Received: by 2002:a05:7412:3784:b0:e2:908c:2ebd with SMTP id jk4csp2524024rdb; Wed, 4 Oct 2023 04:07:46 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEwr/TcOtC6Y7CLF+lv0QRa94XDRm7v9tgih4XQJknDhAK6NDZvZJHCG2lFvBSThYVY3Vn/ X-Received: by 2002:a9d:7d98:0:b0:6bc:de95:a639 with SMTP id j24-20020a9d7d98000000b006bcde95a639mr1931035otn.16.1696417665780; Wed, 04 Oct 2023 04:07:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696417665; cv=none; d=google.com; s=arc-20160816; b=D8EL1x+VPcWTfL9YNSMiyNtA1I9JQrJ/t+SAArMFfKvH0E0LjJ0LGPpQYBOgVc0VJN TFsJ0weZ52uqGbwg4XgIpZgunWhaosUFJSoBbEGBeix9PCL4vUQftRu5ehq+2wXd469y n5eJqq3Z/9/bQ+HecOPGHDfy1dHT0GVUCer5yoAPtfODbzES/AG0UkCKX165Md0PhDtm MCMJz+ibvvO6L6qIga1uLbJhKx6BS1XovIQmy99vvGLHNmyIiRR1mKd1dBOMR+hppNYz KbRuw5/NEdUJ2Eq9LCJL0u9wWTHxWabGDEOB8GDT+HQjaJOXMEQR8N5Z+N3hDbfGXhFb T4ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=mVT5xLfzmpgZolC7GTq2kSS+TUyfHqgm4k9hlyEuoj4=; fh=DFJk2AGWnaNoivu4MucUSFEp1R3AuOa4WmqOYgIbja4=; b=d25JStrwAofpEBzqn9vBXkvPmjf8C2H5C7WMYjKUI/EljK73iGEi7DetKYW7kqMjZM NvR+Fl+CBzSBeCsBG40i0sWNwiufTULW5WzC4Wd1HKkX/B2vFBjnIW5rK2nAqtPYXZmn 0vWgV9wFBfa/7wSloq81Zp1UaySMyrWSJT5GgpTovqnoswCXGrwi+cyfit1ONMj3qEL9 kOghCUV44pfO2pKiaTTjD0GLN13bCEclURnXUtv7qDTfD6hwEjUx26NMXmXrp88EFCOf BEEjeFgptFOYoTPGV0AXJKQz4ILw5Yh+fjLbAINWxnDoYQQ8argLzuxQVAK2HvaxDy/g 6cjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hhs3iQMn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id z16-20020a656650000000b005859a7d38f9si3485896pgv.703.2023.10.04.04.07.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 04 Oct 2023 04:07:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hhs3iQMn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 6ABF981A7BCD; Wed, 4 Oct 2023 04:07:43 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241788AbjJDLHX (ORCPT + 99 others); Wed, 4 Oct 2023 07:07:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47836 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233001AbjJDLHW (ORCPT ); Wed, 4 Oct 2023 07:07:22 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 63A14B0; Wed, 4 Oct 2023 04:07:19 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D39D9C433C7; Wed, 4 Oct 2023 11:07:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1696417639; bh=1JJrIUPl6pbHzZ7I1g6oBNmULdlUHsuIiITpgEf24Mw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=hhs3iQMnZx4oR08DZ/GXEIWmgD/VHwaRYw1qbKslBmAbCUM9ZyX25b0+KROSz41FY rRv07clWP2HIEdfy10yH9XaQbE5BMbVlNn5roem8f5jXtDmbH2ebesao2KAylq12Dw TDt/dD698mjX0ymhnx9LD23Of1aDtzEtL7yBKjxkhGH1AyBct8Co5+hDF9Ocq30QlH q7P2GQnEwSzRpli39K+TnLPNfZLwamYKoC2c7ptjaS+Cm7fodSp1GFRLU7pYkzyAL2 048rvKKMkUXmnz55TIYo4hVordZq6g4y/in9hXRRrzn7EmWqgD0gdotKUswvHkwtsl DvM7n2d8mwSpg== Date: Wed, 4 Oct 2023 13:07:14 +0200 From: Simon Horman To: =?utf-8?B?S8O2cnk=?= Maincent Cc: Michal Kubecek , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Maxime Chevallier , stable@vger.kernel.org, thomas.petazzoni@bootlin.com, Eric Dumazet , Jakub Kicinski , Paolo Abeni Subject: Re: [PATCH net 1/1] ethtool: Fix mod state of verbose no_mask bitset Message-ID: References: <20231003085653.3104411-1-kory.maincent@bootlin.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20231003085653.3104411-1-kory.maincent@bootlin.com> X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Wed, 04 Oct 2023 04:07:43 -0700 (PDT) On Tue, Oct 03, 2023 at 10:56:52AM +0200, Köry Maincent wrote: > From: Kory Maincent > > A bitset without mask in a _SET request means we want exactly the bits in > the bitset to be set. This works correctly for compact format but when > verbose format is parsed, ethnl_update_bitset32_verbose() only sets the > bits present in the request bitset but does not clear the rest. The commit > 6699170376ab fixes this issue by clearing the whole target bitmap before we > start iterating. The solution proposed brought an issue with the behavior > of the mod variable. As the bitset is always cleared the old val will > always differ to the new val. > > Fix it by adding a new temporary variable which save the state of the old > bitmap. > > Fixes: 6699170376ab ("ethtool: fix application of verbose no_mask bitset") > Signed-off-by: Kory Maincent > Cc: stable@vger.kernel.org > --- > net/ethtool/bitset.c | 25 +++++++++++++++++++------ > 1 file changed, 19 insertions(+), 6 deletions(-) > > diff --git a/net/ethtool/bitset.c b/net/ethtool/bitset.c > index 0515d6604b3b..95f11b0a38b4 100644 > --- a/net/ethtool/bitset.c > +++ b/net/ethtool/bitset.c > @@ -432,7 +432,9 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > struct netlink_ext_ack *extack, bool *mod) > { > struct nlattr *bit_attr; > + u32 *tmp = NULL; > bool no_mask; > + bool dummy; > int rem; > int ret; > > @@ -448,8 +450,11 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > } > > no_mask = tb[ETHTOOL_A_BITSET_NOMASK]; > - if (no_mask) > - ethnl_bitmap32_clear(bitmap, 0, nbits, mod); > + if (no_mask) { > + tmp = kcalloc(nbits, sizeof(u32), GFP_KERNEL); > + memcpy(tmp, bitmap, nbits); Hi Köry, I'm no expert on etnhl bitmaps. But the above doesn't seem correct to me. Given that sizeof(u32) == 4: * The allocation is for nbits * 4 bytes * The copy is for its for nbits bytes * I believe that bitmap contains space for the value followed by a mask. So it seems to me the size of bitmap, in words, is DIV_ROUND_UP(nbits, 32) * 2 And in bytes: DIV_ROUND_UP(nbits, 32) * 16 But perhaps only half is needed if only the value part of tmp is used. If I'm on the right track here I'd suggest helpers might be in order. > + ethnl_bitmap32_clear(bitmap, 0, nbits, &dummy); > + } > > nla_for_each_nested(bit_attr, tb[ETHTOOL_A_BITSET_BITS], rem) { > bool old_val, new_val; > @@ -458,13 +463,18 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > if (nla_type(bit_attr) != ETHTOOL_A_BITSET_BITS_BIT) { > NL_SET_ERR_MSG_ATTR(extack, bit_attr, > "only ETHTOOL_A_BITSET_BITS_BIT allowed in ETHTOOL_A_BITSET_BITS"); > - return -EINVAL; > + ret = -EINVAL; > + goto out; > } > ret = ethnl_parse_bit(&idx, &new_val, nbits, bit_attr, no_mask, > names, extack); > if (ret < 0) > - return ret; > - old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); > + goto out; > + if (no_mask) > + old_val = tmp[idx / 32] & ((u32)1 << (idx % 32)); > + else > + old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); > + > if (new_val != old_val) { > if (new_val) > bitmap[idx / 32] |= ((u32)1 << (idx % 32)); > @@ -474,7 +484,10 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, > } > } > > - return 0; > + ret = 0; > +out: > + kfree(tmp); > + return ret; > } > > static int ethnl_compact_sanity_checks(unsigned int nbits, > -- > 2.25.1 > >