Searched hist:"3 dd0673a" (Results 1 – 3 of 3) sorted by relevance
/openbmc/linux/net/netfilter/ |
H A D | nft_hash.c | 3dd0673a Sun Apr 05 07:41:06 CDT 2015 Patrick McHardy <kaber@trash.net> netfilter: nf_tables: prepare set element accounting for async updates
Use atomic operations for the element count to avoid races with async updates.
To properly handle the transactional semantics during netlink updates, deleted but not yet committed elements are accounted for seperately and are treated as being already removed. This means for the duration of a netlink transaction, the limit might be exceeded by the amount of elements deleted. Set implementations must be prepared to handle this.
Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> 3dd0673a Sun Apr 05 07:41:06 CDT 2015 Patrick McHardy <kaber@trash.net> netfilter: nf_tables: prepare set element accounting for async updates Use atomic operations for the element count to avoid races with async updates. To properly handle the transactional semantics during netlink updates, deleted but not yet committed elements are accounted for seperately and are treated as being already removed. This means for the duration of a netlink transaction, the limit might be exceeded by the amount of elements deleted. Set implementations must be prepared to handle this. Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
H A D | nf_tables_api.c | 3dd0673a Sun Apr 05 07:41:06 CDT 2015 Patrick McHardy <kaber@trash.net> netfilter: nf_tables: prepare set element accounting for async updates
Use atomic operations for the element count to avoid races with async updates.
To properly handle the transactional semantics during netlink updates, deleted but not yet committed elements are accounted for seperately and are treated as being already removed. This means for the duration of a netlink transaction, the limit might be exceeded by the amount of elements deleted. Set implementations must be prepared to handle this.
Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> 3dd0673a Sun Apr 05 07:41:06 CDT 2015 Patrick McHardy <kaber@trash.net> netfilter: nf_tables: prepare set element accounting for async updates Use atomic operations for the element count to avoid races with async updates. To properly handle the transactional semantics during netlink updates, deleted but not yet committed elements are accounted for seperately and are treated as being already removed. This means for the duration of a netlink transaction, the limit might be exceeded by the amount of elements deleted. Set implementations must be prepared to handle this. Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|
/openbmc/linux/include/net/netfilter/ |
H A D | nf_tables.h | 3dd0673a Sun Apr 05 07:41:06 CDT 2015 Patrick McHardy <kaber@trash.net> netfilter: nf_tables: prepare set element accounting for async updates
Use atomic operations for the element count to avoid races with async updates.
To properly handle the transactional semantics during netlink updates, deleted but not yet committed elements are accounted for seperately and are treated as being already removed. This means for the duration of a netlink transaction, the limit might be exceeded by the amount of elements deleted. Set implementations must be prepared to handle this.
Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> 3dd0673a Sun Apr 05 07:41:06 CDT 2015 Patrick McHardy <kaber@trash.net> netfilter: nf_tables: prepare set element accounting for async updates Use atomic operations for the element count to avoid races with async updates. To properly handle the transactional semantics during netlink updates, deleted but not yet committed elements are accounted for seperately and are treated as being already removed. This means for the duration of a netlink transaction, the limit might be exceeded by the amount of elements deleted. Set implementations must be prepared to handle this. Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
|