26b2f55252
The level of struct nft_ctx is updated by nf_tables_check_loops(). That is used to validate jumpstack depth. But jumpstack validation routine doesn't update and validate recursively. So, in some cases, chain depth can be bigger than the NFT_JUMP_STACK_SIZE. After this patch, The jumpstack validation routine is located in the nft_chain_validate(). When new rules or new set elements are added, the nft_table_validate() is called by the nf_tables_newrule and the nf_tables_newsetelem. The nft_table_validate() calls the nft_chain_validate() that visit all their children chains recursively. So it can update depth of chain certainly. Reproducer: %cat ./test.sh #!/bin/bash nft add table ip filter nft add chain ip filter input { type filter hook input priority 0\; } for ((i=0;i<20;i++)); do nft add chain ip filter a$i done nft add rule ip filter input jump a1 for ((i=0;i<10;i++)); do nft add rule ip filter a$i jump a$((i+1)) done for ((i=11;i<19;i++)); do nft add rule ip filter a$i jump a$((i+1)) done nft add rule ip filter a10 jump a11 Result: [ 253.931782] WARNING: CPU: 1 PID: 0 at net/netfilter/nf_tables_core.c:186 nft_do_chain+0xacc/0xdf0 [nf_tables] [ 253.931915] Modules linked in: nf_tables nfnetlink ip_tables x_tables [ 253.932153] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.18.0-rc3+ #48 [ 253.932153] RIP: 0010:nft_do_chain+0xacc/0xdf0 [nf_tables] [ 253.932153] Code: 83 f8 fb 0f 84 c7 00 00 00 e9 d0 00 00 00 83 f8 fd 74 0e 83 f8 ff 0f 84 b4 00 00 00 e9 bd 00 00 00 83 bd 64 fd ff ff 0f 76 09 <0f> 0b 31 c0 e9 bc 02 00 00 44 8b ad 64 fd [ 253.933807] RSP: 0018:ffff88011b807570 EFLAGS: 00010212 [ 253.933807] RAX: 00000000fffffffd RBX: ffff88011b807660 RCX: 0000000000000000 [ 253.933807] RDX: 0000000000000010 RSI: ffff880112b39d78 RDI: ffff88011b807670 [ 253.933807] RBP: ffff88011b807850 R08: ffffed0023700ece R09: ffffed0023700ecd [ 253.933807] R10: ffff88011b80766f R11: ffffed0023700ece R12: ffff88011b807898 [ 253.933807] R13: ffff880112b39d80 R14: ffff880112b39d60 R15: dffffc0000000000 [ 253.933807] FS: 0000000000000000(0000) GS:ffff88011b800000(0000) knlGS:0000000000000000 [ 253.933807] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 253.933807] CR2: 00000000014f1008 CR3: 000000006b216000 CR4: 00000000001006e0 [ 253.933807] Call Trace: [ 253.933807] <IRQ> [ 253.933807] ? sched_clock_cpu+0x132/0x170 [ 253.933807] ? __nft_trace_packet+0x180/0x180 [nf_tables] [ 253.933807] ? sched_clock_cpu+0x132/0x170 [ 253.933807] ? debug_show_all_locks+0x290/0x290 [ 253.933807] ? __lock_acquire+0x4835/0x4af0 [ 253.933807] ? inet_ehash_locks_alloc+0x1a0/0x1a0 [ 253.933807] ? unwind_next_frame+0x159e/0x1840 [ 253.933807] ? __read_once_size_nocheck.constprop.4+0x5/0x10 [ 253.933807] ? nft_do_chain_ipv4+0x197/0x1e0 [nf_tables] [ 253.933807] ? nft_do_chain+0x5/0xdf0 [nf_tables] [ 253.933807] nft_do_chain_ipv4+0x197/0x1e0 [nf_tables] [ 253.933807] ? nft_do_chain_arp+0xb0/0xb0 [nf_tables] [ 253.933807] ? __lock_is_held+0x9d/0x130 [ 253.933807] nf_hook_slow+0xc4/0x150 [ 253.933807] ip_local_deliver+0x28b/0x380 [ 253.933807] ? ip_call_ra_chain+0x3e0/0x3e0 [ 253.933807] ? ip_rcv_finish+0x1610/0x1610 [ 253.933807] ip_rcv+0xbcc/0xcc0 [ 253.933807] ? debug_show_all_locks+0x290/0x290 [ 253.933807] ? ip_local_deliver+0x380/0x380 [ 253.933807] ? __lock_is_held+0x9d/0x130 [ 253.933807] ? ip_local_deliver+0x380/0x380 [ 253.933807] __netif_receive_skb_core+0x1c9c/0x2240 Signed-off-by: Taehee Yoo <ap420073@gmail.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
224 lines
5.6 KiB
C
224 lines
5.6 KiB
C
/*
|
|
* Copyright (c) 2009 Patrick McHardy <kaber@trash.net>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* Development of this code funded by Astaro AG (http://www.astaro.com/)
|
|
*/
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/init.h>
|
|
#include <linux/list.h>
|
|
#include <linux/rbtree.h>
|
|
#include <linux/netlink.h>
|
|
#include <linux/netfilter.h>
|
|
#include <linux/netfilter/nf_tables.h>
|
|
#include <net/netfilter/nf_tables.h>
|
|
#include <net/netfilter/nf_tables_core.h>
|
|
|
|
struct nft_lookup {
|
|
struct nft_set *set;
|
|
enum nft_registers sreg:8;
|
|
enum nft_registers dreg:8;
|
|
bool invert;
|
|
struct nft_set_binding binding;
|
|
};
|
|
|
|
static void nft_lookup_eval(const struct nft_expr *expr,
|
|
struct nft_regs *regs,
|
|
const struct nft_pktinfo *pkt)
|
|
{
|
|
const struct nft_lookup *priv = nft_expr_priv(expr);
|
|
const struct nft_set *set = priv->set;
|
|
const struct nft_set_ext *ext;
|
|
bool found;
|
|
|
|
found = set->ops->lookup(nft_net(pkt), set, ®s->data[priv->sreg],
|
|
&ext) ^ priv->invert;
|
|
if (!found) {
|
|
regs->verdict.code = NFT_BREAK;
|
|
return;
|
|
}
|
|
|
|
if (set->flags & NFT_SET_MAP)
|
|
nft_data_copy(®s->data[priv->dreg],
|
|
nft_set_ext_data(ext), set->dlen);
|
|
|
|
}
|
|
|
|
static const struct nla_policy nft_lookup_policy[NFTA_LOOKUP_MAX + 1] = {
|
|
[NFTA_LOOKUP_SET] = { .type = NLA_STRING,
|
|
.len = NFT_SET_MAXNAMELEN - 1 },
|
|
[NFTA_LOOKUP_SET_ID] = { .type = NLA_U32 },
|
|
[NFTA_LOOKUP_SREG] = { .type = NLA_U32 },
|
|
[NFTA_LOOKUP_DREG] = { .type = NLA_U32 },
|
|
[NFTA_LOOKUP_FLAGS] = { .type = NLA_U32 },
|
|
};
|
|
|
|
static int nft_lookup_init(const struct nft_ctx *ctx,
|
|
const struct nft_expr *expr,
|
|
const struct nlattr * const tb[])
|
|
{
|
|
struct nft_lookup *priv = nft_expr_priv(expr);
|
|
u8 genmask = nft_genmask_next(ctx->net);
|
|
struct nft_set *set;
|
|
u32 flags;
|
|
int err;
|
|
|
|
if (tb[NFTA_LOOKUP_SET] == NULL ||
|
|
tb[NFTA_LOOKUP_SREG] == NULL)
|
|
return -EINVAL;
|
|
|
|
set = nft_set_lookup_global(ctx->net, ctx->table, tb[NFTA_LOOKUP_SET],
|
|
tb[NFTA_LOOKUP_SET_ID], genmask);
|
|
if (IS_ERR(set))
|
|
return PTR_ERR(set);
|
|
|
|
if (set->flags & NFT_SET_EVAL)
|
|
return -EOPNOTSUPP;
|
|
|
|
priv->sreg = nft_parse_register(tb[NFTA_LOOKUP_SREG]);
|
|
err = nft_validate_register_load(priv->sreg, set->klen);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
if (tb[NFTA_LOOKUP_FLAGS]) {
|
|
flags = ntohl(nla_get_be32(tb[NFTA_LOOKUP_FLAGS]));
|
|
|
|
if (flags & ~NFT_LOOKUP_F_INV)
|
|
return -EINVAL;
|
|
|
|
if (flags & NFT_LOOKUP_F_INV) {
|
|
if (set->flags & NFT_SET_MAP)
|
|
return -EINVAL;
|
|
priv->invert = true;
|
|
}
|
|
}
|
|
|
|
if (tb[NFTA_LOOKUP_DREG] != NULL) {
|
|
if (priv->invert)
|
|
return -EINVAL;
|
|
if (!(set->flags & NFT_SET_MAP))
|
|
return -EINVAL;
|
|
|
|
priv->dreg = nft_parse_register(tb[NFTA_LOOKUP_DREG]);
|
|
err = nft_validate_register_store(ctx, priv->dreg, NULL,
|
|
set->dtype, set->dlen);
|
|
if (err < 0)
|
|
return err;
|
|
} else if (set->flags & NFT_SET_MAP)
|
|
return -EINVAL;
|
|
|
|
priv->binding.flags = set->flags & NFT_SET_MAP;
|
|
|
|
err = nf_tables_bind_set(ctx, set, &priv->binding);
|
|
if (err < 0)
|
|
return err;
|
|
|
|
priv->set = set;
|
|
return 0;
|
|
}
|
|
|
|
static void nft_lookup_destroy(const struct nft_ctx *ctx,
|
|
const struct nft_expr *expr)
|
|
{
|
|
struct nft_lookup *priv = nft_expr_priv(expr);
|
|
|
|
nf_tables_unbind_set(ctx, priv->set, &priv->binding);
|
|
}
|
|
|
|
static int nft_lookup_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
|
{
|
|
const struct nft_lookup *priv = nft_expr_priv(expr);
|
|
u32 flags = priv->invert ? NFT_LOOKUP_F_INV : 0;
|
|
|
|
if (nla_put_string(skb, NFTA_LOOKUP_SET, priv->set->name))
|
|
goto nla_put_failure;
|
|
if (nft_dump_register(skb, NFTA_LOOKUP_SREG, priv->sreg))
|
|
goto nla_put_failure;
|
|
if (priv->set->flags & NFT_SET_MAP)
|
|
if (nft_dump_register(skb, NFTA_LOOKUP_DREG, priv->dreg))
|
|
goto nla_put_failure;
|
|
if (nla_put_be32(skb, NFTA_LOOKUP_FLAGS, htonl(flags)))
|
|
goto nla_put_failure;
|
|
return 0;
|
|
|
|
nla_put_failure:
|
|
return -1;
|
|
}
|
|
|
|
static int nft_lookup_validate_setelem(const struct nft_ctx *ctx,
|
|
struct nft_set *set,
|
|
const struct nft_set_iter *iter,
|
|
struct nft_set_elem *elem)
|
|
{
|
|
const struct nft_set_ext *ext = nft_set_elem_ext(set, elem->priv);
|
|
struct nft_ctx *pctx = (struct nft_ctx *)ctx;
|
|
const struct nft_data *data;
|
|
int err;
|
|
|
|
if (nft_set_ext_exists(ext, NFT_SET_EXT_FLAGS) &&
|
|
*nft_set_ext_flags(ext) & NFT_SET_ELEM_INTERVAL_END)
|
|
return 0;
|
|
|
|
data = nft_set_ext_data(ext);
|
|
switch (data->verdict.code) {
|
|
case NFT_JUMP:
|
|
case NFT_GOTO:
|
|
pctx->level++;
|
|
err = nft_chain_validate(ctx, data->verdict.chain);
|
|
if (err < 0)
|
|
return err;
|
|
pctx->level--;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int nft_lookup_validate(const struct nft_ctx *ctx,
|
|
const struct nft_expr *expr,
|
|
const struct nft_data **d)
|
|
{
|
|
const struct nft_lookup *priv = nft_expr_priv(expr);
|
|
struct nft_set_iter iter;
|
|
|
|
if (!(priv->set->flags & NFT_SET_MAP) ||
|
|
priv->set->dtype != NFT_DATA_VERDICT)
|
|
return 0;
|
|
|
|
iter.genmask = nft_genmask_next(ctx->net);
|
|
iter.skip = 0;
|
|
iter.count = 0;
|
|
iter.err = 0;
|
|
iter.fn = nft_lookup_validate_setelem;
|
|
|
|
priv->set->ops->walk(ctx, priv->set, &iter);
|
|
if (iter.err < 0)
|
|
return iter.err;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct nft_expr_ops nft_lookup_ops = {
|
|
.type = &nft_lookup_type,
|
|
.size = NFT_EXPR_SIZE(sizeof(struct nft_lookup)),
|
|
.eval = nft_lookup_eval,
|
|
.init = nft_lookup_init,
|
|
.destroy = nft_lookup_destroy,
|
|
.dump = nft_lookup_dump,
|
|
.validate = nft_lookup_validate,
|
|
};
|
|
|
|
struct nft_expr_type nft_lookup_type __read_mostly = {
|
|
.name = "lookup",
|
|
.ops = &nft_lookup_ops,
|
|
.policy = nft_lookup_policy,
|
|
.maxattr = NFTA_LOOKUP_MAX,
|
|
.owner = THIS_MODULE,
|
|
};
|