]> git.ipfire.org Git - thirdparty/nftables.git/log
thirdparty/nftables.git
6 years agosrc: Introduce chain_expr in jump and goto statements
Fernando Fernandez Mancera [Fri, 24 May 2019 13:06:47 +0000 (15:06 +0200)] 
src: Introduce chain_expr in jump and goto statements

Introduce expressions as a chain in jump and goto statements.
This is going to be used to support variables as a chain in the
following patches.

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: support for arp sender and target ethernet and IPv4 addresses
Pablo Neira Ayuso [Wed, 22 May 2019 20:06:16 +0000 (22:06 +0200)] 
src: support for arp sender and target ethernet and IPv4 addresses

 # nft add table arp x
 # nft add chain arp x y { type filter hook input priority 0\; }
 # nft add rule arp x y arp saddr ip 192.168.2.1 counter

Testing this:

 # ip neigh flush dev eth0
 # ping 8.8.8.8
 # nft list ruleset
 table arp x {
        chain y {
                type filter hook input priority filter; policy accept;
                arp saddr ip 192.168.2.1 counter packets 1 bytes 46
        }
 }

You can also specify hardware sender address, eg.

 # nft add rule arp x y arp saddr ether aa:bb:cc:aa:bb:cc drop counter

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: update cache if cmd is more specific
Eric Garver [Wed, 22 May 2019 19:44:04 +0000 (21:44 +0200)] 
src: update cache if cmd is more specific

If we've done a partial fetch of the cache and the genid is the same the
cache update will be skipped without fetching the needed items. This
change flushes the cache if the new request is more specific than the
current cache - forcing a cache update which includes the needed items.

Introduces a simple scoring system which reflects how
cache_init_objects() looks at the current command to decide if it is
finished already or not. Then use that in cache_needs_more(): If current
command's score is higher than old command's, cache needs an update.

Fixes: 816d8c7659c1 ("Support 'add/insert rule index <IDX>'")
Signed-off-by: Eric Garver <eric@garver.life>
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoRevert "tests: shell: avoid single-value anon sets"
Pablo Neira Ayuso [Fri, 24 May 2019 18:55:27 +0000 (20:55 +0200)] 
Revert "tests: shell: avoid single-value anon sets"

This reverts commit b7459b0c854fc7a0d6cd86151b81035a8edf8e63.

6 years agoRevert "tests: py: remove single-value-anon-set test cases"
Pablo Neira Ayuso [Fri, 24 May 2019 18:54:37 +0000 (20:54 +0200)] 
Revert "tests: py: remove single-value-anon-set test cases"

This reverts commit d03bcb669c0c645190df9bd166f53380bcac7862.

6 years agotests: py: remove single-value-anon-set test cases
Florian Westphal [Fri, 17 May 2019 10:46:31 +0000 (12:46 +0200)] 
tests: py: remove single-value-anon-set test cases

future change will rewrite all single-element anon sets to a cmp op.
Retain a few test cases to later check that the rewrite is correct, but
remove all others.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agotests: shell: avoid single-value anon sets
Florian Westphal [Fri, 17 May 2019 11:57:23 +0000 (13:57 +0200)] 
tests: shell: avoid single-value anon sets

Future change is going to auto-change them to simple compare
ops rather than lookup in set with only one element.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agoinclude: refresh nf_tables.h cached copy
Pablo Neira Ayuso [Sun, 12 May 2019 19:08:25 +0000 (21:08 +0200)] 
include: refresh nf_tables.h cached copy

Fetch fix for NFT_LOGLEVEL_MAX.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: use definitions in include/linux/netfilter/nf_tables.h
Pablo Neira Ayuso [Sun, 12 May 2019 18:52:43 +0000 (20:52 +0200)] 
src: use definitions in include/linux/netfilter/nf_tables.h

Use NFT_LOGLEVEL_* definitions in UAPI.

Make an internal definition of NFT_OSF_F_VERSION, this was originally
defined in the UAPI header in the initial patch version, however, this
is not available anymore.

Add a bison rule to deal with the timeout case.

Otherwise, compilation breaks.

Fixes: d3869cae9d62 ("include: refresh nf_tables.h cached copy")
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agopy: fix missing decode/encode of strings
Eric Garver [Fri, 10 May 2019 12:29:47 +0000 (08:29 -0400)] 
py: fix missing decode/encode of strings

When calling ffi functions, if the string is unicode we need to convert
to utf-8. Then convert back for any output we receive.

Fixes: 586ad210368b7 ("libnftables: Implement JSON parser")
Signed-off-by: Eric Garver <eric@garver.life>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoinclude: refresh nf_tables.h cached copy
Pablo Neira Ayuso [Sun, 12 May 2019 17:54:41 +0000 (19:54 +0200)] 
include: refresh nf_tables.h cached copy

Refresh it to fetch what we have in 5.2-rc.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoRevert "proto: support for draft-ietf-tsvwg-le-phb-10.txt"
Pablo Neira Ayuso [Thu, 9 May 2019 15:07:07 +0000 (17:07 +0200)] 
Revert "proto: support for draft-ietf-tsvwg-le-phb-10.txt"

This reverts commit 55715486efba424e97361c81d8d47e854f45a5a6.

This breaks tests/py.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests/py: Fix JSON expected output for icmpv6 code values
Phil Sutter [Thu, 9 May 2019 11:35:45 +0000 (13:35 +0200)] 
tests/py: Fix JSON expected output for icmpv6 code values

Reverse translation is happening for values which are known, even if
they are part of a range. In contrast to standard output, this is OK
because in JSON lower and upper bounds are properties and there is no
ambiguity if names contain a dash.

Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests/py: Fix JSON expected output after expr merge change
Phil Sutter [Thu, 9 May 2019 11:35:44 +0000 (13:35 +0200)] 
tests/py: Fix JSON expected output after expr merge change

Looks like original patch missed this one.

Fixes: 88ba0c92754d8 ("tests: fix up expected payloads after expr merge change")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Fix ct timeout object support
Phil Sutter [Thu, 9 May 2019 11:35:42 +0000 (13:35 +0200)] 
parser_json: Fix ct timeout object support

Seems like it wasn't possible to add or list ct timeout objects.

Fixes: c82a26ebf7e9f ("json: Add ct timeout support")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agojson: Fix tproxy support regarding latest changes
Phil Sutter [Thu, 9 May 2019 11:35:41 +0000 (13:35 +0200)] 
json: Fix tproxy support regarding latest changes

Family may be specified also if no address is given at the same time,
make parser/printer tolerant to that. Also fix for missing/incorrect
JSON equivalents in tests/py.

While being at it, fix two issues in non-JSON tests:

* Ruleset is printed in numeric mode, so use 'l4proto 6' instead of
  'l4proto tcp' in rules to avoid having to specify expected output for
  that unrelated bit.

* In ip and ip6 family tables, family parameter is not deserialized on
  output.

Fixes: 3edb96200690b ("parser_bison: missing tproxy syntax with port only for inet family")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests/py: Fix JSON equivalents of osf tests
Phil Sutter [Thu, 9 May 2019 11:35:40 +0000 (13:35 +0200)] 
tests/py: Fix JSON equivalents of osf tests

Fixes: 12adf747a3f62 ("tests: py: add osf tests with versions")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agonetlink: Fix printing of zero-length prefixes
Phil Sutter [Thu, 9 May 2019 11:35:39 +0000 (13:35 +0200)] 
netlink: Fix printing of zero-length prefixes

When delinearizing, an all-zero mask didn't qualify as prefix. Therefore
a statement:

| ip daddr 0.0.0.0/0

would be printed as:

| ip daddr & 0.0.0.0 == 0.0.0.0

To fix this, expr_mask_is_prefix() must return true if the initial 1-bit
search fails (the given value must be zero in this case). Additionally,
a shortcut is needed in conversion algorithm of expr_mask_to_prefix()
to not turn the zero prefix into a 1 by accident.

Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Fix igmp support
Phil Sutter [Thu, 9 May 2019 11:35:38 +0000 (13:35 +0200)] 
parser_json: Fix igmp support

Parser didn't know about that protocol, also testsuite bits were
missing.

Fixes: bad27ca386276 ("src: add igmp support")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agojson: Support nat in inet family
Phil Sutter [Thu, 9 May 2019 11:35:37 +0000 (13:35 +0200)] 
json: Support nat in inet family

Add the missing bits to JSON parser, printer, man page and testsuite.

Fixes: fbe27464dee45 ("src: add nat support for the inet family")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agodoc: Review man page synopses
Phil Sutter [Tue, 7 May 2019 13:23:50 +0000 (15:23 +0200)] 
doc: Review man page synopses

Fix use of font typefaces:

- *bold* for terminals
- 'italic' for non-terminals
- plain for meta-characters

Apart from that:

* Variable definitions require an equals sign
* 'auto-merge' option in set spec does not take a parameter
* List header fields in payload expressions instead of unexplained
  placeholder
* Introduce non-terminals in some places to avoid repetitions or clarify
  syntax
* Fix syntax for ip6 header expresssion example
* Reorganize ct expression synopsis into four parts:
  1) direction not allowed
  2) direction optional
  3) direction mandatory
  4) direction and family mandatory
* Add missing 'version' keyword to osf expression
* Clarify verdict statements example topic
* Add synopses for payload and exthdr statements
* Fix typo: differv -> diffserv
* Reorganize reject statement synopsis to point out which code type
  is required for which type arg
* Counter statement requires either one of 'packets' or 'bytes' args or
  both, none is an invalid variant
* Limit statement accepts a unit in burst, too
* Improve language in limit statement description a bit

Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agopy: Fix gitignore of lib/ directory
Phil Sutter [Tue, 7 May 2019 13:21:45 +0000 (15:21 +0200)] 
py: Fix gitignore of lib/ directory

Pattern is not a PCRE one but merely a shell glob. Hence 'lib.*' matches
only 'lib.' prefix, not also 'lib'.

Fixes: bf9653667a39e ("python: installation of binding via make install")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agogmputil: Add missing header for va_list
Rosen Penev [Fri, 3 May 2019 18:49:11 +0000 (11:49 -0700)] 
gmputil: Add missing header for va_list

Otherwise it errors with unknown type name when using uClibc.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: use UDATA defines from libnftnl
Phil Sutter [Thu, 25 Apr 2019 12:56:54 +0000 (14:56 +0200)] 
src: use UDATA defines from libnftnl

Userdata attribute names have been added to libnftnl, use them instead
of the local copy.

While being at it, rename udata_get_comment() in netlink_delinearize.c
and the callback it uses since the function is specific to rules. Also
integrate the existence check for NFTNL_RULE_USERDATA into it along with
the call to nftnl_rule_get_data().

Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: fix crash on add rule to bad references
Eric Garver [Wed, 1 May 2019 16:34:45 +0000 (12:34 -0400)] 
parser_json: fix crash on add rule to bad references

Pass the location via the handle so the error leg in
rule_translate_index() can reference it. Applies to invalid references
to tables, chains, and indexes.

Fixes: 586ad210368b ("libnftables: Implement JSON parser")
Signed-off-by: Eric Garver <eric@garver.life>
Acked-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: fix off by one index on rule add/replace
Eric Garver [Wed, 1 May 2019 16:25:37 +0000 (12:25 -0400)] 
parser_json: fix off by one index on rule add/replace

We need to increment the index by one just as the CLI does.

Fixes: 586ad210368b7 ("libnftables: Implement JSON parser")
Signed-off-by: Eric Garver <eric@garver.life>
Acked-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoproto: support for draft-ietf-tsvwg-le-phb-10.txt
Loganaden Velvindron [Wed, 1 May 2019 13:23:15 +0000 (17:23 +0400)] 
proto: support for draft-ietf-tsvwg-le-phb-10.txt

Upcoming dscp codepoint for background traffic of low precendence
such as bulk data transfers with low priority in time, non time-critical
backups, larger software updates, web search engines while gathering
information from web servers and so on.

Signed-off-by: Loganaden Velvindron <logan@cyberstorm.mu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: default to unspecified l3proto for ct helper/timeout
Eric Garver [Thu, 2 May 2019 16:20:57 +0000 (12:20 -0400)] 
parser_json: default to unspecified l3proto for ct helper/timeout

As per the man page, if the user does not specify the l3proto it should
be derived from the table family.

Fixes: 586ad210368b ("libnftables: Implement JSON parser")
Signed-off-by: Eric Garver <eric@garver.life>
Acked-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: fix double free on xt stmt destruction
Florian Westphal [Tue, 23 Apr 2019 11:18:05 +0000 (13:18 +0200)] 
src: fix double free on xt stmt destruction

'nft monitor' dies with:
*** Error in `/sbin/nft': double free or corruption (fasttop): 0x000055f8ba57b750 ***

... when the iptables-nft test suite is running in parallel, because
xfree(stmt->xt.name) gets called twice.

Fixes: 4ac11b890fe870 ("src: missing destroy function in statement definitions")
Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Fix parser for list maps command
Phil Sutter [Thu, 25 Apr 2019 12:59:43 +0000 (14:59 +0200)] 
parser_json: Fix parser for list maps command

Wrong callback in json_parse_cmd_list() for "maps" key.

Fixes: 586ad210368b7 ("libnftables: Implement JSON parser")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Fix typo in ct timeout policy parser
Phil Sutter [Thu, 25 Apr 2019 12:59:42 +0000 (14:59 +0200)] 
parser_json: Fix typo in ct timeout policy parser

Parser expects an object in policy property and json_is_object() returns
true if given parameter is an object. The check was inverse by accident.

Fixes: c82a26ebf7e9f ("json: Add ct timeout support")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests/py: Fix error messages in chain_delete()
Phil Sutter [Thu, 25 Apr 2019 12:59:41 +0000 (14:59 +0200)] 
tests/py: Fix error messages in chain_delete()

Adding string and chain object is an illegal operation in Python.
Instead concatenate with cmd string since that contains all required
information already.

Fixes: 820fd08b5f1d4 ("tests/py: Review print statements in nft-test.py")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: monitor: Adjust to changed events ordering
Phil Sutter [Thu, 25 Apr 2019 12:59:40 +0000 (14:59 +0200)] 
tests: monitor: Adjust to changed events ordering

When replacing a rule, kernel nowadays seems to report rule add event
before rule delete one. Since both events belong to the same
transaction, this is harmless per definition and merely needs adjustment
in expected output.

Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Disallow ct helper as type to map to
Phil Sutter [Thu, 11 Apr 2019 10:38:51 +0000 (12:38 +0200)] 
parser_json: Disallow ct helper as type to map to

When creating a map, users may either map dtype:dtype or dtype:object.
In the second case, only counter, quota, limit and secmark is allowed by
bison, but JSON parser wasn't as strict, allowing ct helper as well.
Remove that to avoid undefined behaviour.

Fixes: 586ad210368b7 ("libnftables: Implement JSON parser")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: fix segfault in translating string to nft object
Laura Garcia Liebana [Thu, 11 Apr 2019 08:59:40 +0000 (10:59 +0200)] 
parser_json: fix segfault in translating string to nft object

A segmentation fault is produced when applying an input JSON file
like the following:

{"nftables": [
{ "add":
{"map":
{"family": "ip",
"name": "persistencia",
"table": "nftlb",
"type": "ipv4_addr",
"map": "mark",
"size": 65535,
"flags": ["timeout"],
"timeout": 44
}
}
}
]}

The captured error is:

 Program received signal SIGSEGV, Segmentation fault.
 #1  0x00007ffff7f734f9 in string_to_nft_object (str=0x55555555f410
  "mark") at parser_json.c:2513
 2513 if (!strcmp(str, obj_tbl[i]))

The obj_tbl array is allocated with the maximum element index even
if lower indexes are not populated, so it produces null pointer
items.

This patch ensures that the maximum number of possible indexes
but also the element is not comparing a null pointer.

Signed-off-by: Laura Garcia Liebana <nevola@gmail.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agosegtree: fix memleak in interval_map_decompose()
Pablo Neira Ayuso [Tue, 9 Apr 2019 22:37:04 +0000 (00:37 +0200)] 
segtree: fix memleak in interval_map_decompose()

Do not inconditionally hold reference to start interval.

The handling depends on what kind of range expression we need to build,
either no range at all, a prefix or a plain range. Depending on the
case, we need to partially clone what we need from the expression to
avoid use-after-free.

This fixes valgrind reports that look like this, when listing rulesets:

==30018== 2,057,984 (1,028,992 direct, 1,028,992 indirect) bytes in 8,039 blocks are definitely lost in loss record 76 of 83
==30018==    at 0x4C2BBAF: malloc (vg_replace_malloc.c:299)
==30018==    by 0x4E75978: xmalloc (utils.c:36)
==30018==    by 0x4E75A5D: xzalloc (utils.c:65)
==30018==    by 0x4E5CEC0: expr_alloc (expression.c:45)
==30018==    by 0x4E5D610: mapping_expr_alloc (expression.c:985)
==30018==    by 0x4E6A068: netlink_delinearize_setelem (netlink.c:810)
==30018==    by 0x5B51320: nftnl_set_elem_foreach (set_elem.c:673)
==30018==    by 0x4E6A2D5: netlink_list_setelems (netlink.c:864)
==30018==    by 0x4E56C76: cache_init_objects (rule.c:166)
==30018==    by 0x4E56C76: cache_init (rule.c:216)
==30018==    by 0x4E56C76: cache_update (rule.c:243)
==30018==    by 0x4E64530: cmd_evaluate_list (evaluate.c:3503)
==30018==    by 0x4E64530: cmd_evaluate (evaluate.c:3880)
==30018==    by 0x4E7D12F: nft_parse (parser_bison.y:798)
==30018==    by 0x4E7AB56: nft_parse_bison_buffer (libnftables.c:349)
==30018==    by 0x4E7AB56: nft_run_cmd_from_buffer (libnftables.c:394)

