Merge git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next
Pablo Neira Ayuso says: ==================== Netfilter updates for net-next 1) Fix sparse warning in the new nft_inner expression, reported by Jakub Kicinski. 2) Incorrect vlan header check in nft_inner, from Peng Wu. 3) Two patches to pass reset boolean to expression dump operation, in preparation for allowing to reset stateful expressions in rules. This adds a new NFT_MSG_GETRULE_RESET command. From Phil Sutter. 4) Inconsistent indentation in nft_fib, from Jiapeng Chong. 5) Speed up siphash calculation in conntrack, from Florian Westphal. * git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next: netfilter: conntrack: use siphash_4u64 netfilter: rpfilter/fib: clean up some inconsistent indenting netfilter: nf_tables: Introduce NFT_MSG_GETRULE_RESET netfilter: nf_tables: Extend nft_expr_ops::dump callback parameters netfilter: nft_inner: fix return value check in nft_inner_parse_l2l3() netfilter: nft_payload: use __be16 to store gre version ==================== Link: https://lore.kernel.org/r/20221115095922.139954-1-pablo@netfilter.org Signed-off-by: Jakub Kicinski <kuba@kernel.org>
This commit is contained in:
commit
b87584cb8d
@ -383,7 +383,7 @@ int nft_expr_inner_parse(const struct nft_ctx *ctx, const struct nlattr *nla,
|
||||
int nft_expr_clone(struct nft_expr *dst, struct nft_expr *src);
|
||||
void nft_expr_destroy(const struct nft_ctx *ctx, struct nft_expr *expr);
|
||||
int nft_expr_dump(struct sk_buff *skb, unsigned int attr,
|
||||
const struct nft_expr *expr);
|
||||
const struct nft_expr *expr, bool reset);
|
||||
bool nft_expr_reduce_bitwise(struct nft_regs_track *track,
|
||||
const struct nft_expr *expr);
|
||||
|
||||
@ -927,7 +927,8 @@ struct nft_expr_ops {
|
||||
void (*destroy_clone)(const struct nft_ctx *ctx,
|
||||
const struct nft_expr *expr);
|
||||
int (*dump)(struct sk_buff *skb,
|
||||
const struct nft_expr *expr);
|
||||
const struct nft_expr *expr,
|
||||
bool reset);
|
||||
int (*validate)(const struct nft_ctx *ctx,
|
||||
const struct nft_expr *expr,
|
||||
const struct nft_data **data);
|
||||
|
@ -18,7 +18,7 @@ nft_fib_is_loopback(const struct sk_buff *skb, const struct net_device *in)
|
||||
return skb->pkt_type == PACKET_LOOPBACK || in->flags & IFF_LOOPBACK;
|
||||
}
|
||||
|
||||
int nft_fib_dump(struct sk_buff *skb, const struct nft_expr *expr);
|
||||
int nft_fib_dump(struct sk_buff *skb, const struct nft_expr *expr, bool reset);
|
||||
int nft_fib_init(const struct nft_ctx *ctx, const struct nft_expr *expr,
|
||||
const struct nlattr * const tb[]);
|
||||
int nft_fib_validate(const struct nft_ctx *ctx, const struct nft_expr *expr,
|
||||
|
@ -24,10 +24,10 @@ int nft_meta_set_init(const struct nft_ctx *ctx,
|
||||
const struct nlattr * const tb[]);
|
||||
|
||||
int nft_meta_get_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr);
|
||||
const struct nft_expr *expr, bool reset);
|
||||
|
||||
int nft_meta_set_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr);
|
||||
const struct nft_expr *expr, bool reset);
|
||||
|
||||
void nft_meta_get_eval(const struct nft_expr *expr,
|
||||
struct nft_regs *regs,
|
||||
|
@ -22,7 +22,8 @@ int nft_reject_init(const struct nft_ctx *ctx,
|
||||
const struct nft_expr *expr,
|
||||
const struct nlattr * const tb[]);
|
||||
|
||||
int nft_reject_dump(struct sk_buff *skb, const struct nft_expr *expr);
|
||||
int nft_reject_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset);
|
||||
|
||||
int nft_reject_icmp_code(u8 code);
|
||||
int nft_reject_icmpv6_code(u8 code);
|
||||
|
@ -97,6 +97,7 @@ enum nft_verdicts {
|
||||
* @NFT_MSG_NEWFLOWTABLE: add new flow table (enum nft_flowtable_attributes)
|
||||
* @NFT_MSG_GETFLOWTABLE: get flow table (enum nft_flowtable_attributes)
|
||||
* @NFT_MSG_DELFLOWTABLE: delete flow table (enum nft_flowtable_attributes)
|
||||
* @NFT_MSG_GETRULE_RESET: get rules and reset stateful expressions (enum nft_obj_attributes)
|
||||
*/
|
||||
enum nf_tables_msg_types {
|
||||
NFT_MSG_NEWTABLE,
|
||||
@ -124,6 +125,7 @@ enum nf_tables_msg_types {
|
||||
NFT_MSG_NEWFLOWTABLE,
|
||||
NFT_MSG_GETFLOWTABLE,
|
||||
NFT_MSG_DELFLOWTABLE,
|
||||
NFT_MSG_GETRULE_RESET,
|
||||
NFT_MSG_MAX,
|
||||
};
|
||||
|
||||
|
@ -52,7 +52,8 @@ static int nft_dup_ipv4_init(const struct nft_ctx *ctx,
|
||||
return err;
|
||||
}
|
||||
|
||||
static int nft_dup_ipv4_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_dup_ipv4_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_dup_ipv4 *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -138,12 +138,11 @@ void nft_fib4_eval(const struct nft_expr *expr, struct nft_regs *regs,
|
||||
break;
|
||||
}
|
||||
|
||||
if (!oif) {
|
||||
found = FIB_RES_DEV(res);
|
||||
if (!oif) {
|
||||
found = FIB_RES_DEV(res);
|
||||
} else {
|
||||
if (!fib_info_nh_uses_dev(res.fi, oif))
|
||||
return;
|
||||
|
||||
found = oif;
|
||||
}
|
||||
|
||||
|
@ -50,7 +50,8 @@ static int nft_dup_ipv6_init(const struct nft_ctx *ctx,
|
||||
return err;
|
||||
}
|
||||
|
||||
static int nft_dup_ipv6_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_dup_ipv6_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_dup_ipv6 *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -211,28 +211,24 @@ static u32 hash_conntrack_raw(const struct nf_conntrack_tuple *tuple,
|
||||
unsigned int zoneid,
|
||||
const struct net *net)
|
||||
{
|
||||
struct {
|
||||
struct nf_conntrack_man src;
|
||||
union nf_inet_addr dst_addr;
|
||||
unsigned int zone;
|
||||
u32 net_mix;
|
||||
u16 dport;
|
||||
u16 proto;
|
||||
} __aligned(SIPHASH_ALIGNMENT) combined;
|
||||
u64 a, b, c, d;
|
||||
|
||||
get_random_once(&nf_conntrack_hash_rnd, sizeof(nf_conntrack_hash_rnd));
|
||||
|
||||
memset(&combined, 0, sizeof(combined));
|
||||
/* The direction must be ignored, handle usable tuplehash members manually */
|
||||
a = (u64)tuple->src.u3.all[0] << 32 | tuple->src.u3.all[3];
|
||||
b = (u64)tuple->dst.u3.all[0] << 32 | tuple->dst.u3.all[3];
|
||||
|
||||
/* The direction must be ignored, so handle usable members manually. */
|
||||
combined.src = tuple->src;
|
||||
combined.dst_addr = tuple->dst.u3;
|
||||
combined.zone = zoneid;
|
||||
combined.net_mix = net_hash_mix(net);
|
||||
combined.dport = (__force __u16)tuple->dst.u.all;
|
||||
combined.proto = tuple->dst.protonum;
|
||||
c = (__force u64)tuple->src.u.all << 32 | (__force u64)tuple->dst.u.all << 16;
|
||||
c |= tuple->dst.protonum;
|
||||
|
||||
return (u32)siphash(&combined, sizeof(combined), &nf_conntrack_hash_rnd);
|
||||
d = (u64)zoneid << 32 | net_hash_mix(net);
|
||||
|
||||
/* IPv4: u3.all[1,2,3] == 0 */
|
||||
c ^= (u64)tuple->src.u3.all[1] << 32 | tuple->src.u3.all[2];
|
||||
d += (u64)tuple->dst.u3.all[1] << 32 | tuple->dst.u3.all[2];
|
||||
|
||||
return (u32)siphash_4u64(a, b, c, d, &nf_conntrack_hash_rnd);
|
||||
}
|
||||
|
||||
static u32 scale_hash(u32 hash)
|
||||
|
@ -2759,7 +2759,7 @@ static const struct nla_policy nft_expr_policy[NFTA_EXPR_MAX + 1] = {
|
||||
};
|
||||
|
||||
static int nf_tables_fill_expr_info(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
if (nla_put_string(skb, NFTA_EXPR_NAME, expr->ops->type->name))
|
||||
goto nla_put_failure;
|
||||
@ -2769,7 +2769,7 @@ static int nf_tables_fill_expr_info(struct sk_buff *skb,
|
||||
NFTA_EXPR_DATA);
|
||||
if (data == NULL)
|
||||
goto nla_put_failure;
|
||||
if (expr->ops->dump(skb, expr) < 0)
|
||||
if (expr->ops->dump(skb, expr, reset) < 0)
|
||||
goto nla_put_failure;
|
||||
nla_nest_end(skb, data);
|
||||
}
|
||||
@ -2781,14 +2781,14 @@ nla_put_failure:
|
||||
};
|
||||
|
||||
int nft_expr_dump(struct sk_buff *skb, unsigned int attr,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nlattr *nest;
|
||||
|
||||
nest = nla_nest_start_noflag(skb, attr);
|
||||
if (!nest)
|
||||
goto nla_put_failure;
|
||||
if (nf_tables_fill_expr_info(skb, expr) < 0)
|
||||
if (nf_tables_fill_expr_info(skb, expr, reset) < 0)
|
||||
goto nla_put_failure;
|
||||
nla_nest_end(skb, nest);
|
||||
return 0;
|
||||
@ -3034,7 +3034,8 @@ static int nf_tables_fill_rule_info(struct sk_buff *skb, struct net *net,
|
||||
u32 flags, int family,
|
||||
const struct nft_table *table,
|
||||
const struct nft_chain *chain,
|
||||
const struct nft_rule *rule, u64 handle)
|
||||
const struct nft_rule *rule, u64 handle,
|
||||
bool reset)
|
||||
{
|
||||
struct nlmsghdr *nlh;
|
||||
const struct nft_expr *expr, *next;
|
||||
@ -3067,7 +3068,7 @@ static int nf_tables_fill_rule_info(struct sk_buff *skb, struct net *net,
|
||||
if (list == NULL)
|
||||
goto nla_put_failure;
|
||||
nft_rule_for_each_expr(expr, next, rule) {
|
||||
if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr) < 0)
|
||||
if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr, reset) < 0)
|
||||
goto nla_put_failure;
|
||||
}
|
||||
nla_nest_end(skb, list);
|
||||
@ -3118,7 +3119,7 @@ static void nf_tables_rule_notify(const struct nft_ctx *ctx,
|
||||
|
||||
err = nf_tables_fill_rule_info(skb, ctx->net, ctx->portid, ctx->seq,
|
||||
event, flags, ctx->family, ctx->table,
|
||||
ctx->chain, rule, handle);
|
||||
ctx->chain, rule, handle, false);
|
||||
if (err < 0) {
|
||||
kfree_skb(skb);
|
||||
goto err;
|
||||
@ -3139,7 +3140,8 @@ static int __nf_tables_dump_rules(struct sk_buff *skb,
|
||||
unsigned int *idx,
|
||||
struct netlink_callback *cb,
|
||||
const struct nft_table *table,
|
||||
const struct nft_chain *chain)
|
||||
const struct nft_chain *chain,
|
||||
bool reset)
|
||||
{
|
||||
struct net *net = sock_net(skb->sk);
|
||||
const struct nft_rule *rule, *prule;
|
||||
@ -3166,7 +3168,7 @@ static int __nf_tables_dump_rules(struct sk_buff *skb,
|
||||
NFT_MSG_NEWRULE,
|
||||
NLM_F_MULTI | NLM_F_APPEND,
|
||||
table->family,
|
||||
table, chain, rule, handle) < 0)
|
||||
table, chain, rule, handle, reset) < 0)
|
||||
return 1;
|
||||
|
||||
nl_dump_check_consistent(cb, nlmsg_hdr(skb));
|
||||
@ -3189,6 +3191,10 @@ static int nf_tables_dump_rules(struct sk_buff *skb,
|
||||
struct net *net = sock_net(skb->sk);
|
||||
int family = nfmsg->nfgen_family;
|
||||
struct nftables_pernet *nft_net;
|
||||
bool reset = false;
|
||||
|
||||
if (NFNL_MSG_TYPE(cb->nlh->nlmsg_type) == NFT_MSG_GETRULE_RESET)
|
||||
reset = true;
|
||||
|
||||
rcu_read_lock();
|
||||
nft_net = nft_pernet(net);
|
||||
@ -3213,14 +3219,15 @@ static int nf_tables_dump_rules(struct sk_buff *skb,
|
||||
if (!nft_is_active(net, chain))
|
||||
continue;
|
||||
__nf_tables_dump_rules(skb, &idx,
|
||||
cb, table, chain);
|
||||
cb, table, chain, reset);
|
||||
break;
|
||||
}
|
||||
goto done;
|
||||
}
|
||||
|
||||
list_for_each_entry_rcu(chain, &table->chains, list) {
|
||||
if (__nf_tables_dump_rules(skb, &idx, cb, table, chain))
|
||||
if (__nf_tables_dump_rules(skb, &idx,
|
||||
cb, table, chain, reset))
|
||||
goto done;
|
||||
}
|
||||
|
||||
@ -3291,6 +3298,7 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info,
|
||||
struct net *net = info->net;
|
||||
struct nft_table *table;
|
||||
struct sk_buff *skb2;
|
||||
bool reset = false;
|
||||
int err;
|
||||
|
||||
if (info->nlh->nlmsg_flags & NLM_F_DUMP) {
|
||||
@ -3327,9 +3335,12 @@ static int nf_tables_getrule(struct sk_buff *skb, const struct nfnl_info *info,
|
||||
if (!skb2)
|
||||
return -ENOMEM;
|
||||
|
||||
if (NFNL_MSG_TYPE(info->nlh->nlmsg_type) == NFT_MSG_GETRULE_RESET)
|
||||
reset = true;
|
||||
|
||||
err = nf_tables_fill_rule_info(skb2, net, NETLINK_CB(skb).portid,
|
||||
info->nlh->nlmsg_seq, NFT_MSG_NEWRULE, 0,
|
||||
family, table, chain, rule, 0);
|
||||
family, table, chain, rule, 0, reset);
|
||||
if (err < 0)
|
||||
goto err_fill_rule_info;
|
||||
|
||||
@ -4104,7 +4115,7 @@ static int nf_tables_fill_set(struct sk_buff *skb, const struct nft_ctx *ctx,
|
||||
|
||||
if (set->num_exprs == 1) {
|
||||
nest = nla_nest_start_noflag(skb, NFTA_SET_EXPR);
|
||||
if (nf_tables_fill_expr_info(skb, set->exprs[0]) < 0)
|
||||
if (nf_tables_fill_expr_info(skb, set->exprs[0], false) < 0)
|
||||
goto nla_put_failure;
|
||||
|
||||
nla_nest_end(skb, nest);
|
||||
@ -4115,7 +4126,7 @@ static int nf_tables_fill_set(struct sk_buff *skb, const struct nft_ctx *ctx,
|
||||
|
||||
for (i = 0; i < set->num_exprs; i++) {
|
||||
if (nft_expr_dump(skb, NFTA_LIST_ELEM,
|
||||
set->exprs[i]) < 0)
|
||||
set->exprs[i], false) < 0)
|
||||
goto nla_put_failure;
|
||||
}
|
||||
nla_nest_end(skb, nest);
|
||||
@ -4946,7 +4957,7 @@ static int nft_set_elem_expr_dump(struct sk_buff *skb,
|
||||
|
||||
if (num_exprs == 1) {
|
||||
expr = nft_setelem_expr_at(elem_expr, 0);
|
||||
if (nft_expr_dump(skb, NFTA_SET_ELEM_EXPR, expr) < 0)
|
||||
if (nft_expr_dump(skb, NFTA_SET_ELEM_EXPR, expr, false) < 0)
|
||||
return -1;
|
||||
|
||||
return 0;
|
||||
@ -4957,7 +4968,7 @@ static int nft_set_elem_expr_dump(struct sk_buff *skb,
|
||||
|
||||
nft_setelem_expr_foreach(expr, elem_expr, size) {
|
||||
expr = nft_setelem_expr_at(elem_expr, size);
|
||||
if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr) < 0)
|
||||
if (nft_expr_dump(skb, NFTA_LIST_ELEM, expr, false) < 0)
|
||||
goto nla_put_failure;
|
||||
}
|
||||
nla_nest_end(skb, nest);
|
||||
@ -8311,6 +8322,12 @@ static const struct nfnl_callback nf_tables_cb[NFT_MSG_MAX] = {
|
||||
.attr_count = NFTA_RULE_MAX,
|
||||
.policy = nft_rule_policy,
|
||||
},
|
||||
[NFT_MSG_GETRULE_RESET] = {
|
||||
.call = nf_tables_getrule,
|
||||
.type = NFNL_CB_RCU,
|
||||
.attr_count = NFTA_RULE_MAX,
|
||||
.policy = nft_rule_policy,
|
||||
},
|
||||
[NFT_MSG_DELRULE] = {
|
||||
.call = nf_tables_delrule,
|
||||
.type = NFNL_CB_BATCH,
|
||||
|
@ -232,7 +232,8 @@ static int nft_bitwise_dump_shift(struct sk_buff *skb,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_bitwise_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_bitwise_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_bitwise *priv = nft_expr_priv(expr);
|
||||
int err = 0;
|
||||
@ -393,7 +394,8 @@ static int nft_bitwise_fast_init(const struct nft_ctx *ctx,
|
||||
}
|
||||
|
||||
static int
|
||||
nft_bitwise_fast_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
nft_bitwise_fast_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_bitwise_fast_expr *priv = nft_expr_priv(expr);
|
||||
struct nft_data data;
|
||||
|
@ -148,7 +148,8 @@ static int nft_byteorder_init(const struct nft_ctx *ctx,
|
||||
priv->len);
|
||||
}
|
||||
|
||||
static int nft_byteorder_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_byteorder_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_byteorder *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -92,7 +92,8 @@ static int nft_cmp_init(const struct nft_ctx *ctx, const struct nft_expr *expr,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_cmp_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_cmp_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_cmp_expr *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -253,7 +254,8 @@ static int nft_cmp_fast_offload(struct nft_offload_ctx *ctx,
|
||||
return __nft_cmp_offload(ctx, flow, &cmp);
|
||||
}
|
||||
|
||||
static int nft_cmp_fast_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_cmp_fast_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
|
||||
enum nft_cmp_ops op = priv->inv ? NFT_CMP_NEQ : NFT_CMP_EQ;
|
||||
@ -347,7 +349,8 @@ static int nft_cmp16_fast_offload(struct nft_offload_ctx *ctx,
|
||||
return __nft_cmp_offload(ctx, flow, &cmp);
|
||||
}
|
||||
|
||||
static int nft_cmp16_fast_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_cmp16_fast_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_cmp16_fast_expr *priv = nft_expr_priv(expr);
|
||||
enum nft_cmp_ops op = priv->inv ? NFT_CMP_NEQ : NFT_CMP_EQ;
|
||||
|
@ -324,7 +324,8 @@ static int nft_extension_dump_info(struct sk_buff *skb, int attr,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_target_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_target_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct xt_target *target = expr->ops->data;
|
||||
void *info = nft_expr_priv(expr);
|
||||
@ -572,12 +573,14 @@ nla_put_failure:
|
||||
return -1;
|
||||
}
|
||||
|
||||
static int nft_match_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_match_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
return __nft_match_dump(skb, expr, nft_expr_priv(expr));
|
||||
}
|
||||
|
||||
static int nft_match_large_dump(struct sk_buff *skb, const struct nft_expr *e)
|
||||
static int nft_match_large_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *e, bool reset)
|
||||
{
|
||||
struct nft_xt_match_priv *priv = nft_expr_priv(e);
|
||||
|
||||
|
@ -185,7 +185,8 @@ static void nft_connlimit_eval(const struct nft_expr *expr,
|
||||
nft_connlimit_do_eval(priv, regs, pkt, NULL);
|
||||
}
|
||||
|
||||
static int nft_connlimit_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_connlimit_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_connlimit *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -201,11 +201,12 @@ void nft_counter_eval(const struct nft_expr *expr, struct nft_regs *regs,
|
||||
nft_counter_do_eval(priv, regs, pkt);
|
||||
}
|
||||
|
||||
static int nft_counter_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_counter_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_counter_percpu_priv *priv = nft_expr_priv(expr);
|
||||
|
||||
return nft_counter_do_dump(skb, priv, false);
|
||||
return nft_counter_do_dump(skb, priv, reset);
|
||||
}
|
||||
|
||||
static int nft_counter_init(const struct nft_ctx *ctx,
|
||||
|
@ -641,7 +641,8 @@ static void nft_ct_set_destroy(const struct nft_ctx *ctx,
|
||||
nf_ct_netns_put(ctx->net, ctx->family);
|
||||
}
|
||||
|
||||
static int nft_ct_get_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_ct_get_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_ct *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -703,7 +704,8 @@ static bool nft_ct_get_reduce(struct nft_regs_track *track,
|
||||
return nft_expr_reduce_bitwise(track, expr);
|
||||
}
|
||||
|
||||
static int nft_ct_set_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_ct_set_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_ct *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -44,7 +44,8 @@ static int nft_dup_netdev_init(const struct nft_ctx *ctx,
|
||||
sizeof(int));
|
||||
}
|
||||
|
||||
static int nft_dup_netdev_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_dup_netdev_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_dup_netdev *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -357,7 +357,8 @@ static void nft_dynset_destroy(const struct nft_ctx *ctx,
|
||||
nf_tables_destroy_set(ctx, priv->set);
|
||||
}
|
||||
|
||||
static int nft_dynset_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_dynset_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_dynset *priv = nft_expr_priv(expr);
|
||||
u32 flags = priv->invert ? NFT_DYNSET_F_INV : 0;
|
||||
@ -379,7 +380,7 @@ static int nft_dynset_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
if (priv->set->num_exprs == 0) {
|
||||
if (priv->num_exprs == 1) {
|
||||
if (nft_expr_dump(skb, NFTA_DYNSET_EXPR,
|
||||
priv->expr_array[0]))
|
||||
priv->expr_array[0], reset))
|
||||
goto nla_put_failure;
|
||||
} else if (priv->num_exprs > 1) {
|
||||
struct nlattr *nest;
|
||||
@ -390,7 +391,7 @@ static int nft_dynset_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
|
||||
for (i = 0; i < priv->num_exprs; i++) {
|
||||
if (nft_expr_dump(skb, NFTA_LIST_ELEM,
|
||||
priv->expr_array[i]))
|
||||
priv->expr_array[i], reset))
|
||||
goto nla_put_failure;
|
||||
}
|
||||
nla_nest_end(skb, nest);
|
||||
|
@ -576,7 +576,8 @@ nla_put_failure:
|
||||
return -1;
|
||||
}
|
||||
|
||||
static int nft_exthdr_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_exthdr_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_exthdr *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -586,7 +587,8 @@ static int nft_exthdr_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
return nft_exthdr_dump_common(skb, priv);
|
||||
}
|
||||
|
||||
static int nft_exthdr_dump_set(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_exthdr_dump_set(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_exthdr *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -596,7 +598,8 @@ static int nft_exthdr_dump_set(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
return nft_exthdr_dump_common(skb, priv);
|
||||
}
|
||||
|
||||
static int nft_exthdr_dump_strip(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_exthdr_dump_strip(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_exthdr *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -118,7 +118,7 @@ int nft_fib_init(const struct nft_ctx *ctx, const struct nft_expr *expr,
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(nft_fib_init);
|
||||
|
||||
int nft_fib_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
int nft_fib_dump(struct sk_buff *skb, const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_fib *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -433,7 +433,8 @@ static void nft_flow_offload_destroy(const struct nft_ctx *ctx,
|
||||
nf_ct_netns_put(ctx->net, ctx->family);
|
||||
}
|
||||
|
||||
static int nft_flow_offload_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_flow_offload_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_flow_offload *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -56,7 +56,8 @@ static int nft_fwd_netdev_init(const struct nft_ctx *ctx,
|
||||
sizeof(int));
|
||||
}
|
||||
|
||||
static int nft_fwd_netdev_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_fwd_netdev_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_fwd_netdev *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -186,7 +187,8 @@ static int nft_fwd_neigh_init(const struct nft_ctx *ctx,
|
||||
addr_len);
|
||||
}
|
||||
|
||||
static int nft_fwd_neigh_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_fwd_neigh_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_fwd_neigh *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -139,7 +139,7 @@ static int nft_symhash_init(const struct nft_ctx *ctx,
|
||||
}
|
||||
|
||||
static int nft_jhash_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_jhash *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -176,7 +176,7 @@ static bool nft_jhash_reduce(struct nft_regs_track *track,
|
||||
}
|
||||
|
||||
static int nft_symhash_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_symhash *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -147,7 +147,8 @@ static void nft_immediate_destroy(const struct nft_ctx *ctx,
|
||||
}
|
||||
}
|
||||
|
||||
static int nft_immediate_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_immediate_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_immediate_expr *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -72,7 +72,7 @@ static int nft_inner_parse_l2l3(const struct nft_inner *priv,
|
||||
break;
|
||||
case htons(ETH_P_8021Q):
|
||||
veth = skb_header_pointer(pkt->skb, off, sizeof(_veth), &_veth);
|
||||
if (!eth)
|
||||
if (!veth)
|
||||
return -1;
|
||||
|
||||
outer_llproto = veth->h_vlan_encapsulated_proto;
|
||||
@ -347,7 +347,8 @@ static int nft_inner_init(const struct nft_ctx *ctx,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_inner_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_inner_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_inner *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -358,7 +359,7 @@ static int nft_inner_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
goto nla_put_failure;
|
||||
|
||||
if (nft_expr_dump(skb, NFTA_INNER_EXPR,
|
||||
(struct nft_expr *)&priv->expr) < 0)
|
||||
(struct nft_expr *)&priv->expr, reset) < 0)
|
||||
goto nla_put_failure;
|
||||
|
||||
return 0;
|
||||
|
@ -65,7 +65,8 @@ static void nft_last_eval(const struct nft_expr *expr,
|
||||
WRITE_ONCE(last->set, 1);
|
||||
}
|
||||
|
||||
static int nft_last_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_last_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_last_priv *priv = nft_expr_priv(expr);
|
||||
struct nft_last *last = priv->last;
|
||||
|
@ -193,7 +193,8 @@ static int nft_limit_pkts_init(const struct nft_ctx *ctx,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_limit_pkts_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_limit_pkts_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_limit_priv_pkts *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -251,7 +252,7 @@ static int nft_limit_bytes_init(const struct nft_ctx *ctx,
|
||||
}
|
||||
|
||||
static int nft_limit_bytes_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_limit_priv *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -241,7 +241,8 @@ static void nft_log_destroy(const struct nft_ctx *ctx,
