From mboxrd@z Thu Jan 1 00:00:00 1970 From: Samir Bellabes Subject: Re: [RFC 7/9] snet: introduce snet_netlink.c and snet_netlink.h Date: Sun, 17 Jan 2010 06:42:48 +0100 Message-ID: References: <1262437456-24476-1-git-send-email-sam@synack.fr> <1262437456-24476-8-git-send-email-sam@synack.fr> <4B420464.3040301@trash.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: linux-security-module@vger.kernel.org, jamal , Evgeniy Polyakov , Neil Horman , netdev@vger.kernel.org, netfilter-devel@vger.kernel.org To: Patrick McHardy Return-path: Received: from bob75-7-88-160-5-175.fbx.proxad.net ([88.160.5.175]:46808 "EHLO cerbere.dyndns.info" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750831Ab0AQFmv (ORCPT ); Sun, 17 Jan 2010 00:42:51 -0500 In-Reply-To: <4B420464.3040301@trash.net> (Patrick McHardy's message of "Mon, 04 Jan 2010 16:08:20 +0100") Sender: netdev-owner@vger.kernel.org List-ID: Patrick McHardy writes: > Samir Bellabes wrote: >> + skb_rsp = genlmsg_new(NLMSG_GOODSIZE, GFP_KERNEL); >> + if (skb_rsp == NULL) >> + return 0; > > You could decrease the chance of rcvqueue overflow by using a smaller > allocation size. I took care of this by calculating the exact needed size. thanks, sam