For convenience when performing GC over the connection list, make
nf_conncount_gc_list() to disable BH. This unifies the behavior with
nf_conncount_add() and nf_conncount_count().

Signed-off-by: Fernando Fernandez Mancera <[email protected]>
---
 net/netfilter/nf_conncount.c  | 24 +++++++++++++++++-------
 net/netfilter/nft_connlimit.c |  7 +------
 2 files changed, 18 insertions(+), 13 deletions(-)

diff --git a/net/netfilter/nf_conncount.c b/net/netfilter/nf_conncount.c
index 803589f4eaa1..cb52fe928a77 100644
--- a/net/netfilter/nf_conncount.c
+++ b/net/netfilter/nf_conncount.c
@@ -227,8 +227,8 @@ void nf_conncount_list_init(struct nf_conncount_list *list)
 EXPORT_SYMBOL_GPL(nf_conncount_list_init);
 
 /* Return true if the list is empty. Must be called with BH disabled. */
-bool nf_conncount_gc_list(struct net *net,
-                         struct nf_conncount_list *list)
+static bool __nf_conncount_gc_list(struct net *net,
+                                  struct nf_conncount_list *list)
 {
        const struct nf_conntrack_tuple_hash *found;
        struct nf_conncount_tuple *conn, *conn_n;
@@ -240,10 +240,6 @@ bool nf_conncount_gc_list(struct net *net,
        if ((u32)jiffies == READ_ONCE(list->last_gc))
                return false;
 
-       /* don't bother if other cpu is already doing GC */
-       if (!spin_trylock(&list->list_lock))
-               return false;
-
        list_for_each_entry_safe(conn, conn_n, &list->head, node) {
                found = find_or_evict(net, list, conn);
                if (IS_ERR(found)) {
@@ -272,7 +268,21 @@ bool nf_conncount_gc_list(struct net *net,
        if (!list->count)
                ret = true;
        list->last_gc = (u32)jiffies;
-       spin_unlock(&list->list_lock);
+
+       return ret;
+};
+
+bool nf_conncount_gc_list(struct net *net,
+                         struct nf_conncount_list *list)
+{
+       bool ret;
+
+       /* don't bother if other cpu is already doing GC */
+       if (!spin_trylock_bh(&list->list_lock))
+               return false;
+
+       ret = __nf_conncount_gc_list(net, list);
+       spin_unlock_bh(&list->list_lock);
 
        return ret;
 }
diff --git a/net/netfilter/nft_connlimit.c b/net/netfilter/nft_connlimit.c
index e815c0235b62..3c1d9ae37bec 100644
--- a/net/netfilter/nft_connlimit.c
+++ b/net/netfilter/nft_connlimit.c
@@ -245,13 +245,8 @@ static void nft_connlimit_destroy_clone(const struct 
nft_ctx *ctx,
 static bool nft_connlimit_gc(struct net *net, const struct nft_expr *expr)
 {
        struct nft_connlimit *priv = nft_expr_priv(expr);
-       bool ret;
 
-       local_bh_disable();
-       ret = nf_conncount_gc_list(net, priv->list);
-       local_bh_enable();
-
-       return ret;
+       return nf_conncount_gc_list(net, priv->list);
 }
 
 static struct nft_expr_type nft_connlimit_type;
-- 
2.51.0

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to