Commit fdacd57c authored by Florian Westphal's avatar Florian Westphal Committed by Pablo Neira Ayuso

netfilter: x_tables: never register tables by default

For historical reasons x_tables still register tables by default in the
initial namespace.
Only newly created net namespaces add the hook on demand.

This means that the init_net always pays hook cost, even if no filtering
rules are added (e.g. only used inside a single netns).

Note that the hooks are added even when 'iptables -L' is called.
This is because there is no way to tell 'iptables -A' and 'iptables -L'
apart at kernel level.

The only solution would be to register the table, but delay hook
registration until the first rule gets added (or policy gets changed).

That however means that counters are not hooked either, so 'iptables -L'
would always show 0-counters even when traffic is flowing which might be
unexpected.

This keeps table and hook registration consistent with what is already done
in non-init netns: first iptables(-save) invocation registers both table
and hooks.

This applies the same solution adopted for ebtables.
All tables register a template that contains the l3 family, the name
and a constructor function that is called when the initial table has to
be added.
Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
parent 9344988d
...@@ -238,9 +238,6 @@ struct xt_table { ...@@ -238,9 +238,6 @@ struct xt_table {
u_int8_t af; /* address/protocol family */ u_int8_t af; /* address/protocol family */
int priority; /* hook order */ int priority; /* hook order */
/* called when table is needed in the given netns */
int (*table_init)(struct net *net);
/* A unique name... */ /* A unique name... */
const char name[XT_TABLE_MAXNAMELEN]; const char name[XT_TABLE_MAXNAMELEN];
}; };
...@@ -452,6 +449,9 @@ xt_get_per_cpu_counter(struct xt_counters *cnt, unsigned int cpu) ...@@ -452,6 +449,9 @@ xt_get_per_cpu_counter(struct xt_counters *cnt, unsigned int cpu)
struct nf_hook_ops *xt_hook_ops_alloc(const struct xt_table *, nf_hookfn *); struct nf_hook_ops *xt_hook_ops_alloc(const struct xt_table *, nf_hookfn *);
int xt_register_template(const struct xt_table *t, int(*table_init)(struct net *net));
void xt_unregister_template(const struct xt_table *t);
#ifdef CONFIG_NETFILTER_XTABLES_COMPAT #ifdef CONFIG_NETFILTER_XTABLES_COMPAT
#include <net/compat.h> #include <net/compat.h>
......
...@@ -18,15 +18,12 @@ MODULE_DESCRIPTION("arptables filter table"); ...@@ -18,15 +18,12 @@ MODULE_DESCRIPTION("arptables filter table");
#define FILTER_VALID_HOOKS ((1 << NF_ARP_IN) | (1 << NF_ARP_OUT) | \ #define FILTER_VALID_HOOKS ((1 << NF_ARP_IN) | (1 << NF_ARP_OUT) | \
(1 << NF_ARP_FORWARD)) (1 << NF_ARP_FORWARD))
static int __net_init arptable_filter_table_init(struct net *net);
static const struct xt_table packet_filter = { static const struct xt_table packet_filter = {
.name = "filter", .name = "filter",
.valid_hooks = FILTER_VALID_HOOKS, .valid_hooks = FILTER_VALID_HOOKS,
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_ARP, .af = NFPROTO_ARP,
.priority = NF_IP_PRI_FILTER, .priority = NF_IP_PRI_FILTER,
.table_init = arptable_filter_table_init,
}; };
/* The work comes in here from netfilter.c */ /* The work comes in here from netfilter.c */
...@@ -39,7 +36,7 @@ arptable_filter_hook(void *priv, struct sk_buff *skb, ...@@ -39,7 +36,7 @@ arptable_filter_hook(void *priv, struct sk_buff *skb,
static struct nf_hook_ops *arpfilter_ops __read_mostly; static struct nf_hook_ops *arpfilter_ops __read_mostly;
static int __net_init arptable_filter_table_init(struct net *net) static int arptable_filter_table_init(struct net *net)
{ {
struct arpt_replace *repl; struct arpt_replace *repl;
int err; int err;
...@@ -69,30 +66,32 @@ static struct pernet_operations arptable_filter_net_ops = { ...@@ -69,30 +66,32 @@ static struct pernet_operations arptable_filter_net_ops = {
static int __init arptable_filter_init(void) static int __init arptable_filter_init(void)
{ {
int ret; int ret = xt_register_template(&packet_filter,
arptable_filter_table_init);
if (ret < 0)
return ret;
arpfilter_ops = xt_hook_ops_alloc(&packet_filter, arptable_filter_hook); arpfilter_ops = xt_hook_ops_alloc(&packet_filter, arptable_filter_hook);
if (IS_ERR(arpfilter_ops)) if (IS_ERR(arpfilter_ops)) {
xt_unregister_template(&packet_filter);
return PTR_ERR(arpfilter_ops); return PTR_ERR(arpfilter_ops);
}
ret = register_pernet_subsys(&arptable_filter_net_ops); ret = register_pernet_subsys(&arptable_filter_net_ops);
if (ret < 0) { if (ret < 0) {
xt_unregister_template(&packet_filter);
kfree(arpfilter_ops); kfree(arpfilter_ops);
return ret; return ret;
} }
ret = arptable_filter_table_init(&init_net);
if (ret) {
unregister_pernet_subsys(&arptable_filter_net_ops);
kfree(arpfilter_ops);
}
return ret; return ret;
} }
static void __exit arptable_filter_fini(void) static void __exit arptable_filter_fini(void)
{ {
unregister_pernet_subsys(&arptable_filter_net_ops); unregister_pernet_subsys(&arptable_filter_net_ops);
xt_unregister_template(&packet_filter);
kfree(arpfilter_ops); kfree(arpfilter_ops);
} }
......
...@@ -19,7 +19,6 @@ MODULE_DESCRIPTION("iptables filter table"); ...@@ -19,7 +19,6 @@ MODULE_DESCRIPTION("iptables filter table");
#define FILTER_VALID_HOOKS ((1 << NF_INET_LOCAL_IN) | \ #define FILTER_VALID_HOOKS ((1 << NF_INET_LOCAL_IN) | \
(1 << NF_INET_FORWARD) | \ (1 << NF_INET_FORWARD) | \
(1 << NF_INET_LOCAL_OUT)) (1 << NF_INET_LOCAL_OUT))
static int __net_init iptable_filter_table_init(struct net *net);
static const struct xt_table packet_filter = { static const struct xt_table packet_filter = {
.name = "filter", .name = "filter",
...@@ -27,7 +26,6 @@ static const struct xt_table packet_filter = { ...@@ -27,7 +26,6 @@ static const struct xt_table packet_filter = {
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV4, .af = NFPROTO_IPV4,
.priority = NF_IP_PRI_FILTER, .priority = NF_IP_PRI_FILTER,
.table_init = iptable_filter_table_init,
}; };
static unsigned int static unsigned int
...@@ -43,7 +41,7 @@ static struct nf_hook_ops *filter_ops __read_mostly; ...@@ -43,7 +41,7 @@ static struct nf_hook_ops *filter_ops __read_mostly;
static bool forward __read_mostly = true; static bool forward __read_mostly = true;
module_param(forward, bool, 0000); module_param(forward, bool, 0000);
static int __net_init iptable_filter_table_init(struct net *net) static int iptable_filter_table_init(struct net *net)
{ {
struct ipt_replace *repl; struct ipt_replace *repl;
int err; int err;
...@@ -62,7 +60,7 @@ static int __net_init iptable_filter_table_init(struct net *net) ...@@ -62,7 +60,7 @@ static int __net_init iptable_filter_table_init(struct net *net)
static int __net_init iptable_filter_net_init(struct net *net) static int __net_init iptable_filter_net_init(struct net *net)
{ {
if (net == &init_net || !forward) if (!forward)
return iptable_filter_table_init(net); return iptable_filter_table_init(net);
return 0; return 0;
...@@ -86,22 +84,32 @@ static struct pernet_operations iptable_filter_net_ops = { ...@@ -86,22 +84,32 @@ static struct pernet_operations iptable_filter_net_ops = {
static int __init iptable_filter_init(void) static int __init iptable_filter_init(void)
{ {
int ret; int ret = xt_register_template(&packet_filter,
iptable_filter_table_init);
if (ret < 0)
return ret;
filter_ops = xt_hook_ops_alloc(&packet_filter, iptable_filter_hook); filter_ops = xt_hook_ops_alloc(&packet_filter, iptable_filter_hook);
if (IS_ERR(filter_ops)) if (IS_ERR(filter_ops)) {
xt_unregister_template(&packet_filter);
return PTR_ERR(filter_ops); return PTR_ERR(filter_ops);
}
ret = register_pernet_subsys(&iptable_filter_net_ops); ret = register_pernet_subsys(&iptable_filter_net_ops);
if (ret < 0) if (ret < 0) {
xt_unregister_template(&packet_filter);
kfree(filter_ops); kfree(filter_ops);
return ret;
}
return ret; return 0;
} }
static void __exit iptable_filter_fini(void) static void __exit iptable_filter_fini(void)
{ {
unregister_pernet_subsys(&iptable_filter_net_ops); unregister_pernet_subsys(&iptable_filter_net_ops);
xt_unregister_template(&packet_filter);
kfree(filter_ops); kfree(filter_ops);
} }
......
...@@ -25,15 +25,12 @@ MODULE_DESCRIPTION("iptables mangle table"); ...@@ -25,15 +25,12 @@ MODULE_DESCRIPTION("iptables mangle table");
(1 << NF_INET_LOCAL_OUT) | \ (1 << NF_INET_LOCAL_OUT) | \
(1 << NF_INET_POST_ROUTING)) (1 << NF_INET_POST_ROUTING))
static int __net_init iptable_mangle_table_init(struct net *net);
static const struct xt_table packet_mangler = { static const struct xt_table packet_mangler = {
.name = "mangle", .name = "mangle",
.valid_hooks = MANGLE_VALID_HOOKS, .valid_hooks = MANGLE_VALID_HOOKS,
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV4, .af = NFPROTO_IPV4,
.priority = NF_IP_PRI_MANGLE, .priority = NF_IP_PRI_MANGLE,
.table_init = iptable_mangle_table_init,
}; };
static unsigned int static unsigned int
...@@ -83,7 +80,7 @@ iptable_mangle_hook(void *priv, ...@@ -83,7 +80,7 @@ iptable_mangle_hook(void *priv,
} }
static struct nf_hook_ops *mangle_ops __read_mostly; static struct nf_hook_ops *mangle_ops __read_mostly;
static int __net_init iptable_mangle_table_init(struct net *net) static int iptable_mangle_table_init(struct net *net)
{ {
struct ipt_replace *repl; struct ipt_replace *repl;
int ret; int ret;
...@@ -113,32 +110,30 @@ static struct pernet_operations iptable_mangle_net_ops = { ...@@ -113,32 +110,30 @@ static struct pernet_operations iptable_mangle_net_ops = {
static int __init iptable_mangle_init(void) static int __init iptable_mangle_init(void)
{ {
int ret; int ret = xt_register_template(&packet_mangler,
iptable_mangle_table_init);
mangle_ops = xt_hook_ops_alloc(&packet_mangler, iptable_mangle_hook); mangle_ops = xt_hook_ops_alloc(&packet_mangler, iptable_mangle_hook);
if (IS_ERR(mangle_ops)) { if (IS_ERR(mangle_ops)) {
xt_unregister_template(&packet_mangler);
ret = PTR_ERR(mangle_ops); ret = PTR_ERR(mangle_ops);
return ret; return ret;
} }
ret = register_pernet_subsys(&iptable_mangle_net_ops); ret = register_pernet_subsys(&iptable_mangle_net_ops);
if (ret < 0) { if (ret < 0) {
xt_unregister_template(&packet_mangler);
kfree(mangle_ops); kfree(mangle_ops);
return ret; return ret;
} }
ret = iptable_mangle_table_init(&init_net);
if (ret) {
unregister_pernet_subsys(&iptable_mangle_net_ops);
kfree(mangle_ops);
}
return ret; return ret;
} }
static void __exit iptable_mangle_fini(void) static void __exit iptable_mangle_fini(void)
{ {
unregister_pernet_subsys(&iptable_mangle_net_ops); unregister_pernet_subsys(&iptable_mangle_net_ops);
xt_unregister_template(&packet_mangler);
kfree(mangle_ops); kfree(mangle_ops);
} }
......