Reported-by: Václav Zindulka <vaclav.zindulka@tlapnet.cz>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: memleak in expressions
Pablo Neira Ayuso [Tue, 9 Apr 2019 20:58:27 +0000 (22:58 +0200)] 
src: memleak in expressions

Fix memleak in set element and hash expressions destroy path.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: add nat support for the inet family
Florian Westphal [Fri, 1 Feb 2019 23:36:51 +0000 (00:36 +0100)] 
src: add nat support for the inet family

consider a simple ip6 nat table:

table ip6 nat { chain output {
  type nat hook output priority 0; policy accept;
  dnat to dead:2::99
}

Now consider same ruleset, but using 'table inet nat':
nft now lacks context to determine address family to parse 'to $address'.

This adds code to make the following work:

table inet nat { [ .. ]
  # detect af from network protocol context:
  ip6 daddr dead::2::1 dnat to dead:2::99

  # use new dnat ip6 keyword:
  dnat ip6 to dead:2::99
  }

On list side, the keyword is only shown in the inet family, else the
short version (dnat to ...) is used as the family is redundant when the
table already mandates the ip protocol version supported.

Address mismatches such as

table ip6 { ..
dnat ip to 1.2.3.4

are detected/handled during the evaluation phase.

Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agofiles: pf.os: merge the signatures splitted by version
Fernando Fernandez Mancera [Wed, 27 Mar 2019 10:38:01 +0000 (11:38 +0100)] 
files: pf.os: merge the signatures splitted by version

In order to be able to identify the OS version we need to merge the signatures
split by version. eg.

65535:64:1:60:M*,N,W1,N,N,T: FreeBSD:4.7-4.11::FreeBSD 4.7-5.2
65535:64:1:60:M*,N,W1,N,N,T: FreeBSD:5.0-5.2::FreeBSD 4.7-5.2

65535:64:1:60:M*,N,W1,N,N,T: FreeBSD:4.7-5.2::FreeBSD 4.7-5.2

Fingerprints need to be unique to make this fit into the set/map
infrastructure for exact matches. Having multiples fingerprints with
same signature is a problem, since it forces users to add multiple
rules.

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agofiles: osf: update pf.os with newer OS fingerprints
Fernando Fernandez Mancera [Wed, 27 Mar 2019 10:38:00 +0000 (11:38 +0100)] 
files: osf: update pf.os with newer OS fingerprints

After notice that some fingerprints are outdated we have updated the most common
of them.

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agodoc: add osf version option to man page
Fernando Fernandez Mancera [Wed, 27 Mar 2019 10:37:59 +0000 (11:37 +0100)] 
doc: add osf version option to man page

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: py: add osf tests with versions
Fernando Fernandez Mancera [Wed, 27 Mar 2019 10:37:58 +0000 (11:37 +0100)] 
tests: py: add osf tests with versions

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agojson: osf: add version json support
Fernando Fernandez Mancera [Wed, 27 Mar 2019 10:37:57 +0000 (11:37 +0100)] 
json: osf: add version json support

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoosf: add version fingerprint support
Fernando Fernandez Mancera [Wed, 27 Mar 2019 10:37:56 +0000 (11:37 +0100)] 
osf: add version fingerprint support

Add support for version fingerprint in "osf" expression. Example:

table ip foo {
chain bar {
type filter hook input priority filter; policy accept;
osf ttl skip name "Linux"
osf ttl skip version "Linux:4.20"
}
}

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agodoc: update nft list plural form parameters
Fernando Fernandez Mancera [Fri, 5 Apr 2019 15:36:55 +0000 (17:36 +0200)] 
doc: update nft list plural form parameters

Signed-off-by: Fernando Fernandez Mancera <ffmancera@riseup.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: missing destroy function in statement definitions
Pablo Neira Ayuso [Fri, 5 Apr 2019 13:35:36 +0000 (15:35 +0200)] 
src: missing destroy function in statement definitions

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_bison: type_identifier string memleak
Pablo Neira Ayuso [Fri, 5 Apr 2019 12:09:56 +0000 (14:09 +0200)] 
parser_bison: type_identifier string memleak

==6297== 24 bytes in 3 blocks are definitely lost in loss record 2 of 13
==6297==    at 0x4C2BBAF: malloc (vg_replace_malloc.c:299)
==6297==    by 0x56193B9: strdup (strdup.c:42)
==6297==    by 0x4E758BD: xstrdup (utils.c:75)
==6297==    by 0x4E7F9D3: nft_parse (parser_bison.y:1895)
==6297==    by 0x4E7AAE1: nft_parse_bison_filename (libnftables.c:370)
==6297==    by 0x4E7AAE1: nft_run_cmd_from_filename (libnftables.c:438)
==6297==    by 0x109A33: main (main.c:310)

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoct: use nft_print() instead of printf()
Pablo Neira Ayuso [Fri, 5 Apr 2019 13:36:48 +0000 (15:36 +0200)] 
ct: use nft_print() instead of printf()

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoevaluate: improve error reporting in tproxy with inet family
Pablo Neira Ayuso [Thu, 4 Apr 2019 11:23:04 +0000 (13:23 +0200)] 
evaluate: improve error reporting in tproxy with inet family

 # nft add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy to :2000
 Error: conflicting protocols specified: ip vs. unknown. You must specify ip or ip6 family in tproxy statement
 add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy to :2000
                             ~~~~~~~~                            ^^^^^^^^^^^^^^^

instead of:

 # nft add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy to :2000
 Error: Conflicting network layer protocols.
 add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy to :2000
                                                                 ^^^^^^^^^^^^^^^

Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1310
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_bison: missing tproxy syntax with port only for inet family
Pablo Neira Ayuso [Wed, 3 Apr 2019 21:40:04 +0000 (23:40 +0200)] 
parser_bison: missing tproxy syntax with port only for inet family

 # nft add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy ip to :2000
 Error: syntax error, unexpected colon
 add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy ip to :2000
                                                                              ^

Syntax with no protocol for tproxy complains with:

 # nft add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy to :2000
 Error: Conflicting network layer protocols.
 add rule inet filter divert ip daddr 0.0.0.0/0 meta l4proto tcp tproxy to :2000
                                                                 ^^^^^^^^^^^^^^^

Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1310
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agodoc: Add minimal description of (v)map statements
Phil Sutter [Tue, 2 Apr 2019 13:36:42 +0000 (15:36 +0200)] 
doc: Add minimal description of (v)map statements

Although quite useful, these were missing in man page. Content loosely
based on wiki documentation.

Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Rewrite echo support
Phil Sutter [Tue, 2 Apr 2019 13:34:43 +0000 (15:34 +0200)] 
parser_json: Rewrite echo support

Instead of guessing which object to update with retrieved handle,
introduce a list containing struct cmd <-> json_t associations. Upon
batch commit, allocated cmd objects are assigned a unique netlink
sequence number. Monitor events contain that number as well, so they may
be associated to the cmd object which triggered them. Using
json_cmd_assoc list the event may in turn be associated to the input's
JSON object which should receive the handle value.

This also fixes incorrect behaviour if JSON input contained "insert"
commands.

Fixes: bb32d8db9a125 ("JSON: Add support for echo option")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoevaluate: skip binary transfer for named sets
Pablo Neira Ayuso [Tue, 26 Mar 2019 12:09:21 +0000 (13:09 +0100)] 
evaluate: skip binary transfer for named sets

Set may be empty, content might be yet unknown, we cannot do any
transfer in this case.

Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1327
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: use 'flow add' syntax
Pablo Neira Ayuso [Wed, 20 Mar 2019 10:32:58 +0000 (11:32 +0100)] 
src: use 'flow add' syntax

As discussed during NFWS 2018. Old syntax is stilled allowed.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agobuild: missing misspell.h in Makefile.am
Pablo Neira Ayuso [Wed, 20 Mar 2019 10:33:49 +0000 (11:33 +0100)] 
build: missing misspell.h in Makefile.am

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoconfigure.ac: Clean up AC_ARG_{WITH, ENABLE} invocations, s/==/=/
Luis Ressel [Sun, 17 Mar 2019 18:24:22 +0000 (19:24 +0100)] 
configure.ac: Clean up AC_ARG_{WITH, ENABLE} invocations, s/==/=/

* AC_ARG_ENABLE implicitly defines enable_debug; there's no point in
  performing extra work just to define with_debug with an identical
  value.

* The same applies to with_xtables and with_libxtables.

* The AS_IF block in the `AC_ARG_ENABLE([man-doc], ...` invocation is
  essentially a noop. All it does is to set enable_man_doc to `yes` if
  has a value that matches neither `yes` nor `no`. (This could happen if
  a user calls `configure --enable-man-doc=foo`, but that'd be a user
  error which we don't need to handle.)

* The correct operator for equality tests in `test` is `=`. Some
  implementations also support `==`, but this is not portable.

Signed-off-by: Luis Ressel <aranea@aixah.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoconfigure.ac: Fix a2x check
Luis Ressel [Sun, 17 Mar 2019 17:19:11 +0000 (18:19 +0100)] 
configure.ac: Fix a2x check

* If enable_man_doc is set, but a2x can't be found, configure should
  fail instead of silently disabling man page creation.

* The AS_IF block checking $need_a2x is never active (need_a2x has been
  removed from configure.ac in 13e44a608 and a277479dc).

* AC_CHECK_PROG(VAR, ...) is a noop if VAR is already set, allowing the
  user to explicitly specify the (path to the) binary in VAR. Adjust the
  AS_IF check to account for this.

Signed-off-by: Luis Ressel <aranea@aixah.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: file descriptor leak in include_file()
Pablo Neira Ayuso [Fri, 15 Mar 2019 10:31:50 +0000 (11:31 +0100)] 
src: file descriptor leak in include_file()

File that contains the ruleset is never closed, track open files through
the nft_ctx object and close them accordingly.

Reported-by: Václav Zindulka <vaclav.zindulka@tlapnet.cz>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_bison: no need for statement separator for ct object commands
Pablo Neira Ayuso [Thu, 14 Mar 2019 10:04:37 +0000 (11:04 +0100)] 
parser_bison: no need for statement separator for ct object commands

Otherwise, this forces user to place a double semi-colon to skip a
parser error in a multi-line commands:

 # nft add "ct helper ip filter test { type \"ftp\" protocol tcp; };add rule filter test ct helper set \"ftp\""
 Error: syntax error, unexpected add, expecting end of file or newline or semicolon
 add ct helper ip filter test { type "ftp" protocol tcp; };add rule filter test ct helper set "ftp"
                                                           ^^^

Reported-by: Laura Garcia <nevola@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: shell: bogus EBUSY on helper deletion from transaction
Pablo Neira Ayuso [Thu, 14 Mar 2019 09:41:45 +0000 (10:41 +0100)] 
tests: shell: bogus EBUSY on helper deletion from transaction

Reported-by: Laura Garcia <nevola@gmail.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: shell: bogus ENOENT on element deletion in interval set
Pablo Neira Ayuso [Tue, 12 Mar 2019 11:31:04 +0000 (12:31 +0100)] 
tests: shell: bogus ENOENT on element deletion in interval set

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: shell: bogus EBUSY in set deletion after flush
Pablo Neira Ayuso [Fri, 8 Mar 2019 13:31:50 +0000 (14:31 +0100)] 
tests: shell: bogus EBUSY in set deletion after flush

flush chain ip filter group_7933

Removes all rules, including references to set 'group_7933', however:

delete map ip filter group_7933

results in:

delete.nft:6:1-32: Error: Could not process rule: Device or resource busy
delete map ip filter group_7933
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: add test case for anon set abort.
Florian Westphal [Thu, 7 Mar 2019 19:43:56 +0000 (20:43 +0100)] 
tests: add test case for anon set abort.

This triggers kernel crash in 5.0, see
https://bugzilla.netfilter.org/show_bug.cgi?id=1325

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agoevaluate: misleading error reporting with sets and maps
Pablo Neira Ayuso [Wed, 6 Mar 2019 10:56:59 +0000 (11:56 +0100)] 
evaluate: misleading error reporting with sets and maps

When trying to list a map content, if set is used, nft reports:

 # nft list set filter group_7933
 Error: No such file or directory; did you mean set ‘group_7933’ in table ip ‘filter’?
 list set filter group_7933
                 ^^^^^^^^^^

Which is confusing in case user wants to list an existing map:

 # nft list map filter group_7933
 table ip filter {
        map group_7933 {
                type ipv4_addr : classid
                flags interval
                elements = { 10.4.22.0/24 : 1:c7cb }
        }
 }

Instead, give a hint to user that probably wants to list a map, not a set:

 # nft list set filter group_7933
 Error: No such file or directory; did you mean map ‘group_7933’ in table ip ‘filter’?
 list set filter group_7933
                 ^^^^^^^^^^

Fixes: 285bb67a11ad ("src: introduce simple hints on incorrect set")
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosegtree: add missing non-matching segment to set in flat representation
Pablo Neira Ayuso [Tue, 5 Mar 2019 23:51:03 +0000 (00:51 +0100)] 
segtree: add missing non-matching segment to set in flat representation

 # cat test.nft
 add set x y { type ipv4_addr; }
 add element x y { 10.0.24.0/24 }
 # nft -f test.nft
 # nft delete element x y { 10.0.24.0/24 }

bogusly returns -ENOENT. The non-matching segment (0.0.0.0 with end-flag
set on) is not added to the set in the example above.

This patch also adds a test to cover this case.

Fixes: 4935a0d561b5 ("segtree: special handling for the first non-matching segment")
Reported-by: Václav Zindulka <vaclav.zindulka@tlapnet.cz>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosegtree: remove dummy debug_octx
Pablo Neira Ayuso [Tue, 5 Mar 2019 12:13:52 +0000 (13:13 +0100)] 
segtree: remove dummy debug_octx

Breaks custom-defined configuration in library mode, ie. user may want
to store output in a file, instead of stderr.

Fixes: 35f6cd327c2e ("src: Pass stateless, numeric, ip2name and handle variables as structure members.")
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosegtree: fix crash when debug mode is active
Florian Westphal [Mon, 4 Mar 2019 00:06:05 +0000 (01:06 +0100)] 
segtree: fix crash when debug mode is active

We must set output_fp to sensible filep, else crash.

Reported-by: Václav Zindulka <vaclav.zindulka@tlapnet.cz>
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agodoc: update goto/jump help text
Florian Westphal [Fri, 22 Feb 2019 16:33:09 +0000 (17:33 +0100)] 
doc: update goto/jump help text

pointed out by redsh on #netfilter: uses "of" instead of "or".
While at it, explain continue and update return statement.

Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Respect base chain priority
Phil Sutter [Tue, 26 Feb 2019 21:13:42 +0000 (22:13 +0100)] 
parser_json: Respect base chain priority

Priority value was parsed but not assigned to allocated chain object.

Fixes: 586ad210368b7 ("libnftables: Implement JSON parser")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agojson: Fix memleaks in echo support
Phil Sutter [Tue, 26 Feb 2019 21:13:41 +0000 (22:13 +0100)] 
json: Fix memleaks in echo support

When extracting netlink message data for populating JSON objects with
handles, allocated nftnl objects were not freed. Though since freeing
these objects also frees retrieved string attributes, copy them using
strdupa() which takes care of memory deallocation upon function return.
This is ideal since these strings are used only to find the right JSON
object to insert the handle into.

Fixes: bb32d8db9a125 ("JSON: Add support for echo option")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Use xstrdup() when parsing rule comment
Phil Sutter [Tue, 26 Feb 2019 21:13:40 +0000 (22:13 +0100)] 
parser_json: Use xstrdup() when parsing rule comment

Use xstrdup() instead of plain strdup() for consistency (and implicit
ENOMEM checking).

Fixes: 586ad210368b7 ("libnftables: Implement JSON parser")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoparser_json: Duplicate chain name when parsing jump verdict
Phil Sutter [Tue, 26 Feb 2019 21:13:39 +0000 (22:13 +0100)] 
parser_json: Duplicate chain name when parsing jump verdict

Since verdict expression frees the chain name, pass a newly allocated
string to it. Otherwise double free happens because json_decref() frees
the string property value as well.

Fixes: d1057a5feb5fd ("JSON: Simplify verdict statement parsing")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agolibnftables: Print errors before freeing commands
Phil Sutter [Tue, 26 Feb 2019 21:13:38 +0000 (22:13 +0100)] 
libnftables: Print errors before freeing commands

Commands may contain data printed by an error record, so make sure
cmd_free() is not called before erec_print_list() has returned.

Fixes: 778de37d82e7b ("libnftables: Keep cmds list outside of parser_state")
Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: shell: flush after rule deletion
Pablo Neira Ayuso [Fri, 15 Feb 2019 10:05:43 +0000 (11:05 +0100)] 
tests: shell: flush after rule deletion

Flush after rule deletion should hit no ENOENT.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: expr: fix build failure with json support
Florian Westphal [Tue, 12 Feb 2019 12:21:10 +0000 (13:21 +0100)] 
src: expr: fix build failure with json support

Fixes: e3f195777ee54 ("src: expr: remove expr_ops from struct expr")
Reported-by: Mikhail Morfikov <mmorfikov@gmail.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agosrc: expr: remove expr_ops from struct expr
Florian Westphal [Fri, 8 Feb 2019 16:02:23 +0000 (17:02 +0100)] 
src: expr: remove expr_ops from struct expr

size of struct expr changes from 144 to 128 bytes on x86_64.
This doesn't look like much, but large rulesets can have tens of thousands
of expressions (each set element is represented by an expression).

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agosrc: expr: add expression etype
Florian Westphal [Fri, 8 Feb 2019 16:02:22 +0000 (17:02 +0100)] 
src: expr: add expression etype

Temporary kludge to remove all the expr->ops->type == ... patterns.
Followup patch will remove expr->ops, and make expr_ops() lookup
the correct expr_ops struct instead to reduce struct expr size.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agosrc: expr: add and use internal expr_ops helper
Florian Westphal [Fri, 8 Feb 2019 16:02:21 +0000 (17:02 +0100)] 
src: expr: add and use internal expr_ops helper

This helper will eventually lookup the correct expr_ops
struct, so we can get rid of the expr->ops pointer.

Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: payload: export and use payload_expr_cmp
Florian Westphal [Fri, 8 Feb 2019 16:02:20 +0000 (17:02 +0100)] 
src: payload: export and use payload_expr_cmp

expr->ops is going away, so export payload cmp and use it directly.

Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: expr: add and use expr_name helper
Florian Westphal [Fri, 8 Feb 2019 16:02:19 +0000 (17:02 +0100)] 
src: expr: add and use expr_name helper

Currently callers use expr->ops->name, but follouwp patch will remove the
ops pointer from struct expr.  So add this helper and use it everywhere.

Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: shell: exercise abort path with anonymous set that is bound to rule
Pablo Neira Ayuso [Fri, 1 Feb 2019 20:28:46 +0000 (21:28 +0100)] 
tests: shell: exercise abort path with anonymous set that is bound to rule

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoinclude: add cplusplus guards for extern
Pablo Neira Ayuso [Mon, 28 Jan 2019 09:42:02 +0000 (10:42 +0100)] 
include: add cplusplus guards for extern

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Acked-by: Phil Sutter <phil@nwl.cc>
6 years agometa: add iifkind and oifkind support
wenxu [Thu, 24 Jan 2019 14:23:49 +0000 (22:23 +0800)] 
meta: add iifkind and oifkind support

This can be used to match the kind type of iif or oif
interface of the packet.  Example:

add rule inet raw prerouting meta iifkind "vrf" accept

Signed-off-by: wenxu <wenxu@ucloud.cn>
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agotests: fix up expected payloads after expr merge change
Florian Westphal [Fri, 25 Jan 2019 14:09:41 +0000 (15:09 +0100)] 
tests: fix up expected payloads after expr merge change

nft currently doesn't do payload merging anymore in some cases,
so fix up the expected output.

Fixes: ce2651222911 ("payload: refine payload expr merging")
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agodoc: fix non-working example
Florian Westphal [Fri, 25 Jan 2019 14:08:10 +0000 (15:08 +0100)] 
doc: fix non-working example

nft doesn't have the context to translate "dns" or "http" as being
service names here.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agomnl: name is ignored when deleting a table
Florian Westphal [Wed, 16 Jan 2019 12:54:13 +0000 (13:54 +0100)] 
mnl: name is ignored when deleting a table

nlt is reallocated, leaking first allocation and also removing
the table name/handle that was set on nlt object.

Add a test case for this as well, the batch is supposed to fail
when trying to delete a non-existant table, rather than wiping
all tables in the same address family.

Fixes: 12c362e2214a0 ("mnl: remove alloc_nftnl_table()")
Reported-by: Mikhail Morfikov <mmorfikov@gmail.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agopayload: refine payload expr merging
Florian Westphal [Tue, 8 Jan 2019 23:15:09 +0000 (00:15 +0100)] 
payload: refine payload expr merging

nf_tables can handle payload exprs for sizes <= sizeof(u32) via a direct
operation from the eval loop, rather than a a call to the payload
expression.  Two loads for four byte quantities are thus faster than a
single load for an 8 byte load.

ip saddr 1.2.3.4 ip daddr 2.3.4.5

is faster with this applied, even though it involves two payload and two
two compare expressions, just because all can be handled from the main
loop without any calls to expression ops.

Keep merging for linklayer and when at least one of the expressions
already exceeded the 4 byte "limit" anyway.

Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: fix netdev family device name parsing
Florian Westphal [Wed, 9 Jan 2019 22:26:05 +0000 (23:26 +0100)] 
src: fix netdev family device name parsing

Should use accept/use quotes, else you can't use this with a device name
that is shared with a key word, e.g. 'device vm'.

Signed-off-by: Florian Westphal <fw@strlen.de>
Acked-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: add igmp support
Pablo Neira Ayuso [Wed, 9 Jan 2019 15:26:19 +0000 (16:26 +0100)] 
src: add igmp support

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agotests: shell: remove RETURNCODE_SEPARATOR
Florian Westphal [Fri, 4 Jan 2019 15:25:41 +0000 (16:25 +0100)] 
tests: shell: remove RETURNCODE_SEPARATOR

test files are located via find + a pattern search that looks for
_[0-9].  Previous change makes all test scripts return 0 when the
test case is supposed to pass, so the foo_$retval name is no longer
needed.

Update script to look for all executeables in the 'testcases' directory.
This makes it necessary to make two dump-files non-executeable.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agotests: shell: fix up redefine test case
Florian Westphal [Fri, 4 Jan 2019 15:00:16 +0000 (16:00 +0100)] 
tests: shell: fix up redefine test case

The '$' has to be escaped, else it gets replaced with an empty
value by the shell.  As 'set -e' is used, that caused the first
nft command to fail.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agotests: shell: change all test scripts to return 0
Florian Westphal [Fri, 4 Jan 2019 14:57:00 +0000 (15:57 +0100)] 
tests: shell: change all test scripts to return 0

The shell-based tests currently encode a return value in the
file name, i.e. foo_1 expects that the script should return '1'
for the test case to pass.

This is very error prone, and one test case is even broken (i.e.,
it returns 1, but because of a different, earlier error).

do_something || exit 1
or
'set -e'

are both pretty common patterns, in both cases tests should fail.

In those test-cases that deliberately test for an error,
nft something_should_fail || exit 0
nft something_should_fail && exit 1

or a similar constructs should be used.

This initial commit modififies all '_1' scripts to return 0 on
success, usually via 'nft wrong || exit 0'.

All tests pass, except the one broken test case that hasn't worked
before either, but where 'set -e' use made it pass (the failing command
is supposed to work, and the command that is supposed to fail is never
run).

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agotests: shell: add test case for leaking of stateful object refcount
Florian Westphal [Fri, 4 Jan 2019 11:30:47 +0000 (12:30 +0100)] 
tests: shell: add test case for leaking of stateful object refcount

Taehee Yoo fixed a bug in error path handling for object refcounts.
Quoting patch description:
  |   $nft add table ip filter
  |   $nft add counter ip filter c1
  |   $nft add map ip filter m1 { type ipv4_addr : counter \;}
  |   $nft add element ip filter m1 { 1 : c1 }
  |   $nft add element ip filter m1 { 1 : c1 }
  |   $nft delete element ip filter m1 { 1 }
  |   $nft delete counter ip filter c1
  |Result:
  |   Error: Could not process rule: Device or resource busy
  |   delete counter ip filter c1
  |
  |At the second 'nft add element ip filter m1 { 1 : c1 }', the reference
  |count of the 'c1' is increased then it tries to insert into the 'm1'. but
  |the 'm1' already has same element so it returns -EEXIST.
  |But it doesn't decrease the reference count of the 'c1' in the error path.
  |Due to a leak of the reference count of the 'c1', the 'c1' can't be
  |removed by 'nft delete counter ip filter c1'.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agorule: fix object listing when no table is given
Florian Westphal [Wed, 2 Jan 2019 16:10:36 +0000 (17:10 +0100)] 
rule: fix object listing when no table is given

'nft list quotas' would not print anything at all anymore.

Fixes: 88456a7ef01172 ("rule: list only the table containing object")
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agoxt: fix build with --with-xtables
Florian Westphal [Sat, 29 Dec 2018 20:29:00 +0000 (21:29 +0100)] 
xt: fix build with --with-xtables

The previous change is bonkers, it fixes build when libxtables isn't
even installed, but broke build when --with-xtables is provided to configure.

Reason is that the include guard comes too early, so xtables.h is never
included, causing build to fail because no libxtables function prototypes
and definitions are available.

Fixes: 9e84f3f083bb ("xt: fix build when libxtables is not installed")
Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agodoc: refer to meta protocol in icmp and icmpv6
Pablo Neira Ayuso [Sat, 29 Dec 2018 00:23:11 +0000 (01:23 +0100)] 
doc: refer to meta protocol in icmp and icmpv6

Instead of meta nftproto, which is a typo.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: remove deprecated code for export/import commands
Pablo Neira Ayuso [Thu, 27 Dec 2018 20:19:08 +0000 (21:19 +0100)] 
src: remove deprecated code for export/import commands

Update parser to display this error message:

 # nft export json
 Error: JSON export is no longer supported, use 'nft -j list ruleset' instead
 export json
 ^^^^^^^^^^^^

Just like:

 # nft export vm json
 Error: JSON export is no longer supported, use 'nft -j list ruleset' instead
 export vm json
 ^^^^^^^^^^^^^^^

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agosrc: Reject 'export vm json' command
Phil Sutter [Mon, 17 Dec 2018 15:29:56 +0000 (16:29 +0100)] 
src: Reject 'export vm json' command

Since libnftnl recently dropped JSON output support, this form of JSON
export is not available anymore. Point at 'nft -j list ruleset' command
for a replacement in error message.

Since 'export' command is not useable anymore, remove it from
documentation. Instead point out that 'list ruleset' command serves well
for dumping and later restoring.

To not cause pointless inconvenience for users wishing to store their
ruleset in JSON format, make JSON parser fallback to CMD_ADD if no
recognized command property was found. This allows to feed the output of
'nft -j list ruleset' into 'nft -f' without any modification.

Signed-off-by: Phil Sutter <phil@nwl.cc>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
6 years agoxt: fix build when libxtables is not installed
Florian Westphal [Thu, 29 Nov 2018 13:57:59 +0000 (14:57 +0100)] 
xt: fix build when libxtables is not installed

If libxtables is not even installed, build fails due to to missing
include file.

ifdef LIBXTABLES guard fixes the first error, but results in two
followup failures:
1. missing IFNAMSIZ definition
2. dereference of unknown struct.

Signed-off-by: Florian Westphal <fw@strlen.de>
6 years agoparser: bail out on incorrect burst unit
Pablo Neira Ayuso [Mon, 3 Dec 2018 16:06:21 +0000 (17:06 +0100)] 
parser: bail out on incorrect burst unit

Burst can be either bytes or packets, depending on the rate limit unit.

 # nft add rule x y iif eth0 limit rate 512 kbytes/second burst 5 packets
 Error: syntax error, unexpected packets, expecting string or bytes
 add rule x y iif eth0 limit rate 512 kbytes/second burst 5 packets
                                                            ^^^^^^^

Closes: https://bugzilla.netfilter.org/show_bug.cgi?id=1306
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>