Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp6831037rwn; Tue, 13 Sep 2022 09:32:37 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5dLTJIBQk6JuLtyCTYCZUBhecB1xgFz7LMA+UuModllPv6Sxl4osJFQVA9TDCDjBIpc+x4 X-Received: by 2002:a17:90b:380b:b0:203:5fa:8c9 with SMTP id mq11-20020a17090b380b00b0020305fa08c9mr120436pjb.13.1663086757343; Tue, 13 Sep 2022 09:32:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663086757; cv=none; d=google.com; s=arc-20160816; b=raMOQCQsQ/qb1JqDrYR2LDlqcygYKGfthHaVUBr30LUwGovpLDJjBvMGg2797/uviT 15tvUkg6zK3uld5d2TsiiDiQgTgMgQnMNrMSnGotLYuBWMstMVxnl8b0ddhQr8LZv47r PYUdehN6blcr/A7B2f8lwZDw8+Ke3NR2XuukHeKUY+wt03JU7O1AZhlWU2BFJIV6siOs f5rv7y0IQQU693dSOk7F/xIdh4Ts2+i1oGiraWlm+hKcEHahu4ct3JoJSIk1bBNPtwVN sldPnZ150AE74YE0KmhbMkyvHzZJaRYLxhtgKApHP5oxWDtZXwZrwioIbejHpH9uDpUc ONmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=D5QUIOSQ0aPBipjgtjUbIbpOrnz8zBn/3Cpk9l4r/Cs=; b=BWde+k76DPc5MU869Yg/0NHsJZL7HYfwqVyPq7C9BvyZO5tHL70sOdvcpGlaGvlAd0 88/DAtrReLsM0LLFR7ESIIwEM4m+Jbcv+YR+ITRoE3KIOFxW91poqLZcuS9cROALyw67 GAYOhhjENfd7mdlL2R4yrCg5ehoF/mCkwGWGIOxivKJi6dkoOOpBZ/FJxySe90epUcDN 3sVzHaucrMI7a14rS4OnfGM4IvYEv7kYjdQFV00j3DZ4QOYOJfhsE64fQIcqv+hl/587 qlj55fI5nIP7PHaY8eJmHkhiDD+DJKy7WAO5gvoo/zPPW88E/iWK5gwozctydm4hxR30 Oq6g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rVU7+uIx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 188-20020a6216c5000000b00538f1532fa3si10310337pfw.315.2022.09.13.09.32.23; Tue, 13 Sep 2022 09:32:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=rVU7+uIx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233206AbiIMPky (ORCPT + 99 others); Tue, 13 Sep 2022 11:40:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51332 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234219AbiIMPkG (ORCPT ); Tue, 13 Sep 2022 11:40:06 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2B503F1FA; Tue, 13 Sep 2022 07:45:12 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id CC7A1B81017; Tue, 13 Sep 2022 14:36:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3684CC433C1; Tue, 13 Sep 2022 14:36:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1663079762; bh=M73bX+LP+zY4u4erhlSkaoaIApdxC197uCSuRUq4k/A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rVU7+uIxeJLobHdFCEpbgt9kD1u6OoegvBixR1EdGucVdqEXN8HLIUhN4TP+TkDol F2bui9t5LWY2Z1qUdLXCluiLkiyRPjyoyR5NMQtGeoPw6eWbJLSCHDE0jrejG83vP2 xPLQuTZ6wJujRdIhsOuNyeTBpNQRCC7NLu1w8CNU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Toke=20H=C3=B8iland-J=C3=B8rgensen?= , Cong Wang , Paolo Abeni , Sasha Levin Subject: [PATCH 4.14 56/61] sch_sfb: Also store skb len before calling child enqueue Date: Tue, 13 Sep 2022 16:07:58 +0200 Message-Id: <20220913140349.260391735@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220913140346.422813036@linuxfoundation.org> References: <20220913140346.422813036@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Toke Høiland-Jørgensen [ Upstream commit 2f09707d0c972120bf794cfe0f0c67e2c2ddb252 ] Cong Wang noticed that the previous fix for sch_sfb accessing the queued skb after enqueueing it to a child qdisc was incomplete: the SFB enqueue function was also calling qdisc_qstats_backlog_inc() after enqueue, which reads the pkt len from the skb cb field. Fix this by also storing the skb len, and using the stored value to increment the backlog after enqueueing. Fixes: 9efd23297cca ("sch_sfb: Don't assume the skb is still around after enqueueing to child") Signed-off-by: Toke Høiland-Jørgensen Acked-by: Cong Wang Link: https://lore.kernel.org/r/20220905192137.965549-1-toke@toke.dk Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- net/sched/sch_sfb.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/sched/sch_sfb.c b/net/sched/sch_sfb.c index 8f924defa98d0..9962a49989938 100644 --- a/net/sched/sch_sfb.c +++ b/net/sched/sch_sfb.c @@ -284,6 +284,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, { struct sfb_sched_data *q = qdisc_priv(sch); + unsigned int len = qdisc_pkt_len(skb); struct Qdisc *child = q->qdisc; struct tcf_proto *fl; struct sfb_skb_cb cb; @@ -406,7 +407,7 @@ static int sfb_enqueue(struct sk_buff *skb, struct Qdisc *sch, memcpy(&cb, sfb_skb_cb(skb), sizeof(cb)); ret = qdisc_enqueue(skb, child, to_free); if (likely(ret == NET_XMIT_SUCCESS)) { - qdisc_qstats_backlog_inc(sch, skb); + sch->qstats.backlog += len; sch->q.qlen++; increment_qlen(&cb, q); } else if (net_xmit_drop_count(ret)) { -- 2.35.1