|
|
|
@ -289,9 +289,6 @@ static int nft_delrule_by_chain(struct nft_ctx *ctx)
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Internal set flag */
|
|
|
|
|
#define NFT_SET_INACTIVE (1 << 15)
|
|
|
|
|
|
|
|
|
|
static int nft_trans_set_add(struct nft_ctx *ctx, int msg_type,
|
|
|
|
|
struct nft_set *set)
|
|
|
|
|
{
|
|
|
|
@ -304,7 +301,7 @@ static int nft_trans_set_add(struct nft_ctx *ctx, int msg_type,
|
|
|
|
|
if (msg_type == NFT_MSG_NEWSET && ctx->nla[NFTA_SET_ID] != NULL) {
|
|
|
|
|
nft_trans_set_id(trans) =
|
|
|
|
|
ntohl(nla_get_be32(ctx->nla[NFTA_SET_ID]));
|
|
|
|
|
set->flags |= NFT_SET_INACTIVE;
|
|
|
|
|
nft_activate_next(ctx->net, set);
|
|
|
|
|
}
|
|
|
|
|
nft_trans_set(trans) = set;
|
|
|
|
|
list_add_tail(&trans->list, &ctx->net->nft.commit_list);
|
|
|
|
@ -320,7 +317,7 @@ static int nft_delset(struct nft_ctx *ctx, struct nft_set *set)
|
|
|
|
|
if (err < 0)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
list_del_rcu(&set->list);
|
|
|
|
|
nft_deactivate_next(ctx->net, set);
|
|
|
|
|
ctx->table->use--;
|
|
|
|
|
|
|
|
|
|
return err;
|
|
|
|
@ -741,6 +738,9 @@ static int nft_flush_table(struct nft_ctx *ctx)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
list_for_each_entry_safe(set, ns, &ctx->table->sets, list) {
|
|
|
|
|
if (!nft_is_active_next(ctx->net, set))
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
if (set->flags & NFT_SET_ANONYMOUS &&
|
|
|
|
|
!list_empty(&set->bindings))
|
|
|
|
|
continue;
|
|
|
|
@ -2367,7 +2367,7 @@ static int nft_ctx_init_from_setattr(struct nft_ctx *ctx, struct net *net,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct nft_set *nf_tables_set_lookup(const struct nft_table *table,
|
|
|
|
|
const struct nlattr *nla)
|
|
|
|
|
const struct nlattr *nla, u8 genmask)
|
|
|
|
|
{
|
|
|
|
|
struct nft_set *set;
|
|
|
|
|
|
|
|
|
@ -2375,22 +2375,27 @@ struct nft_set *nf_tables_set_lookup(const struct nft_table *table,
|
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
|
|
|
|
|
|
list_for_each_entry(set, &table->sets, list) {
|
|
|
|
|
if (!nla_strcmp(nla, set->name))
|
|
|
|
|
if (!nla_strcmp(nla, set->name) &&
|
|
|
|
|
nft_active_genmask(set, genmask))
|
|
|
|
|
return set;
|
|
|
|
|
}
|
|
|
|
|
return ERR_PTR(-ENOENT);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct nft_set *nf_tables_set_lookup_byid(const struct net *net,
|
|
|
|
|
const struct nlattr *nla)
|
|
|
|
|
const struct nlattr *nla,
|
|
|
|
|
u8 genmask)
|
|
|
|
|
{
|
|
|
|
|
struct nft_trans *trans;
|
|
|
|
|
u32 id = ntohl(nla_get_be32(nla));
|
|
|
|
|
|
|
|
|
|
list_for_each_entry(trans, &net->nft.commit_list, list) {
|
|
|
|
|
struct nft_set *set = nft_trans_set(trans);
|
|
|
|
|
|
|
|
|
|
if (trans->msg_type == NFT_MSG_NEWSET &&
|
|
|
|
|
id == nft_trans_set_id(trans))
|
|
|
|
|
return nft_trans_set(trans);
|
|
|
|
|
id == nft_trans_set_id(trans) &&
|
|
|
|
|
nft_active_genmask(set, genmask))
|
|
|
|
|
return set;
|
|
|
|
|
}
|
|
|
|
|
return ERR_PTR(-ENOENT);
|
|
|
|
|
}
|
|
|
|
@ -2415,6 +2420,8 @@ cont:
|
|
|
|
|
list_for_each_entry(i, &ctx->table->sets, list) {
|
|
|
|
|
int tmp;
|
|
|
|
|
|
|
|
|
|
if (!nft_is_active_next(ctx->net, set))
|
|
|
|
|
continue;
|
|
|
|
|
if (!sscanf(i->name, name, &tmp))
|
|
|
|
|
continue;
|
|
|
|
|
if (tmp < min || tmp >= min + BITS_PER_BYTE * PAGE_SIZE)
|
|
|
|
@ -2434,6 +2441,8 @@ cont:
|
|
|
|
|
|
|
|
|
|
snprintf(set->name, sizeof(set->name), name, min + n);
|
|
|
|
|
list_for_each_entry(i, &ctx->table->sets, list) {
|
|
|
|
|
if (!nft_is_active_next(ctx->net, i))
|
|
|
|
|
continue;
|
|
|
|
|
if (!strcmp(set->name, i->name))
|
|
|
|
|
return -ENFILE;
|
|
|
|
|
}
|
|
|
|
@ -2582,6 +2591,8 @@ static int nf_tables_dump_sets(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
|
list_for_each_entry_rcu(set, &table->sets, list) {
|
|
|
|
|
if (idx < s_idx)
|
|
|
|
|
goto cont;
|
|
|
|
|
if (!nft_is_active(net, set))
|
|
|
|
|
goto cont;
|
|
|
|
|
|
|
|
|
|
ctx_set = *ctx;
|
|
|
|
|
ctx_set.table = table;
|
|
|
|
@ -2651,11 +2662,9 @@ static int nf_tables_getset(struct net *net, struct sock *nlsk,
|
|
|
|
|
if (nfmsg->nfgen_family == NFPROTO_UNSPEC)
|
|
|
|
|
return -EAFNOSUPPORT;
|
|
|
|
|
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_NAME]);
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_NAME], genmask);
|
|
|
|
|
if (IS_ERR(set))
|
|
|
|
|
return PTR_ERR(set);
|
|
|
|
|
if (set->flags & NFT_SET_INACTIVE)
|
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
|
|
skb2 = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
|
|
|
|
|
if (skb2 == NULL)
|
|
|
|
@ -2798,7 +2807,7 @@ static int nf_tables_newset(struct net *net, struct sock *nlsk,
|
|
|
|
|
|
|
|
|
|
nft_ctx_init(&ctx, net, skb, nlh, afi, table, NULL, nla);
|
|
|
|
|
|
|
|
|
|
set = nf_tables_set_lookup(table, nla[NFTA_SET_NAME]);
|
|
|
|
|
set = nf_tables_set_lookup(table, nla[NFTA_SET_NAME], genmask);
|
|
|
|
|
if (IS_ERR(set)) {
|
|
|
|
|
if (PTR_ERR(set) != -ENOENT)
|
|
|
|
|
return PTR_ERR(set);
|
|
|
|
@ -2911,7 +2920,7 @@ static int nf_tables_delset(struct net *net, struct sock *nlsk,
|
|
|
|
|
if (err < 0)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_NAME]);
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_NAME], genmask);
|
|
|
|
|
if (IS_ERR(set))
|
|
|
|
|
return PTR_ERR(set);
|
|
|
|
|
if (!list_empty(&set->bindings))
|
|
|
|
@ -2980,7 +2989,7 @@ void nf_tables_unbind_set(const struct nft_ctx *ctx, struct nft_set *set,
|
|
|
|
|
list_del_rcu(&binding->list);
|
|
|
|
|
|
|
|
|
|
if (list_empty(&set->bindings) && set->flags & NFT_SET_ANONYMOUS &&
|
|
|
|
|
!(set->flags & NFT_SET_INACTIVE))
|
|
|
|
|
nft_is_active(ctx->net, set))
|
|
|
|
|
nf_tables_set_destroy(ctx, set);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
@ -3166,11 +3175,10 @@ static int nf_tables_dump_set(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
|
if (err < 0)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET]);
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET],
|
|
|
|
|
genmask);
|
|
|
|
|
if (IS_ERR(set))
|
|
|
|
|
return PTR_ERR(set);
|
|
|
|
|
if (set->flags & NFT_SET_INACTIVE)
|
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
