diff options
-rw-r--r-- | include/net/cipso_ipv4.h | 21 | ||||
-rw-r--r-- | net/ipv4/cipso_ipv4.c | 235 | ||||
-rw-r--r-- | net/netlabel/netlabel_cipso_v4.c | 77 | ||||
-rw-r--r-- | net/netlabel/netlabel_domainhash.c | 95 | ||||
-rw-r--r-- | net/netlabel/netlabel_domainhash.h | 2 | ||||
-rw-r--r-- | net/netlabel/netlabel_kapi.c | 43 | ||||
-rw-r--r-- | net/netlabel/netlabel_mgmt.c | 24 | ||||
-rw-r--r-- | security/smack/smackfs.c | 4 |
8 files changed, 235 insertions, 266 deletions
diff --git a/include/net/cipso_ipv4.h b/include/net/cipso_ipv4.h index a6bb94530cfd..5fe6556fb3c5 100644 --- a/include/net/cipso_ipv4.h +++ b/include/net/cipso_ipv4.h | |||
@@ -40,6 +40,7 @@ | |||
40 | #include <linux/net.h> | 40 | #include <linux/net.h> |
41 | #include <linux/skbuff.h> | 41 | #include <linux/skbuff.h> |
42 | #include <net/netlabel.h> | 42 | #include <net/netlabel.h> |
43 | #include <asm/atomic.h> | ||
43 | 44 | ||
44 | /* known doi values */ | 45 | /* known doi values */ |
45 | #define CIPSO_V4_DOI_UNKNOWN 0x00000000 | 46 | #define CIPSO_V4_DOI_UNKNOWN 0x00000000 |
@@ -79,10 +80,9 @@ struct cipso_v4_doi { | |||
79 | } map; | 80 | } map; |
80 | u8 tags[CIPSO_V4_TAG_MAXCNT]; | 81 | u8 tags[CIPSO_V4_TAG_MAXCNT]; |
81 | 82 | ||
82 | u32 valid; | 83 | atomic_t refcount; |
83 | struct list_head list; | 84 | struct list_head list; |
84 | struct rcu_head rcu; | 85 | struct rcu_head rcu; |
85 | struct list_head dom_list; | ||
86 | }; | 86 | }; |
87 | 87 | ||
88 | /* Standard CIPSO mapping table */ | 88 | /* Standard CIPSO mapping table */ |
@@ -128,25 +128,26 @@ extern int cipso_v4_rbm_strictvalid; | |||
128 | 128 | ||
129 | #ifdef CONFIG_NETLABEL | 129 | #ifdef CONFIG_NETLABEL |
130 | int cipso_v4_doi_add(struct cipso_v4_doi *doi_def); | 130 | int cipso_v4_doi_add(struct cipso_v4_doi *doi_def); |
131 | int cipso_v4_doi_remove(u32 doi, | 131 | void cipso_v4_doi_free(struct cipso_v4_doi *doi_def); |
132 | struct netlbl_audit *audit_info, | 132 | int cipso_v4_doi_remove(u32 doi, struct netlbl_audit *audit_info); |
133 | void (*callback) (struct rcu_head * head)); | ||
134 | struct cipso_v4_doi *cipso_v4_doi_getdef(u32 doi); | 133 | struct cipso_v4_doi *cipso_v4_doi_getdef(u32 doi); |
134 | void cipso_v4_doi_putdef(struct cipso_v4_doi *doi_def); | ||
135 | int cipso_v4_doi_walk(u32 *skip_cnt, | 135 | int cipso_v4_doi_walk(u32 *skip_cnt, |
136 | int (*callback) (struct cipso_v4_doi *doi_def, void *arg), | 136 | int (*callback) (struct cipso_v4_doi *doi_def, void *arg), |
137 | void *cb_arg); | 137 | void *cb_arg); |
138 | int cipso_v4_doi_domhsh_add(struct cipso_v4_doi *doi_def, const char *domain); | ||
139 | int cipso_v4_doi_domhsh_remove(struct cipso_v4_doi *doi_def, | ||
140 | const char *domain); | ||
141 | #else | 138 | #else |
142 | static inline int cipso_v4_doi_add(struct cipso_v4_doi *doi_def) | 139 | static inline int cipso_v4_doi_add(struct cipso_v4_doi *doi_def) |
143 | { | 140 | { |
144 | return -ENOSYS; | 141 | return -ENOSYS; |
145 | } | 142 | } |
146 | 143 | ||
144 | static inline void cipso_v4_doi_free(struct cipso_v4_doi *doi_def) | ||
145 | { | ||
146 | return; | ||
147 | } | ||
148 | |||
147 | static inline int cipso_v4_doi_remove(u32 doi, | 149 | static inline int cipso_v4_doi_remove(u32 doi, |
148 | struct netlbl_audit *audit_info, | 150 | struct netlbl_audit *audit_info) |
149 | void (*callback) (struct rcu_head * head)) | ||
150 | { | 151 | { |
151 | return 0; | 152 | return 0; |
152 | } | 153 | } |
diff --git a/net/ipv4/cipso_ipv4.c b/net/ipv4/cipso_ipv4.c index 2c0e4572cc90..bf87eddfec30 100644 --- a/net/ipv4/cipso_ipv4.c +++ b/net/ipv4/cipso_ipv4.c | |||
@@ -47,17 +47,7 @@ | |||
47 | #include <asm/bug.h> | 47 | #include <asm/bug.h> |
48 | #include <asm/unaligned.h> | 48 | #include <asm/unaligned.h> |
49 | 49 | ||
50 | struct cipso_v4_domhsh_entry { | ||
51 | char *domain; | ||
52 | u32 valid; | ||
53 | struct list_head list; | ||
54 | struct rcu_head rcu; | ||
55 | }; | ||
56 | |||
57 | /* List of available DOI definitions */ | 50 | /* List of available DOI definitions */ |
58 | /* XXX - Updates should be minimal so having a single lock for the | ||
59 | * cipso_v4_doi_list and the cipso_v4_doi_list->dom_list should be | ||
60 | * okay. */ | ||
61 | /* XXX - This currently assumes a minimal number of different DOIs in use, | 51 | /* XXX - This currently assumes a minimal number of different DOIs in use, |
62 | * if in practice there are a lot of different DOIs this list should | 52 | * if in practice there are a lot of different DOIs this list should |
63 | * probably be turned into a hash table or something similar so we | 53 | * probably be turned into a hash table or something similar so we |
@@ -194,25 +184,6 @@ static void cipso_v4_bitmap_setbit(unsigned char *bitmap, | |||
194 | } | 184 | } |
195 | 185 | ||
196 | /** | 186 | /** |
197 | * cipso_v4_doi_domhsh_free - Frees a domain list entry | ||
198 | * @entry: the entry's RCU field | ||
199 | * | ||
200 | * Description: | ||
201 | * This function is designed to be used as a callback to the call_rcu() | ||
202 | * function so that the memory allocated to a domain list entry can be released | ||
203 | * safely. | ||
204 | * | ||
205 | */ | ||
206 | static void cipso_v4_doi_domhsh_free(struct rcu_head *entry) | ||
207 | { | ||
208 | struct cipso_v4_domhsh_entry *ptr; | ||
209 | |||
210 | ptr = container_of(entry, struct cipso_v4_domhsh_entry, rcu); | ||
211 | kfree(ptr->domain); | ||
212 | kfree(ptr); | ||
213 | } | ||
214 | |||
215 | /** | ||
216 | * cipso_v4_cache_entry_free - Frees a cache entry | 187 | * cipso_v4_cache_entry_free - Frees a cache entry |
217 | * @entry: the entry to free | 188 | * @entry: the entry to free |
218 | * | 189 | * |
@@ -457,7 +428,7 @@ static struct cipso_v4_doi *cipso_v4_doi_search(u32 doi) | |||
457 | struct cipso_v4_doi *iter; | 428 | struct cipso_v4_doi *iter; |
458 | 429 | ||
459 | list_for_each_entry_rcu(iter, &cipso_v4_doi_list, list) | 430 | list_for_each_entry_rcu(iter, &cipso_v4_doi_list, list) |
460 | if (iter->doi == doi && iter->valid) | 431 | if (iter->doi == doi && atomic_read(&iter->refcount)) |
461 | return iter; | 432 | return iter; |
462 | return NULL; | 433 | return NULL; |
463 | } | 434 | } |
@@ -501,9 +472,8 @@ int cipso_v4_doi_add(struct cipso_v4_doi *doi_def) | |||
501 | } | 472 | } |
502 | } | 473 | } |
503 | 474 | ||
504 | doi_def->valid = 1; | 475 | atomic_set(&doi_def->refcount, 1); |
505 | INIT_RCU_HEAD(&doi_def->rcu); | 476 | INIT_RCU_HEAD(&doi_def->rcu); |
506 | INIT_LIST_HEAD(&doi_def->dom_list); | ||
507 | 477 | ||
508 | spin_lock(&cipso_v4_doi_list_lock); | 478 | spin_lock(&cipso_v4_doi_list_lock); |
509 | if (cipso_v4_doi_search(doi_def->doi) != NULL) | 479 | if (cipso_v4_doi_search(doi_def->doi) != NULL) |
@@ -519,59 +489,129 @@ doi_add_failure: | |||
519 | } | 489 | } |
520 | 490 | ||
521 | /** | 491 | /** |
492 | * cipso_v4_doi_free - Frees a DOI definition | ||
493 | * @entry: the entry's RCU field | ||
494 | * | ||
495 | * Description: | ||
496 | * This function frees all of the memory associated with a DOI definition. | ||
497 | * | ||
498 | */ | ||
499 | void cipso_v4_doi_free(struct cipso_v4_doi *doi_def) | ||
500 | { | ||
501 | if (doi_def == NULL) | ||
502 | return; | ||
503 | |||
504 | switch (doi_def->type) { | ||
505 | case CIPSO_V4_MAP_STD: | ||
506 | kfree(doi_def->map.std->lvl.cipso); | ||
507 | kfree(doi_def->map.std->lvl.local); | ||
508 | kfree(doi_def->map.std->cat.cipso); | ||
509 | kfree(doi_def->map.std->cat.local); | ||
510 | break; | ||
511 | } | ||
512 | kfree(doi_def); | ||
513 | } | ||
514 | |||
515 | /** | ||
516 | * cipso_v4_doi_free_rcu - Frees a DOI definition via the RCU pointer | ||
517 | * @entry: the entry's RCU field | ||
518 | * | ||
519 | * Description: | ||
520 | * This function is designed to be used as a callback to the call_rcu() | ||
521 | * function so that the memory allocated to the DOI definition can be released | ||
522 | * safely. | ||
523 | * | ||
524 | */ | ||
525 | static void cipso_v4_doi_free_rcu(struct rcu_head *entry) | ||
526 | { | ||
527 | struct cipso_v4_doi *doi_def; | ||
528 | |||
529 | doi_def = container_of(entry, struct cipso_v4_doi, rcu); | ||
530 | cipso_v4_doi_free(doi_def); | ||
531 | } | ||
532 | |||
533 | /** | ||
522 | * cipso_v4_doi_remove - Remove an existing DOI from the CIPSO protocol engine | 534 | * cipso_v4_doi_remove - Remove an existing DOI from the CIPSO protocol engine |
523 | * @doi: the DOI value | 535 | * @doi: the DOI value |
524 | * @audit_secid: the LSM secid to use in the audit message | 536 | * @audit_secid: the LSM secid to use in the audit message |
525 | * @callback: the DOI cleanup/free callback | ||
526 | * | 537 | * |
527 | * Description: | 538 | * Description: |
528 | * Removes a DOI definition from the CIPSO engine, @callback is called to | 539 | * Removes a DOI definition from the CIPSO engine. The NetLabel routines will |
529 | * free any memory. The NetLabel routines will be called to release their own | 540 | * be called to release their own LSM domain mappings as well as our own |
530 | * LSM domain mappings as well as our own domain list. Returns zero on | 541 | * domain list. Returns zero on success and negative values on failure. |
531 | * success and negative values on failure. | ||
532 | * | 542 | * |
533 | */ | 543 | */ |
534 | int cipso_v4_doi_remove(u32 doi, | 544 | int cipso_v4_doi_remove(u32 doi, struct netlbl_audit *audit_info) |
535 | struct netlbl_audit *audit_info, | ||
536 | void (*callback) (struct rcu_head * head)) | ||
