From mboxrd@z Thu Jan 1 00:00:00 1970 From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= Subject: Re: [PATCH 1/4] sched: Avoid dereferencing skb pointer after child enqueue Date: Wed, 09 Jan 2019 09:14:10 +0100 Message-ID: <871s5muu25.fsf@toke.dk> References: <20190107194733.31138-1-toke@toke.dk> <20190107194733.31138-2-toke@toke.dk> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Cc: Linux Kernel Network Developers , Cake List , Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= To: Cong Wang Return-path: Received: from mail.toke.dk ([52.28.52.200]:56653 "EHLO mail.toke.dk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725865AbfAIIOO (ORCPT ); Wed, 9 Jan 2019 03:14:14 -0500 In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: Cong Wang writes: > On Mon, Jan 7, 2019 at 11:50 AM Toke H=C3=B8iland-J=C3=B8rgensen wrote: >> @@ -1254,7 +1256,7 @@ static int qfq_enqueue(struct sk_buff *skb, struct= Qdisc *sch, >> if (cl->qdisc->q.qlen !=3D 1) { >> if (unlikely(skb =3D=3D cl->qdisc->ops->peek(cl->qdisc))= && > > > Isn't this comparison problematic too? While you are on it... Well, I was only looking at safety issues, and since it's not dereferencing the pointer, that's not really an issue here. The check is just going to always fail if GSO splitting is enabled. Which I'm not actually sure is an error in this case? -Toke