Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp699822imu; Mon, 5 Nov 2018 07:30:32 -0800 (PST) X-Google-Smtp-Source: AJdET5ci3yVE0JmWkGhy6K3Xb24A+nCldCAFnm9BQlqr9odeE+7pd/dK491/p4+b5Q4vvdFw7P+b X-Received: by 2002:a17:902:2:: with SMTP id 2-v6mr23031324pla.178.1541431832054; Mon, 05 Nov 2018 07:30:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541431832; cv=none; d=google.com; s=arc-20160816; b=om3+jC1oQzRzwE5viE0XAOXEqW3OFvm1YJ5oS1DXz1Ox7/csrIg66EUU8JNzvDsZAD VFpHcqxSL0kx44yBHxSaCbY0a1hMJlKv6J8Ldpzb7dUJ2mw93nyzCP9jt5nUofz6sgI2 nmJWiswgwfBmLBMstX5yqTksSGLRC3X0TcwxUxl7s6Yk1Jbx40PXFLCOCYlZ9WwW3AgQ h5ijrqcFa3D5NXGhyHvzK77Au+4Leku/b/JR9/71CZT+YOnLDni55W+zSaFqhoZNiYdu YBNJ78WtMvocSHrl3BIKQ5Ti7+N51Ml/MjAU7miUC6CMOfEsBKWZOYyKW3y8oSljpC/p 0lww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=9a1Olt+9gSUcbGlkI6FmhtduS6tNkDQuhvu9c7HHqj8=; b=mQSY5H7VpGUENmrKW8Zng0r6PHgD7syuKpF1j+IeiIUd0O5ZnIWdDCFHwR+mzUU5fu wVtJ8TgWjXtCGR2Z9Nj1UO52ehrbWdLNd6w7e94BokJSQevoTKGedYP1Q5aK2cPziKXb 3PYpdUJphADoBblSY+TiipGCkUeBtPiUzT8Dfd6c0akSywMHqp30WT7VfdeXIIRBHNNZ mlficxzaaQ2EEGXUXTThRYhMHUQ3s38HbUUEBrWzumWYRC06rnJQ+oyCvBNPYTITxjOg /Zz/y9hGgbJO2PVF2urYDfcdHaWl33kYsWEsruTpSiIrA9X33ZsIMbHgb3wGcaCxK0yt mH5A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=O3xyPFDc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z21si5428798pgv.363.2018.11.05.07.30.15; Mon, 05 Nov 2018 07:30:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=O3xyPFDc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387508AbeKFArX (ORCPT + 99 others); Mon, 5 Nov 2018 19:47:23 -0500 Received: from mail-pf1-f193.google.com ([209.85.210.193]:45691 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387436AbeKFArW (ORCPT ); Mon, 5 Nov 2018 19:47:22 -0500 Received: by mail-pf1-f193.google.com with SMTP id p17-v6so4210455pfj.12; Mon, 05 Nov 2018 07:27:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=9a1Olt+9gSUcbGlkI6FmhtduS6tNkDQuhvu9c7HHqj8=; b=O3xyPFDcNS2dnS+8JnF108IoMYgXaZ/rnA3tKIJseMtXIt0x990YQOTHGWMd4b9ZMV R2+rzKxGvXBh19xumPpYNV1dY1zbsEq3wXgUV6EpaZUcLyI8SWX/GZdWfs+mTeU3MLa/ BgbMUhxyyaXDkFi6s1sqFVt+m3HNx6uFa0eGQFGLwZLpiqxHmtxk4p8AC0UCuYVbyRHe j/wb/6bk9aG23NWxJydv1Tlncp3VdBi7oHiW4w8zdNFYgW1hBiPQmpNomzcVjL/UDi5O gBjXm+3cKAY2yMrSeDLY0O0iDrBFdQhWbR+ZamAgksAZiD+kB9BBbzpcWtZMp3DBBpKP LT8g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=9a1Olt+9gSUcbGlkI6FmhtduS6tNkDQuhvu9c7HHqj8=; b=r/oodORxwWREoRtiQ1ra0N14tYTXSSqY94mHZiWpAAptx3C2wug2z1zFgLBAIafUtY FCspGSHyN1HiNAwczUXrCW+djVbzntQTTk1U7dEOVeelPtmvEhst6ItqG8vXAxAqeS19 aU3CW59pGAq46fZj3ATihf7d6b9K6rF3PKclmFrPL5JbGPITWDFsd+D3+XBBZs1xVzu7 DquWLBpQK4fhP16sRPKOxZ+gwegy7INsHhsJcYYQOH1StT9xlOA1X85eU7XvkWKw/Bw4 hBu6PIFmSnkk22mkOkufnuFQQEQrzMyKFSYPfWgrmNddUX2lq57TQbalyJwSxH8v9kV1 LFGA== X-Gm-Message-State: AGRZ1gKVC+mdp5XAlkyDZTMXNjwCP9lZKJkE12vi1fgl/DAngnFirqGB 5+nL+zN1Orj2YGz7S4crX1c= X-Received: by 2002:a63:9809:: with SMTP id q9mr20600008pgd.109.1541431628530; Mon, 05 Nov 2018 07:27:08 -0800 (PST) Received: from localhost.localdomain (c-24-6-192-50.hsd1.ca.comcast.net. [24.6.192.50]) by smtp.gmail.com with ESMTPSA id u76-v6sm37260578pfa.176.2018.11.05.07.27.07 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 05 Nov 2018 07:27:08 -0800 (PST) From: frowand.list@gmail.com To: Rob Herring , Pantelis Antoniou , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Alan Tull , Moritz Fischer Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, devicetree@vger.kernel.org, linux-fpga@vger.kernel.org Subject: [PATCH v6 12/18] of: overlay: check prevents multiple fragments add or delete same node Date: Mon, 5 Nov 2018 07:25:09 -0800 Message-Id: <1541431515-25197-13-git-send-email-frowand.list@gmail.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1541431515-25197-1-git-send-email-frowand.list@gmail.com> References: <1541431515-25197-1-git-send-email-frowand.list@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand Multiple overlay fragments adding or deleting the same node is not supported. Replace code comment of such, with check to detect the attempt and fail the overlay apply. Devicetree unittest where multiple fragments added the same node was added in the previous patch in the series. After applying this patch the unittest messages will no longer include: Duplicate name in motor-1, renamed to "controller#1" OF: overlay: of_overlay_apply() err=0 ### dt-test ### of_overlay_fdt_apply() expected -22, ret=0, overlay_bad_add_dup_node ### dt-test ### FAIL of_unittest_overlay_high_level():2419 Adding overlay 'overlay_bad_add_dup_node' failed ... ### dt-test ### end of unittest - 210 passed, 1 failed but will instead include: OF: overlay: ERROR: multiple overlay fragments add and/or delete node /testcase-data-2/substation@100/motor-1/controller ... ### dt-test ### end of unittest - 211 passed, 0 failed Tested-by: Alan Tull Signed-off-by: Frank Rowand --- checkpatch errors "line over 80 characters" and "Too many leading tabs" are ok, they will be fixed later in this series drivers/of/overlay.c | 58 ++++++++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 49 insertions(+), 9 deletions(-) diff --git a/drivers/of/overlay.c b/drivers/of/overlay.c index c8f88b0836a3..8af8115bd36e 100644 --- a/drivers/of/overlay.c +++ b/drivers/of/overlay.c @@ -392,14 +392,6 @@ static int add_changeset_property(struct overlay_changeset *ovcs, * a live devicetree created from Open Firmware. * * NOTE_2: Multiple mods of created nodes not supported. - * If more than one fragment contains a node that does not already exist - * in the live tree, then for each fragment of_changeset_attach_node() - * will add a changeset entry to add the node. When the changeset is - * applied, __of_attach_node() will attach the node twice (once for - * each fragment). At this point the device tree will be corrupted. - * - * TODO: add integrity check to ensure that multiple fragments do not - * create the same node. * * Returns 0 on success, -ENOMEM if memory allocation failure, or -EINVAL if * invalid @overlay. @@ -517,6 +509,54 @@ static int build_changeset_symbols_node(struct overlay_changeset *ovcs, } /** + * check_changeset_dup_add_node() - changeset validation: duplicate add node + * @ovcs: Overlay changeset + * + * Check changeset @ovcs->cset for multiple add node entries for the same + * node. + * + * Returns 0 on success, -ENOMEM if memory allocation failure, or -EINVAL if + * invalid overlay in @ovcs->fragments[]. + */ +static int check_changeset_dup_add_node(struct overlay_changeset *ovcs) +{ + struct of_changeset_entry *ce_1, *ce_2; + char *fn_1, *fn_2; + int name_match; + + list_for_each_entry(ce_1, &ovcs->cset.entries, node) { + + if (ce_1->action == OF_RECONFIG_ATTACH_NODE || + ce_1->action == OF_RECONFIG_DETACH_NODE) { + + ce_2 = ce_1; + list_for_each_entry_continue(ce_2, &ovcs->cset.entries, node) { + if (ce_2->action == OF_RECONFIG_ATTACH_NODE || + ce_2->action == OF_RECONFIG_DETACH_NODE) { + /* inexpensive name compare */ + if (!of_node_cmp(ce_1->np->full_name, + ce_2->np->full_name)) { + /* expensive full path name compare */ + fn_1 = kasprintf(GFP_KERNEL, "%pOF", ce_1->np); + fn_2 = kasprintf(GFP_KERNEL, "%pOF", ce_2->np); + name_match = !strcmp(fn_1, fn_2); + kfree(fn_1); + kfree(fn_2); + if (name_match) { + pr_err("ERROR: multiple overlay fragments add and/or delete node %pOF\n", + ce_1->np); + return -EINVAL; + } + } + } + } + } + } + + return 0; +} + +/** * build_changeset() - populate overlay changeset in @ovcs from @ovcs->fragments * @ovcs: Overlay changeset * @@ -571,7 +611,7 @@ static int build_changeset(struct overlay_changeset *ovcs) } } - return 0; + return check_changeset_dup_add_node(ovcs); } /* -- Frank Rowand