diff mbox

[libnftnl,v3] utils: fix arp family number

Message ID 20141020115049.27980.35459.stgit@nfdev.cica.es
State Accepted
Delegated to: Pablo Neira
Headers show

Commit Message

Arturo Borrero Oct. 20, 2014, 11:52 a.m. UTC
NFPROTO_ARP = 3 in kernel space.

We need the same value here in userspace in order to correctly communicate
with the kernel.

The failure solved by this patch made that {XML|JSON}-parsed tables of ARP
family unable to be directly injected into kernel.

To prevent future errors, this patch changes raw and AF_* values by the mathing
NFPROTO_* couterpart as seen in linux/netfilter.h in both functions:
 * nft_family2str()
 * nft_str2family()

Signed-off-by: Arturo Borrero Gonzalez <arturo.borrero.glez@gmail.com>
---
v2: rework+fix using the array-matching approach suggested by Pablo.
v3: constify both the pointer and the data, suggested by Jan.
    Keep setting errno to EAFNOSUPPORT in nft_str2family().

 src/utils.c |   43 ++++++++++++++++++++-----------------------
 1 file changed, 20 insertions(+), 23 deletions(-)


--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Comments

Pablo Neira Ayuso Oct. 21, 2014, 7:59 a.m. UTC | #1
On Mon, Oct 20, 2014 at 01:52:18PM +0200, Arturo Borrero Gonzalez wrote:
> NFPROTO_ARP = 3 in kernel space.
> 
> We need the same value here in userspace in order to correctly communicate
> with the kernel.
> 
> The failure solved by this patch made that {XML|JSON}-parsed tables of ARP
> family unable to be directly injected into kernel.
> 
> To prevent future errors, this patch changes raw and AF_* values by the mathing
> NFPROTO_* couterpart as seen in linux/netfilter.h in both functions:
>  * nft_family2str()
>  * nft_str2family()

Applied, thanks.

BTW, it would be good to see a similar refactor in nft_verdict2str().
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Arturo Borrero Oct. 21, 2014, 8:53 a.m. UTC | #2
On 21 October 2014 09:59, Pablo Neira Ayuso <pablo@netfilter.org> wrote:
>
> BTW, it would be good to see a similar refactor in nft_verdict2str().

I don't see a clean way to do it, given some verdicts are negative
numbers (enum nft_verdicts in nf_tables.h).
We may end accessing a negative index, out of bounds of the array.
Pablo Neira Ayuso Oct. 21, 2014, 9:56 a.m. UTC | #3
On Tue, Oct 21, 2014 at 10:53:19AM +0200, Arturo Borrero Gonzalez wrote:
> On 21 October 2014 09:59, Pablo Neira Ayuso <pablo@netfilter.org> wrote:
> >
> > BTW, it would be good to see a similar refactor in nft_verdict2str().
> 
> I don't see a clean way to do it, given some verdicts are negative
> numbers (enum nft_verdicts in nf_tables.h).
> We may end accessing a negative index, out of bounds of the array.

I see, you mean:

enum nft_verdicts {
        NFT_CONTINUE    = -1,
        NFT_BREAK       = -2,
        NFT_JUMP        = -3,
        NFT_GOTO        = -4,
        NFT_RETURN      = -5,
};

You can add some function to shift the values:

#define nft_verdict_index(base)     (base + 5)

... nft_verdict_array[] = {
        [nft_verdict_index(NFT_RETURN)]     = "return",
        ...
};
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Pablo Neira Ayuso Oct. 21, 2014, 9:57 a.m. UTC | #4
On Tue, Oct 21, 2014 at 11:56:49AM +0200, Pablo Neira Ayuso wrote:
> On Tue, Oct 21, 2014 at 10:53:19AM +0200, Arturo Borrero Gonzalez wrote:
> > On 21 October 2014 09:59, Pablo Neira Ayuso <pablo@netfilter.org> wrote:
> > >
> > > BTW, it would be good to see a similar refactor in nft_verdict2str().
> > 
> > I don't see a clean way to do it, given some verdicts are negative
> > numbers (enum nft_verdicts in nf_tables.h).
> > We may end accessing a negative index, out of bounds of the array.
> 
> I see, you mean:
> 
> enum nft_verdicts {
>         NFT_CONTINUE    = -1,
>         NFT_BREAK       = -2,
>         NFT_JUMP        = -3,
>         NFT_GOTO        = -4,
>         NFT_RETURN      = -5,
> };
> 
> You can add some function to shift the values:
> 
> #define nft_verdict_index(base)     (base + 5)

BTW, instead of 5, add:

#define NFT_VERDICT_BASE        NFT_RETURN

and use it.

> 
> ... nft_verdict_array[] = {
>         [nft_verdict_index(NFT_RETURN)]     = "return",
>         ...
> };
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Arturo Borrero Oct. 22, 2014, 2:24 p.m. UTC | #5
On 21 October 2014 11:57, Pablo Neira Ayuso <pablo@netfilter.org> wrote:
> On Tue, Oct 21, 2014 at 11:56:49AM +0200, Pablo Neira Ayuso wrote:
>> On Tue, Oct 21, 2014 at 10:53:19AM +0200, Arturo Borrero Gonzalez wrote:
>> > On 21 October 2014 09:59, Pablo Neira Ayuso <pablo@netfilter.org> wrote:
>> > >
>> > > BTW, it would be good to see a similar refactor in nft_verdict2str().
>> >
>> > I don't see a clean way to do it, given some verdicts are negative
>> > numbers (enum nft_verdicts in nf_tables.h).
>> > We may end accessing a negative index, out of bounds of the array.
>>
>> I see, you mean:
>>
>> enum nft_verdicts {
>>         NFT_CONTINUE    = -1,
>>         NFT_BREAK       = -2,
>>         NFT_JUMP        = -3,
>>         NFT_GOTO        = -4,
>>         NFT_RETURN      = -5,
>> };
>>
>> You can add some function to shift the values:
>>
>> #define nft_verdict_index(base)     (base + 5)
>
> BTW, instead of 5, add:
>
> #define NFT_VERDICT_BASE        NFT_RETURN
>
> and use it.
>
>>
>> ... nft_verdict_array[] = {
>>         [nft_verdict_index(NFT_RETURN)]     = "return",
>>         ...
>> };

Ok, following your idea, I end with something like this:

/*
 * NF_DROP      = 0
 * NF_ACCEPT    = 1
 * NFT_JUMP     = -3
 * NFT_GOTO     = -4
 * NFT_RETURN   = -5
 */

#define NFT_VERDICT_BASE                -NFT_RETURN
#define nft_verdict_index(base)         (base + NFT_VERDICT_BASE)
#define NFT_VERDICT_ARRAY_LEN           nft_verdict_index(NF_ACCEPT)

static const char *const nft_verdict_str[NFT_VERDICT_ARRAY_LEN + 1] = {
        [nft_verdict_index(NFT_RETURN)] =       "return",       /* 0 */
        [nft_verdict_index(NFT_GOTO)]   =       "goto",         /* 1 */
        [nft_verdict_index(NFT_JUMP)]   =       "jump",         /* 2 */
        [nft_verdict_index(NF_DROP)]    =       "drop",         /* 5 */
        [nft_verdict_index(NF_ACCEPT)]  =       "accept",       /* 6 */
};

const char *nft_verdict2str(int verdict)
{
        if (nft_verdict_str[nft_verdict_index(verdict)] == NULL)
                return "unknown";

        return nft_verdict_str[nft_verdict_index(verdict)];
}

int nft_str2verdict(const char *verdict, int *verdict_num)
{
        int i;

        for (i = 0; i < NFT_VERDICT_ARRAY_LEN; i++) {
                if (nft_verdict_str[i] == NULL)
                        continue;

                if (strcmp(nft_verdict_str[i], verdict) == 0) {
                        *verdict_num = nft_verdict_index(i);
                        return 0;
                }
        }

        return -1;
}

I think the current code (the switch based one) is better, don't you?
That array seems very error prone.
diff mbox

Patch

diff --git a/src/utils.c b/src/utils.c
index d70fbf1..9013b68 100644
--- a/src/utils.c
+++ b/src/utils.c
@@ -20,36 +20,33 @@ 
 #include <linux/netfilter.h>
 #include <linux/netfilter/nf_tables.h>
 
+static const char *const nft_family_str[NFPROTO_NUMPROTO] = {
+	[NFPROTO_INET]		= "inet",
+	[NFPROTO_IPV4]		= "ip",
+	[NFPROTO_ARP]		= "arp",
+	[NFPROTO_BRIDGE]	= "bridge",
+	[NFPROTO_IPV6]		= "ip6",
+};
+
 const char *nft_family2str(uint32_t family)
 {
-	switch (family) {
-	case AF_INET:
-		return "ip";
-	case AF_INET6:
-		return "ip6";
-	case 1:
-		return "inet";
-	case AF_BRIDGE:
-		return "bridge";
-	case 3: /* NFPROTO_ARP */
-		return "arp";
-	default:
+	if (nft_family_str[family] == NULL)
 		return "unknown";
-	}
+
+	return nft_family_str[family];
 }
 
 int nft_str2family(const char *family)
 {
-	if (strcmp(family, "ip") == 0)
-		return AF_INET;
-	else if (strcmp(family, "ip6") == 0)
-		return AF_INET6;
-	else if (strcmp(family, "inet") == 0)
-		return 1;
-	else if (strcmp(family, "bridge") == 0)
-		return AF_BRIDGE;
-	else if (strcmp(family, "arp") == 0)
-		return 0;
+	int i;
+
+	for (i = 0; i < NFPROTO_NUMPROTO; i++) {
+		if (nft_family_str[i] == NULL)
+			continue;
+
+		if (strcmp(nft_family_str[i], family) == 0)
+			return i;
+	}
 
 	errno = EAFNOSUPPORT;
 	return -1;