netfilter: nft_set: remove one argument from lookup and update functions

Return the extension pointer instead of passing it as a function
argument to be filled in by the callee.

As-is, whenever false is returned, the extension pointer is not used.

For all set types, when true is returned, the extension pointer was set
to the matching element.

Only exception: nft_set_bitmap doesn't support extensions.
Return a pointer to a static const empty element extension container.

return false -> return NULL
return true -> return the elements' extension pointer.

This saves one function argument.

Signed-off-by: Florian Westphal <fw@strlen.de>
Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
Florian Westphal 2025-07-09 19:05:13 +02:00 committed by Pablo Neira Ayuso
parent 7792c1e030
commit 17a20e09f0
10 changed files with 127 additions and 118 deletions

View file

@ -459,19 +459,17 @@ struct nft_set_ext;
* control plane functions. * control plane functions.
*/ */
struct nft_set_ops { struct nft_set_ops {
bool (*lookup)(const struct net *net, const struct nft_set_ext * (*lookup)(const struct net *net,
const struct nft_set *set, const struct nft_set *set,
const u32 *key, const u32 *key);
const struct nft_set_ext **ext); const struct nft_set_ext * (*update)(struct nft_set *set,
bool (*update)(struct nft_set *set,
const u32 *key, const u32 *key,
struct nft_elem_priv * struct nft_elem_priv *
(*new)(struct nft_set *, (*new)(struct nft_set *,
const struct nft_expr *, const struct nft_expr *,
struct nft_regs *), struct nft_regs *),
const struct nft_expr *expr, const struct nft_expr *expr,
struct nft_regs *regs, struct nft_regs *regs);
const struct nft_set_ext **ext);
bool (*delete)(const struct nft_set *set, bool (*delete)(const struct nft_set *set,
const u32 *key); const u32 *key);

View file

@ -94,34 +94,41 @@ extern const struct nft_set_type nft_set_pipapo_type;
extern const struct nft_set_type nft_set_pipapo_avx2_type; extern const struct nft_set_type nft_set_pipapo_avx2_type;
#ifdef CONFIG_MITIGATION_RETPOLINE #ifdef CONFIG_MITIGATION_RETPOLINE
bool nft_rhash_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext); nft_rhash_lookup(const struct net *net, const struct nft_set *set,
bool nft_rbtree_lookup(const struct net *net, const struct nft_set *set, const u32 *key);
const u32 *key, const struct nft_set_ext **ext); const struct nft_set_ext *
bool nft_bitmap_lookup(const struct net *net, const struct nft_set *set, nft_rbtree_lookup(const struct net *net, const struct nft_set *set,
const u32 *key, const struct nft_set_ext **ext); const u32 *key);
bool nft_hash_lookup_fast(const struct net *net, const struct nft_set_ext *
const struct nft_set *set, nft_bitmap_lookup(const struct net *net, const struct nft_set *set,
const u32 *key, const struct nft_set_ext **ext); const u32 *key);
bool nft_hash_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext); nft_hash_lookup_fast(const struct net *net, const struct nft_set *set,
bool nft_set_do_lookup(const struct net *net, const struct nft_set *set, const u32 *key);
const u32 *key, const struct nft_set_ext **ext); const struct nft_set_ext *
#else nft_hash_lookup(const struct net *net, const struct nft_set *set,
static inline bool const u32 *key);
const struct nft_set_ext *
nft_set_do_lookup(const struct net *net, const struct nft_set *set, nft_set_do_lookup(const struct net *net, const struct nft_set *set,
const u32 *key, const struct nft_set_ext **ext) const u32 *key);
#else
static inline const struct nft_set_ext *
nft_set_do_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
return set->ops->lookup(net, set, key, ext); return set->ops->lookup(net, set, key);
} }
#endif #endif
/* called from nft_pipapo_avx2.c */ /* called from nft_pipapo_avx2.c */
bool nft_pipapo_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext); nft_pipapo_lookup(const struct net *net, const struct nft_set *set,
const u32 *key);
/* called from nft_set_pipapo.c */ /* called from nft_set_pipapo.c */
bool nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext); nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set,
const u32 *key);
void nft_counter_init_seqcount(void); void nft_counter_init_seqcount(void);

View file

@ -91,8 +91,9 @@ void nft_dynset_eval(const struct nft_expr *expr,
return; return;
} }
if (set->ops->update(set, &regs->data[priv->sreg_key], nft_dynset_new, ext = set->ops->update(set, &regs->data[priv->sreg_key], nft_dynset_new,
expr, regs, &ext)) { expr, regs);
if (ext) {
if (priv->op == NFT_DYNSET_OP_UPDATE && if (priv->op == NFT_DYNSET_OP_UPDATE &&
nft_set_ext_exists(ext, NFT_SET_EXT_TIMEOUT) && nft_set_ext_exists(ext, NFT_SET_EXT_TIMEOUT) &&
READ_ONCE(nft_set_ext_timeout(ext)->timeout) != 0) { READ_ONCE(nft_set_ext_timeout(ext)->timeout) != 0) {

View file

@ -25,32 +25,33 @@ struct nft_lookup {
}; };
#ifdef CONFIG_MITIGATION_RETPOLINE #ifdef CONFIG_MITIGATION_RETPOLINE
bool nft_set_do_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext) nft_set_do_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
if (set->ops == &nft_set_hash_fast_type.ops) if (set->ops == &nft_set_hash_fast_type.ops)
return nft_hash_lookup_fast(net, set, key, ext); return nft_hash_lookup_fast(net, set, key);
if (set->ops == &nft_set_hash_type.ops) if (set->ops == &nft_set_hash_type.ops)
return nft_hash_lookup(net, set, key, ext); return nft_hash_lookup(net, set, key);
if (set->ops == &nft_set_rhash_type.ops) if (set->ops == &nft_set_rhash_type.ops)
return nft_rhash_lookup(net, set, key, ext); return nft_rhash_lookup(net, set, key);
if (set->ops == &nft_set_bitmap_type.ops) if (set->ops == &nft_set_bitmap_type.ops)
return nft_bitmap_lookup(net, set, key, ext); return nft_bitmap_lookup(net, set, key);
if (set->ops == &nft_set_pipapo_type.ops) if (set->ops == &nft_set_pipapo_type.ops)
return nft_pipapo_lookup(net, set, key, ext); return nft_pipapo_lookup(net, set, key);
#if defined(CONFIG_X86_64) && !defined(CONFIG_UML) #if defined(CONFIG_X86_64) && !defined(CONFIG_UML)
if (set->ops == &nft_set_pipapo_avx2_type.ops) if (set->ops == &nft_set_pipapo_avx2_type.ops)
return nft_pipapo_avx2_lookup(net, set, key, ext); return nft_pipapo_avx2_lookup(net, set, key);
#endif #endif
if (set->ops == &nft_set_rbtree_type.ops) if (set->ops == &nft_set_rbtree_type.ops)
return nft_rbtree_lookup(net, set, key, ext); return nft_rbtree_lookup(net, set, key);
WARN_ON_ONCE(1); WARN_ON_ONCE(1);
return set->ops->lookup(net, set, key, ext); return set->ops->lookup(net, set, key);
} }
EXPORT_SYMBOL_GPL(nft_set_do_lookup); EXPORT_SYMBOL_GPL(nft_set_do_lookup);
#endif #endif
@ -61,12 +62,12 @@ void nft_lookup_eval(const struct nft_expr *expr,
{ {
const struct nft_lookup *priv = nft_expr_priv(expr); const struct nft_lookup *priv = nft_expr_priv(expr);
const struct nft_set *set = priv->set; const struct nft_set *set = priv->set;
const struct nft_set_ext *ext = NULL;
const struct net *net = nft_net(pkt); const struct net *net = nft_net(pkt);
const struct nft_set_ext *ext;
bool found; bool found;
found = nft_set_do_lookup(net, set, &regs->data[priv->sreg], &ext) ^ ext = nft_set_do_lookup(net, set, &regs->data[priv->sreg]);
priv->invert; found = !!ext ^ priv->invert;
if (!found) { if (!found) {
ext = nft_set_catchall_lookup(net, set); ext = nft_set_catchall_lookup(net, set);
if (!ext) { if (!ext) {

View file

@ -111,10 +111,9 @@ void nft_objref_map_eval(const struct nft_expr *expr,
struct net *net = nft_net(pkt); struct net *net = nft_net(pkt);
const struct nft_set_ext *ext; const struct nft_set_ext *ext;
struct nft_object *obj; struct nft_object *obj;
bool found;
found = nft_set_do_lookup(net, set, &regs->data[priv->sreg], &ext); ext = nft_set_do_lookup(net, set, &regs->data[priv->sreg]);
if (!found) { if (!ext) {
ext = nft_set_catchall_lookup(net, set); ext = nft_set_catchall_lookup(net, set);
if (!ext) { if (!ext) {
regs->verdict.code = NFT_BREAK; regs->verdict.code = NFT_BREAK;

View file

@ -75,16 +75,21 @@ nft_bitmap_active(const u8 *bitmap, u32 idx, u32 off, u8 genmask)
} }
INDIRECT_CALLABLE_SCOPE INDIRECT_CALLABLE_SCOPE
bool nft_bitmap_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext) nft_bitmap_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
const struct nft_bitmap *priv = nft_set_priv(set); const struct nft_bitmap *priv = nft_set_priv(set);
static const struct nft_set_ext found;
u8 genmask = nft_genmask_cur(net); u8 genmask = nft_genmask_cur(net);
u32 idx, off; u32 idx, off;
nft_bitmap_location(set, key, &idx, &off); nft_bitmap_location(set, key, &idx, &off);
return nft_bitmap_active(priv->bitmap, idx, off, genmask); if (nft_bitmap_active(priv->bitmap, idx, off, genmask))
return &found;
return NULL;
} }
static struct nft_bitmap_elem * static struct nft_bitmap_elem *

View file

@ -81,8 +81,9 @@ static const struct rhashtable_params nft_rhash_params = {
}; };
INDIRECT_CALLABLE_SCOPE INDIRECT_CALLABLE_SCOPE
bool nft_rhash_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext) nft_rhash_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
struct nft_rhash *priv = nft_set_priv(set); struct nft_rhash *priv = nft_set_priv(set);
const struct nft_rhash_elem *he; const struct nft_rhash_elem *he;
@ -95,9 +96,9 @@ bool nft_rhash_lookup(const struct net *net, const struct nft_set *set,
he = rhashtable_lookup(&priv->ht, &arg, nft_rhash_params); he = rhashtable_lookup(&priv->ht, &arg, nft_rhash_params);
if (he != NULL) if (he != NULL)
*ext = &he->ext; return &he->ext;
return !!he; return NULL;
} }
static struct nft_elem_priv * static struct nft_elem_priv *
@ -120,14 +121,11 @@ nft_rhash_get(const struct net *net, const struct nft_set *set,
return ERR_PTR(-ENOENT); return ERR_PTR(-ENOENT);
} }
static bool nft_rhash_update(struct nft_set *set, const u32 *key, static const struct nft_set_ext *
struct nft_elem_priv * nft_rhash_update(struct nft_set *set, const u32 *key,
(*new)(struct nft_set *, struct nft_elem_priv *(*new)(struct nft_set *, const struct nft_expr *,
const struct nft_expr *,
struct nft_regs *regs), struct nft_regs *regs),
const struct nft_expr *expr, const struct nft_expr *expr, struct nft_regs *regs)
struct nft_regs *regs,
const struct nft_set_ext **ext)
{ {
struct nft_rhash *priv = nft_set_priv(set); struct nft_rhash *priv = nft_set_priv(set);
struct nft_rhash_elem *he, *prev; struct nft_rhash_elem *he, *prev;
@ -161,14 +159,13 @@ static bool nft_rhash_update(struct nft_set *set, const u32 *key,
} }
out: out:
*ext = &he->ext; return &he->ext;
return true;
err2: err2:
nft_set_elem_destroy(set, &he->priv, true); nft_set_elem_destroy(set, &he->priv, true);
atomic_dec(&set->nelems); atomic_dec(&set->nelems);
err1: err1:
return false; return NULL;
} }
static int nft_rhash_insert(const struct net *net, const struct nft_set *set, static int nft_rhash_insert(const struct net *net, const struct nft_set *set,
@ -507,8 +504,9 @@ struct nft_hash_elem {
}; };
INDIRECT_CALLABLE_SCOPE INDIRECT_CALLABLE_SCOPE
bool nft_hash_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext) nft_hash_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
struct nft_hash *priv = nft_set_priv(set); struct nft_hash *priv = nft_set_priv(set);
u8 genmask = nft_genmask_cur(net); u8 genmask = nft_genmask_cur(net);
@ -519,12 +517,10 @@ bool nft_hash_lookup(const struct net *net, const struct nft_set *set,
hash = reciprocal_scale(hash, priv->buckets); hash = reciprocal_scale(hash, priv->buckets);
hlist_for_each_entry_rcu(he, &priv->table[hash], node) { hlist_for_each_entry_rcu(he, &priv->table[hash], node) {
if (!memcmp(nft_set_ext_key(&he->ext), key, set->klen) && if (!memcmp(nft_set_ext_key(&he->ext), key, set->klen) &&
nft_set_elem_active(&he->ext, genmask)) { nft_set_elem_active(&he->ext, genmask))
*ext = &he->ext; return &he->ext;
return true;
} }
} return NULL;
return false;
} }
static struct nft_elem_priv * static struct nft_elem_priv *
@ -547,9 +543,9 @@ nft_hash_get(const struct net *net, const struct nft_set *set,
} }
INDIRECT_CALLABLE_SCOPE INDIRECT_CALLABLE_SCOPE
bool nft_hash_lookup_fast(const struct net *net, const struct nft_set_ext *
const struct nft_set *set, nft_hash_lookup_fast(const struct net *net, const struct nft_set *set,
const u32 *key, const struct nft_set_ext **ext) const u32 *key)
{ {
struct nft_hash *priv = nft_set_priv(set); struct nft_hash *priv = nft_set_priv(set);
u8 genmask = nft_genmask_cur(net); u8 genmask = nft_genmask_cur(net);
@ -562,12 +558,10 @@ bool nft_hash_lookup_fast(const struct net *net,
hlist_for_each_entry_rcu(he, &priv->table[hash], node) { hlist_for_each_entry_rcu(he, &priv->table[hash], node) {
k2 = *(u32 *)nft_set_ext_key(&he->ext)->data; k2 = *(u32 *)nft_set_ext_key(&he->ext)->data;
if (k1 == k2 && if (k1 == k2 &&
nft_set_elem_active(&he->ext, genmask)) { nft_set_elem_active(&he->ext, genmask))
*ext = &he->ext; return &he->ext;
return true;
} }
} return NULL;
return false;
} }
static u32 nft_jhash(const struct nft_set *set, const struct nft_hash *priv, static u32 nft_jhash(const struct nft_set *set, const struct nft_hash *priv,

View file

@ -407,8 +407,9 @@ int pipapo_refill(unsigned long *map, unsigned int len, unsigned int rules,
* *
* Return: true on match, false otherwise. * Return: true on match, false otherwise.
*/ */
bool nft_pipapo_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext) nft_pipapo_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
struct nft_pipapo *priv = nft_set_priv(set); struct nft_pipapo *priv = nft_set_priv(set);
struct nft_pipapo_scratch *scratch; struct nft_pipapo_scratch *scratch;
@ -465,13 +466,15 @@ next_match:
scratch->map_index = map_index; scratch->map_index = map_index;
local_bh_enable(); local_bh_enable();
return false; return NULL;
} }
if (last) { if (last) {
*ext = &f->mt[b].e->ext; const struct nft_set_ext *ext;
if (unlikely(nft_set_elem_expired(*ext) ||
!nft_set_elem_active(*ext, genmask))) ext = &f->mt[b].e->ext;
if (unlikely(nft_set_elem_expired(ext) ||
!nft_set_elem_active(ext, genmask)))
goto next_match; goto next_match;
/* Last field: we're just returning the key without /* Last field: we're just returning the key without
@ -482,7 +485,7 @@ next_match:
scratch->map_index = map_index; scratch->map_index = map_index;
local_bh_enable(); local_bh_enable();
return true; return ext;
} }
/* Swap bitmap indices: res_map is the initial bitmap for the /* Swap bitmap indices: res_map is the initial bitmap for the
@ -497,7 +500,7 @@ next_match:
out: out:
local_bh_enable(); local_bh_enable();
return false; return NULL;
} }
/** /**

View file

@ -1146,8 +1146,9 @@ static inline void pipapo_resmap_init_avx2(const struct nft_pipapo_match *m, uns
* *
* Return: true on match, false otherwise. * Return: true on match, false otherwise.
*/ */
bool nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext) nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
struct nft_pipapo *priv = nft_set_priv(set); struct nft_pipapo *priv = nft_set_priv(set);
struct nft_pipapo_scratch *scratch; struct nft_pipapo_scratch *scratch;
@ -1155,17 +1156,18 @@ bool nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set,
const struct nft_pipapo_match *m; const struct nft_pipapo_match *m;
const struct nft_pipapo_field *f; const struct nft_pipapo_field *f;
const u8 *rp = (const u8 *)key; const u8 *rp = (const u8 *)key;
const struct nft_set_ext *ext;
unsigned long *res, *fill; unsigned long *res, *fill;
bool map_index; bool map_index;
int i, ret = 0; int i;
local_bh_disable(); local_bh_disable();
if (unlikely(!irq_fpu_usable())) { if (unlikely(!irq_fpu_usable())) {
bool fallback_res = nft_pipapo_lookup(net, set, key, ext); ext = nft_pipapo_lookup(net, set, key);
local_bh_enable(); local_bh_enable();
return fallback_res; return ext;
} }
m = rcu_dereference(priv->match); m = rcu_dereference(priv->match);
@ -1182,7 +1184,7 @@ bool nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set,
if (unlikely(!scratch)) { if (unlikely(!scratch)) {
kernel_fpu_end(); kernel_fpu_end();
local_bh_enable(); local_bh_enable();
return false; return NULL;
} }
map_index = scratch->map_index; map_index = scratch->map_index;
@ -1197,6 +1199,7 @@ bool nft_pipapo_avx2_lookup(const struct net *net, const struct nft_set *set,
next_match: next_match:
nft_pipapo_for_each_field(f, i, m) { nft_pipapo_for_each_field(f, i, m) {
bool last = i == m->field_count - 1, first = !i; bool last = i == m->field_count - 1, first = !i;
int ret = 0;
#define NFT_SET_PIPAPO_AVX2_LOOKUP(b, n) \ #define NFT_SET_PIPAPO_AVX2_LOOKUP(b, n) \
(ret = nft_pipapo_avx2_lookup_##b##b_##n(res, fill, f, \ (ret = nft_pipapo_avx2_lookup_##b##b_##n(res, fill, f, \
@ -1244,10 +1247,10 @@ next_match:
goto out; goto out;
if (last) { if (last) {
*ext = &f->mt[ret].e->ext; ext = &f->mt[ret].e->ext;
if (unlikely(nft_set_elem_expired(*ext) || if (unlikely(nft_set_elem_expired(ext) ||
!nft_set_elem_active(*ext, genmask))) { !nft_set_elem_active(ext, genmask))) {
ret = 0; ext = NULL;
goto next_match; goto next_match;
} }
@ -1264,5 +1267,5 @@ out:
kernel_fpu_end(); kernel_fpu_end();
local_bh_enable(); local_bh_enable();
return ret >= 0; return ext;
} }

View file

@ -52,9 +52,9 @@ static bool nft_rbtree_elem_expired(const struct nft_rbtree_elem *rbe)
return nft_set_elem_expired(&rbe->ext); return nft_set_elem_expired(&rbe->ext);
} }
static bool __nft_rbtree_lookup(const struct net *net, const struct nft_set *set, static const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext, __nft_rbtree_lookup(const struct net *net, const struct nft_set *set,
unsigned int seq) const u32 *key, unsigned int seq)
{ {
struct nft_rbtree *priv = nft_set_priv(set); struct nft_rbtree *priv = nft_set_priv(set);
const struct nft_rbtree_elem *rbe, *interval = NULL; const struct nft_rbtree_elem *rbe, *interval = NULL;
@ -65,7 +65,7 @@ static bool __nft_rbtree_lookup(const struct net *net, const struct nft_set *set
parent = rcu_dereference_raw(priv->root.rb_node); parent = rcu_dereference_raw(priv->root.rb_node);
while (parent != NULL) { while (parent != NULL) {
if (read_seqcount_retry(&priv->count, seq)) if (read_seqcount_retry(&priv->count, seq))
return false; return NULL;
rbe = rb_entry(parent, struct nft_rbtree_elem, node); rbe = rb_entry(parent, struct nft_rbtree_elem, node);
@ -87,50 +87,48 @@ static bool __nft_rbtree_lookup(const struct net *net, const struct nft_set *set
} }
if (nft_rbtree_elem_expired(rbe)) if (nft_rbtree_elem_expired(rbe))
return false; return NULL;
if (nft_rbtree_interval_end(rbe)) { if (nft_rbtree_interval_end(rbe)) {
if (nft_set_is_anonymous(set)) if (nft_set_is_anonymous(set))
return false; return NULL;
parent = rcu_dereference_raw(parent->rb_left); parent = rcu_dereference_raw(parent->rb_left);
interval = NULL; interval = NULL;
continue; continue;
} }
*ext = &rbe->ext; return &rbe->ext;
return true;
} }
} }
if (set->flags & NFT_SET_INTERVAL && interval != NULL && if (set->flags & NFT_SET_INTERVAL && interval != NULL &&
nft_set_elem_active(&interval->ext, genmask) && nft_set_elem_active(&interval->ext, genmask) &&
!nft_rbtree_elem_expired(interval) && !nft_rbtree_elem_expired(interval) &&
nft_rbtree_interval_start(interval)) { nft_rbtree_interval_start(interval))
*ext = &interval->ext; return &interval->ext;
return true;
}
return false; return NULL;
} }
INDIRECT_CALLABLE_SCOPE INDIRECT_CALLABLE_SCOPE
bool nft_rbtree_lookup(const struct net *net, const struct nft_set *set, const struct nft_set_ext *
const u32 *key, const struct nft_set_ext **ext) nft_rbtree_lookup(const struct net *net, const struct nft_set *set,
const u32 *key)
{ {
struct nft_rbtree *priv = nft_set_priv(set); struct nft_rbtree *priv = nft_set_priv(set);
unsigned int seq = read_seqcount_begin(&priv->count); unsigned int seq = read_seqcount_begin(&priv->count);
bool ret; const struct nft_set_ext *ext;
ret = __nft_rbtree_lookup(net, set, key, ext, seq); ext = __nft_rbtree_lookup(net, set, key, seq);
if (ret || !read_seqcount_retry(&priv->count, seq)) if (ext || !read_seqcount_retry(&priv->count, seq))
return ret; return ext;
read_lock_bh(&priv->lock); read_lock_bh(&priv->lock);
seq = read_seqcount_begin(&priv->count); seq = read_seqcount_begin(&priv->count);
ret = __nft_rbtree_lookup(net, set, key, ext, seq); ext = __nft_rbtree_lookup(net, set, key, seq);
read_unlock_bh(&priv->lock); read_unlock_bh(&priv->lock);
return ret; return ext;
} }
static bool __nft_rbtree_get(const struct net *net, const struct nft_set *set, static bool __nft_rbtree_get(const struct net *net, const struct nft_set *set,