Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Jul 2015 21:59:12 +0000
From:      Mark Johnston <markj@FreeBSD.org>
To:        Gleb Smirnoff <glebius@FreeBSD.org>
Cc:        Jason Unovitch <jason.unovitch@gmail.com>, src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   Re: svn commit: r285782 - head/usr.bin/netstat
Message-ID:  <20150728184104.GA94463@muskytusk>
In-Reply-To: <20150728143106.GY72729@FreeBSD.org>
References:  <201507212357.t6LNvd7K023794@repo.freebsd.org> <20150728143106.GY72729@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Jul 28, 2015 at 05:31:06PM +0300, Gleb Smirnoff wrote:
>   Mark, Jason,
> 
> On Tue, Jul 21, 2015 at 11:57:39PM +0000, Mark Johnston wrote:
> M>   Fix counter reads on platforms where sizeof(uint64_t) != sizeof(uint64_t *).
> M>   
> M>   In the kernel, structs such as tcpstat are manipulated as an array of
> M>   counter_u64_t (uint64_t *), but made visible to userland as an array of
> M>   uint64_t. kread_counters() was previously copying the counter array into
> M>   user space and sequentially overwriting each counter with its value. This
> M>   mostly affects IPsec counters, as other counters are exported via sysctl.
> M>   
> M>   PR:		201700
> M>   Tested by:	Jason Unovitch
> 
> Thanks for fixing the bug after me.
> 
> One question, though: why do you use sizeof(u_long) instead of size of a
> pointer?

kvm_counter_u64_fetch(3) takes a u_long for the KVA of the counter, so it
seemed natural to read an array of counter addresses into an array of
u_long.

> 
> M> ==============================================================================
> M> --- head/usr.bin/netstat/main.c	Tue Jul 21 23:44:36 2015	(r285781)
> M> +++ head/usr.bin/netstat/main.c	Tue Jul 21 23:57:38 2015	(r285782)
> M> @@ -776,19 +776,31 @@ kread_counter(u_long addr)
> M>  int
> M>  kread_counters(u_long addr, void *buf, size_t size)
> M>  {
> M> -	uint64_t *c = buf;
> M> +	uint64_t *c;
> M> +	u_long *counters;
> M> +	size_t i, n;
> M>  
> M>  	if (kvmd_init() < 0)
> M>  		return (-1);
> M>  
> M> -	if (kread(addr, buf, size) < 0)
> M> +	if (size % sizeof(uint64_t) != 0) {
> M> +		xo_warnx("kread_counters: invalid counter set size");
> M>  		return (-1);
> M> +	}
> M>  
> M> -	while (size != 0) {
> M> -		*c = kvm_counter_u64_fetch(kvmd, *c);
> M> -		size -= sizeof(*c);
> M> -		c++;
> M> +	n = size / sizeof(uint64_t);
> M> +	if ((counters = malloc(n * sizeof(u_long))) == NULL)
> M> +		xo_err(-1, "malloc");
> M> +	if (kread(addr, counters, n * sizeof(u_long)) < 0) {
> M> +		free(counters);
> M> +		return (-1);
> M>  	}
> M> +
> M> +	c = buf;
> M> +	for (i = 0; i < n; i++)
> M> +		c[i] = kvm_counter_u64_fetch(kvmd, counters[i]);
> M> +
> M> +	free(counters);
> M>  	return (0);
> M>  }
> 
> -- 
> Totus tuus, Glebius.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150728184104.GA94463>