netfilter: nf_tables: consolidate set description
authorPablo Neira Ayuso <pablo@netfilter.org>
Mon, 19 Dec 2022 19:07:52 +0000 (20:07 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 12 Jan 2023 10:59:08 +0000 (11:59 +0100)
[ Upstream commit bed4a63ea4ae77cfe5aae004ef87379f0655260a ]

Add the following fields to the set description:

- key type
- data type
- object type
- policy
- gc_int: garbage collection interval)
- timeout: element timeout

This prepares for stricter set type checks on updates in a follow up
patch.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Stable-dep-of: f6594c372afd ("netfilter: nf_tables: perform type checking for existing sets")
Signed-off-by: Sasha Levin <sashal@kernel.org>
include/net/netfilter/nf_tables.h
net/netfilter/nf_tables_api.c

index 5374649..5377dbf 100644 (file)
@@ -283,17 +283,29 @@ struct nft_set_iter {
 /**
  *     struct nft_set_desc - description of set elements
  *
+ *     @ktype: key type
  *     @klen: key length
+ *     @dtype: data type
  *     @dlen: data length
+ *     @objtype: object type
+ *     @flags: flags
  *     @size: number of set elements
+ *     @policy: set policy
+ *     @gc_int: garbage collector interval
  *     @field_len: length of each field in concatenation, bytes
  *     @field_count: number of concatenated fields in element
  *     @expr: set must support for expressions
  */
 struct nft_set_desc {
+       u32                     ktype;
        unsigned int            klen;
+       u32                     dtype;
        unsigned int            dlen;
+       u32                     objtype;
        unsigned int            size;
+       u32                     policy;
+       u32                     gc_int;
+       u64                     timeout;
        u8                      field_len[NFT_REG32_COUNT];
        u8                      field_count;
        bool                    expr;
index 3fac57d..dd19726 100644 (file)
@@ -3635,8 +3635,7 @@ static bool nft_set_ops_candidate(const struct nft_set_type *type, u32 flags)
 static const struct nft_set_ops *
 nft_select_set_ops(const struct nft_ctx *ctx,
                   const struct nlattr * const nla[],
-                  const struct nft_set_desc *desc,
-                  enum nft_set_policies policy)
+                  const struct nft_set_desc *desc)
 {
        struct nftables_pernet *nft_net = nft_pernet(ctx->net);
        const struct nft_set_ops *ops, *bops;
@@ -3665,7 +3664,7 @@ nft_select_set_ops(const struct nft_ctx *ctx,
                if (!ops->estimate(desc, flags, &est))
                        continue;
 
-               switch (policy) {
+               switch (desc->policy) {
                case NFT_SET_POL_PERFORMANCE:
                        if (est.lookup < best.lookup)
                                break;
@@ -4247,7 +4246,6 @@ static int nf_tables_set_desc_parse(struct nft_set_desc *desc,
 static int nf_tables_newset(struct sk_buff *skb, const struct nfnl_info *info,
                            const struct nlattr * const nla[])
 {
-       u32 ktype, dtype, flags, policy, gc_int, objtype;
        struct netlink_ext_ack *extack = info->extack;
        u8 genmask = nft_genmask_next(info->net);
        u8 family = info->nfmsg->nfgen_family;
@@ -4260,10 +4258,10 @@ static int nf_tables_newset(struct sk_buff *skb, const struct nfnl_info *info,
        struct nft_set *set;
        struct nft_ctx ctx;
        size_t alloc_size;
-       u64 timeout;
        char *name;
        int err, i;
        u16 udlen;
+       u32 flags;
        u64 size;
 
        if (nla[NFTA_SET_TABLE] == NULL ||
@@ -4274,10 +4272,10 @@ static int nf_tables_newset(struct sk_buff *skb, const struct nfnl_info *info,
 
        memset(&desc, 0, sizeof(desc));
 
-       ktype = NFT_DATA_VALUE;
+       desc.ktype = NFT_DATA_VALUE;
        if (nla[NFTA_SET_KEY_TYPE] != NULL) {
-               ktype = ntohl(nla_get_be32(nla[NFTA_SET_KEY_TYPE]));
-               if ((ktype & NFT_DATA_RESERVED_MASK) == NFT_DATA_RESERVED_MASK)
+               desc.ktype = ntohl(nla_get_be32(nla[NFTA_SET_KEY_TYPE]));
+               if ((desc.ktype & NFT_DATA_RESERVED_MASK) == NFT_DATA_RESERVED_MASK)
                        return -EINVAL;
        }
 
@@ -4302,17 +4300,17 @@ static int nf_tables_newset(struct sk_buff *skb, const struct nfnl_info *info,
                        return -EOPNOTSUPP;
        }
 
-       dtype = 0;
+       desc.dtype = 0;
        if (nla[NFTA_SET_DATA_TYPE] != NULL) {
                if (!(flags & NFT_SET_MAP))
                        return -EINVAL;
 
-               dtype = ntohl(nla_get_be32(nla[NFTA_SET_DATA_TYPE]));
-               if ((dtype & NFT_DATA_RESERVED_MASK) == NFT_DATA_RESERVED_MASK &&
-                   dtype != NFT_DATA_VERDICT)
+               desc.dtype = ntohl(nla_get_be32(nla[NFTA_SET_DATA_TYPE]));
+               if ((desc.dtype & NFT_DATA_RESERVED_MASK) == NFT_DATA_RESERVED_MASK &&
+                   desc.dtype != NFT_DATA_VERDICT)
                        return -EINVAL;
 
-               if (dtype != NFT_DATA_VERDICT) {
+               if (desc.dtype != NFT_DATA_VERDICT) {
                        if (nla[NFTA_SET_DATA_LEN] == NULL)
                                return -EINVAL;
                        desc.dlen = ntohl(nla_get_be32(nla[NFTA_SET_DATA_LEN]));
@@ -4327,34 +4325,34 @@ static int nf_tables_newset(struct sk_buff *skb, const struct nfnl_info *info,
                if (!(flags & NFT_SET_OBJECT))
                        return -EINVAL;
 
-               objtype = ntohl(nla_get_be32(nla[NFTA_SET_OBJ_TYPE]));
-               if (objtype == NFT_OBJECT_UNSPEC ||
-                   objtype > NFT_OBJECT_MAX)
+               desc.objtype = ntohl(nla_get_be32(nla[NFTA_SET_OBJ_TYPE]));
+               if (desc.objtype == NFT_OBJECT_UNSPEC ||
+                   desc.objtype > NFT_OBJECT_MAX)
                        return -EOPNOTSUPP;
        } else if (flags & NFT_SET_OBJECT)
                return -EINVAL;
        else
-               objtype = NFT_OBJECT_UNSPEC;
+               desc.objtype = NFT_OBJECT_UNSPEC;
 
-       timeout = 0;
+       desc.timeout = 0;
        if (nla[NFTA_SET_TIMEOUT] != NULL) {
                if (!(flags & NFT_SET_TIMEOUT))
                        return -EINVAL;
 
-               err = nf_msecs_to_jiffies64(nla[NFTA_SET_TIMEOUT], &timeout);
+               err = nf_msecs_to_jiffies64(nla[NFTA_SET_TIMEOUT], &desc.timeout);
                if (err)
                        return err;
        }
-       gc_int = 0;
+       desc.gc_int = 0;
        if (nla[NFTA_SET_GC_INTERVAL] != NULL) {
                if (!(flags & NFT_SET_TIMEOUT))
                        return -EINVAL;
-               gc_int = ntohl(nla_get_be32(nla[NFTA_SET_GC_INTERVAL]));
+               desc.gc_int = ntohl(nla_get_be32(nla[NFTA_SET_GC_INTERVAL]));
        }
 
-       policy = NFT_SET_POL_PERFORMANCE;
+       desc.policy = NFT_SET_POL_PERFORMANCE;
        if (nla[NFTA_SET_POLICY] != NULL)
-               policy = ntohl(nla_get_be32(nla[NFTA_SET_POLICY]));
+               desc.policy = ntohl(nla_get_be32(nla[NFTA_SET_POLICY]));
 
        if (nla[NFTA_SET_DESC] != NULL) {
                err = nf_tables_set_desc_parse(&desc, nla[NFTA_SET_DESC]);
@@ -4399,7 +4397,7 @@ static int nf_tables_newset(struct sk_buff *skb, const struct nfnl_info *info,
        if (!(info->nlh->nlmsg_flags & NLM_F_CREATE))
                return -ENOENT;
 
-       ops = nft_select_set_ops(&ctx, nla, &desc, policy);
+       ops = nft_select_set_ops(&ctx, nla, &desc);
        if (IS_ERR(ops))
                return PTR_ERR(ops);
 
@@ -4439,18 +4437,18 @@ static int nf_tables_newset(struct sk_buff *skb, const struct nfnl_info *info,
        set->table = table;
        write_pnet(&set->net, net);
        set->ops = ops;
-       set->ktype = ktype;
+       set->ktype = desc.ktype;
        set->klen = desc.klen;
-       set->dtype = dtype;
-       set->objtype = objtype;
+       set->dtype = desc.dtype;
+       set->objtype = desc.objtype;
        set->dlen = desc.dlen;
        set->flags = flags;
        set->size = desc.size;
-       set->policy = policy;
+       set->policy = desc.policy;
        set->udlen = udlen;
        set->udata = udata;
-       set->timeout = timeout;
-       set->gc_int = gc_int;
+       set->timeout = desc.timeout;
+       set->gc_int = desc.gc_int;
 
        set->field_count = desc.field_count;
        for (i = 0; i < desc.field_count; i++)