tcp: fix out-of-bounds access in ULP sysctl
authorJakub Kicinski <jakub.kicinski@netronome.com>
Fri, 23 Jun 2017 01:57:55 +0000 (18:57 -0700)
committerDavid S. Miller <davem@davemloft.net>
Fri, 23 Jun 2017 18:10:05 +0000 (14:10 -0400)
commit926f38e9744b2ee6d92085c28ebb50744e9e1182
tree8bece0c7338621cebdf5978d5ebce396a2309ac2
parent239946314e57711d7da546b67964d0b387a3ee42
tcp: fix out-of-bounds access in ULP sysctl

KASAN reports out-of-bound access in proc_dostring() coming from
proc_tcp_available_ulp() because in case TCP ULP list is empty
the buffer allocated for the response will not have anything
printed into it.  Set the first byte to zero to avoid strlen()
going out-of-bounds.

Fixes: 734942cc4ea6 ("tcp: ULP infrastructure")
Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/ipv4/tcp_ulp.c