On Tue, Apr 26, 2022 at 06:06:41PM +0200, Phil Sutter wrote: > On Sun, Apr 24, 2022 at 11:56:13PM +0200, Pablo Neira Ayuso wrote: [...] > > + > > +static int reg_space(int i) > > +{ > > + return sizeof(uint32_t) * 16 - sizeof(uint32_t) * i; > > +} > > + > > +static void register_track(const struct nft_handle *h, > > + struct nft_reg_ctx *ctx, int i, int len) > > +{ > > + if (ctx->reg >= 0 || h->regs[i].word || reg_space(i) < len) > > + return; > > Since ctx->reg is not reset in callers' loops and reg_space(i) is > monotonic, maybe make those loop exit conditions by returning false from > register_track() in those cases? you mean: if (!register_track(...)) continue; ? That defeats the check for a matching register already storing the data I need, ie. if (h->regs[i].type != NFT_REG_META) continue; ... > > + if (h->regs[i].type == NFT_REG_UNSPEC) { > > + ctx->genid = h->reg_genid; > > Is ctx->genid used in this case? It used to shortcircuit the logic to evict a register (no eviction needed case), but that is not needed anymore since ctx->reg >= 0 already prevents this. > > + ctx->reg = i; > > + } else if (h->regs[i].genid < ctx->genid) { > > + ctx->genid = h->regs[i].genid; > > + ctx->evict = i; > > What if the oldest reg is too small? The reg_space(i) < len check prevents this? > > + } else if (h->regs[i].len == len) { > > + ctx->evict = i; > > + ctx->genid = 0; > > Why prefer regs of same size over older ones? this was an early optimization. An Ipv6 address might evict up four registers, if n stores old data, then n+1, n+2, n+3 store recent data, n+1, n+2, n+3 would be unfairly evicted. I can remove this case: it is probably an early optimization. This is the initial version of the dynamic register allocation infra. It should be possible to catch for more suboptimal situations with real rulesets, by incrementally reviewing generated bytecode. [...] > > +uint8_t meta_get_register(struct nft_handle *h, enum nft_meta_keys key) > > Accept a uint32_t len parameter and replace all the sizeof(uint32_t) > below with it? Not needed but consistent with payload_get_register() and > less hard-coded values. Actually NFT_META_TIME_NS uses 64 bits, assuming 32-bits for meta is indeed not correct. [...] > > @@ -1201,21 +1202,26 @@ static int __add_nft_among(struct nft_handle *h, const char *table, > > nftnl_set_elem_add(s, elem); > > } > > > > - e = gen_payload(h, NFT_PAYLOAD_LL_HEADER, > > - eth_addr_off[dst], ETH_ALEN, ®); > > + concat_len = ETH_ALEN; > > + if (ip) > > + concat_len += sizeof(struct in_addr); > > + > > + reg = get_register(h, concat_len); > > + e = __gen_payload(NFT_PAYLOAD_LL_HEADER, > > + eth_addr_off[dst], ETH_ALEN, reg); > > if (!e) > > return -ENOMEM; > > nftnl_rule_add_expr(r, e); > > > > if (ip) { > > - e = gen_payload(h, NFT_PAYLOAD_NETWORK_HEADER, ip_addr_off[dst], > > - sizeof(struct in_addr), ®); > > + e = __gen_payload(NFT_PAYLOAD_NETWORK_HEADER, ip_addr_off[dst], > > + sizeof(struct in_addr), reg + 2); > > With a respective macro, this could be 'reg + REG_ALIGN(ETH_ALEN)'. that's feasible. > > struct nft_handle { > > int family; > > struct mnl_socket *nl; > > @@ -111,6 +133,9 @@ struct nft_handle { > > bool cache_init; > > int verbose; > > > > + struct nft_regs regs[20]; > > Why 20? Ain't 16 enough? Yes, this should be 16.