Received: by 2002:a05:7412:f690:b0:e2:908c:2ebd with SMTP id ej16csp343801rdb; Thu, 19 Oct 2023 06:17:33 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFATTZvOs5I515dJLvColYrsMtCVAJsRDBUdSU8fyf4HxxeAUqVg+kj7LHgf66gXPiwBNPc X-Received: by 2002:a05:6358:cb14:b0:166:b17c:bbbd with SMTP id gr20-20020a056358cb1400b00166b17cbbbdmr2093868rwb.17.1697721452925; Thu, 19 Oct 2023 06:17:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697721452; cv=none; d=google.com; s=arc-20160816; b=V8XiQKkGI+ByZCmco+LzjHSpD683BF8u0hrtULamsMYfSsR3v1q+tQS+N4ZurXaxXL yYVQ7bk6aR//pas14wADCJAnj6cP9G0TdMgeM3yCqHXDJiQxkihV8rvDktW4qzN5Z/3S 6rDhMuaSjAYhZcE/86C/IOKUCJAc4pXPDcTGIJFBvzSkL5kT/tk8imoAd9xnuvFONro2 fj36AVe+E/tHKWY2/z5IggzjhiouMD5eu+W1sNM+fe4t3hJdVf8Zw4/wcEZg/SjL+30E uO2R88OV9sCfwoLpUP/IIO0CYLpJufBDSribLLw911dkrqld7VAJmCbNnnCN+547KgMP ILIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:message-id:content-transfer-encoding :mime-version:subject:date:from:dkim-signature; bh=7kubKUOdyt7koTXOXKhU8wFECVMZDVp8kCAlvbhKcUI=; fh=X86ECGD1gatNVqD0cXRGdJLUDG4NDZLnH6PufMPlHo4=; b=L+TUcJq+sQQ1xrJ7WUrgeDyxtiqcbd42ebw6zJl4i5kogx6I4Sa3YBqrSQnny1Dt6l iANCg3/R4SNf3+MU/r2RAHwfhkHv66kNJWdHSF5vFGKuOny3cuzMETcRSV22giRfcmlx ZRPaqrehasb44f26t4dOkKwRckQy8Rse9rOkAgQ539er9WRgp251DJDKGDYdWubIcXb1 /VV3bkbYXzFTm3lRI/PAs7rzMQvdXWlLPTaUACIELGjyfNq8Tyc7rIQSNwlsQLdVdOXB /njkyMohWAdqy10Lug/qdTfPKVSCuLkw7g8h/KDBzXmUlvpfl5vIRG9iBhXE+NQWmnvv AYBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=evznZ03x; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id w9-20020a056a0014c900b00690c19cb105si5999035pfu.250.2023.10.19.06.17.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 19 Oct 2023 06:17:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@bootlin.com header.s=gm1 header.b=evznZ03x; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=bootlin.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id AD39182F2C76; Thu, 19 Oct 2023 06:17:29 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345498AbjJSNRW (ORCPT + 99 others); Thu, 19 Oct 2023 09:17:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52910 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233202AbjJSNRV (ORCPT ); Thu, 19 Oct 2023 09:17:21 -0400 Received: from relay1-d.mail.gandi.net (relay1-d.mail.gandi.net [217.70.183.193]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F1C8998; Thu, 19 Oct 2023 06:17:15 -0700 (PDT) Received: by mail.gandi.net (Postfix) with ESMTPSA id 8106F240002; Thu, 19 Oct 2023 13:17:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bootlin.com; s=gm1; t=1697721434; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=7kubKUOdyt7koTXOXKhU8wFECVMZDVp8kCAlvbhKcUI=; b=evznZ03xPa0BEwhJfOpNDV6d3q5E4Ku96L8mhZfSmZ0WUAyqSyXEHUqqaCyyVLtItEGvJG iI6qrODCXFvYvK78X9EaXwnN1EdVV5EAKy2i+nJLs5gM8vPTgBk+GtMRLOzf8QBS83sGmg gmdd5uackLlA7rCLXeUjimx1JzlpafuKGeeXAcKIKTRILR+l8WSVFibee3PrOXIX+c03pf niu31RkRhCXonSiGBCR+L6uJv25Lt15MaLuEN70pGQBMMk0ytJ5KRB5B/bXiQK13Mhdo/s PYa9WxihA5q8z5ZuHkvs1Bbj0fK9rMBqAZ7Tw05nMfPXahSVtClavHN/lPGQhQ== From: Kory Maincent Date: Thu, 19 Oct 2023 15:16:41 +0200 Subject: [PATCH net] Revert "ethtool: Fix mod state of verbose no_mask bitset" MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Message-Id: <20231019-feature_ptp_bitset_fix-v1-1-70f3c429a221@bootlin.com> X-B4-Tracking: v=1; b=H4sIADgsMWUC/x2M0QqEIBQFfyXuc0ImFfUrEZJ13L0vJnqLhejfV 3qcgZmbMhIj01TdlHBx5iMU0HVF23cNHyjeC1PbtEY3elQeq5wJNkq0jiVDrOef6p0fun7Qzhh QiWNC0e94pgCh5Xn+yXvplG0AAAA= To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Richard Cochran , Simon Horman Cc: Thomas Petazzoni , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Maxime Chevallier , Simon Horman , Michal Kubecek , stable@vger.kernel.org, Kory Maincent , Oleksij Rempel X-Mailer: b4 0.12.3 X-GND-Sasl: kory.maincent@bootlin.com X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Thu, 19 Oct 2023 06:17:29 -0700 (PDT) This reverts commit 108a36d07c01edbc5942d27c92494d1c6e4d45a0. It was reported that this fix breaks the possibility to remove existing WoL flags. For example: ~$ ethtool lan2 ... Supports Wake-on: pg Wake-on: d ... ~$ ethtool -s lan2 wol gp ~$ ethtool lan2 ... Wake-on: pg ... ~$ ethtool -s lan2 wol d ~$ ethtool lan2 ... Wake-on: pg ... This worked correctly before this commit because we were always updating a zero bitmap (since commit 6699170376ab ("ethtool: fix application of verbose no_mask bitset"), that is) so that the rest was left zero naturally. But now the 1->0 change (old_val is true, bit not present in netlink nest) no longer works. Reported-by: Oleksij Rempel Reported-by: Michal Kubecek Closes: https://lore.kernel.org/netdev/20231019095140.l6fffnszraeb6iiw@lion.mk-sys.cz/ Cc: stable@vger.kernel.org Fixes: 108a36d07c01 ("ethtool: Fix mod state of verbose no_mask bitset") Signed-off-by: Kory Maincent --- This patch is reverted for now as we are approaching the end of the merge-window. The real fix that fix the mod value will be sent later on the next merge-window. --- net/ethtool/bitset.c | 32 ++++++-------------------------- 1 file changed, 6 insertions(+), 26 deletions(-) diff --git a/net/ethtool/bitset.c b/net/ethtool/bitset.c index 883ed9be81f9..0515d6604b3b 100644 --- a/net/ethtool/bitset.c +++ b/net/ethtool/bitset.c @@ -431,10 +431,8 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, ethnl_string_array_t names, struct netlink_ext_ack *extack, bool *mod) { - u32 *orig_bitmap, *saved_bitmap = NULL; struct nlattr *bit_attr; bool no_mask; - bool dummy; int rem; int ret; @@ -450,22 +448,8 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, } no_mask = tb[ETHTOOL_A_BITSET_NOMASK]; - if (no_mask) { - unsigned int nwords = DIV_ROUND_UP(nbits, 32); - unsigned int nbytes = nwords * sizeof(u32); - - /* The bitmap size is only the size of the map part without - * its mask part. - */ - saved_bitmap = kcalloc(nwords, sizeof(u32), GFP_KERNEL); - if (!saved_bitmap) - return -ENOMEM; - memcpy(saved_bitmap, bitmap, nbytes); - ethnl_bitmap32_clear(bitmap, 0, nbits, &dummy); - orig_bitmap = saved_bitmap; - } else { - orig_bitmap = bitmap; - } + if (no_mask) + ethnl_bitmap32_clear(bitmap, 0, nbits, mod); nla_for_each_nested(bit_attr, tb[ETHTOOL_A_BITSET_BITS], rem) { bool old_val, new_val; @@ -474,14 +458,13 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, if (nla_type(bit_attr) != ETHTOOL_A_BITSET_BITS_BIT) { NL_SET_ERR_MSG_ATTR(extack, bit_attr, "only ETHTOOL_A_BITSET_BITS_BIT allowed in ETHTOOL_A_BITSET_BITS"); - ret = -EINVAL; - goto out; + return -EINVAL; } ret = ethnl_parse_bit(&idx, &new_val, nbits, bit_attr, no_mask, names, extack); if (ret < 0) - goto out; - old_val = orig_bitmap[idx / 32] & ((u32)1 << (idx % 32)); + return ret; + old_val = bitmap[idx / 32] & ((u32)1 << (idx % 32)); if (new_val != old_val) { if (new_val) bitmap[idx / 32] |= ((u32)1 << (idx % 32)); @@ -491,10 +474,7 @@ ethnl_update_bitset32_verbose(u32 *bitmap, unsigned int nbits, } } - ret = 0; -out: - kfree(saved_bitmap); - return ret; + return 0; } static int ethnl_compact_sanity_checks(unsigned int nbits, --- base-commit: a602ee3176a81280b829c9f0cf259450f7982168 change-id: 20231019-feature_ptp_bitset_fix-6bf75671b33e Best regards, -- Köry Maincent, Bootlin Embedded Linux and kernel engineering https://bootlin.com