Received: by 10.192.165.156 with SMTP id m28csp1185003imm; Wed, 11 Apr 2018 14:06:47 -0700 (PDT) X-Google-Smtp-Source: AIpwx48hK86D/OuywiL1EZK8P5ebU87TXXUf5rI81R/MqH0w+pZ6x7Hyk+fAWHAp7hl5dqFfPX+h X-Received: by 10.98.156.91 with SMTP id f88mr5355388pfe.128.1523480807470; Wed, 11 Apr 2018 14:06:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523480807; cv=none; d=google.com; s=arc-20160816; b=lAHoeyt7xXYcC9KgBoh86Hv1fHgr7hiTMQO4Ql9r+br1Pf0jeLmXYBUTp533K6YVEj xZn2rQoLBIB0vB3DdUnDwTONMk+f9LllfzhfaSbmqagTvtVsv3BBIcxArfCtZFhA5uiM Mfcx9ddMnqUZHaWe1ELf/wR/k4pYDNTeIVkKPddDGaC+0qTxJx21OsfkS9mFAppkMgfi iLYR4Pn0qUjIM10jDy/DiyvuhdMaohIJ6H8nnavU8tXkfToNknIhiD07GNaaZIlmLj3A LYUKWcLzBeMo6WcTSHzRiKN+bZW8z9uLTHi5YQeVm4i7/oEYJ1UbkgffkSK76Xukv0Nm WLYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=rDu/wKV0uK7eGNwlJz23snx9UQM2HZX8PzzU9ve7VMI=; b=0RR2SuH2hiQaKNXf1VPO2rsN0WPKX5IXY7+QgxbtlGLDXE2txF9VmjHEYD1S2uMy6W o+jdikRAI5a5UUndhtcEzJp9szG4kO8GqqR1qUM/UTCKysaUTFMAsBJJ0lTEriSp1fu7 +mY0LGJ+g4Gu0ofbEPN6wGhTxD4AyhOcs6FDQYuHwLg5b5z0SWcW8C8V9MO5uY6sRxhl F2wugTG4D/Br4CzR6CPKIog7rlyIpru8Ukb+URmX0rokJ1qdudivw7ouPjRa72g16FhM R0BueVdh1C3q7I+wnF9wbosrpXmejYRXZL7A9YbYmc8iUMKrYbhcQJw25ZgnFiJtMdsc tV7g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z63si1216634pgb.28.2018.04.11.14.06.11; Wed, 11 Apr 2018 14:06:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752826AbeDKSnR (ORCPT + 99 others); Wed, 11 Apr 2018 14:43:17 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:57496 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755260AbeDKSnP (ORCPT ); Wed, 11 Apr 2018 14:43:15 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id A9C8EEA4; Wed, 11 Apr 2018 18:43:14 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Craig Dillabaugh , Jamal Hadi Salim , "David S. Miller" Subject: [PATCH 3.18 120/121] net sched actions: fix dumping which requires several messages to user space Date: Wed, 11 Apr 2018 20:37:03 +0200 Message-Id: <20180411183504.291078700@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180411183456.195010921@linuxfoundation.org> References: <20180411183456.195010921@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Craig Dillabaugh [ Upstream commit 734549eb550c0c720bc89e50501f1b1e98cdd841 ] Fixes a bug in the tcf_dump_walker function that can cause some actions to not be reported when dumping a large number of actions. This issue became more aggrevated when cookies feature was added. In particular this issue is manifest when large cookie values are assigned to the actions and when enough actions are created that the resulting table must be dumped in multiple batches. The number of actions returned in each batch is limited by the total number of actions and the memory buffer size. With small cookies the numeric limit is reached before the buffer size limit, which avoids the code path triggering this bug. When large cookies are used buffer fills before the numeric limit, and the erroneous code path is hit. For example after creating 32 csum actions with the cookie aaaabbbbccccdddd $ tc actions ls action csum total acts 26 action order 0: csum (tcp) action continue index 1 ref 1 bind 0 cookie aaaabbbbccccdddd ..... action order 25: csum (tcp) action continue index 26 ref 1 bind 0 cookie aaaabbbbccccdddd total acts 6 action order 0: csum (tcp) action continue index 28 ref 1 bind 0 cookie aaaabbbbccccdddd ...... action order 5: csum (tcp) action continue index 32 ref 1 bind 0 cookie aaaabbbbccccdddd Note that the action with index 27 is omitted from the report. Fixes: 4b3550ef530c ("[NET_SCHED]: Use nla_nest_start/nla_nest_end")" Signed-off-by: Craig Dillabaugh Acked-by: Jamal Hadi Salim Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/sched/act_api.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/net/sched/act_api.c +++ b/net/sched/act_api.c @@ -92,8 +92,10 @@ static int tcf_dump_walker(struct sk_buf a->order = n_i; nest = nla_nest_start(skb, a->order); - if (nest == NULL) + if (nest == NULL) { + index--; goto nla_put_failure; + } err = tcf_action_dump_1(skb, a, 0, 0); if (err < 0) { index--;