netfilter-devel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Pablo Neira Ayuso <pablo@netfilter.org>
To: Patrick McHardy <kaber@trash.net>
Cc: netfilter-devel@vger.kernel.org
Subject: Re: [PATCH RFC 1/2] netfilter: nf_tables: move set netlink messages into the batch
Date: Wed, 26 Mar 2014 14:40:22 +0100	[thread overview]
Message-ID: <20140326134022.GA31965@localhost> (raw)
In-Reply-To: <20140326131856.GA7173@macbook.localnet>

On Wed, Mar 26, 2014 at 01:18:57PM +0000, Patrick McHardy wrote:
> On Wed, Mar 26, 2014 at 02:03:38PM +0100, Pablo Neira Ayuso wrote:
> > On Wed, Mar 26, 2014 at 11:25:54AM +0000, Patrick McHardy wrote:
> > > On Tue, Mar 25, 2014 at 09:39:41PM +0100, Pablo Neira Ayuso wrote:
> > 
> > > > diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h
> > > > index c88ccbf..3776beb 100644
> > > > --- a/include/uapi/linux/netfilter/nf_tables.h
> > > > +++ b/include/uapi/linux/netfilter/nf_tables.h
> > > > @@ -221,6 +221,7 @@ enum nft_set_flags {
> > > >   * @NFTA_SET_KEY_LEN: key data length (NLA_U32)
> > > >   * @NFTA_SET_DATA_TYPE: mapping data type (NLA_U32)
> > > >   * @NFTA_SET_DATA_LEN: mapping data length (NLA_U32)
> > > > + * @NFTA_SET_ID: set ID (NLA_U64)
> > > 
> > > I think a U32 should be perfectly fine. These are not permanent IDs but just to
> > > identify new sets contained within a batch, so we can always start at 0.
> > 
> > Yes, I was considering using this also to output the set identifier
> > for anonymous sets, but the dynamically allocated name should be fine
> > so I'll stick to u32.
> 
> I think these are two different things. The set identifier is so far actually
> a transaction identifier, mixing these will most likely get messy.
> 
> > Going back to the idea of using u64 to allocate the set/map names, I
> > think we have to extend the set name, currently IFNAMSIZ is limited
> > when mapping the name to set%lld, assuming a large u64 number.
> 
> The problem is more that this ID is chosen by userspace, so it's not suitable
> for anonymous sets.

I was not considering to use the ID allocated from userspace, but
reusing the NFTA_SET_ID attribute given that it is only used for
messages from userspace -> kernel, so we can reuse it when dumping the
anonymous set to userspace, but that's two different things with
different semantics, so better to have two different attributes for
each, eg. NFTA_SET_ID_ANONYMOUS?

> I'd rather get rid of the names for anonymous sets completely. For
> dumps we can just as well use a dynamic numeric identifier to
> associate lookup expressions with sets. We don't really need a
> permanent identifier.

How will that look like? I think we need some permanent way to
identify sets even if they are anonymous. A permanent ID should be
fine for that.

> > > > @@ -2534,7 +2619,8 @@ void nf_tables_unbind_set(const struct nft_ctx *ctx, struct nft_set *set,
> > > >  {
> > > >  	list_del(&binding->list);
> > > >  
> > > > -	if (list_empty(&set->bindings) && set->flags & NFT_SET_ANONYMOUS)
> > > > +	if (list_empty(&set->bindings) && set->flags & NFT_SET_ANONYMOUS &&
> > > > +	    !(set->flags & __NFT_SET_INACTIVE))
> > > 
> > > Why are we not destroying anonymous inactive sets when unbinding? This means we're
> > > either aborting or replaying the entire transaction, so it seems we should remove
> > > them, no?
> > 
> > The set may be already bound to the rule, we skip this here, so the
> > set is released from the transaction. This is just to avoid a double
> > free case.
> 
> I have to read the patch again, I was under the impression that a bound set
> has already been comitted and we therefore won't fail anymore. Probably
> misunderstood something.

Think of the abort step. We already have some rules bound to the set
(not yet committed), but we failed to load some rule, we need to
release those rules and their set bindings. In that case, the rule
destroy path skips releasing the set, so we just let the abort routine
to iterate over the list of new sets to releasing.

  reply	other threads:[~2014-03-26 13:40 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-03-25 20:39 [PATCH RFC 1/2] netfilter: nf_tables: move set netlink messages into the batch Pablo Neira Ayuso
2014-03-25 20:39 ` [PATCH RFC nft 2/2] src: add set netlink message to " Pablo Neira Ayuso
2014-03-26 11:25 ` [PATCH RFC 1/2] netfilter: nf_tables: move set netlink messages into " Patrick McHardy
2014-03-26 13:03   ` Pablo Neira Ayuso
2014-03-26 13:18     ` Patrick McHardy
2014-03-26 13:40       ` Pablo Neira Ayuso [this message]
2014-03-26 14:00         ` Patrick McHardy
2014-03-26 15:53           ` Pablo Neira Ayuso

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140326134022.GA31965@localhost \
    --to=pablo@netfilter.org \
    --cc=kaber@trash.net \
    --cc=netfilter-devel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).