From: cuitao <cuitao@kylinos.cn>
To: mkoutny@suse.com
Cc: cgroups@vger.kernel.org, cuitao@kylinos.cn, hannes@cmpxchg.org,
tj@kernel.org
Subject: [PATCH v2] cgroup/rdma: refactor resource parsing with match_table_t/match_token()
Date: Mon, 20 Apr 2026 12:52:33 +0800 [thread overview]
Message-ID: <20260420045233.116375-1-cuitao@kylinos.cn> (raw)
In-Reply-To: <t2cbjvctdgzipxzovr5zkbovhptkxdaoxljeuxwrxboqqbkzqu@bcazimapp6ci>
Replace the hand-rolled strsep/strcmp/match_string parsing in
rdmacg_resource_set_max() with a match_table_t and match_token()
pattern, following the convention used by user_proactive_reclaim()
and ioc_cost_model_write().
This fixes the original strncmp(value, RDMACG_MAX_STR, strlen(value))
bug that matched "ma" as "max", and also robustly handles extra
whitespace in the input by splitting on " \t\n" and skipping empty
tokens.
Suggested-by: "Michal Koutný" <mkoutny@suse.com>
Signed-off-by: cuitao <cuitao@kylinos.cn>
---
Changes in v2:
- Refactor to use match_table_t/match_token() as suggested by Michal Koutný
Link: https://lore.kernel.org/all/t2cbjvctdgzipxzovr5zkbovhptkxdaoxljeuxwrxboqqbkzqu@bcazimapp6ci/
---
kernel/cgroup/rdma.c | 120 ++++++++++++++++++++-----------------------
1 file changed, 57 insertions(+), 63 deletions(-)
diff --git a/kernel/cgroup/rdma.c b/kernel/cgroup/rdma.c
index 9967fb25c563..48d6bc7d9624 100644
--- a/kernel/cgroup/rdma.c
+++ b/kernel/cgroup/rdma.c
@@ -9,6 +9,7 @@
*/
#include <linux/bitops.h>
+#include <linux/limits.h>
#include <linux/slab.h>
#include <linux/seq_file.h>
#include <linux/cgroup.h>
@@ -17,6 +18,22 @@
#define RDMACG_MAX_STR "max"
+enum rdmacg_limit_tokens {
+ RDMACG_HCA_HANDLE_VAL,
+ RDMACG_HCA_HANDLE_MAX,
+ RDMACG_HCA_OBJECT_VAL,
+ RDMACG_HCA_OBJECT_MAX,
+ NR_RDMACG_LIMIT_TOKENS,
+};
+
+static const match_table_t rdmacg_limit_tokens = {
+ { RDMACG_HCA_HANDLE_VAL, "hca_handle=%d" },
+ { RDMACG_HCA_HANDLE_MAX, "hca_handle=max" },
+ { RDMACG_HCA_OBJECT_VAL, "hca_object=%d" },
+ { RDMACG_HCA_OBJECT_MAX, "hca_object=max" },
+ { NR_RDMACG_LIMIT_TOKENS, NULL },
+};
+
/*
* Protects list of resource pools maintained on per cgroup basis
* and rdma device list.
@@ -355,62 +372,6 @@ void rdmacg_unregister_device(struct rdmacg_device *device)
}
EXPORT_SYMBOL(rdmacg_unregister_device);
-static int parse_resource(char *c, int *intval)
-{
- substring_t argstr;
- char *name, *value = c;
- size_t len;
- int ret, i;
-
- name = strsep(&value, "=");
- if (!name || !value)
- return -EINVAL;
-
- i = match_string(rdmacg_resource_names, RDMACG_RESOURCE_MAX, name);
- if (i < 0)
- return i;
-
- len = strlen(value);
-
- argstr.from = value;
- argstr.to = value + len;
-
- ret = match_int(&argstr, intval);
- if (ret >= 0) {
- if (*intval < 0)
- return -EINVAL;
- return i;
- }
- if (strncmp(value, RDMACG_MAX_STR, len) == 0) {
- *intval = S32_MAX;
- return i;
- }
- return -EINVAL;
-}
-
-static int rdmacg_parse_limits(char *options,
- int *new_limits, unsigned long *enables)
-{
- char *c;
- int err = -EINVAL;
-
- /* parse resource options */
- while ((c = strsep(&options, " ")) != NULL) {
- int index, intval;
-
- index = parse_resource(c, &intval);
- if (index < 0)
- goto err;
-
- new_limits[index] = intval;
- *enables |= BIT(index);
- }
- return 0;
-
-err:
- return err;
-}
-
static struct rdmacg_device *rdmacg_get_device_locked(const char *name)
{
struct rdmacg_device *device;
@@ -432,6 +393,7 @@ static ssize_t rdmacg_resource_set_max(struct kernfs_open_file *of,
struct rdmacg_resource_pool *rpool;
struct rdmacg_device *device;
char *options = strstrip(buf);
+ char *p;
int *new_limits;
unsigned long enables = 0;
int i = 0, ret = 0;
@@ -449,9 +411,45 @@ static ssize_t rdmacg_resource_set_max(struct kernfs_open_file *of,
goto err;
}
- ret = rdmacg_parse_limits(options, new_limits, &enables);
- if (ret)
- goto parse_err;
+ /* parse resource limit tokens */
+ while ((p = strsep(&options, " \t\n"))) {
+ substring_t args[MAX_OPT_ARGS];
+ int tok, intval;
+
+ if (!*p)
+ continue;
+
+ tok = match_token(p, rdmacg_limit_tokens, args);
+ switch (tok) {
+ case RDMACG_HCA_HANDLE_VAL:
+ if (match_int(&args[0], &intval) || intval < 0) {
+ ret = -EINVAL;
+ goto parse_err;
+ }
+ new_limits[RDMACG_RESOURCE_HCA_HANDLE] = intval;
+ enables |= BIT(RDMACG_RESOURCE_HCA_HANDLE);
+ break;
+ case RDMACG_HCA_HANDLE_MAX:
+ new_limits[RDMACG_RESOURCE_HCA_HANDLE] = S32_MAX;
+ enables |= BIT(RDMACG_RESOURCE_HCA_HANDLE);
+ break;
+ case RDMACG_HCA_OBJECT_VAL:
+ if (match_int(&args[0], &intval) || intval < 0) {
+ ret = -EINVAL;
+ goto parse_err;
+ }
+ new_limits[RDMACG_RESOURCE_HCA_OBJECT] = intval;
+ enables |= BIT(RDMACG_RESOURCE_HCA_OBJECT);
+ break;
+ case RDMACG_HCA_OBJECT_MAX:
+ new_limits[RDMACG_RESOURCE_HCA_OBJECT] = S32_MAX;
+ enables |= BIT(RDMACG_RESOURCE_HCA_OBJECT);
+ break;
+ default:
+ ret = -EINVAL;
+ goto parse_err;
+ }
+ }
/* acquire lock to synchronize with hot plug devices */
mutex_lock(&rdmacg_mutex);
@@ -474,10 +472,6 @@ static ssize_t rdmacg_resource_set_max(struct kernfs_open_file *of,
if (rpool->usage_sum == 0 &&
rpool->num_max_cnt == RDMACG_RESOURCE_MAX) {
- /*
- * No user of the rpool and all entries are set to max, so
- * safe to delete this rpool.
- */
free_cg_rpool_locked(rpool);
}
--
2.43.0
next prev parent reply other threads:[~2026-04-20 4:52 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-14 2:09 [PATCH] cgroup/rdma: fix strncmp prefix match in parse_resource() cuitao
2026-04-15 13:37 ` Michal Koutný
2026-04-17 6:43 ` 崔涛
2026-04-17 9:53 ` Michal Koutný
2026-04-20 1:08 ` Tao Cui
2026-04-20 4:52 ` cuitao [this message]
2026-04-21 16:42 ` [PATCH v2] cgroup/rdma: refactor resource parsing with match_table_t/match_token() Tejun Heo
2026-04-22 2:17 ` [PATCH v3] " Tao Cui
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260420045233.116375-1-cuitao@kylinos.cn \
--to=cuitao@kylinos.cn \
--cc=cgroups@vger.kernel.org \
--cc=hannes@cmpxchg.org \
--cc=mkoutny@suse.com \
--cc=tj@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox