netfilter pull request 24-06-28
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEN9lkrMBJgcdVAPub1V2XiooUIOQFAmZ+3ogACgkQ1V2XiooU IOR7HRAAsVkJnKLPqV4lcY2Yx/QHi+o1s0pBCTZIqzs2rRXfaYrdu9xV0225DuPn xuNNV2GChtWftQxvwcxVLgTGHGG/p8bNYiNJoYEE6acftHZMV4ZZ7NG1yCv2TI3x 8Udu3vFnvnQhV9Q4LNR3SMtCtz5Z5QP1KNM74uaksN+9opCNniuG23Eft6YXh7Kf BYLvJX4pn+St2YTvvnNbA6U/ALxy5OZ/YwXP6FjmERp3AGoFPF2w+MEBmBlyGE3X LDKZ05hnKG4Sd/qp7XnZi9kEZoI9iBKg+GPm5ey1BVjZNMCc5hSpCIdYKb8FiwRa cN+UCc82H9/N2mJXSrcBDA6n8+lp0dLpfomliERyieY3m38Rp7BKTh6pUOmQCw+H bmTJ7rz5WBCC5yjts0N7+2SaVOo+RQpSLXV/SQCIKmk+Xl5sJinvP/gnKWAaPWIm 3gC4Bv7JUuB6x62EcRzoWGFDw8dXlQ64gvkwyMpeelFIexR3dFCfoA3zAaqJnlxJ uZXEF9xuQsZht8IYD37Z6C99tVJzVj/4gCKWKZwi3Kcn/G/MRkQ3lNAPyLewIcMV nC1pwU31z1PXNrbSXrXlUEdl1yUzg04wkc4RrVMJgU983kdQdMTp8Q4BbckdhWCV 4agMNuP4brp6iCvDPamcrWQ+4AbXw/zSdqQr8ONExrOgDUd1ePw= =0BtN -----END PGP SIGNATURE----- Merge tag 'nf-next-24-06-28' of git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next into main Pablo Neira Ayuso says: ==================== Netfilter/IPVS updates for net-next The following patchset contains Netfilter/IPVS updates for net-next: Patch #1 to #11 to shrink memory consumption for transaction objects: struct nft_trans_chain { /* size: 120 (-32), cachelines: 2, members: 10 */ struct nft_trans_elem { /* size: 72 (-40), cachelines: 2, members: 4 */ struct nft_trans_flowtable { /* size: 80 (-48), cachelines: 2, members: 5 */ struct nft_trans_obj { /* size: 72 (-40), cachelines: 2, members: 4 */ struct nft_trans_rule { /* size: 80 (-32), cachelines: 2, members: 6 */ struct nft_trans_set { /* size: 96 (-24), cachelines: 2, members: 8 */ struct nft_trans_table { /* size: 56 (-40), cachelines: 1, members: 2 */ struct nft_trans_elem can now be allocated from kmalloc-96 instead of kmalloc-128 slab. Series from Florian Westphal. For the record, I have mangled patch #1 to add nft_trans_container_*() and use if for every transaction object. I have also added BUILD_BUG_ON to ensure struct nft_trans always comes at the beginning of the container transaction object. And few minor cleanups, any new bugs are of my own. Patch #12 simplify check for SCTP GSO in IPVS, from Ismael Luceno. Patch #13 nf_conncount key length remains in the u32 bound, from Yunjian Wang. Patch #14 removes unnecessary check for CTA_TIMEOUT_L3PROTO when setting default conntrack timeouts via nfnetlink_cttimeout API, from Lin Ma. Patch #15 updates NFT_SECMARK_CTX_MAXLEN to 4096, SELinux could use larger secctx names than the existing 256 bytes length. Patch #16 adds a selftest to exercise nfnetlink_queue listeners leaving nfnetlink_queue, from Florian Westphal. Patch #17 increases hitcount from 255 to 65535 in xt_recent, from Phil Sutter. ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
commit
1c5fc27bc4
@ -1176,7 +1176,7 @@ static inline bool nft_chain_is_bound(struct nft_chain *chain)
|
||||
|
||||
int nft_chain_add(struct nft_table *table, struct nft_chain *chain);
|
||||
void nft_chain_del(struct nft_chain *chain);
|
||||
void nf_tables_chain_destroy(struct nft_ctx *ctx);
|
||||
void nf_tables_chain_destroy(struct nft_chain *chain);
|
||||
|
||||
struct nft_stats {
|
||||
u64 bytes;
|
||||
@ -1613,41 +1613,67 @@ static inline int nft_set_elem_is_dead(const struct nft_set_ext *ext)
|
||||
}
|
||||
|
||||
/**
|
||||
* struct nft_trans - nf_tables object update in transaction
|
||||
* struct nft_trans - nf_tables object update in transaction
|
||||
*
|
||||
* @list: used internally
|
||||
* @binding_list: list of objects with possible bindings
|
||||
* @msg_type: message type
|
||||
* @put_net: ctx->net needs to be put
|
||||
* @ctx: transaction context
|
||||
* @data: internal information related to the transaction
|
||||
* @list: used internally
|
||||
* @net: struct net
|
||||
* @table: struct nft_table the object resides in
|
||||
* @msg_type: message type
|
||||
* @seq: netlink sequence number
|
||||
* @flags: modifiers to new request
|
||||
* @report: notify via unicast netlink message
|
||||
* @put_net: net needs to be put
|
||||
*
|
||||
* This is the information common to all objects in the transaction,
|
||||
* this must always be the first member of derived sub-types.
|
||||
*/
|
||||
struct nft_trans {
|
||||
struct list_head list;
|
||||
struct list_head binding_list;
|
||||
struct net *net;
|
||||
struct nft_table *table;
|
||||
int msg_type;
|
||||
bool put_net;
|
||||
struct nft_ctx ctx;
|
||||
char data[];
|
||||
u32 seq;
|
||||
u16 flags;
|
||||
u8 report:1;
|
||||
u8 put_net:1;
|
||||
};
|
||||
|
||||
/**
|
||||
* struct nft_trans_binding - nf_tables object with binding support in transaction
|
||||
* @nft_trans: base structure, MUST be first member
|
||||
* @binding_list: list of objects with possible bindings
|
||||
*
|
||||
* This is the base type used by objects that can be bound to a chain.
|
||||
*/
|
||||
struct nft_trans_binding {
|
||||
struct nft_trans nft_trans;
|
||||
struct list_head binding_list;
|
||||
};
|
||||
|
||||
struct nft_trans_rule {
|
||||
struct nft_trans nft_trans;
|
||||
struct nft_rule *rule;
|
||||
struct nft_chain *chain;
|
||||
struct nft_flow_rule *flow;
|
||||
u32 rule_id;
|
||||
bool bound;
|
||||
};
|
||||
|
||||
#define nft_trans_rule(trans) \
|
||||
(((struct nft_trans_rule *)trans->data)->rule)
|
||||
#define nft_trans_flow_rule(trans) \
|
||||
(((struct nft_trans_rule *)trans->data)->flow)
|
||||
#define nft_trans_rule_id(trans) \
|
||||
(((struct nft_trans_rule *)trans->data)->rule_id)
|
||||
#define nft_trans_rule_bound(trans) \
|
||||
(((struct nft_trans_rule *)trans->data)->bound)
|
||||
#define nft_trans_container_rule(trans) \
|
||||
container_of(trans, struct nft_trans_rule, nft_trans)
|
||||
#define nft_trans_rule(trans) \
|
||||
nft_trans_container_rule(trans)->rule
|
||||
#define nft_trans_flow_rule(trans) \
|
||||
nft_trans_container_rule(trans)->flow
|
||||
#define nft_trans_rule_id(trans) \
|
||||
nft_trans_container_rule(trans)->rule_id
|
||||
#define nft_trans_rule_bound(trans) \
|
||||
nft_trans_container_rule(trans)->bound
|
||||
#define nft_trans_rule_chain(trans) \
|
||||
nft_trans_container_rule(trans)->chain
|
||||
|
||||
struct nft_trans_set {
|
||||
struct nft_trans_binding nft_trans_binding;
|
||||
struct nft_set *set;
|
||||
u32 set_id;
|
||||
u32 gc_int;
|
||||
@ -1657,100 +1683,117 @@ struct nft_trans_set {
|
||||
u32 size;
|
||||
};
|
||||
|
||||
#define nft_trans_set(trans) \
|
||||
(((struct nft_trans_set *)trans->data)->set)
|
||||
#define nft_trans_set_id(trans) \
|
||||
(((struct nft_trans_set *)trans->data)->set_id)
|
||||
#define nft_trans_set_bound(trans) \
|
||||
(((struct nft_trans_set *)trans->data)->bound)
|
||||
#define nft_trans_set_update(trans) \
|
||||
(((struct nft_trans_set *)trans->data)->update)
|
||||
#define nft_trans_set_timeout(trans) \
|
||||
(((struct nft_trans_set *)trans->data)->timeout)
|
||||
#define nft_trans_set_gc_int(trans) \
|
||||
(((struct nft_trans_set *)trans->data)->gc_int)
|
||||
#define nft_trans_set_size(trans) \
|
||||
(((struct nft_trans_set *)trans->data)->size)
|
||||
#define nft_trans_container_set(t) \
|
||||
container_of(t, struct nft_trans_set, nft_trans_binding.nft_trans)
|
||||
#define nft_trans_set(trans) \
|
||||
nft_trans_container_set(trans)->set
|
||||
#define nft_trans_set_id(trans) \
|
||||
nft_trans_container_set(trans)->set_id
|
||||
#define nft_trans_set_bound(trans) \
|
||||
nft_trans_container_set(trans)->bound
|
||||
#define nft_trans_set_update(trans) \
|
||||
nft_trans_container_set(trans)->update
|
||||
#define nft_trans_set_timeout(trans) \
|
||||
nft_trans_container_set(trans)->timeout
|
||||
#define nft_trans_set_gc_int(trans) \
|
||||
nft_trans_container_set(trans)->gc_int
|
||||
#define nft_trans_set_size(trans) \
|
||||
nft_trans_container_set(trans)->size
|
||||
|
||||
struct nft_trans_chain {
|
||||
struct nft_trans_binding nft_trans_binding;
|
||||
struct nft_chain *chain;
|
||||
bool update;
|
||||
char *name;
|
||||
struct nft_stats __percpu *stats;
|
||||
u8 policy;
|
||||
bool update;
|
||||
bool bound;
|
||||
u32 chain_id;
|
||||
struct nft_base_chain *basechain;
|
||||
struct list_head hook_list;
|
||||
};
|
||||
|
||||
#define nft_trans_chain(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->chain)
|
||||
#define nft_trans_chain_update(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->update)
|
||||
#define nft_trans_chain_name(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->name)
|
||||
#define nft_trans_chain_stats(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->stats)
|
||||
#define nft_trans_chain_policy(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->policy)
|
||||
#define nft_trans_chain_bound(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->bound)
|
||||
#define nft_trans_chain_id(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->chain_id)
|
||||
#define nft_trans_basechain(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->basechain)
|
||||
#define nft_trans_chain_hooks(trans) \
|
||||
(((struct nft_trans_chain *)trans->data)->hook_list)
|
||||
#define nft_trans_container_chain(t) \
|
||||
container_of(t, struct nft_trans_chain, nft_trans_binding.nft_trans)
|
||||
#define nft_trans_chain(trans) \
|
||||
nft_trans_container_chain(trans)->chain
|
||||
#define nft_trans_chain_update(trans) \
|
||||
nft_trans_container_chain(trans)->update
|
||||
#define nft_trans_chain_name(trans) \
|
||||
nft_trans_container_chain(trans)->name
|
||||
#define nft_trans_chain_stats(trans) \
|
||||
nft_trans_container_chain(trans)->stats
|
||||
#define nft_trans_chain_policy(trans) \
|
||||
nft_trans_container_chain(trans)->policy
|
||||
#define nft_trans_chain_bound(trans) \
|
||||
nft_trans_container_chain(trans)->bound
|
||||
#define nft_trans_chain_id(trans) \
|
||||
nft_trans_container_chain(trans)->chain_id
|
||||
#define nft_trans_basechain(trans) \
|
||||
nft_trans_container_chain(trans)->basechain
|
||||
#define nft_trans_chain_hooks(trans) \
|
||||
nft_trans_container_chain(trans)->hook_list
|
||||
|
||||
struct nft_trans_table {
|
||||
struct nft_trans nft_trans;
|
||||
bool update;
|
||||
};
|
||||
|
||||
#define nft_trans_table_update(trans) \
|
||||
(((struct nft_trans_table *)trans->data)->update)
|
||||
#define nft_trans_container_table(trans) \
|
||||
container_of(trans, struct nft_trans_table, nft_trans)
|
||||
#define nft_trans_table_update(trans) \
|
||||
nft_trans_container_table(trans)->update
|
||||
|
||||
struct nft_trans_elem {
|
||||
struct nft_trans nft_trans;
|
||||
struct nft_set *set;
|
||||
struct nft_elem_priv *elem_priv;
|
||||
bool bound;
|
||||
};
|
||||
|
||||
#define nft_trans_elem_set(trans) \
|
||||
(((struct nft_trans_elem *)trans->data)->set)
|
||||
#define nft_trans_elem_priv(trans) \
|
||||
(((struct nft_trans_elem *)trans->data)->elem_priv)
|
||||
#define nft_trans_elem_set_bound(trans) \
|
||||
(((struct nft_trans_elem *)trans->data)->bound)
|
||||
#define nft_trans_container_elem(t) \
|
||||
container_of(t, struct nft_trans_elem, nft_trans)
|
||||
#define nft_trans_elem_set(trans) \
|
||||
nft_trans_container_elem(trans)->set
|
||||
#define nft_trans_elem_priv(trans) \
|
||||
nft_trans_container_elem(trans)->elem_priv
|
||||
#define nft_trans_elem_set_bound(trans) \
|
||||
nft_trans_container_elem(trans)->bound
|
||||
|
||||
struct nft_trans_obj {
|
||||
struct nft_trans nft_trans;
|
||||
struct nft_object *obj;
|
||||
struct nft_object *newobj;
|
||||
bool update;
|
||||
};
|
||||
|
||||
#define nft_trans_obj(trans) \
|
||||
(((struct nft_trans_obj *)trans->data)->obj)
|
||||
#define nft_trans_obj_newobj(trans) \
|
||||
(((struct nft_trans_obj *)trans->data)->newobj)
|
||||
#define nft_trans_obj_update(trans) \
|
||||
(((struct nft_trans_obj *)trans->data)->update)
|
||||
#define nft_trans_container_obj(t) \
|
||||
container_of(t, struct nft_trans_obj, nft_trans)
|
||||
#define nft_trans_obj(trans) \
|
||||
nft_trans_container_obj(trans)->obj
|
||||
#define nft_trans_obj_newobj(trans) \
|
||||
nft_trans_container_obj(trans)->newobj
|
||||
#define nft_trans_obj_update(trans) \
|
||||
nft_trans_container_obj(trans)->update
|
||||
|
||||
struct nft_trans_flowtable {
|
||||
struct nft_trans nft_trans;
|
||||
struct nft_flowtable *flowtable;
|
||||
bool update;
|
||||
struct list_head hook_list;
|
||||
u32 flags;
|
||||
bool update;
|
||||
};
|
||||
|
||||
#define nft_trans_flowtable(trans) \
|
||||
(((struct nft_trans_flowtable *)trans->data)->flowtable)
|
||||
#define nft_trans_flowtable_update(trans) \
|
||||
(((struct nft_trans_flowtable *)trans->data)->update)
|
||||
#define nft_trans_flowtable_hooks(trans) \
|
||||
(((struct nft_trans_flowtable *)trans->data)->hook_list)
|
||||
#define nft_trans_flowtable_flags(trans) \
|
||||
(((struct nft_trans_flowtable *)trans->data)->flags)
|
||||
#define nft_trans_container_flowtable(t) \
|
||||
container_of(t, struct nft_trans_flowtable, nft_trans)
|
||||
#define nft_trans_flowtable(trans) \
|
||||
nft_trans_container_flowtable(trans)->flowtable
|
||||
#define nft_trans_flowtable_update(trans) \
|
||||
nft_trans_container_flowtable(trans)->update
|
||||
#define nft_trans_flowtable_hooks(trans) \
|
||||
nft_trans_container_flowtable(trans)->hook_list
|
||||
#define nft_trans_flowtable_flags(trans) \
|
||||
nft_trans_container_flowtable(trans)->flags
|
||||
|
||||
#define NFT_TRANS_GC_BATCHCOUNT 256
|
||||
|
||||
@ -1764,6 +1807,33 @@ struct nft_trans_gc {
|
||||
struct rcu_head rcu;
|
||||
};
|
||||
|
||||
static inline void nft_ctx_update(struct nft_ctx *ctx,
|
||||
const struct nft_trans *trans)
|
||||
{
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWRULE:
|
||||
case NFT_MSG_DELRULE:
|
||||
case NFT_MSG_DESTROYRULE:
|
||||
ctx->chain = nft_trans_rule_chain(trans);
|
||||
break;
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
case NFT_MSG_DELCHAIN:
|
||||
case NFT_MSG_DESTROYCHAIN:
|
||||
ctx->chain = nft_trans_chain(trans);
|
||||
break;
|
||||
default:
|
||||
ctx->chain = NULL;
|
||||
break;
|
||||
}
|
||||
|
||||
ctx->net = trans->net;
|
||||
ctx->table = trans->table;
|
||||
ctx->family = trans->table->family;
|
||||
ctx->report = trans->report;
|
||||
ctx->flags = trans->flags;
|
||||
ctx->seq = trans->seq;
|
||||
}
|
||||
|
||||
struct nft_trans_gc *nft_trans_gc_alloc(struct nft_set *set,
|
||||
unsigned int gc_seq, gfp_t gfp);
|
||||
void nft_trans_gc_destroy(struct nft_trans_gc *trans);
|
||||
|
@ -1376,7 +1376,7 @@ enum nft_secmark_attributes {
|
||||
#define NFTA_SECMARK_MAX (__NFTA_SECMARK_MAX - 1)
|
||||
|
||||
/* Max security context length */
|
||||
#define NFT_SECMARK_CTX_MAXLEN 256
|
||||
#define NFT_SECMARK_CTX_MAXLEN 4096
|
||||
|
||||
/**
|
||||
* enum nft_reject_types - nf_tables reject expression reject types
|
||||
|
@ -126,7 +126,7 @@ sctp_snat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
if (sctph->source != cp->vport || payload_csum ||
|
||||
skb->ip_summed == CHECKSUM_PARTIAL) {
|
||||
sctph->source = cp->vport;
|
||||
if (!skb_is_gso(skb) || !skb_is_gso_sctp(skb))
|
||||
if (!skb_is_gso(skb))
|
||||
sctp_nat_csum(skb, sctph, sctphoff);
|
||||
} else {
|
||||
skb->ip_summed = CHECKSUM_UNNECESSARY;
|
||||
@ -175,7 +175,7 @@ sctp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
|
||||
(skb->ip_summed == CHECKSUM_PARTIAL &&
|
||||
!(skb_dst(skb)->dev->features & NETIF_F_SCTP_CRC))) {
|
||||
sctph->dest = cp->dport;
|
||||
if (!skb_is_gso(skb) || !skb_is_gso_sctp(skb))
|
||||
if (!skb_is_gso(skb))
|
||||
sctp_nat_csum(skb, sctph, sctphoff);
|
||||
} else if (skb->ip_summed != CHECKSUM_PARTIAL) {
|
||||
skb->ip_summed = CHECKSUM_UNNECESSARY;
|
||||
|
@ -321,7 +321,6 @@ insert_tree(struct net *net,
|
||||
struct nf_conncount_rb *rbconn;
|
||||
struct nf_conncount_tuple *conn;
|
||||
unsigned int count = 0, gc_count = 0;
|
||||
u8 keylen = data->keylen;
|
||||
bool do_gc = true;
|
||||
|
||||
spin_lock_bh(&nf_conncount_locks[hash]);
|
||||
@ -333,7 +332,7 @@ restart:
|
||||
rbconn = rb_entry(*rbnode, struct nf_conncount_rb, node);
|
||||
|
||||
parent = *rbnode;
|
||||
diff = key_diff(key, rbconn->key, keylen);
|
||||
diff = key_diff(key, rbconn->key, data->keylen);
|
||||
if (diff < 0) {
|
||||
rbnode = &((*rbnode)->rb_left);
|
||||
} else if (diff > 0) {
|
||||
@ -378,7 +377,7 @@ restart:
|
||||
|
||||
conn->tuple = *tuple;
|
||||
conn->zone = *zone;
|
||||
memcpy(rbconn->key, key, sizeof(u32) * keylen);
|
||||
memcpy(rbconn->key, key, sizeof(u32) * data->keylen);
|
||||
|
||||
nf_conncount_list_init(&rbconn->list);
|
||||
list_add(&conn->node, &rbconn->list.head);
|
||||
@ -403,7 +402,6 @@ count_tree(struct net *net,
|
||||
struct rb_node *parent;
|
||||
struct nf_conncount_rb *rbconn;
|
||||
unsigned int hash;
|
||||
u8 keylen = data->keylen;
|
||||
|
||||
hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS;
|
||||
root = &data->root[hash];
|
||||
@ -414,7 +412,7 @@ count_tree(struct net *net,
|
||||
|
||||
rbconn = rb_entry(parent, struct nf_conncount_rb, node);
|
||||
|
||||
diff = key_diff(key, rbconn->key, keylen);
|
||||
diff = key_diff(key, rbconn->key, data->keylen);
|
||||
if (diff < 0) {
|
||||
parent = rcu_dereference_raw(parent->rb_left);
|
||||
} else if (diff > 0) {
|
||||
|
@ -153,14 +153,18 @@ static struct nft_trans *nft_trans_alloc_gfp(const struct nft_ctx *ctx,
|
||||
{
|
||||
struct nft_trans *trans;
|
||||
|
||||
trans = kzalloc(sizeof(struct nft_trans) + size, gfp);
|
||||
trans = kzalloc(size, gfp);
|
||||
if (trans == NULL)
|
||||
return NULL;
|
||||
|
||||
INIT_LIST_HEAD(&trans->list);
|
||||
INIT_LIST_HEAD(&trans->binding_list);
|
||||
trans->msg_type = msg_type;
|
||||
trans->ctx = *ctx;
|
||||
|
||||
trans->net = ctx->net;
|
||||
trans->table = ctx->table;
|
||||
trans->seq = ctx->seq;
|
||||
trans->flags = ctx->flags;
|
||||
trans->report = ctx->report;
|
||||
|
||||
return trans;
|
||||
}
|
||||
@ -171,10 +175,26 @@ static struct nft_trans *nft_trans_alloc(const struct nft_ctx *ctx,
|
||||
return nft_trans_alloc_gfp(ctx, msg_type, size, GFP_KERNEL);
|
||||
}
|
||||
|
||||
static struct nft_trans_binding *nft_trans_get_binding(struct nft_trans *trans)
|
||||
{
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
case NFT_MSG_NEWSET:
|
||||
return container_of(trans, struct nft_trans_binding, nft_trans);
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static void nft_trans_list_del(struct nft_trans *trans)
|
||||
{
|
||||
struct nft_trans_binding *trans_binding;
|
||||
|
||||
list_del(&trans->list);
|
||||
list_del(&trans->binding_list);
|
||||
|
||||
trans_binding = nft_trans_get_binding(trans);
|
||||
if (trans_binding)
|
||||
list_del(&trans_binding->binding_list);
|
||||
}
|
||||
|
||||
static void nft_trans_destroy(struct nft_trans *trans)
|
||||
@ -236,7 +256,7 @@ static void __nft_chain_trans_bind(const struct nft_ctx *ctx,
|
||||
nft_trans_chain_bound(trans) = bind;
|
||||
break;
|
||||
case NFT_MSG_NEWRULE:
|
||||
if (trans->ctx.chain == chain)
|
||||
if (nft_trans_rule_chain(trans) == chain)
|
||||
nft_trans_rule_bound(trans) = bind;
|
||||
break;
|
||||
}
|
||||
@ -372,21 +392,26 @@ static void nf_tables_unregister_hook(struct net *net,
|
||||
static void nft_trans_commit_list_add_tail(struct net *net, struct nft_trans *trans)
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(net);
|
||||
struct nft_trans_binding *binding;
|
||||
|
||||
list_add_tail(&trans->list, &nft_net->commit_list);
|
||||
|
||||
binding = nft_trans_get_binding(trans);
|
||||
if (!binding)
|
||||
return;
|
||||
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWSET:
|
||||
if (!nft_trans_set_update(trans) &&
|
||||
nft_set_is_anonymous(nft_trans_set(trans)))
|
||||
list_add_tail(&trans->binding_list, &nft_net->binding_list);
|
||||
list_add_tail(&binding->binding_list, &nft_net->binding_list);
|
||||
break;
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
if (!nft_trans_chain_update(trans) &&
|
||||
nft_chain_binding(nft_trans_chain(trans)))
|
||||
list_add_tail(&trans->binding_list, &nft_net->binding_list);
|
||||
list_add_tail(&binding->binding_list, &nft_net->binding_list);
|
||||
break;
|
||||
}
|
||||
|
||||
list_add_tail(&trans->list, &nft_net->commit_list);
|
||||
}
|
||||
|
||||
static int nft_trans_table_add(struct nft_ctx *ctx, int msg_type)
|
||||
@ -416,11 +441,28 @@ static int nft_deltable(struct nft_ctx *ctx)
|
||||
return err;
|
||||
}
|
||||
|
||||
static struct nft_trans *
|
||||
nft_trans_alloc_chain(const struct nft_ctx *ctx, int msg_type)
|
||||
{
|
||||
struct nft_trans_chain *trans_chain;
|
||||
struct nft_trans *trans;
|
||||
|
||||
trans = nft_trans_alloc(ctx, msg_type, sizeof(struct nft_trans_chain));
|
||||
if (!trans)
|
||||
return NULL;
|
||||
|
||||
trans_chain = nft_trans_container_chain(trans);
|
||||
INIT_LIST_HEAD(&trans_chain->nft_trans_binding.binding_list);
|
||||
trans_chain->chain = ctx->chain;
|
||||
|
||||
return trans;
|
||||
}
|
||||
|
||||
static struct nft_trans *nft_trans_chain_add(struct nft_ctx *ctx, int msg_type)
|
||||
{
|
||||
struct nft_trans *trans;
|
||||
|
||||
trans = nft_trans_alloc(ctx, msg_type, sizeof(struct nft_trans_chain));
|
||||
trans = nft_trans_alloc_chain(ctx, msg_type);
|
||||
if (trans == NULL)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
@ -432,7 +474,6 @@ static struct nft_trans *nft_trans_chain_add(struct nft_ctx *ctx, int msg_type)
|
||||
ntohl(nla_get_be32(ctx->nla[NFTA_CHAIN_ID]));
|
||||
}
|
||||
}
|
||||
nft_trans_chain(trans) = ctx->chain;
|
||||
nft_trans_commit_list_add_tail(ctx->net, trans);
|
||||
|
||||
return trans;
|
||||
@ -505,6 +546,7 @@ static struct nft_trans *nft_trans_rule_add(struct nft_ctx *ctx, int msg_type,
|
||||
ntohl(nla_get_be32(ctx->nla[NFTA_RULE_ID]));
|
||||
}
|
||||
nft_trans_rule(trans) = rule;
|
||||
nft_trans_rule_chain(trans) = ctx->chain;
|
||||
nft_trans_commit_list_add_tail(ctx->net, trans);
|
||||
|
||||
return trans;
|
||||
@ -560,12 +602,16 @@ static int __nft_trans_set_add(const struct nft_ctx *ctx, int msg_type,
|
||||
struct nft_set *set,
|
||||
const struct nft_set_desc *desc)
|
||||
{
|
||||
struct nft_trans_set *trans_set;
|
||||
struct nft_trans *trans;
|
||||
|
||||
trans = nft_trans_alloc(ctx, msg_type, sizeof(struct nft_trans_set));
|
||||
if (trans == NULL)
|
||||
return -ENOMEM;
|
||||
|
||||
trans_set = nft_trans_container_set(trans);
|
||||
INIT_LIST_HEAD(&trans_set->nft_trans_binding.binding_list);
|
||||
|
||||
if (msg_type == NFT_MSG_NEWSET && ctx->nla[NFTA_SET_ID] && !desc) {
|
||||
nft_trans_set_id(trans) =
|
||||
ntohl(nla_get_be32(ctx->nla[NFTA_SET_ID]));
|
||||
@ -1217,11 +1263,11 @@ static bool nft_table_pending_update(const struct nft_ctx *ctx)
|
||||
return true;
|
||||
|
||||
list_for_each_entry(trans, &nft_net->commit_list, list) {
|
||||
if (trans->ctx.table == ctx->table &&
|
||||
if (trans->table == ctx->table &&
|
||||
((trans->msg_type == NFT_MSG_NEWCHAIN &&
|
||||
nft_trans_chain_update(trans)) ||
|
||||
(trans->msg_type == NFT_MSG_DELCHAIN &&
|
||||
nft_is_base_chain(trans->ctx.chain))))
|
||||
nft_is_base_chain(nft_trans_chain(trans)))))
|
||||
return true;
|
||||
}
|
||||
|
||||
@ -1615,15 +1661,15 @@ static int nf_tables_deltable(struct sk_buff *skb, const struct nfnl_info *info,
|
||||
return nft_flush_table(&ctx);
|
||||
}
|
||||
|
||||
static void nf_tables_table_destroy(struct nft_ctx *ctx)
|
||||
static void nf_tables_table_destroy(struct nft_table *table)
|
||||
{
|
||||
if (WARN_ON(ctx->table->use > 0))
|
||||
if (WARN_ON(table->use > 0))
|
||||
return;
|
||||
|
||||
rhltable_destroy(&ctx->table->chains_ht);
|
||||
kfree(ctx->table->name);
|
||||
kfree(ctx->table->udata);
|
||||
kfree(ctx->table);
|
||||
rhltable_destroy(&table->chains_ht);
|
||||
kfree(table->name);
|
||||
kfree(table->udata);
|
||||
kfree(table);
|
||||
}
|
||||
|
||||
void nft_register_chain_type(const struct nft_chain_type *ctype)
|
||||
@ -2049,18 +2095,19 @@ static struct nft_stats __percpu *nft_stats_alloc(const struct nlattr *attr)
|
||||
return newstats;
|
||||
}
|
||||
|
||||
static void nft_chain_stats_replace(struct nft_trans *trans)
|
||||
static void nft_chain_stats_replace(struct nft_trans_chain *trans)
|
||||
{
|
||||
struct nft_base_chain *chain = nft_base_chain(trans->ctx.chain);
|
||||
const struct nft_trans *t = &trans->nft_trans_binding.nft_trans;
|
||||
struct nft_base_chain *chain = nft_base_chain(trans->chain);
|
||||
|
||||
if (!nft_trans_chain_stats(trans))
|
||||
if (!trans->stats)
|
||||
return;
|
||||
|
||||
nft_trans_chain_stats(trans) =
|
||||
rcu_replace_pointer(chain->stats, nft_trans_chain_stats(trans),
|
||||
lockdep_commit_lock_is_held(trans->ctx.net));
|
||||
trans->stats =
|
||||
rcu_replace_pointer(chain->stats, trans->stats,
|
||||
lockdep_commit_lock_is_held(t->net));
|
||||
|
||||
if (!nft_trans_chain_stats(trans))
|
||||
if (!trans->stats)
|
||||
static_branch_inc(&nft_counters_enabled);
|
||||
}
|
||||
|
||||
@ -2078,9 +2125,9 @@ static void nf_tables_chain_free_chain_rules(struct nft_chain *chain)
|
||||
kvfree(chain->blob_next);
|
||||
}
|
||||
|
||||
void nf_tables_chain_destroy(struct nft_ctx *ctx)
|
||||
void nf_tables_chain_destroy(struct nft_chain *chain)
|
||||
{
|
||||
struct nft_chain *chain = ctx->chain;
|
||||
const struct nft_table *table = chain->table;
|
||||
struct nft_hook *hook, *next;
|
||||
|
||||
if (WARN_ON(chain->use > 0))
|
||||
@ -2092,7 +2139,7 @@ void nf_tables_chain_destroy(struct nft_ctx *ctx)
|
||||
if (nft_is_base_chain(chain)) {
|
||||
struct nft_base_chain *basechain = nft_base_chain(chain);
|
||||
|
||||
if (nft_base_chain_netdev(ctx->family, basechain->ops.hooknum)) {
|
||||
if (nft_base_chain_netdev(table->family, basechain->ops.hooknum)) {
|
||||
list_for_each_entry_safe(hook, next,
|
||||
&basechain->hook_list, list) {
|
||||
list_del_rcu(&hook->list);
|
||||
@ -2581,7 +2628,7 @@ err_chain_add:
|
||||
err_trans:
|
||||
nft_use_dec_restore(&table->use);
|
||||
err_destroy_chain:
|
||||
nf_tables_chain_destroy(ctx);
|
||||
nf_tables_chain_destroy(chain);
|
||||
|
||||
return err;
|
||||
}
|
||||
@ -2698,8 +2745,7 @@ static int nf_tables_updchain(struct nft_ctx *ctx, u8 genmask, u8 policy,
|
||||
}
|
||||
|
||||
err = -ENOMEM;
|
||||
trans = nft_trans_alloc(ctx, NFT_MSG_NEWCHAIN,
|
||||
sizeof(struct nft_trans_chain));
|
||||
trans = nft_trans_alloc_chain(ctx, NFT_MSG_NEWCHAIN);
|
||||
if (trans == NULL)
|
||||
goto err_trans;
|
||||
|
||||
@ -2725,7 +2771,7 @@ static int nf_tables_updchain(struct nft_ctx *ctx, u8 genmask, u8 policy,
|
||||
err = -EEXIST;
|
||||
list_for_each_entry(tmp, &nft_net->commit_list, list) {
|
||||
if (tmp->msg_type == NFT_MSG_NEWCHAIN &&
|
||||
tmp->ctx.table == table &&
|
||||
tmp->table == table &&
|
||||
nft_trans_chain_update(tmp) &&
|
||||
nft_trans_chain_name(tmp) &&
|
||||
strcmp(name, nft_trans_chain_name(tmp)) == 0) {
|
||||
@ -2774,13 +2820,11 @@ static struct nft_chain *nft_chain_lookup_byid(const struct net *net,
|
||||
struct nft_trans *trans;
|
||||
|
||||
list_for_each_entry(trans, &nft_net->commit_list, list) {
|
||||
struct nft_chain *chain = trans->ctx.chain;
|
||||
|
||||
if (trans->msg_type == NFT_MSG_NEWCHAIN &&
|
||||
chain->table == table &&
|
||||
nft_trans_chain(trans)->table == table &&
|
||||
id == nft_trans_chain_id(trans) &&
|
||||
nft_active_genmask(chain, genmask))
|
||||
return chain;
|
||||
nft_active_genmask(nft_trans_chain(trans), genmask))
|
||||
return nft_trans_chain(trans);
|
||||
}
|
||||
return ERR_PTR(-ENOENT);
|
||||
}
|
||||
@ -2915,8 +2959,7 @@ static int nft_delchain_hook(struct nft_ctx *ctx,
|
||||
list_move(&hook->list, &chain_del_list);
|
||||
}
|
||||
|
||||
trans = nft_trans_alloc(ctx, NFT_MSG_DELCHAIN,
|
||||
sizeof(struct nft_trans_chain));
|
||||
trans = nft_trans_alloc_chain(ctx, NFT_MSG_DELCHAIN);
|
||||
if (!trans) {
|
||||
err = -ENOMEM;
|
||||
goto err_chain_del_hook;
|
||||
@ -4188,7 +4231,7 @@ static struct nft_rule *nft_rule_lookup_byid(const struct net *net,
|
||||
|
||||
list_for_each_entry(trans, &nft_net->commit_list, list) {
|
||||
if (trans->msg_type == NFT_MSG_NEWRULE &&
|
||||
trans->ctx.chain == chain &&
|
||||
nft_trans_rule_chain(trans) == chain &&
|
||||
id == nft_trans_rule_id(trans))
|
||||
return nft_trans_rule(trans);
|
||||
}
|
||||
@ -9417,51 +9460,53 @@ static int nf_tables_validate(struct net *net)
|
||||
*
|
||||
* We defer the drop policy until the transaction has been finalized.
|
||||
*/
|
||||
static void nft_chain_commit_drop_policy(struct nft_trans *trans)
|
||||
static void nft_chain_commit_drop_policy(struct nft_trans_chain *trans)
|
||||
{
|
||||
struct nft_base_chain *basechain;
|
||||
|
||||
if (nft_trans_chain_policy(trans) != NF_DROP)
|
||||
if (trans->policy != NF_DROP)
|
||||
return;
|
||||
|
||||
if (!nft_is_base_chain(trans->ctx.chain))
|
||||
if (!nft_is_base_chain(trans->chain))
|
||||
return;
|
||||
|
||||
basechain = nft_base_chain(trans->ctx.chain);
|
||||
basechain = nft_base_chain(trans->chain);
|
||||
basechain->policy = NF_DROP;
|
||||
}
|
||||
|
||||
static void nft_chain_commit_update(struct nft_trans *trans)
|
||||
static void nft_chain_commit_update(struct nft_trans_chain *trans)
|
||||
{
|
||||
struct nft_table *table = trans->nft_trans_binding.nft_trans.table;
|
||||
struct nft_base_chain *basechain;
|
||||
|
||||
if (nft_trans_chain_name(trans)) {
|
||||
rhltable_remove(&trans->ctx.table->chains_ht,
|
||||
&trans->ctx.chain->rhlhead,
|
||||
if (trans->name) {
|
||||
rhltable_remove(&table->chains_ht,
|
||||
&trans->chain->rhlhead,
|
||||
nft_chain_ht_params);
|
||||
swap(trans->ctx.chain->name, nft_trans_chain_name(trans));
|
||||
rhltable_insert_key(&trans->ctx.table->chains_ht,
|
||||
trans->ctx.chain->name,
|
||||
&trans->ctx.chain->rhlhead,
|
||||
swap(trans->chain->name, trans->name);
|
||||
rhltable_insert_key(&table->chains_ht,
|
||||
trans->chain->name,
|
||||
&trans->chain->rhlhead,
|
||||
nft_chain_ht_params);
|
||||
}
|
||||
|
||||
if (!nft_is_base_chain(trans->ctx.chain))
|
||||
if (!nft_is_base_chain(trans->chain))
|
||||
return;
|
||||
|
||||
nft_chain_stats_replace(trans);
|
||||
|
||||
basechain = nft_base_chain(trans->ctx.chain);
|
||||
basechain = nft_base_chain(trans->chain);
|
||||
|
||||
switch (nft_trans_chain_policy(trans)) {
|
||||
switch (trans->policy) {
|
||||
case NF_DROP:
|
||||
case NF_ACCEPT:
|
||||
basechain->policy = nft_trans_chain_policy(trans);
|
||||
basechain->policy = trans->policy;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
static void nft_obj_commit_update(struct nft_trans *trans)
|
||||
static void nft_obj_commit_update(const struct nft_ctx *ctx,
|
||||
struct nft_trans *trans)
|
||||
{
|
||||
struct nft_object *newobj;
|
||||
struct nft_object *obj;
|
||||
@ -9473,15 +9518,21 @@ static void nft_obj_commit_update(struct nft_trans *trans)
|
||||
return;
|
||||
|
||||
obj->ops->update(obj, newobj);
|
||||
nft_obj_destroy(&trans->ctx, newobj);
|
||||
nft_obj_destroy(ctx, newobj);
|
||||
}
|
||||
|
||||
static void nft_commit_release(struct nft_trans *trans)
|
||||
{
|
||||
struct nft_ctx ctx = {
|
||||
.net = trans->net,
|
||||
};
|
||||
|
||||
nft_ctx_update(&ctx, trans);
|
||||
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_DELTABLE:
|
||||
case NFT_MSG_DESTROYTABLE:
|
||||
nf_tables_table_destroy(&trans->ctx);
|
||||
nf_tables_table_destroy(trans->table);
|
||||
break;
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
free_percpu(nft_trans_chain_stats(trans));
|
||||
@ -9492,25 +9543,25 @@ static void nft_commit_release(struct nft_trans *trans)
|
||||
if (nft_trans_chain_update(trans))
|
||||
nft_hooks_destroy(&nft_trans_chain_hooks(trans));
|
||||
else
|
||||
nf_tables_chain_destroy(&trans->ctx);
|
||||
nf_tables_chain_destroy(nft_trans_chain(trans));
|
||||
break;
|
||||
case NFT_MSG_DELRULE:
|
||||
case NFT_MSG_DESTROYRULE:
|
||||
nf_tables_rule_destroy(&trans->ctx, nft_trans_rule(trans));
|
||||
nf_tables_rule_destroy(&ctx, nft_trans_rule(trans));
|
||||
break;
|
||||
case NFT_MSG_DELSET:
|
||||
case NFT_MSG_DESTROYSET:
|
||||
nft_set_destroy(&trans->ctx, nft_trans_set(trans));
|
||||
nft_set_destroy(&ctx, nft_trans_set(trans));
|
||||
break;
|
||||
case NFT_MSG_DELSETELEM:
|
||||
case NFT_MSG_DESTROYSETELEM:
|
||||
nf_tables_set_elem_destroy(&trans->ctx,
|
||||
nf_tables_set_elem_destroy(&ctx,
|
||||
nft_trans_elem_set(trans),
|
||||
nft_trans_elem_priv(trans));
|
||||
break;
|
||||
case NFT_MSG_DELOBJ:
|
||||
case NFT_MSG_DESTROYOBJ:
|
||||
nft_obj_destroy(&trans->ctx, nft_trans_obj(trans));
|
||||
nft_obj_destroy(&ctx, nft_trans_obj(trans));
|
||||
break;
|
||||
case NFT_MSG_DELFLOWTABLE:
|
||||
case NFT_MSG_DESTROYFLOWTABLE:
|
||||
@ -9522,7 +9573,7 @@ static void nft_commit_release(struct nft_trans *trans)
|
||||
}
|
||||
|
||||
if (trans->put_net)
|
||||
put_net(trans->ctx.net);
|
||||
put_net(trans->net);
|
||||
|
||||
kfree(trans);
|
||||
}
|
||||
@ -9641,10 +9692,10 @@ static void nf_tables_commit_chain_prepare_cancel(struct net *net)
|
||||
struct nft_trans *trans, *next;
|
||||
|
||||
list_for_each_entry_safe(trans, next, &nft_net->commit_list, list) {
|
||||
struct nft_chain *chain = trans->ctx.chain;
|
||||
|
||||
if (trans->msg_type == NFT_MSG_NEWRULE ||
|
||||
trans->msg_type == NFT_MSG_DELRULE) {
|
||||
struct nft_chain *chain = nft_trans_rule_chain(trans);
|
||||
|
||||
kvfree(chain->blob_next);
|
||||
chain->blob_next = NULL;
|
||||
}
|
||||
@ -10002,7 +10053,7 @@ static void nf_tables_commit_release(struct net *net)
|
||||
|
||||
trans = list_last_entry(&nft_net->commit_list,
|
||||
struct nft_trans, list);
|
||||
get_net(trans->ctx.net);
|
||||
get_net(trans->net);
|
||||
WARN_ON_ONCE(trans->put_net);
|
||||
|
||||
trans->put_net = true;
|
||||
@ -10146,12 +10197,15 @@ static void nft_gc_seq_end(struct nftables_pernet *nft_net, unsigned int gc_seq)
|
||||
static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
{
|
||||
struct nftables_pernet *nft_net = nft_pernet(net);
|
||||
const struct nlmsghdr *nlh = nlmsg_hdr(skb);
|
||||
struct nft_trans_binding *trans_binding;
|
||||
struct nft_trans *trans, *next;
|
||||
unsigned int base_seq, gc_seq;
|
||||
LIST_HEAD(set_update_list);
|
||||
struct nft_trans_elem *te;
|
||||
struct nft_chain *chain;
|
||||
struct nft_table *table;
|
||||
struct nft_ctx ctx;
|
||||
LIST_HEAD(adl);
|
||||
int err;
|
||||
|
||||
@ -10160,7 +10214,10 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
return 0;
|
||||
}
|
||||
|
||||
list_for_each_entry(trans, &nft_net->binding_list, binding_list) {
|
||||
nft_ctx_init(&ctx, net, skb, nlh, NFPROTO_UNSPEC, NULL, NULL, NULL);
|
||||
|
||||
list_for_each_entry(trans_binding, &nft_net->binding_list, binding_list) {
|
||||
trans = &trans_binding->nft_trans;
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWSET:
|
||||
if (!nft_trans_set_update(trans) &&
|
||||
@ -10178,6 +10235,9 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
return -EINVAL;
|
||||
}
|
||||
break;
|
||||
default:
|
||||
WARN_ONCE(1, "Unhandled bind type %d", trans->msg_type);
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
@ -10193,9 +10253,10 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
|
||||
/* 1. Allocate space for next generation rules_gen_X[] */
|
||||
list_for_each_entry_safe(trans, next, &nft_net->commit_list, list) {
|
||||
struct nft_table *table = trans->table;
|
||||
int ret;
|
||||
|
||||
ret = nf_tables_commit_audit_alloc(&adl, trans->ctx.table);
|
||||
ret = nf_tables_commit_audit_alloc(&adl, table);
|
||||
if (ret) {
|
||||
nf_tables_commit_chain_prepare_cancel(net);
|
||||
nf_tables_commit_audit_free(&adl);
|
||||
@ -10203,7 +10264,7 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
}
|
||||
if (trans->msg_type == NFT_MSG_NEWRULE ||
|
||||
trans->msg_type == NFT_MSG_DELRULE) {
|
||||
chain = trans->ctx.chain;
|
||||
chain = nft_trans_rule_chain(trans);
|
||||
|
||||
ret = nf_tables_commit_chain_prepare(net, chain);
|
||||
if (ret < 0) {
|
||||
@ -10236,70 +10297,71 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
net->nft.gencursor = nft_gencursor_next(net);
|
||||
|
||||
list_for_each_entry_safe(trans, next, &nft_net->commit_list, list) {
|
||||
nf_tables_commit_audit_collect(&adl, trans->ctx.table,
|
||||
trans->msg_type);
|
||||
struct nft_table *table = trans->table;
|
||||
|
||||
nft_ctx_update(&ctx, trans);
|
||||
|
||||
nf_tables_commit_audit_collect(&adl, table, trans->msg_type);
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWTABLE:
|
||||
if (nft_trans_table_update(trans)) {
|
||||
if (!(trans->ctx.table->flags & __NFT_TABLE_F_UPDATE)) {
|
||||
if (!(table->flags & __NFT_TABLE_F_UPDATE)) {
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
}
|
||||
if (trans->ctx.table->flags & NFT_TABLE_F_DORMANT)
|
||||
nf_tables_table_disable(net, trans->ctx.table);
|
||||
if (table->flags & NFT_TABLE_F_DORMANT)
|
||||
nf_tables_table_disable(net, table);
|
||||
|
||||
trans->ctx.table->flags &= ~__NFT_TABLE_F_UPDATE;
|
||||
table->flags &= ~__NFT_TABLE_F_UPDATE;
|
||||
} else {
|
||||
nft_clear(net, trans->ctx.table);
|
||||
nft_clear(net, table);
|
||||
}
|
||||
nf_tables_table_notify(&trans->ctx, NFT_MSG_NEWTABLE);
|
||||
nf_tables_table_notify(&ctx, NFT_MSG_NEWTABLE);
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
case NFT_MSG_DELTABLE:
|
||||
case NFT_MSG_DESTROYTABLE:
|
||||
list_del_rcu(&trans->ctx.table->list);
|
||||
nf_tables_table_notify(&trans->ctx, trans->msg_type);
|
||||
list_del_rcu(&table->list);
|
||||
nf_tables_table_notify(&ctx, trans->msg_type);
|
||||
break;
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
if (nft_trans_chain_update(trans)) {
|
||||
nft_chain_commit_update(trans);
|
||||
nf_tables_chain_notify(&trans->ctx, NFT_MSG_NEWCHAIN,
|
||||
nft_chain_commit_update(nft_trans_container_chain(trans));
|
||||
nf_tables_chain_notify(&ctx, NFT_MSG_NEWCHAIN,
|
||||
&nft_trans_chain_hooks(trans));
|
||||
list_splice(&nft_trans_chain_hooks(trans),
|
||||
&nft_trans_basechain(trans)->hook_list);
|
||||
/* trans destroyed after rcu grace period */
|
||||
} else {
|
||||
nft_chain_commit_drop_policy(trans);
|
||||
nft_clear(net, trans->ctx.chain);
|
||||
nf_tables_chain_notify(&trans->ctx, NFT_MSG_NEWCHAIN, NULL);
|
||||
nft_chain_commit_drop_policy(nft_trans_container_chain(trans));
|
||||
nft_clear(net, nft_trans_chain(trans));
|
||||
nf_tables_chain_notify(&ctx, NFT_MSG_NEWCHAIN, NULL);
|
||||
nft_trans_destroy(trans);
|
||||
}
|
||||
break;
|
||||
case NFT_MSG_DELCHAIN:
|
||||
case NFT_MSG_DESTROYCHAIN:
|
||||
if (nft_trans_chain_update(trans)) {
|
||||
nf_tables_chain_notify(&trans->ctx, NFT_MSG_DELCHAIN,
|
||||
nf_tables_chain_notify(&ctx, NFT_MSG_DELCHAIN,
|
||||
&nft_trans_chain_hooks(trans));
|
||||
if (!(trans->ctx.table->flags & NFT_TABLE_F_DORMANT)) {
|
||||
if (!(table->flags & NFT_TABLE_F_DORMANT)) {
|
||||
nft_netdev_unregister_hooks(net,
|
||||
&nft_trans_chain_hooks(trans),
|
||||
true);
|
||||
}
|
||||
} else {
|
||||
nft_chain_del(trans->ctx.chain);
|
||||
nf_tables_chain_notify(&trans->ctx, NFT_MSG_DELCHAIN,
|
||||
nft_chain_del(nft_trans_chain(trans));
|
||||
nf_tables_chain_notify(&ctx, NFT_MSG_DELCHAIN,
|
||||
NULL);
|
||||
nf_tables_unregister_hook(trans->ctx.net,
|
||||
trans->ctx.table,
|
||||
trans->ctx.chain);
|
||||
nf_tables_unregister_hook(ctx.net, ctx.table,
|
||||
nft_trans_chain(trans));
|
||||
}
|
||||
break;
|
||||
case NFT_MSG_NEWRULE:
|
||||
nft_clear(trans->ctx.net, nft_trans_rule(trans));
|
||||
nf_tables_rule_notify(&trans->ctx,
|
||||
nft_trans_rule(trans),
|
||||
nft_clear(net, nft_trans_rule(trans));
|
||||
nf_tables_rule_notify(&ctx, nft_trans_rule(trans),
|
||||
NFT_MSG_NEWRULE);
|
||||
if (trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
if (nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
nft_flow_rule_destroy(nft_trans_flow_rule(trans));
|
||||
|
||||
nft_trans_destroy(trans);
|
||||
@ -10307,14 +10369,12 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
case NFT_MSG_DELRULE:
|
||||
case NFT_MSG_DESTROYRULE:
|
||||
list_del_rcu(&nft_trans_rule(trans)->list);
|
||||
nf_tables_rule_notify(&trans->ctx,
|
||||
nft_trans_rule(trans),
|
||||
nf_tables_rule_notify(&ctx, nft_trans_rule(trans),
|
||||
trans->msg_type);
|
||||
nft_rule_expr_deactivate(&trans->ctx,
|
||||
nft_trans_rule(trans),
|
||||
nft_rule_expr_deactivate(&ctx, nft_trans_rule(trans),
|
||||
NFT_TRANS_COMMIT);
|
||||
|
||||
if (trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
if (nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
nft_flow_rule_destroy(nft_trans_flow_rule(trans));
|
||||
break;
|
||||
case NFT_MSG_NEWSET:
|
||||
@ -10333,9 +10393,9 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
*/
|
||||
if (nft_set_is_anonymous(nft_trans_set(trans)) &&
|
||||
!list_empty(&nft_trans_set(trans)->bindings))
|
||||
nft_use_dec(&trans->ctx.table->use);
|
||||
nft_use_dec(&table->use);
|
||||
}
|
||||
nf_tables_set_notify(&trans->ctx, nft_trans_set(trans),
|
||||
nf_tables_set_notify(&ctx, nft_trans_set(trans),
|
||||
NFT_MSG_NEWSET, GFP_KERNEL);
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
@ -10343,14 +10403,14 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
case NFT_MSG_DESTROYSET:
|
||||
nft_trans_set(trans)->dead = 1;
|
||||
list_del_rcu(&nft_trans_set(trans)->list);
|
||||
nf_tables_set_notify(&trans->ctx, nft_trans_set(trans),
|
||||
nf_tables_set_notify(&ctx, nft_trans_set(trans),
|
||||
trans->msg_type, GFP_KERNEL);
|
||||
break;
|
||||
case NFT_MSG_NEWSETELEM:
|
||||
te = (struct nft_trans_elem *)trans->data;
|
||||
te = nft_trans_container_elem(trans);
|
||||
|
||||
nft_setelem_activate(net, te->set, te->elem_priv);
|
||||
nf_tables_setelem_notify(&trans->ctx, te->set,
|
||||
nf_tables_setelem_notify(&ctx, te->set,
|
||||
te->elem_priv,
|
||||
NFT_MSG_NEWSETELEM);
|
||||
if (te->set->ops->commit &&
|
||||
@ -10362,9 +10422,9 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
break;
|
||||
case NFT_MSG_DELSETELEM:
|
||||
case NFT_MSG_DESTROYSETELEM:
|
||||
te = (struct nft_trans_elem *)trans->data;
|
||||
te = nft_trans_container_elem(trans);
|
||||
|
||||
nf_tables_setelem_notify(&trans->ctx, te->set,
|
||||
nf_tables_setelem_notify(&ctx, te->set,
|
||||
te->elem_priv,
|
||||
trans->msg_type);
|
||||
nft_setelem_remove(net, te->set, te->elem_priv);
|
||||
@ -10380,13 +10440,13 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
break;
|
||||
case NFT_MSG_NEWOBJ:
|
||||
if (nft_trans_obj_update(trans)) {
|
||||
nft_obj_commit_update(trans);
|
||||
nf_tables_obj_notify(&trans->ctx,
|
||||
nft_obj_commit_update(&ctx, trans);
|
||||
nf_tables_obj_notify(&ctx,
|
||||
nft_trans_obj(trans),
|
||||
NFT_MSG_NEWOBJ);
|
||||
} else {
|
||||
nft_clear(net, nft_trans_obj(trans));
|
||||
nf_tables_obj_notify(&trans->ctx,
|
||||
nf_tables_obj_notify(&ctx,
|
||||
nft_trans_obj(trans),
|
||||
NFT_MSG_NEWOBJ);
|
||||
nft_trans_destroy(trans);
|
||||
@ -10395,14 +10455,14 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
case NFT_MSG_DELOBJ:
|
||||
case NFT_MSG_DESTROYOBJ:
|
||||
nft_obj_del(nft_trans_obj(trans));
|
||||
nf_tables_obj_notify(&trans->ctx, nft_trans_obj(trans),
|
||||
nf_tables_obj_notify(&ctx, nft_trans_obj(trans),
|
||||
trans->msg_type);
|
||||
break;
|
||||
case NFT_MSG_NEWFLOWTABLE:
|
||||
if (nft_trans_flowtable_update(trans)) {
|
||||
nft_trans_flowtable(trans)->data.flags =
|
||||
nft_trans_flowtable_flags(trans);
|
||||
nf_tables_flowtable_notify(&trans->ctx,
|
||||
nf_tables_flowtable_notify(&ctx,
|
||||
nft_trans_flowtable(trans),
|
||||
&nft_trans_flowtable_hooks(trans),
|
||||
NFT_MSG_NEWFLOWTABLE);
|
||||
@ -10410,7 +10470,7 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
&nft_trans_flowtable(trans)->hook_list);
|
||||
} else {
|
||||
nft_clear(net, nft_trans_flowtable(trans));
|
||||
nf_tables_flowtable_notify(&trans->ctx,
|
||||
nf_tables_flowtable_notify(&ctx,
|
||||
nft_trans_flowtable(trans),
|
||||
NULL,
|
||||
NFT_MSG_NEWFLOWTABLE);
|
||||
@ -10420,7 +10480,7 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
case NFT_MSG_DELFLOWTABLE:
|
||||
case NFT_MSG_DESTROYFLOWTABLE:
|
||||
if (nft_trans_flowtable_update(trans)) {
|
||||
nf_tables_flowtable_notify(&trans->ctx,
|
||||
nf_tables_flowtable_notify(&ctx,
|
||||
nft_trans_flowtable(trans),
|
||||
&nft_trans_flowtable_hooks(trans),
|
||||
trans->msg_type);
|
||||
@ -10428,7 +10488,7 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
|
||||
&nft_trans_flowtable_hooks(trans));
|
||||
} else {
|
||||
list_del_rcu(&nft_trans_flowtable(trans)->list);
|
||||
nf_tables_flowtable_notify(&trans->ctx,
|
||||
nf_tables_flowtable_notify(&ctx,
|
||||
nft_trans_flowtable(trans),
|
||||
NULL,
|
||||
trans->msg_type);
|
||||
@ -10470,28 +10530,32 @@ static void nf_tables_module_autoload(struct net *net)
|
||||
|
||||
static void nf_tables_abort_release(struct nft_trans *trans)
|
||||
{
|
||||
struct nft_ctx ctx = { };
|
||||
|
||||
nft_ctx_update(&ctx, trans);
|
||||
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWTABLE:
|
||||
nf_tables_table_destroy(&trans->ctx);
|
||||
nf_tables_table_destroy(trans->table);
|
||||
break;
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
if (nft_trans_chain_update(trans))
|
||||
nft_hooks_destroy(&nft_trans_chain_hooks(trans));
|
||||
else
|
||||
nf_tables_chain_destroy(&trans->ctx);
|
||||
nf_tables_chain_destroy(nft_trans_chain(trans));
|
||||
break;
|
||||
case NFT_MSG_NEWRULE:
|
||||
nf_tables_rule_destroy(&trans->ctx, nft_trans_rule(trans));
|
||||
nf_tables_rule_destroy(&ctx, nft_trans_rule(trans));
|
||||
break;
|
||||
case NFT_MSG_NEWSET:
|
||||
nft_set_destroy(&trans->ctx, nft_trans_set(trans));
|
||||
nft_set_destroy(&ctx, nft_trans_set(trans));
|
||||
break;
|
||||
case NFT_MSG_NEWSETELEM:
|
||||
nft_set_elem_destroy(nft_trans_elem_set(trans),
|
||||
nft_trans_elem_priv(trans), true);
|
||||
break;
|
||||
case NFT_MSG_NEWOBJ:
|
||||
nft_obj_destroy(&trans->ctx, nft_trans_obj(trans));
|
||||
nft_obj_destroy(&ctx, nft_trans_obj(trans));
|
||||
break;
|
||||
case NFT_MSG_NEWFLOWTABLE:
|
||||
if (nft_trans_flowtable_update(trans))
|
||||
@ -10523,6 +10587,9 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
struct nft_trans *trans, *next;
|
||||
LIST_HEAD(set_update_list);
|
||||
struct nft_trans_elem *te;
|
||||
struct nft_ctx ctx = {
|
||||
.net = net,
|
||||
};
|
||||
int err = 0;
|
||||
|
||||
if (action == NFNL_ABORT_VALIDATE &&
|
||||
@ -10531,37 +10598,41 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
|
||||
list_for_each_entry_safe_reverse(trans, next, &nft_net->commit_list,
|
||||
list) {
|
||||
struct nft_table *table = trans->table;
|
||||
|
||||
nft_ctx_update(&ctx, trans);
|
||||
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWTABLE:
|
||||
if (nft_trans_table_update(trans)) {
