From mboxrd@z Thu Jan 1 00:00:00 1970 From: Johannes Berg Subject: Re: [PATCH v4] af_netlink: ensure that NLMSG_DONE never fails in dumps Date: Sat, 11 Nov 2017 15:18:00 +0100 Message-ID: <1510409880.12037.5.camel@sipsolutions.net> References: <20171109014218.20562-1-Jason@zx2c4.com> <20171109040444.1728-1-Jason@zx2c4.com> <20171111.230924.412544731735070222.davem@davemloft.net> <1510409721.12037.3.camel@sipsolutions.net> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org To: David Miller , Jason@zx2c4.com Return-path: In-Reply-To: <1510409721.12037.3.camel@sipsolutions.net> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org > > If you're handling this by forcing another read() to procude the > > NLMSG_DONE, then you have no reason to WARN_ON() here. > > > > In fact you are adding a WARN_ON() which is trivially triggerable by > > any user. > > I added this in my suggestion for how this could work, but I don't > think you're right, since we previously check if there's enough space. Or perhaps I should say this differently: Forcing another read happens through the skb_tailroom(skb) < nlmsg_total_size(...) check, so the nlmsg_put_answer() can't really fail. Handling nlmsg_put_answer() failures by forcing another read would have required jumping to the existing if code with a goto, or restructuring the whole thing completely somehow, and I didn't see how to do that. johannes