Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
L
linux-davinci
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Redmine
Redmine
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Operations
Operations
Metrics
Environments
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
linux
linux-davinci
Commits
f0f43646
Commit
f0f43646
authored
Oct 05, 2009
by
Thomas Gleixner
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'rt/head' into rt/2.6.31
parents
053b4b64
00ef66eb
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
31 additions
and
15 deletions
+31
-15
include/linux/netfilter/x_tables.h
include/linux/netfilter/x_tables.h
+19
-6
net/ipv4/netfilter/arp_tables.c
net/ipv4/netfilter/arp_tables.c
+4
-3
net/ipv4/netfilter/ip_tables.c
net/ipv4/netfilter/ip_tables.c
+4
-3
net/ipv6/netfilter/ip6_tables.c
net/ipv6/netfilter/ip6_tables.c
+4
-3
No files found.
include/linux/netfilter/x_tables.h
View file @
f0f43646
...
@@ -468,22 +468,35 @@ DECLARE_PER_CPU(struct xt_info_lock, xt_info_locks);
...
@@ -468,22 +468,35 @@ DECLARE_PER_CPU(struct xt_info_lock, xt_info_locks);
* _Only_ that special combination of being per-cpu and never getting
* _Only_ that special combination of being per-cpu and never getting
* re-entered asynchronously means that the count is safe.
* re-entered asynchronously means that the count is safe.
*/
*/
static
inline
void
xt_info_rdlock_bh
(
void
)
static
inline
int
xt_info_rdlock_bh
(
void
)
{
{
struct
xt_info_lock
*
lock
;
struct
xt_info_lock
*
lock
;
int
cpu
;
local_bh_disable
();
local_bh_disable
();
lock
=
&
__raw_get_cpu_var
(
xt_info_locks
);
preempt_disable_rt
();
if
(
likely
(
!
lock
->
readers
++
))
cpu
=
smp_processor_id
();
lock
=
&
per_cpu
(
xt_info_locks
,
cpu
);
if
(
likely
(
!
lock
->
readers
++
))
{
preempt_enable_rt
();
spin_lock
(
&
lock
->
lock
);
spin_lock
(
&
lock
->
lock
);
}
else
preempt_enable_rt
();
return
cpu
;
}
}
static
inline
void
xt_info_rdunlock_bh
(
void
)
static
inline
void
xt_info_rdunlock_bh
(
int
cpu
)
{
{
struct
xt_info_lock
*
lock
=
&
__raw_get_cpu_var
(
xt_info_locks
);
struct
xt_info_lock
*
lock
=
&
per_cpu
(
xt_info_locks
,
cpu
);
if
(
likely
(
!--
lock
->
readers
))
preempt_disable_rt
();
if
(
likely
(
!--
lock
->
readers
))
{
preempt_enable_rt
();
spin_unlock
(
&
lock
->
lock
);
spin_unlock
(
&
lock
->
lock
);
}
else
preempt_enable_rt
();
local_bh_enable
();
local_bh_enable
();
}
}
...
...
net/ipv4/netfilter/arp_tables.c
View file @
f0f43646
...
@@ -252,6 +252,7 @@ unsigned int arpt_do_table(struct sk_buff *skb,
...
@@ -252,6 +252,7 @@ unsigned int arpt_do_table(struct sk_buff *skb,
void
*
table_base
;
void
*
table_base
;
const
struct
xt_table_info
*
private
;
const
struct
xt_table_info
*
private
;
struct
xt_target_param
tgpar
;
struct
xt_target_param
tgpar
;
int
cpu
;
if
(
!
pskb_may_pull
(
skb
,
arp_hdr_len
(
skb
->
dev
)))
if
(
!
pskb_may_pull
(
skb
,
arp_hdr_len
(
skb
->
dev
)))
return
NF_DROP
;
return
NF_DROP
;
...
@@ -259,9 +260,9 @@ unsigned int arpt_do_table(struct sk_buff *skb,
...
@@ -259,9 +260,9 @@ unsigned int arpt_do_table(struct sk_buff *skb,
indev
=
in
?
in
->
name
:
nulldevname
;
indev
=
in
?
in
->
name
:
nulldevname
;
outdev
=
out
?
out
->
name
:
nulldevname
;
outdev
=
out
?
out
->
name
:
nulldevname
;
xt_info_rdlock_bh
();
cpu
=
xt_info_rdlock_bh
();
private
=
table
->
private
;
private
=
table
->
private
;
table_base
=
private
->
entries
[
raw_smp_processor_id
()
];
table_base
=
private
->
entries
[
cpu
];
e
=
get_entry
(
table_base
,
private
->
hook_entry
[
hook
]);
e
=
get_entry
(
table_base
,
private
->
hook_entry
[
hook
]);
back
=
get_entry
(
table_base
,
private
->
underflow
[
hook
]);
back
=
get_entry
(
table_base
,
private
->
underflow
[
hook
]);
...
@@ -332,7 +333,7 @@ unsigned int arpt_do_table(struct sk_buff *skb,
...
@@ -332,7 +333,7 @@ unsigned int arpt_do_table(struct sk_buff *skb,
/* Verdict */
/* Verdict */
break
;
break
;
}
while
(
!
hotdrop
);
}
while
(
!
hotdrop
);
xt_info_rdunlock_bh
();
xt_info_rdunlock_bh
(
cpu
);
if
(
hotdrop
)
if
(
hotdrop
)
return
NF_DROP
;
return
NF_DROP
;
...
...
net/ipv4/netfilter/ip_tables.c
View file @
f0f43646
...
@@ -325,6 +325,7 @@ ipt_do_table(struct sk_buff *skb,
...
@@ -325,6 +325,7 @@ ipt_do_table(struct sk_buff *skb,
struct
xt_table_info
*
private
;
struct
xt_table_info
*
private
;
struct
xt_match_param
mtpar
;
struct
xt_match_param
mtpar
;
struct
xt_target_param
tgpar
;
struct
xt_target_param
tgpar
;
int
cpu
;
/* Initialization */
/* Initialization */
ip
=
ip_hdr
(
skb
);
ip
=
ip_hdr
(
skb
);
...
@@ -346,9 +347,9 @@ ipt_do_table(struct sk_buff *skb,
...
@@ -346,9 +347,9 @@ ipt_do_table(struct sk_buff *skb,
mtpar
.
hooknum
=
tgpar
.
hooknum
=
hook
;
mtpar
.
hooknum
=
tgpar
.
hooknum
=
hook
;
IP_NF_ASSERT
(
table
->
valid_hooks
&
(
1
<<
hook
));
IP_NF_ASSERT
(
table
->
valid_hooks
&
(
1
<<
hook
));
xt_info_rdlock_bh
();
cpu
=
xt_info_rdlock_bh
();
private
=
table
->
private
;
private
=
table
->
private
;
table_base
=
private
->
entries
[
raw_smp_processor_id
()
];
table_base
=
private
->
entries
[
cpu
];
e
=
get_entry
(
table_base
,
private
->
hook_entry
[
hook
]);
e
=
get_entry
(
table_base
,
private
->
hook_entry
[
hook
]);
...
@@ -435,7 +436,7 @@ ipt_do_table(struct sk_buff *skb,
...
@@ -435,7 +436,7 @@ ipt_do_table(struct sk_buff *skb,
/* Verdict */
/* Verdict */
break
;
break
;
}
while
(
!
hotdrop
);
}
while
(
!
hotdrop
);
xt_info_rdunlock_bh
();
xt_info_rdunlock_bh
(
cpu
);
#ifdef DEBUG_ALLOW_ALL
#ifdef DEBUG_ALLOW_ALL
return
NF_ACCEPT
;
return
NF_ACCEPT
;
...
...
net/ipv6/netfilter/ip6_tables.c
View file @
f0f43646
...
@@ -355,6 +355,7 @@ ip6t_do_table(struct sk_buff *skb,
...
@@ -355,6 +355,7 @@ ip6t_do_table(struct sk_buff *skb,
struct
xt_table_info
*
private
;
struct
xt_table_info
*
private
;
struct
xt_match_param
mtpar
;
struct
xt_match_param
mtpar
;
struct
xt_target_param
tgpar
;
struct
xt_target_param
tgpar
;
int
cpu
;
/* Initialization */
/* Initialization */
indev
=
in
?
in
->
name
:
nulldevname
;
indev
=
in
?
in
->
name
:
nulldevname
;
...
@@ -373,9 +374,9 @@ ip6t_do_table(struct sk_buff *skb,
...
@@ -373,9 +374,9 @@ ip6t_do_table(struct sk_buff *skb,
IP_NF_ASSERT
(
table
->
valid_hooks
&
(
1
<<
hook
));
IP_NF_ASSERT
(
table
->
valid_hooks
&
(
1
<<
hook
));
xt_info_rdlock_bh
();
cpu
=
xt_info_rdlock_bh
();
private
=
table
->
private
;
private
=
table
->
private
;
table_base
=
private
->
entries
[
raw_smp_processor_id
()
];
table_base
=
private
->
entries
[
cpu
];
e
=
get_entry
(
table_base
,
private
->
hook_entry
[
hook
]);
e
=
get_entry
(
table_base
,
private
->
hook_entry
[
hook
]);
...
@@ -464,7 +465,7 @@ ip6t_do_table(struct sk_buff *skb,
...
@@ -464,7 +465,7 @@ ip6t_do_table(struct sk_buff *skb,
#ifdef CONFIG_NETFILTER_DEBUG
#ifdef CONFIG_NETFILTER_DEBUG
tb_comefrom
=
NETFILTER_LINK_POISON
;
tb_comefrom
=
NETFILTER_LINK_POISON
;
#endif
#endif
xt_info_rdunlock_bh
();
xt_info_rdunlock_bh
(
cpu
);
#ifdef DEBUG_ALLOW_ALL
#ifdef DEBUG_ALLOW_ALL
return
NF_ACCEPT
;
return
NF_ACCEPT
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment