Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4451881ybz; Tue, 28 Apr 2020 11:31:59 -0700 (PDT) X-Google-Smtp-Source: APiQypIB5ITGW5H2IS1+POERsHEpYyR8prdhZlQ54fZBj0Lyj/na2tQNbAL1IOf3TnUw38KX01CZ X-Received: by 2002:aa7:dd84:: with SMTP id g4mr24575967edv.273.1588098719146; Tue, 28 Apr 2020 11:31:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588098719; cv=none; d=google.com; s=arc-20160816; b=SBXfnCnbve4V0/+jCYUbRC7GF2Pv4gsmNE5zipVhW6drhR5DjuoRwHPxy6+lMZCIa+ O/6uMyHAi3/5htff6ld3sjw8wy3EUqsYt9I02RBSKL5DAVyHctFveR0CCH4S/qXAJf8H j3cmm+qunhEZlfc84vGkZ24jzRZf8XygsmC6zCoVglp2MdTX6Enq6i8NyigTfnRzktMb Nz0I8X2c5d8jAV+VA6KKQOfnQKjhfLzg0vLXvofwvq6/dOpUAIdn5TWY39Ov/Vko+ZVG xEcQNnIkENfy3ZaB15v+9nl7yzxRhaga3frdq7+K1GwEAtGlFG/pPudvTE6y7AHWFq89 eiWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZOryV7y/avYLZnJT4Vk0ivCl+lpl8zJEEARn2DnbRug=; b=W/oERDFO25I6WTZn49X5/zqVhDs2DgUbC/thckQrsDNXb25i5CtHkgDxli37I+Zc6e Bxffo5cEo10RoXAdCGHU7eZOD3XEjZFYMQ+y6AYnbqJZn6fUM5plbChdxl0tcIOwz4tG sP1DmElg5m+Ro/EV9JzJ+3UAilYZCygtLrYeus0AOgsSsY+aFIvwwyKNjp7/8Yx1W6TW x1Mo07mL+voNldUuThxHCbn3mk3M9k5U2CwazyEByhGeRsfBdvAXLMRbfdzRzRPEry5c hypm7QT4Pki7IuwSF7BbjHGTw8mv9d4dlcZBZdMyLu0+PzAeqPiDBZKhDMU7nrqKyD0l ZlBQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gJnwlIzP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r24si2024187edm.269.2020.04.28.11.31.35; Tue, 28 Apr 2020 11:31:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gJnwlIzP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728784AbgD1S3P (ORCPT + 99 others); Tue, 28 Apr 2020 14:29:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:42752 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728712AbgD1S3L (ORCPT ); Tue, 28 Apr 2020 14:29:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 898BD208E0; Tue, 28 Apr 2020 18:29:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588098551; bh=j9sdgf05W3pEdBzaJjyGLMM/zKtfpyU1LqRL9WdZ+3s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gJnwlIzPyfAw6jT8EYm+VdZ+tGhZeywYEQyhVyKhZds1BIvsX0bM/T2JEzL3FoWv+ oUrUV32csHD1ydUswIOFf7aiBjWED5FMGAG75eLf8Ol9sQuxb2GY+JrtZihJhQmcU+ gnoUS11uczj5MsxdznT5rO6LnAPiR5ptpupBMpws= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sabrina Dubroca , "David S. Miller" Subject: [PATCH 5.6 071/167] geneve: use the correct nlattr array in NL_SET_ERR_MSG_ATTR Date: Tue, 28 Apr 2020 20:24:07 +0200 Message-Id: <20200428182233.921860950@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200428182225.451225420@linuxfoundation.org> References: <20200428182225.451225420@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sabrina Dubroca [ Upstream commit 9a7b5b50de8a764671ba1800fe4c52d3b7013901 ] IFLA_GENEVE_* attributes are in the data array, which is correctly used when fetching the value, but not when setting the extended ack. Because IFLA_GENEVE_MAX < IFLA_MAX, we avoid out of bounds array accesses, but we don't provide a pointer to the invalid attribute to userspace. Fixes: a025fb5f49ad ("geneve: Allow configuration of DF behaviour") Signed-off-by: Sabrina Dubroca Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/geneve.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/geneve.c +++ b/drivers/net/geneve.c @@ -1207,7 +1207,7 @@ static int geneve_validate(struct nlattr enum ifla_geneve_df df = nla_get_u8(data[IFLA_GENEVE_DF]); if (df < 0 || df > GENEVE_DF_MAX) { - NL_SET_ERR_MSG_ATTR(extack, tb[IFLA_GENEVE_DF], + NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_DF], "Invalid DF attribute"); return -EINVAL; }