From: Florian Westphal <fw@strlen.de>
To: <netfilter-devel@vger.kernel.org>
Cc: Florian Westphal <fw@strlen.de>
Subject: [iptables-nft RFC 2/5] iptables-nft: do not refuse to decode table with unsupported expressions
Date: Mon, 21 Nov 2022 12:19:29 +0100 [thread overview]
Message-ID: <20221121111932.18222-3-fw@strlen.de> (raw)
In-Reply-To: <20221121111932.18222-1-fw@strlen.de>
Plan is to continue and print as much as possible, with a clear
indication/error message when something cannot be decoded.
Signed-off-by: Florian Westphal <fw@strlen.de>
---
iptables/nft.c | 66 ++---------------------------------------
iptables/nft.h | 2 --
iptables/xtables-save.c | 6 +---
3 files changed, 3 insertions(+), 71 deletions(-)
diff --git a/iptables/nft.c b/iptables/nft.c
index 4c0110bb8040..d33591a73616 100644
--- a/iptables/nft.c
+++ b/iptables/nft.c
@@ -3771,66 +3771,6 @@ uint32_t nft_invflags2cmp(uint32_t invflags, uint32_t flag)
return NFT_CMP_EQ;
}
-static const char *supported_exprs[] = {
- "match",
- "target",
- "payload",
- "meta",
- "cmp",
- "bitwise",
- "counter",
- "immediate",
- "lookup",
- "range",
-};
-
-
-static int nft_is_expr_compatible(struct nftnl_expr *expr, void *data)
-{
- const char *name = nftnl_expr_get_str(expr, NFTNL_EXPR_NAME);
- int i;
-
- for (i = 0; i < ARRAY_SIZE(supported_exprs); i++) {
- if (strcmp(supported_exprs[i], name) == 0)
- return 0;
- }
-
- if (!strcmp(name, "limit") &&
- nftnl_expr_get_u32(expr, NFTNL_EXPR_LIMIT_TYPE) == NFT_LIMIT_PKTS &&
- nftnl_expr_get_u32(expr, NFTNL_EXPR_LIMIT_FLAGS) == 0)
- return 0;
-
- if (!strcmp(name, "log") &&
- nftnl_expr_is_set(expr, NFTNL_EXPR_LOG_GROUP))
- return 0;
-
- return -1;
-}
-
-static int nft_is_rule_compatible(struct nftnl_rule *rule, void *data)
-{
- return nftnl_expr_foreach(rule, nft_is_expr_compatible, NULL);
-}
-
-static int nft_is_chain_compatible(struct nft_chain *nc, void *data)
-{
- struct nftnl_chain *c = nc->nftnl;
-
- return nftnl_rule_foreach(c, nft_is_rule_compatible, NULL);
-}
-
-bool nft_is_table_compatible(struct nft_handle *h,
- const char *table, const char *chain)
-{
- if (chain) {
- struct nft_chain *c = nft_chain_find(h, table, chain);
-
- return c && !nft_is_chain_compatible(c, h);
- }
-
- return !nft_chain_foreach(h, table, nft_is_chain_compatible, h);
-}
-
bool nft_is_table_tainted(struct nft_handle *h, const char *table)
{
const struct builtin_table *t = nft_table_builtin_find(h, table);
@@ -3843,10 +3783,8 @@ void nft_assert_table_compatible(struct nft_handle *h,
{
const char *pfx = "", *sfx = "";
- if (nft_is_table_compatible(h, table, chain)) {
- if (nft_is_table_tainted(h, table))
- printf("# Table `%s' contains incompatible base-chains, use 'nft' tool to list them.\n",
- table);
+ if (nft_is_table_tainted(h, table)) {
+ printf("# Table `%s' contains incompatible base-chains, use 'nft' tool to list them.\n", table);
return;
}
diff --git a/iptables/nft.h b/iptables/nft.h
index 68b0910c8e18..4f742dbaf180 100644
--- a/iptables/nft.h
+++ b/iptables/nft.h
@@ -263,8 +263,6 @@ int nft_arp_rule_insert(struct nft_handle *h, const char *chain,
void nft_rule_to_arpt_entry(struct nftnl_rule *r, struct arpt_entry *fw);
-bool nft_is_table_compatible(struct nft_handle *h,
- const char *table, const char *chain);
bool nft_is_table_tainted(struct nft_handle *h, const char *table);
void nft_assert_table_compatible(struct nft_handle *h,
const char *table, const char *chain);
diff --git a/iptables/xtables-save.c b/iptables/xtables-save.c
index 5a82cac5dd7c..c9f87322834b 100644
--- a/iptables/xtables-save.c
+++ b/iptables/xtables-save.c
@@ -74,11 +74,7 @@ __do_output(struct nft_handle *h, const char *tablename, void *data)
if (!nft_table_builtin_find(h, tablename))
return 0;
- if (!nft_is_table_compatible(h, tablename, NULL)) {
- printf("# Table `%s' is incompatible, use 'nft' tool.\n",
- tablename);
- return 0;
- } else if (nft_is_table_tainted(h, tablename)) {
+ if (nft_is_table_tainted(h, tablename)) {
printf("# Table `%s' contains incompatible base-chains, use 'nft' tool to list them.\n",
tablename);
}
--
2.37.4
next prev parent reply other threads:[~2022-11-21 11:24 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-21 11:19 [iptables-nft RFC 0/5] update iptables-nft dissector Florian Westphal
2022-11-21 11:19 ` [iptables-nft RFC 1/5] nft-shared: dump errors on stdout to garble output Florian Westphal
2022-11-22 17:55 ` Phil Sutter
2022-11-23 12:50 ` Florian Westphal
2022-11-23 13:13 ` Phil Sutter
2022-11-23 13:27 ` Florian Westphal
2022-11-23 13:34 ` Phil Sutter
2022-11-21 11:19 ` Florian Westphal [this message]
2022-11-21 11:19 ` [iptables-nft RFC 3/5] nft: check for unknown meta keys Florian Westphal
2022-11-21 11:19 ` [iptables-nft RFC 4/5] xlate-test: extra-escape of '"' for replay mode Florian Westphal
2022-11-22 15:51 ` Phil Sutter
2022-11-22 16:01 ` Florian Westphal
2022-11-22 16:22 ` Phil Sutter
2022-11-23 9:31 ` Florian Westphal
2022-11-23 9:57 ` Phil Sutter
2022-11-21 11:19 ` [iptables-nft RFC 5/5] generic.xlate: make one replay test case work Florian Westphal
2022-11-22 16:16 ` Phil Sutter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221121111932.18222-3-fw@strlen.de \
--to=fw@strlen.de \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).