From: Pablo Neira Ayuso <pablo@netfilter.org>
To: Liping Zhang <zlpnobody@gmail.com>
Cc: Liping Zhang <zlpnobody@163.com>,
Netfilter Developer Mailing List
<netfilter-devel@vger.kernel.org>
Subject: Re: [PATCH nf 1/2] netfilter: nft_set_bitmap: fetch the element key based on the set->klen
Date: Mon, 6 Mar 2017 17:42:59 +0100 [thread overview]
Message-ID: <20170306164259.GA1080@salvia> (raw)
In-Reply-To: <CAML_gOedJF8udDAt-=aBAUZAvCKUGWh1RnqdLASn42LfoJGCrA@mail.gmail.com>
Hi Liping,
On Mon, Mar 06, 2017 at 10:27:20PM +0800, Liping Zhang wrote:
> Hi Pablo,
>
> 2017-03-06 20:01 GMT+08:00 Pablo Neira Ayuso <pablo@netfilter.org>:
> [...]
> > Right, the userdata case is not handled properly. And in this case we
> > have no specific flag at set creation, so element comments may come
> > without previous notice via set flags.
> >
> > I think we have to keep a list of dummy nft_set_ext that is only used
> > in the dump path, we can simplify this logic at the cost of increasing
> > memory consumption. Another alternative is to keep around a structure
> > to store only the set element userdata that we need for comments.
> >
> > Let me think.
> >
> > Your patches look good to me. Probably we can skip 2/2 if we introduce
> > the dummy nft_set_ext list, and remove the ->flush field for
> > nft_set_iter.
> >
>
> Actually I was preparing to send v2 about this patch, then I saw your
> reply:). Because I find out that in nft_bitmap_walk(), the 'key' maybe
> incorrect on the big-endian machines when the key length is 1.
> So the patch diff looks like this:
>
> static void nft_bitmap_walk(...)
> key = ((idx * BITS_PER_BYTE) + off) >> 1;
> - memcpy(nft_set_ext_key(ext), &key, set->klen);
> + if (set->klen == 2)
> + *(u16 *)nft_set_ext_key(ext) = key;
> + else
> + *(u8 *)nft_set_ext_key(ext) = key;
>
> But if we will introduce the dummy nft_set_ext list to the whole elements
> in the bitmap, the above part is not needed anymore, i.e. we need not to
> convert the bit to key.
Right, we can just walk over the list of dummy nft_set_ext if we
follow this approach.
> (Now start the second part, about the byte-order in nft)
> Unrelated to this patch actually, I find that there's a little messy when we
> store the u8 or u16 integer to the register, which may cause miss-match in
> big-endian machines (Actually I have no big-endian machine around me,
> so I can't verify it).
>
> For example, dest pointer is declared as "u32 *dest = ®s->data[priv->dreg];",
> but there are different ways to fetch the value:
> 1. fetching the l4 port, we use:
> *dest = 0;
> *(u16 *)dest = *(u16 *)ptr;
>
> 2. fetching the NFT_META_IIFTYPE, we use:
> *dest = 0;
> *(u16 *)dest = in->type;
>
> 3. fetching the NFT_CT_PROTO_SRC, we use:
> *dest = (__force __u16)tuple->src.u.all;
>
> So method 1 and method 2 will cause the value stored like this, either in
> big-endian or little-endian:
> 0 15 31
> +-+-+-+-+-+-+-+-+-
> | Value | 0 |
> +-+-+-+-+-+-+-+-+-
> But method 3 will cause the value stored like this, in big-endian machine:
> 0 15 31
> +-+-+-+-+-+-+-+-+-
> | 0 | Value |
> +-+-+-+-+-+-+-+-+-
>
> Later in nft_cmp, nft_set_hash, nft_set_rbtree, we use memcmp to do compare:
> "memcmp(®s->data[priv->sreg], data/key, 2);"
>
> So method 3 is wrong in big-endian, as 0~15 bits will always be zero. Maybe we
> can introduce some wrapper functions to help us, for example:
>
> static inline void nft_register_store16(u32 *dreg, u16 value)
> {
> *dreg = 0;
> *(u16 *)dreg = value;
> }
>
> static inline void nft_register_store8(u32 *dreg, u8 value)
> {
> *dreg = 0;
> *(u8 *)dreg = value;
> }
I think this a good idea, send patches to add this and use them for
the nf tree, please.
> ...
>
> Am I wrong? Or I totally misunderstood this byte-order issue?
This looks correct to me.
Note that:
*dest = 0;
is just there because of concatenations, so we make sure that we zero
the pad given that register allocation happens at 32-bit level.
Another note: For method 3. __force is there for the sparse checker
given the different endianness of both sides of the assignment.
next prev parent reply other threads:[~2017-03-06 16:49 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-03-05 16:02 [PATCH nf 1/2] netfilter: nft_set_bitmap: fetch the element key based on the set->klen Liping Zhang
2017-03-05 16:02 ` [PATCH nf 2/2] netfilter: nft_set_bitmap: fix memory leak Liping Zhang
2017-03-06 12:01 ` [PATCH nf 1/2] netfilter: nft_set_bitmap: fetch the element key based on the set->klen Pablo Neira Ayuso
2017-03-06 14:27 ` Liping Zhang
2017-03-06 16:42 ` Pablo Neira Ayuso [this message]
2017-03-07 4:37 ` Liping Zhang
2017-03-13 12:29 ` Pablo Neira Ayuso
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170306164259.GA1080@salvia \
--to=pablo@netfilter.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=zlpnobody@163.com \
--cc=zlpnobody@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).