|
||||
nf_logger_put(ctx->family, li->type);
|
||||
}
|
||||
|
||||
static int nft_log_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_log_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_log *priv = nft_expr_priv(expr);
|
||||
const struct nf_loginfo *li = &priv->loginfo;
|
||||
|
@ -178,7 +178,8 @@ static void nft_lookup_destroy(const struct nft_ctx *ctx,
|
||||
nf_tables_destroy_set(ctx, priv->set);
|
||||
}
|
||||
|
||||
static int nft_lookup_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_lookup_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_lookup *priv = nft_expr_priv(expr);
|
||||
u32 flags = priv->invert ? NFT_LOOKUP_F_INV : 0;
|
||||
|
@ -73,7 +73,8 @@ static int nft_masq_init(const struct nft_ctx *ctx,
|
||||
return nf_ct_netns_get(ctx->net, ctx->family);
|
||||
}
|
||||
|
||||
static int nft_masq_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_masq_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_masq *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -669,7 +669,7 @@ int nft_meta_set_init(const struct nft_ctx *ctx,
|
||||
EXPORT_SYMBOL_GPL(nft_meta_set_init);
|
||||
|
||||
int nft_meta_get_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_meta *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -684,7 +684,8 @@ nla_put_failure:
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(nft_meta_get_dump);
|
||||
|
||||
int nft_meta_set_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
int nft_meta_set_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_meta *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -255,7 +255,8 @@ static int nft_nat_init(const struct nft_ctx *ctx, const struct nft_expr *expr,
|
||||
return nf_ct_netns_get(ctx->net, family);
|
||||
}
|
||||
|
||||
static int nft_nat_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_nat_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_nat *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -112,7 +112,8 @@ nla_put_failure:
|
||||
return -1;
|
||||
}
|
||||
|
||||
static int nft_ng_inc_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_ng_inc_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_ng_inc *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -168,7 +169,8 @@ static int nft_ng_random_init(const struct nft_ctx *ctx,
|
||||
NULL, NFT_DATA_VALUE, sizeof(u32));
|
||||
}
|
||||
|
||||
static int nft_ng_random_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_ng_random_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_ng_random *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -47,7 +47,8 @@ static int nft_objref_init(const struct nft_ctx *ctx,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_objref_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_objref_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_object *obj = nft_objref_priv(expr);
|
||||
|
||||
@ -155,7 +156,8 @@ static int nft_objref_map_init(const struct nft_ctx *ctx,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_objref_map_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_objref_map_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_objref_map *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -92,7 +92,8 @@ static int nft_osf_init(const struct nft_ctx *ctx,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_osf_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_osf_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_osf *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -102,8 +102,9 @@ static int __nft_payload_inner_offset(struct nft_pktinfo *pkt)
|
||||
}
|
||||
break;
|
||||
case IPPROTO_GRE: {
|
||||
u32 offset = sizeof(struct gre_base_hdr), version;
|
||||
u32 offset = sizeof(struct gre_base_hdr);
|
||||
struct gre_base_hdr *gre, _gre;
|
||||
__be16 version;
|
||||
|
||||
gre = skb_header_pointer(pkt->skb, thoff, sizeof(_gre), &_gre);
|
||||
if (!gre)
|
||||
@ -230,7 +231,8 @@ static int nft_payload_init(const struct nft_ctx *ctx,
|
||||
priv->len);
|
||||
}
|
||||
|
||||
