From: Phil Sutter <phil@nwl.cc>
To: Pablo Neira Ayuso <pablo@netfilter.org>
Cc: netfilter-devel@vger.kernel.org
Subject: [nf-next PATCH 0/2] Support resetting rules' state
Date: Fri, 14 Oct 2022 23:45:57 +0200 [thread overview]
Message-ID: <20221014214559.22254-1-phil@nwl.cc> (raw)
In order to "zero" a rule (in the 'iptables -Z' sense), users had to
dump (parts of) the ruleset in stateless form and restore it again after
removing the dumped parts.
Introduce a simpler method to reset any stateful elements of a rule or
all rules of a chain/table/family. Affects both counter and quota
expressions.
Phil Sutter (2):
netfilter: nf_tables: Extend nft_expr_ops::dump callback parameters
netfilter: nf_tables: Introduce NFT_MSG_GETRULE_RESET
include/net/netfilter/nf_tables.h | 5 ++-
include/net/netfilter/nft_fib.h | 2 +-
include/net/netfilter/nft_meta.h | 4 +-
include/net/netfilter/nft_reject.h | 3 +-
include/uapi/linux/netfilter/nf_tables.h | 1 +
net/ipv4/netfilter/nft_dup_ipv4.c | 3 +-
net/ipv6/netfilter/nft_dup_ipv6.c | 3 +-
net/netfilter/nf_tables_api.c | 49 ++++++++++++++++--------
net/netfilter/nft_bitwise.c | 6 ++-
net/netfilter/nft_byteorder.c | 3 +-
net/netfilter/nft_cmp.c | 9 +++--
net/netfilter/nft_compat.c | 9 +++--
net/netfilter/nft_connlimit.c | 3 +-
net/netfilter/nft_counter.c | 5 ++-
net/netfilter/nft_ct.c | 6 ++-
net/netfilter/nft_dup_netdev.c | 3 +-
net/netfilter/nft_dynset.c | 7 ++--
net/netfilter/nft_exthdr.c | 9 +++--
net/netfilter/nft_fib.c | 2 +-
net/netfilter/nft_flow_offload.c | 3 +-
net/netfilter/nft_fwd_netdev.c | 6 ++-
net/netfilter/nft_hash.c | 4 +-
net/netfilter/nft_immediate.c | 3 +-
net/netfilter/nft_last.c | 3 +-
net/netfilter/nft_limit.c | 5 ++-
net/netfilter/nft_log.c | 3 +-
net/netfilter/nft_lookup.c | 3 +-
net/netfilter/nft_masq.c | 3 +-
net/netfilter/nft_meta.c | 5 ++-
net/netfilter/nft_nat.c | 3 +-
net/netfilter/nft_numgen.c | 6 ++-
net/netfilter/nft_objref.c | 6 ++-
net/netfilter/nft_osf.c | 3 +-
net/netfilter/nft_payload.c | 6 ++-
net/netfilter/nft_queue.c | 6 ++-
net/netfilter/nft_quota.c | 5 ++-
net/netfilter/nft_range.c | 3 +-
net/netfilter/nft_redir.c | 3 +-
net/netfilter/nft_reject.c | 3 +-
net/netfilter/nft_rt.c | 2 +-
net/netfilter/nft_socket.c | 2 +-
net/netfilter/nft_synproxy.c | 3 +-
net/netfilter/nft_tproxy.c | 2 +-
net/netfilter/nft_tunnel.c | 2 +-
net/netfilter/nft_xfrm.c | 2 +-
45 files changed, 146 insertions(+), 81 deletions(-)
--
2.34.1
next reply other threads:[~2022-10-14 21:47 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-10-14 21:45 Phil Sutter [this message]
2022-10-14 21:45 ` [nf-next PATCH 1/2] netfilter: nf_tables: Extend nft_expr_ops::dump callback parameters Phil Sutter
2022-10-14 21:45 ` [nf-next PATCH 2/2] netfilter: nf_tables: Introduce NFT_MSG_GETRULE_RESET Phil Sutter
2022-10-25 11:52 ` [nf-next PATCH 0/2] Support resetting rules' state Pablo Neira Ayuso
2022-11-08 16:49 ` Phil Sutter
2022-11-09 10:16 ` Pablo Neira Ayuso
2022-11-09 12:11 ` Phil Sutter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221014214559.22254-1-phil@nwl.cc \
--to=phil@nwl.cc \
--cc=netfilter-devel@vger.kernel.org \
--cc=pablo@netfilter.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox