Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > > > This is what I originally thought. But all of the nla_* functions use > > > the nla_len to know length of the string coming from userspace, so > > > they don't rely on the trailing nul-termination. > > > > Indeed. I reviewed this again but only 'bug' I spotted: > > > > nf_tables_chain_type_lookup() does: > > request_module("nft-chain-%u-%*.s", .... > > > > ('%.*s' was probably intended). Its harmless though as NFTA_CHAIN_TYPE is > > NLA_NUL_STR so the erroneous fmt could also be changed to plain %s. > > I think we can change that to NLA_STRING to make it consistent with > other attributes. libnftnl is anyway sending the nul-termination all > the time, so nothing should break IMO. Right, but the kernel shouldn't rely on that :) I see no problem converting it to NLA_STRING (if request_module args are fixed). -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html