diff options
author | Michal Luczaj <[email protected]> | 2024-11-19 14:31:41 +0100 |
---|---|---|
committer | Paolo Abeni <[email protected]> | 2024-11-28 08:57:42 +0100 |
commit | 1465036b10be4b8b00eb31c879e86de633ad74c1 (patch) | |
tree | 1094d8a2f4978549b5d2999fbd7abe780305dcf8 /tools/testing/selftests/bpf/prog_tests/prog_array_init.c | |
parent | 5dfd7d940094e1a1ec974d90f6d28162d372b56b (diff) |
llc: Improve setsockopt() handling of malformed user input
copy_from_sockptr() is used incorrectly: return value is the number of
bytes that could not be copied. Since it's deprecated, switch to
copy_safe_from_sockptr().
Note: Keeping the `optlen != sizeof(int)` check as copy_safe_from_sockptr()
by itself would also accept optlen > sizeof(int). Which would allow a more
lenient handling of inputs.
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Suggested-by: David Wei <[email protected]>
Signed-off-by: Michal Luczaj <[email protected]>
Signed-off-by: Paolo Abeni <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/prog_array_init.c')
0 files changed, 0 insertions, 0 deletions