Message ID | alpine.DEB.2.00.1309040003360.5303@blackhole.kfki.hu |
---|---|
State | Not Applicable |
Delegated to: | Jozsef Kadlecsik |
Headers | show |
On Wednesday 04 September 2013 00:06:01 Jozsef Kadlecsik wrote: > On Tue, 3 Sep 2013, Jozsef Kadlecsik wrote: > > On Tue, 3 Sep 2013, Oliver wrote: > [...] > > > > -mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length) > > > +mtype_add_cidr(struct htype *h, const u8 cidr[], u8 nets_length) > > > > I do remember you asked it and I confused you: no, the hash types need not > > be changed for this (see below), mtype_add_cidr requires just a new arg as > > to which member of the cidr/net array of struct htype to be updated. > > I was thinking about something like this (untested, unchecked): <snip> > @@ -296,46 +300,46 @@ struct htype { > /* Network cidr size book keeping when the hash stores different > * sized networks */ > static void > -mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length) > +mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length, u8 n) Ok, I see what you were envisioning now - I'm not entirely sure if the benefit of not having to modify the existing hash structs outweighs the cost of having to insert special cases in the generic header - especially now considering each hash only consists of a single struct for each address family. Essentially, this is going to be something of a tradeoff; if it's left like it is now, all the existing single calls to mtype_add_cidr/mtype_del_cidr don't require any modification since the loop inside them handles CIDR for N number of nets simply by virtue of whatever you #define IPSET_NET_COUNT to be. On the other hand, if we want to avoid changing the existing *net* hashes to conform to the array style, it'll require special cases that execute multiple calls to mtype_add_cidr and mtype_del_cidr - the blow could be softened by sticking a loop around it, but that's effectively going to be a small chunk of code duplication in order to get there. Part of the confusion I would say was that I figured you wanted to deduplicate the code as much as possible, so with that I went all-out and refactored the entire lot of existing types accordingly. So, the way I see it... go with what we have right now, less code duplication, smaller code in general or have special cases for IPSET_NET_COUNT > 1. Let me know what you think, I'm not massively concerned either way, but my vote would be for how it is now (quelle surprise?) Thanks, Oliver. P.S. I've made a bunch of corrections to the comments extension and rebased it against all these general fixes and improvements, so I'll give it another once- over and patch-bomb the mailing list with it later. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wed, 4 Sep 2013, Oliver wrote: > On Wednesday 04 September 2013 00:06:01 Jozsef Kadlecsik wrote: > > On Tue, 3 Sep 2013, Jozsef Kadlecsik wrote: > > > On Tue, 3 Sep 2013, Oliver wrote: > > [...] > > > > > > -mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length) > > > > +mtype_add_cidr(struct htype *h, const u8 cidr[], u8 nets_length) > > > > > > I do remember you asked it and I confused you: no, the hash types need not > > > be changed for this (see below), mtype_add_cidr requires just a new arg as > > > to which member of the cidr/net array of struct htype to be updated. > > > > I was thinking about something like this (untested, unchecked): > > <snip> > > > @@ -296,46 +300,46 @@ struct htype { > > /* Network cidr size book keeping when the hash stores different > > * sized networks */ > > static void > > -mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length) > > +mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length, u8 n) > > Ok, I see what you were envisioning now - I'm not entirely sure if the > benefit of not having to modify the existing hash structs outweighs the > cost of having to insert special cases in the generic header - > especially now considering each hash only consists of a single struct > for each address family. I committed and pushed it to the ipset git tree. The special cases are going to be enabled by #ifdef conditions, so the common case is kept as simple as possible. > Essentially, this is going to be something of a tradeoff; if it's left > like it is now, all the existing single calls to > mtype_add_cidr/mtype_del_cidr don't require any modification since the > loop inside them handles CIDR for N number of nets simply by virtue of > whatever you #define IPSET_NET_COUNT to be. > > On the other hand, if we want to avoid changing the existing *net* hashes to > conform to the array style, it'll require special