samples/bpf: Fix buffer overflow in tcp_basertt
In the Linux kernel, the following vulnerability has been resolved:
Using sizeof(nv) or strlen(nv)+1 is correct.