static int nft_payload_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_payload_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_payload *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -918,7 +920,8 @@ static int nft_payload_set_init(const struct nft_ctx *ctx,
|
||||
priv->len);
|
||||
}
|
||||
|
||||
static int nft_payload_set_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_payload_set_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_payload_set *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -152,7 +152,8 @@ static int nft_queue_sreg_init(const struct nft_ctx *ctx,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int nft_queue_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_queue_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_queue *priv = nft_expr_priv(expr);
|
||||
|
||||
@ -168,7 +169,8 @@ nla_put_failure:
|
||||
}
|
||||
|
||||
static int
|
||||
nft_queue_sreg_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
nft_queue_sreg_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_queue *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -217,11 +217,12 @@ static int nft_quota_init(const struct nft_ctx *ctx,
|
||||
return nft_quota_do_init(tb, priv);
|
||||
}
|
||||
|
||||
static int nft_quota_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_quota_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_quota *priv = nft_expr_priv(expr);
|
||||
|
||||
return nft_quota_do_dump(skb, priv, false);
|
||||
return nft_quota_do_dump(skb, priv, reset);
|
||||
}
|
||||
|
||||
static void nft_quota_destroy(const struct nft_ctx *ctx,
|
||||
|
@ -111,7 +111,8 @@ err1:
|
||||
return err;
|
||||
}
|
||||
|
||||
static int nft_range_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_range_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_range_expr *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -75,7 +75,8 @@ static int nft_redir_init(const struct nft_ctx *ctx,
|
||||
return nf_ct_netns_get(ctx->net, ctx->family);
|
||||
}
|
||||
|
||||
static int nft_redir_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_redir_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_redir *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -69,7 +69,8 @@ int nft_reject_init(const struct nft_ctx *ctx,
|
||||
}
|
||||
EXPORT_SYMBOL_GPL(nft_reject_init);
|
||||
|
||||
int nft_reject_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
int nft_reject_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_reject *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -146,7 +146,7 @@ static int nft_rt_get_init(const struct nft_ctx *ctx,
|
||||
}
|
||||
|
||||
static int nft_rt_get_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_rt *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -199,7 +199,7 @@ static int nft_socket_init(const struct nft_ctx *ctx,
|
||||
}
|
||||
|
||||
static int nft_socket_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_socket *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -272,7 +272,8 @@ static void nft_synproxy_destroy(const struct nft_ctx *ctx,
|
||||
nft_synproxy_do_destroy(ctx);
|
||||
}
|
||||
|
||||
static int nft_synproxy_dump(struct sk_buff *skb, const struct nft_expr *expr)
|
||||
static int nft_synproxy_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
struct nft_synproxy *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -294,7 +294,7 @@ static void nft_tproxy_destroy(const struct nft_ctx *ctx,
|
||||
}
|
||||
|
||||
static int nft_tproxy_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_tproxy *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -108,7 +108,7 @@ static int nft_tunnel_get_init(const struct nft_ctx *ctx,
|
||||
}
|
||||
|
||||
static int nft_tunnel_get_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_tunnel *priv = nft_expr_priv(expr);
|
||||
|
||||
|
@ -212,7 +212,7 @@ static void nft_xfrm_get_eval(const struct nft_expr *expr,
|
||||
}
|
||||
|
||||
static int nft_xfrm_get_dump(struct sk_buff *skb,
|
||||
const struct nft_expr *expr)
|
||||
const struct nft_expr *expr, bool reset)
|
||||
{
|
||||
const struct nft_xfrm *priv = nft_expr_priv(expr);
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user