Message ID | 1683276658-2860-1-git-send-email-yangpc@wangsu.com (mailing list archive) |
---|---|
State | Accepted |
Commit | f4dea9689c5fea3d07170c2cb0703e216f1a0922 |
Delegated to: | BPF |
Headers | show |
Series | [bpf] samples/bpf: Fix buffer overflow in tcp_basertt | expand |
Hello: This patch was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Fri, 5 May 2023 16:50:58 +0800 you wrote: > Using sizeof(nv) or strlen(nv)+1 is correct. > > Fixes: c890063e4404 ("bpf: sample BPF_SOCKET_OPS_BASE_RTT program") > Signed-off-by: Pengcheng Yang <yangpc@wangsu.com> > --- > samples/bpf/tcp_basertt_kern.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) Here is the summary with links: - [bpf] samples/bpf: Fix buffer overflow in tcp_basertt https://git.kernel.org/bpf/bpf-next/c/f4dea9689c5f You are awesome, thank you!
diff --git a/samples/bpf/tcp_basertt_kern.c b/samples/bpf/tcp_basertt_kern.c index 8dfe09a92fec..822b0742b815 100644 --- a/samples/bpf/tcp_basertt_kern.c +++ b/samples/bpf/tcp_basertt_kern.c @@ -47,7 +47,7 @@ int bpf_basertt(struct bpf_sock_ops *skops) case BPF_SOCK_OPS_BASE_RTT: n = bpf_getsockopt(skops, SOL_TCP, TCP_CONGESTION, cong, sizeof(cong)); - if (!n && !__builtin_memcmp(cong, nv, sizeof(nv)+1)) { + if (!n && !__builtin_memcmp(cong, nv, sizeof(nv))) { /* Set base_rtt to 80us */ rv = 80; } else if (n) {
Using sizeof(nv) or strlen(nv)+1 is correct. Fixes: c890063e4404 ("bpf: sample BPF_SOCKET_OPS_BASE_RTT program") Signed-off-by: Pengcheng Yang <yangpc@wangsu.com> --- samples/bpf/tcp_basertt_kern.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)