Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp840993pja; Wed, 1 Apr 2020 09:39:41 -0700 (PDT) X-Google-Smtp-Source: APiQypI2v77X0lQTe+x1r5Wc8HLcF7K4yNUhcPSXkycZytjJVWsFqV1Fem/4VFZXTpeSIYXUFAlA X-Received: by 2002:aca:eb4c:: with SMTP id j73mr3261743oih.145.1585759180876; Wed, 01 Apr 2020 09:39:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585759180; cv=none; d=google.com; s=arc-20160816; b=ocloRgABlnd+U+R/eDOfZHFFFE481HS/RsU8NxQ+GkyDvC5csCFi00kQqNHxkUcuwH i4gauxf40XBrIpT/Xfko85M8o5EvlrCjYvBXEh4Pwm8OohNDCfSz5YIl/63s2q9G75v7 6GsTU7q9XkiBSq/sIApVfJU633KlQlDv4DWhx9J4k2jBIXM+rcGjVz+PFxtLPUChQD+i 3ZGSBn+0eWvzHk7/wfP72SAC/+gAjay3SlKduJ74qF3r1I5Tbp7iqlGHhTD497W79HiR TJb6EEfGF/hwGmfC5rlki5mPKCQau18fPItq3GLOOI8WcRFwdJZo+OLeeitqKEUq7+OE DIcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=p71nA+dCrjrGgkTstlGCNzmVgggCnlNGWEBlvVGWR04=; b=o2LJ3nn/kF38tuzZ+o+fNFOHOzo1LnmuZkxkHm+rczq6j32rU/PsA2wukA9H3H85Fo cHeb74lJojayJrefBUm60Ulv4HADW5RIAMjE1Le51pxrXjTg4NjT9gxqCkBhiUo5SFOJ s4S71hI8Ru5EgkaP4I/ZkE7CjNPXldCCGG6gmRGJAfSI0qkBYvi7AERlbr6/5l1Kl6rn TdZt++jJxCxCiAzt9T2ogx1cccHkqrxSEI/UQ23yWeBNl3Fh9BiyVPK6KgLgw/tE/6/n J1iF+nAgnkPsmgsT1Dnn2Fat0ee3veWiWdOwGhHUB7RdIVBwK8Lgpr54Jv1PRsBldvZ8 u7Xg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m0z4GsTw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e53si1032311ote.156.2020.04.01.09.39.27; Wed, 01 Apr 2020 09:39:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m0z4GsTw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389041AbgDAQh7 (ORCPT + 99 others); Wed, 1 Apr 2020 12:37:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:37382 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388751AbgDAQh6 (ORCPT ); Wed, 1 Apr 2020 12:37:58 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DF34420BED; Wed, 1 Apr 2020 16:37:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585759078; bh=IpskLDqHHZRm9edhwLu30IHxKAr24vBmtaA+c2F/oaA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=m0z4GsTw82U6q81wsX1TY5tC7/mMIc60R3qAzjnXV/XOANuVgbBIsxXOtbMK3E2j3 M0fvngYzt+1/Bc8NmDxJ8XwR7/FSWPpoU1ABo/o58YaARc5rwCyhKKNMvOIjSX4naX gskFD6FwDNRfem3Ws+DslzoEoAgUpcysa6Sllu80= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pablo Neira Ayuso Subject: [PATCH 4.9 069/102] netfilter: nft_fwd_netdev: validate family and chain type Date: Wed, 1 Apr 2020 18:18:12 +0200 Message-Id: <20200401161544.267072629@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200401161530.451355388@linuxfoundation.org> References: <20200401161530.451355388@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pablo Neira Ayuso commit 76a109fac206e158eb3c967af98c178cff738e6a upstream. Make sure the forward action is only used from ingress. Fixes: 39e6dea28adc ("netfilter: nf_tables: add forward expression to the netdev family") Signed-off-by: Pablo Neira Ayuso Signed-off-by: Greg Kroah-Hartman --- net/netfilter/nft_fwd_netdev.c | 8 ++++++++ 1 file changed, 8 insertions(+) --- a/net/netfilter/nft_fwd_netdev.c +++ b/net/netfilter/nft_fwd_netdev.c @@ -62,6 +62,13 @@ nla_put_failure: return -1; } +static int nft_fwd_validate(const struct nft_ctx *ctx, + const struct nft_expr *expr, + const struct nft_data **data) +{ + return nft_chain_validate_hooks(ctx->chain, (1 << NF_NETDEV_INGRESS)); +} + static struct nft_expr_type nft_fwd_netdev_type; static const struct nft_expr_ops nft_fwd_netdev_ops = { .type = &nft_fwd_netdev_type, @@ -69,6 +76,7 @@ static const struct nft_expr_ops nft_fwd .eval = nft_fwd_netdev_eval, .init = nft_fwd_netdev_init, .dump = nft_fwd_netdev_dump, + .validate = nft_fwd_validate, }; static struct nft_expr_type nft_fwd_netdev_type __read_mostly = {