[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20231121122800.13521-9-fw@strlen.de>
Date: Tue, 21 Nov 2023 13:27:51 +0100
From: Florian Westphal <fw@...len.de>
To: <netfilter-devel@...r.kernel.org>
Cc: lorenzo@...nel.org,
<netdev@...r.kernel.org>,
Florian Westphal <fw@...len.de>
Subject: [PATCH nf-next 8/8] netfilter: nf_tables: permit duplicate flowtable mappings
The core ensures that no duplicate mapping (net_device x is always
assigned to exactly one flowtable, or none at all) exists.
Only exception: its assigned to a flowtable that is going away
in this transaction.
Therefore relax the existing check to permit the duplicate
entry, it is only temporary.
The existing entry will shadow the new one until the transaction
is committed (old entry is removed) or aborted (new entry is removed).
Signed-off-by: Florian Westphal <fw@...len.de>
---
net/netfilter/nf_flow_table_offload.c | 36 +++++++++++++++++++++++----
1 file changed, 31 insertions(+), 5 deletions(-)
diff --git a/net/netfilter/nf_flow_table_offload.c b/net/netfilter/nf_flow_table_offload.c
index 9ec7aa4ad2e5..b6503fd45871 100644
--- a/net/netfilter/nf_flow_table_offload.c
+++ b/net/netfilter/nf_flow_table_offload.c
@@ -49,13 +49,14 @@ static int nf_flowtable_by_dev_insert(struct nf_flowtable *ft,
{
unsigned long key = (unsigned long)dev;
struct flow_offload_xdp *cur;
+ bool duplicate = false;
int err = 0;
mutex_lock(&nf_xdp_hashtable_lock);
hash_for_each_possible(nf_xdp_hashtable, cur, hnode, key) {
if (key != cur->net_device_addr)
continue;
- err = -EEXIST;
+ duplicate = true;
break;
}
@@ -67,7 +68,20 @@ static int nf_flowtable_by_dev_insert(struct nf_flowtable *ft,
new->net_device_addr = key;
new->ft = ft;
- hash_add_rcu(nf_xdp_hashtable, &new->hnode, key);
+ if (duplicate) {
+ u32 index = hash_min(key, HASH_BITS(nf_xdp_hashtable));
+
+ /* nf_tables_api.c makes sure that only a single flowtable
+ * has this device.
+ *
+ * Only exception: the flowtable is about to be removed.
+ * Thus we tolerate the duplicated entry, the 'old' entry
+ * will be unhashed after the transaction completes.
+ */
+ hlist_add_tail_rcu(&new->hnode, &nf_xdp_hashtable[index]);
+ } else {
+ hash_add_rcu(nf_xdp_hashtable, &new->hnode, key);
+ }
} else {
err = -ENOMEM;
}
@@ -80,7 +94,8 @@ static int nf_flowtable_by_dev_insert(struct nf_flowtable *ft,
return err;
}
-static void nf_flowtable_by_dev_remove(const struct net_device *dev)
+static void nf_flowtable_by_dev_remove(const struct nf_flowtable *ft,
+ const struct net_device *dev)
{
unsigned long key = (unsigned long)dev;
struct flow_offload_xdp *cur;
@@ -92,6 +107,17 @@ static void nf_flowtable_by_dev_remove(const struct net_device *dev)
if (key != cur->net_device_addr)
continue;
+ /* duplicate entry, happens when current transaction
+ * removes flowtable f1 and adds flowtable f2, where both
+ * have *dev assigned to them.
+ *
+ * nf_tables_api.c makes sure that at most one
+ * flowtable,dev pair with 'xdp' flag enabled can exist
+ * in the same generation.
+ */
+ if (cur->ft != ft)
+ continue;
+
hash_del_rcu(&cur->hnode);
kfree_rcu(cur, rcuhead);
found = true;
@@ -1280,7 +1306,7 @@ static int nf_flow_offload_xdp_setup(struct nf_flowtable *flowtable,
case FLOW_BLOCK_BIND:
return nf_flowtable_by_dev_insert(flowtable, dev);
case FLOW_BLOCK_UNBIND:
- nf_flowtable_by_dev_remove(dev);
+ nf_flowtable_by_dev_remove(flowtable, dev);
return 0;
}
@@ -1297,7 +1323,7 @@ static void nf_flow_offload_xdp_cancel(struct nf_flowtable *flowtable,
switch (cmd) {
case FLOW_BLOCK_BIND:
- nf_flowtable_by_dev_remove(dev);
+ nf_flowtable_by_dev_remove(flowtable, dev);
return;
case FLOW_BLOCK_UNBIND:
/* We do not re-bind in case hw offload would report error
--
2.41.0
Powered by blists - more mailing lists