Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2936485ybk; Mon, 18 May 2020 11:31:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxH0p47AoDOa24nDBknjeUavT4sVTtwcmSZzDysbMvQA809tMg7DeEhq2feJ7iQAhDJtjjP X-Received: by 2002:a17:906:5615:: with SMTP id f21mr15862256ejq.372.1589826697663; Mon, 18 May 2020 11:31:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589826697; cv=none; d=google.com; s=arc-20160816; b=Fx7ORwvoCNtnyuC84nAbA+cwoOtk3pwPHQ5mQNgLBOfj16L3OJwYo4jZbWvELe3kv3 NEsejTtODfAVbdacceFjqDU04TYCylh0kDmn7AW/YMCxykxut7OeiG4KrGWkosDfiRvx cTEcq2Hl/EhKhsbhngNlpPwm4Ol6N6MnvvRh67/3Gb9Vs8wMlQ1VvXAk3dua5b7DfX/d zQSBH7nTSgqV5Xf/ndl3nikRMOs9im/l1tgHhY2izt21oKJ5wE4/MUle8LfA1NucBmo4 GRZvD0XYu7PVpxdAxUy2cBFMVqGQYqHv9gXIDO3tLToN+XShABt0oqDtL6Yl9PjJAm1b n13A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tDId6v8vEm6rPUmFDK8EqGz98mZU4VSFntUGF2BqMS4=; b=AVKU1mSSk8Mh1BMOi0wCd9O0wqEgSaLSuuAtnQlpmuJilnS6qkEryV2/eN/bHmqg4s a1C/Pp3CVH2x2Lz18BRc7sBYC5dM9ErjSpYkLMQUMHLiAlMFKTpZvDSmXPdybeaxSKy+ R/WvGwt9m21U5L35bfpYllsIbMr45ADkP7jRle3BjOV9L54QSy1xKjdvbXk6NgnIztiK K5jlrWEMc4qPIscNpAfFB9Ye/Kn9eOeS+ZHDNDZuu5ZoYFb33nminFvuBbSSId2e7Xfn nL3NsczykZI9FsZpMEJMGe9caoJLDUkTRLTfq4cFKZNXFCmT9HNOAoB2UmUquOy046jS vW5Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=09C5N90M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bo18si6354565edb.450.2020.05.18.11.31.14; Mon, 18 May 2020 11:31:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=09C5N90M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387852AbgERS26 (ORCPT + 99 others); Mon, 18 May 2020 14:28:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:39382 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728841AbgERRmY (ORCPT ); Mon, 18 May 2020 13:42:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6FD292083E; Mon, 18 May 2020 17:42:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589823743; bh=TMnk9m68iVlJ4LzBplDanu5lel2viDBbZ466dVlUj3U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=09C5N90MAzevv7L/QRZCwXvWGZLP+qzfWbABcuI/PutWPf3VyHV8RiQdQrfjLsCNv 2aR3MIoqXNw39RMMwTGwlE2gZjRfrc4sEyvGZZBe8dhHO1ZrvcnJnsqhBG9J9bDNqj 56nFP/8hvDeG6JgKvtj/4c8NGat9i1alWc1ZcD+0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, George Spelvin , Sven Eckelmann , Simon Wunderlich Subject: [PATCH 4.9 19/90] batman-adv: fix batadv_nc_random_weight_tq Date: Mon, 18 May 2020 19:35:57 +0200 Message-Id: <20200518173455.116745688@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200518173450.930655662@linuxfoundation.org> References: <20200518173450.930655662@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: George Spelvin commit fd0c42c4dea54335967c5a86f15fc064235a2797 upstream. and change to pseudorandom numbers, as this is a traffic dithering operation that doesn't need crypto-grade. The previous code operated in 4 steps: 1. Generate a random byte 0 <= rand_tq <= 255 2. Multiply it by BATADV_TQ_MAX_VALUE - tq 3. Divide by 255 (= BATADV_TQ_MAX_VALUE) 4. Return BATADV_TQ_MAX_VALUE - rand_tq This would apperar to scale (BATADV_TQ_MAX_VALUE - tq) by a random value between 0/255 and 255/255. But! The intermediate value between steps 3 and 4 is stored in a u8 variable. So it's truncated, and most of the time, is less than 255, after which the division produces 0. Specifically, if tq is odd, the product is always even, and can never be 255. If tq is even, there's exactly one random byte value that will produce a product byte of 255. Thus, the return value is 255 (511/512 of the time) or 254 (1/512 of the time). If we assume that the truncation is a bug, and the code is meant to scale the input, a simpler way of looking at it is that it's returning a random value between tq and BATADV_TQ_MAX_VALUE, inclusive. Well, we have an optimized function for doing just that. Fixes: 3c12de9a5c75 ("batman-adv: network coding - code and transmit packets if possible") Signed-off-by: George Spelvin Signed-off-by: Sven Eckelmann Signed-off-by: Simon Wunderlich Signed-off-by: Greg Kroah-Hartman --- net/batman-adv/network-coding.c | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) --- a/net/batman-adv/network-coding.c +++ b/net/batman-adv/network-coding.c @@ -1012,15 +1012,8 @@ static struct batadv_nc_path *batadv_nc_ */ static u8 batadv_nc_random_weight_tq(u8 tq) { - u8 rand_val, rand_tq; - - get_random_bytes(&rand_val, sizeof(rand_val)); - /* randomize the estimated packet loss (max TQ - estimated TQ) */ - rand_tq = rand_val * (BATADV_TQ_MAX_VALUE - tq); - - /* normalize the randomized packet loss */ - rand_tq /= BATADV_TQ_MAX_VALUE; + u8 rand_tq = prandom_u32_max(BATADV_TQ_MAX_VALUE + 1 - tq); /* convert to (randomized) estimated tq again */ return BATADV_TQ_MAX_VALUE - rand_tq;