On Wed, Jul 19, 2017 at 10:21:10AM +0800, JingPiao Chen wrote:
> Extended ACK reporting introduced by linux kernel commit
> v4.11-rc5-1382-g2d4bc93.
> 
> * netlink.h (NLM_F_CAPPED): New macro.
> * netlink.c (decode_payload): Pass
> nlmsghdr->nlmsg_flags & NLM_F_CAPPED to decode_nlmsgerr.
> (decode_nlmsgerr): Adjust the length pass to
> decode_nlmsghdr_with_payload.
> ---
>  netlink.c | 16 ++++++++++++----
>  netlink.h |  4 ++++
>  2 files changed, 16 insertions(+), 4 deletions(-)
> 
> diff --git a/netlink.c b/netlink.c
> index d3ad8b0..fc440da 100644
> --- a/netlink.c
> +++ b/netlink.c
> @@ -297,7 +297,8 @@ decode_nlmsgerr(struct tcb *const tcp,
>               const int fd,
>               const int family,
>               kernel_ulong_t addr,
> -             kernel_ulong_t len)
> +             kernel_ulong_t len,
> +             const bool capped)
>  {
>       struct nlmsgerr err;
>  
> @@ -320,10 +321,16 @@ decode_nlmsgerr(struct tcb *const tcp,
>       len -= offsetof(struct nlmsgerr, msg);
>  
>       if (len) {
> +             unsigned int payload =
> +                     len > err.msg.nlmsg_len ? err.msg.nlmsg_len : len;

err.msg is not initialized at this point so err.msg.nlmsg_len cannot be used, 
...

> +
> +             if (capped && payload > sizeof(err.msg))
> +                     payload = sizeof(err.msg);
> +
>               tprints(", msg=");
> -             if (fetch_nlmsghdr(tcp, &err.msg, addr, len)) {
> +             if (fetch_nlmsghdr(tcp, &err.msg, addr, payload)) {

... err.msg is valid only if fetch_nlmsghdr returned true.


-- 
ldv

Attachment: signature.asc
Description: PGP signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Strace-devel mailing list
Strace-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/strace-devel

Reply via email to