> On Nov 5, 2020, at 4:06 PM, Daniel Xu <[email protected]> wrote: > > Previously, bpf_probe_read_user_str() could potentially overcopy the > trailing bytes after the NUL due to how do_strncpy_from_user() does the > copy in long-sized strides. The issue has been fixed in the previous > commit. > > This commit adds a selftest that ensures we don't regress > bpf_probe_read_user_str() again. > > Signed-off-by: Daniel Xu <[email protected]> LGTM! Acked-by: Song Liu <[email protected]> [...]
- [PATCH bpf v4 0/2] Fix bpf_probe_read_user_str() overcopyi... Daniel Xu
- [PATCH bpf v4 2/2] selftest/bpf: Test bpf_probe_read_... Daniel Xu
- Re: [PATCH bpf v4 2/2] selftest/bpf: Test bpf_pro... Song Liu
- Re: [PATCH bpf v4 2/2] selftest/bpf: Test bpf_pro... Andrii Nakryiko
- [PATCH bpf v4 1/2] lib/strncpy_from_user.c: Don't ove... Daniel Xu

