Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp7076679rdb; Wed, 3 Jan 2024 04:02:22 -0800 (PST) X-Google-Smtp-Source: AGHT+IG+ZmrjHA1WP1Sh+Rj/BuBvjfIBBDpmZhMfPmXh1mDENFFAuaaGocFCOMwr4LLfeuiBqLKM X-Received: by 2002:a05:651c:552:b0:2cc:2025:5bd5 with SMTP id q18-20020a05651c055200b002cc20255bd5mr8761036ljp.51.1704283342415; Wed, 03 Jan 2024 04:02:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704283342; cv=none; d=google.com; s=arc-20160816; b=QM2kchpuzTa52EzPZcDoj5/7K+XCtTEN3FRaZnudxFmHB0CTuLN6is3IaFE6S6DlP9 43MHRipPJh3fl4UKjqwH4cNjaAB1pk6sfZFvyND8Bzk0RlCeb11kV1G98OKl5d1I0Ezu /XpK8mIygs26her1WAg2uB61514vrbyQ/YbW5oJ4Y/twNHmEBMtKV/gnZFCSDTO6VcWd hfbYPOse9SZjjcr3jBYTwQnZCtvmdoKTGJWLqn/hN4TFK5s9A/7QF/NICubYNfL8l8jA eh8TQK/CmFSpFVFbUbG1FDvG+r1au2eSBM520bOsy6d+UtvWXSBcmkudFtPyajYDpZ98 JcNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:in-reply-to:references:date:message-id:from:subject :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=RvVlRpEmaGol7QalepwiypFrW8hvAegKZ5WO1Px8tvM=; fh=086Z4mTCf5KdB6k4jw6qAr5ci+wpOq8oScjwigduMCo=; b=GKzsslWcePD7qL8E+QOmiiMtdZ1eKyAojZ4gzAPYkgnWkRSBVv12Ut3V7ZmZMxQuBQ eezeMh6LqQgAuCDu7RmLF6b0vZ/aBpY1ps9XvSDunl351vWZCP2xHDOvDiCa+Eq1CLZF kBYZi4BkpSOPul38/s2+yX2wyi5/kUeTuRetfeI+YMaHKUztau4njzLO1ilGibLScF8s XMMWGTtveRyMjZSWyYVc1GjCPb9TXwmUadagP2HPP8ibJppuGeE0+EQThii9tMNkkaMS A1vAWGp8c9nLkz0/7Iu53mwhkyAOWLpswphHP0UillOmsbci3BJ5MMaxEerihTt3ej1/ WkLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ao6Z6y1r; spf=pass (google.com: domain of linux-kernel+bounces-15483-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-15483-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id c22-20020a50d656000000b0055355392427si11647851edj.17.2024.01.03.04.02.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Jan 2024 04:02:22 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-15483-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ao6Z6y1r; spf=pass (google.com: domain of linux-kernel+bounces-15483-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-15483-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 2A1E41F23382 for ; Wed, 3 Jan 2024 12:02:22 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D1F9B199AB; Wed, 3 Jan 2024 12:00:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Ao6Z6y1r" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 160D219458; Wed, 3 Jan 2024 12:00:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id 8A9DBC433C8; Wed, 3 Jan 2024 12:00:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1704283224; bh=WPHbYr0OySUAical7UhRi7PEZSyrOoxFYTW714Fb9Jk=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=Ao6Z6y1rSYB3mMyBe/6QOQW2Iwl6tftMTeATJfK8FBc2j2afTusSxQvrQFfi9N5Ri YqBKwXlARnF6fYRe2PpKSmUZ2luY+BDWE1sZfe6P2qZL7s0TU5LevZrLqOXqI5Dpv8 mBPj5YPvnid2pC9/1BGf5KXD9caSpnXr9nenj7ttGScNLtAWZJeVMR24BA+UO8B0+3 9hib9NhDCbiXzM3L2lw7/HOR0YWHlQsXKKjvEVYIA4hrsicWihpl5KFxU4B7JsuPfj uUaZfibWS6LAYOsuLJVKK6PjmJJVr2psw/cuACPThicVl8RRQQg6lqdDc0iXdflL1X qzZWXiEIRRT6Q== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id 68355C00446; Wed, 3 Jan 2024 12:00:24 +0000 (UTC) Content-Type: text/plain; charset="utf-8" Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH net-next v2] net/sched: cls_api: complement tcf_tfilter_dump_policy From: patchwork-bot+netdevbpf@kernel.org Message-Id: <170428322442.1788.8455879320567617653.git-patchwork-notify@kernel.org> Date: Wed, 03 Jan 2024 12:00:24 +0000 References: <20231228064358.3042747-1-linma@zju.edu.cn> In-Reply-To: <20231228064358.3042747-1-linma@zju.edu.cn> To: Lin Ma Cc: jhs@mojatatu.com, xiyou.wangcong@gmail.com, jiri@resnulli.us, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net-next.git (main) by David S. Miller : On Thu, 28 Dec 2023 14:43:58 +0800 you wrote: > In function `tc_dump_tfilter`, the attributes array is parsed via > tcf_tfilter_dump_policy which only describes TCA_DUMP_FLAGS. However, > the NLA TCA_CHAIN is also accessed with `nla_get_u32`. > > The access to TCA_CHAIN is introduced in commit 5bc1701881e3 ("net: > sched: introduce multichain support for filters") and no nla_policy is > provided for parsing at that point. Later on, tcf_tfilter_dump_policy is > introduced in commit f8ab1807a9c9 ("net: sched: introduce terse dump > flag") while still ignoring the fact that TCA_CHAIN needs a check. This > patch does that by complementing the policy to allow the access > discussed here can be safe as other cases just choose rtm_tca_policy as > the parsing policy. > > [...] Here is the summary with links: - [net-next,v2] net/sched: cls_api: complement tcf_tfilter_dump_policy https://git.kernel.org/netdev/net-next/c/2ab1efad60ad You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html