Commit 8daa8fde authored by Phil Sutter's avatar Phil Sutter Committed by Pablo Neira Ayuso

netfilter: nf_tables: Introduce NFT_MSG_GETRULE_RESET

Analogous to NFT_MSG_GETOBJ_RESET, but for rules: Reset stateful
expressions like counters or quotas. The latter two are the only
consumers, adjust their 'dump' callbacks to respect the parameter
introduced earlier.
Signed-off-by: default avatarPhil Sutter <phil@nwl.cc>
Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
parent 7d34aa3e
...@@ -383,7 +383,7 @@ int nft_expr_inner_parse(const struct nft_ctx *ctx, const struct nlattr *nla, ...@@ -383,7 +383,7 @@ int nft_expr_inner_parse(const struct nft_ctx *ctx, const struct nlattr *nla,
int nft_expr_clone(struct nft_expr *dst, struct nft_expr *src); int nft_expr_clone(struct nft_expr *dst, struct nft_expr *src);
void nft_expr_destroy(const struct nft_ctx *ctx, struct nft_expr *expr); void nft_expr_destroy(const struct nft_ctx *ctx, struct nft_expr *expr);
int nft_expr_dump(struct sk_buff *skb, unsigned int attr, int nft_expr_dump(struct sk_buff *skb, unsigned int attr,
const struct nft_expr *expr); const struct nft_expr *expr, bool reset);
bool nft_expr_reduce_bitwise(struct nft_regs_track *track, bool nft_expr_reduce_bitwise(struct nft_regs_track *track,
const struct nft_expr *expr); const struct nft_expr *expr);
......
...@@ -97,6 +97,7 @@ enum nft_verdicts { ...@@ -97,6 +97,7 @@ enum nft_verdicts {
* @NFT_MSG_NEWFLOWTABLE: add new flow table (enum nft_flowtable_attributes) * @NFT_MSG_NEWFLOWTABLE: add new flow table (enum nft_flowtable_attributes)
* @NFT_MSG_GETFLOWTABLE: get flow table (enum nft_flowtable_attributes) * @NFT_MSG_GETFLOWTABLE: get flow table (enum nft_flowtable_attributes)
* @NFT_MSG_DELFLOWTABLE: delete flow table (enum nft_flowtable_attributes) * @NFT_MSG_DELFLOWTABLE: delete flow table (enum nft_flowtable_attributes)
* @NFT_MSG_GETRULE_RESET: get rules and reset stateful expressions (enum nft_obj_attributes)
*/ */
enum nf_tables_msg_types { enum nf_tables_msg_types {
NFT_MSG_NEWTABLE, NFT_MSG_NEWTABLE,
...@@ -124,6 +125,7 @@ enum nf_tables_msg_types { ...@@ -124,6 +125,7 @@ enum nf_tables_msg_types {
NFT_MSG_NEWFLOWTABLE, NFT_MSG_NEWFLOWTABLE,
NFT_MSG_GETFLOWTABLE, NFT_MSG_GETFLOWTABLE,
NFT_MSG_DELFLOWTABLE, NFT_MSG_DELFLOWTABLE,
NFT_MSG_GETRULE_RESET,
NFT_MSG_MAX, NFT_MSG_MAX,
}; };
......
...@@ -2759,7 +2759,7 @@ static const struct nla_policy nft_expr_policy[NFTA_EXPR_MAX + 1] = { ...@@ -2759,7 +2759,7 @@ static const struct nla_policy nft_expr_policy[NFTA_EXPR_MAX + 1] = {
}; };
static int nf_tables_fill_expr_info(struct sk_buff *skb, static int nf_tables_fill_expr_info(struct sk_buff *skb,
const struct nft_expr *expr) const struct nft_expr *expr, bool reset)
{ {
if (nla_put_string(skb, NFTA_EXPR_NAME, expr->ops->type->name)) if (nla_put_string(skb, NFTA_EXPR_NAME, expr->ops->type->name))
goto nla_put_failure; goto nla_put_failure;
...@@ -2769,7 +2769,7 @@ static int nf_tables_fill_expr_info(struct sk_buff *skb, ...@@ -2769,7 +2769,7 @@ static int nf_tables_fill_expr_info(struct sk_buff *skb,
NFTA_EXPR_DATA); NFTA_EXPR_DATA);
if (data == NULL) if (data == NULL)
goto nla_put_failure; goto nla_put_failure;
if (expr->ops->dump(skb, expr, false) < 0) if (expr->ops->dump(skb, expr, reset) < 0)
goto nla_put_failure; goto nla_put_failure;
nla_nest_end(skb, data); nla_nest_end(skb, data);
} }
...@@ -2781,14 +2781,14 @@ static int nf_tables_fill_expr_info(struct sk_buff *skb, ...@@ -2781,14 +2781,14 @@ static int nf_tables_fill_expr_info(struct sk_buff *skb,
}; };
int nft_expr_dump(struct sk_buff *skb, unsigned int attr, int nft_expr_dump(struct sk_buff *skb, unsigned int attr,
const struct nft_expr *expr) const struct nft_expr *expr, bool reset)
{ {
struct nlattr *nest; struct nlattr *nest;
nest = nla_nest_start_noflag(skb, attr); nest = nla_nest_start_noflag(skb, attr);
if (!nest) if (!nest)
goto nla_put_failure; goto nla_put_failure;
if (nf_tables_fill_expr_info(skb, expr) < 0) if (nf_tables_fill_expr_info(skb, expr, reset) < 0)
goto nla_put_failure; goto nla_put_failure;
nla_nest_end(skb, nest); nla_nest_end(skb, nest);
return 0; return 0;
...@@ -3034,7 +3034,8 @@ static int nf_tables_fill_rule_info(struct sk_buff *skb, struct net *net, ...@@ -3034,7 +3034,8 @@ static int nf_tables_fill_rule_info(struct sk_buff *skb, struct net *net,
u32 flags, int family, u32 flags, int family,
const struct nft_table *table, const struct nft_table *table,
const struct nft_chain *chain, const struct nft_chain *chain,
const struct nft_rule *rule, u64 handle) const struct nft_rule *rule, u64 handle,
bool reset)
{ {
struct nlmsghdr *nlh; struct nlmsghdr *nlh;
const struct nft_expr *expr, *next; const struct nft_expr *expr, *next;
...@@ -3067,7 +3068,7 @@ static int nf_tables_fill_rule_info(struct sk_buff *skb, struct net *net, ...@@ -3067,7 +3068,7 @@ static int nf_tables_fill_rule_info(struct sk_buff *skb, struct net *net,
if (list == NULL) if (list == NULL)
goto nla_put_failure; goto nla_put_failure;
nft_rule_for_each_expr(expr, next, rule) { nft_rule_for_each_expr(expr, next, rule) {
if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr) < 0) if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr, reset) < 0)
goto nla_put_failure; goto nla_put_failure;
} }
nla_nest_end(skb, list); nla_nest_end(skb, list);
...@@ -3118,7 +3119,7 @@ static void nf_tables_rule_notify(const struct nft_ctx *ctx, ...@@ -3118,7 +3119,7 @@ static void nf_tables_rule_notify(const struct nft_ctx *ctx,
err = nf_tables_fill_rule_info(skb, ctx->net, ctx->portid, ctx->seq, err = nf_tables_fill_rule_info(skb, ctx->net, ctx->portid, ctx->seq,
event, flags, ctx->family, ctx->table, event, flags, ctx->family, ctx->table,
ctx->chain, rule, handle); ctx->chain, rule, handle, false);
if (err < 0) { if (err < 0) {
kfree_skb(skb); kfree_skb(skb);
goto err; goto err;
...@@ -3139,7 +3140,8 @@ static int __nf_tables_dump_rules(struct sk_buff *skb, ...@@ -3139,7 +3140,8 @@ static int __nf_tables_dump_rules(struct sk_buff *skb,
unsigned int *idx, unsigned int *idx,
struct netlink_callback *cb, struct netlink_callback *cb,
const struct nft_table *table, const struct nft_table *table,
const struct nft_chain *chain) const struct nft_chain *chain,
bool reset)
{ {
struct net *net = sock_net(skb->sk); struct net *net = sock_net(skb->sk);
const struct nft_rule *rule, *prule; const struct nft_rule *rule, *prule;
...@@ -3166,7 +3168,7 @@ static int __nf_tables_dump_rules(struct sk_buff *skb, ...@@ -3166,7 +3168,7 @@ static int __nf_tables_dump_rules(struct sk_buff *skb,
NFT_MSG_NEWRULE, NFT_MSG_NEWRULE,
NLM_F_MULTI | NLM_F_APPEND, NLM_F_MULTI | NLM_F_APPEND,
table->family, table->family,
table, chain, rule, handle) < 0) table, chain, rule, handle, reset) < 0)
return 1; return 1;
nl_dump_check_consistent(cb, nlmsg_hdr(skb)); nl_dump_check_consistent(cb, nlmsg_hdr(skb));
...@@ -3189,6 +3191,10 @@ static int nf_tables_dump_rules(struct sk_buff *skb, ...@@ -3189,6 +3191,10 @@ static int nf_tables_dump_rules(struct sk_buff *skb,
struct net *net = sock_net(skb->sk); struct net *net = sock_net(skb->sk);
int family = nfmsg->nfgen_family; int family = nfmsg->nfgen_family;
