@@ -646,20 +646,24 @@ static bool nft_arp_rule_find(struct nft_family_ops *ops, struct nftnl_rule *r,
{
const struct iptables_command_state *cs = data;
struct iptables_command_state this = {};
+ bool ret = false;
/* Delete by matching rule case */
nft_rule_to_iptables_command_state(r, &this);
if (!nft_arp_is_same(&cs->arp, &this.arp))
- return false;
+ goto out;
if (!compare_targets(cs->target, this.target))
- return false;
+ goto out;
if (this.jumpto && strcmp(cs->jumpto, this.jumpto) != 0)
- return false;
+ goto out;
- return true;
+ ret = true;
+out:
+ ops->clear_cs(&this);
+ return ret;
}
static void nft_arp_save_chain(const struct nftnl_chain *c, const char *policy)
@@ -547,30 +547,34 @@ static bool nft_bridge_rule_find(struct nft_family_ops *ops, struct nftnl_rule *
{
struct iptables_command_state *cs = data;
struct iptables_command_state this = {};
+ bool ret = false;
nft_rule_to_ebtables_command_state(r, &this);
DEBUGP("comparing with... ");
if (!nft_bridge_is_same(cs, &this))
- return false;
+ goto out;
if (!compare_matches(cs->matches, this.matches)) {
DEBUGP("Different matches\n");
- return false;
+ goto out;
}
if (!compare_targets(cs->target, this.target)) {
DEBUGP("Different target\n");
- return false;
+ goto out;
}
if (cs->jumpto != NULL && strcmp(cs->jumpto, this.jumpto) != 0) {
DEBUGP("Different verdict\n");
- return false;
+ goto out;
}
- return true;
+ ret = true;
+out:
+ ops->clear_cs(&this);
+ return ret;
}
static int xlate_ebmatches(const struct iptables_command_state *cs, struct xt_xlate *xl)
@@ -961,6 +961,7 @@ bool nft_ipv46_rule_find(struct nft_family_ops *ops,
struct nftnl_rule *r, void *data)
{
struct iptables_command_state *cs = data, this = {};
+ bool ret = false;
nft_rule_to_iptables_command_state(r, &this);
@@ -969,24 +970,27 @@ bool nft_ipv46_rule_find(struct nft_family_ops *ops,
nft_rule_print_save(r, NFT_RULE_APPEND, 0);
#endif
if (!ops->is_same(cs, &this))
- return false;
+ goto out;
if (!compare_matches(cs->matches, this.matches)) {
DEBUGP("Different matches\n");
- return false;
+ goto out;
}
if (!compare_targets(cs->target, this.target)) {
DEBUGP("Different target\n");
- return false;
+ goto out;
}
if (strcmp(cs->jumpto, this.jumpto) != 0) {
DEBUGP("Different verdict\n");
- return false;
+ goto out;
}
- return true;
+ ret = true;
+out:
+ ops->clear_cs(&this);
+ return ret;
}
void nft_check_xt_legacy(int family, bool is_ipt_save)
These functions parse an nftnl_rule into a local instance of iptables_command_state which potentially allocates memory (for matches or target), so call ops->clear_cs() before returning to caller. Signed-off-by: Phil Sutter <phil@nwl.cc> --- iptables/nft-arp.c | 12 ++++++++---- iptables/nft-bridge.c | 14 +++++++++----- iptables/nft-shared.c | 14 +++++++++----- 3 files changed, 26 insertions(+), 14 deletions(-)