From: Maciej Żenczykowski Date: Wed, 5 May 2021 16:58:31 +0000 (-0700) Subject: net: fix nla_strcmp to handle more then one trailing null character X-Git-Tag: v5.13-rc1~14^2~10 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=2c16db6c92b0ee4aa61e88366df82169e83c3f7e;p=thirdparty%2Flinux.git net: fix nla_strcmp to handle more then one trailing null character Android userspace has been using TCA_KIND with a char[IFNAMESIZ] many-null-terminated buffer containing the string 'bpf'. This works on 4.19 and ceases to work on 5.10. I'm not entirely sure what fixes tag to use, but I think the issue was likely introduced in the below mentioned 5.4 commit. Reported-by: Nucca Chen Cc: Cong Wang Cc: David Ahern Cc: David S. Miller Cc: Jakub Kicinski Cc: Jamal Hadi Salim Cc: Jiri Pirko Cc: Jiri Pirko Fixes: 62794fc4fbf5 ("net_sched: add max len check for TCA_KIND") Change-Id: I66dc281f165a2858fc29a44869a270a2d698a82b Signed-off-by: David S. Miller --- diff --git a/lib/nlattr.c b/lib/nlattr.c index 5b6116e81f9f2..1d051ef66afe5 100644 --- a/lib/nlattr.c +++ b/lib/nlattr.c @@ -828,7 +828,7 @@ int nla_strcmp(const struct nlattr *nla, const char *str) int attrlen = nla_len(nla); int d; - if (attrlen > 0 && buf[attrlen - 1] == '\0') + while (attrlen > 0 && buf[attrlen - 1] == '\0') attrlen--; d = attrlen - len;