On 15 October 2014 12:06, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > On Tue, Oct 14, 2014 at 07:22:42PM +0200, Arturo Borrero Gonzalez wrote: >> This new expression provides NAT in the redirect flavour, which is to >> redirect packets to local machine. >> >> Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@xxxxxxxxx> >> --- >> include/net/netfilter/nft_redir.h | 18 ++++++ >> include/uapi/linux/netfilter/nf_tables.h | 16 +++++ >> net/ipv4/netfilter/Kconfig | 9 +++ >> net/ipv4/netfilter/Makefile | 1 >> net/ipv4/netfilter/nft_redir_ipv4.c | 76 +++++++++++++++++++++++++ >> net/ipv6/netfilter/Kconfig | 9 +++ >> net/ipv6/netfilter/Makefile | 1 >> net/netfilter/Kconfig | 9 +++ >> net/netfilter/Makefile | 1 >> net/netfilter/nft_redir.c | 93 ++++++++++++++++++++++++++++++ >> 10 files changed, 233 insertions(+) >> create mode 100644 include/net/netfilter/nft_redir.h >> create mode 100644 net/ipv4/netfilter/nft_redir_ipv4.c >> create mode 100644 net/netfilter/nft_redir.c >> >> diff --git a/include/net/netfilter/nft_redir.h b/include/net/netfilter/nft_redir.h >> new file mode 100644 >> index 0000000..b6695da >> --- /dev/null >> +++ b/include/net/netfilter/nft_redir.h >> @@ -0,0 +1,18 @@ >> +#ifndef _NFT_REDIR_H_ >> +#define _NFT_REDIR_H_ >> + >> +struct nft_redir { >> + enum nft_registers sreg_proto_min:8; >> + enum nft_registers sreg_proto_max:8; >> + u32 flags; > > I think you can use u16 to store the flags. So this consumes only 4 > bytes in 32-bits arch. > >> +}; >> + >> +extern const struct nla_policy nft_redir_policy[]; >> + >> +int nft_redir_init(const struct nft_ctx *ctx, >> + const struct nft_expr *expr, >> + const struct nlattr * const tb[]); >> + >> +int nft_redir_dump(struct sk_buff *skb, const struct nft_expr *expr); >> + >> +#endif /* _NFT_REDIR_H_ */ >> diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h >> index c26df67..8a96a36 100644 >> --- a/include/uapi/linux/netfilter/nf_tables.h >> +++ b/include/uapi/linux/netfilter/nf_tables.h >> @@ -849,4 +849,20 @@ enum nft_gen_attributes { >> }; >> #define NFTA_GEN_MAX (__NFTA_GEN_MAX - 1) >> >> +/** >> + * enum nft_redir_attributes - nf_tables redirect expression netlink attributes >> + * >> + * @NFTA_REDIR_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers) >> + * @NFTA_REDIR_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers) >> + * @NFTA_REDIR_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32) >> + */ >> +enum nft_redir_attributes { >> + NFTA_REDIR_UNSPEC, >> + NFTA_REDIR_REG_PROTO_MIN, >> + NFTA_REDIR_REG_PROTO_MAX, >> + NFTA_REDIR_FLAGS, >> + __NFTA_REDIR_MAX >> +}; >> +#define NFTA_REDIR_MAX (__NFTA_REDIR_MAX - 1) >> + > > Please, place this new chunk after the masq atributes. > >> #endif /* _LINUX_NF_TABLES_H */ >> diff --git a/net/ipv4/netfilter/Kconfig b/net/ipv4/netfilter/Kconfig >> index a300e2c..8358b2d 100644 >> --- a/net/ipv4/netfilter/Kconfig >> +++ b/net/ipv4/netfilter/Kconfig >> @@ -119,6 +119,15 @@ config NFT_MASQ_IPV4 >> This is the expression that provides IPv4 masquerading support for >> nf_tables. >> >> +config NFT_REDIR_IPV4 >> + tristate "IPv4 redirect support for nf_tables" >> + depends on NF_TABLES_IPV4 >> + depends on NFT_REDIR >> + select NF_NAT_REDIRECT_IPV4 >> + help >> + This is the expression that provides IPv4 redirect support for >> + nf_tables. >> + >> config NF_NAT_SNMP_BASIC >> tristate "Basic SNMP-ALG support" >> depends on NF_CONNTRACK_SNMP >> diff --git a/net/ipv4/netfilter/Makefile b/net/ipv4/netfilter/Makefile >> index 34e436c..902bcd1 100644 >> --- a/net/ipv4/netfilter/Makefile >> +++ b/net/ipv4/netfilter/Makefile >> @@ -41,6 +41,7 @@ obj-$(CONFIG_NFT_CHAIN_ROUTE_IPV4) += nft_chain_route_ipv4.o >> obj-$(CONFIG_NFT_CHAIN_NAT_IPV4) += nft_chain_nat_ipv4.o >> obj-$(CONFIG_NFT_REJECT_IPV4) += nft_reject_ipv4.o >> obj-$(CONFIG_NFT_MASQ_IPV4) += nft_masq_ipv4.o >> +obj-$(CONFIG_NFT_REDIR_IPV4) += nft_redir_ipv4.o >> obj-$(CONFIG_NF_TABLES_ARP) += nf_tables_arp.o >> >> # generic IP tables > [...] >> diff --git a/net/netfilter/nft_redir.c b/net/netfilter/nft_redir.c >> new file mode 100644 >> index 0000000..1d414a7 >> --- /dev/null >> +++ b/net/netfilter/nft_redir.c >> @@ -0,0 +1,93 @@ >> +/* >> + * Copyright (c) 2014 Arturo Borrero Gonzalez <arturo.borrero.glez@xxxxxxxxx> >> + * >> + * This program is free software; you can redistribute it and/or modify >> + * it under the terms of the GNU General Public License version 2 as >> + * published by the Free Software Foundation. >> + */ >> + >> +#include <linux/kernel.h> >> +#include <linux/init.h> >> +#include <linux/module.h> >> +#include <linux/netlink.h> >> +#include <linux/netfilter.h> >> +#include <linux/netfilter/nf_tables.h> >> +#include <net/netfilter/nf_nat.h> >> +#include <net/netfilter/nf_tables.h> >> +#include <net/netfilter/nft_redir.h> >> + >> +const struct nla_policy nft_redir_policy[NFTA_REDIR_MAX + 1] = { >> + [NFTA_REDIR_REG_PROTO_MIN] = { .type = NLA_U32 }, >> + [NFTA_REDIR_REG_PROTO_MAX] = { .type = NLA_U32 }, >> + [NFTA_REDIR_FLAGS] = { .type = NLA_U32 }, >> +}; >> +EXPORT_SYMBOL_GPL(nft_redir_policy); >> + >> +int nft_redir_init(const struct nft_ctx *ctx, >> + const struct nft_expr *expr, >> + const struct nlattr * const tb[]) >> +{ >> + struct nft_redir *priv = nft_expr_priv(expr); >> + int err; >> + >> + if (tb[NFTA_REDIR_REG_PROTO_MIN]) { >> + priv->sreg_proto_min = ntohl(nla_get_be32( >> + tb[NFTA_REDIR_REG_PROTO_MIN])); > > I prefer this: > > priv->sreg_proto_min = > ntohl(nla_get_be32(tb[NFTA_REDIR_REG_PROTO_MIN])); > > >> + err = nft_validate_input_register(priv->sreg_proto_min); >> + if (err < 0) >> + return err; >> + } > > No else here? ->sreg_proto_min is left uninitialized. > Such behaviour is copied from nft_nat. I'm not sure to which value I should initialize sreg_proto_min. regards. -- Arturo Borrero González -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html