Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp2469553imd; Fri, 2 Nov 2018 11:58:26 -0700 (PDT) X-Google-Smtp-Source: AJdET5d/kUmS01q3t+YT9N9/j6qk+cWITwzw/pcHNpDYPo5s2XuOpAU1CiCiNNVkYRfQkBa/0vEz X-Received: by 2002:a63:d846:: with SMTP id k6mr10473762pgj.251.1541185106119; Fri, 02 Nov 2018 11:58:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541185106; cv=none; d=google.com; s=arc-20160816; b=zDUp+4cRggnI1ZUBJMF0tD5pXTRtgejzcqY0eEVUHgkGbRxpTj1ZqYoMLW7RQtZWtQ m7aEySG2rGq0gZMPfLWnpBzeql5gSWLG2GqwZ08lcOx//1rwWTMMehrJQYtILRmCCOTk IV1UOTASbcyHiGzxAzEdsD3VLAGFhUog5wTvjKhyk1FYYM3Hq5yVeaGKA/vHoTSOD6nv GYUcxU8X3cdh6ToapbVMRmRTMLA2xbZiXQcQGGAKIhHjwUDY2Mqrheepdc3coSs7zyzp +13m4UezJ2BRQvvXvUzyivMYNuBGY0ZFC+jiHQz9Gr/MH694XQ5Z56SoqZ1fXB4apPZX Wt7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vColqT2WS9+t04Qu6xsNvsiFoiBvMlGfkw+JqKyILfI=; b=LHPFNnnlxjXLZcoCr8levndS9/Rw4fdArvUkhsjdREuMk24IUXXQ8KJr2hi3DPQVMv fLDvMoMZ14Y4ljX7tJ3hVgqnvOIA0BwbkGhkWBOluH/hRVz4UIUgCh5MjplAgNFKv92+ mHe8zg4bdthe87jmF3FmbHOQR9E4mf1ovrZU1SKot1T8LJU9PX7WJ18Fzj7jpi2ufgxe XK0N/lgKA4xtGMQ2yHdIIvNxyQs1DYQVyaDg60qqxFr9/crO/xzd11U0jYkAXKJ+X3Zf qq1NEnr2gV95m6o40yjmoEu7aKc0Pju+blPHzizYzuPGwfHTlF7Cy+5s/4hXZcol5C92 ragQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GkLhpz0R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3-v6si25076706pld.186.2018.11.02.11.58.11; Fri, 02 Nov 2018 11:58:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GkLhpz0R; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731640AbeKCEEu (ORCPT + 99 others); Sat, 3 Nov 2018 00:04:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:60884 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726051AbeKCEEu (ORCPT ); Sat, 3 Nov 2018 00:04:50 -0400 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 04CA32082D; Fri, 2 Nov 2018 18:56:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541184993; bh=yfFsV9I0ufO4XyfU5b1dxtZFBglxsvubtFrSJgOh8Ks=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GkLhpz0RvOYNeMmVM7WerxGzbHB9ss/h9vBmxgf2A9j+LB9eoyTp7K7EbGCaQkPjt d/Hb4O14WhebifiwZs0aUoJkhhn/4YTn83jU1ewTdrT3gUl/KuXUpzDpxVUM7SGs8D FR6LTvQaBnSDcyk8t31PdK77zaSIWMkBxs0Wxzeo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Colin Ian King , Nikolay Aleksandrov , "David S. Miller" Subject: [PATCH 4.14 141/143] net: ipmr: fix unresolved entry dumps Date: Fri, 2 Nov 2018 19:35:26 +0100 Message-Id: <20181102182908.943296040@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181102182857.064326086@linuxfoundation.org> References: <20181102182857.064326086@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Nikolay Aleksandrov [ Upstream commit eddf016b910486d2123675a6b5fd7d64f77cdca8 ] If the skb space ends in an unresolved entry while dumping we'll miss some unresolved entries. The reason is due to zeroing the entry counter between dumping resolved and unresolved mfc entries. We should just keep counting until the whole table is dumped and zero when we move to the next as we have a separate table counter. Reported-by: Colin Ian King Fixes: 8fb472c09b9d ("ipmr: improve hash scalability") Signed-off-by: Nikolay Aleksandrov Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/ipmr.c | 2 -- 1 file changed, 2 deletions(-) --- a/net/ipv4/ipmr.c +++ b/net/ipv4/ipmr.c @@ -2499,8 +2499,6 @@ static int ipmr_rtm_dumproute(struct sk_ next_entry: e++; } - e = 0; - s_e = 0; spin_lock_bh(&mfc_unres_lock); list_for_each_entry(mfc, &mrt->mfc_unres_queue, list) {