Liping Zhang <[email protected]> wrote:
> From: Liping Zhang <[email protected]>
>
> In general, we haven't do routing lookup in PREROUTING hook, so it's
> very likely that fib4/6_is_local will not be met. Then the *dest will
> be set to 0 because we do nothing when the fib result is RTN_LOCAL.
>
> So if the user want to drop all packets which cannot be routed,
> and input the following nft rule:
> # nft add rule filter prerouting fib daddr oif eq 0 drop
>
> Then all the packets which destinate to local will be dropped
> incorrectly.
>
> Fixes: f6d0cbcf09c5 ("netfilter: nf_tables: add fib expression")
> Signed-off-by: Liping Zhang <[email protected]>
> ---
> net/ipv4/netfilter/nft_fib_ipv4.c | 3 ++-
> net/ipv6/netfilter/nft_fib_ipv6.c | 8 ++++++--
> 2 files changed, 8 insertions(+), 3 deletions(-)
>
> diff --git a/net/ipv4/netfilter/nft_fib_ipv4.c
> b/net/ipv4/netfilter/nft_fib_ipv4.c
> index 2581363..2107775 100644
> --- a/net/ipv4/netfilter/nft_fib_ipv4.c
> +++ b/net/ipv4/netfilter/nft_fib_ipv4.c
> @@ -130,7 +130,8 @@ void nft_fib4_eval(const struct nft_expr *expr, struct
> nft_regs *regs,
> switch (res.type) {
> case RTN_UNICAST:
> break;
> - case RTN_LOCAL: /* should not appear here, see fib4_is_local() above */
> + case RTN_LOCAL:
> + nft_fib_store_result(dest, priv->result, pkt, LOOPBACK_IFINDEX);
Liping, what about doing:
case RTN_LOCAL:
if (priv->flags & NFTA_FIB_F_DADDR)
nft_fib_store_result(dest, priv->result, pkt,
LOOPBACK_IFINDEX);
AFAICS this will make above rule work while the saddr test will
still appear to not have a route at all.
What do you think?
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html