Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752806AbZIBPgN (ORCPT ); Wed, 2 Sep 2009 11:36:13 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752689AbZIBPgM (ORCPT ); Wed, 2 Sep 2009 11:36:12 -0400 Received: from stinky.trash.net ([213.144.137.162]:49005 "EHLO stinky.trash.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751339AbZIBPgL (ORCPT ); Wed, 2 Sep 2009 11:36:11 -0400 Message-ID: <4A9E90E4.9080805@trash.net> Date: Wed, 02 Sep 2009 17:36:04 +0200 From: Patrick McHardy User-Agent: Mozilla-Thunderbird 2.0.0.22 (X11/20090701) MIME-Version: 1.0 To: Hannes Eder CC: lvs-devel@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, netfilter-devel@vger.kernel.org, =?ISO-8859-15?Q?Fabien_Duch=EAne?= , Jan Engelhardt , Jean-Luc Fortemaison , Julian Anastasov , Julius Volz , Laurent Grawet , Simon Horman , Wensong Zhang Subject: Re: [PATCH 1/3] netfilter: xt_ipvs (netfilter matcher for IPVS) References: <20090902101417.11561.45663.stgit@jazzy.zrh.corp.google.com> <20090902101527.11561.59498.stgit@jazzy.zrh.corp.google.com> <4A9E8711.1070807@trash.net> In-Reply-To: X-Enigmail-Version: 0.95.0 Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2336 Lines: 71 Hannes Eder wrote: > On Wed, Sep 2, 2009 at 16:54, Patrick McHardy wrote: >> Hannes Eder wrote: >>> This implements the kernel-space side of the netfilter matcher >>> xt_ipvs. >> Looks mostly fine to me, just one question: >> >>> +bool ipvs_mt(const struct sk_buff *skb, const struct xt_match_param *par) >>> +{ >>> + const struct xt_ipvs *data = par->matchinfo; >>> + const u_int8_t family = par->family; >>> + struct ip_vs_iphdr iph; >>> + struct ip_vs_protocol *pp; >>> + struct ip_vs_conn *cp; >>> + int af; >>> + bool match = true; >>> + >>> + if (data->bitmask == XT_IPVS_IPVS_PROPERTY) { >>> + match = skb->ipvs_property ^ >>> + !!(data->invert & XT_IPVS_IPVS_PROPERTY); >>> + goto out; >>> + } >>> + >>> + /* other flags than XT_IPVS_IPVS_PROPERTY are set */ >>> + if (!skb->ipvs_property) { >>> + match = false; >>> + goto out; >>> + } >>> + >>> + switch (skb->protocol) { >>> + case htons(ETH_P_IP): >>> + af = AF_INET; >>> + break; >>> +#ifdef CONFIG_IP_VS_IPV6 >>> + case htons(ETH_P_IPV6): >>> + af = AF_INET6; >>> + break; >>> +#endif >>> + default: >>> + match = false; >>> + goto out; >>> + } >> In the NF_INET_LOCAL_OUT hook skb->protocol is invalid. So if you >> don't need this, it would make sense to restrict the match to the >> other hooks. >> >> Even easier would be to use par->family, which contains the address >> family and doesn't need any translation. > > Nice, I'll use par->family. > > So in theory I do not even need a check like the following in the beginning? > > if (family != NFPROTO_IPV4 > #ifdef CONFIG_IP_VS_IPV6 > && family != NFPROTO_IPV6 > #endif > ) { > match = false; > goto out; > } With the AF_UNSPEC registration of your match, it might be used with different families. But you could add two seperate IPV4/IPV6 registrations or catch an invalid family in ->checkentry() and remove the runtime check. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/