Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp7532363ybc; Thu, 28 Nov 2019 19:30:44 -0800 (PST) X-Google-Smtp-Source: APXvYqx/vC3oZ0h3Rwhy64DF2v6trQ1a0INbnd/c3ZA1mRDv2FgEfqvmnBNHaFyFSc1VyBzLmE1l X-Received: by 2002:aa7:c444:: with SMTP id n4mr41911869edr.3.1574998244743; Thu, 28 Nov 2019 19:30:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574998244; cv=none; d=google.com; s=arc-20160816; b=Je0fV2FTJWQXoKT+9V6GUmi3zbrqYK90KV1xqOCAcqsf+vdNOpv6nIWtTUnsMiLgY9 XgUlq34O3ZLDX4Do6fqBKSHA/PWfaIsYKnPSybOfgZNjTq3FEpjFZEf+vypp885YS7h6 vSeF9nBvm3O2ZaPuQH/EceMmTGFzO/7N1sXabU7O+Cjln8B6pWhPQI1YVGe6ApQZPi5X RQrSOaYFZ+SKTibLIuytJs3o/TEiVTWucR1Luc5IPPSTILTLOnVaakpIS3L1bs/Pbu1S 6PUFMzotWYihyim3sBD2Djelm/sY/6T7npL7eNe4XtEkyo+uA2cVL9DZYldOQNYBSfT3 sQSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=FyTgiZqv6BZOJAhbukDo4QNCT7cKHG2IUY8wzwLKnJY=; b=WNNJziyHY3H8Ly7rj+mANjzzw8OmBjg0E2LqN6I7/A8dmTnorfW51tZMJU32Gvrezk BzZHWKge8fJEtj3DyN+zGhYaadRi2KTkRJKT53t4ZV6nZccNylLo04JyXjKOYNiG1/G9 vDfE5yWuQFvn3wk05K0ciI5b03Ds+3YBiIq+OQkD6HUVtdNRj9zEuProdNdtYV/WG12g n9Y4KP28oebWfMaQDtbnPjLii1JK8IX5AAR0HRsLZ+IxoZ9jG5Fhr/2LeOKpeOP+m8+L QXNn+jN+kNFqCf1E8SjDvVfofORBEqS9xTvpHGaJHDqJJyk5zJgdbNo0BkjlUnqvHSgk PKiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ozlabs.org header.s=201707 header.b=tSy86Pbc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ozlabs.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11si6154708ejb.219.2019.11.28.19.30.20; Thu, 28 Nov 2019 19:30:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ozlabs.org header.s=201707 header.b=tSy86Pbc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ozlabs.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726980AbfK2DZR (ORCPT + 99 others); Thu, 28 Nov 2019 22:25:17 -0500 Received: from ozlabs.org ([203.11.71.1]:41571 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726926AbfK2DZR (ORCPT ); Thu, 28 Nov 2019 22:25:17 -0500 Received: by ozlabs.org (Postfix, from userid 1023) id 47PKdQ1fhNz9sR7; Fri, 29 Nov 2019 14:25:13 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ozlabs.org; s=201707; t=1574997914; bh=blTqbfE3FxGoWLMQlFpaeUlzOWBLlqs1Oq3G4TVbtd0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tSy86PbcQQzQzfQOWn2CM+iRgGqTHakwsSKZY1Bw2oTgLLE3ga7ogZs2I5UoD70x+ 1DwJH09EKGSYT2dwClPysTJJkRFbJalUYnY8P59FQet3mG5SnVo9Kcv88tgqhqdSPo OO4wxDaYtiWwm6xMqcTkqqBjeJQeSSm/2tD1/T7XIIJI9mu3T5Ra4y2Gb6lm10SOmV vpcPyI6HK07XwAKxlltc3T1EnAQb1Nxwkt02css7WZRlxze6/qYFnHuPygGK0s5lol n2MxTB+9G7+1qgoLjklw4JW3krc+PzEj6lV+lM8vV6xngzY6CgE2ZfRztVrWMynQLi R9nji/g1PA4aA== From: Jeremy Kerr To: Joel Stanley , Alistar Popple , Eddie James , Benjamin Herrenschmidt , Colin King , linux-fsi@lists.ozlabs.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] [PATCH v2] fsi: fix bogus error returns from cfam_read and cfam_write Date: Fri, 29 Nov 2019 11:24:29 +0800 Message-Id: <20191129032429.817-1-jk@ozlabs.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20191122233120.110344-1-colin.king@canonical.com> References: <20191122233120.110344-1-colin.king@canonical.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Based on a static analysis report and original patch from Colin Ian King . Currently, we may drop error values from cfam_read and cfam_write. This change returns the actual error on failure, but a partial read/write will take precedence. Addresses-Coverity: ("Unused value") Fixes: d1dcd6782576 ("fsi: Add cfam char devices") Reported-by: Colin Ian King Signed-off-by: Jeremy Kerr --- Colin: thanks for the report and patch. I think this is a more complete fix, as we want to preseve any partial read/write status if a failure happens mid-way through an operation. Let me know if you (or the coverity analysis) have any feedback. --- drivers/fsi/fsi-core.c | 32 ++++++++++++++++++++++---------- 1 file changed, 22 insertions(+), 10 deletions(-) diff --git a/drivers/fsi/fsi-core.c b/drivers/fsi/fsi-core.c index 71c6f9fef648..3158a78c2e94 100644 --- a/drivers/fsi/fsi-core.c +++ b/drivers/fsi/fsi-core.c @@ -699,6 +699,8 @@ static ssize_t cfam_read(struct file *filep, char __user *buf, size_t count, if (off > 0xffffffff || count > 0xffffffff || off + count > 0xffffffff) return -EINVAL; + rc = 0; + for (total_len = 0; total_len < count; total_len += read_len) { __be32 data; @@ -707,18 +709,22 @@ static ssize_t cfam_read(struct file *filep, char __user *buf, size_t count, rc = fsi_slave_read(slave, off, &data, read_len); if (rc) - goto fail; + break; rc = copy_to_user(buf + total_len, &data, read_len); if (rc) { rc = -EFAULT; - goto fail; + break; } off += read_len; } - rc = count; - fail: + + /* if we've read any data, we want that to be returned in + * preference to an error state */ + if (total_len) + rc = total_len; + *offset = off; - return count; + return rc; } static ssize_t cfam_write(struct file *filep, const char __user *buf, @@ -736,6 +742,8 @@ static ssize_t cfam_write(struct file *filep, const char __user *buf, if (off > 0xffffffff || count > 0xffffffff || off + count > 0xffffffff) return -EINVAL; + rc = 0; + for (total_len = 0; total_len < count; total_len += write_len) { __be32 data; @@ -745,17 +753,21 @@ static ssize_t cfam_write(struct file *filep, const char __user *buf, rc = copy_from_user(&data, buf + total_len, write_len); if (rc) { rc = -EFAULT; - goto fail; + break; } rc = fsi_slave_write(slave, off, &data, write_len); if (rc) - goto fail; + break; off += write_len; } - rc = count; - fail: + + /* if we've written any data, we want to indicate that partial write + * instead of any mid-stream error */ + if (total_len) + rc = total_len; + *offset = off; - return count; + return rc; } static loff_t cfam_llseek(struct file *file, loff_t offset, int whence) -- 2.20.1