Hi Julian, thank you for replay.
On 2019/7/29 8:49, Florian Westphal wrote:
> hujunwei <hujunwei4@xxxxxxxxxx> wrote:
>
> [ trimmed CC list ]
>
>> The ipvs module parse the user buffer and save it to sysctl,
>> then check if the value is valid. invalid value occurs
>> over a period of time.
>> Here, I add a variable, struct ctl_table tmp, used to read
>> the value from the user buffer, and save only when it is valid.
>
> Does this cause any problems? If so, what are those?
>
For example, when a negative number value occurs over a period of time,
the func such as ip_vs_sync_conn_v0() will get invalid number
by sysctl_sync_threshold(), casue judge abnormal in ip_vs_sync_conn_needed().
>> Fixes: f73181c8288f ("ipvs: add support for sync threads")
>> Signed-off-by: Junwei Hu <hujunwei4@xxxxxxxxxx>
>> ---
>> net/netfilter/ipvs/ip_vs_ctl.c | 61 +++++++++++++++++++++++-----------
>> 1 file changed, 42 insertions(+), 19 deletions(-)
>>
>> diff --git a/net/netfilter/ipvs/ip_vs_ctl.c b/net/netfilter/ipvs/ip_vs_ctl.c
>> index 741d91aa4a8d..e78fd05f108b 100644
>> --- a/net/netfilter/ipvs/ip_vs_ctl.c
>> +++ b/net/netfilter/ipvs/ip_vs_ctl.c
>> @@ -1680,12 +1680,18 @@ proc_do_defense_mode(struct ctl_table *table, int
>> write,
>> int val = *valp;
>> int rc;
>>
>> - rc = proc_dointvec(table, write, buffer, lenp, ppos);
>> + struct ctl_table tmp = {
>> + .data = &val,
>> + .maxlen = sizeof(int),
>> + .mode = table->mode,
>> + };
>> +
>> + rc = proc_dointvec(&tmp, write, buffer, lenp, ppos);
>
> Wouldn't it be better do use proc_dointvec_minmax and set the
> constraints via .extra1,2 in the sysctl knob definition?
>
You are right, proc_dointvec_minmax seems like a better choice, I will update
the patch.
Regards,
Junwei
|