Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp6825745rwn; Tue, 13 Sep 2022 09:28:39 -0700 (PDT) X-Google-Smtp-Source: AA6agR5wkPKNbK+FBahFYYaJX80SBif8NgHERFpjrILinOOlR7J4pdlbs6L67MDM/6Xt/iB4C9Oc X-Received: by 2002:a05:6a00:1650:b0:52f:20d6:e858 with SMTP id m16-20020a056a00165000b0052f20d6e858mr33234602pfc.36.1663086519333; Tue, 13 Sep 2022 09:28:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663086519; cv=none; d=google.com; s=arc-20160816; b=nTfX3zraTHuonILTQUrjWpkeKkcWyNmNW6IDDRE+W3qdGyn5AmfSuju5I+ggbRHPH9 VyO9bbE051/pReAbKf24Qs0HtOtUXs9ZMlindXknfLY9dOHhHXkEzVtx9i5batWKAre0 xrPEQsgbzFVkDOLa8ffyllmWj9ds1Dv+eAZeIAYBVUgECrFe3EK6nSNbB5wwkRyhB65F gd/j+D/KKvuhZBHfvnMytTCPD7DBY5RM684f3RnuUM3+pAdr3Kguaz3XEgx9QJVJAUkp kFSPZtRdlHBC7qG1VlWdim8NzSxdHwMxJyyizIemULMD6bpusIJe9DgnzkQxdTVnsAKn vKOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=uaAbhwtJ8pUPEg3PKd3LP3ZoRz+eAn95Qk9XZH6vrKA=; b=hm27hVXsmh/JgLtF9E54EcAOcvZKHMnaLBjRT57wwdqxM0jg9rZs/B4/88Ee3o5ugC K+lML5dLAEROePtdM3tlZKIuESjwlMy1OdYDCoC4U0oK9xFgVHVLFTHbya2Kd+BkAjMl yAJCw3gtdzFmzAuFcWHv0+I6rJ9NGH7QbPLu9MfAaqM/vFVgb415PwlNpKE+5FzuakJW sa65MRFfpzd8v56Oj6pt3D4u6hkr7ZVC2xRszxVpAqOIP0DMtrHQufxbF18i9b26zxIV 1pEnuie3HGBANr8JSb5Q4vuA52rbXJefky49WTda75sb2fFjffOWoIZ3W6IsU23RoV7+ cvJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nc0EWZDd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y5-20020a63e245000000b0043439e42c1esi12478610pgj.380.2022.09.13.09.28.20; Tue, 13 Sep 2022 09:28:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nc0EWZDd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235721AbiIMPPm (ORCPT + 99 others); Tue, 13 Sep 2022 11:15:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49130 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235533AbiIMPN1 (ORCPT ); Tue, 13 Sep 2022 11:13:27 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76828785AB; Tue, 13 Sep 2022 07:32:56 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 99779B80EFA; Tue, 13 Sep 2022 14:32:55 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 16E95C433D6; Tue, 13 Sep 2022 14:32:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1663079574; bh=TIzN04pQkyRKLFiVtmEGywdFPVpYhSho/zPXVRszR1w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nc0EWZDdSRfP/uhfXq6icSu2gRJ/Miecm+M/gu1TcgcpyrGM3RcCPp2TvZBjo+f+e /HJ3fZfCZicqcdPlznyxc0vMgK1D6lT9/ZYoVADnjW4DowJy7uTeO6E+CLLoKFQl5i 2JCCvt/V6NF/k+P6qFKnPV1r3JVKzT3yzsi9T0KY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , Cong Wang , Paolo Abeni , Sasha Levin Subject: [PATCH 4.19 72/79] sch_sfb: Also store skb len before calling child enqueue Date: Tue, 13 Sep 2022 16:07:30 +0200 Message-Id: <20220913140352.375955393@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220913140348.835121645@linuxfoundation.org> References: <20220913140348.835121645@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 2f09707d0c972120bf794cfe0f0c67e2c2ddb252 ] Cong Wang noticed that the previous fix for sch_sfb accessing the queued skb after enqueueing it to a child qdisc was incomplete: the SFB enqueue function was also calling qdisc_qstats_backlog_inc() after enqueue, which reads the pkt len from the skb cb field. Fix this by also storing the skb len, and using the stored value to increment the backlog after enqueueing. Fixes: 9efd23297cca ("sch_sfb: Don't assume the skb is still around after enqueueing to child") Signed-off-by: Toke Høiland-Jørgensen Acked-by: Cong Wang Link: https://lore.kernel.org/r/20220905192137.965549-1-toke@toke.dk Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- net/sched/sch_sfb.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/sched/sch_sfb.c b/net/sched/sch_sfb.c index 38cf065156951..a8ef8efa62fc0 100644 --- a/net/sched/sch_sfb.c +++ b/net/sched/sch_sfb.c @@ -285,6 +285,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, { struct sfb_sched_data *q = qdisc_priv(sch); + unsigned int len = qdisc_pkt_len(skb); struct Qdisc *child = q->qdisc; struct tcf_proto *fl; struct sfb_skb_cb cb; @@ -407,7 +408,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, memcpy(&cb, sfb_skb_cb(skb), sizeof(cb)); ret = qdisc_enqueue(skb, child, to_free); if (likely(ret == NET_XMIT_SUCCESS)) { - qdisc_qstats_backlog_inc(sch, skb); + sch->qstats.backlog += len; sch->q.qlen++; increment_qlen(&cb, q); } else if (net_xmit_drop_count(ret)) { -- 2.35.1