* [PATCH nf-next] netfilter: remove need for skb_clone in nf_fwd_netdev_egress
@ 2016-11-28 10:40 Florian Westphal
2016-11-28 10:40 ` [PATCH nf-next] netfilter: ingress: translate 0 nf_hook_slow retval to -EINPROGRESS Florian Westphal
2016-11-28 10:40 ` [PATCH nf-next] netfilter: add and use nf_fwd_netdev_egress Florian Westphal
0 siblings, 2 replies; 4+ messages in thread
From: Florian Westphal @ 2016-11-28 10:40 UTC (permalink / raw)
To: netfilter-devel
forward expression currently clones the skb, then forwards the clone and returns
NF_DROP to the core.
First patch allows using NF_STOLEN from ingress/netdev hook, 2nd patch
adds a new helper that then forwards the original skb.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [PATCH nf-next] netfilter: ingress: translate 0 nf_hook_slow retval to -EINPROGRESS
2016-11-28 10:40 [PATCH nf-next] netfilter: remove need for skb_clone in nf_fwd_netdev_egress Florian Westphal
@ 2016-11-28 10:40 ` Florian Westphal
2016-12-06 10:35 ` Pablo Neira Ayuso
2016-11-28 10:40 ` [PATCH nf-next] netfilter: add and use nf_fwd_netdev_egress Florian Westphal
1 sibling, 1 reply; 4+ messages in thread
From: Florian Westphal @ 2016-11-28 10:40 UTC (permalink / raw)
To: netfilter-devel; +Cc: Florian Westphal
The caller assumes that < 0 means that skb was stolen (or free'd).
All other return values continue skb processing.
nf_hook_slow returns 3 different return value types:
A) a (negative) errno value: the skb was dropped (NF_DROP, e.g.
by iptables '-j DROP' rule).
B) 0. The skb was stolen by the hook or queued to userspace.
C) 1. all hooks returned NF_ACCEPT so the caller should invoke
the okfn so packet processing can continue.
nft ingress facility currently doesn't have the 'okfn' that
the NF_HOOK() macros use; there is no nfqueue support either.
So 1 means that nf_hook_ingress() caller should go on processing the skb.
In order to allow use of NF_STOLEN from ingress we need to translate
this to an errno number, else we'd crash because we continue with
already-free'd (or about to be free-d) skb.
Random dice roll has chosen EINPROGRESS. The errno value isn't checked,
its just important that its less than 0.
Signed-off-by: Florian Westphal <fw@strlen.de>
---
include/linux/netfilter_ingress.h | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/include/linux/netfilter_ingress.h b/include/linux/netfilter_ingress.h
index 2dc3b49b804a..d5027e470a24 100644
--- a/include/linux/netfilter_ingress.h
+++ b/include/linux/netfilter_ingress.h
@@ -19,6 +19,7 @@ static inline int nf_hook_ingress(struct sk_buff *skb)
{
struct nf_hook_entry *e = rcu_dereference(skb->dev->nf_hooks_ingress);
struct nf_hook_state state;
+ int ret;
/* Must recheck the ingress hook head, in the event it became NULL
* after the check in nf_hook_ingress_active evaluated to true.
@@ -29,7 +30,11 @@ static inline int nf_hook_ingress(struct sk_buff *skb)
nf_hook_state_init(&state, NF_NETDEV_INGRESS,
NFPROTO_NETDEV, skb->dev, NULL, NULL,
dev_net(skb->dev), NULL);
- return nf_hook_slow(skb, &state, e);
+ ret = nf_hook_slow(skb, &state, e);
+ if (unlikely(ret == 0))
+ return -EINPROGRESS;
+
+ return ret;
}
static inline void nf_hook_ingress_init(struct net_device *dev)
--
2.7.3
^ permalink raw reply related [flat|nested] 4+ messages in thread
* [PATCH nf-next] netfilter: add and use nf_fwd_netdev_egress
2016-11-28 10:40 [PATCH nf-next] netfilter: remove need for skb_clone in nf_fwd_netdev_egress Florian Westphal
2016-11-28 10:40 ` [PATCH nf-next] netfilter: ingress: translate 0 nf_hook_slow retval to -EINPROGRESS Florian Westphal
@ 2016-11-28 10:40 ` Florian Westphal
1 sibling, 0 replies; 4+ messages in thread
From: Florian Westphal @ 2016-11-28 10:40 UTC (permalink / raw)
To: netfilter-devel; +Cc: Florian Westphal
... so we can use current skb instead of working with a clone.
Signed-off-by: Florian Westphal <fw@strlen.de>
---
include/net/netfilter/nf_dup_netdev.h | 1 +
net/netfilter/nf_dup_netdev.c | 33 +++++++++++++++++++++++++--------
net/netfilter/nft_fwd_netdev.c | 4 ++--
3 files changed, 28 insertions(+), 10 deletions(-)
diff --git a/include/net/netfilter/nf_dup_netdev.h b/include/net/netfilter/nf_dup_netdev.h
index 397dcae349f9..3e919356bedf 100644
--- a/include/net/netfilter/nf_dup_netdev.h
+++ b/include/net/netfilter/nf_dup_netdev.h
@@ -2,5 +2,6 @@
#define _NF_DUP_NETDEV_H_
void nf_dup_netdev_egress(const struct nft_pktinfo *pkt, int oif);
+void nf_fwd_netdev_egress(const struct nft_pktinfo *pkt, int oif);
#endif
diff --git a/net/netfilter/nf_dup_netdev.c b/net/netfilter/nf_dup_netdev.c
index 44ae986c383f..49c38855f547 100644
--- a/net/netfilter/nf_dup_netdev.c
+++ b/net/netfilter/nf_dup_netdev.c
@@ -14,6 +14,29 @@
#include <linux/netfilter/nf_tables.h>
#include <net/netfilter/nf_tables.h>
+static void nf_do_netdev_egress(struct sk_buff *skb, struct net_device *dev)
+{
+ if (skb_mac_header_was_set(skb))
+ skb_push(skb, skb->mac_len);
+
+ skb->dev = dev;
+ dev_queue_xmit(skb);
+}
+
+void nf_fwd_netdev_egress(const struct nft_pktinfo *pkt, int oif)
+{
+ struct net_device *dev;
+
+ dev = dev_get_by_index_rcu(nft_net(pkt), oif);
+ if (!dev) {
+ kfree_skb(pkt->skb);
+ return;
+ }
+
+ nf_do_netdev_egress(pkt->skb, dev);
+}
+EXPORT_SYMBOL_GPL(nf_fwd_netdev_egress);
+
void nf_dup_netdev_egress(const struct nft_pktinfo *pkt, int oif)
{
struct net_device *dev;
@@ -24,14 +47,8 @@ void nf_dup_netdev_egress(const struct nft_pktinfo *pkt, int oif)
return;
skb = skb_clone(pkt->skb, GFP_ATOMIC);
- if (skb == NULL)
- return;
-
- if (skb_mac_header_was_set(skb))
- skb_push(skb, skb->mac_len);
-
- skb->dev = dev;
- dev_queue_xmit(skb);
+ if (skb)
+ nf_do_netdev_egress(skb, dev);
}
EXPORT_SYMBOL_GPL(nf_dup_netdev_egress);
diff --git a/net/netfilter/nft_fwd_netdev.c b/net/netfilter/nft_fwd_netdev.c
index 763ebc3e0b2b..ce13a50b9189 100644
--- a/net/netfilter/nft_fwd_netdev.c
+++ b/net/netfilter/nft_fwd_netdev.c
@@ -26,8 +26,8 @@ static void nft_fwd_netdev_eval(const struct nft_expr *expr,
struct nft_fwd_netdev *priv = nft_expr_priv(expr);
int oif = regs->data[priv->sreg_dev];
- nf_dup_netdev_egress(pkt, oif);
- regs->verdict.code = NF_DROP;
+ nf_fwd_netdev_egress(pkt, oif);
+ regs->verdict.code = NF_STOLEN;
}
static const struct nla_policy nft_fwd_netdev_policy[NFTA_FWD_MAX + 1] = {
--
2.7.3
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH nf-next] netfilter: ingress: translate 0 nf_hook_slow retval to -EINPROGRESS
2016-11-28 10:40 ` [PATCH nf-next] netfilter: ingress: translate 0 nf_hook_slow retval to -EINPROGRESS Florian Westphal
@ 2016-12-06 10:35 ` Pablo Neira Ayuso
0 siblings, 0 replies; 4+ messages in thread
From: Pablo Neira Ayuso @ 2016-12-06 10:35 UTC (permalink / raw)
To: Florian Westphal; +Cc: netfilter-devel
On Mon, Nov 28, 2016 at 11:40:05AM +0100, Florian Westphal wrote:
> The caller assumes that < 0 means that skb was stolen (or free'd).
>
> All other return values continue skb processing.
>
> nf_hook_slow returns 3 different return value types:
>
> A) a (negative) errno value: the skb was dropped (NF_DROP, e.g.
> by iptables '-j DROP' rule).
>
> B) 0. The skb was stolen by the hook or queued to userspace.
>
> C) 1. all hooks returned NF_ACCEPT so the caller should invoke
> the okfn so packet processing can continue.
>
> nft ingress facility currently doesn't have the 'okfn' that
> the NF_HOOK() macros use; there is no nfqueue support either.
>
> So 1 means that nf_hook_ingress() caller should go on processing the skb.
>
> In order to allow use of NF_STOLEN from ingress we need to translate
> this to an errno number, else we'd crash because we continue with
> already-free'd (or about to be free-d) skb.
>
> Random dice roll has chosen EINPROGRESS. The errno value isn't checked,
> its just important that its less than 0.
Not really comments to block anything, so take them lightly.
Probably we can just set this to -1, I know this maps to some errno
value, but at least from code reading it will be make think that we
meant to return EINPROGRESS. If you agree, I can just mangle the
patch.
One more question below.
> Signed-off-by: Florian Westphal <fw@strlen.de>
> ---
> include/linux/netfilter_ingress.h | 7 ++++++-
> 1 file changed, 6 insertions(+), 1 deletion(-)
>
> diff --git a/include/linux/netfilter_ingress.h b/include/linux/netfilter_ingress.h
> index 2dc3b49b804a..d5027e470a24 100644
> --- a/include/linux/netfilter_ingress.h
> +++ b/include/linux/netfilter_ingress.h
> @@ -19,6 +19,7 @@ static inline int nf_hook_ingress(struct sk_buff *skb)
> {
> struct nf_hook_entry *e = rcu_dereference(skb->dev->nf_hooks_ingress);
> struct nf_hook_state state;
> + int ret;
>
> /* Must recheck the ingress hook head, in the event it became NULL
> * after the check in nf_hook_ingress_active evaluated to true.
> @@ -29,7 +30,11 @@ static inline int nf_hook_ingress(struct sk_buff *skb)
> nf_hook_state_init(&state, NF_NETDEV_INGRESS,
> NFPROTO_NETDEV, skb->dev, NULL, NULL,
> dev_net(skb->dev), NULL);
> - return nf_hook_slow(skb, &state, e);
> + ret = nf_hook_slow(skb, &state, e);
> + if (unlikely(ret == 0))
> + return -EINPROGRESS;
Do you prefer to keep this branch as unlikely? I understand most
people are not using fwd much so far, but we're targeting to enrich
ingress so I would expect users will be using this more and more.
Anyway, we can revisit this later on.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2016-12-06 10:35 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-28 10:40 [PATCH nf-next] netfilter: remove need for skb_clone in nf_fwd_netdev_egress Florian Westphal
2016-11-28 10:40 ` [PATCH nf-next] netfilter: ingress: translate 0 nf_hook_slow retval to -EINPROGRESS Florian Westphal
2016-12-06 10:35 ` Pablo Neira Ayuso
2016-11-28 10:40 ` [PATCH nf-next] netfilter: add and use nf_fwd_netdev_egress Florian Westphal
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).