* [nft PATCH 0/4] Changes in nft byteorder conversions
@ 2014-07-28 11:51 Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 1/4] payload: fix update context with wrong byteorder Alvaro Neira Ayuso
` (3 more replies)
0 siblings, 4 replies; 5+ messages in thread
From: Alvaro Neira Ayuso @ 2014-07-28 11:51 UTC (permalink / raw)
To: netfilter-devel; +Cc: kaber
Currently, when we have added a rule, we have done some byteorder conversions
in the parser step, evaluation step and linealize step. For that, in some case
if we try to add rules, we have done wrong byteorder conversions and we have had
matching problems or when we have tried to show the rules that we have added
we have showed rules with values in wrong byteorder. We have had too this
problems when we have used sets or range.
This series of patches changes the policy for doing byteorder conversions in our
rules. We are going to do all the conversions in two steps, parser and
evaluation. That changes remove consecutive byteorder conversions, make more
easy administrate the byteorder conversions for adding and for showing rules and
fix some case that we don't update correctly the context for using values
without correctly byteorder conversions. This patches enables to use ranges and
sets with the rules without problems.
Comments are welcome.
Alvaro Neira Ayuso (4):
payload: fix update context with wrong byteorder
src: fix byteorder conversions in simple values
src: fix byteorder conversions in range values
src: fix byteorder conversions in sets
include/gmputil.h | 1 +
include/netlink.h | 3 +--
src/datatype.c | 8 ++++++--
src/evaluate.c | 48 +++++++++++++++++++++++++++++---------------
src/expression.c | 8 ++++++--
src/gmputil.c | 15 +++++++++++++-
src/netlink.c | 13 ++++++++----
src/netlink_delinearize.c | 49 +++++++++++++++++++++++++++++++++++++++++----
src/netlink_linearize.c | 10 ++++-----
src/payload.c | 10 ++++++---
10 files changed, 126 insertions(+), 39 deletions(-)
--
1.7.10.4
^ permalink raw reply [flat|nested] 5+ messages in thread
* [nft PATCH 1/4] payload: fix update context with wrong byteorder
2014-07-28 11:51 [nft PATCH 0/4] Changes in nft byteorder conversions Alvaro Neira Ayuso
@ 2014-07-28 11:51 ` Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 2/4 v2] src: fix byteorder conversions in simple values Alvaro Neira Ayuso
` (2 subsequent siblings)
3 siblings, 0 replies; 5+ messages in thread
From: Alvaro Neira Ayuso @ 2014-07-28 11:51 UTC (permalink / raw)
To: netfilter-devel; +Cc: kaber
In the evaluation step and delinealize step, we update the protocol
context. When we update the context, we expect that the expressions
are in host endian but the expressions are in big endian from this
two steps.
To fix this, We do the correct byteorder conversion for finding the
protocol number for updating the context. Example:
nft add rule bridge filter input ether type ip
We have a expression like this:
[ payload load 2b @ link header + 12 => reg 1 ]
[ cmp eq reg 1 0x00000008 ]
The byteorder of this expressions is big endian and it's in
host endian, for that when we try to update the context, we
don't find the protocol with this number. This is a output,
example:
update network layer protocol context:
link layer : ether
network layer : none <-
transport layer : none
Signed-off-by: Alvaro Neira Ayuso <alvaroneay@gmail.com>
---
[Tested with the rules]
* nft add rule filter input ip protocol tcp counter
* nft add rule filter input ip protocol udp counter
* nft add rule filter input tcp dport 22 counter
* nft add rule filter bridge input ether type ip
src/payload.c | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/src/payload.c b/src/payload.c
index a1785a5..be3d610 100644
--- a/src/payload.c
+++ b/src/payload.c
@@ -69,13 +69,18 @@ static void payload_expr_pctx_update(struct proto_ctx *ctx,
{
const struct expr *left = expr->left, *right = expr->right;
const struct proto_desc *base, *desc;
+ const struct proto_hdr_template *tmpl;
+ uint32_t value = 0;
if (!(left->flags & EXPR_F_PROTOCOL))
return;
assert(expr->op == OP_EQ);
base = ctx->protocol[left->payload.base].desc;
- desc = proto_find_upper(base, mpz_get_uint32(right->value));
+ tmpl = left->payload.tmpl;
+ mpz_export_data(&value, right->value, tmpl->dtype->byteorder,
+ div_round_up(tmpl->len, BITS_PER_BYTE));
+ desc = proto_find_upper(base, value);
proto_ctx_update(ctx, left->payload.base + 1, &expr->location, desc);
}
--
1.7.10.4
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [nft PATCH 2/4 v2] src: fix byteorder conversions in simple values
2014-07-28 11:51 [nft PATCH 0/4] Changes in nft byteorder conversions Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 1/4] payload: fix update context with wrong byteorder Alvaro Neira Ayuso
@ 2014-07-28 11:51 ` Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 3/4] src: fix byteorder conversions in range values Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 4/4] src: fix byteorder conversions in sets Alvaro Neira Ayuso
3 siblings, 0 replies; 5+ messages in thread
From: Alvaro Neira Ayuso @ 2014-07-28 11:51 UTC (permalink / raw)
To: netfilter-devel; +Cc: kaber
Currently the byteorder conversion happens in the parser,
the evaluation and the code generation steps. This is a problem
because the expression which are already in big endian byteorder
are converted again.
With this patch, we don't change byteorder in the code generation
step anymore because we assume that all expressions are in the
appropriate byteorder. This patch solves rules like:
nft add rule bridge filter input ether type ip
With this rule we create a expression like:
[ payload load 2b @ link header + 12 => reg 1 ]
[ cmp eq reg 1 0x00000800 ]
With this patch, we have a expresion with the correct conversion:
[ payload load 2b @ link header + 12 => reg 1 ]
[ cmp eq reg 1 0x00000008 ]
This is also a problem in the delinearize step because the expression
are already converted to the correctly byteorder and we change it again.
Signed-off-by: Alvaro Neira Ayuso <alvaroneay@gmail.com>
---
[changes in v2]
* Added some comments for explaining better the changes that I have done
* Fixed a wrong byteorder conversions when we use a string in some rules,
for example "nft add rule filter input tcp dport ssh".
* I have changed the function byteorder_conversion for making the byteorder
conversion of single values in case that we must to changing it. Previously,
we change the byteorder and we make convert the value in netlink with the
new byteorder.
include/gmputil.h | 1 +
include/netlink.h | 3 +--
src/datatype.c | 8 ++++++--
src/evaluate.c | 7 ++++---
src/expression.c | 8 ++++++--
src/gmputil.c | 15 ++++++++++++++-
src/netlink.c | 13 +++++++++----
src/netlink_delinearize.c | 16 ++++++++++++----
src/netlink_linearize.c | 10 +++++-----
src/payload.c | 3 +--
10 files changed, 59 insertions(+), 25 deletions(-)
diff --git a/include/gmputil.h b/include/gmputil.h
index 63eb0ba..566d7d7 100644
--- a/include/gmputil.h
+++ b/include/gmputil.h
@@ -48,4 +48,5 @@ extern void mpz_import_data(mpz_t rop, const void *data,
unsigned int len);
extern void mpz_switch_byteorder(mpz_t rop, unsigned int len);
+extern void mpz_switch_expr_byteorder(struct expr *expr);
#endif /* NFTABLES_GMPUTIL_H */
diff --git a/include/netlink.h b/include/netlink.h
index af5dcd9..603da80 100644
--- a/include/netlink.h
+++ b/include/netlink.h
@@ -55,8 +55,7 @@ struct nft_data_delinearize {
extern void netlink_gen_data(const struct expr *expr,
struct nft_data_linearize *data);
-extern void netlink_gen_raw_data(const mpz_t value, enum byteorder byteorder,
- unsigned int len,
+extern void netlink_gen_raw_data(const mpz_t value, unsigned int len,
struct nft_data_linearize *data);
extern struct expr *netlink_alloc_value(const struct location *loc,
diff --git a/src/datatype.c b/src/datatype.c
index 55af227..6b49a4a 100644
--- a/src/datatype.c
+++ b/src/datatype.c
@@ -255,8 +255,11 @@ static struct error_record *integer_type_parse(const struct expr *sym,
sym->dtype->desc);
}
+ /* If we use integer type, we must to convert it to big endian for
+ * using it in internet format (big endian).
