From: Stephen Hemminger <stephen@networkplumber.org>
To: dev@dpdk.org
Cc: Stephen Hemminger <stephen@networkplumber.org>,
Anatoly Burakov <anatoly.burakov@intel.com>
Subject: [RFC 8/8] eal: limit maximum runtime directory and socket paths
Date: Tue, 2 Dec 2025 09:24:34 -0800 [thread overview]
Message-ID: <20251202172626.283094-9-stephen@networkplumber.org> (raw)
In-Reply-To: <20251202172626.283094-1-stephen@networkplumber.org>
Linux (and FreeBSD) has a limitation of 108 characters for
any unix domain socket path. Therefore DPDK would not work
if a really large runtime directory was used.
Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
---
lib/eal/common/eal_common_config.c | 6 ++++--
lib/eal/common/eal_common_proc.c | 18 +++++++++---------
lib/eal/common/eal_filesystem.h | 6 +++++-
3 files changed, 18 insertions(+), 12 deletions(-)
diff --git a/lib/eal/common/eal_common_config.c b/lib/eal/common/eal_common_config.c
index 7fc7611a07..e2e69a75fb 100644
--- a/lib/eal/common/eal_common_config.c
+++ b/lib/eal/common/eal_common_config.c
@@ -6,6 +6,7 @@
#include <eal_export.h>
#include "eal_private.h"
+#include "eal_filesystem.h"
#include "eal_memcfg.h"
/* early configuration structure, when memory config is not mmapped */
@@ -24,7 +25,7 @@ static struct rte_config rte_config = {
};
/* platform-specific runtime dir */
-static char runtime_dir[PATH_MAX];
+static char runtime_dir[UNIX_PATH_MAX];
/* internal configuration */
static struct internal_config internal_config;
@@ -39,7 +40,8 @@ rte_eal_get_runtime_dir(void)
int
eal_set_runtime_dir(const char *run_dir)
{
- if (strlcpy(runtime_dir, run_dir, PATH_MAX) >= PATH_MAX) {
+ /* runtime directory limited by maximum allowable unix domain socket */
+ if (strlcpy(runtime_dir, run_dir, UNIX_PATH_MAX) >= UNIX_PATH_MAX) {
EAL_LOG(ERR, "Runtime directory string too long");
return -1;
}
diff --git a/lib/eal/common/eal_common_proc.c b/lib/eal/common/eal_common_proc.c
index 62fd4ba88f..3c4a1850ff 100644
--- a/lib/eal/common/eal_common_proc.c
+++ b/lib/eal/common/eal_common_proc.c
@@ -36,10 +36,10 @@
static RTE_ATOMIC(int) mp_fd = -1;
static rte_thread_t mp_handle_tid;
-static char mp_filter[PATH_MAX]; /* Filter for secondary process sockets */
-static char mp_dir_path[PATH_MAX]; /* The directory path for all mp sockets */
+static char mp_filter[UNIX_PATH_MAX]; /* Filter for secondary process sockets */
+static char mp_dir_path[UNIX_PATH_MAX]; /* The directory path for all mp sockets */
static pthread_mutex_t mp_mutex_action = PTHREAD_MUTEX_INITIALIZER;
-static char peer_name[PATH_MAX];
+static char peer_name[UNIX_PATH_MAX];
struct action_entry {
TAILQ_ENTRY(action_entry) next;
@@ -78,7 +78,7 @@ struct pending_request {
REQUEST_TYPE_SYNC,
REQUEST_TYPE_ASYNC
} type;
- char dst[PATH_MAX];
+ char dst[UNIX_PATH_MAX];
struct rte_mp_msg *request;
struct rte_mp_msg *reply;
int reply_received;
@@ -599,7 +599,7 @@ open_socket_fd(void)
static void
close_socket_fd(int fd)
{
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
close(fd);
create_socket_path(peer_name, path, sizeof(path));
@@ -609,7 +609,7 @@ close_socket_fd(int fd)
int
rte_mp_channel_init(void)
{
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
int dir_fd;
const struct internal_config *internal_conf =
eal_get_internal_configuration();
@@ -779,7 +779,7 @@ mp_send(struct rte_mp_msg *msg, const char *peer, int type)
}
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
@@ -1055,7 +1055,7 @@ rte_mp_request_sync(struct rte_mp_msg *req, struct rte_mp_reply *reply,
pthread_mutex_lock(&pending_requests.lock);
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
@@ -1200,7 +1200,7 @@ rte_mp_request_async(struct rte_mp_msg *req, const struct timespec *ts,
}
while ((ent = readdir(mp_dir))) {
- char path[PATH_MAX];
+ char path[UNIX_PATH_MAX];
if (fnmatch(mp_filter, ent->d_name, 0) != 0)
continue;
diff --git a/lib/eal/common/eal_filesystem.h b/lib/eal/common/eal_filesystem.h
index 5d21f07c20..5371d9f1d6 100644
--- a/lib/eal/common/eal_filesystem.h
+++ b/lib/eal/common/eal_filesystem.h
@@ -45,10 +45,14 @@ eal_runtime_config_path(void)
/** Path of primary/secondary communication unix socket file. */
#define MP_SOCKET_FNAME "mp_socket"
+
+/** Maximum length of unix domain socket path as defined in sys/un.h */
+#define UNIX_PATH_MAX 108
+
static inline const char *
eal_mp_socket_path(void)
{
- static char buffer[PATH_MAX]; /* static so auto-zeroed */
+ static char buffer[UNIX_PATH_MAX]; /* static so auto-zeroed */
snprintf(buffer, sizeof(buffer), "%s/%s", rte_eal_get_runtime_dir(),
MP_SOCKET_FNAME);
--
2.51.0
prev parent reply other threads:[~2025-12-02 17:27 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-12-02 17:24 [RFC 0/8] first steps in fixing buffer overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 1/8] eal: use C library to parse filesystem table Stephen Hemminger
2025-12-02 17:24 ` [RFC 2/8] hash: fix possible ring name overflow Stephen Hemminger
2025-12-02 17:24 ` [RFC 3/8] eal: warn if thread name is truncated Stephen Hemminger
2025-12-02 17:24 ` [RFC 4/8] eal: avoid format overflow when handling addresses Stephen Hemminger
2025-12-02 17:24 ` [RFC 5/8] ethdev: avoid possible overflow in xstat names Stephen Hemminger
2025-12-02 17:24 ` [RFC 6/8] efd: avoid overflowing ring name Stephen Hemminger
2025-12-02 17:24 ` [RFC 7/8] eal: add check for sysfs path overflow Stephen Hemminger
2025-12-02 17:24 ` Stephen Hemminger [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251202172626.283094-9-stephen@networkplumber.org \
--to=stephen@networkplumber.org \
--cc=anatoly.burakov@intel.com \
--cc=dev@dpdk.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).