cases that execute multiple > calls to mtype_add_cidr and mtype_del_cidr - the blow could be softened by > sticking a loop around it, but that's effectively going to be a small chunk of > code duplication in order to get there. Part of the confusion I would say was > that I figured you wanted to deduplicate the code as much as possible, so with > that I went all-out and refactored the entire lot of existing types > accordingly. > > So, the way I see it... go with what we have right now, less code duplication, > smaller code in general or have special cases for IPSET_NET_COUNT > 1. > > Let me know what you think, I'm not massively concerned either way, but my > vote would be for how it is now (quelle surprise?) > > Thanks, > Oliver. > > P.S. I've made a bunch of corrections to the comments extension and > rebased it against all these general fixes and improvements, so I'll > give it another once- over and patch-bomb the mailing list with it > later. Please wait a little bit with sending the comments extensions: I'm working on the extensions infratructure. Best regards, Jozsef - E-mail : kadlec@blackhole.kfki.hu, kadlecsik.jozsef@wigner.mta.hu PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt Address : Wigner Research Centre for Physics, Hungarian Academy of Sciences H-1525 Budapest 114, POB. 49, Hungary -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Wednesday 04 September 2013 19:20:35 Jozsef Kadlecsik wrote: <snip> > > > > > > -mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length) > > > +mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length, u8 n) > > > > Ok, I see what you were envisioning now - I'm not entirely sure if the > > benefit of not having to modify the existing hash structs outweighs the > > cost of having to insert special cases in the generic header - > > especially now considering each hash only consists of a single struct > > for each address family. > > I committed and pushed it to the ipset git tree. The special cases are > going to be enabled by #ifdef conditions, so the common case is kept as > simple as possible. Alright, I took a look at the changes - I'll wait for the extension cleanup then send out a rebased version of hash:net,net since that's presumably going to be the difference between having to declare struct combinations for the various extensions versus not having to do it. I'm very intrigued to see what you can come up with that's shorter than my rework :P On a related note - I was thinking about the impact of recursively walking the CIDRs and it did occur to me that this operation is very parallelisable - however, I found that when I ran ipset -T on the set, the in-kernel code is running in an interrupt context (somehow, I couldn't see what made it like that), which means it's not possible to spin up kthreads (unless there's something that I don't know about) - when testing of an ipset is called via xt_set, is that also running in an interrupt context? if not, it could be parallelised quite nicely, which I anticipate would give some gains on multicore systems, and especially for IPv6, one would think. Kind Regards, Oliver. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi Oliver, On Fri, 6 Sep 2013, Oliver wrote: > Alright, I took a look at the changes - I'll wait for the extension > cleanup then send out a rebased version of hash:net,net since that's > presumably going to be the difference between having to declare struct > combinations for the various extensions versus not having to do it. I'm > very intrigued to see what you can come up with that's shorter than my > rework :P There's a technical problem with your refactoring patchset (it doesn't prevent unaligned access to extension members), and a design issue: the data about the extensions (offsets) should belong to the core. There's still code duplication between the bitmap and hash types in it when even the list type is missing. The solution means an overall rearrangig and that's what I'm working on. > On a related note - I was thinking about the impact of recursively > walking the CIDRs and it did occur to me that this operation is very > parallelisable - however, I found that when I ran ipset -T on the set, > the in-kernel code is running in an interrupt context (somehow, I > couldn't see what made it like that), which means it's not possible to > spin up kthreads (unless there's something that I don't know about) - > when testing of an ipset is called via xt_set, is that also running in > an interrupt context? if not, it could be parallelised quite nicely, > which I anticipate would give some gains on multicore systems, and > especially for IPv6, one would think. How could the walking of the CIDRs be parallellized, when the lookup must follow the priority of the networks? (With the exception of checking multiple same sized networks.) Best regards, Jozsef - E-mail : kadlec@blackhole.kfki.hu, kadlecsik.jozsef@wigner.mta.hu PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt Address : Wigner Research Centre for Physics, Hungarian Academy of Sciences H-1525 Budapest 114, POB. 49, Hungary -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Friday 06 September 2013 20:00:19 Jozsef Kadlecsik wrote: > Hi Oliver, > > On Fri, 6 Sep 2013, Oliver wrote: > > Alright, I took a look at the changes - I'll wait for the extension > > cleanup then send out a rebased version of hash:net,net since that's > > presumably going to be the difference between having to declare struct > > combinations for the various extensions versus not having to do it. I'm > > very intrigued to see what you can come up with that's shorter than my > > rework :P > > There's a technical problem with your refactoring patchset (it doesn't > prevent unaligned access to extension members), and a design issue: the > data about the extensions (offsets) should belong to the core. There's > still code duplication between the bitmap and hash types in it when even > the list type is missing. The solution means an overall rearrangig and > that's what I'm working on. Sounds good. I was working under the expectation that explicitly setting the alignment of extension structs wasn't that big of a deal, but I agree that it's better if it doesn't need to be manually taken care of and moving more stuff into the core would definitely improve things. > > > On a related note - I was thinking about the impact of recursively > > walking the CIDRs and it did occur to me that this operation is very > > parallelisable - however, I found that when I ran ipset -T on the set, > > the in-kernel code is running in an interrupt context (somehow, I > > couldn't see what made it like that), which means it's not possible to > > spin up kthreads (unless there's something that I don't know about) - > > when testing of an ipset is called via xt_set, is that also running in > > an interrupt context? if not, it could be parallelised quite nicely, > > which I anticipate would give some gains on multicore systems, and > > especially for IPv6, one would think. > > How could the walking of the CIDRs be parallellized, when the lookup must > follow the priority of the networks? (With the exception of checking > multiple same sized networks.) Well, pretty easily... as the most basic (albeit not necessarily most resource efficient) example: you spin up a kthread for every CIDR size and then check the return value of each kthread you spun up in order that you started them - the first result you get to that has a non-zero return value is obviously the one you require and you're done. Naturally the time saving here is coming from the hash table searches for every given CIDR size being done in parallel; the thread controller code is still going to iterate, but it's just checking a return code. I already took a stab at this, but it's currently impossible because the moment kthread_create_on_node() is called and goes into sched_setscheduler_nocheck(), it triggers BUG_ON(in_interrupt()) - I poked through all the base code but I don't see exactly how or why we're inside an interrupt context when responding to ipset userspace commands. Kind Regards, Oliver. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Fri, 6 Sep 2013, Oliver wrote: > On Friday 06 September 2013 20:00:19 Jozsef Kadlecsik wrote: > > Hi Oliver, > > > > On Fri, 6 Sep 2013, Oliver wrote: > > > Alright, I took a look at the changes - I'll wait for the extension > > > cleanup then send out a rebased version of hash:net,net since that's > > > presumably going to be the difference between having to declare struct > > > combinations for the various extensions versus not having to do it. I'm > > > very intrigued to see what you can come up with that's shorter than my > > > rework :P > > > > There's a technical problem with your refactoring patchset (it doesn't > > prevent unaligned access to extension members), and a design issue: the > > data about the extensions (offsets) should belong to the core. There's > > still code duplication between the bitmap and hash types in it when even > > the list type is missing. The solution means an overall rearrangig and > > that's what I'm working on. > > Sounds good. I was working under the expectation that explicitly setting the > alignment of extension