Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp6775489rwn; Tue, 13 Sep 2022 08:52:33 -0700 (PDT) X-Google-Smtp-Source: AA6agR69eWiaPSOV3noxrxyjrQkSXd43g/r1kZBKd91VxN/NuMIZEh08HW5OYPri9hvX8KG0sPcy X-Received: by 2002:a17:906:974c:b0:773:dcc2:a5dd with SMTP id o12-20020a170906974c00b00773dcc2a5ddmr18696997ejy.452.1663084352799; Tue, 13 Sep 2022 08:52:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663084352; cv=none; d=google.com; s=arc-20160816; b=wkTw6WX0nwL32j5PKt533mrFMS9G/2TLDN1D6pTCfRbAvKJN9wN6Mm51UNjJOwjg0V 9L1muJnQdN47eBa0FTyNuMPnOe2GumDJ5m044YRl1ILkCrt4dGdYWJIfseGnVnqPD4TU FLsKU899LH6weUY8bWVc3N/FGFWasL6buO8kAwZj1cy3e1tlSUrC2VZArnYFtKETRzyE L14hrjGdZQNrd6EmGTW1brIBV8+aMzQEv2G7SFsbj7FS3n818z2GnyAFRu9Y4yeZLmAJ jtRCGthxQPH2i2sswaqJpS70ujEzZtQMZvIADzc0qWpoRvODFtTQnhqzVsmNUydDoije OSZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RgTPS2vPwT/GrgqFq15P0FTfCHouusIS0pfa2Ha/5yU=; b=IgkJA7pMaIsolWjMMEiMn1GXk47UCMk6CzcflUEYXBf8Yk5TLaBMUJotmmFSiBHEUo q5etj5Q3BTQM1lMPdROwL4D2wqbQrJp08MUoUfZdwYS2GLoAv9oUj0OLLnTC++x/WtAr BqfSkEEWfs5EBUBkK22hxukId6FY3ZWTiZEn6NmY1CtHjiOjwb4aAhFRAWv6JLPnC6yu EWx1exKyL341woGKkLlDFsTjvCd+Lc+VRFqwrJ6vhKKAYKxUuW3v4X3x+wDhwAgmrLT0 XqJ4X2FaEaweJyZi3bOmF7NlLzJkcxZ5TYqu83T+7oQ+DsKDVxqyaklMRESAbBfZBzQl tlJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=R2M3HDyI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m16-20020a056402511000b0045093559f1dsi10396639edd.509.2022.09.13.08.52.06; Tue, 13 Sep 2022 08:52:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=R2M3HDyI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236475AbiIMPae (ORCPT + 99 others); Tue, 13 Sep 2022 11:30:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37040 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236496AbiIMP2w (ORCPT ); Tue, 13 Sep 2022 11:28:52 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 16CAC7E02E; Tue, 13 Sep 2022 07:39:23 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 047D4B8101C; Tue, 13 Sep 2022 14:37:35 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4B154C433C1; Tue, 13 Sep 2022 14:37:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1663079853; bh=euhJ2/TXn6UNvyYTMzYZxk1kZI9hiKpv+HLAgyL+0lg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=R2M3HDyI4aH2vxucO0PtViyxfsCTOFsDVRnYKiz6E6czfSufd1Cfr+FY9Z90n2tkj DeEm4hH4Aao1pMTBYN2qn9Q9uNk2XyQaJMczSe324TSi04MVNeDWkOO+k9Dk+D7edm P8cszJHIk+ioEUu/RautAH+Ngc2At1E4UQZIfpeg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , Cong Wang , Paolo Abeni , Sasha Levin Subject: [PATCH 4.9 39/42] sch_sfb: Also store skb len before calling child enqueue Date: Tue, 13 Sep 2022 16:08:10 +0200 Message-Id: <20220913140344.361017922@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220913140342.228397194@linuxfoundation.org> References: <20220913140342.228397194@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 2f09707d0c972120bf794cfe0f0c67e2c2ddb252 ] Cong Wang noticed that the previous fix for sch_sfb accessing the queued skb after enqueueing it to a child qdisc was incomplete: the SFB enqueue function was also calling qdisc_qstats_backlog_inc() after enqueue, which reads the pkt len from the skb cb field. Fix this by also storing the skb len, and using the stored value to increment the backlog after enqueueing. Fixes: 9efd23297cca ("sch_sfb: Don't assume the skb is still around after enqueueing to child") Signed-off-by: Toke Høiland-Jørgensen Acked-by: Cong Wang Link: https://lore.kernel.org/r/20220905192137.965549-1-toke@toke.dk Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- net/sched/sch_sfb.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/sched/sch_sfb.c b/net/sched/sch_sfb.c index 592189427a09f..2973d82fb21cc 100644 --- a/net/sched/sch_sfb.c +++ b/net/sched/sch_sfb.c @@ -281,6 +281,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, { struct sfb_sched_data *q = qdisc_priv(sch); + unsigned int len = qdisc_pkt_len(skb); struct Qdisc *child = q->qdisc; struct tcf_proto *fl; struct sfb_skb_cb cb; @@ -403,7 +404,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, memcpy(&cb, sfb_skb_cb(skb), sizeof(cb)); ret = qdisc_enqueue(skb, child, to_free); if (likely(ret == NET_XMIT_SUCCESS)) { - qdisc_qstats_backlog_inc(sch, skb); + sch->qstats.backlog += len; sch->q.qlen++; increment_qlen(&cb, q); } else if (net_xmit_drop_count(ret)) { -- 2.35.1