Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp6825450rwn; Tue, 13 Sep 2022 09:28:24 -0700 (PDT) X-Google-Smtp-Source: AA6agR4DGXgkGXpNBJu9h6Hi83JwQihCSvaWV8kCL158wZ0xcsEx5wBT3ePYMOZ85absCTdXKvR3 X-Received: by 2002:a17:902:e80b:b0:176:de36:f5a8 with SMTP id u11-20020a170902e80b00b00176de36f5a8mr32781574plg.127.1663086504328; Tue, 13 Sep 2022 09:28:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663086504; cv=none; d=google.com; s=arc-20160816; b=smoHU0UcDEvb+2NB9nqxpXOGY9MAdBV+IFWO3DLECnPzi9AVTNTU6Uv6nadnhg8yL7 PiDzPOW68uFYqqhcfJi2eZ0eE+do01IqWvWXQAD0JHHOFQyR29ISGGW7JuZtZ8c3XSK0 HrBlKCG+65PAxFcOEQEJk0/Dq74B0Jcy8estbGf1zTDtB71yUuvbG+xVgMGm0D/sUO70 lq1m+7j/Ffe9LKwIQPx0JCrcGlV788tRlZF9gWtMAIo0UzIzI05Z0ZwERcL1bEwD9pX9 SEUmYr83EqEhEXKCePwFUIb32mGTRZdO8x6ZDTqP8pvLMMhLw/A43dCApVYyN+seSbw0 hf2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dwwCPrusnPb6nFKWj3pI9PFOed6y2ukvL9Mjws69D0M=; b=fBdN8hYkA/9Wdq1QdJO9yF4nYvt/wWjS3FgTxynsOqdZxM1zIpPLcRDW3o99qIrB4x Kof6Xpu9qPyzTNNfG+Pg4kHHPTfWB8vuTLfIYNhOxRSGOx8Bm85qmc1qKizN+QNIrHV3 guiyAoXl97CmW/kNlAO/Vu8cZpU37BKdxs4dC7WCq+T13fHwMOeyle3zZFghJPfn/aPF FRa9ZYo4v1UwTIjUAOGk9q8c8fmu5EhN6doKkY/vxRfINkB1JWK8y8kWZGZlaiOOqkXl XbUFKdQXiZ1yZclpizgJ5Gxl5PSa6xsqNnVrbJdaj0MBdKcswDFL9ZpKDnS+Y9phSslt ykOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eRVAdNQu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 198-20020a6300cf000000b0041c26691e57si12324904pga.725.2022.09.13.09.28.11; Tue, 13 Sep 2022 09:28:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eRVAdNQu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235461AbiIMPIV (ORCPT + 99 others); Tue, 13 Sep 2022 11:08:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60650 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235170AbiIMPHI (ORCPT ); Tue, 13 Sep 2022 11:07:08 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D4AC754BF; Tue, 13 Sep 2022 07:30:42 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 82269614B4; Tue, 13 Sep 2022 14:29:27 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9C972C433C1; Tue, 13 Sep 2022 14:29:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1663079366; bh=W6VLe/hXXF3fX2MG1kNCDOhngH70KjD6bZGLtVEcEGQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eRVAdNQuTs9BJe9+Z6z/8HE3CLA0S9I/Ni0Hw7y0L5THJ6Ywawhb7qOIvmPb8pF1B MGe1RkrzV9QFw+ZhtdwmjE0CF/l5V3huOjNPci+2NKYdQPa6U2mNTYp3XODdVYJ9m2 8uBqfY7+PaEZ2oJHIUkg441GUWTXZoB4Gxpz6i44= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , Cong Wang , Paolo Abeni , Sasha Levin Subject: [PATCH 5.4 106/108] sch_sfb: Also store skb len before calling child enqueue Date: Tue, 13 Sep 2022 16:07:17 +0200 Message-Id: <20220913140358.178768512@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220913140353.549108748@linuxfoundation.org> References: <20220913140353.549108748@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 2f09707d0c972120bf794cfe0f0c67e2c2ddb252 ] Cong Wang noticed that the previous fix for sch_sfb accessing the queued skb after enqueueing it to a child qdisc was incomplete: the SFB enqueue function was also calling qdisc_qstats_backlog_inc() after enqueue, which reads the pkt len from the skb cb field. Fix this by also storing the skb len, and using the stored value to increment the backlog after enqueueing. Fixes: 9efd23297cca ("sch_sfb: Don't assume the skb is still around after enqueueing to child") Signed-off-by: Toke Høiland-Jørgensen Acked-by: Cong Wang Link: https://lore.kernel.org/r/20220905192137.965549-1-toke@toke.dk Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- net/sched/sch_sfb.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/sched/sch_sfb.c b/net/sched/sch_sfb.c index 085fe06da2a68..3aa6b4dcb1c8e 100644 --- a/net/sched/sch_sfb.c +++ b/net/sched/sch_sfb.c @@ -281,6 +281,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, { struct sfb_sched_data *q = qdisc_priv(sch); + unsigned int len = qdisc_pkt_len(skb); struct Qdisc *child = q->qdisc; struct tcf_proto *fl; struct sfb_skb_cb cb; @@ -403,7 +404,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, memcpy(&cb, sfb_skb_cb(skb), sizeof(cb)); ret = qdisc_enqueue(skb, child, to_free); if (likely(ret == NET_XMIT_SUCCESS)) { - qdisc_qstats_backlog_inc(sch, skb); + sch->qstats.backlog += len; sch->q.qlen++; increment_qlen(&cb, q); } else if (net_xmit_drop_count(ret)) { -- 2.35.1