This flag is required by userspace only, so can live within userdata.
It's sole purpose is for 'nft monitor' to detect half-open ranges (which
are comprised of a single element only).

Signed-off-by: Phil Sutter <[email protected]>
---
 include/expression.h |  1 +
 include/rule.h       |  7 ++++++
 src/netlink.c        | 66 ++++++++++++++++++++++++++++++++++++++--------------
 src/segtree.c        |  5 ++++
 4 files changed, 62 insertions(+), 17 deletions(-)

diff --git a/include/expression.h b/include/expression.h
index 68a36e8af792a..202eb4c140eda 100644
--- a/include/expression.h
+++ b/include/expression.h
@@ -180,6 +180,7 @@ enum expr_flags {
        EXPR_F_PROTOCOL         = 0x4,
        EXPR_F_INTERVAL_END     = 0x8,
        EXPR_F_BOOLEAN          = 0x10,
+       EXPR_F_INTERVAL_OPEN    = 0x20,
 };
 
 #include <payload.h>
diff --git a/include/rule.h b/include/rule.h
index 7424b21c6e019..592c93ddd0e2f 100644
--- a/include/rule.h
+++ b/include/rule.h
@@ -503,4 +503,11 @@ enum udata_set_type {
 };
 #define UDATA_SET_MAX (__UDATA_SET_MAX - 1)
 
+enum udata_set_elem_type {
+       UDATA_SET_ELEM_COMMENT,
+       UDATA_SET_ELEM_FLAGS,
+       __UDATA_SET_ELEM_MAX,
+};
+#define UDATA_SET_ELEM_MAX (__UDATA_SET_ELEM_MAX - 1)
+
 #endif /* NFTABLES_RULE_H */
diff --git a/src/netlink.c b/src/netlink.c
index 2e30622de4bb1..be26188e097aa 100644
--- a/src/netlink.c
+++ b/src/netlink.c
@@ -211,7 +211,7 @@ static struct nftnl_set_elem *alloc_nftnl_setelem(const 
struct expr *set,
        const struct expr *elem, *key, *data;
        struct nftnl_set_elem *nlse;
        struct nft_data_linearize nld;
-       struct nftnl_udata_buf *udbuf;
+       struct nftnl_udata_buf *udbuf = NULL;
 
        nlse = nftnl_set_elem_alloc();
        if (nlse == NULL)
@@ -232,13 +232,22 @@ static struct nftnl_set_elem *alloc_nftnl_setelem(const 
struct expr *set,
        if (elem->timeout)
                nftnl_set_elem_set_u64(nlse, NFTNL_SET_ELEM_TIMEOUT,
                                       elem->timeout);
-       if (elem->comment) {
+       if (elem->comment || expr->flags & EXPR_F_INTERVAL_OPEN) {
                udbuf = nftnl_udata_buf_alloc(NFT_USERDATA_MAXLEN);
                if (!udbuf)
                        memory_allocation_error();
-               if (!nftnl_udata_put_strz(udbuf, UDATA_TYPE_COMMENT,
+       }
+       if (elem->comment) {
+               if (!nftnl_udata_put_strz(udbuf, UDATA_SET_ELEM_COMMENT,
                                          elem->comment))
                        memory_allocation_error();
+       }
+       if (expr->flags & EXPR_F_INTERVAL_OPEN) {
+               if (!nftnl_udata_put_u32(udbuf, UDATA_SET_ELEM_FLAGS,
+                                        EXPR_F_INTERVAL_OPEN))
+                       memory_allocation_error();
+       }
+       if (udbuf) {
                nftnl_set_elem_set(nlse, NFTNL_SET_ELEM_USERDATA,
                                   nftnl_udata_buf_data(udbuf),
                                   nftnl_udata_buf_len(udbuf));
@@ -1603,17 +1612,45 @@ static int parse_udata_cb(const struct nftnl_udata 
*attr, void *data)
        return 0;
 }
 
-static char *udata_get_comment(const void *data, uint32_t data_len)
+static int set_elem_parse_udata_cb(const struct nftnl_udata *attr, void *data)
 {
-       const struct nftnl_udata *tb[UDATA_TYPE_MAX + 1] = {};
+       const struct nftnl_udata **tb = data;
+       unsigned char *value = nftnl_udata_get(attr);
+       uint8_t type = nftnl_udata_type(attr);
+       uint8_t len = nftnl_udata_len(attr);
 
-       if (nftnl_udata_parse(data, data_len, parse_udata_cb, tb) < 0)
-               return NULL;
+       switch (type) {
+       case UDATA_SET_ELEM_COMMENT:
+               if (value[len - 1] != '\0')
+                       return -1;
+               break;
+       case UDATA_SET_ELEM_FLAGS:
+               if (len != sizeof(uint32_t))
+                       return -1;
+               break;
+       default:
+               return 0;
+       }
+       tb[type] = attr;
+       return 0;
+}
 
-       if (!tb[UDATA_TYPE_COMMENT])
-               return NULL;
+static void set_elem_parse_udata(struct nftnl_set_elem *nlse,
+                                struct expr *expr)
+{
+       const struct nftnl_udata *ud[UDATA_SET_ELEM_MAX + 1] = {};
+       const void *data;
+       uint32_t len;
 
-       return xstrdup(nftnl_udata_get(tb[UDATA_TYPE_COMMENT]));
+       data = nftnl_set_elem_get(nlse, NFTNL_SET_ELEM_USERDATA, &len);
+       if (nftnl_udata_parse(data, len, set_elem_parse_udata_cb, ud))
+               return;
+
+       if (ud[UDATA_SET_ELEM_COMMENT])
+               expr->comment =
+                       xstrdup(nftnl_udata_get(ud[UDATA_SET_ELEM_COMMENT]));
+       if (ud[UDATA_SET_ELEM_FLAGS])
+               expr->flags |= nftnl_udata_get_u32(ud[UDATA_SET_ELEM_FLAGS]);
 }
 
 static int netlink_delinearize_setelem(struct nftnl_set_elem *nlse,
@@ -1647,13 +1684,8 @@ static int netlink_delinearize_setelem(struct 
nftnl_set_elem *nlse,
                expr->timeout    = nftnl_set_elem_get_u64(nlse, 
NFTNL_SET_ELEM_TIMEOUT);
        if (nftnl_set_elem_is_set(nlse, NFTNL_SET_ELEM_EXPIRATION))
                expr->expiration = nftnl_set_elem_get_u64(nlse, 
NFTNL_SET_ELEM_EXPIRATION);
-       if (nftnl_set_elem_is_set(nlse, NFTNL_SET_ELEM_USERDATA)) {
-               const void *data;
-               uint32_t len;
-
-               data = nftnl_set_elem_get(nlse, NFTNL_SET_ELEM_USERDATA, &len);
-               expr->comment = udata_get_comment(data, len);
-       }
+       if (nftnl_set_elem_is_set(nlse, NFTNL_SET_ELEM_USERDATA))
+               set_elem_parse_udata(nlse, expr);
        if (nftnl_set_elem_is_set(nlse, NFTNL_SET_ELEM_EXPR)) {
                const struct nftnl_expr *nle;
 
diff --git a/src/segtree.c b/src/segtree.c
index f53536210018d..de98600bf1bcc 100644
--- a/src/segtree.c
+++ b/src/segtree.c
@@ -37,6 +37,7 @@ struct seg_tree {
 
 enum elementary_interval_flags {
        EI_F_INTERVAL_END       = 0x1,
+       EI_F_INTERVAL_OPEN      = 0x2,
 };
 
 /**
@@ -512,6 +513,8 @@ static void segtree_linearize(struct list_head *list, const 
struct set *set,
                mpz_bitmask(q, tree->keylen);
                nei = ei_alloc(p, q, NULL, EI_F_INTERVAL_END);
                list_add_tail(&nei->list, list);
+       } else {
+               prev->flags |= EI_F_INTERVAL_OPEN;
        }
 
        mpz_clear(p);
@@ -538,6 +541,8 @@ static void set_insert_interval(struct expr *set, struct 
seg_tree *tree,
 
        if (ei->flags & EI_F_INTERVAL_END)
                expr->flags |= EXPR_F_INTERVAL_END;
+       if (ei->flags & EI_F_INTERVAL_OPEN)
+               expr->flags |= EXPR_F_INTERVAL_OPEN;
 
        compound_expr_add(set, expr);
 }
-- 
2.13.1

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to