Re: [PATCH nf-next v3 5/9] netfilter: nft_tunnel: support NFT_TUNNEL_SRC/DST_IP match

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Aug 14, 2019 at 03:54:03PM +0800, wenxu wrote:
> 
> On 8/14/2019 2:19 AM, Pablo Neira Ayuso wrote:
> > On Thu, Aug 01, 2019 at 10:01:22PM +0800, wenxu@xxxxxxxxx wrote:
> >> From: wenxu <wenxu@xxxxxxxxx>
> >>
> >> Add new two NFT_TUNNEL_SRC/DST_IP match in nft_tunnel
> >>
> >> Signed-off-by: wenxu <wenxu@xxxxxxxxx>
> >> ---
> >> v3: no change
> >>
> >>  include/uapi/linux/netfilter/nf_tables.h |  2 ++
> >>  net/netfilter/nft_tunnel.c               | 46 +++++++++++++++++++++++++-------
> >>  2 files changed, 38 insertions(+), 10 deletions(-)
> >>
> >> diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h
> >> index 82abaa1..173690a 100644
> >> --- a/include/uapi/linux/netfilter/nf_tables.h
> >> +++ b/include/uapi/linux/netfilter/nf_tables.h
> >> @@ -1765,6 +1765,8 @@ enum nft_tunnel_key_attributes {
> >>  enum nft_tunnel_keys {
> >>  	NFT_TUNNEL_PATH,
> >>  	NFT_TUNNEL_ID,
> >> +	NFT_TUNNEL_SRC_IP,
> >> +	NFT_TUNNEL_DST_IP,
> >>  	__NFT_TUNNEL_MAX
> >>  };
> >>  #define NFT_TUNNEL_MAX	(__NFT_TUNNEL_MAX - 1)
> >> diff --git a/net/netfilter/nft_tunnel.c b/net/netfilter/nft_tunnel.c
> >> index 3d4c2ae..e218163 100644
> >> --- a/net/netfilter/nft_tunnel.c
> >> +++ b/net/netfilter/nft_tunnel.c
> >> @@ -18,6 +18,18 @@ struct nft_tunnel {
> >>  	enum nft_tunnel_mode	mode:8;
> >>  };
> >>  
> >> +bool nft_tunnel_mode_validate(enum nft_tunnel_mode priv_mode, u8 tun_mode)
> >> +{
> >> +	if (priv_mode == NFT_TUNNEL_MODE_NONE ||
> >> +	    (priv_mode == NFT_TUNNEL_MODE_RX &&
> >> +	     !(tun_mode & IP_TUNNEL_INFO_TX)) ||
> >> +	    (priv_mode == NFT_TUNNEL_MODE_TX &&
> >> +	     (tun_mode & IP_TUNNEL_INFO_TX)))
> >> +		return true;
> >> +
> >> +	return false;
> >> +}
> > Make an initial patch to add nft_tunnel_mode_validate().
> >
> >>  static void nft_tunnel_get_eval(const struct nft_expr *expr,
> >>  				struct nft_regs *regs,
> >>  				const struct nft_pktinfo *pkt)
> >> @@ -34,11 +46,7 @@ static void nft_tunnel_get_eval(const struct nft_expr *expr,
> >>  			nft_reg_store8(dest, false);
> >>  			return;
> >>  		}
> >> -		if (priv->mode == NFT_TUNNEL_MODE_NONE ||
> >> -		    (priv->mode == NFT_TUNNEL_MODE_RX &&
> >> -		     !(tun_info->mode & IP_TUNNEL_INFO_TX)) ||
> >> -		    (priv->mode == NFT_TUNNEL_MODE_TX &&
> >> -		     (tun_info->mode & IP_TUNNEL_INFO_TX)))
> >> +		if (nft_tunnel_mode_validate(priv->mode, tun_info->mode))
> >>  			nft_reg_store8(dest, true);
> >>  		else
> >>  			nft_reg_store8(dest, false);
> > [...]
> >> +	case NFT_TUNNEL_DST_IP:
> >> +		if (!tun_info) {
> >> +			regs->verdict.code = NFT_BREAK;
> >> +			return;
> >> +		}
> >> +		if (nft_tunnel_mode_validate(priv->mode, tun_info->mode))
> >> +			*dest = ntohl(tun_info->key.u.ipv4.dst);
> > No need to convert this from network to host endianess.
> >
> >> +		else
> >> +			regs->verdict.code = NFT_BREAK;
> >> +		break;
> >>  	default:
> >>  		WARN_ON(1);
> >>  		regs->verdict.code = NFT_BREAK;
> >> @@ -86,6 +110,8 @@ static int nft_tunnel_get_init(const struct nft_ctx *ctx,
> >>  		len = sizeof(u8);
> >>  		break;
> >>  	case NFT_TUNNEL_ID:
> >> +	case NFT_TUNNEL_SRC_IP:
> >> +	case NFT_TUNNEL_DST_IP:
> > Missing policy updates, ie. nft_tunnel_key_policy.
> 
> I don't understand why it need update nft_tunnel_key_policy
> which is used for tunnel_obj action. This NFT_TUNNEL_SRC/DST_IP is used
> for tunnel_expr

It seems there is no policy object for _get_eval(), add it.

Thanks.



[Index of Archives]     [Netfitler Users]     [Berkeley Packet Filter]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux