@@ -234,42 +234,12 @@ static int nft_delchain(struct nft_ctx *ctx)
234
234
return err ;
235
235
}
236
236
237
- static inline bool
238
- nft_rule_is_active (struct net * net , const struct nft_rule * rule )
239
- {
240
- return (rule -> genmask & nft_genmask_cur (net )) == 0 ;
241
- }
242
-
243
- static inline int
244
- nft_rule_is_active_next (struct net * net , const struct nft_rule * rule )
245
- {
246
- return (rule -> genmask & nft_genmask_next (net )) == 0 ;
247
- }
248
-
249
- static inline void
250
- nft_rule_activate_next (struct net * net , struct nft_rule * rule )
251
- {
252
- /* Now inactive, will be active in the future */
253
- rule -> genmask = nft_genmask_cur (net );
254
- }
255
-
256
- static inline void
257
- nft_rule_deactivate_next (struct net * net , struct nft_rule * rule )
258
- {
259
- rule -> genmask = nft_genmask_next (net );
260
- }
261
-
262
- static inline void nft_rule_clear (struct net * net , struct nft_rule * rule )
263
- {
264
- rule -> genmask &= ~nft_genmask_next (net );
265
- }
266
-
267
237
static int
268
238
nf_tables_delrule_deactivate (struct nft_ctx * ctx , struct nft_rule * rule )
269
239
{
270
240
/* You cannot delete the same rule twice */
271
- if (nft_rule_is_active_next (ctx -> net , rule )) {
272
- nft_rule_deactivate_next (ctx -> net , rule );
241
+ if (nft_is_active_next (ctx -> net , rule )) {
242
+ nft_deactivate_next (ctx -> net , rule );
273
243
ctx -> chain -> use -- ;
274
244
return 0 ;
275
245
}
@@ -1898,7 +1868,7 @@ static int nf_tables_dump_rules(struct sk_buff *skb,
1898
1868
list_for_each_entry_rcu (table , & afi -> tables , list ) {
1899
1869
list_for_each_entry_rcu (chain , & table -> chains , list ) {
1900
1870
list_for_each_entry_rcu (rule , & chain -> rules , list ) {
1901
- if (!nft_rule_is_active (net , rule ))
1871
+ if (!nft_is_active (net , rule ))
1902
1872
goto cont ;
1903
1873
if (idx < s_idx )
1904
1874
goto cont ;
@@ -2102,7 +2072,7 @@ static int nf_tables_newrule(struct net *net, struct sock *nlsk,
2102
2072
if (rule == NULL )
2103
2073
goto err1 ;
2104
2074
2105
- nft_rule_activate_next (net , rule );
2075
+ nft_activate_next (net , rule );
2106
2076
2107
2077
rule -> handle = handle ;
2108
2078
rule -> dlen = size ;
@@ -2124,14 +2094,14 @@ static int nf_tables_newrule(struct net *net, struct sock *nlsk,
2124
2094
}
2125
2095
2126
2096
if (nlh -> nlmsg_flags & NLM_F_REPLACE ) {
2127
- if (nft_rule_is_active_next (net , old_rule )) {
2097
+ if (nft_is_active_next (net , old_rule )) {
2128
2098
trans = nft_trans_rule_add (& ctx , NFT_MSG_DELRULE ,
2129
2099
old_rule );
2130
2100
if (trans == NULL ) {
2131
2101
err = - ENOMEM ;
2132
2102
goto err2 ;
2133
2103
}
2134
- nft_rule_deactivate_next (net , old_rule );
2104
+ nft_deactivate_next (net , old_rule );
2135
2105
chain -> use -- ;
2136
2106
list_add_tail_rcu (& rule -> list , & old_rule -> list );
2137
2107
} else {
@@ -3980,7 +3950,7 @@ static int nf_tables_commit(struct net *net, struct sk_buff *skb)
3980
3950
trans -> ctx .afi -> nops );
3981
3951
break ;
3982
3952
case NFT_MSG_NEWRULE :
3983
- nft_rule_clear (trans -> ctx .net , nft_trans_rule (trans ));
3953
+ nft_clear (trans -> ctx .net , nft_trans_rule (trans ));
3984
3954
nf_tables_rule_notify (& trans -> ctx ,
3985
3955
nft_trans_rule (trans ),
3986
3956
NFT_MSG_NEWRULE );
@@ -4116,7 +4086,7 @@ static int nf_tables_abort(struct net *net, struct sk_buff *skb)
4116
4086
break ;
4117
4087
case NFT_MSG_DELRULE :
4118
4088
trans -> ctx .chain -> use ++ ;
4119
- nft_rule_clear (trans -> ctx .net , nft_trans_rule (trans ));
4089
+ nft_clear (trans -> ctx .net , nft_trans_rule (trans ));
4120
4090
nft_trans_destroy (trans );
4121
4091
break ;
4122
4092
case NFT_MSG_NEWSET :
0 commit comments