Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7206518yba; Thu, 2 May 2019 06:12:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqy+JHLO6B3kwVDwuAaxeK2IOu50GvILFqOULO0yfbNlq5aaJXGA7KGGkLkRdw/G3sIlDROZ X-Received: by 2002:a17:902:2f:: with SMTP id 44mr3691878pla.137.1556802719899; Thu, 02 May 2019 06:11:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556802719; cv=none; d=google.com; s=arc-20160816; b=U59RoUdRNkSQ970+qlbPwQM5whlVBaybXrKfox1XnkrDuFtC82Zs8LJFGGpW4ezmE2 Or4PQlxZW5rfVXOmGZgU/SAKP/T93ODh+gzeKAIMmdc2C70EbkAIWT7CGc6aaTQVTRRm 9R0MFyLaCMaCkWZbcys2WnA1eYEqWrVAjX2Qs01W5EK/7fm0zj1kT1YwH9VgzSmqAowG ddETBgeqNXg6drpiqBAGfwp703s7yPWiGVUoqPNpS9DRDOzHzyfFr2bR6xJzqTU/JRR0 tbGvUS0q7QCTg2J6iKMF+X5pYFasT5IkkKOV16LXomPHe8oqgrUuh6cZYfEvrPlwtBXv 051g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=B42ONiV5x5mrynYAaEgdVm5xnWAFpahkcB5bzG193gA=; b=Ns1AhxHnKpKg+KqZ1ui26saXtG+xEBthvKU0V8XLHUzyMOfhMOR0wn5DN7xHpqGiQD b9UwDOqtyPD7Uv5elkMu1nwR2vUQTyDMQTgG73ZNLsDn5PYDR07bFlUl1Aes4TgTbLE/ c4l5zG0sKO6mz5zHyCsE6tACPmfWqprydM4TvOkfbkZIKKyq2bzt4MHTII5NF6RrVRWb dEQhrhTHvZzriQiGqkZZan88P4Lv69BYDI1m92Q0CF6EDedSNx6ChTXwKjIY2eHvMJr5 T8OYwNXn3dJdSFeOZiw9dcGXXJ2FvxK7ws7QgewmNOlLxbbd6eBGpdEAESgp2SoFufsT DBtQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1si43517448pls.64.2019.05.02.06.11.44; Thu, 02 May 2019 06:11:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726512AbfEBNKZ (ORCPT + 99 others); Thu, 2 May 2019 09:10:25 -0400 Received: from mx2.suse.de ([195.135.220.15]:37604 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726203AbfEBNKY (ORCPT ); Thu, 2 May 2019 09:10:24 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id A8FF7AD3E; Thu, 2 May 2019 13:10:23 +0000 (UTC) Received: by unicorn.suse.cz (Postfix, from userid 1000) id 1DDCAE0117; Thu, 2 May 2019 15:10:23 +0200 (CEST) Date: Thu, 2 May 2019 15:10:23 +0200 From: Michal Kubecek To: Johannes Berg Cc: "David S. Miller" , "netdev@vger.kernel.org" , David Ahern , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH net-next 1/3] genetlink: do not validate dump requests if there is no policy Message-ID: <20190502131023.GD21672@unicorn.suse.cz> References: <0a54a4db49c20e76a998ea3e4548b22637fbad34.1556798793.git.mkubecek@suse.cz> <031933f3fc4b26e284912771b480c87483574bea.camel@sipsolutions.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <031933f3fc4b26e284912771b480c87483574bea.camel@sipsolutions.net> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 02, 2019 at 02:51:33PM +0200, Johannes Berg wrote: > On Thu, 2019-05-02 at 12:48 +0000, Michal Kubecek wrote: > > Unlike do requests, dump genetlink requests now perform strict validation > > by default even if the genetlink family does not set policy and maxtype > > because it does validation and parsing on its own (e.g. because it wants to > > allow different message format for different commands). While the null > > policy will be ignored, maxtype (which would be zero) is still checked so > > that any attribute will fail validation. > > > > The solution is to only call __nla_validate() from genl_family_rcv_msg() > > if family->maxtype is set. > > D'oh. Which family was it that you found this on? I checked only ones > with policy I guess. It was with my ethtool netlink series (still work in progress). Michal > Reviewed-by: Johannes Berg > > johannes >