]> git.ipfire.org Git - thirdparty/iptables.git/commitdiff
nft: Fix for ruleset flush while restoring
authorPhil Sutter <phil@nwl.cc>
Fri, 31 Jul 2020 16:20:17 +0000 (18:20 +0200)
committerPhil Sutter <phil@nwl.cc>
Fri, 14 Aug 2020 07:04:00 +0000 (09:04 +0200)
If ruleset is flushed while an instance of iptables-nft-restore is
running and has seen a COMMIT line once, it doesn't notice the
disappeared table while handling the next COMMIT. This is due to table
existence being tracked via 'initialized' boolean which is only reset
by nft_table_flush().

To fix this, drop the dedicated 'initialized' boolean and switch users
to the recently introduced 'exists' one.

As a side-effect, this causes base chain existence being checked for
each command calling nft_xt_builtin_init() as the old 'initialized' bit
was used to track if that function has been called before or not.

Signed-off-by: Phil Sutter <phil@nwl.cc>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
iptables/nft.c
iptables/nft.h
iptables/tests/shell/testcases/nft-only/0007-mid-restore-flush_0 [new file with mode: 0755]

index 76fd7edd11177647b7d22ee06d81c6535e43dd28..78dd17739d8f3ea00d7deca32dc08292c3fb7a6c 100644 (file)
@@ -644,19 +644,13 @@ const struct builtin_table xtables_bridge[NFT_TABLE_MAX] = {
        },
 };
 
-static bool nft_table_initialized(const struct nft_handle *h,
-                                 enum nft_table_type type)
-{
-       return h->cache->table[type].initialized;
-}
-
 static int nft_table_builtin_add(struct nft_handle *h,
                                 const struct builtin_table *_t)
 {
        struct nftnl_table *t;
        int ret;
 
-       if (nft_table_initialized(h, _t->type))
+       if (h->cache->table[_t->type].exists)
                return 0;
 
        t = nftnl_table_alloc();
@@ -775,9 +769,6 @@ static int nft_xt_builtin_init(struct nft_handle *h, const char *table)
        if (t == NULL)
                return -1;
 
-       if (nft_table_initialized(h, t->type))
-               return 0;
-
        if (nft_table_builtin_add(h, t) < 0)
                return -1;
 
@@ -786,8 +777,6 @@ static int nft_xt_builtin_init(struct nft_handle *h, const char *table)
 
        nft_chain_builtin_init(h, t);
 
-       h->cache->table[t->type].initialized = true;
-
        return 0;
 }
 
@@ -1989,7 +1978,7 @@ static int __nft_table_flush(struct nft_handle *h, const char *table, bool exist
 
        _t = nft_table_builtin_find(h, table);
        assert(_t);
-       h->cache->table[_t->type].initialized = false;
+       h->cache->table[_t->type].exists = false;
 
        flush_chain_cache(h, table);
 
index f38f5812be7719e2db41a77b906a2b898d3c3e54..128e09beb805ec9b9125e445190fdb81e3db6968 100644 (file)
@@ -41,7 +41,6 @@ struct nft_cache {
        struct {
                struct nftnl_chain_list *chains;
                struct nftnl_set_list   *sets;
-               bool                    initialized;
                bool                    exists;
        } table[NFT_TABLE_MAX];
 };
diff --git a/iptables/tests/shell/testcases/nft-only/0007-mid-restore-flush_0 b/iptables/tests/shell/testcases/nft-only/0007-mid-restore-flush_0
new file mode 100755 (executable)
index 0000000..43880ff
--- /dev/null
@@ -0,0 +1,23 @@
+#!/bin/bash
+
+[[ $XT_MULTI == *xtables-nft-multi ]] || { echo "skip $XT_MULTI"; exit 0; }
+nft -v >/dev/null || { echo "skip $XT_MULTI (no nft)"; exit 0; }
+
+coproc $XT_MULTI iptables-restore --noflush
+
+cat >&"${COPROC[1]}" <<EOF
+*filter
+:foo [0:0]
+COMMIT
+*filter
+:foo [0:0]
+EOF
+
+$XT_MULTI iptables-save | grep -q ':foo'
+nft flush ruleset
+
+echo "COMMIT" >&"${COPROC[1]}"
+sleep 1
+
+[[ -n $COPROC_PID ]] && kill $COPROC_PID
+wait