|
|
event = NFT_MSG_NEWSETELEM;
|
|
|
|
|
event |= NFNL_SUBSYS_NFTABLES << 8;
|
|
|
|
@ -3232,11 +3240,10 @@ static int nf_tables_getsetelem(struct net *net, struct sock *nlsk,
|
|
|
|
|
if (err < 0)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET]);
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET],
|
|
|
|
|
genmask);
|
|
|
|
|
if (IS_ERR(set))
|
|
|
|
|
return PTR_ERR(set);
|
|
|
|
|
if (set->flags & NFT_SET_INACTIVE)
|
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
|
|
if (nlh->nlmsg_flags & NLM_F_DUMP) {
|
|
|
|
|
struct netlink_dump_control c = {
|
|
|
|
@ -3567,11 +3574,13 @@ static int nf_tables_newsetelem(struct net *net, struct sock *nlsk,
|
|
|
|
|
if (err < 0)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET]);
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET],
|
|
|
|
|
genmask);
|
|
|
|
|
if (IS_ERR(set)) {
|
|
|
|
|
if (nla[NFTA_SET_ELEM_LIST_SET_ID]) {
|
|
|
|
|
set = nf_tables_set_lookup_byid(net,
|
|
|
|
|
nla[NFTA_SET_ELEM_LIST_SET_ID]);
|
|
|
|
|
nla[NFTA_SET_ELEM_LIST_SET_ID],
|
|
|
|
|
genmask);
|
|
|
|
|
}
|
|
|
|
|
if (IS_ERR(set))
|
|
|
|
|
return PTR_ERR(set);
|
|
|
|
@ -3690,7 +3699,8 @@ static int nf_tables_delsetelem(struct net *net, struct sock *nlsk,
|
|
|
|
|
if (err < 0)
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET]);
|
|
|
|
|
set = nf_tables_set_lookup(ctx.table, nla[NFTA_SET_ELEM_LIST_SET],
|
|
|
|
|
genmask);
|
|
|
|
|
if (IS_ERR(set))
|
|
|
|
|
return PTR_ERR(set);
|
|
|
|
|
if (!list_empty(&set->bindings) && set->flags & NFT_SET_CONSTANT)
|
|
|
|
@ -4003,7 +4013,7 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
|
|
|
|
NFT_MSG_DELRULE);
|
|
|
|
|
break;
|
|
|
|
|
case NFT_MSG_NEWSET:
|
|
|
|
|
nft_trans_set(trans)->flags &= ~NFT_SET_INACTIVE;
|
|
|
|
|
nft_clear(net, nft_trans_set(trans));
|
|
|
|
|
/* This avoids hitting -EBUSY when deleting the table
|
|
|
|
|
* from the transaction.
|
|
|
|
|
*/
|
|
|
|
@ -4016,6 +4026,7 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
|
|
|
|
nft_trans_destroy(trans);
|
|
|
|
|
break;
|
|
|
|
|
case NFT_MSG_DELSET:
|
|
|
|
|
list_del_rcu(&nft_trans_set(trans)->list);
|
|
|
|
|
nf_tables_set_notify(&trans->ctx, nft_trans_set(trans),
|
|
|
|
|
NFT_MSG_DELSET, GFP_KERNEL);
|
|
|
|
|
break;
|
|
|
|
@ -4134,8 +4145,7 @@ static int nf_tables_abort(struct net *net, struct sk_buff *skb)
|
|
|
|
|
break;
|
|
|
|
|
case NFT_MSG_DELSET:
|
|
|
|
|
trans->ctx.table->use++;
|
|
|
|
|
list_add_tail_rcu(&nft_trans_set(trans)->list,
|
|
|
|
|
&trans->ctx.table->sets);
|
|
|
|
|
nft_clear(trans->ctx.net, nft_trans_set(trans));
|
|
|
|
|
nft_trans_destroy(trans);
|
|
|
|
|
break;
|
|
|
|
|
case NFT_MSG_NEWSETELEM:
|
|
|
|
@ -4282,6 +4292,8 @@ static int nf_tables_check_loops(const struct nft_ctx *ctx,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
list_for_each_entry(set, &ctx->table->sets, list) {
|
|
|
|
|
if (!nft_is_active_next(ctx->net, set))
|
|
|
|
|
continue;
|
|
|
|
|
if (!(set->flags & NFT_SET_MAP) ||
|
|
|
|
|
set->dtype != NFT_DATA_VERDICT)
|
|
|
|
|
continue;
|
|
|
|
|