Commit afed2b54 authored by Phil Sutter's avatar Phil Sutter Committed by Florian Westphal

netfilter: nf_tables: Always allocate nft_rule_dump_ctx

It will move into struct netlink_callback's scratch area later, just put
nf_tables_dump_rules_start in shape to reduce churn later.
Suggested-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: default avatarPhil Sutter <phil@nwl.cc>
Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
parent f0107b86
...@@ -3521,10 +3521,10 @@ static int nf_tables_dump_rules(struct sk_buff *skb, ...@@ -3521,10 +3521,10 @@ static int nf_tables_dump_rules(struct sk_buff *skb,
if (family != NFPROTO_UNSPEC && family != table->family) if (family != NFPROTO_UNSPEC && family != table->family)
continue; continue;
if (ctx && ctx->table && strcmp(ctx->table, table->name) != 0) if (ctx->table && strcmp(ctx->table, table->name) != 0)
continue; continue;
if (ctx && ctx->table && ctx->chain) { if (ctx->table && ctx->chain) {
struct rhlist_head *list, *tmp; struct rhlist_head *list, *tmp;
list = rhltable_lookup(&table->chains_ht, ctx->chain, list = rhltable_lookup(&table->chains_ht, ctx->chain,
...@@ -3548,7 +3548,7 @@ static int nf_tables_dump_rules(struct sk_buff *skb, ...@@ -3548,7 +3548,7 @@ static int nf_tables_dump_rules(struct sk_buff *skb,
goto done; goto done;
} }
if (ctx && ctx->table) if (ctx->table)
break; break;
} }
done: done:
...@@ -3563,27 +3563,23 @@ static int nf_tables_dump_rules_start(struct netlink_callback *cb) ...@@ -3563,27 +3563,23 @@ static int nf_tables_dump_rules_start(struct netlink_callback *cb)
const struct nlattr * const *nla = cb->data; const struct nlattr * const *nla = cb->data;
struct nft_rule_dump_ctx *ctx = NULL; struct nft_rule_dump_ctx *ctx = NULL;
if (nla[NFTA_RULE_TABLE] || nla[NFTA_RULE_CHAIN]) { ctx = kzalloc(sizeof(*ctx), GFP_ATOMIC);
ctx = kzalloc(sizeof(*ctx), GFP_ATOMIC); if (!ctx)
if (!ctx) return -ENOMEM;
return -ENOMEM;
if (nla[NFTA_RULE_TABLE]) { if (nla[NFTA_RULE_TABLE]) {
ctx->table = nla_strdup(nla[NFTA_RULE_TABLE], ctx->table = nla_strdup(nla[NFTA_RULE_TABLE], GFP_ATOMIC);
GFP_ATOMIC); if (!ctx->table) {
if (!ctx->table) { kfree(ctx);
kfree(ctx); return -ENOMEM;
return -ENOMEM;
}
} }
if (nla[NFTA_RULE_CHAIN]) { }
ctx->chain = nla_strdup(nla[NFTA_RULE_CHAIN], if (nla[NFTA_RULE_CHAIN]) {
GFP_ATOMIC); ctx->chain = nla_strdup(nla[NFTA_RULE_CHAIN], GFP_ATOMIC);
if (!ctx->chain) { if (!ctx->chain) {
kfree(ctx->table); kfree(ctx->table);
kfree(ctx); kfree(ctx);
return -ENOMEM; return -ENOMEM;
}
} }
} }
...@@ -3595,11 +3591,9 @@ static int nf_tables_dump_rules_done(struct netlink_callback *cb) ...@@ -3595,11 +3591,9 @@ static int nf_tables_dump_rules_done(struct netlink_callback *cb)
{ {
struct nft_rule_dump_ctx *ctx = cb->data; struct nft_rule_dump_ctx *ctx = cb->data;
if (ctx) { kfree(ctx->table);
kfree(ctx->table); kfree(ctx->chain);
kfree(ctx->chain); kfree(ctx);
kfree(ctx);
}
return 0; return 0;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment