Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp34663imu; Thu, 8 Nov 2018 14:16:42 -0800 (PST) X-Google-Smtp-Source: AJdET5fnxt7HSXjAD4bvQYBHNIVs50ulp/zDa9RgbxequQPOU1AbN8wFXMu5c0aZd7mhgFHYaIBY X-Received: by 2002:a17:902:64:: with SMTP id 91-v6mr6334512pla.161.1541715402145; Thu, 08 Nov 2018 14:16:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1541715402; cv=none; d=google.com; s=arc-20160816; b=st6R0rYXKMGou6puHd/IiFbtQIQImRRbe62Nd8R6AY4cdijCmCNrrpZS7d0nMQp0Aa aSwqMtFozMnqBI7SbW7w7a97c7718/ZLkgbmMHZ0trUoPZ+fAqW7WsHge4ebQGSxf2pM wz7Ksh/72B2Ymk9JrYQSzU3tO9ipYzYHwWytM8D5sCFM9Lz0NFZO/pJlEvk/GYU7Wm+g zUb8eST5LRerYWgDbeZtmjsA8BbPCBFds0w7Q230vlIBUduD47AyfCASOysW4rColsCQ dbSn0AiSlc+oKW20eheA0BiArQ1LTaDgiF9azy4CPjnJIdvnTREf4trX4qBk8KB07+sx crQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2uKEbctnHaZgUyO3D6US+RiMvZ2wZU5jh3JloHQbPQE=; b=RuCDSXpSOdh/RywHiw86fNmzDlj6rf0cSclI3CrCe0sgo7VfywrocTE2jpOEQcvRIq kESb6wRdo8b8usYCV47Z+YLy4sfODv6nPueulgy9C4SI6tc3hAABci56wfCGjJ3b1c0X tMcckljS95L2vIJRAV3yjkNl1b0TPpG4hZ/sOyD7jjpN1lmmU39Yft/6krDbsrhopllP fzFiDKYO1M3bxm5wbE5WK3r2wjYZtUzhGrJCMzOcMWQhBxVLvkPjaJFVlpPXsaVM521/ eZX8skSGOH3pgwHo81wNnSG14WDwFv0shL9vjnWcEQGCofyxc0NoD+mWmFUHdl/ZA7UM F3Qg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IpO7gzWb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y207-v6si5659636pfb.59.2018.11.08.14.16.27; Thu, 08 Nov 2018 14:16:42 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IpO7gzWb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732389AbeKIHpK (ORCPT + 99 others); Fri, 9 Nov 2018 02:45:10 -0500 Received: from mail.kernel.org ([198.145.29.99]:38498 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730886AbeKIHpK (ORCPT ); Fri, 9 Nov 2018 02:45:10 -0500 Received: from localhost (unknown [208.72.13.198]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EF785208A3; Thu, 8 Nov 2018 22:07:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541714859; bh=tC3YHIvhII9MJ5JlslBPNsJD85z13YIbSOgpzCGFUA4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IpO7gzWbt6tQa2pV6OVTc3BOjeisjOjpDH5ik77F77zjIYTWlFNW/Pxpp9SCXIxSb pzOYY0bHWOs35jkRSoOUc/KGQNSJsRWLMxeCoNgO5Yd6GoIfYVCh4Ga8zZq80aKYqU DM7J+4Vvc03wOyCeNZghUVhqGCZPdgdBngMpSVy0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jakub Kicinski , "David S. Miller" Subject: [PATCH 4.9 140/171] net: sched: gred: pass the right attribute to gred_change_table_def() Date: Thu, 8 Nov 2018 13:51:50 -0800 Message-Id: <20181108215137.128769187@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181108215127.257643509@linuxfoundation.org> References: <20181108215127.257643509@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jakub Kicinski [ Upstream commit 38b4f18d56372e1e21771ab7b0357b853330186c ] gred_change_table_def() takes a pointer to TCA_GRED_DPS attribute, and expects it will be able to interpret its contents as struct tc_gred_sopt. Pass the correct gred attribute, instead of TCA_OPTIONS. This bug meant the table definition could never be changed after Qdisc was initialized (unless whatever TCA_OPTIONS contained both passed netlink validation and was a valid struct tc_gred_sopt...). Old behaviour: $ ip link add type dummy $ tc qdisc replace dev dummy0 parent root handle 7: \ gred setup vqs 4 default 0 $ tc qdisc replace dev dummy0 parent root handle 7: \ gred setup vqs 4 default 0 RTNETLINK answers: Invalid argument Now: $ ip link add type dummy $ tc qdisc replace dev dummy0 parent root handle 7: \ gred setup vqs 4 default 0 $ tc qdisc replace dev dummy0 parent root handle 7: \ gred setup vqs 4 default 0 $ tc qdisc replace dev dummy0 parent root handle 7: \ gred setup vqs 4 default 0 Fixes: f62d6b936df5 ("[PKT_SCHED]: GRED: Use central VQ change procedure") Signed-off-by: Jakub Kicinski Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/sched/sch_gred.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/sched/sch_gred.c +++ b/net/sched/sch_gred.c @@ -411,7 +411,7 @@ static int gred_change(struct Qdisc *sch if (tb[TCA_GRED_PARMS] == NULL && tb[TCA_GRED_STAB] == NULL) { if (tb[TCA_GRED_LIMIT] != NULL) sch->limit = nla_get_u32(tb[TCA_GRED_LIMIT]); - return gred_change_table_def(sch, opt); + return gred_change_table_def(sch, tb[TCA_GRED_DPS]); } if (tb[TCA_GRED_PARMS] == NULL ||