Message ID | 20231003085653.3104411-1-kory.maincent@bootlin.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:2a8e:b0:403:3b70:6f57 with SMTP id in14csp1946560vqb; Tue, 3 Oct 2023 01:57:36 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHN0lLCPlIjEkVJsHv/PYTRSr0gOA0x9QyVPdgWM1mlPoqLDklmd/MvtVk3igk6noCjGvoJ X-Received: by 2002:a17:903:2442:b0:1c4:1cd3:8068 with SMTP id l2-20020a170903244200b001c41cd38068mr3422132pls.5.1696323455705; Tue, 03 Oct 2023 01:57:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696323455; cv=none; d=google.com; s=arc-20160816; b=tY2e9uM846XExVXQsIpcxO6PfrNozIfeNhHIzFXKcKes1t+uUg3L4ikyx8YgUn5kaN y8Z2Hm8aMK1lqgA9U+9KVyLfb5kL3vlZoH4qcWl6NfRlef2octw/8FIGPGRVKLxcVCzG llySmxazE/YQVL+OxrHJILuGaOZ1NOXK1KOl0wGRcliHTzjFR0i0vYyd4QcLFYWv6dt8 0EZWq6JIc0+h2XtuDCfZadfDmCeSS5yrAA1cRMJXI2oMkvxr84JzRhMq57ElI4WT+0VU KCN69yE0nVOCP7I7RcdigfkQMMhAFSPF9JxRPsPtv36dTJU86Uzaa9RFdzwbZbBHc/Eu 5ADw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=QaHAw0oOg3N4EaBCbSIugnNCx1RIAAViIQYceCqX5qo=; fh=5gunku78chIBVOM0WTUZGdWpZ3eCOrXiihA2qs49s9M=; b=rSDuwVf5Y2p5SCJvSinREk1kfsPDHBigjeo2Hc7dYUlC9nGZ27SP114ytG8fpF2E6G fsNDSzkeb5eJ/ew1kTDX8n+u4GRzMJx7OESMOKCfT0ppi8lVtWR4JNo6yFglBBLKOpGU mSKcq4XHvJaQCrfPYaIsdHbwiYK/PJQX8xP3tuORXylP0tNVIUGwiIipgq4csIXL37uQ uDGs+MMF9JF5hsn0XjFEHdN3LVu/o9y7RQq3i/cDb0gOztsjOubC0KHLHKmLs7thAtgA moTiBMZaZXMoe6goqOnSuqssDBl4wUUou9LTcuUyl0LqD6dbONeZW0dufQPr04Smd5WU fsYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=bvU+uBKi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id p20-20020a170902f09400b001c20db25108si921945pla.41.2023.10.03.01.57.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Oct 2023 01:57:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=bvU+uBKi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 0FB2C804F604; Tue, 3 Oct 2023 01:57:35 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239526AbjJCI5Z (ORCPT <rfc822;pusanteemu@gmail.com> + 18 others); Tue, 3 Oct 2023 04:57:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239293AbjJCI5B (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 3 Oct 2023 04:57:01 -0400 Received: from relay4-d.mail.gandi.net (relay4-d.mail.gandi.net [IPv6:2001:4b98:dc4:8::224]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F28B1AB; Tue, 3 Oct 2023 01:56:56 -0700 (PDT) Received: by mail.gandi.net (Postfix) with ESMTPSA id 913DDE0013; Tue, 3 Oct 2023 08:56:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bootlin.com; s=gm1; t=1696323415; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=QaHAw0oOg3N4EaBCbSIugnNCx1RIAAViIQYceCqX5qo=; b=bvU+uBKiddQYey6J9aL8CgiYG7+l5qeB9oA4jiLCBlnTZxElTiEW8jjH7GYRh7CswgJ0tc q56Yqse/oOuKuUXkLSSdPMD+ajvWn9/SAVuh5oUSt7vpkQZg3nUsidNhZbANNXmygE/cV3 dWic6PwwVhk5+h06AEQ7AtvHJplmRCDT0T15KpZ0yjMBTfYwH5EE8XG5Ugtdr82YVLrYhc FUqpBWInTu1zHIDgx9BpwZmJj7oeHgdXRbnzeeDcZaFf8u+tGrRDo/w8X9qWIkLXtppV/h z/FkQRXYXy9kdNHvCyQjgK8vMGMkUc2uStg/LMxUhqnw2KTwWKcd70dpJ6LiDA== From: =?utf-8?q?K=C3=B6ry_Maincent?= <kory.maincent@bootlin.com> To: Michal Kubecek <mkubecek@suse.cz>, "David S. Miller" <davem@davemloft.net>, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Maxime Chevallier <maxime.chevallier@bootlin.com>, Kory Maincent <kory.maincent@bootlin.com>, stable@vger.kernel.org, thomas.petazzoni@bootlin.com, Eric Dumazet <edumazet@google.com>, Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com> Subject: [PATCH net 1/1] ethtool: Fix mod state of verbose no_mask bitset Date: Tue, 3 Oct 2023 10:56:52 +0200 Message-Id: <20231003085653.3104411-1-kory.maincent@bootlin.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-GND-Sasl: kory.maincent@bootlin.com X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 03 Oct 2023 01:57:35 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778724063902329144 X-GMAIL-MSGID: 1778724063902329144 |
