Commit 1c5fc27b authored by David S. Miller's avatar David S. Miller

Merge tag 'nf-next-24-06-28' of...

Merge tag 'nf-next-24-06-28' of git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next into main

Pablo Neira Ayuso says:

====================
Netfilter/IPVS updates for net-next

The following patchset contains Netfilter/IPVS updates for net-next:

Patch #1 to #11 to shrink memory consumption for transaction objects:

  struct nft_trans_chain { /* size: 120 (-32), cachelines: 2, members: 10 */
  struct nft_trans_elem { /* size: 72 (-40), cachelines: 2, members: 4 */
  struct nft_trans_flowtable { /* size: 80 (-48), cachelines: 2, members: 5 */
  struct nft_trans_obj { /* size: 72 (-40), cachelines: 2, members: 4 */
  struct nft_trans_rule { /* size: 80 (-32), cachelines: 2, members: 6 */
  struct nft_trans_set { /* size: 96 (-24), cachelines: 2, members: 8 */
  struct nft_trans_table { /* size: 56 (-40), cachelines: 1, members: 2 */

  struct nft_trans_elem can now be allocated from kmalloc-96 instead of
  kmalloc-128 slab.

  Series from Florian Westphal. For the record, I have mangled patch #1
  to add nft_trans_container_*() and use if for every transaction object.
   I have also added BUILD_BUG_ON to ensure struct nft_trans always comes
  at the beginning of the container transaction object. And few minor
  cleanups, any new bugs are of my own.

Patch #12 simplify check for SCTP GSO in IPVS, from Ismael Luceno.

Patch #13 nf_conncount key length remains in the u32 bound, from Yunjian Wang.

Patch #14 removes unnecessary check for CTA_TIMEOUT_L3PROTO when setting
          default conntrack timeouts via nfnetlink_cttimeout API, from
          Lin Ma.

Patch #15 updates NFT_SECMARK_CTX_MAXLEN to 4096, SELinux could use
          larger secctx names than the existing 256 bytes length.

Patch #16 adds a selftest to exercise nfnetlink_queue listeners leaving
          nfnetlink_queue, from Florian Westphal.

Patch #17 increases hitcount from 255 to 65535 in xt_recent, from Phil Sutter.
====================
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parents a051091c f4ebd034
...@@ -1176,7 +1176,7 @@ static inline bool nft_chain_is_bound(struct nft_chain *chain) ...@@ -1176,7 +1176,7 @@ static inline bool nft_chain_is_bound(struct nft_chain *chain)
int nft_chain_add(struct nft_table *table, struct nft_chain *chain); int nft_chain_add(struct nft_table *table, struct nft_chain *chain);
void nft_chain_del(struct nft_chain *chain); void nft_chain_del(struct nft_chain *chain);
void nf_tables_chain_destroy(struct nft_ctx *ctx); void nf_tables_chain_destroy(struct nft_chain *chain);
struct nft_stats { struct nft_stats {
u64 bytes; u64 bytes;
...@@ -1613,41 +1613,67 @@ static inline int nft_set_elem_is_dead(const struct nft_set_ext *ext) ...@@ -1613,41 +1613,67 @@ static inline int nft_set_elem_is_dead(const struct nft_set_ext *ext)
} }
/** /**
* struct nft_trans - nf_tables object update in transaction * struct nft_trans - nf_tables object update in transaction
* *
* @list: used internally * @list: used internally
* @binding_list: list of objects with possible bindings * @net: struct net
* @msg_type: message type * @table: struct nft_table the object resides in
* @put_net: ctx->net needs to be put * @msg_type: message type
* @ctx: transaction context * @seq: netlink sequence number
* @data: internal information related to the transaction * @flags: modifiers to new request
* @report: notify via unicast netlink message
* @put_net: net needs to be put
*
* This is the information common to all objects in the transaction,
* this must always be the first member of derived sub-types.
*/ */
struct nft_trans { struct nft_trans {
struct list_head list; struct list_head list;
struct list_head binding_list; struct net *net;
struct nft_table *table;
int msg_type; int msg_type;
bool put_net; u32 seq;
struct nft_ctx ctx; u16 flags;
char data[]; u8 report:1;
u8 put_net:1;
};
/**
* struct nft_trans_binding - nf_tables object with binding support in transaction
* @nft_trans: base structure, MUST be first member
* @binding_list: list of objects with possible bindings
*
* This is the base type used by objects that can be bound to a chain.
*/
struct nft_trans_binding {
struct nft_trans nft_trans;
struct list_head binding_list;
}; };
struct nft_trans_rule { struct nft_trans_rule {
struct nft_trans nft_trans;
struct nft_rule *rule; struct nft_rule *rule;
struct nft_chain *chain;
struct nft_flow_rule *flow; struct nft_flow_rule *flow;
u32 rule_id; u32 rule_id;
bool bound; bool bound;
}; };
#define nft_trans_rule(trans) \ #define nft_trans_container_rule(trans) \
(((struct nft_trans_rule *)trans->data)->rule) container_of(trans, struct nft_trans_rule, nft_trans)
#define nft_trans_flow_rule(trans) \ #define nft_trans_rule(trans) \
(((struct nft_trans_rule *)trans->data)->flow) nft_trans_container_rule(trans)->rule
#define nft_trans_rule_id(trans) \ #define nft_trans_flow_rule(trans) \
(((struct nft_trans_rule *)trans->data)->rule_id) nft_trans_container_rule(trans)->flow
#define nft_trans_rule_bound(trans) \ #define nft_trans_rule_id(trans) \
(((struct nft_trans_rule *)trans->data)->bound) nft_trans_container_rule(trans)->rule_id
#define nft_trans_rule_bound(trans) \
nft_trans_container_rule(trans)->bound
#define nft_trans_rule_chain(trans) \
nft_trans_container_rule(trans)->chain
struct nft_trans_set { struct nft_trans_set {
struct nft_trans_binding nft_trans_binding;
struct nft_set *set; struct nft_set *set;
u32 set_id; u32 set_id;
u32 gc_int; u32 gc_int;
...@@ -1657,100 +1683,117 @@ struct nft_trans_set { ...@@ -1657,100 +1683,117 @@ struct nft_trans_set {
u32 size; u32 size;
}; };
#define nft_trans_set(trans) \ #define nft_trans_container_set(t) \
(((struct nft_trans_set *)trans->data)->set) container_of(t, struct nft_trans_set, nft_trans_binding.nft_trans)
#define nft_trans_set_id(trans) \ #define nft_trans_set(trans) \
(((struct nft_trans_set *)trans->data)->set_id) nft_trans_container_set(trans)->set
#define nft_trans_set_bound(trans) \ #define nft_trans_set_id(trans) \
(((struct nft_trans_set *)trans->data)->bound) nft_trans_container_set(trans)->set_id
#define nft_trans_set_update(trans) \ #define nft_trans_set_bound(trans) \
(((struct nft_trans_set *)trans->data)->update) nft_trans_container_set(trans)->bound
#define nft_trans_set_timeout(trans) \ #define nft_trans_set_update(trans) \
(((struct nft_trans_set *)trans->data)->timeout) nft_trans_container_set(trans)->update
#define nft_trans_set_gc_int(trans) \ #define nft_trans_set_timeout(trans) \
(((struct nft_trans_set *)trans->data)->gc_int) nft_trans_container_set(trans)->timeout
#define nft_trans_set_size(trans) \ #define nft_trans_set_gc_int(trans) \
(((struct nft_trans_set *)trans->data)->size) nft_trans_container_set(trans)->gc_int
#define nft_trans_set_size(trans) \
nft_trans_container_set(trans)->size
struct nft_trans_chain { struct nft_trans_chain {
struct nft_trans_binding nft_trans_binding;
struct nft_chain *chain; struct nft_chain *chain;
bool update;
char *name; char *name;
struct nft_stats __percpu *stats; struct nft_stats __percpu *stats;
u8 policy; u8 policy;
bool update;
bool bound; bool bound;
u32 chain_id; u32 chain_id;
struct nft_base_chain *basechain; struct nft_base_chain *basechain;
struct list_head hook_list; struct list_head hook_list;
}; };
#define nft_trans_chain(trans) \ #define nft_trans_container_chain(t) \
(((struct nft_trans_chain *)trans->data)->chain) container_of(t, struct nft_trans_chain, nft_trans_binding.nft_trans)
#define nft_trans_chain_update(trans) \ #define nft_trans_chain(trans) \
(((struct nft_trans_chain *)trans->data)->update) nft_trans_container_chain(trans)->chain
#define nft_trans_chain_name(trans) \ #define nft_trans_chain_update(trans) \
(((struct nft_trans_chain *)trans->data)->name) nft_trans_container_chain(trans)->update
#define nft_trans_chain_stats(trans) \ #define nft_trans_chain_name(trans) \
(((struct nft_trans_chain *)trans->data)->stats) nft_trans_container_chain(trans)->name
#define nft_trans_chain_policy(trans) \ #define nft_trans_chain_stats(trans) \
(((struct nft_trans_chain *)trans->data)->policy) nft_trans_container_chain(trans)->stats
#define nft_trans_chain_bound(trans) \ #define nft_trans_chain_policy(trans) \
(((struct nft_trans_chain *)trans->data)->bound) nft_trans_container_chain(trans)->policy
#define nft_trans_chain_id(trans) \ #define nft_trans_chain_bound(trans) \
(((struct nft_trans_chain *)trans->data)->chain_id) nft_trans_container_chain(trans)->bound
#define nft_trans_basechain(trans) \ #define nft_trans_chain_id(trans) \
(((struct nft_trans_chain *)trans->data)->basechain) nft_trans_container_chain(trans)->chain_id
#define nft_trans_chain_hooks(trans) \ #define nft_trans_basechain(trans) \
(((struct nft_trans_chain *)trans->data)->hook_list) nft_trans_container_chain(trans)->basechain
#define nft_trans_chain_hooks(trans) \
nft_trans_container_chain(trans)->hook_list
struct nft_trans_table { struct nft_trans_table {
struct nft_trans nft_trans;
bool update; bool update;
}; };
#define nft_trans_table_update(trans) \ #define nft_trans_container_table(trans) \
(((struct nft_trans_table *)trans->data)->update) container_of(trans, struct nft_trans_table, nft_trans)
#define nft_trans_table_update(trans) \
nft_trans_container_table(trans)->update
struct nft_trans_elem { struct nft_trans_elem {
struct nft_trans nft_trans;
struct nft_set *set; struct nft_set *set;
struct nft_elem_priv *elem_priv; struct nft_elem_priv *elem_priv;
bool bound; bool bound;
}; };
#define nft_trans_elem_set(trans) \ #define nft_trans_container_elem(t) \
(((struct nft_trans_elem *)trans->data)->set) container_of(t, struct nft_trans_elem, nft_trans)
#define nft_trans_elem_priv(trans) \ #define nft_trans_elem_set(trans) \
(((struct nft_trans_elem *)trans->data)->elem_priv) nft_trans_container_elem(trans)->set
#define nft_trans_elem_set_bound(trans) \ #define nft_trans_elem_priv(trans) \
(((struct nft_trans_elem *)trans->data)->bound) nft_trans_container_elem(trans)->elem_priv
#define nft_trans_elem_set_bound(trans) \
nft_trans_container_elem(trans)->bound
struct nft_trans_obj { struct nft_trans_obj {
struct nft_trans nft_trans;
struct nft_object *obj; struct nft_object *obj;
struct nft_object *newobj; struct nft_object *newobj;
bool update; bool update;
}; };
#define nft_trans_obj(trans) \ #define nft_trans_container_obj(t) \
(((struct nft_trans_obj *)trans->data)->obj) container_of(t, struct nft_trans_obj, nft_trans)
#define nft_trans_obj_newobj(trans) \ #define nft_trans_obj(trans) \
(((struct nft_trans_obj *)trans->data)->newobj) nft_trans_container_obj(trans)->obj
#define nft_trans_obj_update(trans) \ #define nft_trans_obj_newobj(trans) \
(((struct nft_trans_obj *)trans->data)->update) nft_trans_container_obj(trans)->newobj
#define nft_trans_obj_update(trans) \
nft_trans_container_obj(trans)->update
struct nft_trans_flowtable { struct nft_trans_flowtable {
struct nft_trans nft_trans;
struct nft_flowtable *flowtable; struct nft_flowtable *flowtable;
bool update;
struct list_head hook_list; struct list_head hook_list;
u32 flags; u32 flags;
bool update;
}; };
#define nft_trans_flowtable(trans) \ #define nft_trans_container_flowtable(t) \
(((struct nft_trans_flowtable *)trans->data)->flowtable) container_of(t, struct nft_trans_flowtable, nft_trans)
#define nft_trans_flowtable_update(trans) \ #define nft_trans_flowtable(trans) \
(((struct nft_trans_flowtable *)trans->data)->update) nft_trans_container_flowtable(trans)->flowtable
#define nft_trans_flowtable_hooks(trans) \ #define nft_trans_flowtable_update(trans) \
(((struct nft_trans_flowtable *)trans->data)->hook_list) nft_trans_container_flowtable(trans)->update
#define nft_trans_flowtable_flags(trans) \ #define nft_trans_flowtable_hooks(trans) \
(((struct nft_trans_flowtable *)trans->data)->flags) nft_trans_container_flowtable(trans)->hook_list
#define nft_trans_flowtable_flags(trans) \
nft_trans_container_flowtable(trans)->flags
#define NFT_TRANS_GC_BATCHCOUNT 256 #define NFT_TRANS_GC_BATCHCOUNT 256
...@@ -1764,6 +1807,33 @@ struct nft_trans_gc { ...@@ -1764,6 +1807,33 @@ struct nft_trans_gc {