+ */
*res = constant_expr_alloc(&sym->location, sym->dtype,
- BYTEORDER_HOST_ENDIAN, 1, NULL);
+ BYTEORDER_BIG_ENDIAN, 1, NULL);
mpz_set((*res)->value, v);
mpz_clear(v);
return NULL;
@@ -545,7 +548,7 @@ static struct error_record *inet_service_type_parse(const struct expr *sym,
if (errno == ERANGE || i > UINT16_MAX)
return error(&sym->location, "Service out of range");
- port = htons(i);
+ port = i;
} else {
err = getaddrinfo(NULL, sym->identifier, NULL, &ai);
if (err != 0)
@@ -553,6 +556,7 @@ static struct error_record *inet_service_type_parse(const struct expr *sym,
gai_strerror(err));
port = ((struct sockaddr_in *)ai->ai_addr)->sin_port;
+ port = htons(port);
freeaddrinfo(ai);
}
diff --git a/src/evaluate.c b/src/evaluate.c
index e05473a..ecd7dfa 100644
--- a/src/evaluate.c
+++ b/src/evaluate.c
@@ -168,9 +168,10 @@ static int byteorder_conversion(struct eval_ctx *ctx, struct expr **expr,
byteorder_names[byteorder],
byteorder_names[(*expr)->byteorder]);
- if (expr_is_constant(*expr))
- (*expr)->byteorder = byteorder;
- else {
+ if (expr_is_constant(*expr)) {
+ if ((*expr)->byteorder == BYTEORDER_BIG_ENDIAN)
+ mpz_switch_expr_byteorder(*expr);
+ } else {
op = byteorder_conversion_op(*expr, byteorder);
*expr = unary_expr_alloc(&(*expr)->location, op, *expr);
if (expr_evaluate(ctx, expr) < 0)
diff --git a/src/expression.c b/src/expression.c
index fa14d99..d2c61f7 100644
--- a/src/expression.c
+++ b/src/expression.c
@@ -303,8 +303,12 @@ struct expr *constant_expr_join(const struct expr *e1, const struct expr *e2)
assert(e2->ops->type == EXPR_VALUE);
tmp = e1->len / BITS_PER_BYTE;
- mpz_export_data(data, e1->value, e1->byteorder, tmp);
- mpz_export_data(data + tmp, e2->value, e2->byteorder,
+
+ /* All the values here have been converted to the correctly byteorder
+ * we don't need to change it again for joining it
+ */
+ mpz_export_data(data, e1->value, BYTEORDER_HOST_ENDIAN, tmp);
+ mpz_export_data(data + tmp, e2->value, BYTEORDER_HOST_ENDIAN,
e2->len / BITS_PER_BYTE);
return constant_expr_alloc(&e1->location, &invalid_type,
diff --git a/src/gmputil.c b/src/gmputil.c
index cb46445..cc1ceca 100644
--- a/src/gmputil.c
+++ b/src/gmputil.c
@@ -20,6 +20,7 @@
#include <datatype.h>
#include <gmputil.h>
#include <utils.h>
+#include <expression.h>
void mpz_bitmask(mpz_t rop, unsigned int width)
{
@@ -125,13 +126,17 @@ void mpz_import_data(mpz_t rop, const void *data,
enum mpz_word_order order;
enum mpz_byte_order endian;
+/* We can import data from the parser, the datatype is invalid there.
+ * Handle invalid byteorder as host endian, we'll get the real datatype
+ * in the evaluation step, then it will be converted to big endian if needed.