|
||||
if (!(trans->ctx.table->flags & __NFT_TABLE_F_UPDATE)) {
|
||||
if (!(table->flags & __NFT_TABLE_F_UPDATE)) {
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
}
|
||||
if (trans->ctx.table->flags & __NFT_TABLE_F_WAS_DORMANT) {
|
||||
nf_tables_table_disable(net, trans->ctx.table);
|
||||
trans->ctx.table->flags |= NFT_TABLE_F_DORMANT;
|
||||
} else if (trans->ctx.table->flags & __NFT_TABLE_F_WAS_AWAKEN) {
|
||||
trans->ctx.table->flags &= ~NFT_TABLE_F_DORMANT;
|
||||
if (table->flags & __NFT_TABLE_F_WAS_DORMANT) {
|
||||
nf_tables_table_disable(net, table);
|
||||
table->flags |= NFT_TABLE_F_DORMANT;
|
||||
} else if (table->flags & __NFT_TABLE_F_WAS_AWAKEN) {
|
||||
table->flags &= ~NFT_TABLE_F_DORMANT;
|
||||
}
|
||||
if (trans->ctx.table->flags & __NFT_TABLE_F_WAS_ORPHAN) {
|
||||
trans->ctx.table->flags &= ~NFT_TABLE_F_OWNER;
|
||||
trans->ctx.table->nlpid = 0;
|
||||
if (table->flags & __NFT_TABLE_F_WAS_ORPHAN) {
|
||||
table->flags &= ~NFT_TABLE_F_OWNER;
|
||||
table->nlpid = 0;
|
||||
}
|
||||
trans->ctx.table->flags &= ~__NFT_TABLE_F_UPDATE;
|
||||
table->flags &= ~__NFT_TABLE_F_UPDATE;
|
||||
nft_trans_destroy(trans);
|
||||
} else {
|
||||
list_del_rcu(&trans->ctx.table->list);
|
||||
list_del_rcu(&table->list);
|
||||
}
|
||||
break;
|
||||
case NFT_MSG_DELTABLE:
|
||||
case NFT_MSG_DESTROYTABLE:
|
||||
nft_clear(trans->ctx.net, trans->ctx.table);
|
||||
nft_clear(trans->net, table);
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
if (nft_trans_chain_update(trans)) {
|
||||
if (!(trans->ctx.table->flags & NFT_TABLE_F_DORMANT)) {
|
||||
if (!(table->flags & NFT_TABLE_F_DORMANT)) {
|
||||
nft_netdev_unregister_hooks(net,
|
||||
&nft_trans_chain_hooks(trans),
|
||||
true);
|
||||
@ -10574,11 +10645,10 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
}
|
||||
nft_use_dec_restore(&trans->ctx.table->use);
|
||||
nft_chain_del(trans->ctx.chain);
|
||||
nf_tables_unregister_hook(trans->ctx.net,
|
||||
trans->ctx.table,
|
||||
trans->ctx.chain);
|
||||
nft_use_dec_restore(&table->use);
|
||||
nft_chain_del(nft_trans_chain(trans));
|
||||
nf_tables_unregister_hook(trans->net, table,
|
||||
nft_trans_chain(trans));
|
||||
}
|
||||
break;
|
||||
case NFT_MSG_DELCHAIN:
|
||||
@ -10587,8 +10657,8 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
list_splice(&nft_trans_chain_hooks(trans),
|
||||
&nft_trans_basechain(trans)->hook_list);
|
||||
} else {
|
||||
nft_use_inc_restore(&trans->ctx.table->use);
|
||||
nft_clear(trans->ctx.net, trans->ctx.chain);
|
||||
nft_use_inc_restore(&table->use);
|
||||
nft_clear(trans->net, nft_trans_chain(trans));
|
||||
}
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
@ -10597,20 +10667,20 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
}
|
||||
nft_use_dec_restore(&trans->ctx.chain->use);
|
||||
nft_use_dec_restore(&nft_trans_rule_chain(trans)->use);
|
||||
list_del_rcu(&nft_trans_rule(trans)->list);
|
||||
nft_rule_expr_deactivate(&trans->ctx,
|
||||
nft_rule_expr_deactivate(&ctx,
|
||||
nft_trans_rule(trans),
|
||||
NFT_TRANS_ABORT);
|
||||
if (trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
if (nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
nft_flow_rule_destroy(nft_trans_flow_rule(trans));
|
||||
break;
|
||||
case NFT_MSG_DELRULE:
|
||||
case NFT_MSG_DESTROYRULE:
|
||||
nft_use_inc_restore(&trans->ctx.chain->use);
|
||||
nft_clear(trans->ctx.net, nft_trans_rule(trans));
|
||||
nft_rule_expr_activate(&trans->ctx, nft_trans_rule(trans));
|
||||
if (trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
nft_use_inc_restore(&nft_trans_rule_chain(trans)->use);
|
||||
nft_clear(trans->net, nft_trans_rule(trans));
|
||||
nft_rule_expr_activate(&ctx, nft_trans_rule(trans));
|
||||
if (nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD)
|
||||
nft_flow_rule_destroy(nft_trans_flow_rule(trans));
|
||||
|
||||
nft_trans_destroy(trans);
|
||||
@ -10620,7 +10690,7 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
}
|
||||
nft_use_dec_restore(&trans->ctx.table->use);
|
||||
nft_use_dec_restore(&table->use);
|
||||
if (nft_trans_set_bound(trans)) {
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
@ -10630,10 +10700,10 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
break;
|
||||
case NFT_MSG_DELSET:
|
||||
case NFT_MSG_DESTROYSET:
|
||||
nft_use_inc_restore(&trans->ctx.table->use);
|
||||
nft_clear(trans->ctx.net, nft_trans_set(trans));
|
||||
nft_use_inc_restore(&table->use);
|
||||
nft_clear(trans->net, nft_trans_set(trans));
|
||||
if (nft_trans_set(trans)->flags & (NFT_SET_MAP | NFT_SET_OBJECT))
|
||||
nft_map_activate(&trans->ctx, nft_trans_set(trans));
|
||||
nft_map_activate(&ctx, nft_trans_set(trans));
|
||||
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
@ -10642,7 +10712,7 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
}
|
||||
te = (struct nft_trans_elem *)trans->data;
|
||||
te = nft_trans_container_elem(trans);
|
||||
nft_setelem_remove(net, te->set, te->elem_priv);
|
||||
if (!nft_setelem_is_catchall(te->set, te->elem_priv))
|
||||
atomic_dec(&te->set->nelems);
|
||||
@ -10655,7 +10725,7 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
break;
|
||||
case NFT_MSG_DELSETELEM:
|
||||
case NFT_MSG_DESTROYSETELEM:
|
||||
te = (struct nft_trans_elem *)trans->data;
|
||||
te = nft_trans_container_elem(trans);
|
||||
|
||||
if (!nft_setelem_active_next(net, te->set, te->elem_priv)) {
|
||||
nft_setelem_data_activate(net, te->set, te->elem_priv);
|
||||
@ -10673,17 +10743,17 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
break;
|
||||
case NFT_MSG_NEWOBJ:
|
||||
if (nft_trans_obj_update(trans)) {
|
||||
nft_obj_destroy(&trans->ctx, nft_trans_obj_newobj(trans));
|
||||
nft_obj_destroy(&ctx, nft_trans_obj_newobj(trans));
|
||||
nft_trans_destroy(trans);
|
||||
} else {
|
||||
nft_use_dec_restore(&trans->ctx.table->use);
|
||||
nft_use_dec_restore(&table->use);
|
||||
nft_obj_del(nft_trans_obj(trans));
|
||||
}
|
||||
break;
|
||||
case NFT_MSG_DELOBJ:
|
||||
case NFT_MSG_DESTROYOBJ:
|
||||
nft_use_inc_restore(&trans->ctx.table->use);
|
||||
nft_clear(trans->ctx.net, nft_trans_obj(trans));
|
||||
nft_use_inc_restore(&table->use);
|
||||
nft_clear(trans->net, nft_trans_obj(trans));
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
case NFT_MSG_NEWFLOWTABLE:
|
||||
@ -10691,7 +10761,7 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
nft_unregister_flowtable_net_hooks(net,
|
||||
&nft_trans_flowtable_hooks(trans));
|
||||
} else {
|
||||
nft_use_dec_restore(&trans->ctx.table->use);
|
||||
nft_use_dec_restore(&table->use);
|
||||
list_del_rcu(&nft_trans_flowtable(trans)->list);
|
||||
nft_unregister_flowtable_net_hooks(net,
|
||||
&nft_trans_flowtable(trans)->hook_list);
|
||||
@ -10703,8 +10773,8 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
|
||||
list_splice(&nft_trans_flowtable_hooks(trans),
|
||||
&nft_trans_flowtable(trans)->hook_list);
|
||||
} else {
|
||||
nft_use_inc_restore(&trans->ctx.table->use);
|
||||
nft_clear(trans->ctx.net, nft_trans_flowtable(trans));
|
||||
nft_use_inc_restore(&table->use);
|
||||
nft_clear(trans->net, nft_trans_flowtable(trans));
|
||||
}
|
||||
nft_trans_destroy(trans);
|
||||
break;
|
||||
@ -11365,7 +11435,7 @@ int __nft_release_basechain(struct nft_ctx *ctx)
|
||||
}
|
||||
nft_chain_del(ctx->chain);
|
||||
nft_use_dec(&ctx->table->use);
|
||||
nf_tables_chain_destroy(ctx);
|
||||
nf_tables_chain_destroy(ctx->chain);
|
||||
|
||||
return 0;
|
||||
}
|
||||
@ -11440,12 +11510,11 @@ static void __nft_release_table(struct net *net, struct nft_table *table)
|
||||
nft_obj_destroy(&ctx, obj);
|
||||
}
|
||||
list_for_each_entry_safe(chain, nc, &table->chains, list) {
|
||||
ctx.chain = chain;
|
||||
nft_chain_del(chain);
|
||||
nft_use_dec(&table->use);
|
||||
nf_tables_chain_destroy(&ctx);
|
||||
nf_tables_chain_destroy(chain);
|
||||
}
|
||||
nf_tables_table_destroy(&ctx);
|
||||
nf_tables_table_destroy(table);
|
||||
}
|
||||
|
||||
static void __nft_release_tables(struct net *net)
|
||||
@ -11588,6 +11657,14 @@ static int __init nf_tables_module_init(void)
|
||||
{
|
||||
int err;
|
||||
|
||||
BUILD_BUG_ON(offsetof(struct nft_trans_table, nft_trans) != 0);
|
||||
BUILD_BUG_ON(offsetof(struct nft_trans_chain, nft_trans_binding.nft_trans) != 0);
|
||||
BUILD_BUG_ON(offsetof(struct nft_trans_rule, nft_trans) != 0);
|
||||
BUILD_BUG_ON(offsetof(struct nft_trans_set, nft_trans_binding.nft_trans) != 0);
|
||||
BUILD_BUG_ON(offsetof(struct nft_trans_elem, nft_trans) != 0);
|
||||
BUILD_BUG_ON(offsetof(struct nft_trans_obj, nft_trans) != 0);
|
||||
BUILD_BUG_ON(offsetof(struct nft_trans_flowtable, nft_trans) != 0);
|
||||
|
||||
err = register_pernet_subsys(&nf_tables_net_ops);
|
||||
if (err < 0)
|
||||
return err;
|
||||
|
@ -513,38 +513,38 @@ static void nft_flow_rule_offload_abort(struct net *net,
|
||||
int err = 0;
|
||||
|
||||
list_for_each_entry_continue_reverse(trans, &nft_net->commit_list, list) {
|
||||
if (trans->ctx.family != NFPROTO_NETDEV)
|
||||
if (trans->table->family != NFPROTO_NETDEV)
|
||||
continue;
|
||||
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD) ||
|
||||
if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD) ||
|
||||
nft_trans_chain_update(trans))
|
||||
continue;
|
||||
|
||||
err = nft_flow_offload_chain(trans->ctx.chain, NULL,
|
||||
err = nft_flow_offload_chain(nft_trans_chain(trans), NULL,
|
||||
FLOW_BLOCK_UNBIND);
|
||||
break;
|
||||
case NFT_MSG_DELCHAIN:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
continue;
|
||||
|
||||
err = nft_flow_offload_chain(trans->ctx.chain, NULL,
|
||||
err = nft_flow_offload_chain(nft_trans_chain(trans), NULL,
|
||||
FLOW_BLOCK_BIND);
|
||||
break;
|
||||
case NFT_MSG_NEWRULE:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
continue;
|
||||
|
||||
err = nft_flow_offload_rule(trans->ctx.chain,
|
||||
err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
|
||||
nft_trans_rule(trans),
|
||||
NULL, FLOW_CLS_DESTROY);
|
||||
break;
|
||||
case NFT_MSG_DELRULE:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
continue;
|
||||
|
||||
err = nft_flow_offload_rule(trans->ctx.chain,
|
||||
err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
|
||||
nft_trans_rule(trans),
|
||||
nft_trans_flow_rule(trans),
|
||||
FLOW_CLS_REPLACE);
|
||||
@ -564,46 +564,46 @@ int nft_flow_rule_offload_commit(struct net *net)
|
||||
u8 policy;
|
||||
|
||||
list_for_each_entry(trans, &nft_net->commit_list, list) {
|
||||
if (trans->ctx.family != NFPROTO_NETDEV)
|
||||
if (trans->table->family != NFPROTO_NETDEV)
|
||||
continue;
|
||||
|
||||
switch (trans->msg_type) {
|
||||
case NFT_MSG_NEWCHAIN:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD) ||
|
||||
if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD) ||
|
||||
nft_trans_chain_update(trans))
|
||||
continue;
|
||||
|
||||
policy = nft_trans_chain_policy(trans);
|
||||
err = nft_flow_offload_chain(trans->ctx.chain, &policy,
|
||||
err = nft_flow_offload_chain(nft_trans_chain(trans), &policy,
|
||||
FLOW_BLOCK_BIND);
|
||||
break;
|
||||
case NFT_MSG_DELCHAIN:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
continue;
|
||||
|
||||
policy = nft_trans_chain_policy(trans);
|
||||
err = nft_flow_offload_chain(trans->ctx.chain, &policy,
|
||||
err = nft_flow_offload_chain(nft_trans_chain(trans), &policy,
|
||||
FLOW_BLOCK_UNBIND);
|
||||
break;
|
||||
case NFT_MSG_NEWRULE:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
continue;
|
||||
|
||||
if (trans->ctx.flags & NLM_F_REPLACE ||
|
||||
!(trans->ctx.flags & NLM_F_APPEND)) {
|
||||
if (trans->flags & NLM_F_REPLACE ||
|
||||
!(trans->flags & NLM_F_APPEND)) {
|
||||
err = -EOPNOTSUPP;
|
||||
break;
|
||||
}
|
||||
err = nft_flow_offload_rule(trans->ctx.chain,
|
||||
err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
|
||||
nft_trans_rule(trans),
|
||||
nft_trans_flow_rule(trans),
|
||||
FLOW_CLS_REPLACE);
|
||||
break;
|
||||
case NFT_MSG_DELRULE:
|
||||
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
|
||||
continue;
|
||||
|
||||
err = nft_flow_offload_rule(trans->ctx.chain,
|
||||
err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
|
||||
nft_trans_rule(trans),
|
||||
NULL, FLOW_CLS_DESTROY);
|
||||
break;
|
||||
|
@ -366,8 +366,7 @@ static int cttimeout_default_set(struct sk_buff *skb,
|
||||
__u8 l4num;
|
||||
int ret;
|
||||
|
||||
if (!cda[CTA_TIMEOUT_L3PROTO] ||
|
||||
!cda[CTA_TIMEOUT_L4PROTO] ||
|
||||
if (!cda[CTA_TIMEOUT_L4PROTO] ||
|
||||
!cda[CTA_TIMEOUT_DATA])
|
||||
return -EINVAL;
|
||||
|
||||
|
@ -221,7 +221,7 @@ static void nft_immediate_destroy(const struct nft_ctx *ctx,
|
||||
list_del(&rule->list);
|
||||
nf_tables_rule_destroy(&chain_ctx, rule);
|
||||
}
|
||||
nf_tables_chain_destroy(&chain_ctx);
|
||||
nf_tables_chain_destroy(chain);
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
|
@ -59,9 +59,9 @@ MODULE_PARM_DESC(ip_list_gid, "default owning group of /proc/net/xt_recent/* fil
|
||||
/* retained for backwards compatibility */
|
||||
static unsigned int ip_pkt_list_tot __read_mostly;
|
||||
module_param(ip_pkt_list_tot, uint, 0400);
|
||||
MODULE_PARM_DESC(ip_pkt_list_tot, "number of packets per IP address to remember (max. 255)");
|
||||
MODULE_PARM_DESC(ip_pkt_list_tot, "number of packets per IP address to remember (max. 65535)");
|
||||
|
||||
#define XT_RECENT_MAX_NSTAMPS 256
|
||||
#define XT_RECENT_MAX_NSTAMPS 65536
|
||||
|
||||
struct recent_entry {
|
||||
struct list_head list;
|
||||
@ -69,7 +69,7 @@ struct recent_entry {
|
||||
union nf_inet_addr addr;
|
||||
u_int16_t family;
|
||||
u_int8_t ttl;
|
||||
u_int8_t index;
|
||||
u_int16_t index;
|
||||
u_int16_t nstamps;
|
||||
unsigned long stamps[];
|
||||
};
|
||||
@ -80,7 +80,7 @@ struct recent_table {
|
||||
union nf_inet_addr mask;
|
||||
unsigned int refcnt;
|
||||
unsigned int entries;
|
||||
u8 nstamps_max_mask;
|
||||
u_int16_t nstamps_max_mask;
|
||||
struct list_head lru_list;
|
||||
struct list_head iphash[];
|
||||
};
|
||||
|
@ -375,6 +375,42 @@ EOF
|
||||
wait 2>/dev/null
|
||||
}
|
||||
|
||||
test_queue_removal()
|
||||
{
|
||||
read tainted_then < /proc/sys/kernel/tainted
|
||||
|
||||
ip netns exec "$ns1" nft -f - <<EOF
|
||||
flush ruleset
|
||||
table ip filter {
|
||||
chain output {
|
||||
type filter hook output priority 0; policy accept;
|
||||
ip protocol icmp queue num 0
|
||||
}
|
||||
}
|
||||
EOF
|
||||
ip netns exec "$ns1" ./nf_queue -q 0 -d 30000 -t "$timeout" &
|
||||
local nfqpid=$!
|
||||
|
||||
busywait "$BUSYWAIT_TIMEOUT" nf_queue_wait "$ns1" 0
|
||||
|
||||
ip netns exec "$ns1" ping -w 2 -f -c 10 127.0.0.1 -q >/dev/null
|
||||
kill $nfqpid
|
||||
|
||||
ip netns exec "$ns1" nft flush ruleset
|
||||
|
||||
if [ "$tainted_then" -ne 0 ];then
|
||||
return
|
||||
fi
|
||||
|
||||
read tainted_now < /proc/sys/kernel/tainted
|
||||
if [ "$tainted_now" -eq 0 ];then
|
||||
echo "PASS: queue program exiting while packets queued"
|
||||
else
|
||||
echo "TAINT: queue program exiting while packets queued"
|
||||
ret=1
|
||||
fi
|
||||
}
|
||||
|
||||
ip netns exec "$nsrouter" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
|
||||
ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth0.forwarding=1 > /dev/null
|
||||
ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth1.forwarding=1 > /dev/null
|
||||
@ -413,5 +449,6 @@ test_tcp_localhost
|
||||
test_tcp_localhost_connectclose
|
||||
test_tcp_localhost_requeue
|
||||
test_icmp_vrf
|
||||
test_queue_removal
|
||||
|
||||
exit $ret
|
||||
|
Loading…
x
Reference in New Issue
Block a user