On Tue, Aug 27, 2019 at 01:35:26PM +0200, Phil Sutter wrote: > Hi Pablo, > > On Tue, Aug 27, 2019 at 12:49:19PM +0200, Pablo Neira Ayuso wrote: > > On Wed, Aug 21, 2019 at 11:26:02AM +0200, Phil Sutter wrote: > > [...] > > > +/* Make sure previous payload expression(s) is/are consistent and extract if > > > + * matching on source or destination address and if matching on MAC and IP or > > > + * only MAC address. */ > > > +static int lookup_analyze_payloads(const struct nft_xt_ctx *ctx, > > > + bool *dst, bool *ip) > > > +{ > > > + int val, val2 = -1; > > > + > > > + if (ctx->flags & NFT_XT_CTX_PREV_PAYLOAD) { > > > > Can you probably achieve this by storing protocol context? > > > > Something like storing the current network base in the nft_xt_ctx > > structure, rather than the last payload that you have seen. > > > > From the context you annotate, then among will find the information > > that it needs in the context. > > > > We can reuse this context later on to generate native tcp/udp/etc. > > matching. > > Sorry, I don't understand your approach. With protocol context as it is > used in nftables in mind, I don't see how that applies here. For among > match, we simply have a payload match for MAC address and optionally a > second one for IP address. These are not related apart from the fact > that among allows to match only source or only destination addresses. > The problem lookup_analyze_payloads() solves is: > > 1) Are we matching MAC only or MAC and IP? > 2) Are we matching source or destination? > 3) Is everything consistent, i.e., no IP match without MAC one and no > mixed source/destination matches? Could you store something like a ebt_among_flags field in nft_xt_ct object that the among match can use to check for the dependencies via flags? > If (3) evaluates false, there may be a different extension this lookups > suits for, but currently such a lookup is simply ignored. > > > [...] > > > +static int __add_nft_among(struct nft_handle *h, const char *table, > > > + struct nftnl_rule *r, struct nft_among_pair *pairs, > > > + int cnt, bool dst, bool inv, bool ip) > > > +{ > > > + uint32_t set_id, type = 9, len = 6; > > > + /* !dst, dst */ > > > + int eth_addr_off[] = { 6, 0 }; > > > + int ip_addr_off[] = { 12, 16 }; > > > + struct nftnl_expr *e; > > > + struct nftnl_set *s; > > > + int idx = 0; > > > + > > > + if (ip) { > > > + type = type << 6 | 7; > > > + len += 4 + 2; > > > + } > > > > Magic numbers, please help me understand this. > > Ah, sorry. The 'type' values are TYPE_LLADDR and TYPE_IPADDR from > nftables' enum datatypes. Seems like neither kernel nor libnftnl care > about it, so this is useful only to make nft list things correctly. Probably good if we make these public through libnftnl. Just like we made for udata definitions. > Values added to 'len' are four bytes IPv4 address length and two bytes > padding. I'll try to find more illustrative ways to write them. > > > I think this is the way to go, let's just sort out these few glitches. > > OK, cool. I started implementing the inline anonymous set idea already, > but kernel code becomes pretty ugly when trying to create a new set from > within expr_ops->init. :( Not my intention that you update kernel. I was just wondering if a NFT_LOOKUP_SET_PTR that becomes an alias of NFT_LOOKUP_SET_ID (but that takes the set pointer as input) would make things easier for you. Also, this could use it to fetch the set via nftnl_expr_get() once attached, so you don't need to make cache lookups. Still the cache lookup would be needed anyway for the netlink dump path though, so not sure if this would really simplify things there.