mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2024-12-29 09:13:38 +00:00
samples/bpf: Fix buffer overflow in tcp_basertt
Using sizeof(nv) or strlen(nv)+1 is correct.
Fixes: c890063e44
("bpf: sample BPF_SOCKET_OPS_BASE_RTT program")
Signed-off-by: Pengcheng Yang <yangpc@wangsu.com>
Link: https://lore.kernel.org/r/1683276658-2860-1-git-send-email-yangpc@wangsu.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
parent
6953518629
commit
f4dea9689c
@ -47,7 +47,7 @@ int bpf_basertt(struct bpf_sock_ops *skops)
|
|||||||
case BPF_SOCK_OPS_BASE_RTT:
|
case BPF_SOCK_OPS_BASE_RTT:
|
||||||
n = bpf_getsockopt(skops, SOL_TCP, TCP_CONGESTION,
|
n = bpf_getsockopt(skops, SOL_TCP, TCP_CONGESTION,
|
||||||
cong, sizeof(cong));
|
cong, sizeof(cong));
|
||||||
if (!n && !__builtin_memcmp(cong, nv, sizeof(nv)+1)) {
|
if (!n && !__builtin_memcmp(cong, nv, sizeof(nv))) {
|
||||||
/* Set base_rtt to 80us */
|
/* Set base_rtt to 80us */
|
||||||
rv = 80;
|
rv = 80;
|
||||||
} else if (n) {
|
} else if (n) {
|
||||||
|
Loading…
Reference in New Issue
Block a user