[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <a428fb88-9b53-27dd-a195-497755944921@iogearbox.net>
Date: Tue, 17 Mar 2020 21:08:04 +0100
From: Daniel Borkmann <daniel@...earbox.net>
To: Martin KaFai Lau <kafai@...com>, bpf@...r.kernel.org
Cc: Alexei Starovoitov <ast@...nel.org>, kernel-team@...com,
netdev@...r.kernel.org
Subject: Re: [PATCH v3 bpf] bpf: Sanitize the bpf_struct_ops tcp-cc name
On 3/14/20 2:02 AM, Martin KaFai Lau wrote:
> The bpf_struct_ops tcp-cc name should be sanitized in order to
> avoid problematic chars (e.g. whitespaces).
>
> This patch reuses the bpf_obj_name_cpy() for accepting the same set
> of characters in order to keep a consistent bpf programming experience.
> A "size" param is added. Also, the strlen is returned on success so
> that the caller (like the bpf_tcp_ca here) can error out on empty name.
> The existing callers of the bpf_obj_name_cpy() only need to change the
> testing statement to "if (err < 0)". For all these existing callers,
> the err will be overwritten later, so no extra change is needed
> for the new strlen return value.
>
> v3:
> - reverse xmas tree style
>
> v2:
> - Save the orig_src to avoid "end - size" (Andrii)
>
> Fixes: 0baf26b0fcd7 ("bpf: tcp: Support tcp_congestion_ops in bpf")
> Acked-by: Andrii Nakryiko <andriin@...com>
> Signed-off-by: Martin KaFai Lau <kafai@...com>
Applied, thanks!
Powered by blists - more mailing lists