struct rcu_head rcu; struct rcu_head rcu;
}; };
static inline void nft_ctx_update(struct nft_ctx *ctx,
const struct nft_trans *trans)
{
switch (trans->msg_type) {
case NFT_MSG_NEWRULE:
case NFT_MSG_DELRULE:
case NFT_MSG_DESTROYRULE:
ctx->chain = nft_trans_rule_chain(trans);
break;
case NFT_MSG_NEWCHAIN:
case NFT_MSG_DELCHAIN:
case NFT_MSG_DESTROYCHAIN:
ctx->chain = nft_trans_chain(trans);
break;
default:
ctx->chain = NULL;
break;
}
ctx->net = trans->net;
ctx->table = trans->table;
ctx->family = trans->table->family;
ctx->report = trans->report;
ctx->flags = trans->flags;
ctx->seq = trans->seq;
}
struct nft_trans_gc *nft_trans_gc_alloc(struct nft_set *set, struct nft_trans_gc *nft_trans_gc_alloc(struct nft_set *set,
unsigned int gc_seq, gfp_t gfp); unsigned int gc_seq, gfp_t gfp);
void nft_trans_gc_destroy(struct nft_trans_gc *trans); void nft_trans_gc_destroy(struct nft_trans_gc *trans);
......
...@@ -1376,7 +1376,7 @@ enum nft_secmark_attributes { ...@@ -1376,7 +1376,7 @@ enum nft_secmark_attributes {
#define NFTA_SECMARK_MAX (__NFTA_SECMARK_MAX - 1) #define NFTA_SECMARK_MAX (__NFTA_SECMARK_MAX - 1)
/* Max security context length */ /* Max security context length */
#define NFT_SECMARK_CTX_MAXLEN 256 #define NFT_SECMARK_CTX_MAXLEN 4096
/** /**
* enum nft_reject_types - nf_tables reject expression reject types * enum nft_reject_types - nf_tables reject expression reject types
......
...@@ -126,7 +126,7 @@ sctp_snat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp, ...@@ -126,7 +126,7 @@ sctp_snat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
if (sctph->source != cp->vport || payload_csum || if (sctph->source != cp->vport || payload_csum ||
skb->ip_summed == CHECKSUM_PARTIAL) { skb->ip_summed == CHECKSUM_PARTIAL) {
sctph->source = cp->vport; sctph->source = cp->vport;
if (!skb_is_gso(skb) || !skb_is_gso_sctp(skb)) if (!skb_is_gso(skb))
sctp_nat_csum(skb, sctph, sctphoff); sctp_nat_csum(skb, sctph, sctphoff);
} else { } else {
skb->ip_summed = CHECKSUM_UNNECESSARY; skb->ip_summed = CHECKSUM_UNNECESSARY;
...@@ -175,7 +175,7 @@ sctp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp, ...@@ -175,7 +175,7 @@ sctp_dnat_handler(struct sk_buff *skb, struct ip_vs_protocol *pp,
(skb->ip_summed == CHECKSUM_PARTIAL && (skb->ip_summed == CHECKSUM_PARTIAL &&
!(skb_dst(skb)->dev->features & NETIF_F_SCTP_CRC))) { !(skb_dst(skb)->dev->features & NETIF_F_SCTP_CRC))) {
sctph->dest = cp->dport; sctph->dest = cp->dport;
if (!skb_is_gso(skb) || !skb_is_gso_sctp(skb)) if (!skb_is_gso(skb))
sctp_nat_csum(skb, sctph, sctphoff); sctp_nat_csum(skb, sctph, sctphoff);
} else if (skb->ip_summed != CHECKSUM_PARTIAL) { } else if (skb->ip_summed != CHECKSUM_PARTIAL) {
skb->ip_summed = CHECKSUM_UNNECESSARY; skb->ip_summed = CHECKSUM_UNNECESSARY;
......
...@@ -321,7 +321,6 @@ insert_tree(struct net *net, ...@@ -321,7 +321,6 @@ insert_tree(struct net *net,
struct nf_conncount_rb *rbconn; struct nf_conncount_rb *rbconn;
struct nf_conncount_tuple *conn; struct nf_conncount_tuple *conn;
unsigned int count = 0, gc_count = 0; unsigned int count = 0, gc_count = 0;
u8 keylen = data->keylen;
bool do_gc = true; bool do_gc = true;
spin_lock_bh(&nf_conncount_locks[hash]); spin_lock_bh(&nf_conncount_locks[hash]);
...@@ -333,7 +332,7 @@ insert_tree(struct net *net, ...@@ -333,7 +332,7 @@ insert_tree(struct net *net,
rbconn = rb_entry(*rbnode, struct nf_conncount_rb, node); rbconn = rb_entry(*rbnode, struct nf_conncount_rb, node);
parent = *rbnode; parent = *rbnode;
diff = key_diff(key, rbconn->key, keylen); diff = key_diff(key, rbconn->key, data->keylen);
if (diff < 0) { if (diff < 0) {
rbnode = &((*rbnode)->rb_left); rbnode = &((*rbnode)->rb_left);
} else if (diff > 0) { } else if (diff > 0) {
...@@ -378,7 +377,7 @@ insert_tree(struct net *net, ...@@ -378,7 +377,7 @@ insert_tree(struct net *net,
conn->tuple = *tuple; conn->tuple = *tuple;
conn->zone = *zone; conn->zone = *zone;
memcpy(rbconn->key, key, sizeof(u32) * keylen); memcpy(rbconn->key, key, sizeof(u32) * data->keylen);
nf_conncount_list_init(&rbconn->list); nf_conncount_list_init(&rbconn->list);
list_add(&conn->node, &rbconn->list.head); list_add(&conn->node, &rbconn->list.head);
...@@ -403,7 +402,6 @@ count_tree(struct net *net, ...@@ -403,7 +402,6 @@ count_tree(struct net *net,
struct rb_node *parent; struct rb_node *parent;
struct nf_conncount_rb *rbconn; struct nf_conncount_rb *rbconn;
unsigned int hash; unsigned int hash;
u8 keylen = data->keylen;
hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS; hash = jhash2(key, data->keylen, conncount_rnd) % CONNCOUNT_SLOTS;
root = &data->root[hash]; root = &data->root[hash];
...@@ -414,7 +412,7 @@ count_tree(struct net *net, ...@@ -414,7 +412,7 @@ count_tree(struct net *net,
rbconn = rb_entry(parent, struct nf_conncount_rb, node); rbconn = rb_entry(parent, struct nf_conncount_rb, node);
diff = key_diff(key, rbconn->key, keylen); diff = key_diff(key, rbconn->key, data->keylen);
if (diff < 0) { if (diff < 0) {
parent = rcu_dereference_raw(parent->rb_left); parent = rcu_dereference_raw(parent->rb_left);
} else if (diff > 0) { } else if (diff > 0) {
......
This diff is collapsed.
...@@ -513,38 +513,38 @@ static void nft_flow_rule_offload_abort(struct net *net, ...@@ -513,38 +513,38 @@ static void nft_flow_rule_offload_abort(struct net *net,
int err = 0; int err = 0;
list_for_each_entry_continue_reverse(trans, &nft_net->commit_list, list) { list_for_each_entry_continue_reverse(trans, &nft_net->commit_list, list) {
if (trans->ctx.family != NFPROTO_NETDEV) if (trans->table->family != NFPROTO_NETDEV)
continue; continue;
switch (trans->msg_type) { switch (trans->msg_type) {
case NFT_MSG_NEWCHAIN: case NFT_MSG_NEWCHAIN:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD) || if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD) ||
nft_trans_chain_update(trans)) nft_trans_chain_update(trans))
continue; continue;
err = nft_flow_offload_chain(trans->ctx.chain, NULL, err = nft_flow_offload_chain(nft_trans_chain(trans), NULL,
FLOW_BLOCK_UNBIND); FLOW_BLOCK_UNBIND);
break; break;
case NFT_MSG_DELCHAIN: case NFT_MSG_DELCHAIN:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)) if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
continue; continue;
err = nft_flow_offload_chain(trans->ctx.chain, NULL, err = nft_flow_offload_chain(nft_trans_chain(trans), NULL,
FLOW_BLOCK_BIND); FLOW_BLOCK_BIND);
break; break;
case NFT_MSG_NEWRULE: case NFT_MSG_NEWRULE:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)) if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
continue; continue;
err = nft_flow_offload_rule(trans->ctx.chain, err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
nft_trans_rule(trans), nft_trans_rule(trans),
NULL, FLOW_CLS_DESTROY); NULL, FLOW_CLS_DESTROY);
break; break;
case NFT_MSG_DELRULE: case NFT_MSG_DELRULE:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)) if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
continue; continue;
err = nft_flow_offload_rule(trans->ctx.chain, err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
nft_trans_rule(trans), nft_trans_rule(trans),
nft_trans_flow_rule(trans), nft_trans_flow_rule(trans),
FLOW_CLS_REPLACE); FLOW_CLS_REPLACE);
...@@ -564,46 +564,46 @@ int nft_flow_rule_offload_commit(struct net *net) ...@@ -564,46 +564,46 @@ int nft_flow_rule_offload_commit(struct net *net)
u8 policy; u8 policy;
list_for_each_entry(trans, &nft_net->commit_list, list) { list_for_each_entry(trans, &nft_net->commit_list, list) {
if (trans->ctx.family != NFPROTO_NETDEV) if (trans->table->family != NFPROTO_NETDEV)
continue; continue;
switch (trans->msg_type) { switch (trans->msg_type) {
case NFT_MSG_NEWCHAIN: case NFT_MSG_NEWCHAIN:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD) || if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD) ||
nft_trans_chain_update(trans)) nft_trans_chain_update(trans))
continue; continue;
policy = nft_trans_chain_policy(trans); policy = nft_trans_chain_policy(trans);
err = nft_flow_offload_chain(trans->ctx.chain, &policy, err = nft_flow_offload_chain(nft_trans_chain(trans), &policy,
FLOW_BLOCK_BIND); FLOW_BLOCK_BIND);
break; break;
case NFT_MSG_DELCHAIN: case NFT_MSG_DELCHAIN:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)) if (!(nft_trans_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
continue; continue;
policy = nft_trans_chain_policy(trans); policy = nft_trans_chain_policy(trans);
err = nft_flow_offload_chain(trans->ctx.chain, &policy, err = nft_flow_offload_chain(nft_trans_chain(trans), &policy,
FLOW_BLOCK_UNBIND); FLOW_BLOCK_UNBIND);
break; break;
case NFT_MSG_NEWRULE: case NFT_MSG_NEWRULE:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)) if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
continue; continue;
if (trans->ctx.flags & NLM_F_REPLACE || if (trans->flags & NLM_F_REPLACE ||
!(trans->ctx.flags & NLM_F_APPEND)) { !(trans->flags & NLM_F_APPEND)) {
err = -EOPNOTSUPP; err = -EOPNOTSUPP;
break; break;
} }
err = nft_flow_offload_rule(trans->ctx.chain, err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
nft_trans_rule(trans), nft_trans_rule(trans),
nft_trans_flow_rule(trans), nft_trans_flow_rule(trans),
FLOW_CLS_REPLACE); FLOW_CLS_REPLACE);
break; break;
case NFT_MSG_DELRULE: case NFT_MSG_DELRULE:
if (!(trans->ctx.chain->flags & NFT_CHAIN_HW_OFFLOAD)) if (!(nft_trans_rule_chain(trans)->flags & NFT_CHAIN_HW_OFFLOAD))
continue; continue;
err = nft_flow_offload_rule(trans->ctx.chain, err = nft_flow_offload_rule(nft_trans_rule_chain(trans),
nft_trans_rule(trans), nft_trans_rule(trans),
NULL, FLOW_CLS_DESTROY); NULL, FLOW_CLS_DESTROY);
break; break;
......
...@@ -366,8 +366,7 @@ static int cttimeout_default_set(struct sk_buff *skb, ...@@ -366,8 +366,7 @@ static int cttimeout_default_set(struct sk_buff *skb,
__u8 l4num; __u8 l4num;
int ret; int ret;
if (!cda[CTA_TIMEOUT_L3PROTO] || if (!cda[CTA_TIMEOUT_L4PROTO] ||
!cda[CTA_TIMEOUT_L4PROTO] ||
!cda[CTA_TIMEOUT_DATA]) !cda[CTA_TIMEOUT_DATA])
return -EINVAL; return -EINVAL;
......
...@@ -221,7 +221,7 @@ static void nft_immediate_destroy(const struct nft_ctx *ctx, ...@@ -221,7 +221,7 @@ static void nft_immediate_destroy(const struct nft_ctx *ctx,
list_del(&rule->list); list_del(&rule->list);
nf_tables_rule_destroy(&chain_ctx, rule); nf_tables_rule_destroy(&chain_ctx, rule);
} }
nf_tables_chain_destroy(&chain_ctx); nf_tables_chain_destroy(chain);
break; break;
default: default:
break; break;
......
...@@ -59,9 +59,9 @@ MODULE_PARM_DESC(ip_list_gid, "default owning group of /proc/net/xt_recent/* fil ...@@ -59,9 +59,9 @@ MODULE_PARM_DESC(ip_list_gid, "default owning group of /proc/net/xt_recent/* fil
/* retained for backwards compatibility */ /* retained for backwards compatibility */
static unsigned int ip_pkt_list_tot __read_mostly; static unsigned int ip_pkt_list_tot __read_mostly;
module_param(ip_pkt_list_tot, uint, 0400); module_param(ip_pkt_list_tot, uint, 0400);
MODULE_PARM_DESC(ip_pkt_list_tot, "number of packets per IP address to remember (max. 255)"); MODULE_PARM_DESC(ip_pkt_list_tot, "number of packets per IP address to remember (max. 65535)");
#define XT_RECENT_MAX_NSTAMPS 256 #define XT_RECENT_MAX_NSTAMPS 65536
struct recent_entry { struct recent_entry {
struct list_head list; struct list_head list;
...@@ -69,7 +69,7 @@ struct recent_entry { ...@@ -69,7 +69,7 @@ struct recent_entry {
union nf_inet_addr addr; union nf_inet_addr addr;
u_int16_t family; u_int16_t family;
u_int8_t ttl; u_int8_t ttl;
u_int8_t index; u_int16_t index;
u_int16_t nstamps; u_int16_t nstamps;
unsigned long stamps[]; unsigned long stamps[];
}; };
...@@ -80,7 +80,7 @@ struct recent_table { ...@@ -80,7 +80,7 @@ struct recent_table {
union nf_inet_addr mask; union nf_inet_addr mask;
unsigned int refcnt; unsigned int refcnt;
unsigned int entries; unsigned int entries;
u8 nstamps_max_mask; u_int16_t nstamps_max_mask;
struct list_head lru_list; struct list_head lru_list;
struct list_head iphash[]; struct list_head iphash[];
}; };
......
...@@ -375,6 +375,42 @@ EOF ...@@ -375,6 +375,42 @@ EOF
wait 2>/dev/null wait 2>/dev/null
} }
test_queue_removal()
{
read tainted_then < /proc/sys/kernel/tainted
ip netns exec "$ns1" nft -f - <<EOF
flush ruleset
table ip filter {
chain output {
type filter hook output priority 0; policy accept;
ip protocol icmp queue num 0
}
}
EOF
ip netns exec "$ns1" ./nf_queue -q 0 -d 30000 -t "$timeout" &
local nfqpid=$!
busywait "$BUSYWAIT_TIMEOUT" nf_queue_wait "$ns1" 0
ip netns exec "$ns1" ping -w 2 -f -c 10 127.0.0.1 -q >/dev/null
kill $nfqpid
ip netns exec "$ns1" nft flush ruleset
if [ "$tainted_then" -ne 0 ];then
return
fi
read tainted_now < /proc/sys/kernel/tainted
if [ "$tainted_now" -eq 0 ];then
echo "PASS: queue program exiting while packets queued"
else
echo "TAINT: queue program exiting while packets queued"
ret=1
fi
}
ip netns exec "$nsrouter" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null ip netns exec "$nsrouter" sysctl net.ipv6.conf.all.forwarding=1 > /dev/null
ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth0.forwarding=1 > /dev/null ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth0.forwarding=1 > /dev/null
ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth1.forwarding=1 > /dev/null ip netns exec "$nsrouter" sysctl net.ipv4.conf.veth1.forwarding=1 > /dev/null
...@@ -413,5 +449,6 @@ test_tcp_localhost ...@@ -413,5 +449,6 @@ test_tcp_localhost
test_tcp_localhost_connectclose test_tcp_localhost_connectclose
test_tcp_localhost_requeue test_tcp_localhost_requeue
test_icmp_vrf test_icmp_vrf
test_queue_removal
exit $ret exit $ret
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment