From patchwork Fri Aug 4 17:05:28 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mirsad Todorovac X-Patchwork-Id: 131287 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:c44e:0:b0:3f2:4152:657d with SMTP id w14csp9851vqr; Fri, 4 Aug 2023 11:01:46 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGn6mH9HqxQsuQmUcj8W94gieWZgYH+d3Mi2SOCr7ncAcJsWYwfV6SEkHZQKX+NVmTquKVv X-Received: by 2002:a17:907:2cce:b0:99c:6312:73ca with SMTP id hg14-20020a1709072cce00b0099c631273camr1829153ejc.71.1691172105726; Fri, 04 Aug 2023 11:01:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691172105; cv=none; d=google.com; s=arc-20160816; b=GzjEUrrGGdZFILBmYF3QnJzIkZ6byhjvzwAK/qq+GbNNKH1pIH0Ef2AK2yXF6MJbBD j6zI+MNsIhXqpR58akDuRLkhwu4FsThNqfHFocW2yZZDlN8FGTt+dPVO9JYXcPEzEi/1 5QqdtWiBxZG60gOLJPVrzekS+cYoK9t7fkQV/rLutfKLBa+0Db7aMtH4Iu53HqqAWlh1 Io4r4LXR50Q0YHazMqZWdRifuIK70HlgDzJUTaNeoUIr+dl429Ldt8hssBO9dZf6zVWe q+C3OaWxDsLPeXUjDo9nl1vwBJRQVBgVYNbun+nBvVyJLvpXPQHCfPuNFTiqapM2kuCF W8Wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature:dkim-signature; bh=iz5dO8ZJGmUBT4jVj4H9eHawNutPkmin07M28QPMmOo=; fh=fM3PyGUzUr+0+zYckifi/gEhAEC/t685IhqUzsZ1I2A=; b=IRDuoFg2kKibSk8GXbQndvVKOkAgGlWv2/dsR8taD5XTUR8VO3sbT/nVPc9KMl9Tkd 8JP3i86G8YM9XSczcDYJOBlJGatvkcOFUQzpgJh/tBQmxlX1Pw0B+HSHXx8pwQ76/h7n Rq/c8NxCp5mngasGTfPkjqqu8vE1H4hSbffXZ+sj2fAwphmyuDievONhbJdmVTufhoWb 2lp09fdy4UFve4JAxe2+CvjnOD6pcCEVW5fW6ZKqGK/5V8zGsmy3P64B7SfOLbyGifix irqQYxJNihsWnGaIdV0coGkWg/rglz6bSQ7z6OOrMHwLTWXyOPtmbT0q67ycLv6P/Sf4 mFPw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=19VoSiUA; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=yiLAlM26; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alu.unizg.hr Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u4-20020a170906654400b0096fe1a56de3si560743ejn.1048.2023.08.04.11.00.56; Fri, 04 Aug 2023 11:01:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=19VoSiUA; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=yiLAlM26; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alu.unizg.hr Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231802AbjHDRHc (ORCPT + 99 others); Fri, 4 Aug 2023 13:07:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42160 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230526AbjHDRHa (ORCPT ); Fri, 4 Aug 2023 13:07:30 -0400 Received: from domac.alu.hr (domac.alu.unizg.hr [IPv6:2001:b68:2:2800::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CAC86469A; Fri, 4 Aug 2023 10:07:16 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by domac.alu.hr (Postfix) with ESMTP id 490EE60177; Fri, 4 Aug 2023 19:07:15 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alu.unizg.hr; s=mail; t=1691168835; bh=JumSvu3iT0+NxH9SPTG0Zvsq/MzGUE4lhaT/ijlPQ/I=; h=From:To:Cc:Subject:Date:From; b=19VoSiUA45WPIud1c8O95Oov0OPUiMu8xH4iS3u8WcjA7BPaJtdth1CYPsJweVpXA bWnyf/V4BwznJLuBJMPi2gNxtNQZu7i+jxu6uL/iqO3BECYLj+QSTewbcKe/MYODdu 3kqNMar0QDDymAD0bSRkvH7vcCyJsegX312HvQzpD0gMeSlPg4AkBO4M9t2UFfIcWd rejV0HI0PUpuw8wvLAQyIfAZaoSNX/kAa+JJAsg531xXTuk9y6Vbxiwun5zBUuX/+X 05CZfcQy4pk6o95Nso9jshNgUJbCGgV0jw30JB2hq/KAPcMg3WaslzGzJ9nL/zxDhP 47PoVoZN6nyeQ== X-Virus-Scanned: Debian amavisd-new at domac.alu.hr Received: from domac.alu.hr ([127.0.0.1]) by localhost (domac.alu.hr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JBuLlGB_YCx6; Fri, 4 Aug 2023 19:07:12 +0200 (CEST) Received: from defiant.. (unknown [94.250.191.183]) by domac.alu.hr (Postfix) with ESMTPSA id 603A960174; Fri, 4 Aug 2023 19:06:58 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alu.unizg.hr; s=mail; t=1691168832; bh=JumSvu3iT0+NxH9SPTG0Zvsq/MzGUE4lhaT/ijlPQ/I=; h=From:To:Cc:Subject:Date:From; b=yiLAlM26aqn9NxLeLdglwXGqAGPLXEyo7yuwWW0IG+hfrEq2M/4KoZvyOqhEB+Ss1 TOVau3/Tx5VCfCEdCmeDd9jzAvfLUZgVKGLDiBJTzuNmd2pPTisR12km5QdXg+rjI2 XCoJ0D4kt0Qzqmlw0FYNzE3QPbbTwF0NZd0x/woGIq6IZsr9I7wbryZ8zWy7n6tEaF BYzOjBfKT9rU4MFlAlIdN3+GSCa57CvNiekp0YHE8goOfhw7GfAaY1ERNCBCwTT8XE PHywhTWzD+k3hACKQ9yo1Jmr4uxwunaahZN+DWC6ZLACcJExNeev3ojJvayVgEu7qx rW4N30o2YVMzA== From: Mirsad Todorovac To: Greg Kroah-Hartman , Mirsad Todorovac , linux-kernel@vger.kernel.org Cc: "Luis R . Rodriguez" , Russ Weight , Takashi Iwai , Tianfei Zhang , Shuah Khan , Colin Ian King , Randy Dunlap , linux-kselftest@vger.kernel.org, stable@vger.kernel.org, Dan Carpenter Subject: [PATCH v4 5.4 1/2] test_firmware: prevent race conditions by a correct implementation of locking Date: Fri, 4 Aug 2023 19:05:28 +0200 Message-Id: <20230804170528.93028-1-mirsad.todorovac@alu.unizg.hr> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1773322481652459136 X-GMAIL-MSGID: 1773322481652459136 [ Upstream commit 4acfe3dfde685a5a9eaec5555351918e2d7266a1 ] Dan Carpenter spotted a race condition in a couple of situations like these in the test_firmware driver: static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg) { u8 val; int ret; ret = kstrtou8(buf, 10, &val); if (ret) return ret; mutex_lock(&test_fw_mutex); *(u8 *)cfg = val; mutex_unlock(&test_fw_mutex); /* Always return full write size even if we didn't consume all */ return size; } static ssize_t config_num_requests_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { int rc; mutex_lock(&test_fw_mutex); if (test_fw_config->reqs) { pr_err("Must call release_all_firmware prior to changing config\n"); rc = -EINVAL; mutex_unlock(&test_fw_mutex); goto out; } mutex_unlock(&test_fw_mutex); // NOTE: HERE is the race!!! Function can be preempted! // test_fw_config->reqs can change between the release of // the lock about and acquire of the lock in the // test_dev_config_update_u8() rc = test_dev_config_update_u8(buf, count, &test_fw_config->num_requests); out: return rc; } static ssize_t config_read_fw_idx_store(struct device *dev, struct device_attribute *attr, const char *buf, size_t count) { return test_dev_config_update_u8(buf, count, &test_fw_config->read_fw_idx); } The function test_dev_config_update_u8() is called from both the locked and the unlocked context, function config_num_requests_store() and config_read_fw_idx_store() which can both be called asynchronously as they are driver's methods, while test_dev_config_update_u8() and siblings change their argument pointed to by u8 *cfg or similar pointer. To avoid deadlock on test_fw_mutex, the lock is dropped before calling test_dev_config_update_u8() and re-acquired within test_dev_config_update_u8() itself, but alas this creates a race condition. Having two locks wouldn't assure a race-proof mutual exclusion. This situation is best avoided by the introduction of a new, unlocked function __test_dev_config_update_u8() which can be called from the locked context and reducing test_dev_config_update_u8() to: static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg) { int ret; mutex_lock(&test_fw_mutex); ret = __test_dev_config_update_u8(buf, size, cfg); mutex_unlock(&test_fw_mutex); return ret; } doing the locking and calling the unlocked primitive, which enables both locked and unlocked versions without duplication of code. Fixes: c92316bf8e948 ("test_firmware: add batched firmware tests") Cc: Luis R. Rodriguez Cc: Greg Kroah-Hartman Cc: Russ Weight Cc: Takashi Iwai Cc: Tianfei Zhang Cc: Shuah Khan Cc: Colin Ian King Cc: Randy Dunlap Cc: linux-kselftest@vger.kernel.org Cc: stable@vger.kernel.org # v5.4, 4.19, 4.14 Suggested-by: Dan Carpenter Link: https://lore.kernel.org/r/20230509084746.48259-1-mirsad.todorovac@alu.unizg.hr Signed-off-by: Mirsad Todorovac [ This is the patch to fix the racing condition in locking for the 5.4, ] [ 4.19 and 4.14 stable branches. Not all the fixes from the upstream ] [ commit apply, but those which do are verbatim equal to those in the ] [ upstream commit. ] --- v4: minor versioning clarifications for the patchwork. no changes to the commit. v3: fixed a minor typo. no change to commit. v2: tested on 5.4 stable build. lib/test_firmware.c | 37 ++++++++++++++++++++++++++++--------- 1 file changed, 28 insertions(+), 9 deletions(-) diff --git a/lib/test_firmware.c b/lib/test_firmware.c index 38553944e967..92d7195d5b5b 100644 --- a/lib/test_firmware.c +++ b/lib/test_firmware.c @@ -301,16 +301,26 @@ static ssize_t config_test_show_str(char *dst, return len; } -static int test_dev_config_update_bool(const char *buf, size_t size, - bool *cfg) +static inline int __test_dev_config_update_bool(const char *buf, size_t size, + bool *cfg) { int ret; - mutex_lock(&test_fw_mutex); if (strtobool(buf, cfg) < 0) ret = -EINVAL; else ret = size; + + return ret; +} + +static int test_dev_config_update_bool(const char *buf, size_t size, + bool *cfg) +{ + int ret; + + mutex_lock(&test_fw_mutex); + ret = __test_dev_config_update_bool(buf, size, cfg); mutex_unlock(&test_fw_mutex); return ret; @@ -340,7 +350,7 @@ static ssize_t test_dev_config_show_int(char *buf, int cfg) return snprintf(buf, PAGE_SIZE, "%d\n", val); } -static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg) +static inline int __test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg) { int ret; long new; @@ -352,14 +362,23 @@ static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg) if (new > U8_MAX) return -EINVAL; - mutex_lock(&test_fw_mutex); *(u8 *)cfg = new; - mutex_unlock(&test_fw_mutex); /* Always return full write size even if we didn't consume all */ return size; } +static int test_dev_config_update_u8(const char *buf, size_t size, u8 *cfg) +{ + int ret; + + mutex_lock(&test_fw_mutex); + ret = __test_dev_config_update_u8(buf, size, cfg); + mutex_unlock(&test_fw_mutex); + + return ret; +} + static ssize_t test_dev_config_show_u8(char *buf, u8 cfg) { u8 val; @@ -392,10 +411,10 @@ static ssize_t config_num_requests_store(struct device *dev, mutex_unlock(&test_fw_mutex); goto out; } - mutex_unlock(&test_fw_mutex); - rc = test_dev_config_update_u8(buf, count, - &test_fw_config->num_requests); + rc = __test_dev_config_update_u8(buf, count, + &test_fw_config->num_requests); + mutex_unlock(&test_fw_mutex); out: return rc; From patchwork Fri Aug 4 17:05:30 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mirsad Todorovac X-Patchwork-Id: 131276 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:6358:1a9a:b0:139:fa0d:b2d with SMTP id gm26csp96375rwb; Fri, 4 Aug 2023 10:38:25 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGegn9Kn91nAkjOb0vQz1S5igigZRaCz1veCdlvD5icUus+lIeL9wtCXmIx/0RxLqTMX5ZW X-Received: by 2002:a17:902:d4c8:b0:1bc:1e17:6d70 with SMTP id o8-20020a170902d4c800b001bc1e176d70mr426242plg.24.1691170704776; Fri, 04 Aug 2023 10:38:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691170704; cv=none; d=google.com; s=arc-20160816; b=Ziiupak+7Q6Xy7sKTyX7uuv/c3HDxiIqhVufKhIbHm+9Xshrl1/ZP5dsyv/3cijVDD Y04XNACseXSjkuYKj55NI/dKngp+peHnPk/Tu5HX1t2JYtIqQbIdMTjlKnIFi28CKyBj tlSK2SGIPWtPk3NVX/+d6rghSusgR93M9kqHYKOiM4wEQ5MbGScECLmCLPfKZ/SM7+Yo RnQoIpoOQvK4nL1xAQI7mMvhShP9XyVSegFR07soV0veNHC7mqxFG4r3nfuLvsn4G/MR YKGcLpQBch0hxVEXmYY4Ci723RI8FGojjE2gnJ0tLSl02FOfWU8QgQ7hQ3AVgmPqzfIa XEzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-signature; bh=b5/CPSydWXfRphPXumhaAbY0mYToQgfxBTepsXd4PHg=; fh=XjyNB95yoVpl1Pmuvsnk+85Q8XEKFCWq0nVxooeDBp4=; b=MFHUV/3XPeXm8Vq0Rf57c2uy+p4X7y+o+cH93SL7YDRXf1jUegUEUm8XZMESnobu9w NZu3kL271iwrYPyk24HA8FnVTOLRnYUqUSwZGNXBX3Xc0xvW5Cb0XgZxc6ZAkdmbbeJK sjZ7RZeYULk5GEUQJ861opeEEm6NyLEj8CtHnzmw/7+BHKb4D+RQH9jih+7squSzaQpU l70Fm9VO9sWiUHbEEfqA+7alYL/aipRAJSqGfa+N9T4R4xidnHMjPf2aEb4HCdJJ1Q0F G9X1nuaSDgVM/H8Jtw6q1CTDKUc9X3JXtEY7HziMk4CE23FjSpO9qNhFM3t5EAMJr33i PNRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=LVZwOKjj; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=Kaxj7Pwc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alu.unizg.hr Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i2-20020a170902c94200b001bbfbe6bf3esi2083473pla.504.2023.08.04.10.38.10; Fri, 04 Aug 2023 10:38:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=LVZwOKjj; dkim=fail header.i=@alu.unizg.hr header.s=mail header.b=Kaxj7Pwc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alu.unizg.hr Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231831AbjHDRJq (ORCPT + 99 others); Fri, 4 Aug 2023 13:09:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44264 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232216AbjHDRJc (ORCPT ); Fri, 4 Aug 2023 13:09:32 -0400 Received: from domac.alu.hr (domac.alu.unizg.hr [161.53.235.3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6391849E8; Fri, 4 Aug 2023 10:09:19 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by domac.alu.hr (Postfix) with ESMTP id 0530960177; Fri, 4 Aug 2023 19:09:18 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alu.unizg.hr; s=mail; t=1691168958; bh=3JiXZASr/FsY0LPdywqZZQAkPJKMfvzD/I/olgkRIwA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LVZwOKjjFNnT4xWAwUCJ7hU5A5B0T7bB6cBVvH0FSnGwQSUV58D77YAESfiN3rxIE h6iVpSF9lrQkeoZ9p9W5TxfCgy1k/hXQjOAgU/Wk5ieOflzM97dQYg5svDovq76myq TZDeHRqGnwRQI7BZvIf8PDRERCZSrAibOdpp9QZ/sysMQoImeg/YUd5pu4+2Ns9Bou d7020hdNbmE4Zgatoh1A+LF839Lq3LNzq3JcYFtDCc5e3VIHx4FcqkhQuL7CZMCe9y DbDt1MkjEbD+657ctEcwVrxwOgAeUdbr/OtztcEjK3CwkFyQvka55hjU95BdxaHCn4 yJ4jJZk2+AL2Q== X-Virus-Scanned: Debian amavisd-new at domac.alu.hr Received: from domac.alu.hr ([127.0.0.1]) by localhost (domac.alu.hr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j3SnGruj2ZK9; Fri, 4 Aug 2023 19:09:15 +0200 (CEST) Received: from defiant.. (unknown [94.250.191.183]) by domac.alu.hr (Postfix) with ESMTPSA id 6355B60174; Fri, 4 Aug 2023 19:09:15 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=alu.unizg.hr; s=mail; t=1691168955; bh=3JiXZASr/FsY0LPdywqZZQAkPJKMfvzD/I/olgkRIwA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Kaxj7PwcMD8VP8mhF0K0DEIxxVh/UxxX6NbNuqymSei6rn+LmMyeiJNykNGuzRjI7 iPYrlVkJGBNZ545hpacB1AI0Sj+mAMnHBob23LYpTvzqXTZHDEzOdqDdDuOTS3s3CR VYmAsIC0FO3h6e1gxTFb4R4AXyDUxJgUZ8CJeJteKIN84N75lXwnrvX7Qpx4EGBlgK 8Dw6TJxLqfPj6BSWqQ1lql12DhJ0lLRVqGqAP9LMmv/THTVkgtDs2vvMqjhosXYuAM FbW/c554oLb72ceXCvuBQFozp8Aj0cKS5bwt0XFBeWLaWycrYgm/rqEinfenPw/OaY o/uhBkNK+tVxw== From: Mirsad Todorovac To: Greg Kroah-Hartman , Mirsad Todorovac , linux-kernel@vger.kernel.org Cc: Dan Carpenter , Takashi Iwai , Kees Cook , "Luis R . Rodriguez" , Brian Norris , stable@vger.kernel.org Subject: [PATCH v4 5.4 2/2] test_firmware: return -ENOMEM instead of -ENOSPC on failed memory allocation Date: Fri, 4 Aug 2023 19:05:30 +0200 Message-Id: <20230804170528.93028-2-mirsad.todorovac@alu.unizg.hr> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230804170528.93028-1-mirsad.todorovac@alu.unizg.hr> References: <20230804170528.93028-1-mirsad.todorovac@alu.unizg.hr> MIME-Version: 1.0 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1773321012924522898 X-GMAIL-MSGID: 1773321012924522898 [ Upstream commit 7dae593cd226a0bca61201cf85ceb9335cf63682 ] In a couple of situations like name = kstrndup(buf, count, GFP_KERNEL); if (!name) return -ENOSPC; the error is not actually "No space left on device", but "Out of memory". It is semantically correct to return -ENOMEM in all failed kstrndup() and kzalloc() cases in this driver, as it is not a problem with disk space, but with kernel memory allocator failing allocation. The semantically correct should be: name = kstrndup(buf, count, GFP_KERNEL); if (!name) return -ENOMEM; Cc: Dan Carpenter Cc: Takashi Iwai Cc: Kees Cook Cc: Luis R. Rodriguez Cc: Brian Norris Cc: stable@vger.kernel.org # 5.4 Fixes: c92316bf8e948 ("test_firmware: add batched firmware tests") Fixes: 0a8adf584759c ("test: add firmware_class loader test") Fixes: eb910947c82f9 ("test: firmware_class: add asynchronous request trigger") Fixes: 061132d2b9c95 ("test_firmware: add test custom fallback trigger") Fixes: 7feebfa487b92 ("test_firmware: add support for request_firmware_into_buf") Link: https://lore.kernel.org/all/20230606070808.9300-1-mirsad.todorovac@alu.unizg.hr/ Signed-off-by: Mirsad Todorovac [ This is the backport of the patch to specific to the 5.4 branch. There are no ] [ semantic differences in the commit when compared to upstream, only fewer instances ] [ of error code replacement. Backport is provided for completeness sake ] [ so it would apply to all of the supported LTS kernels. ] --- v4: minor clarification in versioning for the patchwork. no change to the commit. v3: fixed a minor typo. no change to commit. v2: tested on 5.4 stable build. lib/test_firmware.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/lib/test_firmware.c b/lib/test_firmware.c index 92d7195d5b5b..dd3850ec1dfa 100644 --- a/lib/test_firmware.c +++ b/lib/test_firmware.c @@ -173,7 +173,7 @@ static int __kstrncpy(char **dst, const char *name, size_t count, gfp_t gfp) { *dst = kstrndup(name, count, gfp); if (!*dst) - return -ENOSPC; + return -ENOMEM; return count; } @@ -509,7 +509,7 @@ static ssize_t trigger_request_store(struct device *dev, name = kstrndup(buf, count, GFP_KERNEL); if (!name) - return -ENOSPC; + return -ENOMEM; pr_info("loading '%s'\n", name); @@ -552,7 +552,7 @@ static ssize_t trigger_async_request_store(struct device *dev, name = kstrndup(buf, count, GFP_KERNEL); if (!name) - return -ENOSPC; + return -ENOMEM; pr_info("loading '%s'\n", name); @@ -597,7 +597,7 @@ static ssize_t trigger_custom_fallback_store(struct device *dev, name = kstrndup(buf, count, GFP_KERNEL); if (!name) - return -ENOSPC; + return -ENOMEM; pr_info("loading '%s' using custom fallback mechanism\n", name); @@ -648,7 +648,7 @@ static int test_fw_run_batch_request(void *data) test_buf = kzalloc(TEST_FIRMWARE_BUF_SIZE, GFP_KERNEL); if (!test_buf) - return -ENOSPC; + return -ENOMEM; req->rc = request_firmware_into_buf(&req->fw, req->name,