Blame view

net/netfilter/xt_repldata.h 1.62 KB
81f7e3824   Eric Lee   Initial Release, ...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
  /* SPDX-License-Identifier: GPL-2.0 */
  /*
   * Today's hack: quantum tunneling in structs
   *
   * 'entries' and 'term' are never anywhere referenced by word in code. In fact,
   * they serve as the hanging-off data accessed through repl.data[].
   */
  
  /* tbl has the following structure equivalent, but is C99 compliant:
   * struct {
   *	struct type##_replace repl;
   *	struct type##_standard entries[nhooks];
   *	struct type##_error term;
   * } *tbl;
   */
  
  #define xt_alloc_initial_table(type, typ2) ({ \
  	unsigned int hook_mask = info->valid_hooks; \
  	unsigned int nhooks = hweight32(hook_mask); \
  	unsigned int bytes = 0, hooknum = 0, i = 0; \
  	struct { \
  		struct type##_replace repl; \
  		struct type##_standard entries[]; \
  	} *tbl; \
  	struct type##_error *term; \
  	size_t term_offset = (offsetof(typeof(*tbl), entries[nhooks]) + \
  		__alignof__(*term) - 1) & ~(__alignof__(*term) - 1); \
  	tbl = kzalloc(term_offset + sizeof(*term), GFP_KERNEL); \
  	if (tbl == NULL) \
  		return NULL; \
  	term = (struct type##_error *)&(((char *)tbl)[term_offset]); \
  	strncpy(tbl->repl.name, info->name, sizeof(tbl->repl.name)); \
  	*term = (struct type##_error)typ2##_ERROR_INIT;  \
  	tbl->repl.valid_hooks = hook_mask; \
  	tbl->repl.num_entries = nhooks + 1; \
  	tbl->repl.size = nhooks * sizeof(struct type##_standard) + \
  			 sizeof(struct type##_error); \
  	for (; hook_mask != 0; hook_mask >>= 1, ++hooknum) { \
  		if (!(hook_mask & 1)) \
  			continue; \
  		tbl->repl.hook_entry[hooknum] = bytes; \
  		tbl->repl.underflow[hooknum]  = bytes; \
  		tbl->entries[i++] = (struct type##_standard) \
  			typ2##_STANDARD_INIT(NF_ACCEPT); \
  		bytes += sizeof(struct type##_standard); \
  	} \
  	tbl; \
  })