Received: by 2002:a05:7412:3784:b0:e2:908c:2ebd with SMTP id jk4csp1824004rdb; Tue, 3 Oct 2023 01:57:37 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFBIsLzvOl1Nl/LPax1p2WllSSutyiUETercYa49cEpvEv1hv49hgK4WlnLZS8RNb/sREH4 X-Received: by 2002:a05:6a20:6a04:b0:135:bf8d:b758 with SMTP id p4-20020a056a206a0400b00135bf8db758mr3685470pzk.16.1696323457133; Tue, 03 Oct 2023 01:57:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696323457; cv=none; d=google.com; s=arc-20160816; b=cDeVFMXAoNT2X3OfzkjsFI+ueZ64B3VJLHNxbiMDwgbKTqHIGlC9ShcfqUi1zT//Er CjgqE06UYzEyPMXJR3+M8C0FCwzeU8mNcu2Jlg7vLMTZK7rohJC40EpMaQDIiinOQJOr c3bEaYnqodqC2fslwbae1MQQPbP/nfjyjeMI186hQnGk0VMo8Ga6XExP+jiOhfcXqFvO S34sIAN4PLKCMKAVUCJriKdRzQWtemPac9GWYYraTQbqXOdKXZCBahznR89btaUmmIuL OomQJH0vwtgH4R2k8CcmKh+1pwAy3MzZ4ZMC1mBUyNcx40bB5kvKhHSif5+4lKgB+F+z ywEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=QaHAw0oOg3N4EaBCbSIugnNCx1RIAAViIQYceCqX5qo=; fh=5gunku78chIBVOM0WTUZGdWpZ3eCOrXiihA2qs49s9M=; b=rSDuwVf5Y2p5SCJvSinREk1kfsPDHBigjeo2Hc7dYUlC9nGZ27SP114ytG8fpF2E6G fsNDSzkeb5eJ/ew1kTDX8n+u4GRzMJx7OESMOKCfT0ppi8lVtWR4JNo6yFglBBLKOpGU mSKcq4XHvJaQCrfPYaIsdHbwiYK/PJQX8xP3tuORXylP0tNVIUGwiIipgq4csIXL37uQ uDGs+MMF9JF5hsn0XjFEHdN3LVu/o9y7RQq3i/cDb0gOztsjOubC0KHLHKmLs7thAtgA moTiBMZaZXMoe6goqOnSuqssDBl4wUUou9LTcuUyl0LqD6dbONeZW0dufQPr04Smd5WU fsYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=bvU+uBKi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id b191-20020a6334c8000000b00578b9064636si964767pga.242.2023.10.03.01.57.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Oct 2023 01:57:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=bvU+uBKi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 7DFDC803078C; Tue, 3 Oct 2023 01:57:34 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239521AbjJCI5Z (ORCPT + 99 others); Tue, 3 Oct 2023 04:57:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239293AbjJCI5B (ORCPT ); Tue, 3 Oct 2023 04:57:01 -0400 Received: from relay4-d.mail.gandi.net (relay4-d.mail.gandi.net [IPv6:2001:4b98:dc4:8::224]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F28B1AB; Tue, 3 Oct 2023 01:56:56 -0700 (PDT) Received: by mail.gandi.net (Postfix) with ESMTPSA id 913DDE0013; Tue, 3 Oct 2023 08:56:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bootlin.com; s=gm1; t=1696323415; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=QaHAw0oOg3N4EaBCbSIugnNCx1RIAAViIQYceCqX5qo=; b=bvU+uBKiddQYey6J9aL8CgiYG7+l5qeB9oA4jiLCBlnTZxElTiEW8jjH7GYRh7CswgJ0tc q56Yqse/oOuKuUXkLSSdPMD+ajvWn9/SAVuh5oUSt7vpkQZg3nUsidNhZbANNXmygE/cV3 dWic6PwwVhk5+h06AEQ7AtvHJplmRCDT0T15KpZ0yjMBTfYwH5EE8XG5Ugtdr82YVLrYhc FUqpBWInTu1zHIDgx9BpwZmJj7oeHgdXRbnzeeDcZaFf8u+tGrRDo/w8X9qWIkLXtppV/h z/FkQRXYXy9kdNHvCyQjgK8vMGMkUc2uStg/LMxUhqnw2KTwWKcd70dpJ6LiDA== From: =?UTF-8?q?K=C3=B6ry=20Maincent?= To: Michal Kubecek , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Maxime Chevallier , Kory Maincent , stable@vger.kernel.org, thomas.petazzoni@bootlin.com, Eric Dumazet , Jakub Kicinski , Paolo Abeni Subject: [PATCH net 1/1] ethtool: Fix mod state of verbose no_mask bitset Date: Tue, 3 Oct 2023 10:56:52 +0200 Message-Id: <20231003085653.3104411-1-kory.maincent@bootlin.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-GND-Sasl: kory.maincent@bootlin.com X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Tue, 03 Oct 2023 01:57:34 -0700 (PDT) From: Kory Maincent A bitset without mask in a _SET request means we want exactly the bits in the bitset to be set. This works correctly for compact format but when verbose format is parsed, ethnl_update_bitset32_verbose() only sets the bits present in the request bitset but does not clear the rest. The commit 6699170376ab fixes this issue by clearing the whole target bitmap before we start iterating. The solution proposed brought an issue with the behavior of the mod variable. As the bitset is always cleared the old val will always differ to the new val. Fix it by adding a new temporary variable which save the state of the old bitmap. Fixes: 6699170376ab ("ethtool: fix application of verbose no_mask bitset") Signed-off-by: Kory Maincent Cc: stable@vger.kernel.org --- net/ethtool/bitset.c | 25 +++++++++++++++++++------ 1 file changed, 19 insertions(+), 6 deletions(-) diff --git a/net/ethtool/bitset.c b/net/ethtool/bitset.c index 0515d6604b3b..95f11b0a38b4 100644 --- a/net/ethtool/bitset.c +++ b/net/ethtool/bitset.c @@ -432,7 +432,9 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, struct netlink_ext_ack *extack, bool *mod) { struct nlattr *bit_attr; + u32 *tmp = NULL; bool no_mask; + bool dummy; int rem; int ret; @@ -448,8 +450,11 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, } no_mask = tb[ETHTOOL_A_BITSET_NOMASK]; - if (no_mask) - ethnl_bitmap32_clear(bitmap, 0, nbits, mod); + if (no_mask) { + tmp = kcalloc(nbits, sizeof(u32), GFP_KERNEL); + memcpy(tmp, bitmap, nbits); + ethnl_bitmap32_clear(bitmap, 0, nbits, &dummy); + } nla_for_each_nested(bit_attr, tb[ETHTOOL_A_BITSET_BITS], rem) { bool old_val, new_val; @@ -458,13 +463,18 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, if (nla_type(bit_attr) != ETHTOOL_A_BITSET_BITS_BIT) { NL_SET_ERR_MSG_ATTR(extack, bit_attr, "only ETHTOOL_A_BITSET_BITS_BIT allowed in ETHTOOL_A_BITSET_BITS"); - return -EINVAL; + ret = -EINVAL; + goto out; } ret = ethnl_parse_bit(&idx, &new_val, nbits, bit_attr, no_mask, names, extack); if (ret < 0) - return ret; - old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); + goto out; + if (no_mask) + old_val = tmp[idx / 32] & ((u32)1 << (idx % 32)); + else + old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); + if (new_val != old_val) { if (new_val) bitmap[idx / 32] |= ((u32)1 << (idx % 32)); @@ -474,7 +484,10 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, } } - return 0; + ret = 0; +out: + kfree(tmp); + return ret; } static int ethnl_compact_sanity_checks(unsigned int nbits, -- 2.25.1