...@@ -17,8 +17,6 @@ struct iptable_nat_pernet { ...@@ -17,8 +17,6 @@ struct iptable_nat_pernet {
struct nf_hook_ops *nf_nat_ops; struct nf_hook_ops *nf_nat_ops;
}; };
static int __net_init iptable_nat_table_init(struct net *net);
static unsigned int iptable_nat_net_id __read_mostly; static unsigned int iptable_nat_net_id __read_mostly;
static const struct xt_table nf_nat_ipv4_table = { static const struct xt_table nf_nat_ipv4_table = {
...@@ -29,7 +27,6 @@ static const struct xt_table nf_nat_ipv4_table = { ...@@ -29,7 +27,6 @@ static const struct xt_table nf_nat_ipv4_table = {
(1 << NF_INET_LOCAL_IN), (1 << NF_INET_LOCAL_IN),
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV4, .af = NFPROTO_IPV4,
.table_init = iptable_nat_table_init,
}; };
static unsigned int iptable_nat_do_chain(void *priv, static unsigned int iptable_nat_do_chain(void *priv,
...@@ -113,7 +110,7 @@ static void ipt_nat_unregister_lookups(struct net *net) ...@@ -113,7 +110,7 @@ static void ipt_nat_unregister_lookups(struct net *net)
kfree(ops); kfree(ops);
} }
static int __net_init iptable_nat_table_init(struct net *net) static int iptable_nat_table_init(struct net *net)
{ {
struct ipt_replace *repl; struct ipt_replace *repl;
int ret; int ret;
...@@ -155,20 +152,25 @@ static struct pernet_operations iptable_nat_net_ops = { ...@@ -155,20 +152,25 @@ static struct pernet_operations iptable_nat_net_ops = {
static int __init iptable_nat_init(void) static int __init iptable_nat_init(void)
{ {
int ret = register_pernet_subsys(&iptable_nat_net_ops); int ret = xt_register_template(&nf_nat_ipv4_table,
iptable_nat_table_init);
if (ret < 0)
return ret;
if (ret) ret = register_pernet_subsys(&iptable_nat_net_ops);
if (ret < 0) {
xt_unregister_template(&nf_nat_ipv4_table);
return ret; return ret;
}
ret = iptable_nat_table_init(&init_net);
if (ret)
unregister_pernet_subsys(&iptable_nat_net_ops);
return ret; return ret;
} }
static void __exit iptable_nat_exit(void) static void __exit iptable_nat_exit(void)
{ {
unregister_pernet_subsys(&iptable_nat_net_ops); unregister_pernet_subsys(&iptable_nat_net_ops);
xt_unregister_template(&nf_nat_ipv4_table);
} }
module_init(iptable_nat_init); module_init(iptable_nat_init);
......
...@@ -12,8 +12,6 @@ ...@@ -12,8 +12,6 @@
#define RAW_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT)) #define RAW_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT))
static int __net_init iptable_raw_table_init(struct net *net);
static bool raw_before_defrag __read_mostly; static bool raw_before_defrag __read_mostly;
MODULE_PARM_DESC(raw_before_defrag, "Enable raw table before defrag"); MODULE_PARM_DESC(raw_before_defrag, "Enable raw table before defrag");
module_param(raw_before_defrag, bool, 0000); module_param(raw_before_defrag, bool, 0000);
...@@ -24,7 +22,6 @@ static const struct xt_table packet_raw = { ...@@ -24,7 +22,6 @@ static const struct xt_table packet_raw = {
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV4, .af = NFPROTO_IPV4,
.priority = NF_IP_PRI_RAW, .priority = NF_IP_PRI_RAW,
.table_init = iptable_raw_table_init,
}; };
static const struct xt_table packet_raw_before_defrag = { static const struct xt_table packet_raw_before_defrag = {
...@@ -33,7 +30,6 @@ static const struct xt_table packet_raw_before_defrag = { ...@@ -33,7 +30,6 @@ static const struct xt_table packet_raw_before_defrag = {
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV4, .af = NFPROTO_IPV4,
.priority = NF_IP_PRI_RAW_BEFORE_DEFRAG, .priority = NF_IP_PRI_RAW_BEFORE_DEFRAG,
.table_init = iptable_raw_table_init,
}; };
/* The work comes in here from netfilter.c. */ /* The work comes in here from netfilter.c. */
...@@ -89,22 +85,24 @@ static int __init iptable_raw_init(void) ...@@ -89,22 +85,24 @@ static int __init iptable_raw_init(void)
pr_info("Enabling raw table before defrag\n"); pr_info("Enabling raw table before defrag\n");
} }
ret = xt_register_template(table,
iptable_raw_table_init);
if (ret < 0)
return ret;
rawtable_ops = xt_hook_ops_alloc(table, iptable_raw_hook); rawtable_ops = xt_hook_ops_alloc(table, iptable_raw_hook);
if (IS_ERR(rawtable_ops)) if (IS_ERR(rawtable_ops)) {
xt_unregister_template(table);
return PTR_ERR(rawtable_ops); return PTR_ERR(rawtable_ops);
}
ret = register_pernet_subsys(&iptable_raw_net_ops); ret = register_pernet_subsys(&iptable_raw_net_ops);
if (ret < 0) { if (ret < 0) {
xt_unregister_template(table);
kfree(rawtable_ops); kfree(rawtable_ops);
return ret; return ret;
} }
ret = iptable_raw_table_init(&init_net);
if (ret) {
unregister_pernet_subsys(&iptable_raw_net_ops);
kfree(rawtable_ops);
}
return ret; return ret;
} }
...@@ -112,6 +110,7 @@ static void __exit iptable_raw_fini(void) ...@@ -112,6 +110,7 @@ static void __exit iptable_raw_fini(void)
{ {
unregister_pernet_subsys(&iptable_raw_net_ops); unregister_pernet_subsys(&iptable_raw_net_ops);
kfree(rawtable_ops); kfree(rawtable_ops);
xt_unregister_template(&packet_raw);
} }
module_init(iptable_raw_init); module_init(iptable_raw_init);
......
...@@ -25,15 +25,12 @@ MODULE_DESCRIPTION("iptables security table, for MAC rules"); ...@@ -25,15 +25,12 @@ MODULE_DESCRIPTION("iptables security table, for MAC rules");
(1 << NF_INET_FORWARD) | \ (1 << NF_INET_FORWARD) | \
(1 << NF_INET_LOCAL_OUT) (1 << NF_INET_LOCAL_OUT)
static int __net_init iptable_security_table_init(struct net *net);
static const struct xt_table security_table = { static const struct xt_table security_table = {
.name = "security", .name = "security",
.valid_hooks = SECURITY_VALID_HOOKS, .valid_hooks = SECURITY_VALID_HOOKS,
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV4, .af = NFPROTO_IPV4,
.priority = NF_IP_PRI_SECURITY, .priority = NF_IP_PRI_SECURITY,
.table_init = iptable_security_table_init,
}; };
static unsigned int static unsigned int
...@@ -45,7 +42,7 @@ iptable_security_hook(void *priv, struct sk_buff *skb, ...@@ -45,7 +42,7 @@ iptable_security_hook(void *priv, struct sk_buff *skb,
static struct nf_hook_ops *sectbl_ops __read_mostly; static struct nf_hook_ops *sectbl_ops __read_mostly;
static int __net_init iptable_security_table_init(struct net *net) static int iptable_security_table_init(struct net *net)
{ {
struct ipt_replace *repl; struct ipt_replace *repl;
int ret; int ret;
...@@ -75,24 +72,25 @@ static struct pernet_operations iptable_security_net_ops = { ...@@ -75,24 +72,25 @@ static struct pernet_operations iptable_security_net_ops = {
static int __init iptable_security_init(void) static int __init iptable_security_init(void)
{ {
int ret; int ret = xt_register_template(&security_table,
iptable_security_table_init);
if (ret < 0)
return ret;
sectbl_ops = xt_hook_ops_alloc(&security_table, iptable_security_hook); sectbl_ops = xt_hook_ops_alloc(&security_table, iptable_security_hook);
if (IS_ERR(sectbl_ops)) if (IS_ERR(sectbl_ops)) {
xt_unregister_template(&security_table);
return PTR_ERR(sectbl_ops); return PTR_ERR(sectbl_ops);
}
ret = register_pernet_subsys(&iptable_security_net_ops); ret = register_pernet_subsys(&iptable_security_net_ops);
if (ret < 0) { if (ret < 0) {
xt_unregister_template(&security_table);
kfree(sectbl_ops); kfree(sectbl_ops);
return ret; return ret;
} }
ret = iptable_security_table_init(&init_net);
if (ret) {
unregister_pernet_subsys(&iptable_security_net_ops);
kfree(sectbl_ops);
}
return ret; return ret;
} }
...@@ -100,6 +98,7 @@ static void __exit iptable_security_fini(void) ...@@ -100,6 +98,7 @@ static void __exit iptable_security_fini(void)
{ {
unregister_pernet_subsys(&iptable_security_net_ops); unregister_pernet_subsys(&iptable_security_net_ops);
kfree(sectbl_ops); kfree(sectbl_ops);
xt_unregister_template(&security_table);
} }
module_init(iptable_security_init); module_init(iptable_security_init);
......
...@@ -19,15 +19,12 @@ MODULE_DESCRIPTION("ip6tables filter table"); ...@@ -19,15 +19,12 @@ MODULE_DESCRIPTION("ip6tables filter table");
(1 << NF_INET_FORWARD) | \ (1 << NF_INET_FORWARD) | \
(1 << NF_INET_LOCAL_OUT)) (1 << NF_INET_LOCAL_OUT))
static int __net_init ip6table_filter_table_init(struct net *net);
static const struct xt_table packet_filter = { static const struct xt_table packet_filter = {
.name = "filter", .name = "filter",
.valid_hooks = FILTER_VALID_HOOKS, .valid_hooks = FILTER_VALID_HOOKS,
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV6, .af = NFPROTO_IPV6,
.priority = NF_IP6_PRI_FILTER, .priority = NF_IP6_PRI_FILTER,
.table_init = ip6table_filter_table_init,
}; };
/* The work comes in here from netfilter.c. */ /* The work comes in here from netfilter.c. */
...@@ -44,7 +41,7 @@ static struct nf_hook_ops *filter_ops __read_mostly; ...@@ -44,7 +41,7 @@ static struct nf_hook_ops *filter_ops __read_mostly;
static bool forward = true; static bool forward = true;
module_param(forward, bool, 0000); module_param(forward, bool, 0000);
static int __net_init ip6table_filter_table_init(struct net *net) static int ip6table_filter_table_init(struct net *net)
{ {
struct ip6t_replace *repl; struct ip6t_replace *repl;
int err; int err;
...@@ -63,7 +60,7 @@ static int __net_init ip6table_filter_table_init(struct net *net) ...@@ -63,7 +60,7 @@ static int __net_init ip6table_filter_table_init(struct net *net)
static int __net_init ip6table_filter_net_init(struct net *net) static int __net_init ip6table_filter_net_init(struct net *net)
{ {
if (net == &init_net || !forward) if (!forward)
return ip6table_filter_table_init(net); return ip6table_filter_table_init(net);
return 0; return 0;
...@@ -87,15 +84,24 @@ static struct pernet_operations ip6table_filter_net_ops = { ...@@ -87,15 +84,24 @@ static struct pernet_operations ip6table_filter_net_ops = {
static int __init ip6table_filter_init(void) static int __init ip6table_filter_init(void)
{ {
int ret; int ret = xt_register_template(&packet_filter,
ip6table_filter_table_init);
if (ret < 0)
return ret;
filter_ops = xt_hook_ops_alloc(&packet_filter, ip6table_filter_hook); filter_ops = xt_hook_ops_alloc(&packet_filter, ip6table_filter_hook);
if (IS_ERR(filter_ops)) if (IS_ERR(filter_ops)) {
xt_unregister_template(&packet_filter);
return PTR_ERR(filter_ops); return PTR_ERR(filter_ops);
}
ret = register_pernet_subsys(&ip6table_filter_net_ops); ret = register_pernet_subsys(&ip6table_filter_net_ops);
if (ret < 0) if (ret < 0) {
xt_unregister_template(&packet_filter);
kfree(filter_ops); kfree(filter_ops);
return ret;
}
return ret; return ret;
} }
...@@ -103,6 +109,7 @@ static int __init ip6table_filter_init(void) ...@@ -103,6 +109,7 @@ static int __init ip6table_filter_init(void)
static void __exit ip6table_filter_fini(void) static void __exit ip6table_filter_fini(void)
{ {
unregister_pernet_subsys(&ip6table_filter_net_ops); unregister_pernet_subsys(&ip6table_filter_net_ops);
xt_unregister_template(&packet_filter);
kfree(filter_ops); kfree(filter_ops);
} }
......
...@@ -20,15 +20,12 @@ MODULE_DESCRIPTION("ip6tables mangle table"); ...@@ -20,15 +20,12 @@ MODULE_DESCRIPTION("ip6tables mangle table");
(1 << NF_INET_LOCAL_OUT) | \ (1 << NF_INET_LOCAL_OUT) | \
(1 << NF_INET_POST_ROUTING)) (1 << NF_INET_POST_ROUTING))
static int __net_init ip6table_mangle_table_init(struct net *net);
static const struct xt_table packet_mangler = { static const struct xt_table packet_mangler = {
.name = "mangle", .name = "mangle",
.valid_hooks = MANGLE_VALID_HOOKS, .valid_hooks = MANGLE_VALID_HOOKS,
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV6, .af = NFPROTO_IPV6,
.priority = NF_IP6_PRI_MANGLE, .priority = NF_IP6_PRI_MANGLE,
.table_init = ip6table_mangle_table_init,
}; };
static unsigned int static unsigned int
...@@ -76,7 +73,7 @@ ip6table_mangle_hook(void *priv, struct sk_buff *skb, ...@@ -76,7 +73,7 @@ ip6table_mangle_hook(void *priv, struct sk_buff *skb,
} }
static struct nf_hook_ops *mangle_ops __read_mostly; static struct nf_hook_ops *mangle_ops __read_mostly;
static int __net_init ip6table_mangle_table_init(struct net *net) static int ip6table_mangle_table_init(struct net *net)
{ {
struct ip6t_replace *repl; struct ip6t_replace *repl;
int ret; int ret;
...@@ -106,29 +103,32 @@ static struct pernet_operations ip6table_mangle_net_ops = { ...@@ -106,29 +103,32 @@ static struct pernet_operations ip6table_mangle_net_ops = {
static int __init ip6table_mangle_init(void) static int __init ip6table_mangle_init(void)
{ {
int ret; int ret = xt_register_template(&packet_mangler,
ip6table_mangle_table_init);
if (ret < 0)
return ret;
mangle_ops = xt_hook_ops_alloc(&packet_mangler, ip6table_mangle_hook); mangle_ops = xt_hook_ops_alloc(&packet_mangler, ip6table_mangle_hook);
if (IS_ERR(mangle_ops)) if (IS_ERR(mangle_ops)) {
xt_unregister_template(&packet_mangler);
return PTR_ERR(mangle_ops); return PTR_ERR(mangle_ops);
}
ret = register_pernet_subsys(&ip6table_mangle_net_ops); ret = register_pernet_subsys(&ip6table_mangle_net_ops);
if (ret < 0) { if (ret < 0) {
xt_unregister_template(&packet_mangler);
kfree(mangle_ops); kfree(mangle_ops);
return ret; return ret;
} }
ret = ip6table_mangle_table_init(&init_net);
if (ret) {
unregister_pernet_subsys(&ip6table_mangle_net_ops);
kfree(mangle_ops);
}
return ret; return ret;
} }
static void __exit ip6table_mangle_fini(void) static void __exit ip6table_mangle_fini(void)
{ {
unregister_pernet_subsys(&ip6table_mangle_net_ops); unregister_pernet_subsys(&ip6table_mangle_net_ops);
xt_unregister_template(&packet_mangler);
kfree(mangle_ops); kfree(mangle_ops);
} }
......
...@@ -19,8 +19,6 @@ struct ip6table_nat_pernet { ...@@ -19,8 +19,6 @@ struct ip6table_nat_pernet {
struct nf_hook_ops *nf_nat_ops; struct nf_hook_ops *nf_nat_ops;
}; };
static int __net_init ip6table_nat_table_init(struct net *net);
static unsigned int ip6table_nat_net_id __read_mostly; static unsigned int ip6table_nat_net_id __read_mostly;
static const struct xt_table nf_nat_ipv6_table = { static const struct xt_table nf_nat_ipv6_table = {
...@@ -31,7 +29,6 @@ static const struct xt_table nf_nat_ipv6_table = { ...@@ -31,7 +29,6 @@ static const struct xt_table nf_nat_ipv6_table = {
(1 << NF_INET_LOCAL_IN), (1 << NF_INET_LOCAL_IN),
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV6, .af = NFPROTO_IPV6,
.table_init = ip6table_nat_table_init,
}; };
static unsigned int ip6table_nat_do_chain(void *priv, static unsigned int ip6table_nat_do_chain(void *priv,
...@@ -115,7 +112,7 @@ static void ip6t_nat_unregister_lookups(struct net *net) ...@@ -115,7 +112,7 @@ static void ip6t_nat_unregister_lookups(struct net *net)
kfree(ops); kfree(ops);
} }
static int __net_init ip6table_nat_table_init(struct net *net) static int ip6table_nat_table_init(struct net *net)
{ {
struct ip6t_replace *repl; struct ip6t_replace *repl;
int ret; int ret;
...@@ -157,20 +154,23 @@ static struct pernet_operations ip6table_nat_net_ops = { ...@@ -157,20 +154,23 @@ static struct pernet_operations ip6table_nat_net_ops = {
static int __init ip6table_nat_init(void) static int __init ip6table_nat_init(void)
{ {
int ret = register_pernet_subsys(&ip6table_nat_net_ops); int ret = xt_register_template(&nf_nat_ipv6_table,
ip6table_nat_table_init);
if (ret) if (ret < 0)
return ret; return ret;
ret = ip6table_nat_table_init(&init_net); ret = register_pernet_subsys(&ip6table_nat_net_ops);
if (ret) if (ret)
unregister_pernet_subsys(&ip6table_nat_net_ops); xt_unregister_template(&nf_nat_ipv6_table);
return ret; return ret;
} }
static void __exit ip6table_nat_exit(void) static void __exit ip6table_nat_exit(void)
{ {
unregister_pernet_subsys(&ip6table_nat_net_ops); unregister_pernet_subsys(&ip6table_nat_net_ops);
xt_unregister_template(&nf_nat_ipv6_table);
} }
module_init(ip6table_nat_init); module_init(ip6table_nat_init);
......
...@@ -11,8 +11,6 @@ ...@@ -11,8 +11,6 @@
#define RAW_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT)) #define RAW_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT))
static int __net_init ip6table_raw_table_init(struct net *net);
static bool raw_before_defrag __read_mostly; static bool raw_before_defrag __read_mostly;
MODULE_PARM_DESC(raw_before_defrag, "Enable raw table before defrag"); MODULE_PARM_DESC(raw_before_defrag, "Enable raw table before defrag");
module_param(raw_before_defrag, bool, 0000); module_param(raw_before_defrag, bool, 0000);
...@@ -23,7 +21,6 @@ static const struct xt_table packet_raw = { ...@@ -23,7 +21,6 @@ static const struct xt_table packet_raw = {
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV6, .af = NFPROTO_IPV6,
.priority = NF_IP6_PRI_RAW, .priority = NF_IP6_PRI_RAW,
.table_init = ip6table_raw_table_init,
}; };
static const struct xt_table packet_raw_before_defrag = { static const struct xt_table packet_raw_before_defrag = {
...@@ -32,7 +29,6 @@ static const struct xt_table packet_raw_before_defrag = { ...@@ -32,7 +29,6 @@ static const struct xt_table packet_raw_before_defrag = {
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV6, .af = NFPROTO_IPV6,
.priority = NF_IP6_PRI_RAW_BEFORE_DEFRAG, .priority = NF_IP6_PRI_RAW_BEFORE_DEFRAG,
.table_init = ip6table_raw_table_init,
}; };
/* The work comes in here from netfilter.c. */ /* The work comes in here from netfilter.c. */
...@@ -45,7 +41,7 @@ ip6table_raw_hook(void *priv, struct sk_buff *skb, ...@@ -45,7 +41,7 @@ ip6table_raw_hook(void *priv, struct sk_buff *skb,
static struct nf_hook_ops *rawtable_ops __read_mostly; static struct nf_hook_ops *rawtable_ops __read_mostly;
static int __net_init ip6table_raw_table_init(struct net *net) static int ip6table_raw_table_init(struct net *net)
{ {
struct ip6t_replace *repl; struct ip6t_replace *repl;
const struct xt_table *table = &packet_raw; const struct xt_table *table = &packet_raw;
...@@ -79,37 +75,39 @@ static struct pernet_operations ip6table_raw_net_ops = { ...@@ -79,37 +75,39 @@ static struct pernet_operations ip6table_raw_net_ops = {
static int __init ip6table_raw_init(void) static int __init ip6table_raw_init(void)
{ {
int ret;
const struct xt_table *table = &packet_raw; const struct xt_table *table = &packet_raw;
int ret;
if (raw_before_defrag) { if (raw_before_defrag) {
table = &packet_raw_before_defrag; table = &packet_raw_before_defrag;
pr_info("Enabling raw table before defrag\n"); pr_info("Enabling raw table before defrag\n");
} }
ret = xt_register_template(table, ip6table_raw_table_init);
if (ret < 0)
return ret;
/* Register hooks */ /* Register hooks */
rawtable_ops = xt_hook_ops_alloc(table, ip6table_raw_hook); rawtable_ops = xt_hook_ops_alloc(table, ip6table_raw_hook);
if (IS_ERR(rawtable_ops)) if (IS_ERR(rawtable_ops)) {
xt_unregister_template(table);
return PTR_ERR(rawtable_ops); return PTR_ERR(rawtable_ops);
}
ret = register_pernet_subsys(&ip6table_raw_net_ops); ret = register_pernet_subsys(&ip6table_raw_net_ops);
if (ret < 0) { if (ret < 0) {
kfree(rawtable_ops); kfree(rawtable_ops);
xt_unregister_template(table);
return ret; return ret;
} }
ret = ip6table_raw_table_init(&init_net);
if (ret) {
unregister_pernet_subsys(&ip6table_raw_net_ops);
kfree(rawtable_ops);
}
return ret; return ret;
} }
static void __exit ip6table_raw_fini(void) static void __exit ip6table_raw_fini(void)
{ {
unregister_pernet_subsys(&ip6table_raw_net_ops); unregister_pernet_subsys(&ip6table_raw_net_ops);
xt_unregister_template(&packet_raw);
kfree(rawtable_ops); kfree(rawtable_ops);
} }
......
...@@ -24,15 +24,12 @@ MODULE_DESCRIPTION("ip6tables security table, for MAC rules"); ...@@ -24,15 +24,12 @@ MODULE_DESCRIPTION("ip6tables security table, for MAC rules");
(1 << NF_INET_FORWARD) | \ (1 << NF_INET_FORWARD) | \
(1 << NF_INET_LOCAL_OUT) (1 << NF_INET_LOCAL_OUT)
static int __net_init ip6table_security_table_init(struct net *net);
static const struct xt_table security_table = { static const struct xt_table security_table = {
.name = "security", .name = "security",
.valid_hooks = SECURITY_VALID_HOOKS, .valid_hooks = SECURITY_VALID_HOOKS,
.me = THIS_MODULE, .me = THIS_MODULE,
.af = NFPROTO_IPV6, .af = NFPROTO_IPV6,
.priority = NF_IP6_PRI_SECURITY, .priority = NF_IP6_PRI_SECURITY,
.table_init = ip6table_security_table_init,
}; };
static unsigned int static unsigned int
...@@ -44,7 +41,7 @@ ip6table_security_hook(void *priv, struct sk_buff *skb, ...@@ -44,7 +41,7 @@ ip6table_security_hook(void *priv, struct sk_buff *skb,
static struct nf_hook_ops *sectbl_ops __read_mostly; static struct nf_hook_ops *sectbl_ops __read_mostly;
static int __net_init ip6table_security_table_init(struct net *net) static int ip6table_security_table_init(struct net *net)
{ {
struct ip6t_replace *repl; struct ip6t_replace *repl;
int ret; int ret;
...@@ -74,29 +71,32 @@ static struct pernet_operations ip6table_security_net_ops = { ...@@ -74,29 +71,32 @@ static struct pernet_operations ip6table_security_net_ops = {
static int __init ip6table_security_init(void) static int __init ip6table_security_init(void)
{ {
int ret; int ret = xt_register_template(&security_table,
ip6table_security_table_init);
if (ret < 0)
return ret;
sectbl_ops = xt_hook_ops_alloc(&security_table, ip6table_security_hook); sectbl_ops = xt_hook_ops_alloc(&security_table, ip6table_security_hook);
if (IS_ERR(sectbl_ops)) if (IS_ERR(sectbl_ops)) {
xt_unregister_template(&security_table);
return PTR_ERR(sectbl_ops); return PTR_ERR(sectbl_ops);
}
ret = register_pernet_subsys(&ip6table_security_net_ops); ret = register_pernet_subsys(&ip6table_security_net_ops);
if (ret < 0) { if (ret < 0) {
kfree(sectbl_ops); kfree(sectbl_ops);
xt_unregister_template(&security_table);
return ret; return ret;
} }
ret = ip6table_security_table_init(&init_net);
if (ret) {
unregister_pernet_subsys(&ip6table_security_net_ops);
kfree(sectbl_ops);
}
return ret; return ret;
} }
static void __exit ip6table_security_fini(void) static void __exit ip6table_security_fini(void)
{ {
unregister_pernet_subsys(&ip6table_security_net_ops); unregister_pernet_subsys(&ip6table_security_net_ops);
xt_unregister_template(&security_table);
kfree(sectbl_ops); kfree(sectbl_ops);
} }
......
...@@ -39,6 +39,20 @@ MODULE_DESCRIPTION("{ip,ip6,arp,eb}_tables backend module"); ...@@ -39,6 +39,20 @@ MODULE_DESCRIPTION("{ip,ip6,arp,eb}_tables backend module");
#define XT_PCPU_BLOCK_SIZE 4096 #define XT_PCPU_BLOCK_SIZE 4096
#define XT_MAX_TABLE_SIZE (512 * 1024 * 1024) #define XT_MAX_TABLE_SIZE (512 * 1024 * 1024)
struct xt_template {
struct list_head list;
/* called when table is needed in the given netns */
int (*table_init)(struct net *net);
struct module *me;
/* A unique name... */
char name[XT_TABLE_MAXNAMELEN];
};
static struct list_head xt_templates[NFPROTO_NUMPROTO];
struct xt_pernet { struct xt_pernet {
struct list_head tables[NFPROTO_NUMPROTO]; struct list_head tables[NFPROTO_NUMPROTO];
}; };
...@@ -1221,48 +1235,43 @@ struct xt_table *xt_find_table_lock(struct net *net, u_int8_t af, ...@@ -1221,48 +1235,43 @@ struct xt_table *xt_find_table_lock(struct net *net, u_int8_t af,
const char *name) const char *name)
{ {
struct xt_pernet *xt_net = net_generic(net, xt_pernet_id); struct xt_pernet *xt_net = net_generic(net, xt_pernet_id);
struct xt_table *t, *found = NULL; struct module *owner = NULL;
struct xt_template *tmpl;
struct xt_table *t;
mutex_lock(&xt[af].mutex); mutex_lock(&xt[af].mutex);
list_for_each_entry(t, &xt_net->tables[af], list) list_for_each_entry(t, &xt_net->tables[af], list)
if (strcmp(t->name, name) == 0 && try_module_get(t->me)) if (strcmp(t->name, name) == 0 && try_module_get(t->me))
return t; return t;
if (net == &init_net) /* Table doesn't exist in this netns, check larval list */
goto out; list_for_each_entry(tmpl, &xt_templates[af], list) {
/* Table doesn't exist in this netns, re-try init */
xt_net = net_generic(&init_net, xt_pernet_id);
list_for_each_entry(t, &xt_net->tables[af], list) {
int err; int err;
if (strcmp(t->name, name)) if (strcmp(tmpl->name, name))
continue; continue;
if (!try_module_get(t->me)) if (!try_module_get(tmpl->me))
goto out; goto out;
owner = tmpl->me;
mutex_unlock(&xt[af].mutex); mutex_unlock(&xt[af].mutex);
err = t->table_init(net); err = tmpl->table_init(net);
if (err < 0) { if (err < 0) {
module_put(t->me); module_put(owner);
return ERR_PTR(err); return ERR_PTR(err);
} }
found = t;
mutex_lock(&xt[af].mutex); mutex_lock(&xt[af].mutex);
break; break;
} }
if (!found)
goto out;
xt_net = net_generic(net, xt_pernet_id);
/* and once again: */ /* and once again: */
list_for_each_entry(t, &xt_net->tables[af], list) list_for_each_entry(t, &xt_net->tables[af], list)
if (strcmp(t->name, name) == 0) if (strcmp(t->name, name) == 0)
return t; return t;
module_put(found->me); module_put(owner);
out: out:
mutex_unlock(&xt[af].mutex); mutex_unlock(&xt[af].mutex);
return ERR_PTR(-ENOENT); return ERR_PTR(-ENOENT);
...@@ -1749,6 +1758,58 @@ xt_hook_ops_alloc(const struct xt_table *table, nf_hookfn *fn) ...@@ -1749,6 +1758,58 @@ xt_hook_ops_alloc(const struct xt_table *table, nf_hookfn *fn)
} }
EXPORT_SYMBOL_GPL(xt_hook_ops_alloc); EXPORT_SYMBOL_GPL(xt_hook_ops_alloc);
int xt_register_template(const struct xt_table *table,
int (*table_init)(struct net *net))
{
int ret = -EEXIST, af = table->af;
struct xt_template *t;
mutex_lock(&xt[af].mutex);
list_for_each_entry(t, &xt_templates[af], list) {
if (WARN_ON_ONCE(strcmp(table->name, t->name) == 0))
goto out_unlock;
}
ret = -ENOMEM;
t = kzalloc(sizeof(*t), GFP_KERNEL);
if (!t)
goto out_unlock;
BUILD_BUG_ON(sizeof(t->name) != sizeof(table->name));
strscpy(t->name, table->name, sizeof(t->name));
t->table_init = table_init;
t->me = table->me;
list_add(&t->list, &xt_templates[af]);
ret = 0;
out_unlock:
mutex_unlock(&xt[af].mutex);
return ret;
}
EXPORT_SYMBOL_GPL(xt_register_template);
void xt_unregister_template(const struct xt_table *table)
{
struct xt_template *t;
int af = table->af;
mutex_lock(&xt[af].mutex);
list_for_each_entry(t, &xt_templates[af], list) {
if (strcmp(table->name, t->name))
continue;
list_del(&t->list);
mutex_unlock(&xt[af].mutex);
kfree(t);
return;
}
mutex_unlock(&xt[af].mutex);
WARN_ON_ONCE(1);
}
EXPORT_SYMBOL_GPL(xt_unregister_template);
int xt_proto_init(struct net *net, u_int8_t af) int xt_proto_init(struct net *net, u_int8_t af)
{ {
#ifdef CONFIG_PROC_FS #ifdef CONFIG_PROC_FS
...@@ -1937,6 +1998,7 @@ static int __init xt_init(void) ...@@ -1937,6 +1998,7 @@ static int __init xt_init(void)
#endif #endif
INIT_LIST_HEAD(&xt[i].target); INIT_LIST_HEAD(&xt[i].target);
INIT_LIST_HEAD(&xt[i].match); INIT_LIST_HEAD(&xt[i].match);
INIT_LIST_HEAD(&xt_templates[i]);
} }
rv = register_pernet_subsys(&xt_net_ops); rv = register_pernet_subsys(&xt_net_ops);
if (rv < 0) if (rv < 0)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment