Commit e38fbfa9 authored by Florian Westphal's avatar Florian Westphal Committed by Pablo Neira Ayuso

netfilter: nf_tables: merge nft_rules_old structure and end of ruleblob marker

In order to free the rules in a chain via call_rcu, the rule array used
to stash a rcu_head and space for a pointer at the end of the rule array.

When the current nft_rule_dp blob format got added in
2c865a8a ("netfilter: nf_tables: add rule blob layout"), this results
in a double-trailer:

  size (unsigned long)
  struct nft_rule_dp
    struct nft_expr
         ...
    struct nft_rule_dp
     struct nft_expr
         ...
    struct nft_rule_dp (is_last=1) // Trailer

The trailer, struct nft_rule_dp (is_last=1), is not accounted for in size,
so it can be located via start_addr + size.

Because the rcu_head is stored after 'start+size' as well this means the
is_last trailer is *aliased* to the rcu_head (struct nft_rules_old).

This is harmless, because at this time the nft_do_chain function never
evaluates/accesses the trailer, it only checks the address boundary:

        for (; rule < last_rule; rule = nft_rule_next(rule)) {
...

But this way the last_rule address has to be stashed in the jump
structure to restore it after returning from a chain.

nft_do_chain stack usage has become way too big, so put it on a diet.

Without this patch is impossible to use
        for (; !rule->is_last; rule = nft_rule_next(rule)) {

... because on free, the needed update of the rcu_head will clobber the
nft_rule_dp is_last bit.

Furthermore, also stash the chain pointer in the trailer, this allows
to recover the original chain structure from nf_tables_trace infra
without a need to place them in the jump struct.

After this patch it is trivial to diet the jump stack structure,
done in the next two patches.
Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
parent ca288965
...@@ -2110,38 +2110,41 @@ static void nft_chain_release_hook(struct nft_chain_hook *hook) ...@@ -2110,38 +2110,41 @@ static void nft_chain_release_hook(struct nft_chain_hook *hook)
module_put(hook->type->owner); module_put(hook->type->owner);
} }
struct nft_rules_old { struct nft_rule_dp_last {
struct nft_rule_dp end; /* end of nft_rule_blob marker */
struct rcu_head h; struct rcu_head h;
struct nft_rule_blob *blob; struct nft_rule_blob *blob;
const struct nft_chain *chain; /* for tracing */
}; };
static void nft_last_rule(struct nft_rule_blob *blob, const void *ptr) static void nft_last_rule(const struct nft_chain *chain, const void *ptr)
{ {
struct nft_rule_dp *prule; struct nft_rule_dp_last *lrule;
BUILD_BUG_ON(offsetof(struct nft_rule_dp_last, end) != 0);
prule = (struct nft_rule_dp *)ptr; lrule = (struct nft_rule_dp_last *)ptr;
prule->is_last = 1; lrule->end.is_last = 1;
lrule->chain = chain;
/* blob size does not include the trailer rule */ /* blob size does not include the trailer rule */
} }
static struct nft_rule_blob *nf_tables_chain_alloc_rules(unsigned int size) static struct nft_rule_blob *nf_tables_chain_alloc_rules(const struct nft_chain *chain,
unsigned int size)
{ {
struct nft_rule_blob *blob; struct nft_rule_blob *blob;
/* size must include room for the last rule */
if (size < offsetof(struct nft_rule_dp, data))
return NULL;
size += sizeof(struct nft_rule_blob) + sizeof(struct nft_rules_old);
if (size > INT_MAX) if (size > INT_MAX)
return NULL; return NULL;
size += sizeof(struct nft_rule_blob) + sizeof(struct nft_rule_dp_last);
blob = kvmalloc(size, GFP_KERNEL_ACCOUNT); blob = kvmalloc(size, GFP_KERNEL_ACCOUNT);
if (!blob) if (!blob)
return NULL; return NULL;
blob->size = 0; blob->size = 0;
nft_last_rule(blob, blob->data); nft_last_rule(chain, blob->data);
return blob; return blob;
} }
...@@ -2220,7 +2223,6 @@ static int nf_tables_addchain(struct nft_ctx *ctx, u8 family, u8 genmask, ...@@ -2220,7 +2223,6 @@ static int nf_tables_addchain(struct nft_ctx *ctx, u8 family, u8 genmask,
struct nft_rule_blob *blob; struct nft_rule_blob *blob;
struct nft_trans *trans; struct nft_trans *trans;
struct nft_chain *chain; struct nft_chain *chain;
unsigned int data_size;
int err; int err;
if (table->use == UINT_MAX) if (table->use == UINT_MAX)
...@@ -2308,8 +2310,7 @@ static int nf_tables_addchain(struct nft_ctx *ctx, u8 family, u8 genmask, ...@@ -2308,8 +2310,7 @@ static int nf_tables_addchain(struct nft_ctx *ctx, u8 family, u8 genmask,
chain->udlen = nla_len(nla[NFTA_CHAIN_USERDATA]); chain->udlen = nla_len(nla[NFTA_CHAIN_USERDATA]);
} }
data_size = offsetof(struct nft_rule_dp, data); /* last rule */ blob = nf_tables_chain_alloc_rules(chain, 0);
blob = nf_tables_chain_alloc_rules(data_size);
if (!blob) { if (!blob) {
err = -ENOMEM; err = -ENOMEM;
goto err_destroy_chain; goto err_destroy_chain;
...@@ -8817,9 +8818,8 @@ static int nf_tables_commit_chain_prepare(struct net *net, struct nft_chain *cha ...@@ -8817,9 +8818,8 @@ static int nf_tables_commit_chain_prepare(struct net *net, struct nft_chain *cha
return -ENOMEM; return -ENOMEM;
} }
} }
data_size += offsetof(struct nft_rule_dp, data); /* last rule */
chain->blob_next = nf_tables_chain_alloc_rules(data_size); chain->blob_next = nf_tables_chain_alloc_rules(chain, data_size);
if (!chain->blob_next) if (!chain->blob_next)
return -ENOMEM; return -ENOMEM;
...@@ -8864,12 +8864,11 @@ static int nf_tables_commit_chain_prepare(struct net *net, struct nft_chain *cha ...@@ -8864,12 +8864,11 @@ static int nf_tables_commit_chain_prepare(struct net *net, struct nft_chain *cha
chain->blob_next->size += (unsigned long)(data - (void *)prule); chain->blob_next->size += (unsigned long)(data - (void *)prule);
} }
prule = (struct nft_rule_dp *)data;
data += offsetof(struct nft_rule_dp, data);
if (WARN_ON_ONCE(data > data_boundary)) if (WARN_ON_ONCE(data > data_boundary))
return -ENOMEM; return -ENOMEM;
nft_last_rule(chain->blob_next, prule); prule = (struct nft_rule_dp *)data;
nft_last_rule(chain, prule);
return 0; return 0;
} }
...@@ -8890,22 +8889,22 @@ static void nf_tables_commit_chain_prepare_cancel(struct net *net) ...@@ -8890,22 +8889,22 @@ static void nf_tables_commit_chain_prepare_cancel(struct net *net)
} }
} }
static void __nf_tables_commit_chain_free_rules_old(struct rcu_head *h) static void __nf_tables_commit_chain_free_rules(struct rcu_head *h)
{ {
struct nft_rules_old *o = container_of(h, struct nft_rules_old, h); struct nft_rule_dp_last *l = container_of(h, struct nft_rule_dp_last, h);
kvfree(o->blob); kvfree(l->blob);
} }
static void nf_tables_commit_chain_free_rules_old(struct nft_rule_blob *blob) static void nf_tables_commit_chain_free_rules_old(struct nft_rule_blob *blob)
{ {
struct nft_rules_old *old; struct nft_rule_dp_last *last;
/* rcu_head is after end marker */ /* last rule trailer is after end marker */
old = (void *)blob + sizeof(*blob) + blob->size; last = (void *)blob + sizeof(*blob) + blob->size;
old->blob = blob; last->blob = blob;
call_rcu(&old->h, __nf_tables_commit_chain_free_rules_old); call_rcu(&last->h, __nf_tables_commit_chain_free_rules);
} }
static void nf_tables_commit_chain(struct net *net, struct nft_chain *chain) static void nf_tables_commit_chain(struct net *net, struct nft_chain *chain)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment