[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bc5737ba2a1e5586408cd0398b2db0f218ed3e89.1760364551.git.asml.silence@gmail.com>
Date: Mon, 13 Oct 2025 15:54:26 +0100
From: Pavel Begunkov <asml.silence@...il.com>
To: netdev@...r.kernel.org
Cc: Andrew Lunn <andrew@...n.ch>,
Jakub Kicinski <kuba@...nel.org>,
davem@...emloft.net,
Eric Dumazet <edumazet@...gle.com>,
Paolo Abeni <pabeni@...hat.com>,
Simon Horman <horms@...nel.org>,
Donald Hunter <donald.hunter@...il.com>,
Michael Chan <michael.chan@...adcom.com>,
Pavan Chebbi <pavan.chebbi@...adcom.com>,
Jesper Dangaard Brouer <hawk@...nel.org>,
John Fastabend <john.fastabend@...il.com>,
Stanislav Fomichev <sdf@...ichev.me>,
Joshua Washington <joshwash@...gle.com>,
Harshitha Ramamurthy <hramamurthy@...gle.com>,
Jian Shen <shenjian15@...wei.com>,
Salil Mehta <salil.mehta@...wei.com>,
Jijie Shao <shaojijie@...wei.com>,
Sunil Goutham <sgoutham@...vell.com>,
Geetha sowjanya <gakula@...vell.com>,
Subbaraya Sundeep <sbhatta@...vell.com>,
hariprasad <hkelam@...vell.com>,
Bharat Bhushan <bbhushan2@...vell.com>,
Saeed Mahameed <saeedm@...dia.com>,
Tariq Toukan <tariqt@...dia.com>,
Mark Bloch <mbloch@...dia.com>,
Leon Romanovsky <leon@...nel.org>,
Alexander Duyck <alexanderduyck@...com>,
kernel-team@...a.com,
Ilias Apalodimas <ilias.apalodimas@...aro.org>,
Joe Damato <joe@...a.to>,
David Wei <dw@...idwei.uk>,
Willem de Bruijn <willemb@...gle.com>,
Mina Almasry <almasrymina@...gle.com>,
Pavel Begunkov <asml.silence@...il.com>,
Breno Leitao <leitao@...ian.org>,
Dragos Tatulea <dtatulea@...dia.com>,
linux-kernel@...r.kernel.org,
linux-doc@...r.kernel.org,
linux-rdma@...r.kernel.org,
Jonathan Corbet <corbet@....net>
Subject: [PATCH net-next v4 24/24] net: validate driver supports passed qcfg params
When we pass a qcfg to a driver, make sure it supports the set
parameters by checking it against ->supported_ring_params.
Suggested-by: Jakub Kicinski <kuba@...nel.org>
Signed-off-by: Pavel Begunkov <asml.silence@...il.com>
---
net/core/dev.h | 3 +++
net/core/netdev_config.c | 26 ++++++++++++++++++++++++++
net/core/netdev_rx_queue.c | 8 +++-----
3 files changed, 32 insertions(+), 5 deletions(-)
diff --git a/net/core/dev.h b/net/core/dev.h
index 63192dbb1895..96eae1c51328 100644
--- a/net/core/dev.h
+++ b/net/core/dev.h
@@ -103,6 +103,9 @@ int netdev_queue_config_revalidate(struct net_device *dev,
struct netlink_ext_ack *extack);
void netdev_queue_config_update_cnt(struct net_device *dev, unsigned int txq,
unsigned int rxq);
+int netdev_queue_config_validate(struct net_device *dev, int rxq_idx,
+ struct netdev_queue_config *qcfg,
+ struct netlink_ext_ack *extack);
/* netdev management, shared between various uAPI entry points */
struct netdev_name_node {
diff --git a/net/core/netdev_config.c b/net/core/netdev_config.c
index 2c9b06f94e01..99e64d942d44 100644
--- a/net/core/netdev_config.c
+++ b/net/core/netdev_config.c
@@ -1,6 +1,7 @@
// SPDX-License-Identifier: GPL-2.0-only
#include <linux/netdevice.h>
+#include <linux/ethtool.h>
#include <net/netdev_queues.h>
#include <net/netdev_rx_queue.h>
@@ -136,6 +137,31 @@ void netdev_queue_config(struct net_device *dev, int rxq,
}
EXPORT_SYMBOL(netdev_queue_config);
+int netdev_queue_config_validate(struct net_device *dev, int rxq_idx,
+ struct netdev_queue_config *qcfg,
+ struct netlink_ext_ack *extack)
+{
+ const struct netdev_queue_mgmt_ops *qops = dev->queue_mgmt_ops;
+ int err;
+
+ if (WARN_ON_ONCE(!qops))
+ return -EINVAL;
+
+ if (!(qops->supported_ring_params & ETHTOOL_RING_USE_RX_BUF_LEN) &&
+ qcfg->rx_buf_len &&
+ qcfg->rx_buf_len != dev->cfg_pending->rx_buf_len) {
+ NL_SET_ERR_MSG_MOD(extack, "changing rx-buf-len not supported");
+ return -EINVAL;
+ }
+
+ if (qops->ndo_queue_cfg_validate) {
+ err = qops->ndo_queue_cfg_validate(dev, rxq_idx, qcfg, extack);
+ if (err)
+ return err;
+ }
+ return 0;
+}
+
int netdev_queue_config_revalidate(struct net_device *dev,
struct netlink_ext_ack *extack)
{
diff --git a/net/core/netdev_rx_queue.c b/net/core/netdev_rx_queue.c
index 5ae375a072a1..a157964cf60d 100644
--- a/net/core/netdev_rx_queue.c
+++ b/net/core/netdev_rx_queue.c
@@ -46,11 +46,9 @@ int netdev_rx_queue_restart(struct net_device *dev, unsigned int rxq_idx,
netdev_queue_config(dev, rxq_idx, &qcfg);
- if (qops->ndo_queue_cfg_validate) {
- err = qops->ndo_queue_cfg_validate(dev, rxq_idx, &qcfg, extack);
- if (err)
- goto err_free_old_mem;
- }
+ err = netdev_queue_config_validate(dev, rxq_idx, &qcfg, extack);
+ if (err)
+ goto err_free_old_mem;
err = qops->ndo_queue_mem_alloc(dev, &qcfg, new_mem, rxq_idx);
if (err)
--
2.49.0
Powered by blists - more mailing lists