+ */
switch (byteorder) {
case BYTEORDER_BIG_ENDIAN:
- default:
order = MPZ_MSWF;
endian = MPZ_BIG_ENDIAN;
break;
case BYTEORDER_HOST_ENDIAN:
+ default:
order = MPZ_HWO;
endian = MPZ_HOST_ENDIAN;
break;
@@ -140,6 +145,14 @@ void mpz_import_data(mpz_t rop, const void *data,
mpz_import(rop, len, order, 1, endian, 0, data);
}
+void mpz_switch_expr_byteorder(struct expr *expr)
+{
+ uint32_t len;
+
+ len = div_round_up(expr->len, BITS_PER_BYTE);
+ mpz_switch_byteorder(expr->value, len);
+}
+
void mpz_switch_byteorder(mpz_t rop, unsigned int len)
{
char data[len];
diff --git a/src/netlink.c b/src/netlink.c
index 05fae10..00c3cb1 100644
--- a/src/netlink.c
+++ b/src/netlink.c
@@ -240,11 +240,16 @@ static struct nft_set_elem *alloc_nft_setelem(const struct expr *expr)
return nlse;
}
-void netlink_gen_raw_data(const mpz_t value, enum byteorder byteorder,
- unsigned int len, struct nft_data_linearize *data)
+void netlink_gen_raw_data(const mpz_t value, unsigned int len,
+ struct nft_data_linearize *data)
{
assert(len > 0);
- mpz_export_data(data->value, value, byteorder, len);
+
+ /* After the evaluation step we assume that the values are always in
+ * the appropriate byteorder. Use BYTEORDER_HOST_ENDIAN here not to
+ * alter endianness.
+ */
+ mpz_export_data(data->value, value, BYTEORDER_HOST_ENDIAN, len);
data->len = len;
}
@@ -278,7 +283,7 @@ static void netlink_gen_constant_data(const struct expr *expr,
struct nft_data_linearize *data)
{
assert(expr->ops->type == EXPR_VALUE);
- netlink_gen_raw_data(expr->value, expr->byteorder,
+ netlink_gen_raw_data(expr->value,
div_round_up(expr->len, BITS_PER_BYTE), data);
}
diff --git a/src/netlink_delinearize.c b/src/netlink_delinearize.c
index 5c6ca80..c45b3b4 100644
--- a/src/netlink_delinearize.c
+++ b/src/netlink_delinearize.c
@@ -642,14 +642,20 @@ static void payload_match_postprocess(struct rule_pp_ctx *ctx,
list_for_each_entry(left, &list, list) {
tmp = constant_expr_splice(right, left->len);
expr_set_type(tmp, left->dtype, left->byteorder);
- if (tmp->byteorder == BYTEORDER_HOST_ENDIAN)
- mpz_switch_byteorder(tmp->value, tmp->len / BITS_PER_BYTE);
nexpr = relational_expr_alloc(&expr->location, expr->op,
left, tmp);
if (expr->op == OP_EQ)
left->ops->pctx_update(&ctx->pctx, nexpr);
+
+ /* We have to convert the values that we obtained from the kernel to
+ * host byteorder. Therefore, we assume that the values are in host
+ * endian after the delinearization.
+ */
+ if (tmp->byteorder != BYTEORDER_HOST_ENDIAN)
+ mpz_switch_expr_byteorder(nexpr->right);
+
nstmt = expr_stmt_alloc(&stmt->location, nexpr);
list_add_tail(&nstmt->list, &stmt->list);
@@ -831,8 +837,10 @@ static void expr_postprocess(struct rule_pp_ctx *ctx,
payload_dependency_kill(ctx, expr);
break;
case EXPR_VALUE:
- // FIXME
- if (expr->byteorder == BYTEORDER_HOST_ENDIAN)
+ /* If we have value with big endian byteorder, we must to change
+ * it for showing it in host endian byteorder.
+ */
+ if (expr->byteorder == BYTEORDER_BIG_ENDIAN)
mpz_switch_byteorder(expr->value, expr->len / BITS_PER_BYTE);
// Quite a hack :)
diff --git a/src/netlink_linearize.c b/src/netlink_linearize.c
index 5c1b46d..8788813 100644
--- a/src/netlink_linearize.c
+++ b/src/netlink_linearize.c
@@ -206,8 +206,8 @@ static void netlink_gen_cmp(struct netlink_linearize_ctx *ctx,
mpz_init(mask);
mpz_prefixmask(mask, expr->right->len, expr->right->prefix_len);
- netlink_gen_raw_data(mask, expr->right->byteorder,
- expr->right->len / BITS_PER_BYTE, &nld);
+ netlink_gen_raw_data(mask, expr->right->len / BITS_PER_BYTE,
+ &nld);
mpz_clear(mask);
zero.len = nld.len;
@@ -315,7 +315,7 @@ static void netlink_gen_flagcmp(struct netlink_linearize_ctx *ctx,
mpz_init_set_ui(zero, 0);
- netlink_gen_raw_data(zero, expr->right->byteorder, len, &nld);
+ netlink_gen_raw_data(zero, len, &nld);
netlink_gen_data(expr->right, &nld2);
nle = alloc_nft_expr("bitwise");
@@ -423,9 +423,9 @@ static void netlink_gen_binop(struct netlink_linearize_ctx *ctx,
nft_rule_expr_set_u32(nle, NFT_EXPR_BITWISE_DREG, dreg);
nft_rule_expr_set_u32(nle, NFT_EXPR_BITWISE_LEN, len);
- netlink_gen_raw_data(mask, expr->byteorder, len, &nld);
+ netlink_gen_raw_data(mask, len, &nld);
nft_rule_expr_set(nle, NFT_EXPR_BITWISE_MASK, nld.value, nld.len);
- netlink_gen_raw_data(xor, expr->byteorder, len, &nld);
+ netlink_gen_raw_data(xor, len, &nld);
nft_rule_expr_set(nle, NFT_EXPR_BITWISE_XOR, nld.value, nld.len);
mpz_clear(tmp);
diff --git a/src/payload.c b/src/payload.c
index be3d610..8b10a79 100644
--- a/src/payload.c
+++ b/src/payload.c
@@ -213,8 +213,7 @@ int payload_gen_dependency(struct eval_ctx *ctx, const struct expr *expr,
left = payload_expr_alloc(&expr->location, desc, desc->protocol_key);
right = constant_expr_alloc(&expr->location, tmpl->dtype,
- BYTEORDER_HOST_ENDIAN,
- tmpl->len,
+ tmpl->dtype->byteorder, tmpl->len,
constant_data_ptr(protocol, tmpl->len));
dep = relational_expr_alloc(&expr->location, OP_EQ, left, right);
--
1.7.10.4
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [nft PATCH 3/4] src: fix byteorder conversions in range values
2014-07-28 11:51 [nft PATCH 0/4] Changes in nft byteorder conversions Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 1/4] payload: fix update context with wrong byteorder Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 2/4 v2] src: fix byteorder conversions in simple values Alvaro Neira Ayuso
@ 2014-07-28 11:51 ` Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 4/4] src: fix byteorder conversions in sets Alvaro Neira Ayuso
3 siblings, 0 replies; 5+ messages in thread
From: Alvaro Neira Ayuso @ 2014-07-28 11:51 UTC (permalink / raw)
To: netfilter-devel; +Cc: kaber
Currently if we try to use range values in nft rules doesn't
work correctly. Usually this problems are for doing incorrect byteorder
conversion or for having not too much info for converting the values in
the correct byteorder.
I have designed some solutions for the different kind of datatype:
* If we have a rule that the byteorder are big endian
nft add rule filter input tcp dport 22-25
[ payload load 1b @ network header + 9 => reg 1 ]
[ cmp eq reg 1 0x00000006 ]
[ payload load 2b @ transport header + 2 => reg 1 ]
[ cmp gte reg 1 0x00001600 ]
[ cmp lte reg 1 0x00001900 ]
In this case, we have sufficient for changing the values in the byteorder,
that we expect and we change it without problem.
* If we have a rule that we use integer_type, in this case the byteorder
associate to this value are INVALID:
nft add rule filter input tcp checksum 22-25
We usually expect this values from the network in big endian, for that I have
added a unary expression for changing the register. That solves the problem
that we have had in delinealize step for having the same rule that we have
added (usually we have had byteorder problem and we show the rules values in
wrong byteorder format)
[ payload load 1b @ network header + 9 => reg 1 ]
[ cmp eq reg 1 0x00000006 ]
[ payload load 2b @ transport header + 16 => reg 1 ]
[ byteorder reg 1 = hton(reg 1, 2, 2) ]
[ cmp gte reg 1 0x00000016 ]
[ cmp lte reg 1 0x00000019 ]
Signed-off-by: Alvaro Neira Ayuso <alvaroneay@gmail.com>
---
src/evaluate.c | 27 +++++++++++++++++++--------
src/netlink_delinearize.c | 22 +++++++++++++++++++++-
2 files changed, 40 insertions(+), 9 deletions(-)
diff --git a/src/evaluate.c b/src/evaluate.c
index ecd7dfa..74a7506 100644
--- a/src/evaluate.c
+++ b/src/evaluate.c
@@ -149,8 +149,15 @@ static enum ops byteorder_conversion_op(struct expr *expr,
default:
break;
}
- BUG("invalid byte order conversion %u => %u\n",
- expr->byteorder, byteorder);
+ /* If we have a value with INVALID format, we must to say what
+ * kind of unary expression we want to add for comparing the
+ * value with the register
+ */
+ if (byteorder != BYTEORDER_HOST_ENDIAN)
+ return OP_NTOH;
+
+ expr->byteorder = BYTEORDER_HOST_ENDIAN;
+ return OP_HTON;
}
static int byteorder_conversion(struct eval_ctx *ctx, struct expr **expr,
@@ -1031,12 +1038,16 @@ range:
break;
}
- if (byteorder_conversion(ctx, &rel->left, BYTEORDER_BIG_ENDIAN) < 0)
- return -1;
- if (byteorder_conversion(ctx, &right->left, BYTEORDER_BIG_ENDIAN) < 0)
- return -1;
- if (byteorder_conversion(ctx, &right->right, BYTEORDER_BIG_ENDIAN) < 0)
- return -1;
+ switch (rel->left->dtype->byteorder) {
+ case BYTEORDER_INVALID:
+ if (byteorder_conversion(ctx, &rel->left,
+ BYTEORDER_HOST_ENDIAN) < 0)
+ return -1;
+ break;
+ case BYTEORDER_BIG_ENDIAN:
+ default:
+ break;
+ }
break;
default:
BUG("invalid relational operation %u\n", rel->op);
diff --git a/src/netlink_delinearize.c b/src/netlink_delinearize.c
index c45b3b4..5fdf7e2 100644
--- a/src/netlink_delinearize.c
+++ b/src/netlink_delinearize.c
@@ -627,6 +627,18 @@ static void payload_dependency_store(struct rule_pp_ctx *ctx,
ctx->pdep = stmt;
}
+static void expr_payload_elem_postprocess(struct expr *expr)
+{
+ switch (expr->ops->type) {
+ case EXPR_VALUE:
+ if (expr->dtype->byteorder == BYTEORDER_BIG_ENDIAN)
+ mpz_switch_expr_byteorder(expr);
+ break;
+ default:
+ break;
+ }
+}
+
static void payload_match_postprocess(struct rule_pp_ctx *ctx,
struct stmt *stmt, struct expr *expr)
{
@@ -648,7 +660,6 @@ static void payload_match_postprocess(struct rule_pp_ctx *ctx,
if (expr->op == OP_EQ)
left->ops->pctx_update(&ctx->pctx, nexpr);
-
/* We have to convert the values that we obtained from the kernel to
* host byteorder. Therefore, we assume that the values are in host
* endian after the delinearization.
@@ -677,6 +688,15 @@ static void payload_match_postprocess(struct rule_pp_ctx *ctx,
payload_expr_complete(left, &ctx->pctx);
expr_set_type(expr->right, expr->left->dtype,
expr->left->byteorder);
+
+ /* If we have rules that we have used payload with ranges or set
+ * we must to convert it to host endian for representing it
+ * correctly
+ */
+ if (left->dtype->byteorder == BYTEORDER_BIG_ENDIAN)
+ expr_payload_elem_postprocess(expr->right);
+
payload_dependency_kill(ctx, expr->left);
break;
}
--
1.7.10.4
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [nft PATCH 4/4] src: fix byteorder conversions in sets
2014-07-28 11:51 [nft PATCH 0/4] Changes in nft byteorder conversions Alvaro Neira Ayuso
` (2 preceding siblings ...)
2014-07-28 11:51 ` [nft PATCH 3/4] src: fix byteorder conversions in range values Alvaro Neira Ayuso
@ 2014-07-28 11:51 ` Alvaro Neira Ayuso
3 siblings, 0 replies; 5+ messages in thread
From: Alvaro Neira Ayuso @ 2014-07-28 11:51 UTC (permalink / raw)
To: netfilter-devel; +Cc: kaber
Currently, we have wrong byteorder conversions if we want to use
set some nft rules or in some case errors. I have designed a solution for the
different kind of rules with different byteorder:
* For rules with big endian value:
nft add rule filter input tcp dport {22-25}
set%d filter 7
set%d filter 0
element 00000000 : 1 [end] element 00001600 : 0 [end] element 00001901 : 1 [end]
ip filter input
[ payload load 1b @ network header + 9 => reg 1 ]
[ cmp eq reg 1 0x00000006 ]
[ payload load 2b @ transport header + 2 => reg 1 ]
[ lookup reg 1 set set%d ]
In that case, we are going to change it the values inside of the set to big
endian byteorder.
* For rules with invalid byteorder:
nft add rule filter input tcp checksum {22-25}
set%d filter 7
set%d filter 0
element 00000000 :1 [end] element 00000016 :0 [end] element 0000001a : 1 [end]
ip filter input
[ payload load 1b @ network header + 9 => reg 1 ]
[ cmp eq reg 1 0x00000006 ]
[ payload load 2b @ transport header + 16 => reg 1 ]
[ byteorder reg 1 = hton(reg 1, 2, 2) ]
[ lookup reg 1 set set%d ]
In that case, we are going to add a unary expression for changing the register
previously to comparing it with the values inside of our set.
Signed-off-by: Alvaro Neira Ayuso <alvaroneay@gmail.com>
---
src/evaluate.c | 12 ++++++++----
src/netlink_delinearize.c | 12 ++++++++++++
2 files changed, 20 insertions(+), 4 deletions(-)
diff --git a/src/evaluate.c b/src/evaluate.c
index d09cb27..4521b92 100644
--- a/src/evaluate.c
+++ b/src/evaluate.c
@@ -934,11 +934,15 @@ static int expr_evaluate_relational(struct eval_ctx *ctx, struct expr **expr)
left->dtype->desc,
right->dtype->desc);
- /* Data for range lookups needs to be in big endian order */
+ /* Data for range with invalid byteorder, we must to add
+ * a unary expression for changing the register for comparing it
+ */
if (right->set->flags & SET_F_INTERVAL &&
- byteorder_conversion(ctx, &rel->left,
- BYTEORDER_BIG_ENDIAN) < 0)
- return -1;
+ rel->left->byteorder == BYTEORDER_INVALID) {
+ if (byteorder_conversion(ctx, &rel->left,
+ BYTEORDER_HOST_ENDIAN) < 0)
+ return -1;
+ }
left = rel->left;
break;
case OP_EQ:
diff --git a/src/netlink_delinearize.c b/src/netlink_delinearize.c
index 015c211..1b2ffa6 100644
--- a/src/netlink_delinearize.c
+++ b/src/netlink_delinearize.c
@@ -629,11 +629,21 @@ static void payload_dependency_store(struct rule_pp_ctx *ctx,
static void expr_payload_elem_postprocess(struct expr *expr)
{
+ struct expr *i;
+
switch (expr->ops->type) {
case EXPR_VALUE:
if (expr->dtype->byteorder == BYTEORDER_BIG_ENDIAN)
mpz_switch_expr_byteorder(expr);
break;
+ case EXPR_SET_REF:
+ list_for_each_entry(i, &expr->set->init->expressions, list)
+ expr_payload_elem_postprocess(i);
+ break;
+ case EXPR_RANGE:
+ expr_payload_elem_postprocess(expr->right);
+ expr_payload_elem_postprocess(expr->left);
+ break;
default:
break;
}
@@ -891,6 +901,8 @@ static void expr_postprocess(struct rule_pp_ctx *ctx,
expr_postprocess(ctx, stmt, &expr->right);
break;
case EXPR_SET_REF:
+ expr_postprocess(ctx, stmt, &expr->set->init);
+ break;
case EXPR_EXTHDR:
case EXPR_META:
case EXPR_CT:
--
1.7.10.4
^ permalink raw reply related [flat|nested] 5+ messages in thread
end of thread, other threads:[~2014-07-28 11:52 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-07-28 11:51 [nft PATCH 0/4] Changes in nft byteorder conversions Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 1/4] payload: fix update context with wrong byteorder Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 2/4 v2] src: fix byteorder conversions in simple values Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 3/4] src: fix byteorder conversions in range values Alvaro Neira Ayuso
2014-07-28 11:51 ` [nft PATCH 4/4] src: fix byteorder conversions in sets Alvaro Neira Ayuso
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).