Re: [PATCH WIP nf-next] netfilter: nf_tables: Introduce stateful object update operation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Florian,

El 19 de agosto de 2019 13:55:27 CEST, Florian Westphal <fw@xxxxxxxxx> escribió:
>Fernando Fernandez Mancera <ffmancera@xxxxxxxxxx> wrote:
>> This is a WIP patch version. I still having some issues in userspace
>but I
>> would like to get feedback about the kernel-side patch. Thanks!
>> 
>> Signed-off-by: Fernando Fernandez Mancera <ffmancera@xxxxxxxxxx>
>> ---
>>  include/net/netfilter/nf_tables.h |  6 +++
>>  net/netfilter/nf_tables_api.c     | 73
>++++++++++++++++++++++++++++---
>>  2 files changed, 72 insertions(+), 7 deletions(-)
>> 
>> diff --git a/include/net/netfilter/nf_tables.h
>b/include/net/netfilter/nf_tables.h
>> index dc301e3d6739..dc4e32040ea9 100644
>> --- a/include/net/netfilter/nf_tables.h
>> +++ b/include/net/netfilter/nf_tables.h
>> @@ -1123,6 +1123,9 @@ struct nft_object_ops {
>>  	int				(*dump)(struct sk_buff *skb,
>>  						struct nft_object *obj,
>>  						bool reset);
>> +	int				(*update)(const struct nft_ctx *ctx,
>> +						  const struct nlattr *const tb[],
>> +						  struct nft_object *obj);
>>  	const struct nft_object_type	*type;
>>  };
>>  
>> @@ -1405,10 +1408,13 @@ struct nft_trans_elem {
>>  
>>  struct nft_trans_obj {
>>  	struct nft_object		*obj;
>> +	bool				update;
>>  };
>>  
>>  #define nft_trans_obj(trans)	\
>>  	(((struct nft_trans_obj *)trans->data)->obj)
>> +#define nft_trans_obj_update(trans)	\
>> +	(((struct nft_trans_obj *)trans->data)->update)
>>  
>>  struct nft_trans_flowtable {
>>  	struct nft_flowtable		*flowtable;
>> diff --git a/net/netfilter/nf_tables_api.c
>b/net/netfilter/nf_tables_api.c
>> index fe3b7b0c6c66..d7b94904599c 100644
>> --- a/net/netfilter/nf_tables_api.c
>> +++ b/net/netfilter/nf_tables_api.c
>> @@ -5122,6 +5122,48 @@ nft_obj_type_get(struct net *net, u32 objtype)
>>  	return ERR_PTR(-ENOENT);
>>  }
>>  
>> +static int nf_tables_updobj(const struct nft_ctx *ctx,
>> +			    const struct nft_object_type *type,
>> +			    const struct nlattr *attr,
>> +			    struct nft_object *obj)
>> +{
>> +	struct nft_trans *trans;
>> +	struct nlattr **tb;
>> +	int err = -ENOMEM;
>> +
>> +	trans = nft_trans_alloc(ctx, NFT_MSG_NEWOBJ,
>> +				sizeof(struct nft_trans_obj));
>> +	if (!trans)
>> +		return -ENOMEM;
>> +
>> +	tb = kmalloc_array(type->maxattr + 1, sizeof(*tb), GFP_KERNEL);
>
>You can use kcalloc here and then remove the memset().
>p
>> +	err = obj->ops->update(ctx, (const struct nlattr * const *)tb,
>obj);
>> +	if (err < 0)
>> +		goto err;
>
>This looks wrong, see below.
>
>> @@ -5161,7 +5203,13 @@ static int nf_tables_newobj(struct net *net,
>struct sock *nlsk,
>>  			NL_SET_BAD_ATTR(extack, nla[NFTA_OBJ_NAME]);
>>  			return -EEXIST;
>>  		}
>> -		return 0;
>> +		if (nlh->nlmsg_flags & NLM_F_REPLACE)
>> +			return -EOPNOTSUPP;
>> +
>> +		type = nft_obj_type_get(net, objtype);
>> +		nft_ctx_init(&ctx, net, skb, nlh, family, table, NULL, nla);
>> +
>> +		return nf_tables_updobj(&ctx, type, nla[NFTA_OBJ_DATA], obj);
>>  	}
>>  
>>  		case NFT_MSG_NEWOBJ:
>> -			nft_clear(net, nft_trans_obj(trans));
>> -			nf_tables_obj_notify(&trans->ctx, nft_trans_obj(trans),
>> -					     NFT_MSG_NEWOBJ);
>> -			nft_trans_destroy(trans);
>> +			if (nft_trans_obj_update(trans)) {
>> +				nf_tables_obj_notify(&trans->ctx,
>> +						     nft_trans_obj(trans),
>> +						     NFT_MSG_NEWOBJ);
>
>I would have expected the ->update() here, when committing the batch.
>Under what conditions can an update() fail?

It depends on the object type. In the quota case it can fail if the quota have invalid values.





[Index of Archives]     [Netfitler Users]     [Berkeley Packet Filter]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux