From: Pablo Neira Ayuso <pablo@netfilter.org>
To: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
Cc: netfilter-devel@vger.kernel.org, kaber@trash.net
Subject: Re: [nf_tables PATCH 3/3] netfilter: nf_tables: add new expression nft_redir
Date: Wed, 15 Oct 2014 12:06:19 +0200 [thread overview]
Message-ID: <20141015100619.GC4885@salvia> (raw)
In-Reply-To: <20141014172242.5983.11604.stgit@nfdev.cica.es>
On Tue, Oct 14, 2014 at 07:22:42PM +0200, Arturo Borrero Gonzalez wrote:
> This new expression provides NAT in the redirect flavour, which is to
> redirect packets to local machine.
>
> Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
> ---
> include/net/netfilter/nft_redir.h | 18 ++++++
> include/uapi/linux/netfilter/nf_tables.h | 16 +++++
> net/ipv4/netfilter/Kconfig | 9 +++
> net/ipv4/netfilter/Makefile | 1
> net/ipv4/netfilter/nft_redir_ipv4.c | 76 +++++++++++++++++++++++++
> net/ipv6/netfilter/Kconfig | 9 +++
> net/ipv6/netfilter/Makefile | 1
> net/netfilter/Kconfig | 9 +++
> net/netfilter/Makefile | 1
> net/netfilter/nft_redir.c | 93 ++++++++++++++++++++++++++++++
> 10 files changed, 233 insertions(+)
> create mode 100644 include/net/netfilter/nft_redir.h
> create mode 100644 net/ipv4/netfilter/nft_redir_ipv4.c
> create mode 100644 net/netfilter/nft_redir.c
>
> diff --git a/include/net/netfilter/nft_redir.h b/include/net/netfilter/nft_redir.h
> new file mode 100644
> index 0000000..b6695da
> --- /dev/null
> +++ b/include/net/netfilter/nft_redir.h
> @@ -0,0 +1,18 @@
> +#ifndef _NFT_REDIR_H_
> +#define _NFT_REDIR_H_
> +
> +struct nft_redir {
> + enum nft_registers sreg_proto_min:8;
> + enum nft_registers sreg_proto_max:8;
> + u32 flags;
I think you can use u16 to store the flags. So this consumes only 4
bytes in 32-bits arch.
> +};
> +
> +extern const struct nla_policy nft_redir_policy[];
> +
> +int nft_redir_init(const struct nft_ctx *ctx,
> + const struct nft_expr *expr,
> + const struct nlattr * const tb[]);
> +
> +int nft_redir_dump(struct sk_buff *skb, const struct nft_expr *expr);
> +
> +#endif /* _NFT_REDIR_H_ */
> diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h
> index c26df67..8a96a36 100644
> --- a/include/uapi/linux/netfilter/nf_tables.h
> +++ b/include/uapi/linux/netfilter/nf_tables.h
> @@ -849,4 +849,20 @@ enum nft_gen_attributes {
> };
> #define NFTA_GEN_MAX (__NFTA_GEN_MAX - 1)
>
> +/**
> + * enum nft_redir_attributes - nf_tables redirect expression netlink attributes
> + *
> + * @NFTA_REDIR_REG_PROTO_MIN: source register of proto range start (NLA_U32: nft_registers)
> + * @NFTA_REDIR_REG_PROTO_MAX: source register of proto range end (NLA_U32: nft_registers)
> + * @NFTA_REDIR_FLAGS: NAT flags (see NF_NAT_RANGE_* in linux/netfilter/nf_nat.h) (NLA_U32)
> + */
> +enum nft_redir_attributes {
> + NFTA_REDIR_UNSPEC,
> + NFTA_REDIR_REG_PROTO_MIN,
> + NFTA_REDIR_REG_PROTO_MAX,
> + NFTA_REDIR_FLAGS,
> + __NFTA_REDIR_MAX
> +};
> +#define NFTA_REDIR_MAX (__NFTA_REDIR_MAX - 1)
> +
Please, place this new chunk after the masq atributes.
> #endif /* _LINUX_NF_TABLES_H */
> diff --git a/net/ipv4/netfilter/Kconfig b/net/ipv4/netfilter/Kconfig
> index a300e2c..8358b2d 100644
> --- a/net/ipv4/netfilter/Kconfig
> +++ b/net/ipv4/netfilter/Kconfig
> @@ -119,6 +119,15 @@ config NFT_MASQ_IPV4
> This is the expression that provides IPv4 masquerading support for
> nf_tables.
>
> +config NFT_REDIR_IPV4
> + tristate "IPv4 redirect support for nf_tables"
> + depends on NF_TABLES_IPV4
> + depends on NFT_REDIR
> + select NF_NAT_REDIRECT_IPV4
> + help
> + This is the expression that provides IPv4 redirect support for
> + nf_tables.
> +
> config NF_NAT_SNMP_BASIC
> tristate "Basic SNMP-ALG support"
> depends on NF_CONNTRACK_SNMP
> diff --git a/net/ipv4/netfilter/Makefile b/net/ipv4/netfilter/Makefile
> index 34e436c..902bcd1 100644
> --- a/net/ipv4/netfilter/Makefile
> +++ b/net/ipv4/netfilter/Makefile
> @@ -41,6 +41,7 @@ obj-$(CONFIG_NFT_CHAIN_ROUTE_IPV4) += nft_chain_route_ipv4.o
> obj-$(CONFIG_NFT_CHAIN_NAT_IPV4) += nft_chain_nat_ipv4.o
> obj-$(CONFIG_NFT_REJECT_IPV4) += nft_reject_ipv4.o
> obj-$(CONFIG_NFT_MASQ_IPV4) += nft_masq_ipv4.o
> +obj-$(CONFIG_NFT_REDIR_IPV4) += nft_redir_ipv4.o
> obj-$(CONFIG_NF_TABLES_ARP) += nf_tables_arp.o
>
> # generic IP tables
[...]
