|
|
049c96 |
From 83016b9c3734c833ea2c329b371369a1de8bdc09 Mon Sep 17 00:00:00 2001
|
|
|
049c96 |
From: Phil Sutter <psutter@redhat.com>
|
|
|
049c96 |
Date: Tue, 23 Feb 2016 18:27:20 +0100
|
|
|
049c96 |
Subject: [PATCH] bond: fix return after invarg
|
|
|
049c96 |
|
|
|
049c96 |
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1269528
|
|
|
049c96 |
Upstream Status: iproute2.git commit e0f229fb75349
|
|
|
049c96 |
|
|
|
049c96 |
commit e0f229fb7534991f7f1b4ca16a4fcc091a8d50af
|
|
|
049c96 |
Author: Stephen Hemminger <shemming@brocade.com>
|
|
|
049c96 |
Date: Thu Aug 13 14:20:54 2015 -0700
|
|
|
049c96 |
|
|
|
049c96 |
bond: fix return after invarg
|
|
|
049c96 |
---
|
|
|
049c96 |
ip/iplink_bond.c | 95 +++++++++++++++++++-------------------------------------
|
|
|
049c96 |
1 file changed, 32 insertions(+), 63 deletions(-)
|
|
|
049c96 |
|
|
|
049c96 |
diff --git a/ip/iplink_bond.c b/ip/iplink_bond.c
|
|
|
049c96 |
index 1b50de9..9d96cfe 100644
|
|
|
049c96 |
--- a/ip/iplink_bond.c
|
|
|
049c96 |
+++ b/ip/iplink_bond.c
|
|
|
049c96 |
@@ -171,10 +171,8 @@ static int bond_parse_opt(struct link_util *lu, int argc, char **argv,
|
|
|
049c96 |
while (argc > 0) {
|
|
|
049c96 |
if (matches(*argv, "mode") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(mode_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(mode_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid mode", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
mode = get_index(mode_tbl, *argv);
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_MODE, mode);
|
|
|
049c96 |
} else if (matches(*argv, "active_slave") == 0) {
|
|
|
049c96 |
@@ -187,38 +185,28 @@ static int bond_parse_opt(struct link_util *lu, int argc, char **argv,
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_ACTIVE_SLAVE, 0);
|
|
|
049c96 |
} else if (matches(*argv, "miimon") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&miimon, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&miimon, *argv, 0))
|
|
|
049c96 |
invarg("invalid miimon", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_MIIMON, miimon);
|
|
|
049c96 |
} else if (matches(*argv, "updelay") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&updelay, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&updelay, *argv, 0))
|
|
|
049c96 |
invarg("invalid updelay", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_UPDELAY, updelay);
|
|
|
049c96 |
} else if (matches(*argv, "downdelay") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&downdelay, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&downdelay, *argv, 0))
|
|
|
049c96 |
invarg("invalid downdelay", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_DOWNDELAY, downdelay);
|
|
|
049c96 |
} else if (matches(*argv, "use_carrier") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u8(&use_carrier, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u8(&use_carrier, *argv, 0))
|
|
|
049c96 |
invarg("invalid use_carrier", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_USE_CARRIER, use_carrier);
|
|
|
049c96 |
} else if (matches(*argv, "arp_interval") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&arp_interval, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&arp_interval, *argv, 0))
|
|
|
049c96 |
invarg("invalid arp_interval", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_ARP_INTERVAL, arp_interval);
|
|
|
049c96 |
} else if (matches(*argv, "arp_ip_target") == 0) {
|
|
|
049c96 |
struct rtattr * nest = addattr_nest(n, 1024,
|
|
|
049c96 |
@@ -239,18 +227,14 @@ static int bond_parse_opt(struct link_util *lu, int argc, char **argv,
|
|
|
049c96 |
addattr_nest_end(n, nest);
|
|
|
049c96 |
} else if (matches(*argv, "arp_validate") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(arp_validate_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(arp_validate_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid arp_validate", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
arp_validate = get_index(arp_validate_tbl, *argv);
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_ARP_VALIDATE, arp_validate);
|
|
|
049c96 |
} else if (matches(*argv, "arp_all_targets") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(arp_all_targets_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(arp_all_targets_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid arp_all_targets", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
arp_all_targets = get_index(arp_all_targets_tbl, *argv);
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_ARP_ALL_TARGETS, arp_all_targets);
|
|
|
049c96 |
} else if (matches(*argv, "primary") == 0) {
|
|
|
049c96 |
@@ -261,108 +245,93 @@ static int bond_parse_opt(struct link_util *lu, int argc, char **argv,
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_PRIMARY, ifindex);
|
|
|
049c96 |
} else if (matches(*argv, "primary_reselect") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(primary_reselect_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(primary_reselect_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid primary_reselect", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
primary_reselect = get_index(primary_reselect_tbl, *argv);
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_PRIMARY_RESELECT,
|
|
|
049c96 |
primary_reselect);
|
|
|
049c96 |
} else if (matches(*argv, "fail_over_mac") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(fail_over_mac_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(fail_over_mac_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid fail_over_mac", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
fail_over_mac = get_index(fail_over_mac_tbl, *argv);
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_FAIL_OVER_MAC,
|
|
|
049c96 |
fail_over_mac);
|
|
|
049c96 |
} else if (matches(*argv, "xmit_hash_policy") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(xmit_hash_policy_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(xmit_hash_policy_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid xmit_hash_policy", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
xmit_hash_policy = get_index(xmit_hash_policy_tbl, *argv);
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_XMIT_HASH_POLICY,
|
|
|
049c96 |
xmit_hash_policy);
|
|
|
049c96 |
} else if (matches(*argv, "resend_igmp") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&resend_igmp, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&resend_igmp, *argv, 0))
|
|
|
049c96 |
invarg("invalid resend_igmp", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_RESEND_IGMP, resend_igmp);
|
|
|
049c96 |
} else if (matches(*argv, "num_grat_arp") == 0 ||
|
|
|
049c96 |
matches(*argv, "num_unsol_na") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u8(&num_peer_notif, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u8(&num_peer_notif, *argv, 0))
|
|
|
049c96 |
invarg("invalid num_grat_arp|num_unsol_na",
|
|
|
049c96 |
*argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_NUM_PEER_NOTIF,
|
|
|
049c96 |
num_peer_notif);
|
|
|
049c96 |
} else if (matches(*argv, "all_slaves_active") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u8(&all_slaves_active, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u8(&all_slaves_active, *argv, 0))
|
|
|
049c96 |
invarg("invalid all_slaves_active", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_ALL_SLAVES_ACTIVE,
|
|
|
049c96 |
all_slaves_active);
|
|
|
049c96 |
} else if (matches(*argv, "min_links") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&min_links, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&min_links, *argv, 0))
|
|
|
049c96 |
invarg("invalid min_links", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_MIN_LINKS, min_links);
|
|
|
049c96 |
} else if (matches(*argv, "lp_interval") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&lp_interval, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&lp_interval, *argv, 0))
|
|
|
049c96 |
invarg("invalid lp_interval", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_LP_INTERVAL, lp_interval);
|
|
|
049c96 |
} else if (matches(*argv, "packets_per_slave") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u32(&packets_per_slave, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u32(&packets_per_slave, *argv, 0))
|
|
|
049c96 |
invarg("invalid packets_per_slave", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr32(n, 1024, IFLA_BOND_PACKETS_PER_SLAVE,
|
|
|
049c96 |
packets_per_slave);
|
|
|
049c96 |
} else if (matches(*argv, "lacp_rate") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(lacp_rate_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(lacp_rate_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid lacp_rate", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
lacp_rate = get_index(lacp_rate_tbl, *argv);
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_AD_LACP_RATE, lacp_rate);
|
|
|
049c96 |
} else if (matches(*argv, "ad_select") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_index(ad_select_tbl, *argv) < 0) {
|
|
|
049c96 |
+ if (get_index(ad_select_tbl, *argv) < 0)
|
|
|
049c96 |
invarg("invalid ad_select", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
ad_select = get_index(ad_select_tbl, *argv);
|
|
|
049c96 |
addattr8(n, 1024, IFLA_BOND_AD_SELECT, ad_select);
|
|
|
049c96 |
} else if (matches(*argv, "ad_user_port_key") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u16(&ad_user_port_key, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u16(&ad_user_port_key, *argv, 0))
|
|
|
049c96 |
invarg("invalid ad_user_port_key", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr16(n, 1024, IFLA_BOND_AD_USER_PORT_KEY,
|
|
|
049c96 |
ad_user_port_key);
|
|
|
049c96 |
} else if (matches(*argv, "ad_actor_sys_prio") == 0) {
|
|
|
049c96 |
NEXT_ARG();
|
|
|
049c96 |
- if (get_u16(&ad_actor_sys_prio, *argv, 0)) {
|
|
|
049c96 |
+ if (get_u16(&ad_actor_sys_prio, *argv, 0))
|
|
|
049c96 |
invarg("invalid ad_actor_sys_prio", *argv);
|
|
|
049c96 |
- return -1;
|
|
|
049c96 |
- }
|
|
|
049c96 |
+
|
|
|
049c96 |
addattr16(n, 1024, IFLA_BOND_AD_ACTOR_SYS_PRIO,
|
|
|
049c96 |
ad_actor_sys_prio);
|
|
|
049c96 |
} else if (matches(*argv, "ad_actor_system") == 0) {
|
|
|
049c96 |
--
|
|
|
049c96 |
1.8.3.1
|
|
|
049c96 |
|