struct nftables_pernet *nft_net; struct nftables_pernet *nft_net;
bool reset = false;
if (NFNL_MSG_TYPE(cb->nlh->nlmsg_type) == NFT_MSG_GETRULE_RESET)
reset = true;
rcu_read_lock(); rcu_read_lock();
nft_net = nft_pernet(net); nft_net = nft_pernet(net);
...@@ -3213,14 +3219,15 @@ static int nf_tables_dump_rules(struct sk_buff *skb, ...@@ -3213,14 +3219,15 @@ static int nf_tables_dump_rules(struct sk_buff *skb,
if (!nft_is_active(net, chain)) if (!nft_is_active(net, chain))
continue; continue;
__nf_tables_dump_rules(skb, &idx, __nf_tables_dump_rules(skb, &idx,
cb, table, chain); cb, table, chain, reset);
break; break;
} }
goto done; goto done;
} }
list_for_each_entry_rcu(chain, &table->chains, list) { list_for_each_entry_rcu(chain, &table->chains, list) {
if (__nf_tables_dump_rules(skb, &idx, cb, table, chain)) if (__nf_tables_dump_rules(skb, &idx,
cb, table, chain, reset))
goto done; goto done;
} }
...@@ -3291,6 +3298,7 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info, ...@@ -3291,6 +3298,7 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info,
struct net *net = info->net; struct net *net = info->net;
struct nft_table *table; struct nft_table *table;
struct sk_buff *skb2; struct sk_buff *skb2;
bool reset = false;
int err; int err;
if (info->nlh->nlmsg_flags & NLM_F_DUMP) { if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
...@@ -3327,9 +3335,12 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info, ...@@ -3327,9 +3335,12 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info,
if (!skb2) if (!skb2)
return -ENOMEM; return -ENOMEM;
if (NFNL_MSG_TYPE(info->nlh->nlmsg_type) == NFT_MSG_GETRULE_RESET)
reset = true;
err = nf_tables_fill_rule_info(skb2, net, NETLINK_CB(skb).portid, err = nf_tables_fill_rule_info(skb2, net, NETLINK_CB(skb).portid,
info->nlh->nlmsg_seq, NFT_MSG_NEWRULE, 0, info->nlh->nlmsg_seq, NFT_MSG_NEWRULE, 0,
family, table, chain, rule, 0); family, table, chain, rule, 0, reset);
if (err < 0) if (err < 0)
goto err_fill_rule_info; goto err_fill_rule_info;
...@@ -4104,7 +4115,7 @@ static int nf_tables_fill_set(struct sk_buff *skb, const struct nft_ctx *ctx, ...@@ -4104,7 +4115,7 @@ static int nf_tables_fill_set(struct sk_buff *skb, const struct nft_ctx *ctx,
if (set->num_exprs == 1) { if (set->num_exprs == 1) {
nest = nla_nest_start_noflag(skb, NFTA_SET_EXPR); nest = nla_nest_start_noflag(skb, NFTA_SET_EXPR);
if (nf_tables_fill_expr_info(skb, set->exprs[0]) < 0) if (nf_tables_fill_expr_info(skb, set->exprs[0], false) < 0)
goto nla_put_failure; goto nla_put_failure;
nla_nest_end(skb, nest); nla_nest_end(skb, nest);
...@@ -4115,7 +4126,7 @@ static int nf_tables_fill_set(struct sk_buff *skb, const struct nft_ctx *ctx, ...@@ -4115,7 +4126,7 @@ static int nf_tables_fill_set(struct sk_buff *skb, const struct nft_ctx *ctx,
for (i = 0; i < set->num_exprs; i++) { for (i = 0; i < set->num_exprs; i++) {
if (nft_expr_dump(skb, NFTA_LIST_ELEM, if (nft_expr_dump(skb, NFTA_LIST_ELEM,
set->exprs[i]) < 0) set->exprs[i], false) < 0)
goto nla_put_failure; goto nla_put_failure;
} }
nla_nest_end(skb, nest); nla_nest_end(skb, nest);
...@@ -4946,7 +4957,7 @@ static int nft_set_elem_expr_dump(struct sk_buff *skb, ...@@ -4946,7 +4957,7 @@ static int nft_set_elem_expr_dump(struct sk_buff *skb,
if (num_exprs == 1) { if (num_exprs == 1) {
expr = nft_setelem_expr_at(elem_expr, 0); expr = nft_setelem_expr_at(elem_expr, 0);
if (nft_expr_dump(skb, NFTA_SET_ELEM_EXPR, expr) < 0) if (nft_expr_dump(skb, NFTA_SET_ELEM_EXPR, expr, false) < 0)
return -1; return -1;
return 0; return 0;