> diff --git a/net/netfilter/nft_redir.c b/net/netfilter/nft_redir.c
> new file mode 100644
> index 0000000..1d414a7
> --- /dev/null
> +++ b/net/netfilter/nft_redir.c
> @@ -0,0 +1,93 @@
> +/*
> + * Copyright (c) 2014 Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License version 2 as
> + * published by the Free Software Foundation.
> + */
> +
> +#include <linux/kernel.h>
> +#include <linux/init.h>
> +#include <linux/module.h>
> +#include <linux/netlink.h>
> +#include <linux/netfilter.h>
> +#include <linux/netfilter/nf_tables.h>
> +#include <net/netfilter/nf_nat.h>
> +#include <net/netfilter/nf_tables.h>
> +#include <net/netfilter/nft_redir.h>
> +
> +const struct nla_policy nft_redir_policy[NFTA_REDIR_MAX + 1] = {
> + [NFTA_REDIR_REG_PROTO_MIN] = { .type = NLA_U32 },
> + [NFTA_REDIR_REG_PROTO_MAX] = { .type = NLA_U32 },
> + [NFTA_REDIR_FLAGS] = { .type = NLA_U32 },
> +};
> +EXPORT_SYMBOL_GPL(nft_redir_policy);
> +
> +int nft_redir_init(const struct nft_ctx *ctx,
> + const struct nft_expr *expr,
> + const struct nlattr * const tb[])
> +{
> + struct nft_redir *priv = nft_expr_priv(expr);
> + int err;
> +
> + if (tb[NFTA_REDIR_REG_PROTO_MIN]) {
> + priv->sreg_proto_min = ntohl(nla_get_be32(
> + tb[NFTA_REDIR_REG_PROTO_MIN]));
I prefer this:
priv->sreg_proto_min =
ntohl(nla_get_be32(tb[NFTA_REDIR_REG_PROTO_MIN]));
> + err = nft_validate_input_register(priv->sreg_proto_min);
> + if (err < 0)
> + return err;
> + }
No else here? ->sreg_proto_min is left uninitialized.
> +
> + if (tb[NFTA_REDIR_REG_PROTO_MAX]) {
> + priv->sreg_proto_max = ntohl(nla_get_be32(
> + tb[NFTA_REDIR_REG_PROTO_MAX]));
Same thing here.
> + err = nft_validate_input_register(priv->sreg_proto_max);
> + if (err < 0)
> + return err;
> + } else
> + priv->sreg_proto_max = priv->sreg_proto_min;
Missing brackets wrapping around this 'else'.
> +
> + if (tb[NFTA_REDIR_FLAGS]) {
> + priv->flags = ntohl(nla_get_be32(tb[NFTA_REDIR_FLAGS]));
> + if (priv->flags & ~NF_NAT_RANGE_MASK)
> + return -EINVAL;
> + }
> +
> +
extra line, remove it.
> + return 0;
> +}
> +EXPORT_SYMBOL_GPL(nft_redir_init);
> +
> +int nft_redir_dump(struct sk_buff *skb, const struct nft_expr *expr)
> +{
> + const struct nft_redir *priv = nft_expr_priv(expr);
> +
> + if (priv->sreg_proto_min) {
> + if (nla_put_be32(skb, NFTA_REDIR_REG_PROTO_MIN,
> + htonl(priv->sreg_proto_min)))
> + goto nla_put_failure;
> + if (nla_put_be32(skb, NFTA_REDIR_REG_PROTO_MAX,
> + htonl(priv->sreg_proto_max)))
> + goto nla_put_failure;
> + }
> +
> + if (priv->flags != 0) {
> + if (nla_put_be32(skb, NFTA_REDIR_FLAGS, htonl(priv->flags)))
> + goto nla_put_failure;
> + }
> +
> + if (priv->flags == 0)
> + return 0;
> +
> + if (nla_put_be32(skb, NFTA_REDIR_FLAGS, htonl(priv->flags)))
> + goto nla_put_failure;
These 10 lines above are freak. I guess you can refactor this to:
if (priv->flags != 0 &&
nla_put_...
goto nla_put_failure;
next prev parent reply other threads:[~2014-10-15 10:04 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-10-14 17:22 [nf_tables PATCH 1/3] netfilter: refactor NAT's redirect IPv4 code Arturo Borrero Gonzalez
2014-10-14 17:22 ` [nf_tables PATCH 2/3] netfilter: refactor NAT's redirect IPv6 code Arturo Borrero Gonzalez
2014-10-14 17:22 ` [nf_tables PATCH 3/3] netfilter: nf_tables: add new expression nft_redir Arturo Borrero Gonzalez
2014-10-15 10:06 ` Pablo Neira Ayuso [this message]
2014-10-15 10:11 ` Arturo Borrero Gonzalez
2014-10-15 11:14 ` Arturo Borrero Gonzalez
2014-10-16 8:41 ` Pablo Neira Ayuso
2014-10-15 9:50 ` [nf_tables PATCH 1/3] netfilter: refactor NAT's redirect IPv4 code Pablo Neira Ayuso
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20141015100619.GC4885@salvia \
--to=pablo@netfilter.org \
--cc=arturo.borrero.glez@gmail.com \
--cc=kaber@trash.net \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.