net_sched: properly handle failure case of tcf_exts_init()
After commit 22dc13c837
("net_sched: convert tcf_exts from list to pointer array")
we do dynamic allocation in tcf_exts_init(), therefore we need
to handle the ENOMEM case properly.
Cc: Jamal Hadi Salim <jhs@mojatatu.com>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
Acked-by: Jamal Hadi Salim <jhs@mojatatu.com>
Acked-by: Jamal Hadi Salim <jhs@mojatatu.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
c1346a7e70
commit
b9a24bb76b
@ -69,17 +69,19 @@ struct tcf_exts {
|
|||||||
int police;
|
int police;
|
||||||
};
|
};
|
||||||
|
|
||||||
static inline void tcf_exts_init(struct tcf_exts *exts, int action, int police)
|
static inline int tcf_exts_init(struct tcf_exts *exts, int action, int police)
|
||||||
{
|
{
|
||||||
#ifdef CONFIG_NET_CLS_ACT
|
#ifdef CONFIG_NET_CLS_ACT
|
||||||
exts->type = 0;
|
exts->type = 0;
|
||||||
exts->nr_actions = 0;
|
exts->nr_actions = 0;
|
||||||
exts->actions = kcalloc(TCA_ACT_MAX_PRIO, sizeof(struct tc_action *),
|
exts->actions = kcalloc(TCA_ACT_MAX_PRIO, sizeof(struct tc_action *),
|
||||||
GFP_KERNEL);
|
GFP_KERNEL);
|
||||||
WARN_ON(!exts->actions); /* TODO: propagate the error to callers */
|
if (!exts->actions)
|
||||||
|
return -ENOMEM;
|
||||||
#endif
|
#endif
|
||||||
exts->action = action;
|
exts->action = action;
|
||||||
exts->police = police;
|
exts->police = police;
|
||||||
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -138,10 +138,12 @@ static int basic_set_parms(struct net *net, struct tcf_proto *tp,
|
|||||||
struct tcf_exts e;
|
struct tcf_exts e;
|
||||||
struct tcf_ematch_tree t;
|
struct tcf_ematch_tree t;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_BASIC_ACT, TCA_BASIC_POLICE);
|
err = tcf_exts_init(&e, TCA_BASIC_ACT, TCA_BASIC_POLICE);
|
||||||
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
err = tcf_em_tree_validate(tp, tb[TCA_BASIC_EMATCHES], &t);
|
err = tcf_em_tree_validate(tp, tb[TCA_BASIC_EMATCHES], &t);
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
@ -189,7 +191,10 @@ static int basic_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (!fnew)
|
if (!fnew)
|
||||||
return -ENOBUFS;
|
return -ENOBUFS;
|
||||||
|
|
||||||
tcf_exts_init(&fnew->exts, TCA_BASIC_ACT, TCA_BASIC_POLICE);
|
err = tcf_exts_init(&fnew->exts, TCA_BASIC_ACT, TCA_BASIC_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
if (handle) {
|
if (handle) {
|
||||||
fnew->handle = handle;
|
fnew->handle = handle;
|
||||||
@ -226,6 +231,7 @@ static int basic_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
errout:
|
errout:
|
||||||
|
tcf_exts_destroy(&fnew->exts);
|
||||||
kfree(fnew);
|
kfree(fnew);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
@ -311,17 +311,19 @@ static int cls_bpf_modify_existing(struct net *net, struct tcf_proto *tp,
|
|||||||
if ((!is_bpf && !is_ebpf) || (is_bpf && is_ebpf))
|
if ((!is_bpf && !is_ebpf) || (is_bpf && is_ebpf))
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
tcf_exts_init(&exts, TCA_BPF_ACT, TCA_BPF_POLICE);
|
ret = tcf_exts_init(&exts, TCA_BPF_ACT, TCA_BPF_POLICE);
|
||||||
ret = tcf_exts_validate(net, tp, tb, est, &exts, ovr);
|
|
||||||
if (ret < 0)
|
if (ret < 0)
|
||||||
return ret;
|
return ret;
|
||||||
|
ret = tcf_exts_validate(net, tp, tb, est, &exts, ovr);
|
||||||
|
if (ret < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
if (tb[TCA_BPF_FLAGS]) {
|
if (tb[TCA_BPF_FLAGS]) {
|
||||||
u32 bpf_flags = nla_get_u32(tb[TCA_BPF_FLAGS]);
|
u32 bpf_flags = nla_get_u32(tb[TCA_BPF_FLAGS]);
|
||||||
|
|
||||||
if (bpf_flags & ~TCA_BPF_FLAG_ACT_DIRECT) {
|
if (bpf_flags & ~TCA_BPF_FLAG_ACT_DIRECT) {
|
||||||
tcf_exts_destroy(&exts);
|
ret = -EINVAL;
|
||||||
return -EINVAL;
|
goto errout;
|
||||||
}
|
}
|
||||||
|
|
||||||
have_exts = bpf_flags & TCA_BPF_FLAG_ACT_DIRECT;
|
have_exts = bpf_flags & TCA_BPF_FLAG_ACT_DIRECT;
|
||||||
@ -331,10 +333,8 @@ static int cls_bpf_modify_existing(struct net *net, struct tcf_proto *tp,
|
|||||||
|
|
||||||
ret = is_bpf ? cls_bpf_prog_from_ops(tb, prog) :
|
ret = is_bpf ? cls_bpf_prog_from_ops(tb, prog) :
|
||||||
cls_bpf_prog_from_efd(tb, prog, tp);
|
cls_bpf_prog_from_efd(tb, prog, tp);
|
||||||
if (ret < 0) {
|
if (ret < 0)
|
||||||
tcf_exts_destroy(&exts);
|
goto errout;
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (tb[TCA_BPF_CLASSID]) {
|
if (tb[TCA_BPF_CLASSID]) {
|
||||||
prog->res.classid = nla_get_u32(tb[TCA_BPF_CLASSID]);
|
prog->res.classid = nla_get_u32(tb[TCA_BPF_CLASSID]);
|
||||||
@ -343,6 +343,10 @@ static int cls_bpf_modify_existing(struct net *net, struct tcf_proto *tp,
|
|||||||
|
|
||||||
tcf_exts_change(tp, &prog->exts, &exts);
|
tcf_exts_change(tp, &prog->exts, &exts);
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
|
errout:
|
||||||
|
tcf_exts_destroy(&exts);
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static u32 cls_bpf_grab_new_handle(struct tcf_proto *tp,
|
static u32 cls_bpf_grab_new_handle(struct tcf_proto *tp,
|
||||||
@ -388,7 +392,9 @@ static int cls_bpf_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (!prog)
|
if (!prog)
|
||||||
return -ENOBUFS;
|
return -ENOBUFS;
|
||||||
|
|
||||||
tcf_exts_init(&prog->exts, TCA_BPF_ACT, TCA_BPF_POLICE);
|
ret = tcf_exts_init(&prog->exts, TCA_BPF_ACT, TCA_BPF_POLICE);
|
||||||
|
if (ret < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
if (oldprog) {
|
if (oldprog) {
|
||||||
if (handle && oldprog->handle != handle) {
|
if (handle && oldprog->handle != handle) {
|
||||||
@ -420,9 +426,10 @@ static int cls_bpf_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
|
|
||||||
*arg = (unsigned long) prog;
|
*arg = (unsigned long) prog;
|
||||||
return 0;
|
return 0;
|
||||||
errout:
|
|
||||||
kfree(prog);
|
|
||||||
|
|
||||||
|
errout:
|
||||||
|
tcf_exts_destroy(&prog->exts);
|
||||||
|
kfree(prog);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -93,7 +93,9 @@ static int cls_cgroup_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (!new)
|
if (!new)
|
||||||
return -ENOBUFS;
|
return -ENOBUFS;
|
||||||
|
|
||||||
tcf_exts_init(&new->exts, TCA_CGROUP_ACT, TCA_CGROUP_POLICE);
|
err = tcf_exts_init(&new->exts, TCA_CGROUP_ACT, TCA_CGROUP_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
new->handle = handle;
|
new->handle = handle;
|
||||||
new->tp = tp;
|
new->tp = tp;
|
||||||
err = nla_parse_nested(tb, TCA_CGROUP_MAX, tca[TCA_OPTIONS],
|
err = nla_parse_nested(tb, TCA_CGROUP_MAX, tca[TCA_OPTIONS],
|
||||||
@ -101,10 +103,14 @@ static int cls_cgroup_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (err < 0)
|
if (err < 0)
|
||||||
goto errout;
|
goto errout;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_CGROUP_ACT, TCA_CGROUP_POLICE);
|
err = tcf_exts_init(&e, TCA_CGROUP_ACT, TCA_CGROUP_POLICE);
|
||||||
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
goto errout;
|
goto errout;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
||||||
|
if (err < 0) {
|
||||||
|
tcf_exts_destroy(&e);
|
||||||
|
goto errout;
|
||||||
|
}
|
||||||
|
|
||||||
err = tcf_em_tree_validate(tp, tb[TCA_CGROUP_EMATCHES], &t);
|
err = tcf_em_tree_validate(tp, tb[TCA_CGROUP_EMATCHES], &t);
|
||||||
if (err < 0) {
|
if (err < 0) {
|
||||||
@ -120,6 +126,7 @@ static int cls_cgroup_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
call_rcu(&head->rcu, cls_cgroup_destroy_rcu);
|
call_rcu(&head->rcu, cls_cgroup_destroy_rcu);
|
||||||
return 0;
|
return 0;
|
||||||
errout:
|
errout:
|
||||||
|
tcf_exts_destroy(&new->exts);
|
||||||
kfree(new);
|
kfree(new);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
@ -418,10 +418,12 @@ static int flow_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
return -EOPNOTSUPP;
|
return -EOPNOTSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_FLOW_ACT, TCA_FLOW_POLICE);
|
err = tcf_exts_init(&e, TCA_FLOW_ACT, TCA_FLOW_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto err1;
|
||||||
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
goto err1;
|
||||||
|
|
||||||
err = tcf_em_tree_validate(tp, tb[TCA_FLOW_EMATCHES], &t);
|
err = tcf_em_tree_validate(tp, tb[TCA_FLOW_EMATCHES], &t);
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
@ -432,13 +434,15 @@ static int flow_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (!fnew)
|
if (!fnew)
|
||||||
goto err2;
|
goto err2;
|
||||||
|
|
||||||
tcf_exts_init(&fnew->exts, TCA_FLOW_ACT, TCA_FLOW_POLICE);
|
err = tcf_exts_init(&fnew->exts, TCA_FLOW_ACT, TCA_FLOW_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto err3;
|
||||||
|
|
||||||
fold = (struct flow_filter *)*arg;
|
fold = (struct flow_filter *)*arg;
|
||||||
if (fold) {
|
if (fold) {
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
if (fold->handle != handle && handle)
|
if (fold->handle != handle && handle)
|
||||||
goto err2;
|
goto err3;
|
||||||
|
|
||||||
/* Copy fold into fnew */
|
/* Copy fold into fnew */
|
||||||
fnew->tp = fold->tp;
|
fnew->tp = fold->tp;
|
||||||
@ -458,31 +462,31 @@ static int flow_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (tb[TCA_FLOW_MODE])
|
if (tb[TCA_FLOW_MODE])
|
||||||
mode = nla_get_u32(tb[TCA_FLOW_MODE]);
|
mode = nla_get_u32(tb[TCA_FLOW_MODE]);
|
||||||
if (mode != FLOW_MODE_HASH && nkeys > 1)
|
if (mode != FLOW_MODE_HASH && nkeys > 1)
|
||||||
goto err2;
|
goto err3;
|
||||||
|
|
||||||
if (mode == FLOW_MODE_HASH)
|
if (mode == FLOW_MODE_HASH)
|
||||||
perturb_period = fold->perturb_period;
|
perturb_period = fold->perturb_period;
|
||||||
if (tb[TCA_FLOW_PERTURB]) {
|
if (tb[TCA_FLOW_PERTURB]) {
|
||||||
if (mode != FLOW_MODE_HASH)
|
if (mode != FLOW_MODE_HASH)
|
||||||
goto err2;
|
goto err3;
|
||||||
perturb_period = nla_get_u32(tb[TCA_FLOW_PERTURB]) * HZ;
|
perturb_period = nla_get_u32(tb[TCA_FLOW_PERTURB]) * HZ;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
if (!handle)
|
if (!handle)
|
||||||
goto err2;
|
goto err3;
|
||||||
if (!tb[TCA_FLOW_KEYS])
|
if (!tb[TCA_FLOW_KEYS])
|
||||||
goto err2;
|
goto err3;
|
||||||
|
|
||||||
mode = FLOW_MODE_MAP;
|
mode = FLOW_MODE_MAP;
|
||||||
if (tb[TCA_FLOW_MODE])
|
if (tb[TCA_FLOW_MODE])
|
||||||
mode = nla_get_u32(tb[TCA_FLOW_MODE]);
|
mode = nla_get_u32(tb[TCA_FLOW_MODE]);
|
||||||
if (mode != FLOW_MODE_HASH && nkeys > 1)
|
if (mode != FLOW_MODE_HASH && nkeys > 1)
|
||||||
goto err2;
|
goto err3;
|
||||||
|
|
||||||
if (tb[TCA_FLOW_PERTURB]) {
|
if (tb[TCA_FLOW_PERTURB]) {
|
||||||
if (mode != FLOW_MODE_HASH)
|
if (mode != FLOW_MODE_HASH)
|
||||||
goto err2;
|
goto err3;
|
||||||
perturb_period = nla_get_u32(tb[TCA_FLOW_PERTURB]) * HZ;
|
perturb_period = nla_get_u32(tb[TCA_FLOW_PERTURB]) * HZ;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -542,6 +546,8 @@ static int flow_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
call_rcu(&fold->rcu, flow_destroy_filter);
|
call_rcu(&fold->rcu, flow_destroy_filter);
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
|
err3:
|
||||||
|
tcf_exts_destroy(&fnew->exts);
|
||||||
err2:
|
err2:
|
||||||
tcf_em_tree_destroy(&t);
|
tcf_em_tree_destroy(&t);
|
||||||
kfree(fnew);
|
kfree(fnew);
|
||||||
|
@ -513,10 +513,12 @@ static int fl_set_parms(struct net *net, struct tcf_proto *tp,
|
|||||||
struct tcf_exts e;
|
struct tcf_exts e;
|
||||||
int err;
|
int err;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_FLOWER_ACT, 0);
|
err = tcf_exts_init(&e, TCA_FLOWER_ACT, 0);
|
||||||
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
if (tb[TCA_FLOWER_CLASSID]) {
|
if (tb[TCA_FLOWER_CLASSID]) {
|
||||||
f->res.classid = nla_get_u32(tb[TCA_FLOWER_CLASSID]);
|
f->res.classid = nla_get_u32(tb[TCA_FLOWER_CLASSID]);
|
||||||
@ -585,7 +587,9 @@ static int fl_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (!fnew)
|
if (!fnew)
|
||||||
return -ENOBUFS;
|
return -ENOBUFS;
|
||||||
|
|
||||||
tcf_exts_init(&fnew->exts, TCA_FLOWER_ACT, 0);
|
err = tcf_exts_init(&fnew->exts, TCA_FLOWER_ACT, 0);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
if (!handle) {
|
if (!handle) {
|
||||||
handle = fl_grab_new_handle(tp, head);
|
handle = fl_grab_new_handle(tp, head);
|
||||||
@ -649,6 +653,7 @@ static int fl_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
errout:
|
errout:
|
||||||
|
tcf_exts_destroy(&fnew->exts);
|
||||||
kfree(fnew);
|
kfree(fnew);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
@ -195,10 +195,12 @@ fw_change_attrs(struct net *net, struct tcf_proto *tp, struct fw_filter *f,
|
|||||||
u32 mask;
|
u32 mask;
|
||||||
int err;
|
int err;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_FW_ACT, TCA_FW_POLICE);
|
err = tcf_exts_init(&e, TCA_FW_ACT, TCA_FW_POLICE);
|
||||||
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
if (tb[TCA_FW_CLASSID]) {
|
if (tb[TCA_FW_CLASSID]) {
|
||||||
f->res.classid = nla_get_u32(tb[TCA_FW_CLASSID]);
|
f->res.classid = nla_get_u32(tb[TCA_FW_CLASSID]);
|
||||||
@ -270,10 +272,15 @@ static int fw_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
#endif /* CONFIG_NET_CLS_IND */
|
#endif /* CONFIG_NET_CLS_IND */
|
||||||
fnew->tp = f->tp;
|
fnew->tp = f->tp;
|
||||||
|
|
||||||
tcf_exts_init(&fnew->exts, TCA_FW_ACT, TCA_FW_POLICE);
|
err = tcf_exts_init(&fnew->exts, TCA_FW_ACT, TCA_FW_POLICE);
|
||||||
|
if (err < 0) {
|
||||||
|
kfree(fnew);
|
||||||
|
return err;
|
||||||
|
}
|
||||||
|
|
||||||
err = fw_change_attrs(net, tp, fnew, tb, tca, base, ovr);
|
err = fw_change_attrs(net, tp, fnew, tb, tca, base, ovr);
|
||||||
if (err < 0) {
|
if (err < 0) {
|
||||||
|
tcf_exts_destroy(&fnew->exts);
|
||||||
kfree(fnew);
|
kfree(fnew);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
@ -313,7 +320,9 @@ static int fw_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (f == NULL)
|
if (f == NULL)
|
||||||
return -ENOBUFS;
|
return -ENOBUFS;
|
||||||
|
|
||||||
tcf_exts_init(&f->exts, TCA_FW_ACT, TCA_FW_POLICE);
|
err = tcf_exts_init(&f->exts, TCA_FW_ACT, TCA_FW_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
f->id = handle;
|
f->id = handle;
|
||||||
f->tp = tp;
|
f->tp = tp;
|
||||||
|
|
||||||
@ -328,6 +337,7 @@ static int fw_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
errout:
|
errout:
|
||||||
|
tcf_exts_destroy(&f->exts);
|
||||||
kfree(f);
|
kfree(f);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
@ -383,17 +383,19 @@ static int route4_set_parms(struct net *net, struct tcf_proto *tp,
|
|||||||
struct nlattr **tb, struct nlattr *est, int new,
|
struct nlattr **tb, struct nlattr *est, int new,
|
||||||
bool ovr)
|
bool ovr)
|
||||||
{
|
{
|
||||||
int err;
|
|
||||||
u32 id = 0, to = 0, nhandle = 0x8000;
|
u32 id = 0, to = 0, nhandle = 0x8000;
|
||||||
struct route4_filter *fp;
|
struct route4_filter *fp;
|
||||||
unsigned int h1;
|
unsigned int h1;
|
||||||
struct route4_bucket *b;
|
struct route4_bucket *b;
|
||||||
struct tcf_exts e;
|
struct tcf_exts e;
|
||||||
|
int err;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_ROUTE4_ACT, TCA_ROUTE4_POLICE);
|
err = tcf_exts_init(&e, TCA_ROUTE4_ACT, TCA_ROUTE4_POLICE);
|
||||||
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
if (tb[TCA_ROUTE4_TO]) {
|
if (tb[TCA_ROUTE4_TO]) {
|
||||||
@ -503,7 +505,10 @@ static int route4_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (!f)
|
if (!f)
|
||||||
goto errout;
|
goto errout;
|
||||||
|
|
||||||
tcf_exts_init(&f->exts, TCA_ROUTE4_ACT, TCA_ROUTE4_POLICE);
|
err = tcf_exts_init(&f->exts, TCA_ROUTE4_ACT, TCA_ROUTE4_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
if (fold) {
|
if (fold) {
|
||||||
f->id = fold->id;
|
f->id = fold->id;
|
||||||
f->iif = fold->iif;
|
f->iif = fold->iif;
|
||||||
@ -557,6 +562,7 @@ static int route4_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
errout:
|
errout:
|
||||||
|
tcf_exts_destroy(&f->exts);
|
||||||
kfree(f);
|
kfree(f);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
@ -487,10 +487,12 @@ static int rsvp_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_RSVP_ACT, TCA_RSVP_POLICE);
|
err = tcf_exts_init(&e, TCA_RSVP_ACT, TCA_RSVP_POLICE);
|
||||||
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout2;
|
||||||
|
|
||||||
f = (struct rsvp_filter *)*arg;
|
f = (struct rsvp_filter *)*arg;
|
||||||
if (f) {
|
if (f) {
|
||||||
@ -506,7 +508,11 @@ static int rsvp_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
goto errout2;
|
goto errout2;
|
||||||
}
|
}
|
||||||
|
|
||||||
tcf_exts_init(&n->exts, TCA_RSVP_ACT, TCA_RSVP_POLICE);
|
err = tcf_exts_init(&n->exts, TCA_RSVP_ACT, TCA_RSVP_POLICE);
|
||||||
|
if (err < 0) {
|
||||||
|
kfree(n);
|
||||||
|
goto errout2;
|
||||||
|
}
|
||||||
|
|
||||||
if (tb[TCA_RSVP_CLASSID]) {
|
if (tb[TCA_RSVP_CLASSID]) {
|
||||||
n->res.classid = nla_get_u32(tb[TCA_RSVP_CLASSID]);
|
n->res.classid = nla_get_u32(tb[TCA_RSVP_CLASSID]);
|
||||||
@ -530,7 +536,9 @@ static int rsvp_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
if (f == NULL)
|
if (f == NULL)
|
||||||
goto errout2;
|
goto errout2;
|
||||||
|
|
||||||
tcf_exts_init(&f->exts, TCA_RSVP_ACT, TCA_RSVP_POLICE);
|
err = tcf_exts_init(&f->exts, TCA_RSVP_ACT, TCA_RSVP_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
h2 = 16;
|
h2 = 16;
|
||||||
if (tb[TCA_RSVP_SRC]) {
|
if (tb[TCA_RSVP_SRC]) {
|
||||||
memcpy(f->src, nla_data(tb[TCA_RSVP_SRC]), sizeof(f->src));
|
memcpy(f->src, nla_data(tb[TCA_RSVP_SRC]), sizeof(f->src));
|
||||||
@ -627,6 +635,7 @@ insert:
|
|||||||
goto insert;
|
goto insert;
|
||||||
|
|
||||||
errout:
|
errout:
|
||||||
|
tcf_exts_destroy(&f->exts);
|
||||||
kfree(f);
|
kfree(f);
|
||||||
errout2:
|
errout2:
|
||||||
tcf_exts_destroy(&e);
|
tcf_exts_destroy(&e);
|
||||||
|
@ -219,10 +219,10 @@ static const struct nla_policy tcindex_policy[TCA_TCINDEX_MAX + 1] = {
|
|||||||
[TCA_TCINDEX_CLASSID] = { .type = NLA_U32 },
|
[TCA_TCINDEX_CLASSID] = { .type = NLA_U32 },
|
||||||
};
|
};
|
||||||
|
|
||||||
static void tcindex_filter_result_init(struct tcindex_filter_result *r)
|
static int tcindex_filter_result_init(struct tcindex_filter_result *r)
|
||||||
{
|
{
|
||||||
memset(r, 0, sizeof(*r));
|
memset(r, 0, sizeof(*r));
|
||||||
tcf_exts_init(&r->exts, TCA_TCINDEX_ACT, TCA_TCINDEX_POLICE);
|
return tcf_exts_init(&r->exts, TCA_TCINDEX_ACT, TCA_TCINDEX_POLICE);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void __tcindex_partial_destroy(struct rcu_head *head)
|
static void __tcindex_partial_destroy(struct rcu_head *head)
|
||||||
@ -233,23 +233,57 @@ static void __tcindex_partial_destroy(struct rcu_head *head)
|
|||||||
kfree(p);
|
kfree(p);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void tcindex_free_perfect_hash(struct tcindex_data *cp)
|
||||||
|
{
|
||||||
|
int i;
|
||||||
|
|
||||||
|
for (i = 0; i < cp->hash; i++)
|
||||||
|
tcf_exts_destroy(&cp->perfect[i].exts);
|
||||||
|
kfree(cp->perfect);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int tcindex_alloc_perfect_hash(struct tcindex_data *cp)
|
||||||
|
{
|
||||||
|
int i, err = 0;
|
||||||
|
|
||||||
|
cp->perfect = kcalloc(cp->hash, sizeof(struct tcindex_filter_result),
|
||||||
|
GFP_KERNEL);
|
||||||
|
if (!cp->perfect)
|
||||||
|
return -ENOMEM;
|
||||||
|
|
||||||
|
for (i = 0; i < cp->hash; i++) {
|
||||||
|
err = tcf_exts_init(&cp->perfect[i].exts,
|
||||||
|
TCA_TCINDEX_ACT, TCA_TCINDEX_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
}
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
errout:
|
||||||
|
tcindex_free_perfect_hash(cp);
|
||||||
|
return err;
|
||||||
|
}
|
||||||
|
|
||||||
static int
|
static int
|
||||||
tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base,
|
tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base,
|
||||||
u32 handle, struct tcindex_data *p,
|
u32 handle, struct tcindex_data *p,
|
||||||
struct tcindex_filter_result *r, struct nlattr **tb,
|
struct tcindex_filter_result *r, struct nlattr **tb,
|
||||||
struct nlattr *est, bool ovr)
|
struct nlattr *est, bool ovr)
|
||||||
{
|
{
|
||||||
int err, balloc = 0;
|
|
||||||
struct tcindex_filter_result new_filter_result, *old_r = r;
|
struct tcindex_filter_result new_filter_result, *old_r = r;
|
||||||
struct tcindex_filter_result cr;
|
struct tcindex_filter_result cr;
|
||||||
struct tcindex_data *cp, *oldp;
|
struct tcindex_data *cp = NULL, *oldp;
|
||||||
struct tcindex_filter *f = NULL; /* make gcc behave */
|
struct tcindex_filter *f = NULL; /* make gcc behave */
|
||||||
|
int err, balloc = 0;
|
||||||
struct tcf_exts e;
|
struct tcf_exts e;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_TCINDEX_ACT, TCA_TCINDEX_POLICE);
|
err = tcf_exts_init(&e, TCA_TCINDEX_ACT, TCA_TCINDEX_POLICE);
|
||||||
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
err = -ENOMEM;
|
err = -ENOMEM;
|
||||||
/* tcindex_data attributes must look atomic to classifier/lookup so
|
/* tcindex_data attributes must look atomic to classifier/lookup so
|
||||||
@ -270,19 +304,20 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base,
|
|||||||
if (p->perfect) {
|
if (p->perfect) {
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
cp->perfect = kmemdup(p->perfect,
|
if (tcindex_alloc_perfect_hash(cp) < 0)
|
||||||
sizeof(*r) * cp->hash, GFP_KERNEL);
|
|
||||||
if (!cp->perfect)
|
|
||||||
goto errout;
|
goto errout;
|
||||||
for (i = 0; i < cp->hash; i++)
|
for (i = 0; i < cp->hash; i++)
|
||||||
tcf_exts_init(&cp->perfect[i].exts,
|
cp->perfect[i].res = p->perfect[i].res;
|
||||||
TCA_TCINDEX_ACT, TCA_TCINDEX_POLICE);
|
|
||||||
balloc = 1;
|
balloc = 1;
|
||||||
}
|
}
|
||||||
cp->h = p->h;
|
cp->h = p->h;
|
||||||
|
|
||||||
tcindex_filter_result_init(&new_filter_result);
|
err = tcindex_filter_result_init(&new_filter_result);
|
||||||
tcindex_filter_result_init(&cr);
|
if (err < 0)
|
||||||
|
goto errout1;
|
||||||
|
err = tcindex_filter_result_init(&cr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout1;
|
||||||
if (old_r)
|
if (old_r)
|
||||||
cr.res = r->res;
|
cr.res = r->res;
|
||||||
|
|
||||||
@ -338,15 +373,8 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base,
|
|||||||
err = -ENOMEM;
|
err = -ENOMEM;
|
||||||
if (!cp->perfect && !cp->h) {
|
if (!cp->perfect && !cp->h) {
|
||||||
if (valid_perfect_hash(cp)) {
|
if (valid_perfect_hash(cp)) {
|
||||||
int i;
|
if (tcindex_alloc_perfect_hash(cp) < 0)
|
||||||
|
|
||||||
cp->perfect = kcalloc(cp->hash, sizeof(*r), GFP_KERNEL);
|
|
||||||
if (!cp->perfect)
|
|
||||||
goto errout_alloc;
|
goto errout_alloc;
|
||||||
for (i = 0; i < cp->hash; i++)
|
|
||||||
tcf_exts_init(&cp->perfect[i].exts,
|
|
||||||
TCA_TCINDEX_ACT,
|
|
||||||
TCA_TCINDEX_POLICE);
|
|
||||||
balloc = 1;
|
balloc = 1;
|
||||||
} else {
|
} else {
|
||||||
struct tcindex_filter __rcu **hash;
|
struct tcindex_filter __rcu **hash;
|
||||||
@ -373,8 +401,12 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base,
|
|||||||
if (!f)
|
if (!f)
|
||||||
goto errout_alloc;
|
goto errout_alloc;
|
||||||
f->key = handle;
|
f->key = handle;
|
||||||
tcindex_filter_result_init(&f->result);
|
|
||||||
f->next = NULL;
|
f->next = NULL;
|
||||||
|
err = tcindex_filter_result_init(&f->result);
|
||||||
|
if (err < 0) {
|
||||||
|
kfree(f);
|
||||||
|
goto errout_alloc;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (tb[TCA_TCINDEX_CLASSID]) {
|
if (tb[TCA_TCINDEX_CLASSID]) {
|
||||||
@ -387,8 +419,13 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base,
|
|||||||
else
|
else
|
||||||
tcf_exts_change(tp, &cr.exts, &e);
|
tcf_exts_change(tp, &cr.exts, &e);
|
||||||
|
|
||||||
if (old_r && old_r != r)
|
if (old_r && old_r != r) {
|
||||||
tcindex_filter_result_init(old_r);
|
err = tcindex_filter_result_init(old_r);
|
||||||
|
if (err < 0) {
|
||||||
|
kfree(f);
|
||||||
|
goto errout_alloc;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
oldp = p;
|
oldp = p;
|
||||||
r->res = cr.res;
|
r->res = cr.res;
|
||||||
@ -415,9 +452,12 @@ tcindex_set_parms(struct net *net, struct tcf_proto *tp, unsigned long base,
|
|||||||
|
|
||||||
errout_alloc:
|
errout_alloc:
|
||||||
if (balloc == 1)
|
if (balloc == 1)
|
||||||
kfree(cp->perfect);
|
tcindex_free_perfect_hash(cp);
|
||||||
else if (balloc == 2)
|
else if (balloc == 2)
|
||||||
kfree(cp->h);
|
kfree(cp->h);
|
||||||
|
errout1:
|
||||||
|
tcf_exts_destroy(&cr.exts);
|
||||||
|
tcf_exts_destroy(&new_filter_result.exts);
|
||||||
errout:
|
errout:
|
||||||
kfree(cp);
|
kfree(cp);
|
||||||
tcf_exts_destroy(&e);
|
tcf_exts_destroy(&e);
|
||||||
|
@ -709,13 +709,15 @@ static int u32_set_parms(struct net *net, struct tcf_proto *tp,
|
|||||||
struct tc_u_knode *n, struct nlattr **tb,
|
struct tc_u_knode *n, struct nlattr **tb,
|
||||||
struct nlattr *est, bool ovr)
|
struct nlattr *est, bool ovr)
|
||||||
{
|
{
|
||||||
int err;
|
|
||||||
struct tcf_exts e;
|
struct tcf_exts e;
|
||||||
|
int err;
|
||||||
|
|
||||||
tcf_exts_init(&e, TCA_U32_ACT, TCA_U32_POLICE);
|
err = tcf_exts_init(&e, TCA_U32_ACT, TCA_U32_POLICE);
|
||||||
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
|
||||||
if (err < 0)
|
if (err < 0)
|
||||||
return err;
|
return err;
|
||||||
|
err = tcf_exts_validate(net, tp, tb, est, &e, ovr);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
err = -EINVAL;
|
err = -EINVAL;
|
||||||
if (tb[TCA_U32_LINK]) {
|
if (tb[TCA_U32_LINK]) {
|
||||||
@ -833,7 +835,10 @@ static struct tc_u_knode *u32_init_knode(struct tcf_proto *tp,
|
|||||||
new->tp = tp;
|
new->tp = tp;
|
||||||
memcpy(&new->sel, s, sizeof(*s) + s->nkeys*sizeof(struct tc_u32_key));
|
memcpy(&new->sel, s, sizeof(*s) + s->nkeys*sizeof(struct tc_u32_key));
|
||||||
|
|
||||||
tcf_exts_init(&new->exts, TCA_U32_ACT, TCA_U32_POLICE);
|
if (tcf_exts_init(&new->exts, TCA_U32_ACT, TCA_U32_POLICE)) {
|
||||||
|
kfree(new);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
return new;
|
return new;
|
||||||
}
|
}
|
||||||
@ -985,9 +990,12 @@ static int u32_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
n->handle = handle;
|
n->handle = handle;
|
||||||
n->fshift = s->hmask ? ffs(ntohl(s->hmask)) - 1 : 0;
|
n->fshift = s->hmask ? ffs(ntohl(s->hmask)) - 1 : 0;
|
||||||
n->flags = flags;
|
n->flags = flags;
|
||||||
tcf_exts_init(&n->exts, TCA_U32_ACT, TCA_U32_POLICE);
|
|
||||||
n->tp = tp;
|
n->tp = tp;
|
||||||
|
|
||||||
|
err = tcf_exts_init(&n->exts, TCA_U32_ACT, TCA_U32_POLICE);
|
||||||
|
if (err < 0)
|
||||||
|
goto errout;
|
||||||
|
|
||||||
#ifdef CONFIG_CLS_U32_MARK
|
#ifdef CONFIG_CLS_U32_MARK
|
||||||
n->pcpu_success = alloc_percpu(u32);
|
n->pcpu_success = alloc_percpu(u32);
|
||||||
if (!n->pcpu_success) {
|
if (!n->pcpu_success) {
|
||||||
@ -1028,9 +1036,10 @@ static int u32_change(struct net *net, struct sk_buff *in_skb,
|
|||||||
errhw:
|
errhw:
|
||||||
#ifdef CONFIG_CLS_U32_MARK
|
#ifdef CONFIG_CLS_U32_MARK
|
||||||
free_percpu(n->pcpu_success);
|
free_percpu(n->pcpu_success);
|
||||||
errout:
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
errout:
|
||||||
|
tcf_exts_destroy(&n->exts);
|
||||||
#ifdef CONFIG_CLS_U32_PERF
|
#ifdef CONFIG_CLS_U32_PERF
|
||||||
free_percpu(n->pf);
|
free_percpu(n->pf);
|
||||||
#endif
|
#endif
|
||||||
|
Loading…
Reference in New Issue
Block a user