Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4464605ybz; Tue, 28 Apr 2020 11:44:34 -0700 (PDT) X-Google-Smtp-Source: APiQypI8PMTmGAQjj+oJLBQbKmR4B8mfqpZJJaQz6uW3K1YdoynTE5TIbvbL/pa5UwgFhhZqFQqN X-Received: by 2002:a17:906:d291:: with SMTP id ay17mr26223411ejb.183.1588099474234; Tue, 28 Apr 2020 11:44:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588099474; cv=none; d=google.com; s=arc-20160816; b=PlPoQOYw0GVkXISSqZmzaApFryvO2uKWz/INvGbwj3wySuoSMZtVf9zePaQQlTR6+z 2ltKoybEgLZPbwV1YZcvcKQOm694wLvc2/Sz5mnB/7/0jQZOxS0UOqggMOm2VruHKQCx tEyLP9RnVTJG8i4KXbLlZUh2pkECOc5JWmnSEeWnmWM800fFvZs313D96kKem3REh7OZ 5dOsLPeeAnMTRxb+24h+teZfuV+88Dyo8rhfmGFU7/+7JNBg6CUbuGzabEroWbC1syoW 42Knp7ElxAAff/+ZsMUsRkCO5xqFwg2kWE+QObJXVGlmk+4piVfgv5x7hL4i71UWdMJu L/7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZOryV7y/avYLZnJT4Vk0ivCl+lpl8zJEEARn2DnbRug=; b=s90+XKZqSy9eXAOL6rmzIQUQOfx6smC0iTtXmdm4iY1idHBpnl04oPXHInSoj7Cvtn Y9p/eoXy2ELzVJoY8HyudlbcVA4PUvRvsvnCEbr2yufYeUyAwXPgUT+Tcgf0kzChdzQA UzfK9pDR4iwm2YsUiJGAl5/wQyOFR2erQYkAd4aeRqd1bt+OZEFtXDCxZVVLFe0rqpPm to/NhKgEnr+oVrNw5hSXaqzzfsUMCdSDImA+f2wLWwJiqo65MeVuZvdgUw/y3B6nvGzl MBJeAlLiz+ccFFgWP6+Ki2Hk8YuZddVjtlWRZDcCsaAF41DK5//omWTdRLQBm7BJbDeg 1zig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YTASRnh3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q18si2222208eju.4.2020.04.28.11.44.10; Tue, 28 Apr 2020 11:44:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YTASRnh3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730826AbgD1Skv (ORCPT + 99 others); Tue, 28 Apr 2020 14:40:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:60006 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730813AbgD1Skq (ORCPT ); Tue, 28 Apr 2020 14:40:46 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E85DA2076A; Tue, 28 Apr 2020 18:40:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588099244; bh=j9sdgf05W3pEdBzaJjyGLMM/zKtfpyU1LqRL9WdZ+3s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YTASRnh3HNsehlzbPpvpif2yTg5esnmn3YZqTON2Z0yf4cr62Cp4cQmzweWi0J06i GIcqgkoHOgwRG/vlCsvPGFe1fGIeoJyXB5QCngXY36M8L+erEsW+dqtOZAsWPb4NbW Xr5cEk2bWSSIf1Gf1XSSbvqtH/frCd0i2+r497U0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sabrina Dubroca , "David S. Miller" Subject: [PATCH 5.4 080/168] geneve: use the correct nlattr array in NL_SET_ERR_MSG_ATTR Date: Tue, 28 Apr 2020 20:24:14 +0200 Message-Id: <20200428182242.302536760@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200428182231.704304409@linuxfoundation.org> References: <20200428182231.704304409@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sabrina Dubroca [ Upstream commit 9a7b5b50de8a764671ba1800fe4c52d3b7013901 ] IFLA_GENEVE_* attributes are in the data array, which is correctly used when fetching the value, but not when setting the extended ack. Because IFLA_GENEVE_MAX < IFLA_MAX, we avoid out of bounds array accesses, but we don't provide a pointer to the invalid attribute to userspace. Fixes: a025fb5f49ad ("geneve: Allow configuration of DF behaviour") Signed-off-by: Sabrina Dubroca Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/geneve.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/geneve.c +++ b/drivers/net/geneve.c @@ -1207,7 +1207,7 @@ static int geneve_validate(struct nlattr enum ifla_geneve_df df = nla_get_u8(data[IFLA_GENEVE_DF]); if (df < 0 || df > GENEVE_DF_MAX) { - NL_SET_ERR_MSG_ATTR(extack, tb[IFLA_GENEVE_DF], + NL_SET_ERR_MSG_ATTR(extack, data[IFLA_GENEVE_DF], "Invalid DF attribute"); return -EINVAL; }