mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2025-04-01 23:13:59 +07:00
netfilter: nf_tables: add nft_unregister_flowtable_hook()
Unbind flowtable callback if hook is unregistered.
This patch is implicitly fixing the error path of
nf_tables_newflowtable() and nft_flowtable_event().
Fixes: 8bb69f3b29
("netfilter: nf_tables: add flowtable offload control plane")
Reported-by: wenxu <wenxu@ucloud.cn>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
parent
d7c03a9f5c
commit
ff4bf2f42a
@ -5975,16 +5975,22 @@ nft_flowtable_type_get(struct net *net, u8 family)
|
|||||||
return ERR_PTR(-ENOENT);
|
return ERR_PTR(-ENOENT);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void nft_unregister_flowtable_hook(struct net *net,
|
||||||
|
struct nft_flowtable *flowtable,
|
||||||
|
struct nft_hook *hook)
|
||||||
|
{
|
||||||
|
nf_unregister_net_hook(net, &hook->ops);
|
||||||
|
flowtable->data.type->setup(&flowtable->data, hook->ops.dev,
|
||||||
|
FLOW_BLOCK_UNBIND);
|
||||||
|
}
|
||||||
|
|
||||||
static void nft_unregister_flowtable_net_hooks(struct net *net,
|
static void nft_unregister_flowtable_net_hooks(struct net *net,
|
||||||
struct nft_flowtable *flowtable)
|
struct nft_flowtable *flowtable)
|
||||||
{
|
{
|
||||||
struct nft_hook *hook;
|
struct nft_hook *hook;
|
||||||
|
|
||||||
list_for_each_entry(hook, &flowtable->hook_list, list) {
|
list_for_each_entry(hook, &flowtable->hook_list, list)
|
||||||
nf_unregister_net_hook(net, &hook->ops);
|
nft_unregister_flowtable_hook(net, flowtable, hook);
|
||||||
flowtable->data.type->setup(&flowtable->data, hook->ops.dev,
|
|
||||||
FLOW_BLOCK_UNBIND);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static int nft_register_flowtable_net_hooks(struct net *net,
|
static int nft_register_flowtable_net_hooks(struct net *net,
|
||||||
@ -6030,9 +6036,7 @@ static int nft_register_flowtable_net_hooks(struct net *net,
|
|||||||
if (i-- <= 0)
|
if (i-- <= 0)
|
||||||
break;
|
break;
|
||||||
|
|
||||||
nf_unregister_net_hook(net, &hook->ops);
|
nft_unregister_flowtable_hook(net, flowtable, hook);
|
||||||
flowtable->data.type->setup(&flowtable->data, hook->ops.dev,
|
|
||||||
FLOW_BLOCK_UNBIND);
|
|
||||||
list_del_rcu(&hook->list);
|
list_del_rcu(&hook->list);
|
||||||
kfree_rcu(hook, rcu);
|
kfree_rcu(hook, rcu);
|
||||||
}
|
}
|
||||||
@ -6139,7 +6143,7 @@ static int nf_tables_newflowtable(struct net *net, struct sock *nlsk,
|
|||||||
return 0;
|
return 0;
|
||||||
err5:
|
err5:
|
||||||
list_for_each_entry_safe(hook, next, &flowtable->hook_list, list) {
|
list_for_each_entry_safe(hook, next, &flowtable->hook_list, list) {
|
||||||
nf_unregister_net_hook(net, &hook->ops);
|
nft_unregister_flowtable_hook(net, flowtable, hook);
|
||||||
list_del_rcu(&hook->list);
|
list_del_rcu(&hook->list);
|
||||||
kfree_rcu(hook, rcu);
|
kfree_rcu(hook, rcu);
|
||||||
}
|
}
|
||||||
@ -6484,7 +6488,7 @@ static void nft_flowtable_event(unsigned long event, struct net_device *dev,
|
|||||||
if (hook->ops.dev != dev)
|
if (hook->ops.dev != dev)
|
||||||
continue;
|
continue;
|
||||||
|
|
||||||
nf_unregister_net_hook(dev_net(dev), &hook->ops);
|
nft_unregister_flowtable_hook(dev_net(dev), flowtable, hook);
|
||||||
list_del_rcu(&hook->list);
|
list_del_rcu(&hook->list);
|
||||||
kfree_rcu(hook, rcu);
|
kfree_rcu(hook, rcu);
|
||||||
break;
|
break;
|
||||||
|
Loading…
Reference in New Issue
Block a user