structs wasn't that big of a deal, but I agree that > it's better if it doesn't need to be manually taken care of and moving more > stuff into the core would definitely improve things. I pushed out the patches to the ipset git tree: the support of extensions which need per-data cleanup is there. I think first you should adapt and submit the comment extension (at the places where you check the comment length and reject oversized ones, indicate the allowed length in the error message). Add tests at least for one of bitmap, hash and list types: add/delete/test elements with comments, list and verify the list output, flush, destroy, save and restore. Then the hash:net,net type may follow. > > > On a related note - I was thinking about the impact of recursively > > > walking the CIDRs and it did occur to me that this operation is very > > > parallelisable - however, I found that when I ran ipset -T on the set, > > > the in-kernel code is running in an interrupt context (somehow, I > > > couldn't see what made it like that), which means it's not possible to > > > spin up kthreads (unless there's something that I don't know about) - > > > when testing of an ipset is called via xt_set, is that also running in > > > an interrupt context? if not, it could be parallelised quite nicely, > > > which I anticipate would give some gains on multicore systems, and > > > especially for IPv6, one would think. > > > > How could the walking of the CIDRs be parallellized, when the lookup must > > follow the priority of the networks? (With the exception of checking > > multiple same sized networks.) > > Well, pretty easily... as the most basic (albeit not necessarily most > resource efficient) example: you spin up a kthread for every CIDR size > and then check the return value of each kthread you spun up in order > that you started them - the first result you get to that has a non-zero > return value is obviously the one you require and you're done. Naturally > the time saving here is coming from the hash table searches for every > given CIDR size being done in parallel; the thread controller code is > still going to iterate, but it's just checking a return code. It might be a good idea or a bad one: the management of the kthreads may cost more in performance than iterating through the CIDR sizes. A thorough testing could tell the difference. > I already took a stab at this, but it's currently impossible because the > moment kthread_create_on_node() is called and goes into > sched_setscheduler_nocheck(), it triggers BUG_ON(in_interrupt()) - I poked > through all the base code but I don't see exactly how or why we're inside an > interrupt context when responding to ipset userspace commands. It's a socket-based communication, I believe that's the reason. Best regards, Jozsef - E-mail : kadlec@blackhole.kfki.hu, kadlecsik.jozsef@wigner.mta.hu PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt Address : Wigner Research Centre for Physics, Hungarian Academy of Sciences H-1525 Budapest 114, POB. 49, Hungary -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/kernel/include/linux/netfilter/ipset/ip_set.h b/kernel/include/linux/netfilter/ipset/ip_set.h index f974f35..03f99d6 100644 --- a/kernel/include/linux/netfilter/ipset/ip_set.h +++ b/kernel/include/linux/netfilter/ipset/ip_set.h @@ -399,6 +399,8 @@ bitmap_bytes(u32 a, u32 b) { .bytes = ULLONG_MAX, .packets = ULLONG_MAX, \ .timeout = (map)->timeout } +#define IP_SET_INIT_CIDR(a, b) ((a) ? (a) : (b)) + #define IPSET_CONCAT(a, b) a##b #define IPSET_TOKEN(a, b) IPSET_CONCAT(a, b) diff --git a/kernel/net/netfilter/ipset/ip_set_hash_gen.h b/kernel/net/netfilter/ipset/ip_set_hash_gen.h index c694079..596fcb6 100644 --- a/kernel/net/netfilter/ipset/ip_set_hash_gen.h +++ b/kernel/net/netfilter/ipset/ip_set_hash_gen.h @@ -77,10 +77,14 @@ struct htable { #define hbucket(h, i) (&((h)->bucket[i])) +#ifndef IPSET_NET_COUNT +#define IPSET_NET_COUNT 1 +#endif + /* Book-keeping of the prefixes added to the set */ struct net_prefixes { - u8 cidr; /* the different cidr values in the set */ - u32 nets; /* number of elements per cidr */ + u32 nets[IPSET_NET_COUNT]; /* number of elements per cidr */ + u8 cidr[IPSET_NET_COUNT]; /* the different cidr values in the set */ }; /* Compute the hash table size */ @@ -165,13 +169,13 @@ hbucket_elem_add(struct hbucket *n, u8 ahash_max, size_t dsize) #define SET_HOST_MASK(family) (family == AF_INET ? 32 : 128) #ifdef IP_SET_HASH_WITH_MULTI -#define NETS_LENGTH(family) (SET_HOST_MASK(family) + 1) +#define NLEN(family) (SET_HOST_MASK(family) + 1) #else -#define NETS_LENGTH(family) SET_HOST_MASK(family) +#define NLEN(family) SET_HOST_MASK(family) #endif #else -#define NETS_LENGTH(family) 0 +#define NLEN(family) 0 #endif /* IP_SET_HASH_WITH_NETS */ #define ext_timeout(e, h) \ @@ -296,46 +300,46 @@ struct htype { /* Network cidr size book keeping when the hash stores different * sized networks */ static void -mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length) +mtype_add_cidr(struct htype *h, u8 cidr, u8 nets_length, u8 n) { int i, j; /* Add in increasing prefix order, so larger cidr first */ - for (i = 0, j = -1; i < nets_length && h->nets[i].nets; i++) { + for (i = 0, j = -1; i < nets_length && h->nets[i].nets[n]; i++) { if (j != -1) continue; - else if (h->nets[i].cidr < cidr) + else if (h->nets[i].cidr[n] < cidr) j = i; - else if (h->nets[i].cidr == cidr) { - h->nets[i].nets++; + else if (h->nets[i].cidr[n] == cidr) { + h->nets[i].nets[n]++; return; } } if (j != -1) { for (; i > j; i--) { - h->nets[i].cidr = h->nets[i - 1].cidr; - h->nets[i].nets = h->nets[i - 1].nets; + h->nets[i].cidr[n] = h->nets[i - 1].cidr[n]; + h->nets[i].nets[n] = h->nets[i - 1].nets[n]; } } - h->nets[i].cidr = cidr; - h->nets[i].nets = 1; + h->nets[i].cidr[n] = cidr; + h->nets[i].nets[n] = 1; } static void -mtype_del_cidr(struct htype *h, u8 cidr, u8 nets_length) +mtype_del_cidr(struct htype *h, u8 cidr, u8 nets_length, u8 n) { u8 i, j; - for (i = 0; i < nets_length - 1 && h->nets[i].cidr != cidr; i++) + for (i = 0; i < nets_length - 1 && h->nets[i].cidr[n] != cidr; i++) ; - h->nets[i].nets--; + h->nets[i].nets[n]--; - if (h->nets[i].nets != 0) + if (h->nets[i].nets[n] != 0) return; - for (j = i; j < nets_length - 1 && h->nets[j].nets; j++) { - h->nets[j].cidr = h->nets[j + 1].cidr; - h->nets[j].nets = h->nets[j + 1].nets; + for (j = i; j < nets_length - 1 && h->nets[j].nets[n]; j++) { + h->nets[j].cidr[n] = h->nets[j + 1].cidr[n]; + h->nets[j].nets[n] = h->nets[j + 1].nets[n]; } } #endif @@ -378,8 +382,7 @@ mtype_flush(struct ip_set *set) } } #ifdef IP_SET_HASH_WITH_NETS - memset(h->nets, 0, sizeof(struct net_prefixes) - * NETS_LENGTH(set->family)); + memset(h->nets, 0, sizeof(struct net_prefixes) * NLEN(set->family)); #endif h->elements = 0; } @@ -455,7 +458,7 @@ mtype_expire(struct htype *h, u8 nets_length, size_t dsize) pr_debug("expired %u/%u\n", i, j); #ifdef IP_SET_HASH_WITH_NETS mtype_del_cidr(h, CIDR(data->cidr), - nets_length); + nets_length, 0); #endif if (j != n->pos - 1) /* Not last one */ @@ -490,7 +493,7 @@ mtype_gc(unsigned long ul_set) pr_debug("called\n"); write_lock_bh(&set->lock); - mtype_expire(h, NETS_LENGTH(set->family), h->dsize); + mtype_expire(h, NLEN(set->family), h->dsize); write_unlock_bh(&set->lock); h->gc.expires = jiffies + IPSET_GC_PERIOD(h->timeout) * HZ; @@ -519,8 +522,7 @@ mtype_resize(struct ip_set *set, bool retried) if (SET_WITH_TIMEOUT(set) && !retried) { i = h->elements; write_lock_bh(&set->lock); - mtype_expire(set->data, NETS_LENGTH(set->family), - h->dsize); + mtype_expire(set->data, NLEN(set->family), h->dsize); write_unlock_bh(&set->lock); if (h->elements < i) return 0; @@ -603,7 +605,7 @@ mtype_add(struct ip_set *set, void *value, const struct ip_set_ext *ext, if (SET_WITH_TIMEOUT(set) && h->elements >= h->maxelem) /* FIXME: when set is full, we slow down here */ - mtype_expire(h, NETS_LENGTH(set->family), h->dsize); + mtype_expire(h, NLEN(set->family), h->dsize); if (h->elements >= h->maxelem) { if (net_ratelimit()) @@ -641,8 +643,8 @@ reuse_slot: /* Fill out reused slot */ data = ahash_data(n, j, h->dsize); #ifdef IP_SET_HASH_WITH_NETS - mtype_del_cidr(h, CIDR(data->cidr), NETS_LENGTH(set->family)); - mtype_add_cidr(h, CIDR(d->cidr), NETS_LENGTH(set->family)); + mtype_del_cidr(h, CIDR(data->cidr), NLEN(set->family), 0); + mtype_add_cidr(h, CIDR(d->cidr), NLEN(set->family), 0); #endif } else { /* Use/create a new slot */ @@ -655,7 +657,7 @@ reuse_slot: } data = ahash_data(n, n->pos++, h->dsize); #ifdef IP_SET_HASH_WITH_NETS - mtype_add_cidr(h, CIDR(d->cidr), NETS_LENGTH(set->family)); + mtype_add_cidr(h, CIDR(d->cidr), NLEN(set->family), 0); #endif h->elements++; } @@ -707,7 +709,7 @@ mtype_del(struct ip_set *set, void *value, const struct ip_set_ext *ext, n->pos--; h->elements--; #ifdef IP_SET_HASH_WITH_NETS - mtype_del_cidr(h, CIDR(d->cidr), NETS_LENGTH(set->family)); + mtype_del_cidr(h, CIDR(d->cidr), NLEN(set->family), 0); #endif if (n->pos + AHASH_INIT_SIZE < n->size) { void *tmp = kzalloc((n->size - AHASH_INIT_SIZE) @@ -756,11 +758,11 @@ mtype_test_cidrs(struct ip_set *set, struct mtype_elem *d, struct mtype_elem *data; int i, j = 0; u32 key, multi = 0; - u8 nets_length = NETS_LENGTH(set->family); + u8 nets_length = NLEN(set->family); pr_debug("test by nets\n"); - for (; j < nets_length && h->nets[j].nets && !multi; j++) { - mtype_data_netmask(d, h->nets[j].cidr); + for (; j < nets_length && h->nets[j].nets[0] && !multi; j++) { + mtype_data_netmask(d, h->nets[j].cidr[0]); key = HKEY(d, h->initval, t->htable_bits); n = hbucket(t, key); for (i = 0; i < n->pos; i++) { @@ -835,7 +837,7 @@ mtype_head(struct ip_set *set, struct sk_buff *skb) size_t memsize; t = rcu_dereference_bh_nfnl(h->table); - memsize = mtype_ahash_memsize(h, t, NETS_LENGTH(set->family)); + memsize = mtype_ahash_memsize(h, t, NLEN(set->family)); nested = ipset_nest_start(skb, IPSET_ATTR_DATA); if (!nested) diff --git a/kernel/net/netfilter/ipset/ip_set_hash_ipportnet.c b/kernel/net/netfilter/ipset/ip_set_hash_ipportnet.c index f111558..6ce5a8e 100644 --- a/kernel/net/netfilter/ipset/ip_set_hash_ipportnet.c +++ b/kernel/net/netfilter/ipset/ip_set_hash_ipportnet.c @@ -170,7 +170,7 @@ hash_ipportnet4_kadt(struct ip_set *set, const struct sk_buff *skb, const struct hash_ipportnet *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_ipportnet4_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr - 1 : HOST_MASK - 1 + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK) - 1, }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h); @@ -454,7 +454,7 @@ hash_ipportnet6_kadt(struct ip_set *set, const struct sk_buff *skb, const struct hash_ipportnet *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_ipportnet6_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr - 1 : HOST_MASK - 1 + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK) - 1, }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h); diff --git a/kernel/net/netfilter/ipset/ip_set_hash_net.c b/kernel/net/netfilter/ipset/ip_set_hash_net.c index 0a64dad..ec1c7dc 100644 --- a/kernel/net/netfilter/ipset/ip_set_hash_net.c +++ b/kernel/net/netfilter/ipset/ip_set_hash_net.c @@ -143,7 +143,7 @@ hash_net4_kadt(struct ip_set *set, const struct sk_buff *skb, const struct hash_net *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_net4_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr : HOST_MASK + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK), }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h); @@ -338,7 +338,7 @@ hash_net6_kadt(struct ip_set *set, const struct sk_buff *skb, const struct hash_net *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_net6_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr : HOST_MASK + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK), }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h); diff --git a/kernel/net/netfilter/ipset/ip_set_hash_netiface.c b/kernel/net/netfilter/ipset/ip_set_hash_netiface.c index 846371b..814b4e3 100644 --- a/kernel/net/netfilter/ipset/ip_set_hash_netiface.c +++ b/kernel/net/netfilter/ipset/ip_set_hash_netiface.c @@ -265,7 +265,7 @@ hash_netiface4_kadt(struct ip_set *set, const struct sk_buff *skb, struct hash_netiface *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_netiface4_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr : HOST_MASK, + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK), .elem = 1, }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h); @@ -534,7 +534,7 @@ hash_netiface6_kadt(struct ip_set *set, const struct sk_buff *skb, struct hash_netiface *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_netiface6_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr : HOST_MASK, + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK), .elem = 1, }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h); diff --git a/kernel/net/netfilter/ipset/ip_set_hash_netport.c b/kernel/net/netfilter/ipset/ip_set_hash_netport.c index d98a685..3bd923d 100644 --- a/kernel/net/netfilter/ipset/ip_set_hash_netport.c +++ b/kernel/net/netfilter/ipset/ip_set_hash_netport.c @@ -162,7 +162,7 @@ hash_netport4_kadt(struct ip_set *set, const struct sk_buff *skb, const struct hash_netport *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_netport4_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr - 1 : HOST_MASK - 1 + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK) - 1, }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h); @@ -407,7 +407,7 @@ hash_netport6_kadt(struct ip_set *set, const struct sk_buff *skb, const struct hash_netport *h = set->data; ipset_adtfn adtfn = set->variant->adt[adt]; struct hash_netport6_elem e = { - .cidr = h->nets[0].cidr ? h->nets[0].cidr - 1 : HOST_MASK - 1, + .cidr = IP_SET_INIT_CIDR(h->nets[0].cidr[0], HOST_MASK) - 1, }; struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, h);