537 | { | 545 | { |
538 | struct cipso_v4_doi *doi_def; | 546 | struct cipso_v4_doi *doi_def; |
539 | struct cipso_v4_domhsh_entry *dom_iter; | ||
540 | 547 | ||
541 | spin_lock(&cipso_v4_doi_list_lock); | 548 | spin_lock(&cipso_v4_doi_list_lock); |
542 | doi_def = cipso_v4_doi_search(doi); | 549 | doi_def = cipso_v4_doi_search(doi); |
543 | if (doi_def != NULL) { | 550 | if (doi_def == NULL) { |
544 | doi_def->valid = 0; | ||
545 | list_del_rcu(&doi_def->list); | ||
546 | spin_unlock(&cipso_v4_doi_list_lock); | 551 | spin_unlock(&cipso_v4_doi_list_lock); |
547 | rcu_read_lock(); | 552 | return -ENOENT; |
548 | list_for_each_entry_rcu(dom_iter, &doi_def->dom_list, list) | 553 | } |
549 | if (dom_iter->valid) | 554 | if (!atomic_dec_and_test(&doi_def->refcount)) { |
550 | netlbl_cfg_map_del(dom_iter->domain, | 555 | spin_unlock(&cipso_v4_doi_list_lock); |
551 | audit_info); | 556 | return -EBUSY; |
552 | rcu_read_unlock(); | ||
553 | cipso_v4_cache_invalidate(); | ||
554 | call_rcu(&doi_def->rcu, callback); | ||
555 | return 0; | ||
556 | } | 557 | } |
558 | list_del_rcu(&doi_def->list); | ||
557 | spin_unlock(&cipso_v4_doi_list_lock); | 559 | spin_unlock(&cipso_v4_doi_list_lock); |
558 | 560 | ||
559 | return -ENOENT; | 561 | cipso_v4_cache_invalidate(); |
562 | call_rcu(&doi_def->rcu, cipso_v4_doi_free_rcu); | ||
563 | |||
564 | return 0; | ||
560 | } | 565 | } |
561 | 566 | ||
562 | /** | 567 | /** |
563 | * cipso_v4_doi_getdef - Returns a pointer to a valid DOI definition | 568 | * cipso_v4_doi_getdef - Returns a reference to a valid DOI definition |
564 | * @doi: the DOI value | 569 | * @doi: the DOI value |
565 | * | 570 | * |
566 | * Description: | 571 | * Description: |
567 | * Searches for a valid DOI definition and if one is found it is returned to | 572 | * Searches for a valid DOI definition and if one is found it is returned to |
568 | * the caller. Otherwise NULL is returned. The caller must ensure that | 573 | * the caller. Otherwise NULL is returned. The caller must ensure that |
569 | * rcu_read_lock() is held while accessing the returned definition. | 574 | * rcu_read_lock() is held while accessing the returned definition and the DOI |
575 | * definition reference count is decremented when the caller is done. | ||
570 | * | 576 | * |
571 | */ | 577 | */ |
572 | struct cipso_v4_doi *cipso_v4_doi_getdef(u32 doi) | 578 | struct cipso_v4_doi *cipso_v4_doi_getdef(u32 doi) |
573 | { | 579 | { |
574 | return cipso_v4_doi_search(doi); | 580 | struct cipso_v4_doi *doi_def; |
581 | |||
582 | rcu_read_lock(); | ||
583 | doi_def = cipso_v4_doi_search(doi); | ||
584 | if (doi_def == NULL) | ||
585 | goto doi_getdef_return; | ||
586 | if (!atomic_inc_not_zero(&doi_def->refcount)) | ||
587 | doi_def = NULL; | ||
588 | |||
589 | doi_getdef_return: | ||
590 | rcu_read_unlock(); | ||
591 | return doi_def; | ||
592 | } | ||
593 | |||
594 | /** | ||
595 | * cipso_v4_doi_putdef - Releases a reference for the given DOI definition | ||
596 | * @doi_def: the DOI definition | ||
597 | * | ||
598 | * Description: | ||
599 | * Releases a DOI definition reference obtained from cipso_v4_doi_getdef(). | ||
600 | * | ||
601 | */ | ||
602 | void cipso_v4_doi_putdef(struct cipso_v4_doi *doi_def) | ||
603 | { | ||
604 | if (doi_def == NULL) | ||
605 | return; | ||
606 | |||
607 | if (!atomic_dec_and_test(&doi_def->refcount)) | ||
608 | return; | ||
609 | spin_lock(&cipso_v4_doi_list_lock); | ||
610 | list_del_rcu(&doi_def->list); | ||
611 | spin_unlock(&cipso_v4_doi_list_lock); | ||
612 | |||
613 | cipso_v4_cache_invalidate(); | ||
614 | call_rcu(&doi_def->rcu, cipso_v4_doi_free_rcu); | ||
575 | } | 615 | } |
576 | 616 | ||
577 | /** | 617 | /** |
@@ -597,7 +637,7 @@ int cipso_v4_doi_walk(u32 *skip_cnt, | |||
597 | 637 | ||
598 | rcu_read_lock(); | 638 | rcu_read_lock(); |
599 | list_for_each_entry_rcu(iter_doi, &cipso_v4_doi_list, list) | 639 | list_for_each_entry_rcu(iter_doi, &cipso_v4_doi_list, list) |
600 | if (iter_doi->valid) { | 640 | if (atomic_read(&iter_doi->refcount) > 0) { |
601 | if (doi_cnt++ < *skip_cnt) | 641 | if (doi_cnt++ < *skip_cnt) |
602 | continue; | 642 | continue; |
603 | ret_val = callback(iter_doi, cb_arg); | 643 | ret_val = callback(iter_doi, cb_arg); |
@@ -613,85 +653,6 @@ doi_walk_return: | |||
613 | return ret_val; | 653 | return ret_val; |
614 | } | 654 | } |
615 | 655 | ||
616 | /** | ||
617 | * cipso_v4_doi_domhsh_add - Adds a domain entry to a DOI definition | ||
618 | * @doi_def: the DOI definition | ||
619 | * @domain: the domain to add | ||
620 | * | ||
621 | * Description: | ||
622 | * Adds the @domain to the DOI specified by @doi_def, this function | ||
623 | * should only be called by external functions (i.e. NetLabel). This function | ||
624 | * does allocate memory. Returns zero on success, negative values on failure. | ||
625 | * | ||
626 | */ | ||
627 | int cipso_v4_doi_domhsh_add(struct cipso_v4_doi *doi_def, const char *domain) | ||
628 | { | ||
629 | struct cipso_v4_domhsh_entry *iter; | ||
630 | struct cipso_v4_domhsh_entry *new_dom; | ||
631 | |||
632 | new_dom = kzalloc(sizeof(*new_dom), GFP_KERNEL); | ||
633 | if (new_dom == NULL) | ||
634 | return -ENOMEM; | ||
635 | if (domain) { | ||
636 | new_dom->domain = kstrdup(domain, GFP_KERNEL); | ||
637 | if (new_dom->domain == NULL) { | ||
638 | kfree(new_dom); | ||
639 | return -ENOMEM; | ||
640 | } | ||
641 | } | ||
642 | new_dom->valid = 1; | ||
643 | INIT_RCU_HEAD(&new_dom->rcu); | ||
644 | |||
645 | spin_lock(&cipso_v4_doi_list_lock); | ||
646 | list_for_each_entry(iter, &doi_def->dom_list, list) | ||
647 | if (iter->valid && | ||
648 | ((domain != NULL && iter->domain != NULL && | ||
649 | strcmp(iter->domain, domain) == 0) || | ||
650 | (domain == NULL && iter->domain == NULL))) { | ||
651 | spin_unlock(&cipso_v4_doi_list_lock); | ||
652 | kfree(new_dom->domain); | ||
653 | kfree(new_dom); | ||
654 | return -EEXIST; | ||
655 | } | ||
656 | list_add_tail_rcu(&new_dom->list, &doi_def->dom_list); | ||
657 | spin_unlock(&cipso_v4_doi_list_lock); | ||
658 | |||
659 | return 0; | ||
660 | } | ||
661 | |||
662 | /** | ||
663 | * cipso_v4_doi_domhsh_remove - Removes a domain entry from a DOI definition | ||
664 | * @doi_def: the DOI definition | ||
665 | * @domain: the domain to remove | ||
666 | * | ||
667 | * Description: | ||
668 | * Removes the @domain from the DOI specified by @doi_def, this function | ||
669 | * should only be called by external functions (i.e. NetLabel). Returns zero | ||
670 | * on success and negative values on error. | ||
671 | * | ||
672 | */ | ||
673 | int cipso_v4_doi_domhsh_remove(struct cipso_v4_doi *doi_def, | ||
674 | const char *domain) | ||
675 | { | ||
676 | struct cipso_v4_domhsh_entry *iter; | ||
677 | |||
678 | spin_lock(&cipso_v4_doi_list_lock); | ||
679 | list_for_each_entry(iter, &doi_def->dom_list, list) | ||
680 | if (iter->valid && | ||
681 | ((domain != NULL && iter->domain != NULL && | ||
682 | strcmp(iter->domain, domain) == 0) || | ||
683 | (domain == NULL && iter->domain == NULL))) { | ||
684 | iter->valid = 0; | ||
685 | list_del_rcu(&iter->list); | ||
686 | spin_unlock(&cipso_v4_doi_list_lock); | ||
687 | call_rcu(&iter->rcu, cipso_v4_doi_domhsh_free); | ||
688 | return 0; | ||
689 | } | ||
690 | spin_unlock(&cipso_v4_doi_list_lock); | ||
691 | |||
692 | return -ENOENT; | ||
693 | } | ||
694 | |||
695 | /* | 656 | /* |
696 | * Label Mapping Functions | 657 | * Label Mapping Functions |
697 | */ | 658 | */ |
diff --git a/net/netlabel/netlabel_cipso_v4.c b/net/netlabel/netlabel_cipso_v4.c index aaf50032b3ac..5c4f60bbc82d 100644 --- a/net/netlabel/netlabel_cipso_v4.c +++ b/net/netlabel/netlabel_cipso_v4.c | |||
@@ -43,6 +43,7 @@ | |||
43 | #include "netlabel_user.h" | 43 | #include "netlabel_user.h" |
44 | #include "netlabel_cipso_v4.h" | 44 | #include "netlabel_cipso_v4.h" |
45 | #include "netlabel_mgmt.h" | 45 | #include "netlabel_mgmt.h" |
46 | #include "netlabel_domainhash.h" | ||
46 | 47 | ||
47 | /* Argument struct for cipso_v4_doi_walk() */ | 48 | /* Argument struct for cipso_v4_doi_walk() */ |
48 | struct netlbl_cipsov4_doiwalk_arg { | 49 | struct netlbl_cipsov4_doiwalk_arg { |
@@ -51,6 +52,12 @@ struct netlbl_cipsov4_doiwalk_arg { | |||
51 | u32 seq; | 52 | u32 seq; |
52 | }; | 53 | }; |
53 | 54 | ||
55 | /* Argument struct for netlbl_domhsh_walk() */ | ||
56 | struct netlbl_domhsh_walk_arg { | ||
57 | struct netlbl_audit *audit_info; | ||
58 | u32 doi; | ||
59 | }; | ||
60 | |||
54 | /* NetLabel Generic NETLINK CIPSOv4 family */ | 61 | /* NetLabel Generic NETLINK CIPSOv4 family */ |
55 | static struct genl_family netlbl_cipsov4_gnl_family = { | 62 | static struct genl_family netlbl_cipsov4_gnl_family = { |
56 | .id = GENL_ID_GENERATE, | 63 | .id = GENL_ID_GENERATE, |
@@ -81,32 +88,6 @@ static const struct nla_policy netlbl_cipsov4_genl_policy[NLBL_CIPSOV4_A_MAX + 1 | |||
81 | */ | 88 | */ |
82 | 89 | ||
83 | /** | 90 | /** |
84 | * netlbl_cipsov4_doi_free - Frees a CIPSO V4 DOI definition | ||
85 | * @entry: the entry's RCU field | ||
86 | * | ||
87 | * Description: | ||
88 | * This function is designed to be used as a callback to the call_rcu() | ||
89 | * function so that the memory allocated to the DOI definition can be released | ||
90 | * safely. | ||
91 | * | ||
92 | */ | ||
93 | void netlbl_cipsov4_doi_free(struct rcu_head *entry) | ||
94 | { | ||
95 | struct cipso_v4_doi *ptr; | ||
96 | |||
97 | ptr = container_of(entry, struct cipso_v4_doi, rcu); | ||
98 | switch (ptr->type) { | ||
99 | case CIPSO_V4_MAP_STD: | ||
100 | kfree(ptr->map.std->lvl.cipso); | ||
101 | kfree(ptr->map.std->lvl.local); | ||
102 | kfree(ptr->map.std->cat.cipso); | ||
103 | kfree(ptr->map.std->cat.local); | ||
104 | break; | ||
105 | } | ||
106 | kfree(ptr); | ||
107 | } | ||
108 | |||
109 | /** | ||
110 | * netlbl_cipsov4_add_common - Parse the common sections of a ADD message | 91 | * netlbl_cipsov4_add_common - Parse the common sections of a ADD message |
111 | * @info: the Generic NETLINK info block | 92 | * @info: the Generic NETLINK info block |
112 | * @doi_def: the CIPSO V4 DOI definition | 93 | * @doi_def: the CIPSO V4 DOI definition |
@@ -342,7 +323,7 @@ static int netlbl_cipsov4_add_std(struct genl_info *info) | |||
342 | 323 | ||
343 | add_std_failure: | 324 | add_std_failure: |
344 | if (doi_def) | 325 | if (doi_def) |
345 | netlbl_cipsov4_doi_free(&doi_def->rcu); | 326 | cipso_v4_doi_free(doi_def); |
346 | return ret_val; | 327 | return ret_val; |
347 | } | 328 | } |
348 | 329 | ||
@@ -379,7 +360,7 @@ static int netlbl_cipsov4_add_pass(struct genl_info *info) | |||
379 | return 0; | 360 | return 0; |
380 | 361 | ||
381 | add_pass_failure: | 362 | add_pass_failure: |
382 | netlbl_cipsov4_doi_free(&doi_def->rcu); | 363 | cipso_v4_doi_free(doi_def); |
383 | return ret_val; | 364 | return ret_val; |
384 | } | 365 | } |
385 | 366 | ||
@@ -668,6 +649,29 @@ static int netlbl_cipsov4_listall(struct sk_buff *skb, | |||
668 | } | 649 | } |
669 | 650 | ||
670 | /** | 651 | /** |
652 | * netlbl_cipsov4_remove_cb - netlbl_cipsov4_remove() callback for REMOVE | ||
653 | * @entry: LSM domain mapping entry | ||
654 | * @arg: the netlbl_domhsh_walk_arg structure | ||
655 | * | ||
656 | * Description: | ||
657 | * This function is intended for use by netlbl_cipsov4_remove() as the callback | ||
658 | * for the netlbl_domhsh_walk() function; it removes LSM domain map entries | ||
659 | * which are associated with the CIPSO DOI specified in @arg. Returns zero on | ||
660 | * success, negative values on failure. | ||
661 | * | ||
662 | */ | ||
663 | static int netlbl_cipsov4_remove_cb(struct netlbl_dom_map *entry, void *arg) | ||
664 | { | ||
665 | struct netlbl_domhsh_walk_arg *cb_arg = arg; | ||
666 | |||
667 | if (entry->type == NETLBL_NLTYPE_CIPSOV4 && | ||
668 | entry->type_def.cipsov4->doi == cb_arg->doi) | ||
669 | return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info); | ||
670 | |||
671 | return 0; | ||
672 | } | ||
673 | |||
674 | /** | ||
671 | * netlbl_cipsov4_remove - Handle a REMOVE message | 675 | * netlbl_cipsov4_remove - Handle a REMOVE message |
672 | * @skb: the NETLINK buffer | 676 | * @skb: the NETLINK buffer |
673 | * @info: the Generic NETLINK info block | 677 | * @info: the Generic NETLINK info block |
@@ -681,8 +685,11 @@ static int netlbl_cipsov4_remove(struct sk_buff *skb, struct genl_info *info) | |||
681 | { | 685 | { |
682 | int ret_val = -EINVAL; | 686 | int ret_val = -EINVAL; |
683 | u32 doi = 0; | 687 | u32 doi = 0; |
688 | struct netlbl_domhsh_walk_arg cb_arg; | ||
684 | struct audit_buffer *audit_buf; | 689 | struct audit_buffer *audit_buf; |
685 | struct netlbl_audit audit_info; | 690 | struct netlbl_audit audit_info; |
691 | u32 skip_bkt = 0; | ||
692 | u32 skip_chain = 0; | ||
686 | 693 | ||
687 | if (!info->attrs[NLBL_CIPSOV4_A_DOI]) | 694 | if (!info->attrs[NLBL_CIPSOV4_A_DOI]) |
688 | return -EINVAL; | 695 | return -EINVAL; |
@@ -690,11 +697,15 @@ static int netlbl_cipsov4_remove(struct sk_buff *skb, struct genl_info *info) | |||
690 | doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]); | 697 | doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]); |
691 | netlbl_netlink_auditinfo(skb, &audit_info); | 698 | netlbl_netlink_auditinfo(skb, &audit_info); |
692 | 699 | ||
693 | ret_val = cipso_v4_doi_remove(doi, | 700 | cb_arg.doi = doi; |
694 | &audit_info, | 701 | cb_arg.audit_info = &audit_info; |
695 | netlbl_cipsov4_doi_free); | 702 | ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain, |
696 | if (ret_val == 0) | 703 | netlbl_cipsov4_remove_cb, &cb_arg); |
697 | atomic_dec(&netlabel_mgmt_protocount); | 704 | if (ret_val == 0 || ret_val == -ENOENT) { |
705 | ret_val = cipso_v4_doi_remove(doi, &audit_info); | ||
706 | if (ret_val == 0) | ||
707 | atomic_dec(&netlabel_mgmt_protocount); | ||
708 | } | ||
698 | 709 | ||
699 | audit_buf = netlbl_audit_start_common(AUDIT_MAC_CIPSOV4_DEL, | 710 | audit_buf = netlbl_audit_start_common(AUDIT_MAC_CIPSOV4_DEL, |
700 | &audit_info); | 711 | &audit_info); |
diff --git a/net/netlabel/netlabel_domainhash.c b/net/netlabel/netlabel_domainhash.c index dc42206c4312..0243f0c57b41 100644 --- a/net/netlabel/netlabel_domainhash.c +++ b/net/netlabel/netlabel_domainhash.c | |||
@@ -217,20 +217,6 @@ int netlbl_domhsh_add(struct netlbl_dom_map *entry, | |||
217 | u32 bkt; | 217 | u32 bkt; |
218 | struct audit_buffer *audit_buf; | 218 | struct audit_buffer *audit_buf; |
219 | 219 | ||
220 | switch (entry->type) { | ||
221 | case NETLBL_NLTYPE_UNLABELED: | ||
222 | ret_val = 0; | ||
223 | break; | ||
224 | case NETLBL_NLTYPE_CIPSOV4: | ||
225 | ret_val = cipso_v4_doi_domhsh_add(entry->type_def.cipsov4, | ||
226 | entry->domain); | ||
227 | break; | ||
228 | default: | ||
229 | return -EINVAL; | ||
230 | } | ||
231 | if (ret_val != 0) | ||
232 | return ret_val; | ||
233 | |||
234 | entry->valid = 1; | 220 | entry->valid = 1; |
235 | INIT_RCU_HEAD(&entry->rcu); | 221 | INIT_RCU_HEAD(&entry->rcu); |
236 | 222 | ||
@@ -271,16 +257,6 @@ int netlbl_domhsh_add(struct netlbl_dom_map *entry, | |||
271 | } | 257 | } |
272 | rcu_read_unlock(); | 258 | rcu_read_unlock(); |
273 | 259 | ||
274 | if (ret_val != 0) { | ||
275 | switch (entry->type) { | ||
276 | case NETLBL_NLTYPE_CIPSOV4: | ||
277 | if (cipso_v4_doi_domhsh_remove(entry->type_def.cipsov4, | ||
278 | entry->domain) != 0) | ||
279 | BUG(); | ||
280 | break; | ||
281 | } | ||
282 | } | ||
283 | |||
284 | return ret_val; | 260 | return ret_val; |
285 | } | 261 | } |
286 | 262 | ||
@@ -302,35 +278,26 @@ int netlbl_domhsh_add_default(struct netlbl_dom_map *entry, | |||
302 | } | 278 | } |
303 | 279 | ||
304 | /** | 280 | /** |
305 | * netlbl_domhsh_remove - Removes an entry from the domain hash table | 281 | * netlbl_domhsh_remove_entry - Removes a given entry from the domain table |
306 | * @domain: the domain to remove | 282 | * @entry: the entry to remove |
307 | * @audit_info: NetLabel audit information | 283 | * @audit_info: NetLabel audit information |
308 | * | 284 | * |
309 | * Description: | 285 | * Description: |
310 | * Removes an entry from the domain hash table and handles any updates to the | 286 | * Removes an entry from the domain hash table and handles any updates to the |
311 | * lower level protocol handler (i.e. CIPSO). Returns zero on success, | 287 | * lower level protocol handler (i.e. CIPSO). Caller is responsible for |
312 | * negative on failure. | 288 | * ensuring that the RCU read lock is held. Returns zero on success, negative |
289 | * on failure. | ||
313 | * | 290 | * |
314 | */ | 291 | */ |
315 | int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info) | 292 | int netlbl_domhsh_remove_entry(struct netlbl_dom_map *entry, |
293 | struct netlbl_audit *audit_info) | ||
316 | { | 294 | { |
317 | int ret_val = -ENOENT; | 295 | int ret_val = 0; |
318 | struct netlbl_dom_map *entry; | ||
319 | struct audit_buffer *audit_buf; | 296 | struct audit_buffer *audit_buf; |
320 | 297 | ||
321 | rcu_read_lock(); | ||
322 | if (domain) | ||
323 | entry = netlbl_domhsh_search(domain); | ||
324 | else | ||
325 | entry = netlbl_domhsh_search_def(domain); | ||
326 | if (entry == NULL) | 298 | if (entry == NULL) |
327 | goto remove_return; | 299 | return -ENOENT; |
328 | switch (entry->type) { | 300 | |
329 | case NETLBL_NLTYPE_CIPSOV4: | ||
330 | cipso_v4_doi_domhsh_remove(entry->type_def.cipsov4, | ||
331 | entry->domain); | ||
332 | break; | ||
333 | } | ||
334 | spin_lock(&netlbl_domhsh_lock); | 301 | spin_lock(&netlbl_domhsh_lock); |
335 | if (entry->valid) { | 302 | if (entry->valid) { |
336 | entry->valid = 0; | 303 | entry->valid = 0; |
@@ -338,8 +305,8 @@ int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info) | |||
338 | list_del_rcu(&entry->list); | 305 | list_del_rcu(&entry->list); |
339 | else | 306 | else |
340 | rcu_assign_pointer(netlbl_domhsh_def, NULL); | 307 | rcu_assign_pointer(netlbl_domhsh_def, NULL); |
341 | ret_val = 0; | 308 | } else |
342 | } | 309 | ret_val = -ENOENT; |
343 | spin_unlock(&netlbl_domhsh_lock); | 310 | spin_unlock(&netlbl_domhsh_lock); |
344 | 311 | ||
345 | audit_buf = netlbl_audit_start_common(AUDIT_MAC_MAP_DEL, audit_info); | 312 | audit_buf = netlbl_audit_start_common(AUDIT_MAC_MAP_DEL, audit_info); |
@@ -351,10 +318,42 @@ int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info) | |||
351 | audit_log_end(audit_buf); | 318 | audit_log_end(audit_buf); |
352 | } | 319 | } |
353 | 320 | ||
354 | remove_return: | 321 | if (ret_val == 0) { |
355 | rcu_read_unlock(); | 322 | switch (entry->type) { |
356 | if (ret_val == 0) | 323 | case NETLBL_NLTYPE_CIPSOV4: |
324 | cipso_v4_doi_putdef(entry->type_def.cipsov4); | ||
325 | break; | ||
326 | } | ||
357 | call_rcu(&entry->rcu, netlbl_domhsh_free_entry); | 327 | call_rcu(&entry->rcu, netlbl_domhsh_free_entry); |
328 | } | ||
329 | |||
330 | return ret_val; | ||
331 | } | ||
332 | |||
333 | /** | ||
334 | * netlbl_domhsh_remove - Removes an entry from the domain hash table | ||
335 | * @domain: the domain to remove | ||
336 | * @audit_info: NetLabel audit information | ||
337 | * | ||
338 | * Description: | ||
339 | * Removes an entry from the domain hash table and handles any updates to the | ||
340 | * lower level protocol handler (i.e. CIPSO). Returns zero on success, | ||
341 | * negative on failure. | ||
342 | * | ||
343 | */ | ||
344 | int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info) | ||
345 | { | ||
346 | int ret_val; | ||
347 | struct netlbl_dom_map *entry; | ||
348 | |||
349 | rcu_read_lock(); | ||
350 | if (domain) | ||
351 | entry = netlbl_domhsh_search(domain); | ||
352 | else | ||
353 | entry = netlbl_domhsh_search_def(domain); | ||
354 | ret_val = netlbl_domhsh_remove_entry(entry, audit_info); | ||
355 | rcu_read_unlock(); | ||
356 | |||
358 | return ret_val; | 357 | return ret_val; |
359 | } | 358 | } |
360 | 359 | ||
diff --git a/net/netlabel/netlabel_domainhash.h b/net/netlabel/netlabel_domainhash.h index 8220990ceb96..afcc41a7432d 100644 --- a/net/netlabel/netlabel_domainhash.h +++ b/net/netlabel/netlabel_domainhash.h | |||
@@ -61,6 +61,8 @@ int netlbl_domhsh_add(struct netlbl_dom_map *entry, | |||
61 | struct netlbl_audit *audit_info); | 61 | struct netlbl_audit *audit_info); |
62 | int netlbl_domhsh_add_default(struct netlbl_dom_map *entry, | 62 | int netlbl_domhsh_add_default(struct netlbl_dom_map *entry, |
63 | struct netlbl_audit *audit_info); | 63 | struct netlbl_audit *audit_info); |
64 | int netlbl_domhsh_remove_entry(struct netlbl_dom_map *entry, | ||
65 | struct netlbl_audit *audit_info); | ||
64 | int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info); | 66 | int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info); |
65 | int netlbl_domhsh_remove_default(struct netlbl_audit *audit_info); | 67 | int netlbl_domhsh_remove_default(struct netlbl_audit *audit_info); |
66 | struct netlbl_dom_map *netlbl_domhsh_getentry(const char *domain); | 68 | struct netlbl_dom_map *netlbl_domhsh_getentry(const char *domain); |
diff --git a/net/netlabel/netlabel_kapi.c b/net/netlabel/netlabel_kapi.c index 22faba620e4b..7d8ecea93914 100644 --- a/net/netlabel/netlabel_kapi.c +++ b/net/netlabel/netlabel_kapi.c | |||
@@ -121,10 +121,15 @@ int netlbl_cfg_cipsov4_add_map(struct cipso_v4_doi *doi_def, | |||
121 | struct netlbl_audit *audit_info) | 121 | struct netlbl_audit *audit_info) |
122 | { | 122 | { |
123 | int ret_val = -ENOMEM; | 123 | int ret_val = -ENOMEM; |
124 | u32 doi; | ||
125 | u32 doi_type; | ||
124 | struct netlbl_dom_map *entry; | 126 | struct netlbl_dom_map *entry; |
125 | const char *type_str; | 127 | const char *type_str; |
126 | struct audit_buffer *audit_buf; | 128 | struct audit_buffer *audit_buf; |
127 | 129 | ||
130 | doi = doi_def->doi; | ||
131 | doi_type = doi_def->type; | ||
132 | |||
128 | entry = kzalloc(sizeof(*entry), GFP_ATOMIC); | 133 | entry = kzalloc(sizeof(*entry), GFP_ATOMIC); |
129 | if (entry == NULL) | 134 | if (entry == NULL) |
130 | return -ENOMEM; | 135 | return -ENOMEM; |
@@ -133,32 +138,25 @@ int netlbl_cfg_cipsov4_add_map(struct cipso_v4_doi *doi_def, | |||
133 | if (entry->domain == NULL) | 138 | if (entry->domain == NULL) |
134 | goto cfg_cipsov4_add_map_failure; | 139 | goto cfg_cipsov4_add_map_failure; |
135 | } | 140 | } |
136 | entry->type = NETLBL_NLTYPE_CIPSOV4; | ||
137 | entry->type_def.cipsov4 = doi_def; | ||
138 | |||
139 | /* Grab a RCU read lock here so nothing happens to the doi_def variable | ||
140 | * between adding it to the CIPSOv4 protocol engine and adding a | ||
141 | * domain mapping for it. */ | ||
142 | 141 | ||
143 | rcu_read_lock(); | ||
144 | ret_val = cipso_v4_doi_add(doi_def); | 142 | ret_val = cipso_v4_doi_add(doi_def); |
145 | if (ret_val != 0) | 143 | if (ret_val != 0) |
146 | goto cfg_cipsov4_add_map_failure_unlock; | 144 | goto cfg_cipsov4_add_map_failure_remove_doi; |
145 | entry->type = NETLBL_NLTYPE_CIPSOV4; | ||
146 | entry->type_def.cipsov4 = cipso_v4_doi_getdef(doi); | ||
147 | if (entry->type_def.cipsov4 == NULL) { | ||
148 | ret_val = -ENOENT; | ||
149 | goto cfg_cipsov4_add_map_failure_remove_doi; | ||
150 | } | ||
147 | ret_val = netlbl_domhsh_add(entry, audit_info); | 151 | ret_val = netlbl_domhsh_add(entry, audit_info); |
148 | if (ret_val != 0) | 152 | if (ret_val != 0) |
149 | goto cfg_cipsov4_add_map_failure_remove_doi; | 153 | goto cfg_cipsov4_add_map_failure_release_doi; |
150 | rcu_read_unlock(); | ||
151 | |||
152 | return 0; | ||
153 | 154 | ||
154 | cfg_cipsov4_add_map_failure_remove_doi: | 155 | cfg_cipsov4_add_map_return: |
155 | cipso_v4_doi_remove(doi_def->doi, audit_info, netlbl_cipsov4_doi_free); | ||
156 | cfg_cipsov4_add_map_failure_unlock: | ||
157 | rcu_read_unlock(); | ||
158 | audit_buf = netlbl_audit_start_common(AUDIT_MAC_CIPSOV4_ADD, | 156 | audit_buf = netlbl_audit_start_common(AUDIT_MAC_CIPSOV4_ADD, |
159 | audit_info); | 157 | audit_info); |
160 | if (audit_buf != NULL) { | 158 | if (audit_buf != NULL) { |
161 | switch (doi_def->type) { | 159 | switch (doi_type) { |
162 | case CIPSO_V4_MAP_STD: | 160 | case CIPSO_V4_MAP_STD: |
163 | type_str = "std"; | 161 | type_str = "std"; |
164 | break; | 162 | break; |
@@ -170,14 +168,21 @@ cfg_cipsov4_add_map_failure_unlock: | |||
170 | } | 168 | } |
171 | audit_log_format(audit_buf, | 169 | audit_log_format(audit_buf, |
172 | " cipso_doi=%u cipso_type=%s res=%u", | 170 | " cipso_doi=%u cipso_type=%s res=%u", |
173 | doi_def->doi, type_str, ret_val == 0 ? 1 : 0); | 171 | doi, type_str, ret_val == 0 ? 1 : 0); |
174 | audit_log_end(audit_buf); | 172 | audit_log_end(audit_buf); |
175 | } | 173 | } |
174 | |||
175 | return ret_val; | ||
176 | |||
177 | cfg_cipsov4_add_map_failure_release_doi: | ||
178 | cipso_v4_doi_putdef(doi_def); | ||
179 | cfg_cipsov4_add_map_failure_remove_doi: | ||
180 | cipso_v4_doi_remove(doi, audit_info); | ||
176 | cfg_cipsov4_add_map_failure: | 181 | cfg_cipsov4_add_map_failure: |
177 | if (entry != NULL) | 182 | if (entry != NULL) |
178 | kfree(entry->domain); | 183 | kfree(entry->domain); |
179 | kfree(entry); | 184 | kfree(entry); |
180 | return ret_val; | 185 | goto cfg_cipsov4_add_map_return; |
181 | } | 186 | } |
182 | 187 | ||
183 | /* | 188 | /* |
diff --git a/net/netlabel/netlabel_mgmt.c b/net/netlabel/netlabel_mgmt.c index 44be5d5261f4..c4e18c7bc0c1 100644 --- a/net/netlabel/netlabel_mgmt.c +++ b/net/netlabel/netlabel_mgmt.c | |||
@@ -122,18 +122,12 @@ static int netlbl_mgmt_add(struct sk_buff *skb, struct genl_info *info) | |||
122 | goto add_failure; | 122 | goto add_failure; |
123 | 123 | ||
124 | tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]); | 124 | tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]); |
125 | /* We should be holding a rcu_read_lock() here while we hold | ||
126 | * the result but since the entry will always be deleted when | ||
127 | * the CIPSO DOI is deleted we aren't going to keep the | ||
128 | * lock. */ | ||
129 | rcu_read_lock(); | ||
130 | entry->type_def.cipsov4 = cipso_v4_doi_getdef(tmp_val); | 125 | entry->type_def.cipsov4 = cipso_v4_doi_getdef(tmp_val); |
131 | if (entry->type_def.cipsov4 == NULL) { | 126 | if (entry->type_def.cipsov4 == NULL) |
132 | rcu_read_unlock(); | ||
133 | goto add_failure; | 127 | goto add_failure; |
134 | } | ||
135 | ret_val = netlbl_domhsh_add(entry, &audit_info); | 128 | ret_val = netlbl_domhsh_add(entry, &audit_info); |
136 | rcu_read_unlock(); | 129 | if (ret_val != 0) |
130 | cipso_v4_doi_putdef(entry->type_def.cipsov4); | ||
137 | break; | 131 | break; |
138 | default: | 132 | default: |
139 | goto add_failure; | 133 | goto add_failure; |
@@ -294,18 +288,12 @@ static int netlbl_mgmt_adddef(struct sk_buff *skb, struct genl_info *info) | |||
294 | goto adddef_failure; | 288 | goto adddef_failure; |
295 | 289 | ||
296 | tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]); | 290 | tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]); |
297 | /* We should be holding a rcu_read_lock() here while we hold | ||
298 | * the result but since the entry will always be deleted when | ||
299 | * the CIPSO DOI is deleted we aren't going to keep the | ||
300 | * lock. */ | ||
301 | rcu_read_lock(); | ||
302 | entry->type_def.cipsov4 = cipso_v4_doi_getdef(tmp_val); | 291 | entry->type_def.cipsov4 = cipso_v4_doi_getdef(tmp_val); |
303 | if (entry->type_def.cipsov4 == NULL) { | 292 | if (entry->type_def.cipsov4 == NULL) |
304 | rcu_read_unlock(); | ||
305 | goto adddef_failure; | 293 | goto adddef_failure; |
306 | } | ||
307 | ret_val = netlbl_domhsh_add_default(entry, &audit_info); | 294 | ret_val = netlbl_domhsh_add_default(entry, &audit_info); |
308 | rcu_read_unlock(); | 295 | if (ret_val != 0) |
296 | cipso_v4_doi_putdef(entry->type_def.cipsov4); | ||
309 | break; | 297 | break; |
310 | default: | 298 | default: |
311 | goto adddef_failure; | 299 | goto adddef_failure; |
diff --git a/security/smack/smackfs.c b/security/smack/smackfs.c index 271a835fbbe3..9733f8eb1a2a 100644 --- a/security/smack/smackfs.c +++ b/security/smack/smackfs.c | |||
@@ -343,9 +343,11 @@ static void smk_cipso_doi(void) | |||
343 | doip->tags[rc] = CIPSO_V4_TAG_INVALID; | 343 | doip->tags[rc] = CIPSO_V4_TAG_INVALID; |
344 | 344 | ||
345 | rc = netlbl_cfg_cipsov4_add_map(doip, NULL, &audit_info); | 345 | rc = netlbl_cfg_cipsov4_add_map(doip, NULL, &audit_info); |
346 | if (rc != 0) | 346 | if (rc != 0) { |
347 | printk(KERN_WARNING "%s:%d add rc = %d\n", | 347 | printk(KERN_WARNING "%s:%d add rc = %d\n", |
348 | __func__, __LINE__, rc); | 348 | __func__, __LINE__, rc); |
349 | kfree(doip); | ||
350 | } | ||
349 | } | 351 | } |
350 | 352 | ||
351 | /** | 353 | /** |