...@@ -4957,7 +4968,7 @@ static int nft_set_elem_expr_dump(struct sk_buff *skb, ...@@ -4957,7 +4968,7 @@ static int nft_set_elem_expr_dump(struct sk_buff *skb,
nft_setelem_expr_foreach(expr, elem_expr, size) { nft_setelem_expr_foreach(expr, elem_expr, size) {
expr = nft_setelem_expr_at(elem_expr, size); expr = nft_setelem_expr_at(elem_expr, size);
if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr) < 0) if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr, false) < 0)
goto nla_put_failure; goto nla_put_failure;
} }
nla_nest_end(skb, nest); nla_nest_end(skb, nest);
...@@ -8311,6 +8322,12 @@ static const struct nfnl_callback nf_tables_cb[NFT_MSG_MAX] = { ...@@ -8311,6 +8322,12 @@ static const struct nfnl_callback nf_tables_cb[NFT_MSG_MAX] = {
.attr_count = NFTA_RULE_MAX, .attr_count = NFTA_RULE_MAX,
.policy = nft_rule_policy, .policy = nft_rule_policy,
}, },
[NFT_MSG_GETRULE_RESET] = {
.call = nf_tables_getrule,
.type = NFNL_CB_RCU,
.attr_count = NFTA_RULE_MAX,
.policy = nft_rule_policy,
},
[NFT_MSG_DELRULE] = { [NFT_MSG_DELRULE] = {
.call = nf_tables_delrule, .call = nf_tables_delrule,
.type = NFNL_CB_BATCH, .type = NFNL_CB_BATCH,
......
...@@ -206,7 +206,7 @@ static int nft_counter_dump(struct sk_buff *skb, ...@@ -206,7 +206,7 @@ static int nft_counter_dump(struct sk_buff *skb,
{ {
struct nft_counter_percpu_priv *priv = nft_expr_priv(expr); struct nft_counter_percpu_priv *priv = nft_expr_priv(expr);
return nft_counter_do_dump(skb, priv, false); return nft_counter_do_dump(skb, priv, reset);
} }
static int nft_counter_init(const struct nft_ctx *ctx, static int nft_counter_init(const struct nft_ctx *ctx,
......
...@@ -380,7 +380,7 @@ static int nft_dynset_dump(struct sk_buff *skb, ...@@ -380,7 +380,7 @@ static int nft_dynset_dump(struct sk_buff *skb,
if (priv->set->num_exprs == 0) { if (priv->set->num_exprs == 0) {
if (priv->num_exprs == 1) { if (priv->num_exprs == 1) {
if (nft_expr_dump(skb, NFTA_DYNSET_EXPR, if (nft_expr_dump(skb, NFTA_DYNSET_EXPR,
priv->expr_array[0])) priv->expr_array[0], reset))
goto nla_put_failure; goto nla_put_failure;
} else if (priv->num_exprs > 1) { } else if (priv->num_exprs > 1) {
struct nlattr *nest; struct nlattr *nest;
...@@ -391,7 +391,7 @@ static int nft_dynset_dump(struct sk_buff *skb, ...@@ -391,7 +391,7 @@ static int nft_dynset_dump(struct sk_buff *skb,
for (i = 0; i < priv->num_exprs; i++) { for (i = 0; i < priv->num_exprs; i++) {
if (nft_expr_dump(skb, NFTA_LIST_ELEM, if (nft_expr_dump(skb, NFTA_LIST_ELEM,
priv->expr_array[i])) priv->expr_array[i], reset))
goto nla_put_failure; goto nla_put_failure;
} }
nla_nest_end(skb, nest); nla_nest_end(skb, nest);
......
...@@ -359,7 +359,7 @@ static int nft_inner_dump(struct sk_buff *skb, ...@@ -359,7 +359,7 @@ static int nft_inner_dump(struct sk_buff *skb,
goto nla_put_failure; goto nla_put_failure;
if (nft_expr_dump(skb, NFTA_INNER_EXPR, if (nft_expr_dump(skb, NFTA_INNER_EXPR,
(struct nft_expr *)&priv->expr) < 0) (struct nft_expr *)&priv->expr, reset) < 0)
goto nla_put_failure; goto nla_put_failure;
return 0; return 0;
......
...@@ -222,7 +222,7 @@ static int nft_quota_dump(struct sk_buff *skb, ...@@ -222,7 +222,7 @@ static int nft_quota_dump(struct sk_buff *skb,
{ {
struct nft_quota *priv = nft_expr_priv(expr); struct nft_quota *priv = nft_expr_priv(expr);
return nft_quota_do_dump(skb, priv, false); return nft_quota_do_dump(skb, priv, reset);
} }
static void nft_quota_destroy(const struct nft_ctx *ctx, static void nft_quota_destroy(const struct nft_ctx *ctx,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment