On Wed, Jan 27, 2021 at 11:14:51AM +1000, David Gwynne wrote:
> On Wed, Jan 27, 2021 at 11:13:12AM +1000, David Gwynne wrote:
> > when pf_route (and pf_route6) are supposed to handle forwarding the
> > packet (ie, for route-to or reply-to rules), they take the mbuf
> > away from the calling code path. this is done by clearing the mbuf
> > pointer in the pf_pdesc struct. it doesn't do this for dup-to rules
> > though.
> > 
> > at the moment pf_route clears that pointer on the way out, but it could
> > take the mbuf away up front in the same place that it already checks if
> > it's a dup-to rule or not.
> > 
> > it's a small change. i've bumped up the number of lines of context so
> > it's easier to read too.
> > 
> > ok?
> 
> sigh. here's the diff with the extra context.

Usually you want all information including the mbuf in pd.
Here it does not matter, pd->m is not accessed.

I see no advantage in changing, so I would leave it as it is.
If others think new code is better, I have no objections.

bluhm

> Index: pf.c
> ===================================================================
> RCS file: /cvs/src/sys/net/pf.c,v
> retrieving revision 1.1101
> diff -u -p -U8 -r1.1101 pf.c
> --- pf.c      19 Jan 2021 22:22:23 -0000      1.1101
> +++ pf.c      27 Jan 2021 01:10:52 -0000
> @@ -5983,16 +5983,17 @@ pf_route(struct pf_pdesc *pd, struct pf_
>  
>       if (r->rt == PF_DUPTO) {
>               if ((m0 = m_dup_pkt(pd->m, max_linkhdr, M_NOWAIT)) == NULL)
>                       return;
>       } else {
>               if ((r->rt == PF_REPLYTO) == (r->direction == pd->dir))
>                       return;
>               m0 = pd->m;
> +             pd->m = NULL;
>       }
>  
>       if (m0->m_len < sizeof(struct ip)) {
>               DPFPRINTF(LOG_ERR,
>                   "%s: m0->m_len < sizeof(struct ip)", __func__);
>               goto bad;
>       }
>  
> @@ -6103,18 +6104,16 @@ pf_route(struct pf_pdesc *pd, struct pf_
>               else
>                       m_freem(m0);
>       }
>  
>       if (error == 0)
>               ipstat_inc(ips_fragmented);
>  
>  done:
> -     if (r->rt != PF_DUPTO)
> -             pd->m = NULL;
>       rtfree(rt);
>       return;
>  
>  bad:
>       m_freem(m0);
>       goto done;
>  }
>  
> @@ -6141,16 +6140,17 @@ pf_route6(struct pf_pdesc *pd, struct pf
>  
>       if (r->rt == PF_DUPTO) {
>               if ((m0 = m_dup_pkt(pd->m, max_linkhdr, M_NOWAIT)) == NULL)
>                       return;
>       } else {
>               if ((r->rt == PF_REPLYTO) == (r->direction == pd->dir))
>                       return;
>               m0 = pd->m;
> +             pd->m = NULL;
>       }
>  
>       if (m0->m_len < sizeof(struct ip6_hdr)) {
>               DPFPRINTF(LOG_ERR,
>                   "%s: m0->m_len < sizeof(struct ip6_hdr)", __func__);
>               goto bad;
>       }
>       ip6 = mtod(m0, struct ip6_hdr *);
> @@ -6232,18 +6232,16 @@ pf_route6(struct pf_pdesc *pd, struct pf
>               ip6stat_inc(ip6s_cantfrag);
>               if (r->rt != PF_DUPTO)
>                       pf_send_icmp(m0, ICMP6_PACKET_TOO_BIG, 0,
>                           ifp->if_mtu, pd->af, r, pd->rdomain);
>               goto bad;
>       }
>  
>  done:
> -     if (r->rt != PF_DUPTO)
> -             pd->m = NULL;
>       rtfree(rt);
>       return;
>  
>  bad:
>       m_freem(m0);
>       goto done;
>  }
>  #endif /* INET6 */

Reply via email to