67..8a96a36 100644
> --- a/include/uapi/linux/netfilter/nf_tables.h
> +++ b/include/uapi/linux/netfilter/nf_tables.h
> @@ -849,4 +849,20 @@ enum nft_gen_attributes {
>  };
>  #define NFTA_GEN_MAX		(__NFTA_GEN_MAX - 1)
>  
> +/**
> + * enum nft_redir_attributes - nf_tables redirect expression netlink attributes
> + *
> + * @NFTA_REDIR_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
> + * @NFTA_REDIR_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
> + * @NFTA_REDIR_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
> + */
> +enum nft_redir_attributes {
> +	NFTA_REDIR_UNSPEC,
> +	NFTA_REDIR_REG_PROTO_MIN,
> +	NFTA_REDIR_REG_PROTO_MAX,
> +	NFTA_REDIR_FLAGS,
> +	__NFTA_REDIR_MAX
> +};
> +#define NFTA_REDIR_MAX		(__NFTA_REDIR_MAX - 1)
> +

Please, place this new chunk after the masq atributes.

>  #endif /* _LINUX_NF_TABLES_H */
> diff --git a/net/ipv4/netfilter/Kconfig b/net/ipv4/netfilter/Kconfig
> index a300e2c..8358b2d 100644
> --- a/net/ipv4/netfilter/Kconfig
> +++ b/net/ipv4/netfilter/Kconfig
> @@ -119,6 +119,15 @@ config NFT_MASQ_IPV4
>  	  This is the expression that provides IPv4 masquerading support for
>  	  nf_tables.
>  
> +config NFT_REDIR_IPV4
> +	tristate "IPv4 redirect support for nf_tables"
> +	depends on NF_TABLES_IPV4
> +	depends on NFT_REDIR
> +	select NF_NAT_REDIRECT_IPV4
> +	help
> +	  This is the expression that provides IPv4 redirect support for
> +	  nf_tables.
> +
>  config NF_NAT_SNMP_BASIC
>  	tristate "Basic SNMP-ALG support"
>  	depends on NF_CONNTRACK_SNMP
> diff --git a/net/ipv4/netfilter/Makefile b/net/ipv4/netfilter/Makefile
> index 34e436c..902bcd1 100644
> --- a/net/ipv4/netfilter/Makefile
> +++ b/net/ipv4/netfilter/Makefile
> @@ -41,6 +41,7 @@ obj-$(CONFIG_NFT_CHAIN_ROUTE_IPV4) += nft_chain_route_ipv4.o
>  obj-$(CONFIG_NFT_CHAIN_NAT_IPV4) += nft_chain_nat_ipv4.o
>  obj-$(CONFIG_NFT_REJECT_IPV4) += nft_reject_ipv4.o
>  obj-$(CONFIG_NFT_MASQ_IPV4) += nft_masq_ipv4.o
> +obj-$(CONFIG_NFT_REDIR_IPV4) += nft_redir_ipv4.o
>  obj-$(CONFIG_NF_TABLES_ARP) += nf_tables_arp.o
>  
>  # generic IP tables 
[...]
> diff --git a/net/netfilter/nft_redir.c b/net/netfilter/nft_redir.c
> new file mode 100644
> index 0000000..1d414a7
> --- /dev/null
> +++ b/net/netfilter/nft_redir.c
> @@ -0,0 +1,93 @@
> +/*
> + * Copyright (c) 2014 Arturo Borrero Gonzalez <arturo.borrero.glez@xxxxxxxxx>
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License version 2 as
> + * published by the Free Software Foundation.
> + */
> +
> +#include <linux/kernel.h>
> +#include <linux/init.h>
> +#include <linux/module.h>
> +#include <linux/netlink.h>
> +#include <linux/netfilter.h>
> +#include <linux/netfilter/nf_tables.h>
> +#include <net/netfilter/nf_nat.h>
> +#include <net/netfilter/nf_tables.h>
> +#include <net/netfilter/nft_redir.h>
> +
> +const struct nla_policy nft_redir_policy[NFTA_REDIR_MAX + 1] = {
> +	[NFTA_REDIR_REG_PROTO_MIN]	= { .type = NLA_U32 },
> +	[NFTA_REDIR_REG_PROTO_MAX]	= { .type = NLA_U32 },
> +	[NFTA_REDIR_FLAGS]		= { .type = NLA_U32 },
> +};
> +EXPORT_SYMBOL_GPL(nft_redir_policy);
> +
> +int nft_redir_init(const struct nft_ctx *ctx,
> +		   const struct nft_expr *expr,
> +		   const struct nlattr * const tb[])
> +{
> +	struct nft_redir *priv = nft_expr_priv(expr);
> +	int err;
> +
> +	if (tb[NFTA_REDIR_REG_PROTO_MIN]) {
> +		priv->sreg_proto_min = ntohl(nla_get_be32(
> +						tb[NFTA_REDIR_REG_PROTO_MIN]));

I prefer this:

		priv->sreg_proto_min =
                        ntohl(nla_get_be32(tb[NFTA_REDIR_REG_PROTO_MIN]));


> +		err = nft_validate_input_register(priv->sreg_proto_min);
> +		if (err < 0)
> +			return err;
> +	}

No else here? ->sreg_proto_min is left uninitialized.

> +
> +	if (tb[NFTA_REDIR_REG_PROTO_MAX]) {
> +		priv->sreg_proto_max = ntohl(nla_get_be32(
> +						tb[NFTA_REDIR_REG_PROTO_MAX]));

Same thing here.

> +		err = nft_validate_input_register(priv->sreg_proto_max);
> +		if (err < 0)
> +			return err;
> +	} else
> +		priv->sreg_proto_max = priv->sreg_proto_min;

Missing brackets wrapping around this 'else'.

> +
> +	if (tb[NFTA_REDIR_FLAGS]) {
> +		priv->flags = ntohl(nla_get_be32(tb[NFTA_REDIR_FLAGS]));
> +		if (priv->flags & ~NF_NAT_RANGE_MASK)
> +			return -EINVAL;
> +	}
> +
> +

extra line, remove it.

> +	return 0;
> +}
> +EXPORT_SYMBOL_GPL(nft_redir_init);
> +
> +int nft_redir_dump(struct sk_buff *skb, const struct nft_expr *expr)
> +{
> +	const struct nft_redir *priv = nft_expr_priv(expr);
> +
> +	if (priv->sreg_proto_min) {
> +		if (nla_put_be32(skb, NFTA_REDIR_REG_PROTO_MIN,
> +				 htonl(priv->sreg_proto_min)))
> +			goto nla_put_failure;
> +		if (nla_put_be32(skb, NFTA_REDIR_REG_PROTO_MAX,
> +				 htonl(priv->sreg_proto_max)))
> +			goto nla_put_failure;
> +	}
> +
> +	if (priv->flags != 0) {
> +		if (nla_put_be32(skb, NFTA_REDIR_FLAGS, htonl(priv->flags)))
> +			goto nla_put_failure;
> +	}
> +
> +	if (priv->flags == 0)
> +		return 0;
> +
> +	if (nla_put_be32(skb, NFTA_REDIR_FLAGS, htonl(priv->flags)))
> +		goto nla_put_failure;

These 10 lines above are freak. I guess you can refactor this to:

        if (priv->flags != 0 &&
            nla_put_...
                goto nla_put_failure;
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux