> On Nov 5, 2020, at 4:06 PM, Daniel Xu <d...@dxuuu.xyz> wrote: > > Previously, bpf_probe_read_user_str() could potentially overcopy the > trailing bytes after the NUL due to how do_strncpy_from_user() does the > copy in long-sized strides. The issue has been fixed in the previous > commit. > > This commit adds a selftest that ensures we don't regress > bpf_probe_read_user_str() again. > > Signed-off-by: Daniel Xu <d...@dxuuu.xyz> LGTM! Acked-by: Song Liu <songliubrav...@fb.com> [...]
- [PATCH bpf v4 0/2] Fix bpf_probe_read_user_str() overcopyi... Daniel Xu
- [PATCH bpf v4 2/2] selftest/bpf: Test bpf_probe_read_... Daniel Xu
- Re: [PATCH bpf v4 2/2] selftest/bpf: Test bpf_pro... Song Liu
- Re: [PATCH bpf v4 2/2] selftest/bpf: Test bpf_pro... Andrii Nakryiko
- [PATCH bpf v4 1/2] lib/strncpy_from_user.c: Don't ove... Daniel Xu