Commit dbd2be06 authored by Pablo Neira Ayuso's avatar Pablo Neira Ayuso

netfilter: nft_dynset: allow to invert match criteria

The dynset expression matches if we can fit a new entry into the set.
If there is no room for it, then it breaks the rule evaluation.

This patch introduces the inversion flag so you can add rules to
explicitly drop packets that don't fit into the set. For example:

 # nft filter input flow table xyz size 4 { ip saddr timeout 120s counter } overflow drop

This is useful to provide a replacement for connlimit.

For the rule above, every new entry uses the IPv4 address as key in the
set, this entry gets a timeout of 120 seconds that gets refresh on every
packet seen. If we get new flow and our set already contains 4 entries
already, then this packet is dropped.

You can already express this in positive logic, assuming default policy
to drop:

 # nft filter input flow table xyz size 4 { ip saddr timeout 10s counter } accept
Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
parent 70ca767e
...@@ -575,6 +575,10 @@ enum nft_dynset_ops { ...@@ -575,6 +575,10 @@ enum nft_dynset_ops {
NFT_DYNSET_OP_UPDATE, NFT_DYNSET_OP_UPDATE,
}; };
enum nft_dynset_flags {
NFT_DYNSET_F_INV = (1 << 0),
};
/** /**
* enum nft_dynset_attributes - dynset expression attributes * enum nft_dynset_attributes - dynset expression attributes
* *
...@@ -585,6 +589,7 @@ enum nft_dynset_ops { ...@@ -585,6 +589,7 @@ enum nft_dynset_ops {
* @NFTA_DYNSET_SREG_DATA: source register of the data (NLA_U32) * @NFTA_DYNSET_SREG_DATA: source register of the data (NLA_U32)
* @NFTA_DYNSET_TIMEOUT: timeout value for the new element (NLA_U64) * @NFTA_DYNSET_TIMEOUT: timeout value for the new element (NLA_U64)
* @NFTA_DYNSET_EXPR: expression (NLA_NESTED: nft_expr_attributes) * @NFTA_DYNSET_EXPR: expression (NLA_NESTED: nft_expr_attributes)
* @NFTA_DYNSET_FLAGS: flags (NLA_U32)
*/ */
enum nft_dynset_attributes { enum nft_dynset_attributes {
NFTA_DYNSET_UNSPEC, NFTA_DYNSET_UNSPEC,
...@@ -596,6 +601,7 @@ enum nft_dynset_attributes { ...@@ -596,6 +601,7 @@ enum nft_dynset_attributes {
NFTA_DYNSET_TIMEOUT, NFTA_DYNSET_TIMEOUT,
NFTA_DYNSET_EXPR, NFTA_DYNSET_EXPR,
NFTA_DYNSET_PAD, NFTA_DYNSET_PAD,
NFTA_DYNSET_FLAGS,
__NFTA_DYNSET_MAX, __NFTA_DYNSET_MAX,
}; };
#define NFTA_DYNSET_MAX (__NFTA_DYNSET_MAX - 1) #define NFTA_DYNSET_MAX (__NFTA_DYNSET_MAX - 1)
......
...@@ -22,6 +22,7 @@ struct nft_dynset { ...@@ -22,6 +22,7 @@ struct nft_dynset {
enum nft_dynset_ops op:8; enum nft_dynset_ops op:8;
enum nft_registers sreg_key:8; enum nft_registers sreg_key:8;
enum nft_registers sreg_data:8; enum nft_registers sreg_data:8;
bool invert;
u64 timeout; u64 timeout;
struct nft_expr *expr; struct nft_expr *expr;
struct nft_set_binding binding; struct nft_set_binding binding;
...@@ -82,10 +83,14 @@ static void nft_dynset_eval(const struct nft_expr *expr, ...@@ -82,10 +83,14 @@ static void nft_dynset_eval(const struct nft_expr *expr,
if (sexpr != NULL) if (sexpr != NULL)
sexpr->ops->eval(sexpr, regs, pkt); sexpr->ops->eval(sexpr, regs, pkt);
if (priv->invert)
regs->verdict.code = NFT_BREAK;
return; return;
} }
out: out:
regs->verdict.code = NFT_BREAK; if (!priv->invert)
regs->verdict.code = NFT_BREAK;
} }
static const struct nla_policy nft_dynset_policy[NFTA_DYNSET_MAX + 1] = { static const struct nla_policy nft_dynset_policy[NFTA_DYNSET_MAX + 1] = {
...@@ -96,6 +101,7 @@ static const struct nla_policy nft_dynset_policy[NFTA_DYNSET_MAX + 1] = { ...@@ -96,6 +101,7 @@ static const struct nla_policy nft_dynset_policy[NFTA_DYNSET_MAX + 1] = {
[NFTA_DYNSET_SREG_DATA] = { .type = NLA_U32 }, [NFTA_DYNSET_SREG_DATA] = { .type = NLA_U32 },
[NFTA_DYNSET_TIMEOUT] = { .type = NLA_U64 }, [NFTA_DYNSET_TIMEOUT] = { .type = NLA_U64 },
[NFTA_DYNSET_EXPR] = { .type = NLA_NESTED }, [NFTA_DYNSET_EXPR] = { .type = NLA_NESTED },
[NFTA_DYNSET_FLAGS] = { .type = NLA_U32 },
}; };
static int nft_dynset_init(const struct nft_ctx *ctx, static int nft_dynset_init(const struct nft_ctx *ctx,
...@@ -113,6 +119,15 @@ static int nft_dynset_init(const struct nft_ctx *ctx, ...@@ -113,6 +119,15 @@ static int nft_dynset_init(const struct nft_ctx *ctx,
tb[NFTA_DYNSET_SREG_KEY] == NULL) tb[NFTA_DYNSET_SREG_KEY] == NULL)
return -EINVAL; return -EINVAL;
if (tb[NFTA_DYNSET_FLAGS]) {
u32 flags = ntohl(nla_get_be32(tb[NFTA_DYNSET_FLAGS]));
if (flags & ~NFT_DYNSET_F_INV)
return -EINVAL;
if (flags & NFT_DYNSET_F_INV)
priv->invert = true;
}
set = nf_tables_set_lookup(ctx->table, tb[NFTA_DYNSET_SET_NAME], set = nf_tables_set_lookup(ctx->table, tb[NFTA_DYNSET_SET_NAME],
genmask); genmask);
if (IS_ERR(set)) { if (IS_ERR(set)) {
...@@ -220,6 +235,7 @@ static void nft_dynset_destroy(const struct nft_ctx *ctx, ...@@ -220,6 +235,7 @@ static void nft_dynset_destroy(const struct nft_ctx *ctx,
static int nft_dynset_dump(struct sk_buff *skb, const struct nft_expr *expr) static int nft_dynset_dump(struct sk_buff *skb, const struct nft_expr *expr)
{ {
const struct nft_dynset *priv = nft_expr_priv(expr); const struct nft_dynset *priv = nft_expr_priv(expr);
u32 flags = priv->invert ? NFT_DYNSET_F_INV : 0;
if (nft_dump_register(skb, NFTA_DYNSET_SREG_KEY, priv->sreg_key)) if (nft_dump_register(skb, NFTA_DYNSET_SREG_KEY, priv->sreg_key))
goto nla_put_failure; goto nla_put_failure;
...@@ -235,6 +251,8 @@ static int nft_dynset_dump(struct sk_buff *skb, const struct nft_expr *expr) ...@@ -235,6 +251,8 @@ static int nft_dynset_dump(struct sk_buff *skb, const struct nft_expr *expr)
goto nla_put_failure; goto nla_put_failure;
if (priv->expr && nft_expr_dump(skb, NFTA_DYNSET_EXPR, priv->expr)) if (priv->expr && nft_expr_dump(skb, NFTA_DYNSET_EXPR, priv->expr))
goto nla_put_failure; goto nla_put_failure;
if (nla_put_be32(skb, NFTA_DYNSET_FLAGS, htonl(flags)))
goto nla_put_failure;
return 0; return 0;
nla_put_failure: nla_put_failure:
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment