Re: [PATCH RFC 1/2] netfilter: nf_tables: move set netlink messages into the batch

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Mar 25, 2014 at 09:39:41PM +0100, Pablo Neira Ayuso wrote:
> diff --git a/include/net/netfilter/nf_tables.h b/include/net/netfilter/nf_tables.h
> index e6bc14d..b749e4d 100644
> --- a/include/net/netfilter/nf_tables.h
> +++ b/include/net/netfilter/nf_tables.h
> @@ -222,6 +222,8 @@ static inline void *nft_set_priv(const struct nft_set *set)
>  
>  struct nft_set *nf_tables_set_lookup(const struct nft_table *table,
>  				     const struct nlattr *nla);
> +struct nft_set *nf_tables_set_lookup2(const struct net *net,
> +				      const struct nlattr *nla);

nf_tables_set_lookup_byid?

> diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h
> index c88ccbf..3776beb 100644
> --- a/include/uapi/linux/netfilter/nf_tables.h
> +++ b/include/uapi/linux/netfilter/nf_tables.h
> @@ -221,6 +221,7 @@ enum nft_set_flags {
>   * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
>   * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
>   * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
> + * @NFTA_SET_ID: set ID (NLA_U64)

I think a U32 should be perfectly fine. These are not permanent IDs but just to
identify new sets contained within a batch, so we can always start at 0.

> +static int nf_tables_set_trans_add(struct list_head *list, struct nft_ctx *ctx,
> +				   struct nft_set *set)
> +{
> +	struct nft_set_trans *strans;
> +
> +	strans = kmalloc(sizeof(struct nft_set_trans), GFP_ATOMIC);

Do we need GFP_ATOMIC?

> +	if (strans == NULL)
> +		return -ENOMEM;
> +
> +	strans->set = set;
> +	strans->ctx = *ctx;
> +	if (ctx->nla[NFTA_SET_ID])
> +		strans->id = be64_to_cpu(nla_get_be64(ctx->nla[NFTA_SET_ID]));
> +
> +	set->flags |= __NFT_SET_INACTIVE;
> +	list_add_tail(&strans->list, list);
> +	return 0;
> +}
> +
>  static int nf_tables_newset(struct sock *nlsk, struct sk_buff *skb,
>  			    const struct nlmsghdr *nlh,
>  			    const struct nlattr * const nla[])
>  static int nf_tables_bind_check_setelem(const struct nft_ctx *ctx,
> @@ -2534,7 +2619,8 @@ void nf_tables_unbind_set(const struct nft_ctx *ctx, struct nft_set *set,
>  {
>  	list_del(&binding->list);
>  
> -	if (list_empty(&set->bindings) && set->flags & NFT_SET_ANONYMOUS)
> +	if (list_empty(&set->bindings) && set->flags & NFT_SET_ANONYMOUS &&
> +	    !(set->flags & __NFT_SET_INACTIVE))

Why are we not destroying anonymous inactive sets when unbinding? This means we're
either aborting or replaying the entire transaction, so it seems we should remove
them, no?

>  		nf_tables_set_destroy(ctx, set);
>  }
>  
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux