From: Pablo Neira Ayuso <pablo@netfilter.org>
To: "Jose M. Guisado Gomez" <guigom@riseup.net>
Cc: netfilter-devel@vger.kernel.org
Subject: Re: [PATCH nf-next 1/3] netfilter: nf_tables: add userdata attributes to nft_table
Date: Fri, 21 Aug 2020 19:21:12 +0200 [thread overview]
Message-ID: <20200821172112.GA15625@salvia> (raw)
In-Reply-To: <20200820081903.36781-2-guigom@riseup.net>
On Thu, Aug 20, 2020 at 10:19:01AM +0200, Jose M. Guisado Gomez wrote:
> Enables storing userdata for nft_table. Field udata points to user data
> and udlen store its length.
>
> Adds new attribute flag NFTA_TABLE_USERDATA
>
> Signed-off-by: Jose M. Guisado Gomez <guigom@riseup.net>
> ---
> include/net/netfilter/nf_tables.h | 2 ++
> include/uapi/linux/netfilter/nf_tables.h | 2 ++
> net/netfilter/nf_tables_api.c | 25 ++++++++++++++++++++++++
> 3 files changed, 29 insertions(+)
>
> diff --git a/include/net/netfilter/nf_tables.h b/include/net/netfilter/nf_tables.h
> index bf9491b77d16..97a7e147a59a 100644
> --- a/include/net/netfilter/nf_tables.h
> +++ b/include/net/netfilter/nf_tables.h
> @@ -1080,6 +1080,8 @@ struct nft_table {
> flags:8,
> genmask:2;
> char *name;
> + u16 udlen;
> + u8 *udata;
> };
>
> void nft_register_chain_type(const struct nft_chain_type *);
> diff --git a/include/uapi/linux/netfilter/nf_tables.h b/include/uapi/linux/netfilter/nf_tables.h
> index 42f351c1f5c5..aeb88cbd303e 100644
> --- a/include/uapi/linux/netfilter/nf_tables.h
> +++ b/include/uapi/linux/netfilter/nf_tables.h
> @@ -172,6 +172,7 @@ enum nft_table_flags {
> * @NFTA_TABLE_NAME: name of the table (NLA_STRING)
> * @NFTA_TABLE_FLAGS: bitmask of enum nft_table_flags (NLA_U32)
> * @NFTA_TABLE_USE: number of chains in this table (NLA_U32)
> + * @NFTA_TABLE_USERDATA: user data (NLA_BINARY)
> */
> enum nft_table_attributes {
> NFTA_TABLE_UNSPEC,
> @@ -180,6 +181,7 @@ enum nft_table_attributes {
> NFTA_TABLE_USE,
> NFTA_TABLE_HANDLE,
> NFTA_TABLE_PAD,
> + NFTA_TABLE_USERDATA,
> __NFTA_TABLE_MAX
> };
> #define NFTA_TABLE_MAX (__NFTA_TABLE_MAX - 1)
> diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c
> index d878e34e3354..ca240a990eea 100644
> --- a/net/netfilter/nf_tables_api.c
> +++ b/net/netfilter/nf_tables_api.c
> @@ -650,6 +650,8 @@ static const struct nla_policy nft_table_policy[NFTA_TABLE_MAX + 1] = {
> .len = NFT_TABLE_MAXNAMELEN - 1 },
> [NFTA_TABLE_FLAGS] = { .type = NLA_U32 },
> [NFTA_TABLE_HANDLE] = { .type = NLA_U64 },
> + [NFTA_TABLE_USERDATA] = { .type = NLA_BINARY,
> + .len = NFT_USERDATA_MAXLEN }
> };
>
> static int nf_tables_fill_table_info(struct sk_buff *skb, struct net *net,
> @@ -676,6 +678,11 @@ static int nf_tables_fill_table_info(struct sk_buff *skb, struct net *net,
> NFTA_TABLE_PAD))
> goto nla_put_failure;
>
> + if (table->udata) {
> + if (nla_put(skb, NFTA_TABLE_USERDATA, table->udlen, table->udata))
> + goto nla_put_failure;
> + }
> +
> nlmsg_end(skb, nlh);
> return 0;
>
> @@ -980,6 +987,7 @@ static int nf_tables_newtable(struct net *net, struct sock *nlsk,
> u32 flags = 0;
> struct nft_ctx ctx;
> int err;
> + u16 udlen = 0;
>
> lockdep_assert_held(&net->nft.commit_mutex);
> attr = nla[NFTA_TABLE_NAME];
> @@ -1005,6 +1013,7 @@ static int nf_tables_newtable(struct net *net, struct sock *nlsk,
> return -EINVAL;
> }
>
> +
> err = -ENOMEM;
> table = kzalloc(sizeof(*table), GFP_KERNEL);
> if (table == NULL)
> @@ -1014,6 +1023,20 @@ static int nf_tables_newtable(struct net *net, struct sock *nlsk,
> if (table->name == NULL)
> goto err_strdup;
>
> + if (nla[NFTA_TABLE_USERDATA]) {
> + udlen = nla_len(nla[NFTA_TABLE_USERDATA]);
> + table->udata = kzalloc(udlen, GFP_KERNEL);
> + if (table->udata == NULL)
> + goto err_table_udata;
> + } else {
> + table->udata = NULL;
> + }
> +
> + if (udlen) {
> + nla_memcpy(table->udata, nla[NFTA_TABLE_USERDATA], udlen);
> + table->udlen = udlen;
> + }
if (nla[NFTA_TABLE_USERDATA]) {
udlen = nla_len(nla[NFTA_TABLE_USERDATA]);
table->udata = kzalloc(udlen, GFP_KERNEL);
if (table->udata == NULL)
goto err_table_udata;
nla_memcpy(table->udata, nla[NFTA_TABLE_USERDATA], udlen);
table->udlen = udlen;
}
Probably this simplification instead? kzalloc() zeroes the table
object, so table->udata is NULL and ->udlen is zero.
next prev parent reply other threads:[~2020-08-21 17:21 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-08-20 8:19 [PATCH 0/3] Add userdata and comment support for tables Jose M. Guisado Gomez
2020-08-20 8:19 ` [PATCH nf-next 1/3] netfilter: nf_tables: add userdata attributes to nft_table Jose M. Guisado Gomez
2020-08-21 17:21 ` Pablo Neira Ayuso [this message]
2020-08-22 9:04 ` Jose M. Guisado
2020-08-22 9:09 ` [PATCH nf-next v2 " Jose M. Guisado Gomez
2020-08-28 17:25 ` Pablo Neira Ayuso
2020-08-20 8:19 ` [PATCH libnftnl 2/3] table: add userdata support Jose M. Guisado Gomez
2020-08-28 17:33 ` Pablo Neira Ayuso
2020-08-20 8:19 ` [PATCH nftables 3/3] src: add comment support when adding tables Jose M. Guisado Gomez
2020-08-21 16:40 ` [PATCH nftables v2 " Jose M. Guisado Gomez
2020-08-28 17:49 ` Pablo Neira Ayuso
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200821172112.GA15625@salvia \
--to=pablo@netfilter.org \
--cc=guigom@riseup.net \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).