> On Nov 5, 2020, at 4:06 PM, Daniel Xu <d...@dxuuu.xyz> wrote:
> 
> Previously, bpf_probe_read_user_str() could potentially overcopy the
> trailing bytes after the NUL due to how do_strncpy_from_user() does the
> copy in long-sized strides. The issue has been fixed in the previous
> commit.
> 
> This commit adds a selftest that ensures we don't regress
> bpf_probe_read_user_str() again.
> 
> Signed-off-by: Daniel Xu <d...@dxuuu.xyz>

LGTM!

Acked-by: Song Liu <songliubrav...@fb.com>

[...]

Reply via email to