Series |
[net,1/1] ethtool: Fix mod state of verbose no_mask bitset
|
|
Commit Message
Köry Maincent
Oct. 3, 2023, 8:56 a.m. UTC
From: Kory Maincent <kory.maincent@bootlin.com> A bitset without mask in a _SET request means we want exactly the bits in the bitset to be set. This works correctly for compact format but when verbose format is parsed, ethnl_update_bitset32_verbose() only sets the bits present in the request bitset but does not clear the rest. The commit 6699170376ab fixes this issue by clearing the whole target bitmap before we start iterating. The solution proposed brought an issue with the behavior of the mod variable. As the bitset is always cleared the old val will always differ to the new val. Fix it by adding a new temporary variable which save the state of the old bitmap. Fixes: 6699170376ab ("ethtool: fix application of verbose no_mask bitset") Signed-off-by: Kory Maincent <kory.maincent@bootlin.com> Cc: stable@vger.kernel.org --- net/ethtool/bitset.c | 25 +++++++++++++++++++------ 1 file changed, 19 insertions(+), 6 deletions(-)
Comments
On Tue, Oct 03, 2023 at 10:56:52AM +0200, Köry Maincent wrote: > From: Kory Maincent <kory.maincent@bootlin.com> > > A bitset without mask in a _SET request means we want exactly the bits in > the bitset to be set. This works correctly for compact format but when > verbose format is parsed, ethnl_update_bitset32_verbose() only sets the > bits present in the request bitset but does not clear the rest. The commit > 6699170376ab fixes this issue by clearing the whole target bitmap before we > start iterating. The solution proposed brought an issue with the behavior > of the mod variable. As the bitset is always cleared the old val will > always differ to the new val. > > Fix it by adding a new temporary variable which save the state of the old > bitmap. > > Fixes: 6699170376ab ("ethtool: fix application of verbose no_mask bitset") > Signed-off-by: Kory Maincent <kory.maincent@bootlin.com> > Cc: stable@vger.kernel.org > --- > net/ethtool/bitset.c | 25 +++++++++++++++++++------ > 1 file changed, 19 insertions(+), 6 deletions(-) > > diff --git a/net/ethtool/bitset.c b/net/ethtool/bitset.c > index 0515d6604b3b..95f11b0a38b4 100644 > --- a/net/ethtool/bitset.c > +++ b/net/ethtool/bitset.c > @@ -432,7 +432,9 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > struct netlink_ext_ack *extack, bool *mod) > { > struct nlattr *bit_attr; > + u32 *tmp = NULL; > bool no_mask; > + bool dummy; > int rem; > int ret; > > @@ -448,8 +450,11 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > } > > no_mask = tb[ETHTOOL_A_BITSET_NOMASK]; > - if (no_mask) > - ethnl_bitmap32_clear(bitmap, 0, nbits, mod); > + if (no_mask) { > + tmp = kcalloc(nbits, sizeof(u32), GFP_KERNEL); > + memcpy(tmp, bitmap, nbits); Hi Köry, I'm no expert on etnhl bitmaps. But the above doesn't seem correct to me. Given that sizeof(u32) == 4: * The allocation is for nbits * 4 bytes * The copy is for its for nbits bytes * I believe that bitmap contains space for the value followed by a mask. So it seems to me the size of bitmap, in words, is DIV_ROUND_UP(nbits, 32) * 2 And in bytes: DIV_ROUND_UP(nbits, 32) * 16 But perhaps only half is needed if only the value part of tmp is used. If I'm on the right track here I'd suggest helpers might be in order. > + ethnl_bitmap32_clear(bitmap, 0, nbits, &dummy); > + } > > nla_for_each_nested(bit_attr, tb[ETHTOOL_A_BITSET_BITS], rem) { > bool old_val, new_val; > @@ -458,13 +463,18 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > if (nla_type(bit_attr) != ETHTOOL_A_BITSET_BITS_BIT) { > NL_SET_ERR_MSG_ATTR(extack, bit_attr, > "only ETHTOOL_A_BITSET_BITS_BIT allowed in ETHTOOL_A_BITSET_BITS"); > - return -EINVAL; > + ret = -EINVAL; > + goto out; > } > ret = ethnl_parse_bit(&idx, &new_val, nbits, bit_attr, no_mask, > names, extack); > if (ret < 0) > - return ret; > - old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); > + goto out; > + if (no_mask) > + old_val = tmp[idx / 32] & ((u32)1 << (idx % 32)); > + else > + old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); > + > if (new_val != old_val) { > if (new_val) > bitmap[idx / 32] |= ((u32)1 << (idx % 32)); > @@ -474,7 +484,10 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > } > } > > - return 0; > + ret = 0; > +out: > + kfree(tmp); > + return ret; > } > > static int ethnl_compact_sanity_checks(unsigned int nbits, > -- > 2.25.1 > >
Hello Simon, Thank for your review. On Wed, 4 Oct 2023 13:07:14 +0200 Simon Horman <horms@kernel.org> wrote: > On Tue, Oct 03, 2023 at 10:56:52AM +0200, Köry Maincent wrote: > > From: Kory Maincent <kory.maincent@bootlin.com> > > > @@ -448,8 +450,11 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned > > int nbits, } > > > > no_mask = tb[ETHTOOL_A_BITSET_NOMASK]; > > - if (no_mask) > > - ethnl_bitmap32_clear(bitmap, 0, nbits, mod); > > + if (no_mask) { > > + tmp = kcalloc(nbits, sizeof(u32), GFP_KERNEL); > > + memcpy(tmp, bitmap, nbits); > > Hi Köry, > > I'm no expert on etnhl bitmaps. But the above doesn't seem correct to me. > Given that sizeof(u32) == 4: > > * The allocation is for nbits * 4 bytes > * The copy is for its for nbits bytes > * I believe that bitmap contains space for the value followed by a mask. > So it seems to me the size of bitmap, in words, is > DIV_ROUND_UP(nbits, 32) * 2 > And in bytes: DIV_ROUND_UP(nbits, 32) * 16 > But perhaps only half is needed if only the value part of tmp is used. > > If I'm on the right track here I'd suggest helpers might be in order. You are right I should use the same alloc as ethnl_update_bitset with tmp instead of bitmap32: u32 small_bitmap32[ETHNL_SMALL_BITMAP_WORDS]; u32 *bitmap32 = small_bitmap32; if (nbits > ETHNL_SMALL_BITMAP_BITS) { unsigned int dst_words = DIV_ROUND_UP(nbits, 32); bitmap32 = kmalloc_array(dst_words, sizeof(u32), GFP_KERNEL); if (!bitmap32) return -ENOMEM; } But I am still wondering if it needs to be double as you said for the size of the value followed by the mask. Not sure about it, as ethnl_update_bitset does not do it. Regards,
On Thu, Oct 05, 2023 at 10:03:49AM +0200, Köry Maincent wrote: > Hello Simon, > > Thank for your review. > > On Wed, 4 Oct 2023 13:07:14 +0200 > Simon Horman <horms@kernel.org> wrote: > > > On Tue, Oct 03, 2023 at 10:56:52AM +0200, Köry Maincent wrote: > > > From: Kory Maincent <kory.maincent@bootlin.com> > > > > > @@ -448,8 +450,11 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned > > > int nbits, } > > > > > > no_mask = tb[ETHTOOL_A_BITSET_NOMASK]; > > > - if (no_mask) > > > - ethnl_bitmap32_clear(bitmap, 0, nbits, mod); > > > + if (no_mask) { > > > + tmp = kcalloc(nbits, sizeof(u32), GFP_KERNEL); > > > + memcpy(tmp, bitmap, nbits); > > > > Hi Köry, > > > > I'm no expert on etnhl bitmaps. But the above doesn't seem correct to me. > > Given that sizeof(u32) == 4: > > > > * The allocation is for nbits * 4 bytes > > * The copy is for its for nbits bytes > > * I believe that bitmap contains space for the value followed by a mask. > > So it seems to me the size of bitmap, in words, is > > DIV_ROUND_UP(nbits, 32) * 2 > > And in bytes: DIV_ROUND_UP(nbits, 32) * 16 > > But perhaps only half is needed if only the value part of tmp is used. > > > > If I'm on the right track here I'd suggest helpers might be in order. > > You are right I should use the same alloc as ethnl_update_bitset with tmp > instead of bitmap32: > > u32 small_bitmap32[ETHNL_SMALL_BITMAP_WORDS]; > u32 *bitmap32 = small_bitmap32; > if (nbits > ETHNL_SMALL_BITMAP_BITS) { > unsigned int dst_words = DIV_ROUND_UP(nbits, 32); > > bitmap32 = kmalloc_array(dst_words, sizeof(u32), GFP_KERNEL); > if (!bitmap32) > return -ENOMEM; > } > > But I am still wondering if it needs to be double as you said for the size of > the value followed by the mask. Not sure about it, as ethnl_update_bitset does > not do it. If you only need the value, then I don' think you need to x2 the allocation. But I could be wrong.
diff --git a/net/ethtool/bitset.c b/net/ethtool/bitset.c index 0515d6604b3b..95f11b0a38b4 100644 --- a/net/ethtool/bitset.c +++ b/net/ethtool/bitset.c @@ -432,7 +432,9 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, struct netlink_ext_ack *extack, bool *mod) { struct nlattr *bit_attr; + u32 *tmp = NULL; bool no_mask; + bool dummy; int rem; int ret; @@ -448,8 +450,11 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, } no_mask = tb[ETHTOOL_A_BITSET_NOMASK]; - if (no_mask) - ethnl_bitmap32_clear(bitmap, 0, nbits, mod); + if (no_mask) { + tmp = kcalloc(nbits, sizeof(u32), GFP_KERNEL); + memcpy(tmp, bitmap, nbits); + ethnl_bitmap32_clear(bitmap, 0, nbits, &dummy); + } nla_for_each_nested(bit_attr, tb[ETHTOOL_A_BITSET_BITS], rem) { bool old_val, new_val; @@ -458,13 +463,18 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, if (nla_type(bit_attr) != ETHTOOL_A_BITSET_BITS_BIT) { NL_SET_ERR_MSG_ATTR(extack, bit_attr, "only ETHTOOL_A_BITSET_BITS_BIT allowed in ETHTOOL_A_BITSET_BITS"); - return -EINVAL; + ret = -EINVAL; + goto out; } ret = ethnl_parse_bit(&idx, &new_val, nbits, bit_attr, no_mask, names, extack); if (ret < 0) - return ret; - old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); + goto out; + if (no_mask) + old_val = tmp[idx / 32] & ((u32)1 << (idx % 32)); + else + old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); + if (new_val != old_val) { if (new_val) bitmap[idx / 32] |= ((u32)1 << (idx % 32)); @@ -474,7 +484,10 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, } } - return 0; + ret = 0; +out: + kfree(tmp); + return ret; } static int ethnl_compact_sanity_checks(unsigned int nbits,