netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Pablo Neira Ayuso <pablo@netfilter.org>
To: netfilter-devel@vger.kernel.org
Cc: kaber@trash.net
Subject: [PATCH 4/7] netfilter: nf_tables: better encapsulation for the rule transaction code
Date: Thu, 27 Mar 2014 22:53:14 +0100	[thread overview]
Message-ID: <1395957197-4899-5-git-send-email-pablo@netfilter.org> (raw)
In-Reply-To: <1395957197-4899-1-git-send-email-pablo@netfilter.org>

Another cleanup to accomodate set, chain and table transaction support.
Move the rule transaction code to several functions to avoid too large
commit and abort routines.

Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
---
 net/netfilter/nf_tables_api.c |  102 ++++++++++++++++++++++++++++-------------
 1 file changed, 69 insertions(+), 33 deletions(-)

diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c
index 9a0aad5..4d4d5fc 100644
--- a/net/netfilter/nf_tables_api.c
+++ b/net/netfilter/nf_tables_api.c
@@ -2915,6 +2915,32 @@ static const struct nfnl_callback nf_tables_cb[NFT_MSG_MAX] = {
 	},
 };
 
+static void nft_rule_commit_update(struct net *net, struct sk_buff *skb,
+				   struct nft_trans *trans)
+{
+	/* This rule was inactive in the past and just became active.
+	 * Clear the next bit of the genmask since its meaning has
+	 * changed, now it is the future.
+	 */
+	if (nft_rule_is_active(net, trans->rule)) {
+		nft_rule_clear(net, trans->rule);
+		nf_tables_rule_notify(skb, trans->ctx.nlh,
+				      trans->ctx.table, trans->ctx.chain,
+				      trans->rule, NFT_MSG_NEWRULE, 0,
+				      trans->ctx.afi->family);
+		list_del(&trans->list);
+		kfree(trans);
+		return;
+	}
+
+	/* This rule is in the past, get rid of it */
+	list_del_rcu(&trans->rule->list);
+	nf_tables_rule_notify(skb, trans->ctx.nlh,
+			      trans->ctx.table, trans->ctx.chain,
+			      trans->rule, NFT_MSG_DELRULE, 0,
+			      trans->ctx.afi->family);
+}
+
 static int nf_tables_commit(struct sk_buff *skb)
 {
 	struct net *net = sock_net(skb->sk);
@@ -2927,70 +2953,80 @@ static int nf_tables_commit(struct sk_buff *skb)
 	net->nft.gencursor = gencursor_next(net);
 
 	/* Make sure all packets have left the previous generation before
-	 * purging old rules.
+	 * purging old objects.
 	 */
 	synchronize_rcu();
 
 	list_for_each_entry_safe(trans, next, &net->nft.commit_list, list) {
-		/* This rule was inactive in the past and just became active.
-		 * Clear the next bit of the genmask since its meaning has
-		 * changed, now it is the future.
-		 */
-		if (nft_rule_is_active(net, trans->rule)) {
-			nft_rule_clear(net, trans->rule);
-			nf_tables_rule_notify(skb, trans->ctx.nlh,
-					      trans->ctx.table, trans->ctx.chain,
-					      trans->rule, NFT_MSG_NEWRULE, 0,
-					      trans->ctx.afi->family);
-			list_del(&trans->list);
-			kfree(trans);
-			continue;
+		switch (trans->type) {
+		case NFT_TRANS_RULE:
+			nft_rule_commit_update(net, skb, trans);
+			break;
 		}
-
-		/* This rule is in the past, get rid of it */
-		list_del_rcu(&trans->rule->list);
-		nf_tables_rule_notify(skb, trans->ctx.nlh,
-				      trans->ctx.table, trans->ctx.chain,
-				      trans->rule, NFT_MSG_DELRULE, 0,
-				      trans->ctx.afi->family);
 	}
 
-	/* Make sure we don't see any packet traversing old rules */
+	/* Make sure we don't see any packet traversing old objects */
 	synchronize_rcu();
 
-	/* Now we can safely release unused old rules */
+	/* Now we can safely release unused old objects */
 	list_for_each_entry_safe(trans, next, &net->nft.commit_list, list) {
-		nf_tables_rule_destroy(&trans->ctx, trans->rule);
 		list_del(&trans->list);
+		switch (trans->type) {
+		case NFT_TRANS_RULE:
+			nf_tables_rule_destroy(&trans->ctx, trans->rule);
+			break;
+		}
 		kfree(trans);
 	}
 
 	return 0;
 }
 
+static void nft_rule_abort_undo(struct net *net, struct sk_buff *skb,
+				struct nft_trans *trans)
+{
+	/* This rule was scheduled for removal but this transaction has been
+	 * aborted, clear the rule generation bitmask and leave it in place.
+	 */
+	if (!nft_rule_is_active_next(net, trans->rule)) {
+		nft_rule_clear(net, trans->rule);
+		list_del(&trans->list);
+		kfree(trans);
+		return;
+	}
+
+	/* This rule was scheduled to be active in the next generation, but
+	 * this transaction was aborted, remove it from the list.
+	 */
+	list_del_rcu(&trans->rule->list);
+}
+
 static int nf_tables_abort(struct sk_buff *skb)
 {
 	struct net *net = sock_net(skb->sk);
 	struct nft_trans *trans, *next;
 
 	list_for_each_entry_safe(trans, next, &net->nft.commit_list, list) {
-		if (!nft_rule_is_active_next(net, trans->rule)) {
-			nft_rule_clear(net, trans->rule);
-			list_del(&trans->list);
-			kfree(trans);
-			continue;
+		switch (trans->type) {
+		case NFT_TRANS_RULE:
+			nft_rule_abort_undo(net, skb, trans);
+			break;
 		}
-
-		/* This rule is inactive, get rid of it */
-		list_del_rcu(&trans->rule->list);
 	}
 
 	/* Make sure we don't see any packet accessing aborted rules */
 	synchronize_rcu();
 
 	list_for_each_entry_safe(trans, next, &net->nft.commit_list, list) {
-		nf_tables_rule_destroy(&trans->ctx, trans->rule);
 		list_del(&trans->list);
+		switch (trans->type) {
+		case NFT_TRANS_RULE:
+			/* Release new rules, already removed from the list,
+			 * that we couldn't activate.
+			 */
+			nf_tables_rule_destroy(&trans->ctx, trans->rule);
+			break;
+		}
 		kfree(trans);
 	}
 
-- 
1.7.10.4


  parent reply	other threads:[~2014-03-27 21:53 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-03-27 21:53 [PATCH 0/7] new transaction infrastructure for nf_tables Pablo Neira Ayuso
2014-03-27 21:53 ` [PATCH 1/7] netfilter: nf_tables: deconstify table and chain in context structure Pablo Neira Ayuso
2014-03-28 12:42   ` Patrick McHardy
2014-03-28 12:57     ` Pablo Neira Ayuso
2014-03-27 21:53 ` [PATCH 2/7] netfilter: nf_tables: generalise transaction infrastructure Pablo Neira Ayuso
2014-03-28 12:42   ` Patrick McHardy
2014-03-27 21:53 ` [PATCH 3/7] netfilter: nf_tables: relocate commit and abort routines in the source file Pablo Neira Ayuso
2014-03-27 21:53 ` Pablo Neira Ayuso [this message]
2014-03-28 12:53   ` [PATCH 4/7] netfilter: nf_tables: better encapsulation for the rule transaction code Patrick McHardy
2014-03-27 21:53 ` [PATCH 5/7] netfilter: nf_tables: move set handling to the transaction infrastructure Pablo Neira Ayuso
2014-03-28 13:00   ` Patrick McHardy
2014-03-27 21:53 ` [PATCH 6/7] netfilter: nf_tables: move chain " Pablo Neira Ayuso
2014-03-28 13:10   ` Patrick McHardy
2014-03-27 21:53 ` [PATCH 7/7] netfilter: nf_tables: move table " Pablo Neira Ayuso
2014-03-28 13:12   ` Patrick McHardy

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1395957197-4899-5-git-send-email-pablo@netfilter.org \
    --to=pablo@netfilter.org \
    --cc=kaber@trash.net \
    --cc=netfilter-devel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).